Abstract:
PROBLEM TO BE SOLVED: To execute firmware only in the way permitted by an owner in a mobile computing platform. SOLUTION: A system includes: a host processor 910 for performing a host operating system and a host application; firmware for booting the host processor 910 using one or more signing keys between boots, each signing key associated with a software image 921 loaded in the platform between the boots; and a security processor 931 of the platform bound with a secure memory store 920 that the firmware and other host processor 910 applications are unable to access, which manages the one or more signing keys and controls loading of images between the boots. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To securely perform remote provisioning. SOLUTION: Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server. After an association of the device identifier and the client device is authenticated, the client device may receive a boot image of an operating system from the function provision server. Other embodiments may be described and claimed. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To execute a task in a low power state in order to prevent any wasteful power from being generated.SOLUTION: A physical resource is virtualized concerning an operating environment and a service environment, and when a power saving mode is set, the physical resource passes the operating environment, and enters the service environment, and a first set formed of one or more physical resources is put in a low power consumption state, and a task is executed in the service environment by using a processor and a second set formed of one or more physical resources. The physical resource may be assigned to the operating environment when the operating environment is initialized, and the physical resource may be reassigned to the service environment used by the service environment while the other physical resources are put in the low power consumption state.
Abstract:
PROBLEM TO BE SOLVED: To enhance locality in a security co-processor module of a computer system.SOLUTION: Enhancing locality in a security co-processor module of a computing system may be achieved by including one or more additional attributes such as geographic location, trusted time, a hardware vendor string, and one or more environmental factors into an access control space for machine mode measurement of a computing system.
Abstract:
PROBLEM TO BE SOLVED: To achieve processing of a wake event in a firmware environment while a computing device is maintaining low power consumption state. SOLUTION: Method includes: a step of re-instantiating a firmware environment that includes one or more firmware functions available at pre-boot time when transitioning the computing device from a first high power consumption state to a second low power consumption state; a step of receiving a network event by the firmware while the computing device is the second low power consumption state; and a step where the firmware environment processes the network event without returning the entire computing device to the first high power consumption state independently of an operating system. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a methods and systems to display platform graphics during initialization of a computer, including functions to interrupt initialization of an operating system and to update a video frame buffer with platform graphics data when the initialization of the operating system is interrupted, and to merge graphics generated by operating system initialization logic with platform graphics data. SOLUTION: The methods and systems include virtualization methods and systems and system management mode methods and systems. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To respond an action such as an inter-processor interruption (IPI) in a system management mode in a multicore environment. SOLUTION: A first processor core is brought into the system management mode, out of the some processor cores, at least one out of the other processor cores different from the first processor core maintains an operation, and is not brought into the system management mode. Then, the first processor core responds to the inter-processor interruption, during the system management mode. A context of a system of the objective core is saved when receiving the IPI, and transfers control to an operation system (OS) handler 140 for the IPI. The context of the system is restored when finishing the OS IPI, and the control is returned to an SMI handler for further processing. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for effectively executing runtime integrity verification. SOLUTION: A processor-based system includes at least one processor, at least one memory coupled to the at least one processor, a code block, and a code which is executable by the processor-based system, The code causes the processor-based system to generate integrity information for the code block upon a restart of the processor-based system and securely stores the integrity information and verifies the integrity of the code block during a runtime of the processor-based system using the securely stored integrity information. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide wider capability which unites a device and a circumferential environment. SOLUTION: A method, a device and a system, in a computing apparatus, make periodically active a location operating system that detects a substantial change of location of the device, select a computing environment optimum to the changed location from a plurality of predetermined computing environments based on a change in device location, and alter power modes of one and more components of the device designated by selected computing environment. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
In a computing system having a processor package, an operating system, and a physical I/O device, a partial virtual machine is provided to instantiate a virtual I/O device corresponding to the physical I/O device, the virtual I/O device having a virtual I/O controller. The partial virtual machine includes an I/O port trap to capture an I/O request to the virtual I/O device by the operating system; an I/O controller emulator coupled to the I/O port trap to handle an I/O control request to the virtual I/O controller, when the I/O request comprises an I/O control request; an I/O device emulator coupled to the I/O port trap component to handle an I/O access request to communicate with the virtual I/O device, when the I/O request comprises an I/O access request; and a device driver coupled to the I/O controller emulator and the I/O device emulator to communicate with the physical I/O device based at least in part on the I/O control request and the I/O access request. The partial virtual machine executes within a secure enclave session within the processor package, improving security of I/O transactions by preventing access to the partial virtual machine by the operating system.