Patent application number | Description | Published |
20080252256 | Multi-battery charging system and method - A multi-battery charging system comprises a computing device having a controller configured to control a plurality of power regulators, each of the plurality of power regulators for regulating charging power to a respective battery, at least one of the power regulators disposed external to the computing device. | 10-16-2008 |
20080256363 | Trusted component update system and method - A trusted component update system comprises verify logic configured to validate integrity of an update to a trusted component of a computing device, and logic disposed in the trusted component and configured to validate integrity of the verify logic. | 10-16-2008 |
20080267457 | Electronic device with biometric module - An electronic device comprises a biometric module having a contact-based sensor configured to capture a biometric image, the biometric module configured to discharge electrostatic energy from a user of the biometric module before activating the sensor. | 10-30-2008 |
20090037715 | Fingerprint reader resetting system and method - A fingerprint reader resetting method comprising enabling an electronic device to accept a reset command for a fingerprint reader in response to a physical presence state being set to unlocked during initialization of an electronic device to reset a state of the fingerprint reader. | 02-05-2009 |
20100180338 | Multi-Domain Computer Password Management - A computer system has first and second password-protectable domains. The first domain has a multi-domain password manager for determining whether a password candidate is valid for both the first domain and the second domain. If so, the password manager submits the password candidate to the second domain. | 07-15-2010 |
20100268928 | DISABLING A FEATURE THAT PREVENTS ACCESS TO PERSISTENT SECONDARY STORAGE - During a boot block part of a boot procedure in an electronic device having a persistent secondary storage, a feature that prevents access to the persistent secondary storage is disabled. The persistent secondary storage is accessed during the boot block part of the boot procedure to retrieve information to perform a predetermined task. | 10-21-2010 |
20110066839 | System And Method For Providing A System Management Command - Exemplary embodiments of the present invention disclosed herein relate to a method of providing a system management command. The method comprises receiving from an authorized requestor information identifying the electronic device and a request to issue a system management command to the electronic device. The method additionally comprises providing, in response to the request, a system management command, information identifying a source of the command as a trusted source and the information identifying the electronic device. Also disclosed are an electronic device and a computer system according to the invention. | 03-17-2011 |
20110081015 | Encryption System And Method - An encryption system can include a first port and a second port. A format translator can be coupled to the first port and the second port to translate a first header format of data received from the first port to a second header format of the second port. The format translator can translate the second header format of data received from the second port to the first header format. An encryptor can receive the data and encrypts the data received from the first port and decrypts the data received from the second port. | 04-07-2011 |
20110126023 | Systems And Methods For Data Security - A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user. | 05-26-2011 |
20110131420 | COMPUTING ENTITIES, PLATFORMS AND METHODS OPERABLE TO PERFORM OPERATIONS SELECTIVELY USING DIFFERENT CRYPTOGRAPHIC ALGORITHMS - Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms and associated parameters, the entity being programmed to record mode of operation information, which is characterised by the algorithms and associated parameters that are selected to perform an operation. | 06-02-2011 |
20120023303 | STORAGE DEVICE ERASE COMMAND HAVING A CONTROL FIELD CONTROLLABLE BY A REQUESTOR DEVICE - A storage device includes storage media and a controller to control access of the storage media. The controller receives an erase command used to specify an erase operation of at least one portion of the storage media. The erase command has a control field controllable by a requestor device that submitted the erase command to the storage device, where the control field has one or more portions settable to cause the storage device to perform one or more of: reporting a progress of the erase operation, and modifying an operational state of the erase operation. | 01-26-2012 |
20120066499 | SYSTEM AND METHOD FOR PERFORMING A MANAGEMENT OPERATION - There is provided a system and method of performing a management operation. An exemplary method comprises receiving a command that comprises information derived from a private key in response to a request to generate the command for an electronic device. The exemplary method also comprises verifying a source of the command using the information derived from the private key and a corresponding public key stored in an immutable memory of the electronic device. The exemplary method additionally comprises performing a management operation corresponding to the command if the verifying of the source of the command determines that the command is from an authorized source. | 03-15-2012 |
20130024638 | STORAGE DEVICE IN A LOCKED STATE - A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to detecting the storage device decoupling from the device, and configuring the storage device to remain in the locked state if the storage device is re-coupled to the device after the lock timing has elapsed. | 01-24-2013 |
20130042321 | SECURITY SYSTEMS AND METHODS - Security methods are provided. The method can include comparing a first device identifier ( | 02-14-2013 |
20130160013 | USER MANAGEMENT FRAMEWORK FOR MULTIPLE ENVIRONMENTS ON A COMPUTING DEVICE - An environment manager in a computer executes multiple environments concurrently. A user management framework (UMF) virtual machine an the computer runs an authentication domain that supports user profile management of the multiple environments. | 06-20-2013 |
20130166869 | UNLOCK A STORAGE DEVICE - Unlocking a storage device including identifying a platform configuration register value in response to a computing machine powering on, configuring a security component to seal an authorization based on the platform configuration register value and storing a sealed authorization onto non-volatile memory, and unlocking the storage device in response to the computing machine resuming from a sleep state and unsealing the sealed authorization with the security component from the non-volatile memory. | 06-27-2013 |
20140181500 | BIOS Network Access - Embodiments provide devices and operations which enable a computing device to access a network. The computing device may execute a basic input/output system (BIOS). In response to the BIOS, the computing device may establish a wireless link with a client device and receive, from the client device, network access information. | 06-26-2014 |
20140201743 | VIRTUALIZED DEVICE CONTROL IN COMPUTER SYSTEMS - Virtual device control in a computer system is described. Examples include: obtaining a device configuration policy from firmware in the computer system, the device configuration policy defining global access permissions to at least one embedded device in the computer system applied at boot time. Obtaining a virtual device configuration policy established for at least one of a selected user or a selected virtual machine (VM), the virtual device configuration policy defining additional access permissions to the at least one embedded device. Establishing a virtual hardware definition for an instance of the selected VM executing on the computer system based on the global access permissions and the additional access permissions. | 07-17-2014 |
20140281469 | PROVIDING A FUNCTION OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) IN A PRIVILEGED DOMAIN - A privileged domain includes a function of a Basic Input/Output System (BIOS). A request to access the function of the BIOS is routed to the privileged domain. | 09-18-2014 |
20140298003 | WEB-BASED INTERFACE TO ACCESS A FUNCTION OF A BASIC INPUT/OUTPUT SYSTEM - A web-based interface in an electronic device receives a request to access a function of a Basic Input/Output System. | 10-02-2014 |
20140310532 | UNLOCKING A STORAGE DEVICE - An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock the storage device during a procedure to transition the electronic device from the lower power state to a higher power state. The predetermined information is different from a credential for use in unlocking the storage device. | 10-16-2014 |
20140359259 | Communication with a Virtual Trusted Runtime BIOS - A computing system and a method of communicating with a virtual trusted runtime BIOS. The computing system can include hardware and a virtual machine monitor. A virtual trusted runtime BIOS can be managed by the virtual machine monitor. A communication channel can communicate with the virtual trusted runtime BIOS. The communication channel can be secured by a secure socket layer. | 12-04-2014 |
20150040130 | VIRTUAL HIGH PRIVILEGE MODE FOR A SYSTEM MANAGEMENT REQUEST - A computing system and a method of handling a system management request. The computing system includes a virtual high-privilege mode in a trusted domain managed by the virtual machine monitor. The virtual high-privilege mode handles the system management request. | 02-05-2015 |
20150074457 | RECEIVING AN UPDATE MODULE BY ACCESSING A NETWORK SITE - Fault of a particular module in an electronic device is detected. In response to detecting the fault, an update module is retrieved from a network site over a network to update the particular module, where the network stack is independent of a network stack associated with an operating system in the electronic device. | 03-12-2015 |