会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Logging insertion/removal of server blades in a data processing system
    • 在数据处理系统中记录服务器刀片的插入/删除
    • US06883125B2
    • 2005-04-19
    • US10057643
    • 2002-01-24
    • Antonio AbbondanzioSimon C. ChuGregory William DakeWilliam Gavin HollandWilliam Joseph PiazzaGregory Brian PruettDavid B. Rhoades
    • Antonio AbbondanzioSimon C. ChuGregory William DakeWilliam Gavin HollandWilliam Joseph PiazzaGregory Brian PruettDavid B. Rhoades
    • G06F21/86G06F11/00
    • G06F21/86G06F2221/2101
    • This invention is comprised of a data processing system containing at least one main processor connected to a system bus, a system memory connected to the system bus and accessible to each of the main processors, a tamper mechanism, and a local service processor. The tamper mechanism is configured to change state each time the system is inserted into a slot in a rack enclosure. The local service processor is connected to the tamper mechanism and configured to update an insertion log upon detecting a change in state of the tamper mechanism. The insertion log provides a count and a history of rack insertions to which the system has been subjected. The system may include a non-volatile storage element which is updated exclusively by the local service processor that contains the insertion log. The insertion log may include an insertion counter. In this embodiment, the local service processor is configured to increment the insertion counter upon each insertion. The local service processor may be further configured to issue an alert if the insertion counter exceeds a predetermined value. In one embodiment, the system further includes a battery backed real-time clock connected to the local service processor. The local service processor is configured to include real-time information corresponding to each insertion event in the insertion log. Each entry in the insertion log may include the identity of the rack enclosure and the geographical address of the slot of the corresponding insertion event. The local service processor may be configured to detect the tamper mechanism state and update the insertion following a power event such that the insertion log update is independent of configuring the data processing system with a boot image.
    • 本发明包括一个数据处理系统,该数据处理系统包括连接到系统总线的至少一个主处理器,连接到系统总线并且可被每个主处理器访问的系统存储器,篡改机制和本地服务处理器。 篡改机制被配置为每当系统插入机柜中的插槽时改变状态。 本地服务处理器连接到篡改机制,并且被配置为在检测到篡改机制的状态变化时更新插入日志。 插入日志提供系统受到的机架插入的计数和历史记录。 系统可以包括由包含插入日志的本地服务处理器专门更新的非易失性存储元件。 插入日志可以包括插入计数器。 在该实施例中,本地服务处理器被配置为在每次插入时递增插入计数器。 本地服务处理器还可以被配置为如果插入计数器超过预定值则发出警报。 在一个实施例中,系统还包括连接到本地服务处理器的电池支持的实时时钟。 本地服务处理器被配置为包括与插入日志中的每个插入事件相对应的实时信息。 插入日志中的每个条目可以包括机架机柜的标识和相应插入事件的时隙的地理位置。 本地服务处理器可以被配置为检测篡改机制状态并且在功率事件之后更新插入,使得插入日志更新独立于使用引导映像配置数据处理系统。
    • 5. 发明授权
    • Fail-over control in a computer system having redundant service processors
    • 具有冗余服务处理器的计算机系统中的故障切换控制
    • US06931568B2
    • 2005-08-16
    • US10113167
    • 2002-03-29
    • Antonio AbbondanzioGregory William DakeDhruv Manmohandas DesaiBenjamin Russell GrimesWilliam Joseph PiazzaGregory Brian PruettDavid B. Rhoades
    • Antonio AbbondanzioGregory William DakeDhruv Manmohandas DesaiBenjamin Russell GrimesWilliam Joseph PiazzaGregory Brian PruettDavid B. Rhoades
    • H04L1/22G06F11/00
    • G06F11/2028G06F11/2038H04L1/22
    • A system and method for determining an active service processor from two or more redundant service processors in the system. The system typically includes two management modules and at least one managed subsystem such as a server blade. Each management module includes a service processor and control logic. The control logic is configured to receive various status signals from the service processor and to generate a control signal based thereon. The control signal is provided, via an interconnect plane, to determination logic on each managed subsystem. The determination logic receives a control signal from each management module and generates a switch signal based on the state of the control signals. The switch signal controls switching logic configured to receive bus signals from the service processors on each management module. Based on the control signal, one of the service processor bus signals is provided to managed instrumentation on the managed subsystem. The management module control logic is generally configured to maintain the control signal in its current state if the active processor is determined to be functional. The control logic is further configured to alter the control signal state if the active service processor is determined to be non-functional. A transition in the control signal typically generates a fail-over event that causes the switching logic on the managed subsystems to switch from the previously active service processor to the previously inactive or standby service processor as the source of service processor signals.
    • 一种用于从系统中的两个或多个冗余服务处理器确定主动服务处理器的系统和方法。 系统通常包括两个管理模块和至少一个托管子系统,例如服务器刀片。 每个管理模块包括服务处理器和控制逻辑。 控制逻辑被配置为从服务处理器接收各种状态信号并且基于此产生控制信号。 控制信号通过互连平面提供给每个被管理的子系统上的确定逻辑。 确定逻辑从每个管理模块接收控制信号,并根据控制信号的状态生成开关信号。 开关信号控制被配置为从每个管理模块上的服务处理器接收总线信号的开关逻辑。 基于控制信号,服务处理器总线信号之一被提供给被管理子系统上的管理仪器。 管理模块控制逻辑通常被配置为如果活动处理器被确定为功能,则将控制信号保持在其当前状态。 控制逻辑还被配置为如果主动服务处理器被确定为不起作用则改变控制信号状态。 控制信号中的转换通常产生故障转移事件,导致被管理子系统上的交换逻辑从先前有效的服务处理器切换到先前不活动或备用服务处理器作为服务源处理器信号。
    • 6. 发明授权
    • Remotely controlled boot settings in a server blade environment
    • 在服务器刀片环境中远程控制引导设置
    • US07013385B2
    • 2006-03-14
    • US10064012
    • 2002-06-04
    • Antonio AbbondanzioGregory William DakeWilliam Joseph PiazzaGregory Brian PruettDavid B. Rhoades
    • Antonio AbbondanzioGregory William DakeWilliam Joseph PiazzaGregory Brian PruettDavid B. Rhoades
    • G06F9/445
    • G06F9/4405G06F15/177
    • A system for storing and configuring CMOS setting information remotely in a sewer blade environment includes a management module having includes persistent storage containing a table of CMOS setting information for each server blade. Each server blade includes boot block software that executes when the blade is booted. The boot block software initiates communication with the management module and retrieves its CMOS settings from the table. Thus, CMOS settings for a particular blade location remain unchanged each time a blade is replaced or upgraded. The management module and saver blades may implement a programming interface tat includes command abstractions for each CMOS setting. The management module sends command abstractions to each sewer blade during the CMOS configuration process. The server blade interprets the commands and maps the commands to specific CMOS bit addresses thereby making the specific CMOS implementation employed by any server blade transparent to the management module.
    • 用于在下水道刀片环境中远程存储和配置CMOS设置信息的系统包括管理模块,其包括持久存储器,其包含用于每个服务器刀片的CMOS设置信息表。 每个服务器刀片都包括引导块软件,当刀片启动时执行。 引导块软件启动与管理模块的通信,并从表中检索其CMOS设置。 因此,每当刀片被替换或升级时,特定刀片位置的CMOS设置保持不变。 管理模块和保护刀片可以实现编程接口,其中包括每个CMOS设置的命令抽象。 管理模块在CMOS配置过程中向每个下水道刀片发送命令抽象。 服务器刀片解释命令并将命令映射到特定的CMOS位地址,从而使任何服务器刀片采用的特定CMOS实现对管理模块都是透明的。
    • 7. 发明申请
    • Automatic Client Responses To Worm Or Hacker Attacks
    • 自动客户端响应蠕虫或黑客攻击
    • US20080263668A1
    • 2008-10-23
    • US12168954
    • 2008-07-08
    • Simon C. ChuSteven W. HunterWilliam Joseph PiazzaGregory Brian Pruett
    • Simon C. ChuSteven W. HunterWilliam Joseph PiazzaGregory Brian Pruett
    • G06F21/00
    • H04L63/145G06F21/554
    • A system in which a networked device automatically evaluates hacker attack notification information and, based thereon, selects and executes responses to the attack. The notification may include information such as the address of the infected system, identification of the specific worm, and a list of vulnerable applications and operating systems. The evaluation is based on factors including criticality and vulnerability of applications running on the system and connectivity of the device. A variety of automatic responses can be selected, including notification of network administration, shutdown of the device or services running on the device, updating and activation of anti-virus software, and selective handling of data sent from the address of the suspect network device. The selection of responses can occur automatically based on rules input during setup or by intervention of network administration.
    • 网络设备自动评估黑客攻击通知信息的系统,并且基于此,选择并执行对攻击的响应。 该通知可以包括诸如受感染系统的地址,特定蠕虫的识别以及易受攻击的应用和操作系统的列表之类的信息。 该评估基于包括系统上运行的应用程序的关键性和漏洞以及设备连接性的因素。 可以选择各种自动响应,包括网络管理的通知,设备关闭或设备上运行的服务,反病毒软件的更新和激活以及从可疑网络设备的地址发送的数据的选择性处理。 响应的选择可以根据设置过程中输入的规则或网络管理干预自动进行。
    • 8. 发明授权
    • Automatic client responses to worm or hacker attacks
    • 客户自动响应蠕虫或黑客攻击
    • US07418730B2
    • 2008-08-26
    • US10321091
    • 2002-12-17
    • Simon C. ChuSteven W. HunterWilliam Joseph PiazzaGregory Brian Pruett
    • Simon C. ChuSteven W. HunterWilliam Joseph PiazzaGregory Brian Pruett
    • G06F11/00
    • H04L63/145G06F21/554
    • A system in which a networked device automatically evaluates hacker attack notification information and, based thereon, selects and executes responses to the attack. The notification may include information such as the address of the infected system, identification of the specific worm, and a list of vulnerable applications and operating systems. The evaluation is based on factors including criticality and vulnerability of applications running on the system and connectivity of the device. A variety of automatic responses can be selected, including notification of network administration, shutdown of the device or services running on the device, updating and activation of anti-virus software, and selective handling of data sent from the address of the suspect network device. The selection of responses can occur automatically based on rules input during setup or by intervention of network administration.
    • 网络设备自动评估黑客攻击通知信息的系统,并且基于此,选择并执行对攻击的响应。 该通知可以包括诸如受感染系统的地址,特定蠕虫的识别以及易受攻击的应用和操作系统的列表之类的信息。 该评估基于包括系统上运行的应用程序的关键性和漏洞以及设备连接性的因素。 可以选择各种自动响应,包括网络管理的通知,设备关闭或设备上运行的服务,反病毒软件的更新和激活以及从可疑网络设备的地址发送的数据的选择性处理。 响应的选择可以根据设置过程中输入的规则或网络管理干预自动进行。