G06F21/81

SECURITY DEVICE TO PROTECT ACTIVE COMMUNICATION PORTS

The present disclosure pertains to systems and methods to monitor communication ports. In one embodiment, a system may include a first interface to connect to a first host device and a second interface to connect to a second host device. The first interface and the second interface may include a plurality of channels to enable communication between the first host device and the second host device. Control logic may monitor a power channel between the first host device and the second host device and a communication channel between the first host device and the second host device. The control logic may detect an interruption of at least one of the power channel or the communication channel. In response to the interruption, the control logic may disable communication between the first host device and the second host device.

SECURITY DEVICE TO PROTECT ACTIVE COMMUNICATION PORTS

The present disclosure pertains to systems and methods to monitor communication ports. In one embodiment, a system may include a first interface to connect to a first host device and a second interface to connect to a second host device. The first interface and the second interface may include a plurality of channels to enable communication between the first host device and the second host device. Control logic may monitor a power channel between the first host device and the second host device and a communication channel between the first host device and the second host device. The control logic may detect an interruption of at least one of the power channel or the communication channel. In response to the interruption, the control logic may disable communication between the first host device and the second host device.

DATA PROCESSING METHOD, SECURITY ARCHITECTURE SYSTEM, AND COMPUTING DEVICE

A data processing method applicable to a security architecture system. The security architecture system includes a secure element subsystem, the secure element subsystem includes a power management module and a register, and a communication connection is established between the power management module and the register. The method includes: obtaining, by the power management module, a state of the register through the power management module, and selecting a first adjustment method or a second adjustment method based on the state of the register to adjust a frequency of a target component.

SUPPLY VOLTAGE PROPORTIONALITY MONITORING IN A SYSTEM-ON-CHIP (SOC)
20230161875 · 2023-05-25 ·

A System-on-Chip (SoC) includes first and second voltage supply pins configured to receive first and second supply voltages, respectively, a first supply path beginning at the first supply pin, and a supply proportion checker. The first supply path includes a first plurality of voltage supply nodes and a supply switch coupled between adjacent voltage supply nodes, wherein each node is configured to provide a corresponding internal voltage supply to a corresponding portion of the SoC. The supply proportion checker is coupled to receive the corresponding internal voltage supply from each voltage supply node, and configured to determine whether a first internal voltage supply supplied by a first supply node of the first plurality of nodes has a legitimate proportion to a second internal voltage supply supplied by a second supply node of the first plurality of nodes, wherein the legitimacy is checked using only resistors which do not require trimming.

SUPPLY VOLTAGE PROPORTIONALITY MONITORING IN A SYSTEM-ON-CHIP (SOC)
20230161875 · 2023-05-25 ·

A System-on-Chip (SoC) includes first and second voltage supply pins configured to receive first and second supply voltages, respectively, a first supply path beginning at the first supply pin, and a supply proportion checker. The first supply path includes a first plurality of voltage supply nodes and a supply switch coupled between adjacent voltage supply nodes, wherein each node is configured to provide a corresponding internal voltage supply to a corresponding portion of the SoC. The supply proportion checker is coupled to receive the corresponding internal voltage supply from each voltage supply node, and configured to determine whether a first internal voltage supply supplied by a first supply node of the first plurality of nodes has a legitimate proportion to a second internal voltage supply supplied by a second supply node of the first plurality of nodes, wherein the legitimacy is checked using only resistors which do not require trimming.

SYSTEMS, METHODS, APPARATUSES, AND DEVICES FOR FACILITATING WIRELESS ENERGY TRANSMISSIONS
20230163637 · 2023-05-25 ·

A system for facilitating wireless energy transmissions. The system comprises a ground station and a space station. The ground station is positioned in a location on the earth. The ground station comprises a transmitter device. The space station is positioned in an orbit around the earth. The space station comprises a primary receiver device and a primary transmitter device. The primary receiver device comprises a receiver transceiver. The transmitter device transmits terahertz electromagnetic wave energy wirelessly to the receiver transceiver. The receiver transceiver receives the energy wirelessly from the transmitter. The receiver transceiver comprises a receiver enclosure comprised of a metamaterial. The receiver enclosure converts the terahertz electromagnetic wave energy into electrical energy based on the receiving. The receiver enclosure comprises a receiver antenna comprised of superconducting material and facilitates the receiving. The primary transmitter device transmits the electrical energy wirelessly to a secondary receiver device based on the converting.

MACHINE LEARNING BASED PRIVACY PROCESSING
20220335945 · 2022-10-20 ·

Methods, systems, and apparatus, for handling applications in an ambient computing system with a privacy processor. One of the methods includes to remain in a monitoring power state until a controller receives an interrupt indicating that one or more sensor signals are present. The one or more sensor signals are provided as input to a machine learning engine. An inference pass is performed by the machine learning engine to generate an output representing a particular context that is specific to a particular user. It is determined that one or more components of an ambient computing system should be disabled based on the on the particular context for the particular user. In response, the one or more components of the ambient computing system are disabled.

MACHINE LEARNING BASED PRIVACY PROCESSING
20220335945 · 2022-10-20 ·

Methods, systems, and apparatus, for handling applications in an ambient computing system with a privacy processor. One of the methods includes to remain in a monitoring power state until a controller receives an interrupt indicating that one or more sensor signals are present. The one or more sensor signals are provided as input to a machine learning engine. An inference pass is performed by the machine learning engine to generate an output representing a particular context that is specific to a particular user. It is determined that one or more components of an ambient computing system should be disabled based on the on the particular context for the particular user. In response, the one or more components of the ambient computing system are disabled.

Systems and methods for detecting battery removal while an information handling system is in an off state

An information handling system may include a processor; a battery to supply power to the information handling system, the battery comprising a voltage regulator to power a battery management unit (BMU) on the battery and set a system present pin of the BMU to a high voltage; the BMU to: detect a voltage indicator indicating a change in voltage state at a system present pin of the BMU that is externally connectable to a ground or voltage source at the information handling system, the voltage indicator indicative of an electrical coupling of the battery to the information handling system while the information handling system is in an off state; and register the voltage indicator within a battery register of the BMU; and a microcontroller, upon powering on of the information handling system, to read the voltage indicator at the battery register and determine that the battery has been coupled to the information handling system.

POWER TOOL ANTI-THEFT
20170364360 · 2017-12-21 ·

Techniques are disclosed for providing anti-theft protection for power tools. In one example of the techniques of the disclosure, at least one processor of a power tool receives, from an operator, a command to operate the power tool. In response to receiving the command, the at least one processor determines whether at least one of a value of a master authentication counter of the power tool and a value of a user authentication counter of the power tool has reached a predetermined threshold. In response to determining that the at least one of the value of the master authentication counter and the value of the user authentication counter has reached a predetermined threshold, the at least one processor disables the power tool.