G06F9/442

PRE-SHUTDOWN MEDIA MANAGEMENT OPERATION FOR VEHICLE MEMORY SUB-SYSTEM
20230048514 · 2023-02-16 ·

A vehicle memory sub-system can be switched from a normal mode to a pre-shutdown mode and initiate a media management operation before shutting down. The mode switch and/or media management operation can be performed in response to receiving a shutdown or pre-shutdown command for the vehicle. After completion of the memory management operation the vehicle and/or memory sub-system can be shutdown.

GRACEFUL SHUTDOWN WITH ASYNCHRONOUS DRAM REFRESH OF NON-VOLATILE DUAL IN-LINE MEMORY MODULE

A graceful shutdown of a computer system is initiated by sending a command to an asynchronous dynamic random access memory refresh (ADR) trigger device to assert an ADR trigger. Responsive to the command, the ADR trigger device asserts the ADR trigger to initiate an ADR of a non-volatile dual in-line memory module (NVDIMM) of the computer system. In response to the ADR trigger being asserted by the ADR trigger device, an ADR of the NVDIMM is performed before completing the graceful shutdown of the computer.

Electronic device and power management method

An electronic device includes a backup power supply unit, a first power management unit, a switch, a voltage detection unit, a processor and an electronic module. The first power management unit is coupled to the backup power supply unit and an external power supply unit. The switch is coupled to the first power management unit. The voltage detection unit is coupled to the external power supply unit and the switch. The processor is coupled to the voltage detection unit. The electronic module is coupled to the switch and the processor. When a voltage level of the external power supply unit is lower than a first predetermined level, the voltage detection unit outputs a detection signal. The switch is controlled by the detection signal to open to stop supplying power to the electronic module. The processor is controlled by the detection signal to execute a shutdown process.

Secure shared key establishment for peer to peer communications

Systems and methods for secure peer-to-peer communications are described. Devices registered into trusted network may be capable of establishing a shared data encryption key (DEK). In embodiments, each device may be configured to obtain a share of a data encryption key (DEKi) that can be stored locally. The shares may be shares in an M of N Secret Sharing Scheme. This may involve a network that includes an integer, N, devices, and in which M devices may share a secret (i.e. the DEK) during communications, M being an integer less than or equal to N. To obtain the entire DEK during encryption/decryption, a requesting device may send requests to M of N devices for their shares of the DEK. Once M shares are obtained, they may be used generate the DEK for encrypting/decrypting data between the devices.

BOOT CONTROL CIRCUIT OF COMPUTER SYSTEM
20220405105 · 2022-12-22 ·

A boot control circuit of a computer system is provided. The boot control circuit is coupled to a system power module. The boot control circuit includes a connection port module and a motherboard. The connection port module includes a detection pin. The motherboard includes a switch for controlling the system power module. The motherboard controls the system power module to provide power for booting the computer system according to a connection between the detection pin and the switch.

Device linked context identification and notification

Provided is device linked context identification and notification. Context data of a user profile of a user is retrieved from an external storage. The context data is analyzed to place user activities of the user and surrounding activities around the user in activity categories and to assign tags for the user activities and the surrounding activities. In response to receiving a notification that shutdown of a first device being used by the user is about to occur, current context data and historical context data are compared to determine whether the current context data for the user is one of typical and unusual and to predict a future action of the user. A device shutdown notice is sent to a second device with the current context data, the determination of whether the current context data for the user is one of typical and unusual, and the prediction of the future action.

IMAGE FORMING SYSTEM
20220385780 · 2022-12-01 · ·

An image forming system includes at least one piece of image forming apparatus and a server. The at least one piece of image forming apparatus transmits a sleep notification when entering a sleep mode which is a power saving state, and transmits a wake-up notification when returning from the sleep mode to a non-power saving state. The server monitors the sleep notification and the wake-up notification. When a specific image forming apparatus of the at least one piece of image forming apparatus has been in the sleep mode for at least a certain period of time, the sever issues a power-off command to the specific image forming apparatus, so that the specific image forming apparatus shuts off automatically. Before issuing the power-off command, the server delivers a power-off notice to the user who has used the specific image forming apparatus.

INTERNET OF THINGS (IoT) DEVICE, IoT DEVICE MANAGEMENT SYSTEM, AND METHOD FOR MANAGING IoT DEVICE
20220374243 · 2022-11-24 · ·

An Internet of Things (IoT) device includes a first memory disposed in a normal zone; a first driver disposed in the normal zone; and a second driver disposed in a secure zone. The first driver is configured to perform: (a) monitoring the first memory to generate data change information of the first memory, the data change information being information on changes of data in the first memory; (b) transmitting the data change information to the second driver; and (c) controlling an operating state of the IoT device based on an instruction for the operating state received from the second driver. The second driver is configured to perform: (d) transmitting the data change information to a specified IoT device management system; and (e) receiving the instruction for the operating state from the IoT device management system and transmitting the instruction for the operating state to the first driver.

Extending application access across devices
11595397 · 2023-02-28 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for extending application access across devices. In some implementations, an electronic device receives a request to provide access to the electronic device to a particular user that is not registered as a user of the electronic device. The electronic device receives authentication credentials for the particular user. The electronic device provides the authentication credentials to a server system and receives data from the server system that (i) indicates that the providing access to the electronic device in a guest mode is authorized, and (ii) indicates a state of an instance of an application installed on a second device. The electronic device provides access to the electronic device in the guest mode that provides an interface that at least partially recreates the state of the instance of the application installed on the second device.

Qubit reset from excited states

Techniques regarding resetting highly excited qubits are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a reset component that can de-excite a qubit system to a target state by transitioning a population of a first excited state of the qubit system to a ground state and by applying a signal to the qubit system that transitions a population of a second excited state to the first excited state.