Patent application number | Description | Published |
20100082961 | Apparatus and method to harden computer system - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 04-01-2010 |
20100083365 | Apparatus and method to harden computer system - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 04-01-2010 |
20120159652 | APPARATUS AND METHOD TO HARDEN COMPUTER SYSTEM - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 06-21-2012 |
20140344961 | APPARATUS AND METHOD TO HARDEN COMPUTER SYSTEM - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 11-20-2014 |
Patent application number | Description | Published |
20130342173 | CHARGING A BATTERY - A method and system for applying a multi-rate charge to a battery are included herein. The method includes detecting a plurality of predetermined electrical measurements and a plurality of predetermined charge currents. The method also includes detecting an electrical measurement of the battery. Additionally, the method includes selecting a charge current from the plurality of predetermined charge currents to be applied to the battery based on the electrical measurement of the battery and the plurality of predetermined electrical measurements. Furthermore, the method includes applying the charge current to the battery. The method also includes detecting a plurality of subsequent electrical measurements of the battery. In addition, the method includes applying a plurality of subsequent charge currents to the battery based on the plurality of subsequent electrical measurements of the battery and the plurality of predetermined charge currents. | 12-26-2013 |
20140013136 | POWER EFFICIENT LOCATION NOTIFICATION - Before a device enters a power saving mode, a location-aware application in the device may provide at least one wake trigger (and a trigger limit) to a low power monitoring module (LPMM). In power saving mode, the LPMM receives device locations from a location service module and may determine when the device location corresponds to the at least one wake trigger or trigger limit. In one embodiment, device location may only be provided to the LPMM based on a condition (e.g., timer expiration or reaching a displacement threshold as measured by sensors in the device). When device location corresponds to the trigger limit, the LPMM may notify the device (e.g., cause a transition to an active power mode) so that the location-aware application can redetermine the at least one wake trigger. The device location corresponding to the at least wake trigger may also cause the LPMM to notify the device. | 01-09-2014 |
20140032327 | COMMUNICATION SYSTEM INCLUDING DIGITAL SIGNAGE AND RELATED MOBILE CONTENT - A system may include a signage controller configured to control digital signage (e.g., at least one digital display). In one embodiment, the signage controller may collect and compile demographic information and feedback from mobile devices via close-proximity or short-range communication prior to providing it to cloud resources. The cloud resources may then determine content and mobile content based on the demographic information and feedback. At least the content may be provided to the signage controller, which may cause the digital signage to display some of the content (e.g., at least one advertisement). The mobile content may be pushed to the mobile devices, and may cause the mobile devices to display information and/or provide functionality related to the displayed content. In one embodiment, statistics (e.g., at least one of offer availability or offer acceptance statistics corresponding to the at least one advertisement) may also be displayed on the digital signage. | 01-30-2014 |
20140046784 | METHOD AND SYSTEM FOR MANAGING MULTIPLE ELECTRONIC USER WALLET DATA CARDS - A method and device for managing and storing a plurality of electronic gift cards for use during a payment transaction includes receiving electronic information corresponding to a plurality of gift cards and securely storing the information in storage of a smartcard device as electronic gift cards. The smartcard device may monitor for a request to selectively activate an electronic gift card of the plurality of electronic gift cards for use during a payment transaction. The smartcard device may receive and transmit information corresponding to a selected electronic gift card using a near-field communication (NFC) data exchange. | 02-13-2014 |
20140184163 | BATTERY CHARGE MANAGEMENT FOR ELECTRONIC DEVICE - In one embodiment a method comprises receiving, in the controller, a user profile for usage of an electronic device, the electronic device at least partially powered by a battery and implementing, in the controller, a selected charge routine from a plurality of charge routines for the battery based at least in part on the user profile. Other embodiments may be described. | 07-03-2014 |
20140222578 | DIGITAL SIGNAGE MANAGEMENT SYSTEM - Generally, this disclosure describes a digital signage management system. The system may include a user device including processor circuitry coupled to communication circuitry, the communication circuitry configured to couple the user device to at least one of a digital sign and a management service, and the user device configured to manage display of user content on the digital sign, the user content configured to be displayed on the digital sign in a time slot. | 08-07-2014 |
20150024680 | PROXIMATE COMMUNICATION WITH A TARGET DEVICE - Systems and methods may use proximate communication to retrieve information pertaining to a target device. In one example, the method may include detecting the target device within a vicinity of a user device, receiving an information request response communication including information pertaining to the target device, and receiving an operation request response communication including information pertaining to a perforated operation. | 01-22-2015 |
20150304768 | AUDIO PROCESSING DURING LOW-POWER OPERATION - A system may configure at least a low power engine (LPE) and network interface circuitry when transitioning from an active state to a low-power state. The network interface circuitry may be configured to receive information from a network and to store any received information containing audio information into a memory location. The LPE may be configured to monitor the memory location, to retrieve the stored information from the memory location, to generate audio information based on the stored information and to provide the audio information to audio circuitry for playback. It is also possible for the LPE to receive audio information from the audio circuitry, to generate information for transmission based on the audio information and to store the information into a second memory location. The network interface circuitry may then retrieve the stored information from the second memory location and transmit the information to the network. | 10-22-2015 |