会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Method and system for concurrent handler execution in an SMI and PMI-based dispatch-execution framework
    • 在SMI和基于PMI的调度执行框架中执行并发处理程序的方法和系统
    • US06775728B2
    • 2004-08-10
    • US10011233
    • 2001-11-15
    • Vincent J. ZimmerSham M. Datta
    • Vincent J. ZimmerSham M. Datta
    • G06F1324
    • G06F9/4812
    • A method and system that enables concurrent event handler execution in a system management interrupt (SMI) and processor management interrupt (PMI)-based dispatch-execution framework to service an SMI or PMI event. A plurality of event handlers are loaded into a hidden memory space that is accessible to a hidden execution mode supported by each of a plurality of processors in a multiprocessor computer system but is not accessible to other operating modes of those processors. The event handlers are then dispatched to two or more processors in response to the hidden execution mode event and concurrently executed to service the event. Various embodiments include use of a single event handler to service the event, multiple event handlers that perform different tasks, and multiple event handler instances that concurrently perform a single task. The invention also provides a resource locking mechanism to prevent resource access conflicts.
    • 一种在系统管理中断(SMI)和基于处理器管理中断(PMI)的调度执行框架中执行并发事件处理程序的服务SMI或PMI事件的方法和系统。 多个事件处理程序被加载到可由多处理器计算机系统中的多个处理器中的每一个支持的隐藏执行模式可访问的隐藏存储器空间中,但是对于这些处理器的其它操作模式是不可访问的。 然后响应于隐藏的执行模式事件将事件处理程序分派到两个或多个处理器,并且并发执行以对该事件进行服务。 各种实施例包括使用单个事件处理程序来服务事件,执行不同任务的多个事件处理程序以及同时执行单个任务的多个事件处理程序实例。 本发明还提供了一种防止资源访问冲突的资源锁定机制。
    • 8. 发明授权
    • Trusted application migration across computer nodes
    • 跨计算机节点的可信应用程序迁移
    • US09210148B2
    • 2015-12-08
    • US13995511
    • 2011-12-30
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • H04L29/06G06F21/00
    • H04L63/0876G06F21/00H04L63/08H04W12/06H04W12/08
    • An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.
    • 一个实施例包括用于在计算连续体上发送信息的安全且稳定的方法。 例如,该方法可以包括在第一节点(例如,平板电脑)上执行应用(例如,视频播放器),期望执行到第二节点(例如桌面)的“上下文迁移”。 这可能允许用户在平板电脑上观看电影,停止观看电影,然后从桌面恢复观看电影。 为了以安全和稳定的方式这样做,第一节点可以从第二节点请求安全性和性能凭证。 如果两个凭证组都满足阈值,则第一节点可以传送内容(例如,电影的加密副本)和状态信息(例如,当上下文传送开始时,指示电影在哪里的占位符)。 然后,第二节点可以允许用户从桌面恢复他或她的电影观看。 本文描述了其它实施例。