Power saving method for computer system
    2.
    发明专利
    Power saving method for computer system 有权
    计算机系统节能方法

    公开(公告)号:JP2009217631A

    公开(公告)日:2009-09-24

    申请号:JP2008061675

    申请日:2008-03-11

    CPC classification number: G06F1/3209

    Abstract: PROBLEM TO BE SOLVED: To provide a method for attaining power saving by automatically changing the power level of a CPU according to a processing quantity which varies from time to time. SOLUTION: A server computer system provided with a CPU operable on a plurality of levels of power provides a service according to a predetermined protocol specified by a port number to a client computer through a computer network. The method comprises steps of: monitoring connection or disconnection of a server computer with the client computer and a port number of the connected or disconnected communication; determining a power level according to the port number; and setting the power level of the CPU to the determined power level. A computer system comprising units for performing each step and a program for causing the system to execute each step are also provided. COPYRIGHT: (C)2009,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种通过根据随时间变化的处理量自动改变CPU的功率电平来实现节电的方法。 解决方案:具有可在多个电平上操作的CPU的服务器计算机系统通过计算机网络向客户端计算机提供根据由端口号指定的预定协议的服务。 该方法包括以下步骤:监视与客户端计算机的服务器计算机的连接或断开以及所连接或断开的通信的端口号; 根据端口号确定功率电平; 并将CPU的功率电平设置为所确定的功率电平。 还提供了包括用于执行每个步骤的单元和用于使系统执行每个步骤的程序的计算机系统。 版权所有(C)2009,JPO&INPIT

    APPARATUS FOR SHIELDING SENSITIVE FILE, SERVER COMPUTER OF THE SAME, METHOD AND COMPUTER PROGRAM PRODUCT FOR THE SAME

    公开(公告)号:CA2738466C

    公开(公告)日:2018-03-13

    申请号:CA2738466

    申请日:2009-11-20

    Applicant: IBM

    Abstract: Apparatus is for shielding a sensitive file connectable to server computer via network. Compliance requirements storing unit stores security compliance requirements of apparatus. Security compliance requirements are sent from server computer. Security requirements monitoring unit is for determining where apparatus complies with security compliance requirements or not in response to a read instruction or a write instruction of sensitive file by application software. Security requirements monitoring unit requests server computer to verify user information of apparatus and a version of security compliance requirements, and unlocks encryption key storing unit and decryption key storing unit when user information and version are successfully verified. When apparatus complies with security compliance requirements, security requirements monitoring unit passes encryption key and key ID from encryption key storing unit to encryption-decryption unit, or passes decryption key corresponding to key ID embedded in encrypted sensitive file from decryption key storing unit to encryption-decryption unit.

    APPARATUS FOR SHIELDING SENSITIVE FILE, SERVER COMPUTER OF THE SAME, METHOD AND COMPUTER PROGRAM PRODUCT FOR THE SAME

    公开(公告)号:CA2738466A1

    公开(公告)日:2010-06-03

    申请号:CA2738466

    申请日:2009-11-20

    Applicant: IBM

    Abstract: A client computer includes an encryption/decryption unit for encrypting a confidential file in which an encryption key ID is embedded using an encryption key corresponding to the encryption key ID and decrypting the confidential file using a decryption key corresponding to the encryption key ID, an encryption key storage unit for storing the encryption key, a decryption key storage unit for storing the decryption key, a compliance requirement storage unit for storing security compliance requirements for the client computer transmitted from a server computer, and a security requirement monitoring unit for determining, according to a read command or a write command for the confidential file issued by application software, whether the client computer complies with the security compliance requirements, and, when the requirements are complied with, passing the encryption key and the encryption key ID corresponding to the encryption key from the encryption key storage unit to the encryption/decryption unit in response to the write command or passing the decryption key corresponding to the encryption key ID embedded in the encrypted confidential file from the decryption key storage unit to the encryption/decryption unit in response to the read command.

Patent Agency Ranking