Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for auxiliary processing of information for a computer device. SOLUTION: By simplifying the managed power states to ON and Standby, the computer device preserves its execution context at initial setting, when a machine is powered down. Computer hardware and software are capable of responding immediately to network or communication activity, user input and other events. While the computer is in Standby, it is alert and able to handle background tasks that do not require user interaction. Activities such as answering phone calls, handling voice mail, displaying new electronic mail, record voice messages, browsing the Internet, recording TV shows and so forth, occur without the user having to turn on the computer. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a mechanism for cooling components of a personal computer. SOLUTION: This computer system attains silent cooling using a large-size heat sink. This technique dispenses with a conventional cooling fan which can make an extremely large noise. The heat sink forms a part of a chassis for storing a mother board and a hard drive of the computer. The mother board and the hard drive are mounted in the chassis, the heat is conducted from the microprocessor on the mother board and the hard drive to the heat sink and the heat sink radiates the heat to the ambient air. A shroud having a top part with an opening and the bottom part is disposed covering the chassis storing the mother board and the hard drive to improve the EMI (Electromagnetic Interference) shielding. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide an improved system and a method for using a file system to automatically backup a file in persistent storage. SOLUTION: A storage aggregator organizes nonvolatile memories for storing a back-up copy of a file to use them together. A file system filter driver accesses to a policy to receive a request for storing a file from application and determine whether a back-up copy of the file is prepared or not and which type of back-up is applied to the file. A generation file handler prepares and manages one set of generation files as a back-up copy of a specific application file. A restoration user interface for obtaining one or a plurality of back-up copies such as a set of generation files is provided to conduct an inspection for restoring any file copy having possibility that it is desired by the user by the user. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a network security system for protecting computing devices connected to a communication network from identified security threats. SOLUTION: A security service publishes security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information, when implemented by a network security module, comprises security measures for protecting the corresponding computer from an identified security threat to the computer. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a reliable discless network-bootable computer by using a local nonvolatile memory (NVM) cache. SOLUTION: The NVM cache 208 is used by this computer when a network is temporarily unavailable or slow. When the network state is improved later, synchronization is established between the cache 208 and a remote boot server 183 equipped with a remote storage volume 182. Whether data are stored in the NVM cache 208 or in the remote storage volume 182 is determined. The data transmitted to the remote storage volume 182 are written by an transaction, and when a network failure occurs, or when a transaction completion message is not received, the data are cached in the NVM cache 208. COPYRIGHT: (C)2004,JPO
Abstract:
A form of removable memory, such as a universal serial bus (USB) flash device, may enable a subscription-based computing system from any PC. The device may include an execution unit including a processor, a private memory including an encrypted application, a computing system interface, a cryptographic unit including a secure storage with a number of metering units, and a computer-readable medium. The computer-readable medium may include instructions for routing messages and data from the execution unit through the computing system interface to a connected computing system. Further, encrypted application data may be routed through the cryptographic unit to the execution unit to thereby transform the encrypted application into executable data for use by the computing system. Also, the device may decrement a number of metering units stored at the device during execution of the encrypted application by the computer.
Abstract:
A computer is adapted for use in different operating modes by configuring an output controller, such as a graphics processing unit, to screen output signals prior to presenting them to the output device. A secure environment in the output controller verifies a digital signature or a hash of the output signal to determine whether the output signal is compatible with the current mode of operation. Thus only authorized output signals are presented when the computer is operating in a limited function mode, such as when metered usage time is expired. The apparatus and method also disclose similar output signal screening for determining whether the computer should be returned from a standby, or no-metering, mode to an active, or metered mode.
Abstract:
PROBLEM TO BE SOLVED: To provide a more efficient persistent storage device.SOLUTION: One or more long-term storage media are integrated with a non-volatile memory. In one embodiment, a portion of the non-volatile memory is used as a write buffer and a read cache for writing and reading to long-term storage media. Interfaces are provided for controlling use of the non-volatile memory as the write buffer and the read cache. Additionally, a portion of the non-volatile memory is used to provide direct mapping for specified sectors of the long-term storage media. Descriptive data regarding a persistent storage device is stored in another portion of the non-volatile memory.
Abstract:
PROBLEM TO BE SOLVED: To enable network devices to resume network activities through a secure method when the network activities are generally blocked by a protective security means taken by a network security module. SOLUTION: When a security service is provided through a network security module 250, it is determined whether the network security module 250/network devices may receive a relaxed set of the security means of enabling the network devices to resume the network activities partly. When it is determined that the eased set of the security means can be received, the relaxed set of the security means are returned to the network security module 250 and implemented on the network security module 250. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for auxiliary display of information for a computer device. SOLUTION: An auxiliary display is integrated with a computer system to provide an area where notifications can be peripherally presented off-screen. Whenever a background task sends a notification to the main display of the system, the notification may be redirected to appear not on a main display but on the auxiliary display. A user may then glance at the notification appearing on the auxiliary display to be informed of the message without interrupting the current task onscreen. Any type of information may be presented on the auxiliary display including incoming communications, an alarm for a meeting, system alerts and information from Internet subscription services. COPYRIGHT: (C)2005,JPO&NCIPI