Patent application number | Description | Published |
20080320567 | SYSTEM AND METHOD FOR PREVENTING WEB FRAUDS COMMITTED USING CLIENT-SCRIPTING ATTACKS - A method for detecting and blocking Javascript hijacking attacks, comprising checking if an incoming request belongs to a valid session established between a client and a trusted server. When said incoming request does belong to a valid session, it is checked if a Referer header of said incoming request includes a valid domain name. The incoming request is marked as suspicious, when said incoming request does not include a valid domain name. It is checked if a respective response of said suspicious incoming request includes a script code. A preventive action responsive to a user input is taken when said respective response includes a script code. | 12-25-2008 |
20120023132 | METHOD FOR MONITORING STORED PROCEDURES - A method for monitoring stored procedures is disclosed. The method performs on-line and inline monitoring of stored procedures for detecting table access operations performed by the procedures. This allows the enforcing of access control policies, correlation rules and audit rules on stored procedures. The monitoring is performed using mapping information gathered about each stored procedure that can be executed by a database server. The method comprises parsing an incoming transaction submitted by a client; determining whether the incoming transaction includes an invocation of a stored procedure; obtaining a query group corresponding to the stored procedure; applying an access control policy on the query group; and asserting an unauthorized event if the query group is not compliant with the access control policy. | 01-26-2012 |
20120180129 | SYSTEM AND METHOD FOR PREVENTING WEB FRAUDS COMMITTED USING CLIENT-SCRIPTING ATTACKS - A method for detecting and blocking Javascript hijacking attacks, comprising checking if an incoming request belongs to a valid session established between a client and a trusted server. When said incoming request does belong to a valid session, it is checked if a Referer header of said incoming request includes a valid domain name. The incoming request is marked as suspicious, when said incoming request does not include a valid domain name. It is checked if a respective response of said suspicious incoming request includes a script code. A preventive action responsive to a user input is taken when said respective response includes a script code. | 07-12-2012 |
20120227106 | SYSTEM AND METHOD FOR PREVENTING WEB FRAUDS COMMITTED USING CLIENT-SCRIPTING ATTACKS - A method for detecting and blocking Javascript hijacking attacks, comprising checking if an incoming request belongs to a valid session established between a client and a trusted server. When said incoming request does belong to a valid session, it is checked if a Referer header of said incoming request includes a valid domain name. The incoming request is marked as suspicious, when said incoming request does not include a valid domain name. It is checked if a respective response of said suspicious incoming request includes a script code. A preventive action responsive to a user input is taken when said respective response includes a script code. | 09-06-2012 |
20120291129 | DETECTING WEB BROWSER BASED ATTACKS USING BROWSER DIGEST COMPUTE TESTS LAUNCHED FROM A REMOTE SOURCE - The detection of web browser-based attacks using browser tests launched from a remote source is described. In one example, a digest is computed based on the content of an HTTP response message. The message is modified and sent to a client device that also computes a digest. The digests are compared to determine whether content has been modified by malware on the HTTP client. The results of the test are analyzed and defensive measures are taken. | 11-15-2012 |
20120304296 | DETECTING WEB BROWSER BASED ATTACKS USING BROWSER RESPONSE COMPARISON TESTS LAUNCHED FROM A REMOTE SOURCE - The detection of web browser-based attacks using browser test launched from a remote source is described. In one example, it is determined that a test should be performed responsive to receiving an HTTP message sent by a client device and a policy. The test is performed with the client device to determine only whether content intended to be communicated between the HTTP client and the web application server using an HTTP message has been modified by malware on the HTTP client. The test includes the sending of an HTTP response to the HTTP client. The results of the test are analyzed and defensive measures are taken. | 11-29-2012 |
20130055384 | DEALING WITH WEB ATTACKS USING CRYPTOGRAPHICALLY SIGNED HTTP COOKIES - According to one embodiment, a security gateway (SG) is coupled between a hypertext transport protocol (HTTP) client and a web application server. Responsive to a first HTTP message being transmitted between the HTTP client and the web application server as part of an HTTP session, the SG generates security gateway session security state information (SGI) based on a policy. The SG also generates a digital signature (SGS) from the SGI, creates an SG signed session security state information cookie (SGC), and sends the SGC to the HTTP client for storage instead of storing the SGI in the SG. Responsive to a second HTTP message of the HTTP session, the SG attempts to validate a claim made in the second HTTP request using at least the policy and the SGC that is supposed to be returned with the second HTTP message. | 02-28-2013 |
20140258294 | ON-DEMAND CONTENT CLASSIFICATION USING AN OUT-OF-BAND COMMUNICATIONS CHANNEL FOR FACILITATING FILE ACTIVITY MONITORING AND CONTROL - Communications to a server over an in-band communications channel are monitored for requests to access a file. Based on the communications, a request to access a particular file stored by the server is identified. Security and/or audit rules are identified based on the request. A determination is thereafter made that the security and/or audit rules require evaluation of classification information for contents of the requested file. Thus, a determination is made as to whether classification information for the contents of the particular file is available, such as determining whether the classification information is stored in a local classification cache. Responsive to a determination that the classification information is not available, classification information is obtained for the contents of the particular file using an out-of-band communications channel. Thereafter, processing with respect to the request to access the particular file is performed based on the obtained classification information and the one or more security and/or audit rules. | 09-11-2014 |
20140289855 | DETECTING WEB BROWSER BASED ATTACKS USING BROWSER DIGEST COMPUTE TESTS USING DIGEST CODE PROVIDED BY A REMOTE SOURCE - The detection of web browser-based attacks using browser tests launched from a remote source is described. In one example, a digest is computed based on the content of an HTTP response message. The message is modified and sent to a client device that also computes a digest. The digests are compared to determine whether content has been modified by malware on the HTTP client. The results of the test are analyzed and defensive measures are taken. | 09-25-2014 |
20140317738 | AUTOMATIC GENERATION OF ATTRIBUTE VALUES FOR RULES OF A WEB APPLICATION LAYER ATTACK DETECTOR - According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP client carrying a web application layer message that violates a condition of a security rule, the AD transmits an alert package to an automatic attribute value generation and rule feedback module (AVGRFM). The AVGRFM uses the alert package, and optionally other alert packages from the same AD or other ADs, to automatically generate a new set of attribute values for each of a set of attribute identifiers for use, by the AD or other ADs, in a different security rule than the violated security rule. The new set of attribute values may be used in an attack specific rule to detect a previously unknown web application layer attack. | 10-23-2014 |
20140317739 | ITERATIVE AUTOMATIC GENERATION OF ATTRIBUTE VALUES FOR RULES OF A WEB APPLICATION LAYER ATTACK DETECTOR - According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (AD), which are coupled between HTTP clients and web application servers. The computing device learns a new set of attribute values for a set of attribute identifiers for each of a sequence of rules through an iterative process having a plurality of iterations. The iterative process begins with an attack specific rule, and the sequence of rules includes an attacker specific rule and another attack specific rule. Each iteration includes receiving a current alert package from one of the ADs sent responsive to a set of packets carrying a web application layer request meeting a condition of a current rule used by the AD, automatically generating a new set of attribute values based upon the current alert package, and transmitting the new set of attribute values to the set of ADs. | 10-23-2014 |
20140317740 | COMMUNITY-BASED DEFENSE THROUGH AUTOMATIC GENERATION OF ATTRIBUTE VALUES FOR RULES OF WEB APPLICATION LAYER ATTACK DETECTORS - According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (ADs), which are coupled between HTTP clients and web application servers. The computing device automatically learns a new condition shared by a plurality of alert packages reported by the set of ADs due to a triggering of one or more rules that is indicative of a web application layer attack. The computing device automatically generates a new set of attribute values by analyzing the plurality of alert packages to identify the condition shared by the plurality of alert packages, and transmits the new set of attribute values for delivery to the set of ADs for a different rule to be used to protect against the web application layer attack from the HTTP clients or any other HTTP client. | 10-23-2014 |
20140317741 | AUTOMATIC GENERATION OF DIFFERENT ATTRIBUTE VALUES FOR DETECTING A SAME TYPE OF WEB APPLICATION LAYER ATTACK - According to one embodiment, a computing device is coupled to a web application layer attack detector (AD), which itself is coupled between an HTTP client and a web application server. The computing device automatically learns a new condition to detect a first type of web application layer attack. Responsive receiving a web application layer message from the HTTP client that violates a rule for detecting the first type of web application layer attack, the AD transmits an alert package to the computing device, which uses the alert package, and optionally other alert packages, to automatically generate a new set of attribute values for each of a set of attribute identifiers to be transmitted to the AD or optionally other ADs for use in a different rule than the violated rule. The different rule is another attack specific rule for detecting the first type of web application layer attack. | 10-23-2014 |
20150135266 | COMPROMISED INSIDER HONEY POTS USING REVERSE HONEY TOKENS - According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain unauthorized access to enterprise data provided by a server is described. The method includes causing a honey token to be placed on the CES secluded within a configuration repository, wherein the honey token is metadata and/or instructions indicating how applications can seemingly access the enterprise data but that is actually invalid, and the honey token is placed on the CES and not on the server. The method also includes causing attribute values to be installed on a security gateway for a security rule causing the security gateway to monitor network traffic for attempted use of the honey token, and to generate an alert when a set of one or more packets that include the honey token are received. | 05-14-2015 |
20150150123 | COORDINATED DETECTION AND DIFFERENTIATION OF DENIAL OF SERVICE ATTACKS - According to one embodiment, an analyzer module (AM) within a same protected network and on-premise with a web application server (WAS) detects and distinguishes between types of Denial-of-Service (DoS) attacks. The AM tracks whether test HTTP messages, which include test HTTP request messages that a signal generation module (SGM) is configured to transmit to the WAS and test HTTP response messages that the WAS is expected to transmit in response to the test HTTP request messages, are timely received. The AM is aware of a timeliness that the SGM is expected to transmit the test HTTP request messages and that the WAS is expected to transmit the test response HTTP messages. The AM detects an occurrence of a DoS attack and identifies the type of the DoS attack based upon the result of the tracking indicating that a number of the test HTTP messages have not been timely received. | 05-28-2015 |
20150207806 | AUTOMATIC GENERATION OF ATTRIBUTE VALUES FOR RULES OF A WEB APPLICATION LAYER ATTACK DETECTOR - According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP client carrying a web application layer message that violates a condition of a security rule, the AD transmits an alert package to an automatic attribute value generation and rule feedback module (AVGRFM). The AVGRFM uses the alert package, and optionally other alert packages from the same AD or other ADs, to automatically generate a new set of attribute values for each of a set of attribute identifiers for use, by the AD or other ADs, in a different security rule than the violated security rule. The new set of attribute values may be used in an attack specific rule to detect a previously unknown web application layer attack. | 07-23-2015 |
Patent application number | Description | Published |
20120328589 | GLUCOCEREBROSIDASE MULTIMERS AND USES THEREOF - Multimeric protein structures comprising at least two glucocerebrosidase molecules being covalently linked to one another via a linking moiety are disclosed herein, as well a process for preparing same, and uses thereof in the treatment of Gaucher disease. The multimeric protein structures are characterized by longer-lasting activity as compared to native glucocerebrosidase both in serum and in lysosomes. | 12-27-2012 |
20120328592 | STABILIZED ALPHA-GALACTOSIDASE AND USES THEREOF - Multimeric protein structures comprising at least two alpha-galactosidase monomers being covalently linked to one another via a linking moiety are disclosed herein, as well a process for preparing same, and methods of treating Fabry disease via administration of a multimeric protein structure. The disclosed multimeric protein structures exhibit an improved performance, in terms of enhanced activity and/or a longer lasting activity under both lysosomal conditions and in a serum environment. | 12-27-2012 |
20130295065 | NUCLEIC ACID CONSTRUCT FOR EXPRESSION OF ALPHA-GALACTOSIDASE IN PLANTS AND PLANT CELLS - Nucleic acid expression constructs are provided and, more particularly, nucleic acid constructs for expression of human alpha-galactosidase in plant cells, cells expressing the nucleic acid construct, producing the human alpha-galactosidase and uses thereof. | 11-07-2013 |
20140256017 | SACCHARIDE-CONTAINING PROTEIN CONJUGATES AND USES THEREOF - Conjugates of a saccharide and a biomolecule, covalently linked therebetween via a non-hydrophobic linker and methods of preparing same are disclosed. Also disclosed are medical uses utilizing such conjugates. Glycosylation reagents for use in preparing these conjugates are also disclosed. Glycosylated proteins, characterized by improved performance, are also disclosed. | 09-11-2014 |
20150024050 | DRY POWDER FORMULATIONS OF DNASE I - DNase I formulations for pulmonary administration and, more particularly, but not exclusively, a dry powder formulation comprising, as an active ingredient, human DNase I, methods, dry powder inhalation devices and systems for the therapeutic use thereof are provided. | 01-22-2015 |
Patent application number | Description | Published |
20090011075 | Polar Lipid Mixtures, their Preparation and Uses - Disclosed herein are polar lipid mixtures, comprising glycerophospholipids such as phosphatidylcholine (PC), phosphatidylethanolamine (PE), phosphatidylserine (PS) and phosphatidyl-inositol (PI), and sphingolipids such as sphyngomyelin (SM). Most importantly, the ratio of phospholipids in said mixture is comparable to that of HMF, and is represented by SM>PC>PE>PS>PI or SM=PC>PE>PS>PI. Processes for the preparation of said mixtures and uses thereof are also described herein. | 01-08-2009 |
20090074857 | Glycerophospholipids for the improvement of cognitive functions - Disclosed herein are alternative, enhanced, and cheaper methods of improving cognitive functions in a subject using a lipid composition conjugated with omega-3 and omega-6 fatty acids, with specific amounts and specific conjugation patterns of LA, linolenic acid (alpha-linolenic acid, gamma-linolenic acid) DHA and eicosapentaenoyl (EPA), e.g. utilizing different sources of lipids. | 03-19-2009 |
20090232916 | FOOD PRODUCTS FOR DIABETICS - Disclosed is a novel food product characterized by a low glucose or glucose free content, a balanced functional fat content, and a proactive agent aimed for the diabetic and diabetic-prone populations. The food product of the invention is a functional food which may be used clinically to lower the lipid level in people suffering from an imbalanced lipid profile and which may progress towards diabetes complications and coronary vascular disorders. In particular embodiments the proactive agent can be any of a naturally occurring lipid, a synthetic or mimetic lipid which is not digestible by humans and interferes with body weight gain/loss, plant extracts and substances derived therefrom, antioxidants, animal-derived substances, minerals and pharmaceuticals, and any mixture thereof. | 09-17-2009 |
20100069332 | Lipids containing omega-3 and omega-6 fatty acids - A lipid preparation including a glycerophospholipid or salt, conjugate and derivatives thereof, particularly phosphatidylserine (PS), phosphatidylcholine (PC), phosphatidylethanolamine (PE), phosphatidyl-inositol (PI), phosphatidylglycerol (PG) and phosphatidic acid (PA), and poly-unsaturated fatty acid (PUFA) acyl groups, particularly long-chain poly-unsaturated fatty acid (LC-PUFA) acyl groups such as omega-3 and/or omega-6 acyl groups, wherein said PUFA is covalently bound to said glycerophospholipid. The preparation possesses an improved bioactivity, and is useful in the treatment of various cognitive and mental conditions and disorders and for maintenance of normal functions of brain-related systems and processes. | 03-18-2010 |
20100184734 | Oils enriched with diacylglycerols and phytosterol esters and unit dosage forms thereof for use in therapy - Described herein are various lipid mixtures, more particularly special mixtures of fatty acids esters, which may be phytosterol esters and/or glyceride esters. Said mixtures are evaluated in the context of their ability to, upon consumption, affect the levels of circulating LDL and HDL particles, and their therapeutic effect on conditions associated with lipid metabolism, such as atherosclerosis, diabetes, metabolic disorders, etc. Compositions, dietary nutrients, food supplements and nutraceuticals comprising the herein described mixtures are also described. | 07-22-2010 |
20110144063 | GLYCEROPHOSPHOLIPIDS FOR THE IMPROVEMENT OF COGNITIVE FUNCTIONS - The invention described herein provides a preparation comprising a non-mammalian derived mixture of serine glycerophospholipid conjugates with a specific content and specific conjugation patterns of LA, linolenic acid (alpha-linolenic acid, gamma-linolenic acid) DHA and EPA which depend on utilizing different sources of lipids, and uses of such preparations. | 06-16-2011 |
20110294757 | POLAR LIPID MIXTURES, THEIR PREPARATION AND USES - Disclosed herein are polar lipid mixtures, comprising glycerophospholipids such as phosphatidylcholine (PC), phosphatidylethanolamine (PE), phosphatidylserine (PS) and phosphatidyl-inositol (PI), and sphingolipids such as sphyngomyelin (SM). Most importantly, the ratio of phospholipids in said mixture is comparable to that of HMF, and is represented by SM>PC>PE>PS>PI or SM=PC>PE>PS>PI. Processes for the preparation of said mixtures and uses thereof are also described herein. | 12-01-2011 |
20140051663 | GLYCEROPHOSPHOLIPIDS FOR THE IMPROVEMENT OF COGNITIVE FUNCTIONS - The invention described herein provides a preparation comprising a non-mammalian derived mixture of serine glycerophospholipid conjugates with a specific content and specific conjugation patterns of LA, linolenic acid (alpha-linolenic acid, gamma-linolenic acid) DHA and EPA which depend on utilizing different sources of lipids, and uses of such preparations. | 02-20-2014 |
Patent application number | Description | Published |
20100046495 | METHOD AND APPARATUS OF SYSTEM SCHEDULER - Briefly, according to embodiments of the invention, there is provided a wireless communication system and a method to receive by a base station from a first mobile station a first chain of data symbols transmitted by at least two antennas and having a first transmit diversity, to receive from a second mobile station a second chain of data symbols transmitted by at least two antennas and having a second transmit diversity. Both first and second chains of data symbols are transmitted from the first and second mobile stations at the same time, modulated according to an Orthogonal Frequency Division Multiplexing (OFDM) scheme and encoded by a space time block codes scheme. | 02-25-2010 |
20100061348 | METHOD AND APPARATUS OF SYSTEM SCHEDULER - Briefly, according to embodiments of the invention, there is provided a wireless communication system and a method to receive by a base station from a first mobile station a first chain of data symbols transmitted by at least two antennas and having a first transmit diversity, to receive from a second mobile station a second chain of data symbols transmitted by at least two antennas and having a second transmit diversity. Both first and second chains of data symbols are transmitted from the first and second mobile stations at the same time, are modulated according to an Orthogonal Frequency Division Multiplexing (OFDM) scheme and encoded by a space time block codes scheme. | 03-11-2010 |
20110249663 | METHOD AND APPARATUS OF SYSTEM SCHEDULER - Briefly, according to embodiments of the invention, there is provided a wireless communication system and a method to receive by a base station from a first mobile station a first chain of data symbols transmitted by at least two antennas and having a first transmit diversity, to receive from a second mobile station a second chain of data symbols transmitted by at least two antennas and having a second transmit diversity. Both first and second chains of data symbols are transmitted from the first and second mobile stations at the same time, modulated according to an Orthogonal Frequency Division Multiplexing (OFDM) scheme and encoded by a space time block codes scheme. | 10-13-2011 |
20120250645 | Device, system and method of wireless communication - Briefly, according to embodiments of the invention, there is provided a wireless communication system and a method to receive by a base station from a first mobile station a first chain of data symbols transmitted by at least two antennas and having a first transmit diversity, to receive from a second mobile station a second chain of data symbols transmitted by at least two antennas and having a second transmit diversity. Both first and second chains of data symbols are transmitted from the first and second mobile stations at the same time, modulated according to an Orthogonal Frequency Division Multiplexing (OFDM) scheme and encoded by a space time block codes scheme. | 10-04-2012 |
20120250654 | DEVICE, SYSTEM AND METHOD OF WIRELESS COMMUNICATION - Briefly, according to embodiments of the invention, there is provided a wireless communication system and a method to receive by a base station from a first mobile station a first chain of data symbols transmitted by at least two antennas and having a first transmit diversity, to receive from a second mobile station a second chain of data symbols transmitted by at least two antennas and having a second transmit diversity. Both first and second chains of data symbols are transmitted from the first and second mobile stations at the same time, modulated according to an Orthogonal Frequency Division Multiplexing (OFDM) scheme and encoded by a space time block codes scheme. | 10-04-2012 |
20120257596 | METHOD AND APPARATUS OF SYSTEM SCHEDULER - Briefly, according to embodiments of the invention, there is provided a wireless communication system and a method to receive by a base station from a first mobile station a first chain of data symbols transmitted by at least two antennas and having a first transmit diversity, to receive from a second mobile station a second chain of data symbols transmitted by at least two antennas and having a second transmit diversity. Both first and second chains of data symbols are transmitted from the first and second mobile stations at the same time, modulated according to an Orthogonal Frequency Division Multiplexing (OFDM) scheme and encoded by a space time block codes scheme. | 10-11-2012 |
Patent application number | Description | Published |
20120079304 | PACKAGE LEVEL POWER STATE OPTIMIZATION - Methods and apparatus to optimize package level power state usage are described. In one embodiment, a processor control logic receives a request to enter a lower power consumption state (such as a package level deeper sleep state). The control logic determines the time difference or delta between a last entry into the lower power consumption state and the current time. The control logic then causes the flushing of a last level cache based on a comparison of the time difference and a threshold value corresponding to the lower power consumption state. Other embodiments are also claimed and disclosed. | 03-29-2012 |
20120166854 | Controlling Current Transients In A Processor - In one embodiment, a processor includes a core with a front end unit, at least one execution unit, and a back end unit. Multiple voltage drop detectors can be located within the core each to output a voltage drop signal when a detected voltage falls below a threshold voltage. In turn, a current transient logic coupled to receive the voltage drop signals can control a micro-architectural parameter of at least one of the front end unit, execution unit and back end unit responsive to receipt of a voltage drop signal. Other embodiments are described and claimed. | 06-28-2012 |
20120185709 | METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING THREAD CONSOLIDATION - An apparatus, method and system is described herein for thread consolidation. Current processor utilization is determined. And consolidation opportunities are identified from the processor utilization and other exaction parameters, such as estimating a new utilization after consolidation, determining if power savings would occur based on the new utilization, and performing migration/consolidation of threads to a subset of active processing elements. Once the consolidation is performed, the non-subset processing elements that are now idle are powered down to save energy and provide an energy efficient execution environment. | 07-19-2012 |
20120191995 | METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING OPTIMIZING C-STATE SELECTION UNDER VARIABLE WAKEUP RATES - A processor may include power management techniques to, dynamically, chose an optimal C-state for the processing core. The measurement of real workloads on the OSes exhibit two important observations (1) the bursts of high interrupt rate are interspersed between the low interrupt rate periods and long periods of high activity levels; and (2) the interrupt rate may, suddenly, fall below an interrupt rate (of 1 milli-second, for example) that is typical of the current operating systems (OS). Instead of determining the C-state based on the stale data stored in the counters, the power control logic may determine an optimal C-state by overriding the C-state determined by the OS or any other power monitoring logic. The power control logic may, dynamically, determine an optimal C-state based on the CPU idle residency times and variable rate wakeup events to match the expected wakeup event rate. | 07-26-2012 |
20130061064 | Dynamically Allocating A Power Budget Over Multiple Domains Of A Processor - In one embodiment, the present invention includes a method for determining a power budget for a multi-domain processor for a current time interval, determining a portion of the power budget to be allocated to first and second domains of the processor, and controlling a frequency of the domains based on the allocated portions. Such determinations and allocations can be dynamically performed during runtime of the processor. Other embodiments are described and claimed. | 03-07-2013 |
20130080803 | Estimating Temperature Of A Processor Core In A Low Power State - In one embodiment, the present invention includes a method for determining if a core of a multicore processor is in a low power state, and if so, estimating a temperature of the core and storing the estimated temperature in a thermal storage area for the first core. By use of this estimated temperature, an appropriate voltage at which to operate the core when it exits the low power state can be determined. Other embodiments are described and claimed. | 03-28-2013 |
20130097437 | METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING OPTIMIZING C-STATE SELECTION UNDER VARIABLE WAKEUP RATES - A processor may include power management techniques to, dynamically, chose an optimal C-state for the processing core. The measurement of real workloads on the OSes exhibit two important observations (1) the bursts of high interrupt rate are interspersed between the low interrupt rate periods and long periods of high activity levels; and (2) the interrupt rate may, suddenly, fall below an interrupt rate (of 1 milli-second, for example) that is typical of the current operating systems (OS). Instead of determining the C-state based on the stale data stored in the counters, the power control logic may determine an optimal C-state by overriding the C-state determined by the OS or any other power monitoring logic. The power control logic may, dynamically, determine an optimal C-state based on the CPU idle residency times and variable rate wakeup events to match the expected wakeup event rate. | 04-18-2013 |
20130111121 | Dynamically Controlling Cache Size To Maximize Energy Efficiency | 05-02-2013 |
20130179704 | Dynamically Allocating A Power Budget Over Multiple Domains Of A Processor - In one embodiment, the present invention includes a method for determining a power budget for a multi-domain processor for a current time interval, determining a portion of the power budget to be allocated to first and second domains of the processor, and controlling a frequency of the domains based on the allocated portions. Such determinations and allocations can be dynamically performed during runtime of the processor. Other embodiments are described and claimed. | 07-11-2013 |
20130179705 | Controlling A Turbo Mode Frequency Of A Processor - In one embodiment, the present invention includes a multicore processor with a power controller to control a frequency at which the processor operates. More specifically, the power controller can limit a maximum operating frequency of the processor to less than a configured maximum operating frequency to enable a reduction in a number of frequency transitions occurring responsive to power state events, thus avoiding the overhead of operations performed in handling such transitions. Other embodiments are described and claimed. | 07-11-2013 |
20140068302 | MECHANISM FOR FACILITATING FASTER SUSPEND/RESUME OPERATIONS IN COMPUTING SYSTEMS - A mechanism is described for facilitating faster suspend/resume operations in computing systems according to one embodiment of the invention. A method of embodiments of the invention includes initiating an entrance process into a first sleep state in response to a sleep call at a computing system, transforming from the first sleep state to a second sleep state. The transforming may include preserving at least a portion of processor context at a local memory associated with one or more processor cores of a processor at the computing system. The method may further include entering the second sleep state. | 03-06-2014 |
20140115351 | DYNAMICALLY ALLOCATING A POWER BUDGET OVER MULTIPLE DOMAINS OF A PROCESSOR - In one embodiment, the present invention includes a method for determining a power budget for a multi-domain processor for a current time interval, determining a portion of the power budget to be allocated to first and second domains of the processor, and controlling a frequency of the domains based on the allocated portions. Such determinations and allocations can be dynamically performed during runtime of the processor. Other embodiments are described and claimed. | 04-24-2014 |
20140258760 | Controlling Operating Voltage Of A Processor - In an embodiment, a processor includes a core domain with a plurality of cores and a power controller having a first logic to receive a first request to increase an operating voltage of a first core of the core domain to a second voltage, to instruct a voltage regulator to increase the operating voltage to an interim voltage, and to thereafter instruct the voltage regulator to increase the operating voltage to the second voltage. Other embodiments are described and claimed. | 09-11-2014 |
20140317430 | METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING OPTIMIZING C-STATE SELECTION UNDER VARIABLE WAKEUP RATES - A processor may include power management techniques to, dynamically, chose an optimal C-state for the processing core. The measurement of real workloads on the OSes exhibit two important observations (1) the bursts of high interrupt rate are interspersed between the low interrupt rate periods and long periods of high activity levels; and (2) the interrupt rate may, suddenly, fall below an interrupt rate (of 1 milli-second, for example) that is typical of the current operating systems (OS). Instead of determining the C-state based on the stale data stored in the counters, the power control logic may determine an optimal C-state by overriding the C-state determined by the OS or any other power monitoring logic. The power control logic may, dynamically, determine an optimal C-state based on the CPU idle residency times and variable rate wakeup events to match the expected wakeup event rate. | 10-23-2014 |
20140325184 | MECHANISM FOR SAVING AND RETRIEVING MICRO-ARCHITECTURE CONTEXT - A processor saves micro-architectural contexts to increase the efficiency of code execution and power management. Power management hardware during runtime monitors execution of a code block. The code block has been compiled to have a reserved space appended to one end of the code block. The reserved space includes a metadata block associated with the code block or an identifier of the metadata block. The hardware stores a micro-architectural context of the processor in the metadata block. The micro-architectural context includes performance data resulting from a first execution of the code block. The hardware reads the metadata block upon a second execution of the code block and tunes the second execution based on the performance data. | 10-30-2014 |
20150091550 | ENERGY MONITOR FOR A POWER SOURCE - Examples are disclosed for an integrated circuit (IC) device coupled to a battery-operated power supply unit, such as an IC in a mobile computing device or wireless phone, to accurately determine energy usage drawn from the power supply unit under rapidly dynamic circumstances. A current sense signal of a power line from the power supply unit is digitized. The digitized current sense is added to an accumulator at a rate that is approximately proportional to a voltage of the power line from the power supply unit. The accumulator is then outputted and scaled to units relevant to energy measurements. The energy measurement is used to estimate remaining battery life. Triggering the digitization of the current sense signal may be by use of a pulse generation circuit, or by use of an overflow indicator of an accumulator for a digitized voltage sense signal. Other examples are described and claimed. | 04-02-2015 |
20150095673 | Controlling A Turbo Mode Frequency Of A Processor - In one embodiment, the present invention includes a multicore processor with a power controller to control a frequency at which the processor operates. More specifically, the power controller can limit a maximum operating frequency of the processor to less than a configured maximum operating frequency to enable a reduction in a number of frequency transitions occurring responsive to power state events, thus avoiding the overhead of operations performed in handling such transitions. Other embodiments are described and claimed. | 04-02-2015 |