Patent classifications
G06F13/20
Electronic system
In accordance with an embodiment, an electronic device includes a secure element configured to implement a plurality of operating systems; and a near field communication module coupled to the secure element by a single bus and by a routing circuit configured to route routing data between the plurality of operating systems and a receive circuit of the near field communication module.
Smart data offload sync replication
A method is provided, comprising: receiving, from a host device, a request to create a token that represents one or more data items that are stored in a first volume, the first volume being stored in a source system; estimating an I/O latency limit for the first volume; estimating a token creation time for the token; comparing the token creation time to the I/O latency limit; when the token creation time matches the I/O latency limit: creating the token, creating a snapshot pair, mapping the token to the snapshot pair, and returning the token to the host device; when the token creation time does not match the I/O latency limit: creating the token, creating a first snapshot of the first volume at the source system, mapping the first snapshot to the token, and returning the token to the host device.
Smart data offload sync replication
A method is provided, comprising: receiving, from a host device, a request to create a token that represents one or more data items that are stored in a first volume, the first volume being stored in a source system; estimating an I/O latency limit for the first volume; estimating a token creation time for the token; comparing the token creation time to the I/O latency limit; when the token creation time matches the I/O latency limit: creating the token, creating a snapshot pair, mapping the token to the snapshot pair, and returning the token to the host device; when the token creation time does not match the I/O latency limit: creating the token, creating a first snapshot of the first volume at the source system, mapping the first snapshot to the token, and returning the token to the host device.
Adapter device and communication method
An adapter device communicates with a sink device and a source device using first and second communication schemes, respectively. The adapter device includes: a transceiver receiving a state read request by detecting that a serial data line connected between the adapter device and the sink device is driven to a low level when a serial clock line connected therebetween is at a high level, and drive the serial data line to the low level and drive the serial clock line to a low level; a transmitter transmitting the state read request to the source device after the serial clock line is driven to the low level; and a receiver receiving a state read signal to read data of a state register in the sink device from the source device, wherein the transceiver transmits the state read signal to the sink device via the serial data line.
Adapter device and communication method
An adapter device communicates with a sink device and a source device using first and second communication schemes, respectively. The adapter device includes: a transceiver receiving a state read request by detecting that a serial data line connected between the adapter device and the sink device is driven to a low level when a serial clock line connected therebetween is at a high level, and drive the serial data line to the low level and drive the serial clock line to a low level; a transmitter transmitting the state read request to the source device after the serial clock line is driven to the low level; and a receiver receiving a state read signal to read data of a state register in the sink device from the source device, wherein the transceiver transmits the state read signal to the sink device via the serial data line.
Operating system update via sideband processor
Techniques are disclosed relating to a method that includes executing, by a processor of a computer system, a particular operating system (OS) from a system memory coupled to the processor. A sideband processor of the computer system may receive, via a network, instructions for an updated version of the OS. While the processor executes the particular OS, the sideband processor may send, to a controller hub, a series of commands that cause the controller hub to store the received instructions into one or more regions of the system memory. The sideband processor may then cause the processor to switch, without rebooting, from executing the particular OS to executing the updated version of the OS.
Operating system update via sideband processor
Techniques are disclosed relating to a method that includes executing, by a processor of a computer system, a particular operating system (OS) from a system memory coupled to the processor. A sideband processor of the computer system may receive, via a network, instructions for an updated version of the OS. While the processor executes the particular OS, the sideband processor may send, to a controller hub, a series of commands that cause the controller hub to store the received instructions into one or more regions of the system memory. The sideband processor may then cause the processor to switch, without rebooting, from executing the particular OS to executing the updated version of the OS.
Component for Initializing a Quantum Dot
An electronic component (10) is formed by a semiconductor component or a semiconductor-like structure having gate electrode assemblies (16, 18), for initializing the quantum mechanical state of a qubit.
Component for Initializing a Quantum Dot
An electronic component (10) is formed by a semiconductor component or a semiconductor-like structure having gate electrode assemblies (16, 18), for initializing the quantum mechanical state of a qubit.
METHOD AND APPARATUS FOR SECURE PRIVATE KEY STORAGE ON IOT DEVICE
An apparatus is disclosed for storing a private key on an IoT device for encrypted communication with an external user device and includes a proximity-based communication interface, encryption circuitry and IoT functional circuitry. The encryption circuitry includes a memory having a dedicated memory location allocated for storage of encryption keys utilized in the encrypting/decrypting operations, an encryption engine for performing the encryption/decryption operation with at least one of the stored encryption keys in association with the operation of the IoT functional circuitry, an input/output interface for interfacing with the proximity-based communication interface to allow information to be exchanged with a user device in a dedicated private key transfer operation, an internal system interface for interfacing with the IoT functional circuitry for transfer of information therebetween, memory control circuitry for controlling storage of a received private key from the input/output interface for storage in the dedicated memory location in the memory, in a Write-only memory storage operation relative to the private key received from the input/output interface over the proximity-based communication interface, the memory control circuitry inhibiting any Read operation of the dedicated memory location in the memory through the input/output interface. The IoT functional circuitry includes a controller for controlling the operation of the input/output interface and the memory control circuitry in a private key transfer operation to interface with the external user device to control the encryption circuitry for transfer of a private key from the user device through the proximity-based communication interface for storage in the dedicated memory location in the memory, the controller interfacing with the encryption circuitry via the internal system interface, and operational circuitry for interfacing with the user device over a peer to peer communication link and encrypting/decrypting information therebetween with the encryption engine in the encryption circuitry.