-
公开(公告)号:GB2514158A
公开(公告)日:2014-11-19
申请号:GB201308786
申请日:2013-05-16
Applicant: IBM
Inventor: LANG JAKOB , MENCIAS ANGEL NUNEZ , OLMOS VICTOR RAFAEL ESCOBAR , LIBAL TOMAS , ROMANOWSKI FABIAN , STERBLING SVEN
Abstract: An apparatus 10 for remotely awakening an electronic device comprises power supply means 12 to supply external power; a receiver 38, 14 for an electromagnetic signal; a capacitor 18 connected to said receiver; a switching circuit 20 connected to said capacitor and a controller 22, being part of said electronic device, connected to receive power from said switching circuit and to provide a keep awake signal 24 to said switching circuit. Said switching circuit comprises connection means to connect said controller with said capacitor when said capacitor is loaded with a predefined amount of power via said receiver as well as switching means 40 responsive to said keep awake signal to disconnect said controller from said capacitor and to connect said controller with said power supply means afterwards. Herein said controller performs an initialization phase in response to first receiving power and enables said keep awake signal after completing said initialization phase.
-
公开(公告)号:GB2508838A
公开(公告)日:2014-06-18
申请号:GB201222330
申请日:2012-12-12
Applicant: IBM
Inventor: MENCIAS ANGEL NUNEZ , LANG JAKOB , STERBLING SVEN , LIBAL TOMAS , ROMANOWSKI FABIAN , OLMOS VICTOR RAFAEL ESCOBAR
IPC: G06Q30/06
Abstract: Approving a group purchase request for a group of articles, by selecting a sub-group of articles, wherein a unique article approval index is asÂsigned to each of the articles and a highest article approval index is deÂtermined. An article is selected into the sub-group following at least one article selection criteria: the unique article approval index is above a predetermined approval index threshold and equal to the highest article approval index. The group purchase request is approved for the group if the group purchase request for the subÂgroup is approved; and rejected if the group purchase request for the sub-group is rejected. Approval steps may require particular agreement from for example a manager or director within the procurement hierarchy, as part of the workflow. Similarities between articles and alternative additional articles may be considered, using a ratio of shared attributes.
-
公开(公告)号:GB2520051A
公开(公告)日:2015-05-13
申请号:GB201319709
申请日:2013-11-08
Applicant: IBM
Inventor: LANG JAKOB , AXNIX CHRISTINE
Abstract: An entitlement system and method are provided. The entitlement system comprises at least two computing devices 142,144, and a management controller 140, which each comprising a trusted platform module 108,116,126. The trusted platform modules each comprise a nonÂvolatile storage 104,132,134 for storing entitlement records. A management unit 114,124 of each computing device comprises configuration means 118,128 to enable and disable computing resources 120,130 of the respective computing device based on entitlement records. The management controller 140 receives ensemble entitlement records 104 in a first encrypted form and distributes sub-entitlement records 132,134 in a second encrypted form to the management units 114,124 of the computing devices. The resources 120,130 of the computing devices are enabled and disabled based on the sub-entitlement records 132,134, thus providing a dynamic configuration change of the computing devices.
-
公开(公告)号:GB2508645A
公开(公告)日:2014-06-11
申请号:GB201222051
申请日:2012-12-07
Applicant: IBM
Inventor: MENCIAS ANGEL NUNEZ , OLMOS VICTOR RAFAEL ESCOBAR , LANG JAKOB , STERBLING SVEN , LIBAL TOMAS , ROMANOWSKI FABIAN
Abstract: A software license management system for computer applications runs in a peer-to-peer network. At least one server acts as a provider and at least one server acts as a user but each server 201 comprises the same means. The means are suitable for carrying out a method, implemented as a computer program, for the control of program installations according to respective license regulations. Executable programs are distributed to requesting servers from storage means, preferably from an update file server 205. A metafile, comprising license information on licensing conditions for a corresponding executable program code, is generated and stored, preferably on a licence server 204, and dispatched. A request 202 for transmission of a metafile for a corresponding executable program code is sent, a metafile is downloaded 203 and stored and the executable program code is downloaded, installed and executed under control of software license management system.
-
公开(公告)号:GB2531248A
公开(公告)日:2016-04-20
申请号:GB201417784
申请日:2014-10-08
Applicant: IBM
Inventor: MENCIAS ANGEL NUNEZ , LANG JAKOB , GEISERT FRANZISKA , LATTERMANN MAREIKE , BUENDGEN REINHARD , BOENISCH VOLKER
Abstract: Disclosed is a method of using a hardware security module 10 that can be connected to computer systems 212, 213. The computer systems being connectable to a server 12 within a common network 14. The hardware security module has a volatile memory 20, and a persistent or non-volatile memory 22, with a network address 18 of the server, an encrypted secret entity 32 and a private key 30. The server has a wrapping key 24 and a public key 26. When the hardware security module is connected to one of the computer systems, a secure connection 16 is established between the module and the server, the wrapping key is then retrieved, via the secure connection, from the server and stored in the volatile memory of the module. The key is then used to decrypt the encrypted secret entity and the decrypted secret entity 28 is stored in the volatile memory of the module. Also disclosed is a method of initialising a server and a connected hardware security module by encrypting and storing the secret entity in the persistent memory of the module.
-
公开(公告)号:GB2528441A
公开(公告)日:2016-01-27
申请号:GB201412861
申请日:2014-07-21
Applicant: IBM
Inventor: TRUMPP RENE , LANG JAKOB , MAIER ANDREAS R , MENCIAS ANGEL NUNEZ
Abstract: A computer system comprises a number of machines, each running its own operating system. The machines may be virtual machines or may be physical machines in a multiprocessor system. A first machine is a client system 10, which does not have its own network stack. Second 12 and third 14 machines are communication bridges, each of which has its own network stack 20, 22. One bridge is a master 26 and the other is a slave 28. The client sends outgoing data to the master and slave bridges. The master bridge then sends the data to a network with its stack. The network sends data to the master and slave bridges via their stacks. The master then sends the data to the client. Then master and slave exchange status information. If the slave does not receive information from the master, it becomes the master.
-
公开(公告)号:GB2520712A
公开(公告)日:2015-06-03
申请号:GB201321009
申请日:2013-11-28
Applicant: IBM
Inventor: SCHWEFLINGHAUS JOCHEN , LANG JAKOB , MENCIAS ANGEL NUNEZ , OLMOS VICTOR RAFAEL ESCOBAR , SCHIRMER ALBERT
IPC: G06F11/07
Abstract: During memory setup, computer memory is divided into primary 8 and secondary 9 sections, the primary section comprising first and second areas. Before a crash, first area 81 contains an Operating System (OS) and second area 84 contains an emergency OS and a dump program. The emergency OS and dump program are transferred from the second to the first area after the crash. The OS is operable before the crash and the emergency OS and dump program are operable after the crash. The secondary section is only indirectly controlled by the OS (widely out of its control). The first area contains a first SMSMP (Secondary Memory Section Management Program) which transfers first file system data 82 from the primary section to the secondary section before a crash. The second area contains a second SMSMP which directs read access of the dump program to the secondary section after a crash, in order to select second file system data 83 to be dumped using error data for the selection, e.g. an error code. The second SMSMP directs transfer of the emergency OS, dump program and second SMSMP code from the second to the first area.
-
公开(公告)号:GB2512060A
公开(公告)日:2014-09-24
申请号:GB201304912
申请日:2013-03-18
Applicant: IBM
Inventor: POHL THOMAS , BOLTE DIRK , TROESTER MARTIN , LANG JAKOB , KRAEMER MARCO , MENCIAS ANGEL NUNEZ
Abstract: A hypervisor uses a disc image emulator 22 to manage a disc image for a virtual machine 20. The emulator provides a first image 26, which is written to by the virtual machine, and a second image 28, which permanently stores the data. A cleaning process 24 copies blocks from the first image to the second image and unused blocks are deleted from the images. The process uses knowledge of the file system metadata on the disc images to determine which blocks are not being used. When the files are copied, the blocks still in use are copied into an allocation area. Once all the blocks that are in use have been copied, the rest of the allocation area may be freed. The copying may be carried out as an asynchronous background process at the hypervisor level.
-
公开(公告)号:GB2529204A
公开(公告)日:2016-02-17
申请号:GB201414347
申请日:2014-08-13
Applicant: IBM
Inventor: TROESTER MARTIN , POHL THOMAS , MENCIAS ANGEL NUNEZ , LANG JAKOB
Abstract: The invention relates to a method for suspending multiple virtual machines (10, 14) executed simultaneously by at least one hypervisor (20, 22) in at least one data processing system (210, 211). A control instance (30) sends a request to the hypervisor (20, 22) to suspend the virtual machines (10, 14) at a given future first point in time. In response to receiving a request to suspend the virtual machines (10, 14) the hypervisor (20, 22) determines if its virtual machines (10, 14) can be suspended and, if possible, stores and returns a suspend handle (32, 34) to the control instance, otherwise it returns an invalid handle. When receiving a suspend handle (32, 34) from the hypervisor (20, 22), the control instance (30) sends a suspend command to the hypervisor (20, 22), wherein the respective suspend handle (32, 34) is provided to the corresponding hypervisor (20, 22). In response to receiving a suspend command with a suspend handle (32, 34) from the control instance (30), the hypervisor (20, 22) determines if the received suspend handle (32, 34) is equal to its stored handle and, if that is the case, suspending its virtual machines (10, 11) at the first point in time. The invention further relates to a data processing system (210) for execution of a data processing program comprising software code portions for performing the method.
-
公开(公告)号:GB2508344A
公开(公告)日:2014-06-04
申请号:GB201221368
申请日:2012-11-28
Applicant: IBM
Inventor: SCHWEFLINGHAUS JOCHEN , MENCIAS ANGEL NUNEZ , SCHIRMER ALBERT , LANG JAKOB , HOLZHEU MICHAEL , BUENDGEN REINHARD , SCHWIDEFSKY MARTIN
Abstract: A method for creating an operating system dump comprises dividing a main memory of a computer system into at least three contiguous memory areas 102, comprising a primary memory area, a secondary memory area and a data memory area. Also comprises booting a first instance of an OS (operating system) into the main memory 104, loading a second instance of the OS into the secondary memory 106 area using the active first instance of the OS, stopping execution of the first active instance of the OS 108 if a critical execution error occurs and re-starting the computer using the loaded, second instance of the OS 110 which becomes the active instance of the OS. Method further comprises creating a dump of the primary memory area 112, and loading a third instance of the OS into the primary memory area 114. Thus the secondary instance continues regular operation of the primary instance, while dumping the crashed primary instance so it may be possible to minimize downtime after a crash.
-
-
-
-
-
-
-
-
-