会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • System for processor power limit management
    • 处理器功率限制管理系统
    • US08756442B2
    • 2014-06-17
    • US12970172
    • 2010-12-16
    • Samuel D. NaffzigerJohn P. PetryKiran BondalapatiWilliam A. Hughes
    • Samuel D. NaffzigerJohn P. PetryKiran BondalapatiWilliam A. Hughes
    • G06F1/00
    • G06F1/324G06F1/3296Y02D10/126Y02D10/172
    • A processor power limiter and method is provided. The processor includes a first programmable location configured to store a processor power target. A power monitor is configured to estimate a power dissipation due to processor load. A power controller is configured to adjust a processor power parameter based on the power target and the power dissipation. The processor may include an interface for an operating system. A second programmable location may be configured to store a software processor power target accessible by the operating system. The processor may also include a sideband interface for an external agent. A third programmable location may be configured to store an agent processor power target accessible by the external agent. The power controller may be configured to adjust a processor core voltage and/or frequency such that the power dissipation stays below the processor power target, software processor power target and the agent processor power target.
    • 提供了一种处理器功率限制器和方法。 处理器包括被配置为存储处理器功率目标的第一可编程位置。 功率监视器配置为估计由于处理器负载引起的功耗。 功率控制器被配置为基于功率目标和功率消耗来调整处理器功率参数。 处理器可以包括用于操作系统的接口。 可以将第二可编程位置配置为存储由操作系统可访问的软件处理器功率目标。 处理器还可以包括用于外部代理的边带接口。 可以将第三可编程位置配置为存储由外部代理可访问的代理处理器功率目标。 功率控制器可以被配置为调整处理器核心电压和/或频率,使得功率消耗保持在处理器功率目标,软件处理器功率目标和代理处理器功率目标之下。
    • 3. 发明申请
    • PROCESSOR POWER LIMIT MANAGEMENT
    • 处理器功率限制管理
    • US20120159198A1
    • 2012-06-21
    • US12970172
    • 2010-12-16
    • Samuel D. NaffzigerJohn P. PetryKiran Bondalapati
    • Samuel D. NaffzigerJohn P. PetryKiran Bondalapati
    • G06F1/26
    • G06F1/324G06F1/3296Y02D10/126Y02D10/172
    • A processor power limiter and method is provided. The processor includes a first programmable location configured to store a processor power target. A power monitor is configured to estimate a measured power dissipation within the processor. A power controller is configured to adjust a processor power parameter based on the power target and the measured power dissipation. The processor may include an interface for an operating system. A second programmable location may be configured to store a software processor power target accessible by the operating system. The processor may also include a sideband interface for an external agent. A third programmable location may be configured to store an agent processor power target accessible by the external agent. The power controller may be configured to adjust a processor core voltage and/or frequency such that the measured dissipation stays below the processor power target, software processor power target and the agent processor power target.
    • 提供了一种处理器功率限制器和方法。 处理器包括被配置为存储处理器功率目标的第一可编程位置。 功率监视器被配置为估计处理器内的测量功率耗散。 功率控制器被配置为基于功率目标和测量的功率耗散来调整处理器功率参数。 处理器可以包括用于操作系统的接口。 可以将第二可编程位置配置为存储由操作系统可访问的软件处理器功率目标。 处理器还可以包括用于外部代理的边带接口。 可以将第三可编程位置配置为存储由外部代理可访问的代理处理器功率目标。 功率控制器可以被配置为调整处理器核心电压和/或频率,使得所测量的功率保持在处理器功率目标,软件处理器功率目标和代理处理器功率目标之下。
    • 5. 发明申请
    • CSTATE BOOST METHOD AND APPARATUS
    • CSTATE BOOST方法和装置
    • US20120159123A1
    • 2012-06-21
    • US12971734
    • 2010-12-17
    • Samuel D. NaffzigerJohn P. PetryKiran Bondalapati
    • Samuel D. NaffzigerJohn P. PetryKiran Bondalapati
    • G06F9/32
    • G06F1/3243G06F9/5094Y02D10/152Y02D10/22
    • A central processing unit (processor) having multiple cores and a method for controlling the performance of the processor. The processor includes a first storage location configured to store a first threshold associated with a first boost performance state (P-State). The processor also includes logic circuitry configured to increase performance of active processor cores when an inactive processor core count meets or exceeds the first threshold. The processor may also include a second storage location configured to store a second threshold associated with a second boost P-State. The logic circuitry may be configured to compare the inactive processor core count to the first and second thresholds, select one of the first and second boost P-States and increase performance of active processor cores based on the selected boost P-State.
    • 具有多个核的中央处理单元(处理器)和用于控制处理器性能的方法。 处理器包括被配置为存储与第一升压性能状态(P状态)相关联的第一阈值的第一存储位置。 处理器还包括配置成当非活动处理器核心计数满足或超过第一阈值时增加主动处理器核心的性能的逻辑电路。 处理器还可以包括被配置为存储与第二升压P状态相关联的第二阈值的第二存储位置。 逻辑电路可以被配置为将非活动处理器核心计数与第一和第二阈值进行比较,选择第一和第二升压P状态中的一个,并且基于所选择的升压P状态增加主动处理器核的性能。
    • 9. 发明申请
    • APPROACHES FOR SECURING AN INTERNET ENDPOINT USING FINE-GRAINED OPERATING SYSTEM VIRTUALIZATION
    • 使用精细操作系统虚拟化来保护互联网端点的方法
    • US20110296412A1
    • 2011-12-01
    • US13115354
    • 2011-05-25
    • Gaurav BangaIan PrattKiran BondalapatiVikram Kapoor
    • Gaurav BangaIan PrattKiran BondalapatiVikram Kapoor
    • G06F9/455
    • G06F9/5077G06F9/45545G06F9/5027G06F2009/45562G06F2009/45587G06F2209/5018
    • Approaches for executing untrusted software on a client without compromising the client using micro-virtualization to execute untrusted software in isolated contexts. A template for instantiating a virtual machine on a client is identified in response to receiving a request to execute an application. After the template is identified, without human intervention, a virtual machine is instantiated, using the template, in which the application is to be executed. The template may be selected from a plurality of templates based on the nature of the request, as each template describe characteristics of a virtual machine suitable for a different type of activity. Selected resources such as files are displayed to the virtual machines according to user and organization policies and controls. When the client determines that the application has ceased to execute, the client ceases execution of the virtual machine without human intervention.
    • 在客户端上执行不受信任的软件的方法,而不会在使用微型虚拟化的情况下使用独立的上下文来执行不受信任的软件。 响应于接收到执行应用的请求,识别用于在客户机上实例化虚拟机的模板。 在模板被识别之后,没有人为干预,就会使用要在其中执行应用程序的模板来实例化一个虚拟机。 可以基于请求的性质从多个模板中选择模板,因为每个模板描述适合于不同类型活动的虚拟机的特征。 所选资源(如文件)将根据用户和组织策略和控件显示给虚拟机。 当客户端确定应用程序已停止执行时,客户端将在不进行人为干预的情况下停止执行虚拟机。