会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 63. 发明申请
    • Hypervisor control of power and thermal for client systems
    • 管理程序控制客户端系统的电源和散热
    • US20070234360A1
    • 2007-10-04
    • US11394654
    • 2006-03-31
    • Howard J. LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • G06F9/46
    • G06F11/3058G06F1/206G06F1/3203G06F11/301
    • Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to thermal fan control. The hypervisor is able to fire up a maintenance Operating System on demand or have it running from the powering of the computer. The maintenance Operating System continuously monitors the status of the user Operating System and determines if the system is within the desired fan noise profile by measuring noise levels using means well known in the art. If the system seems to be drifting out of the desired profile, the maintenance Operating System will determine what type of action is required and choose the most appropriate course of action. These actions can be performed by either the maintenance Operating System or the hypervisor, as appropriate.
    • 管理程序是行业中的一项新技术,可使多个操作系统在单个客户端上共存。 使用管理程序提供了一种新型的风扇控制方法。 管理程序能够根据需要启动维护操作系统,或者从计算机的电源运行。 维护操作系统通过使用本领域熟知的手段测量噪声水平来连续地监视用户操作系统的状态并确定系统是否在期望的风扇噪声分布内。 如果系统似乎从所需的配置文件中漂移出来,维护操作系统将确定需要哪种类型的操作,并选择最合适的操作步骤。 这些操作可以由维护操作系统或管理程序根据需要执行。
    • 68. 发明申请
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US20070283169A1
    • 2007-12-06
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • H04L9/00G06F12/14H04L9/32G06F11/30
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。
    • 70. 发明授权
    • Reducing start-up time and avoiding customer-induced system failures for personal computers
    • 减少启动时间,避免客户导致的个人电脑系统故障
    • US06721885B1
    • 2004-04-13
    • US09658130
    • 2000-09-08
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • G06F15177
    • G06F9/4401G06F11/2289
    • Disclosed is a method for reducing power-up time and avoiding customer-induced failures of computer systems during power-up. An intrusion switch, which is connected to the inside frame of the computer system is utilized. The intrusion switch signals the BIOS of the computer system whenever the cover of the computer's system unit is opened. The BIOS controls the POST operation during power-up of the computer system. During an initial power-up of the computer system, the POST configuration code examines and configures the hardware and sets the applicable registers, etc. At the end of the POST configuration code, the register values are stored in non-volatile storage. During a subsequent power-up of the computer system, a check is made to see if the cover of the system had been opened. When the cover has not been opened, the BIOS assumes that no changed has occurred in the hardware configuration and the BIOS restores the register values from non-volatile storage without completing the POST operation. When the cover has been opened, the BIOS discards the register values and initiates the POST operation, i.e., a full configuration operation is performed and new values stored in the registers and non-volatile storage element.
    • 公开了一种在上电期间减少上电时间并避免客户导致的计算机系统故障的方法。 使用连接到计算机系统的内部框架的入侵开关。 每当打开计算机系统单元的盖子时,入侵开关就会通知计算机系统的BIOS。 BIOS在电脑系统启动期间控制POST操作。 在计算机系统的初始上电期间,POST配置代码检查和配置硬件并设置适用的寄存器等。在POST配置代码结束时,寄存器值存储在非易失性存储器中。 在计算机系统的随后上电期间,检查系统的盖是否已打开。 当盖子尚未打开时,BIOS假定在硬件配置中没有发生任何变化,BIOS会从非易失性存储器中恢复寄存器值,而无需完成POST操作。 当盖子打开时,BIOS将丢弃寄存器值并启动POST操作,即执行完整配置操作,并将新值存储在寄存器和非易失性存储元件中。