Remotely awakening an electronic device

    公开(公告)号:GB2514158A

    公开(公告)日:2014-11-19

    申请号:GB201308786

    申请日:2013-05-16

    Applicant: IBM

    Abstract: An apparatus 10 for remotely awakening an electronic device comprises power supply means 12 to supply external power; a receiver 38, 14 for an electromagnetic signal; a capacitor 18 connected to said receiver; a switching circuit 20 connected to said capacitor and a controller 22, being part of said electronic device, connected to receive power from said switching circuit and to provide a keep awake signal 24 to said switching circuit. Said switching circuit comprises connection means to connect said controller with said capacitor when said capacitor is loaded with a predefined amount of power via said receiver as well as switching means 40 responsive to said keep awake signal to disconnect said controller from said capacitor and to connect said controller with said power supply means afterwards. Herein said controller performs an initialization phase in response to first receiving power and enables said keep awake signal after completing said initialization phase.

    Purchase request approvals for groups of articles

    公开(公告)号:GB2508838A

    公开(公告)日:2014-06-18

    申请号:GB201222330

    申请日:2012-12-12

    Applicant: IBM

    Abstract: Approving a group purchase request for a group of articles, by selecting a sub-group of articles, wherein a unique article approval index is as­signed to each of the articles and a highest article approval index is de­termined. An article is selected into the sub-group following at least one article selection criteria: the unique article approval index is above a predetermined approval index threshold and equal to the highest article approval index. The group purchase request is approved for the group if the group purchase request for the sub­group is approved; and rejected if the group purchase request for the sub-group is rejected. Approval steps may require particular agreement from for example a manager or director within the procurement hierarchy, as part of the workflow. Similarities between articles and alternative additional articles may be considered, using a ratio of shared attributes.

    Entitlement system and method for resources in a multi-computer system controlled by a single instance

    公开(公告)号:GB2520051A

    公开(公告)日:2015-05-13

    申请号:GB201319709

    申请日:2013-11-08

    Applicant: IBM

    Abstract: An entitlement system and method are provided. The entitlement system comprises at least two computing devices 142,144, and a management controller 140, which each comprising a trusted platform module 108,116,126. The trusted platform modules each comprise a non­volatile storage 104,132,134 for storing entitlement records. A management unit 114,124 of each computing device comprises configuration means 118,128 to enable and disable computing resources 120,130 of the respective computing device based on entitlement records. The management controller 140 receives ensemble entitlement records 104 in a first encrypted form and distributes sub-entitlement records 132,134 in a second encrypted form to the management units 114,124 of the computing devices. The resources 120,130 of the computing devices are enabled and disabled based on the sub-entitlement records 132,134, thus providing a dynamic configuration change of the computing devices.

    Software licence management in a peer-to-peer network

    公开(公告)号:GB2508645A

    公开(公告)日:2014-06-11

    申请号:GB201222051

    申请日:2012-12-07

    Applicant: IBM

    Abstract: A software license management system for computer applications runs in a peer-to-peer network. At least one server acts as a provider and at least one server acts as a user but each server 201 comprises the same means. The means are suitable for carrying out a method, implemented as a computer program, for the control of program installations according to respective license regulations. Executable programs are distributed to requesting servers from storage means, preferably from an update file server 205. A metafile, comprising license information on licensing conditions for a corresponding executable program code, is generated and stored, preferably on a licence server 204, and dispatched. A request 202 for transmission of a metafile for a corresponding executable program code is sent, a metafile is downloaded 203 and stored and the executable program code is downloaded, installed and executed under control of software license management system.

    Controlled use of a hardware security module

    公开(公告)号:GB2531248A

    公开(公告)日:2016-04-20

    申请号:GB201417784

    申请日:2014-10-08

    Applicant: IBM

    Abstract: Disclosed is a method of using a hardware security module 10 that can be connected to computer systems 212, 213. The computer systems being connectable to a server 12 within a common network 14. The hardware security module has a volatile memory 20, and a persistent or non-volatile memory 22, with a network address 18 of the server, an encrypted secret entity 32 and a private key 30. The server has a wrapping key 24 and a public key 26. When the hardware security module is connected to one of the computer systems, a secure connection 16 is established between the module and the server, the wrapping key is then retrieved, via the secure connection, from the server and stored in the volatile memory of the module. The key is then used to decrypt the encrypted secret entity and the decrypted secret entity 28 is stored in the volatile memory of the module. Also disclosed is a method of initialising a server and a connected hardware security module by encrypting and storing the secret entity in the persistent memory of the module.

    Routing communication between computing platforms

    公开(公告)号:GB2528441A

    公开(公告)日:2016-01-27

    申请号:GB201412861

    申请日:2014-07-21

    Applicant: IBM

    Abstract: A computer system comprises a number of machines, each running its own operating system. The machines may be virtual machines or may be physical machines in a multiprocessor system. A first machine is a client system 10, which does not have its own network stack. Second 12 and third 14 machines are communication bridges, each of which has its own network stack 20, 22. One bridge is a master 26 and the other is a slave 28. The client sends outgoing data to the master and slave bridges. The master bridge then sends the data to a network with its stack. The network sends data to the master and slave bridges via their stacks. The master then sends the data to the client. Then master and slave exchange status information. If the slave does not receive information from the master, it becomes the master.

    Data dump method for a memory in a data processing system

    公开(公告)号:GB2520712A

    公开(公告)日:2015-06-03

    申请号:GB201321009

    申请日:2013-11-28

    Applicant: IBM

    Abstract: During memory setup, computer memory is divided into primary 8 and secondary 9 sections, the primary section comprising first and second areas. Before a crash, first area 81 contains an Operating System (OS) and second area 84 contains an emergency OS and a dump program. The emergency OS and dump program are transferred from the second to the first area after the crash. The OS is operable before the crash and the emergency OS and dump program are operable after the crash. The secondary section is only indirectly controlled by the OS (widely out of its control). The first area contains a first SMSMP (Secondary Memory Section Management Program) which transfers first file system data 82 from the primary section to the secondary section before a crash. The second area contains a second SMSMP which directs read access of the dump program to the secondary section after a crash, in order to select second file system data 83 to be dumped using error data for the selection, e.g. an error code. The second SMSMP directs transfer of the emergency OS, dump program and second SMSMP code from the second to the first area.

    Virtual machine image disk usage
    8.
    发明专利

    公开(公告)号:GB2512060A

    公开(公告)日:2014-09-24

    申请号:GB201304912

    申请日:2013-03-18

    Applicant: IBM

    Abstract: A hypervisor uses a disc image emulator 22 to manage a disc image for a virtual machine 20. The emulator provides a first image 26, which is written to by the virtual machine, and a second image 28, which permanently stores the data. A cleaning process 24 copies blocks from the first image to the second image and unused blocks are deleted from the images. The process uses knowledge of the file system metadata on the disc images to determine which blocks are not being used. When the files are copied, the blocks still in use are copied into an allocation area. Once all the blocks that are in use have been copied, the rest of the allocation area may be freed. The copying may be carried out as an asynchronous background process at the hypervisor level.

    Suspending and resuming virtual machines

    公开(公告)号:GB2529204A

    公开(公告)日:2016-02-17

    申请号:GB201414347

    申请日:2014-08-13

    Applicant: IBM

    Abstract: The invention relates to a method for suspending multiple virtual machines (10, 14) executed simultaneously by at least one hypervisor (20, 22) in at least one data processing system (210, 211). A control instance (30) sends a request to the hypervisor (20, 22) to suspend the virtual machines (10, 14) at a given future first point in time. In response to receiving a request to suspend the virtual machines (10, 14) the hypervisor (20, 22) determines if its virtual machines (10, 14) can be suspended and, if possible, stores and returns a suspend handle (32, 34) to the control instance, otherwise it returns an invalid handle. When receiving a suspend handle (32, 34) from the hypervisor (20, 22), the control instance (30) sends a suspend command to the hypervisor (20, 22), wherein the respective suspend handle (32, 34) is provided to the corresponding hypervisor (20, 22). In response to receiving a suspend command with a suspend handle (32, 34) from the control instance (30), the hypervisor (20, 22) determines if the received suspend handle (32, 34) is equal to its stored handle and, if that is the case, suspending its virtual machines (10, 11) at the first point in time. The invention further relates to a data processing system (210) for execution of a data processing program comprising software code portions for performing the method.

    Creating an operating system dump
    10.
    发明专利

    公开(公告)号:GB2508344A

    公开(公告)日:2014-06-04

    申请号:GB201221368

    申请日:2012-11-28

    Applicant: IBM

    Abstract: A method for creating an operating system dump comprises dividing a main memory of a computer system into at least three contiguous memory areas 102, comprising a primary memory area, a secondary memory area and a data memory area. Also comprises booting a first instance of an OS (operating system) into the main memory 104, loading a second instance of the OS into the secondary memory 106 area using the active first instance of the OS, stopping execution of the first active instance of the OS 108 if a critical execution error occurs and re-starting the computer using the loaded, second instance of the OS 110 which becomes the active instance of the OS. Method further comprises creating a dump of the primary memory area 112, and loading a third instance of the OS into the primary memory area 114. Thus the secondary instance continues regular operation of the primary instance, while dumping the crashed primary instance so it may be possible to minimize downtime after a crash.

Patent Agency Ranking