Patent application number | Description | Published |
20090217389 | HARDWARE PASSWORD ALIGNMENT SYSTEM APPARATUS AND METHODS - A system, apparatus, and methods are disclosed for aligning a stored scancode sequence that corresponds to a hardware password, with a password input device type such as a current keyboard type. Aligning the stored scancode sequence with the password input device type enables successful validation of a hardware password despite a change in a password input device type or inadvertent corruption of a non-volatile memory used for storing the scancode sequence such as non-volatile memory that stores BIOS information for a computing device. | 08-27-2009 |
20100057440 | MULTI-LANGUAGE SUPPORT IN PREBOOT ENVIRONMENT - Systems and methods for providing multi-language support in a pre-boot environment are supplied. User interface type information, such as keyboard type information and translation tables, are ascertained and provided to the pre-boot environment of the apparatus, allowing the apparatus to properly receive and/or translate multi-language inputs in an appropriate fashion. | 03-04-2010 |
20100162373 | MANAGEMENT OF HARDWARE PASSWORDS - In the context of computer systems, the generation of preboot passwords at a server instead of at a client. Preferably, preboot passwords generated at the server are distributed to the client, and a process is offered whereby a user can establish his/her own proxy, not known to the server, that can be used to release the stored passwords to the client hardware. Since the passwords are generated at the server, management of the passwords is greatly facilitated since they are generated at the site where they are stored. This also makes it easy to implement management features such as a group policy, since the password generation software will be able to make logical connections between users and hardware. | 06-24-2010 |
20100217968 | Apparatus, System, and Method for Accurate Automated Scheduling of Computer Suspend and Resume - An apparatus, system, and method are disclosed for suspend-resume scheduling in conjunction with an operation requiring a suspend-resume cycle of a computer | 08-26-2010 |
Patent application number | Description | Published |
20080282077 | APPARATUS, METHOD AND PROGRAM PRODUCT FOR INITIATING COMPUTER SYSTEM OPERATION - A computer system which includes a CPU for performing various processes by program control and storage elements which store at least one operating system and a BIOS, wherein upon starting a system, the CPU recognizes the system's own hardware configuration, and starts a selected one operating system stored in the storage elements in accordance with the recognized hardware configuration under the control of the BIOS. | 11-13-2008 |
20100106952 | APPARATUS, METHOD AND PROGRAM PRODUCT FOR INITIATING COMPUTER SYSTEM OPERATION - A computer system which includes a CPU for performing various processes by program control and storage elements which store at least one operating system and a BIOS, wherein upon starting a system, the CPU recognizes the system's own hardware configuration, and starts a selected one operating system stored in the storage elements in accordance with the recognized hardware configuration under the control of the BIOS. | 04-29-2010 |
20110219225 | UTILIZATION OF THE SCREEN IMAGE INFORMATION OF A PRIMARY ENVIRONMENT FOR REPRODUCTION AND USER-INTERACTION IN A SECONDARY ENVIRONMENT - A method and apparatus is provided for switching between a primary computing environment and a secondary computing environment without changing the layout of a graphical user interface and a background display of the apparatus. A switching system switches operation between the primary computing environment and the secondary computing environment, switches a screen item between the primary computing environment and the secondary computing environment, and permits one of the primary and the secondary computing environments to go into a sleep state. | 09-08-2011 |
20120317424 | Switching between unsecure system software and secure system software - Unsecure system software and secure system software on the same computer system is switched between. A computer system includes one or more processors, which may not have any built-in security features, memory, and firmware. The memory stores secure system software and unsecure system software. In response to receiving a user signal, the firmware switches from the unsecure system software running on the processors to the secure system software running on the processors (and back again). While the unsecure system software is running, the secure system software is protected from tampering by the unsecure system software. | 12-13-2012 |
Patent application number | Description | Published |
20090144570 | SYSTEM AND METHOD FOR PREVENTING USER O.S. IN VMM SYSTEM FROM DEENERGIZING DEVICE BEING USED BY SERVICE O.S. - A call from a user operating system (UOS) to BIOS to configure a connected device into a reduced energy consumption mode is routed through a virtual machine monitor (VMM). The VMM determines whether a service O.S. (SOS) is in need of the device and if so the VMM informs the UOS that the device has been configured as ordered, while allowing the SOS to complete its task with the device. If the SOS is not in need of the device, or at the completion of the SOS task with the device, the VMM passes the call to ACPI/BIOS to configure the device in the demanded energy consumption mode. | 06-04-2009 |
20090249434 | APPARATUS, SYSTEM, AND METHOD FOR PRE-BOOT POLICY MODIFICATION - An apparatus, system, and method are disclosed for pre-boot policy modification. A key module exchanges a key with a server in a secure environment. A communication module receives a policy encoded with the key. A decode module decodes the encoded policy using the key and saves the policy setting prior to booting an operating system on the computer. An update module boots the computer using the policy. | 10-01-2009 |
20130179903 | COORDINATING POWER STATES IN A HYBRID INFORMATION HANDLING DEVICE - Systems, methods and products directed toward coordinating power states in a hybrid information handling device are described herein. One aspect includes a method including: providing a primary operating environment and a secondary operating environment in an information handling device; ascertaining a trigger event for switching between the primary operating environment and the secondary operating environment; providing power state transitioning responsive to the trigger event; and placing one of the primary operating environment and the secondary operating environment in a working state while one of the primary operating environment and the secondary operating environment is in a sleeping state. Other embodiments are described herein. | 07-11-2013 |
Patent application number | Description | Published |
20090187678 | METHODS AND ARRANGEMENTS FOR ACCESSING WIRELESSLY CONNECTED EXTERNAL STORAGE DEVICES - The invention provides a method for a portable electronic device such as a computer to be capable of safely coping with the occurrence of a surprise removal from an external hard disk drive (HDD) connected by wireless. An HDD is connected to a portable computer by wireless via a wireless extension device. First, a wireless communication path between the HDD and the portable computer is configured. Subsequently, a file is read and edited by accessing the HDD from the portable computer. Next, removal information indicating that the portable computer is away from the HDD is produced. The removal information can be produced by detecting an acceleration generated in the portable computer, or by directly detecting the distance by the strength of the wireless signal. Data under editing is saved before occurrence of surprise removal by ejecting the HDD in response to the production of the removal information. | 07-23-2009 |
20140317392 | OPERATING SYSTEM MANAGEMENT OF SECOND OPERATING SYSTEM - The present invention provides a method of easily managing two or more OSs. A host OS, a guest OS, and a virtualization module are loaded into a primary physical address area of a main memory. The guest OS is executed in a virtual environment in a primary physical address area. A memory image of the guest OS loaded in the primary physical address area is copied to a secondary physical address area. The right of access to a processor is transferred to the guest OS copied in the secondary physical address area to execute the guest OS in a physical environment. | 10-23-2014 |
20140337610 | ARRANGEMENT FOR SECURE INDEPENDENT OPERATING ENVIRONMENTS IN A COMPUTER - The present invention protects a memory image of an OS in a sleep state. A CPU executes a first OS or a second OS while switching there between. The first OS is loaded into a main memory, and the second OS is loaded into an auxiliary memory. The auxiliary memory may be connected to a chipset through a PCIe interface. The main memory and the auxiliary memory are configured such that, when one is in an active state where the right of access to the CPU is obtained, the other makes a transition to the sleep state where there is no right of access to the CPU while maintaining the memory image. In order to prevent one OS in the active state from accessing the main memory or the auxiliary memory in which the memory image of the other OS in the sleep state is stored, the BIOS may set a corresponding controller to disabled during a POST. | 11-13-2014 |