Patent application number | Description | Published |
20080252256 | Multi-battery charging system and method - A multi-battery charging system comprises a computing device having a controller configured to control a plurality of power regulators, each of the plurality of power regulators for regulating charging power to a respective battery, at least one of the power regulators disposed external to the computing device. | 10-16-2008 |
20090144530 | Operating environment configuration system and method - An operating environment configuration system comprises a first operating system of a computer device having at least one configuration setting associated therewith, and a second operating system of the computer device configured to automatically retrieve the at least one configuration setting and configure at least one component associated with the second operating system with the at least one configuration setting. | 06-04-2009 |
20100268928 | DISABLING A FEATURE THAT PREVENTS ACCESS TO PERSISTENT SECONDARY STORAGE - During a boot block part of a boot procedure in an electronic device having a persistent secondary storage, a feature that prevents access to the persistent secondary storage is disabled. The persistent secondary storage is accessed during the boot block part of the boot procedure to retrieve information to perform a predetermined task. | 10-21-2010 |
20110066839 | System And Method For Providing A System Management Command - Exemplary embodiments of the present invention disclosed herein relate to a method of providing a system management command. The method comprises receiving from an authorized requestor information identifying the electronic device and a request to issue a system management command to the electronic device. The method additionally comprises providing, in response to the request, a system management command, information identifying a source of the command as a trusted source and the information identifying the electronic device. Also disclosed are an electronic device and a computer system according to the invention. | 03-17-2011 |
20110077878 | POWER SUPPLY WITH DATA COMMUNICATIONS - Apparatus and methods are provided for use with smart utility grids. A smart power supply includes power metering to determine instantaneous and cumulative energy consumption of the power supply and a computer coupled thereto. Communications transceivers enable the smart power supply to communicate with both the computer and smart entities of a smart utility grid. A user of the computer can view energy consumption data, utility rates, utility loading and other energy-related information by way of the smart power supply. | 03-31-2011 |
20110081015 | Encryption System And Method - An encryption system can include a first port and a second port. A format translator can be coupled to the first port and the second port to translate a first header format of data received from the first port to a second header format of the second port. The format translator can translate the second header format of data received from the second port to the first header format. An encryptor can receive the data and encrypts the data received from the first port and decrypts the data received from the second port. | 04-07-2011 |
20120066499 | SYSTEM AND METHOD FOR PERFORMING A MANAGEMENT OPERATION - There is provided a system and method of performing a management operation. An exemplary method comprises receiving a command that comprises information derived from a private key in response to a request to generate the command for an electronic device. The exemplary method also comprises verifying a source of the command using the information derived from the private key and a corresponding public key stored in an immutable memory of the electronic device. The exemplary method additionally comprises performing a management operation corresponding to the command if the verifying of the source of the command determines that the command is from an authorized source. | 03-15-2012 |
20130042321 | SECURITY SYSTEMS AND METHODS - Security methods are provided. The method can include comparing a first device identifier ( | 02-14-2013 |