会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 33. 发明申请
    • Methods and apparatus for parallel processing in system management mode
    • 系统管理模式下并行处理的方法与装置
    • US20080126650A1
    • 2008-05-29
    • US11525617
    • 2006-09-21
    • Robert C. SwansonMichael A. RothmanVincent J. ZimmerFernando A. LopezMallik Bulusu
    • Robert C. SwansonMichael A. RothmanVincent J. ZimmerFernando A. LopezMallik Bulusu
    • G06F13/24G06F11/14
    • G06F9/542G06F11/0721G06F11/0793G06F2209/543
    • A processing system includes multiple processing units. After multiple event handlers have been dispatched to execute concurrently in different processing units of the processing system in a hidden execution mode, the processing system automatically determines whether the multiple event handlers successfully complete. If an event handler among the multiple dispatched event handlers fails, the processing system automatically dispatches another event handler to perform operations associated with the event handler that failed. In an embodiment, the hidden execution mode is a system management mode (SMM), and the multiple event handlers are dispatched in response to a system management interrupt (SMI) or a platform management interrupt (PMI). In an embodiment, the processing system may determine why the dispatched event handler failed, and may performing a corrective operation before dispatching another event handler to perform the operations associated with the event handler that failed. Other embodiments are described and claimed.
    • 处理系统包括多个处理单元。 在多个事件处理程序已经被调度以在隐藏的执行模式中在处理系统的不同处理单元中同时执行的情况下,处理系统自动地确定多个事件处理程序是否成功完成。 如果多个分派事件处理程序中的事件处理程序发生故障,处理系统将自动调度另一个事件处理程序,以执行与失败的事件处理程序相关联的操作。 在一个实施例中,隐藏执行模式是系统管理模式(SMM),响应于系统管理中断(SMI)或平台管理中断(PMI),调度多个事件处理程序。 在一个实施例中,处理系统可以确定分派的事件处理程序失败的原因,并且可以在分派另一事件处理程序之前执行校正操作,以执行与失败的事件处理程序相关联的操作。 描述和要求保护其他实施例。
    • 38. 发明授权
    • Saving system context in the event of power loss
    • 在掉电的情况下节省系统上下文
    • US07647474B2
    • 2010-01-12
    • US11236089
    • 2005-09-27
    • Mallik BulusuVincent J. ZimmerMichael A. Rothman
    • Mallik BulusuVincent J. ZimmerMichael A. Rothman
    • G06F11/00G06F1/30
    • G06F11/1441G06F1/305
    • Embodiments of a method and system for saving system context after a power outage are disclosed herein. A power agent operates to reduce the possibility of data corruption due to partially written data during an unexpected power outage. The power agent can determine an amount of time remaining before a power store is depleted. Based on the amount of time, the power agent can store system context information. Correspondingly, the power agent can operate to save complete system context, partial system context, or flush (I/O) buffers. Once power is restored, the power agent can restore the system context based on the nature of the save. Other embodiments are described and claimed.
    • 本文公开了在停电之后保存系统上下文的方法和系统的实施例。 电力代理人可以在意外停电期间减少部分写入的数据造成数据损坏的可能性。 电力代理可以确定电力储存耗尽之前的剩余时间。 基于时间量,电源代理可以存储系统上下文信息。 相应地,电源代理可以操作以保存完整的系统上下文,部分系统上下文或刷新(I / O)缓冲器。 一旦电源恢复,电源代理可以根据保存的性质恢复系统上下文。 描述和要求保护其他实施例。
    • 40. 发明申请
    • TRUSTED APPLICATION MIGRATION ACROSS COMPUTER NODES
    • 涉嫌计算机应用程序迁移
    • US20130318577A1
    • 2013-11-28
    • US13995511
    • 2011-12-30
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • H04L29/06
    • H04L63/0876G06F21/00H04L63/08H04W12/06H04W12/08
    • An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.
    • 一个实施例包括用于在计算连续体上发送信息的安全且稳定的方法。 例如,该方法可以包括在第一节点(例如,平板电脑)上执行应用(例如,视频播放器),期望执行到第二节点(例如桌面)的“上下文迁移”。 这可能允许用户在平板电脑上观看电影,停止观看电影,然后从桌面恢复观看电影。 为了以安全和稳定的方式这样做,第一节点可以从第二节点请求安全性和性能证书。 如果两个凭证组都满足阈值,则第一节点可以传送内容(例如,电影的加密副本)和状态信息(例如,当上下文传送开始时,指示电影在哪里的占位符)。 然后,第二节点可以允许用户从桌面恢复他或她的电影观看。 本文描述了其它实施例。