会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Methods and arrangements for capturing runtime information
    • 捕获运行时信息的方法和安排
    • US07177782B2
    • 2007-02-13
    • US10871848
    • 2004-06-18
    • Ohad FalikJoseph Wayne FreemanIsaac KarpelJames S. RutledgeRandall Scott Springfield
    • Ohad FalikJoseph Wayne FreemanIsaac KarpelJames S. RutledgeRandall Scott Springfield
    • G06F15/00G06F12/00
    • G06F11/348G06F11/0778G06F11/1666G06F11/2015
    • Methods and arrangements for capturing information related to operational conditions are disclosed. Embodiments include volatile memory to quickly record operational parameters via, e.g., basic input output system (BIOS) code, system management interrupt (SMI) code and/or executing applications. Many embodiments provide an alternative power source and a voltage switch to protect against loss of the information between storage in the volatile memory and storage in the non-volatile memory. Some embodiments include a read controller that provides access to the volatile memory when primary power is available. The read controller may also offer direct access to the non-volatile memory in case of a catastrophic failure that renders the processing device substantially non-functional. Further embodiments include a second processing device to generate a usage model and/or to perform diagnostics with the operational parameters.
    • 公开了捕获与操作条件有关的信息的方法和布置。 实施例包括通过例如基本输入输出系统(BIOS)代码,系统管理中断(SMI)代码和/或执行应用程序来快速记录操作参数的易失性存储器。 许多实施例提供了替代电源和电压开关,以防止在易失性存储器中的存储器和非易失性存储器中的存储之间的信息丢失。 一些实施例包括在主电源可用时提供对易失性存储器的访问的读取控制器。 在导致处理设备基本上不起作用的灾难性故障的情况下,读控制器还可以提供对非易失性存储器的直接访问。 另外的实施例包括用于生成使用模型和/或使用操作参数执行诊断的第二处理装置。
    • 4. 发明授权
    • Reducing start-up time and avoiding customer-induced system failures for personal computers
    • 减少启动时间,避免客户导致的个人电脑系统故障
    • US06721885B1
    • 2004-04-13
    • US09658130
    • 2000-09-08
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • G06F15177
    • G06F9/4401G06F11/2289
    • Disclosed is a method for reducing power-up time and avoiding customer-induced failures of computer systems during power-up. An intrusion switch, which is connected to the inside frame of the computer system is utilized. The intrusion switch signals the BIOS of the computer system whenever the cover of the computer's system unit is opened. The BIOS controls the POST operation during power-up of the computer system. During an initial power-up of the computer system, the POST configuration code examines and configures the hardware and sets the applicable registers, etc. At the end of the POST configuration code, the register values are stored in non-volatile storage. During a subsequent power-up of the computer system, a check is made to see if the cover of the system had been opened. When the cover has not been opened, the BIOS assumes that no changed has occurred in the hardware configuration and the BIOS restores the register values from non-volatile storage without completing the POST operation. When the cover has been opened, the BIOS discards the register values and initiates the POST operation, i.e., a full configuration operation is performed and new values stored in the registers and non-volatile storage element.
    • 公开了一种在上电期间减少上电时间并避免客户导致的计算机系统故障的方法。 使用连接到计算机系统的内部框架的入侵开关。 每当打开计算机系统单元的盖子时,入侵开关就会通知计算机系统的BIOS。 BIOS在电脑系统启动期间控制POST操作。 在计算机系统的初始上电期间,POST配置代码检查和配置硬件并设置适用的寄存器等。在POST配置代码结束时,寄存器值存储在非易失性存储器中。 在计算机系统的随后上电期间,检查系统的盖是否已打开。 当盖子尚未打开时,BIOS假定在硬件配置中没有发生任何变化,BIOS会从非易失性存储器中恢复寄存器值,而无需完成POST操作。 当盖子打开时,BIOS将丢弃寄存器值并启动POST操作,即执行完整配置操作,并将新值存储在寄存器和非易失性存储元件中。
    • 8. 发明授权
    • Method to use secure passwords in an unsecure program environment
    • 在不安全的程序环境中使用安全密码的方法
    • US07200761B1
    • 2007-04-03
    • US09711028
    • 2000-11-09
    • Joseph Wayne FreemanRandall Scott SpringfieldSteven Dale GoodmanIsaac Karpel
    • Joseph Wayne FreemanRandall Scott SpringfieldSteven Dale GoodmanIsaac Karpel
    • G06F9/00G06F11/30G06F15/173G06F15/16H04L9/00
    • G06F21/575G06F11/2284G06F21/79
    • During power up initialization, security data such as passwords and other sensitive data which are stored in a lockable memory device are read and copied to protected system management interrupt (SMI) memory space, subject to verification by code running in the SMI memory space that the call to write the security data originates with a trusted entity. Once copied to SMI memory space, the security data is erased from regular system memory and the lockable storage device is hard locked (requiring a reset to unlock) against direct access prior to starting the operating system. The copy of the security data within the SMI memory space is invisible to the operating system. However, the operating system may initiate a call to code running in the SMI memory space to check a password entered by the user, with the SMI code returning a “match” or “no match” indication. The security data may thus be employed after the lockable memory device is hard locked and the operating system is started.
    • 在上电初始化期间,存储在可锁定存储器设备中的安全数据(例如密码和其他敏感数据)被读取并复制到受保护的系统管理中断(SMI)存储器空间,经由在SMI存储器空间中运行的代码进行验证, 调用写入安全数据来源于受信任的实体。 一旦复制到SMI内存空间,安全数据将从常规系统内存中擦除,锁定的存储设备在启动操作系统之前就被硬锁定(需要重新启动)以防止直接访问。 SMI内存空间中的安全数据的副本对于操作系统是不可见的。 然而,操作系统可以启动对在SMI存储器空间中运行的代码的调用,以检查由用户输入的密码,SMI代码返回“匹配”或“不匹配”指示。 因此,在可锁定存储器件被硬锁定并且操作系统启动之后可以采用安全数据。
    • 10. 发明授权
    • Method and system for setting a secure computer environment
    • 设置安全计算机环境的方法和系统
    • US06925570B2
    • 2005-08-02
    • US09858058
    • 2001-05-15
    • Joseph Wayne FreemanRandall Scott Springfield
    • Joseph Wayne FreemanRandall Scott Springfield
    • G06F12/14G06F9/445G06F21/00G06F21/22G06F21/24G06F17/00
    • G06F21/71G06F21/79
    • A computer system processor incorporates a special S-latch which may only be set by secure signals. One state of the S-latch sets the processor into a secure mode where it only executes instructions and not commands from an In Circuit Emulator (ICE) unit. A second state of the S-latch sets the processor into a non-secure mode. A non-volatile random access memory (NVRAM) is written with secure data which can only be read by boot block code stored in a BIOS storage device. The boot block code is operable to read the secure data in the NVRAM and set the S-latch to an appropriate security state. If the boot block code cannot set the S-latch, then remaining boot up with BIOS data is stopped. On boot up the boot block code reads the NVRAM and sets the S-latch into the appropriate security state.
    • 计算机系统处理器包括只能由安全信号设置的特殊S-锁存器。 S锁存器的一个状态将处理器设置为安全模式,其中它只执行指令而不是来自In Circuit Emulator(ICE)单元的命令。 S锁存器的第二状态将处理器设置为非安全模式。 用非易失性随机存取存储器(NVRAM)写入只能由存储在BIOS存储设备中的引导块代码读取的安全数据。 引导块代码可操作以读取NVRAM中的安全数据并将S锁存器设置为适当的安全状态。 如果引导块代码无法设置S锁存器,则停止使用BIOS数据进行剩余引导。 启动引导块代码读取NVRAM并将S锁存器设置为适当的安全状态。