Patent application number | Description | Published |
20130261822 | Power Factor - A method, an apparatus and an article of manufacture for improving power factor. The method includes collecting consumption data of at least one appliance, building a consumption profile for each of the at least one appliance based on the consumption data collected, reconstructing reactive power consumption of each of the at least one appliance based on the consumption profile for each of the at least one appliance, and computing a schedule for each of the at least one appliance in accordance the reactive power consumption of each of the at least one appliance to improve power factor while respecting at least one constraint. | 10-03-2013 |
20130261824 | Power Factor - A method for improving power factor includes collecting consumption data of at least one appliance, building a consumption profile for each of the at least one appliance based on the consumption data collected, reconstructing reactive power consumption of each of the at least one appliance based on the consumption profile for each of the at least one appliance, and computing a schedule for each of the at least one appliance in accordance the reactive power consumption of each of the at least one appliance to improve power factor while respecting at least one constraint. | 10-03-2013 |
20140039843 | WIND FARM LAYOUT IN CONSIDERATION OF THREE-DIMENSIONAL WAKE - Methods and arrangements for determining a layout and dimensions of a wind farm. A three-dimensional wake model for a wind farm is generated, and a positioning and dimensioning model for turbines of the wind farm is developed based on the three-dimensional wake model. | 02-06-2014 |
20140114487 | ENFORCING FINE-GRAINED DEMAND MANAGEMENT IN SMART GRIDS - Methods and arrangements for enforcing demand management in electrical grids. Electrical power is provided from an electrical network to at least one substation, the electrical network including an electrical generation grid in communication with the at least one substation, the at least one substation comprising a power limiter. Electrical power is provided from the at least one substation to a plurality of locations, each location comprising a smart power demand manager which controls electrical power delivery to at least power-drawing item. There is detected, with respect to the electrical network, at least one discrepancy comprising at least one of: an unbalanced network load; an unscheduled network load; a change in network supply; and a change in network condition. In response to such detection, electrical power delivery is controlled via employing the power limiter of the at least one substation in collaboration with at least one smart power demand manager. | 04-24-2014 |
20140222375 | CONDITION-BASED MANAGEMENT OF POWER TRANSFORMERS - Methods and arrangements for managing implementation of a power transformer. There is determined at least one parameter currently relating to operation of a transformer, as well as a revenue value currently assigned to the transformer. There is determined a depreciation value currently assigned to the transformer. There is determined a power output for the transformer for a future time slot that increases total revenue with respect to a life cycle of the transformer, the power output being determined based on the at least one parameter, the revenue value, and the depreciation value. | 08-07-2014 |
20150066435 | SYSTEM AND METHOD FOR COGNITIVE ALARM MANAGEMENT FOR THE POWER GRID - Systems and methods for cognitive alarm management in a power grid are described. In one embodiment, sensor measurements are transformed to determine the state of a power grid. Given current state information relating to the power grid, various analyses of the alarms may be conducted to produce various rankings of the alarms (e.g., by severity, graph analyses, etc.). In an embodiment, using power flow analysis, an optimal ranking is identified from the rankings in which a causal alarm is prioritized for resolution. Given the resolution of the causal alarm, remaining alarms (either all or a sub-set) may be resolved without further action. Thus, an embodiment provides an appropriate ranking of alarm conditions in a power grid such that the optimal resolution of alarms may be achieved. Other variants and embodiments are broadly contemplated herein. | 03-05-2015 |
20150149396 | NON-TECHNICAL LOSS DETECTION AND LOCALIZATION - Embodiments of the present invention provide a system, method, and computer program product to detect and localize non-technical losses in an energy distribution system. A computing device determines the energy consumption of a link and/or node that is associated with an energy grid. The computing device determines the mismatch between the determined energy consumption of the link and/or node and the predicted energy consumption of the link and/or node. The computing device also determines the location of unauthorized energy consumption within the energy that is associated with the mismatch. | 05-28-2015 |
20150349529 | Distributed Phase Balancing - Methods, systems, and computer program products for distributed phase balancing are provided herein. A method of use in connection with a distribution network having a phase imbalance includes determining one or more power consumption parameters associated with a given entity of the distribution network; determining one or more power supply parameters associated with the given entity of the distribution network; and computing, based on said one or more power consumption parameters and said one or more power supply parameters, at least one of (i) a level of power consumption increase and/or decrease and (ii) a level of power supply increase and/or decrease associated with one or more devices of the given entity to remedy the phase imbalance within the distribution network. | 12-03-2015 |
20160094066 | INTELLIGENT COMPOSABLE MULTI-FUNCTION BATTERY PACK - A method of operating a battery pack includes identifying a plurality of batteries in the battery pack, estimating a state of charge of each of the plurality of the batteries, obtaining a plurality of parameters of each of the plurality of the batteries, and determining, selectively, a charge current or a discharge current for each of the plurality of batteries using the state of charge and the plurality of parameters of each of the plurality of the batteries. | 03-31-2016 |
Patent application number | Description | Published |
20080233962 | TECHNIQUES FOR ALWAYS ON ALWAYS CONNECTED OPERATION OF MOBILE PLATFORMS USING NETWORK INTERFACE CARDS - An embodiment of the present invention provides an apparatus, comprising a network interface (NIC) card operable in communication with a mobile platform to monitor network traffic and perform filtering to enable decreased system resource use in said mobile platform when in an Always On Always Connected (AOAC) state. | 09-25-2008 |
20100169630 | Pre-boot Recovery of a Locked Computer System - Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed. | 07-01-2010 |
20110154030 | Methods and apparatus for restoration of an anti-theft platform - Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed. | 06-23-2011 |
20130346740 | SECURE USER PRESENCE DETECTION AND AUTHENTICATION - This disclosure relates generally to a system and method for authenticating an electronic device may comprise a server configured to transmit an encrypted object, the encrypted object having an image file format, to the electronic device, the encrypted object being encrypted based on a certificate, the electronic device operatively coupled to the server and comprising a processor registered with the server to create a secured communication link between the processor and the server, wherein the certificate corresponds to the processor, the processor having a cryptographic engine configured to decrypt the encrypted object to result in a decrypted graphic, and a user interface operatively coupled to the processor. The user interface may be configured to display the decrypted graphic and receive a user input responsive to the decrypted graphic. The server may authenticate the electronic device based, at least in part, on the user input. | 12-26-2013 |
20140297823 | CLOUD BASED VIRTUAL MOBILE DEVICE - Systems and techniques for a cloud based virtual mobile device are described herein. A virtual mobile device may be initialized to correspond to a physical mobile device. The virtual mobile device may include a representation of a physical mobile device operating environment. A service request for the physical mobile device operating environment may be received. The service request may be fulfilled using the representation of the physical mobile device operating environment. | 10-02-2014 |
Patent application number | Description | Published |
20090248827 | METHOD AND APPARATUS FOR CONNECTION - AND NETWORK - NETWORK-INDEPENDENT ON-LINE AND OFF-LINE THEFT-MANAGEMENT PROTOCOL AND SERVICE FOR PROCESSOR BASED DEVICES - A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device. | 10-01-2009 |
20090287938 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 11-19-2009 |
20110076986 | THEFT DETERRENT TECHNIQUES AND SECURE MOBILE PLATFORM SUBSCRITION FOR WIRELESSLY ENABLED MOBILE DEVICES - Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed. | 03-31-2011 |
20110078791 | Using chipset-based protected firmware for host software tamper detection and protection - A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system. | 03-31-2011 |
20110238970 | System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described. | 09-29-2011 |
20120173877 | METHOD AND APPARATUS FOR BUILDING A HARDWARE ROOT OF TRUST AND PROVIDING PROTECTED CONTENT PROCESSING WITHIN AN OPEN COMPUTING PLATFORM - A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software. | 07-05-2012 |
20120233036 | METHOD AND APPARATUS FOR ENABLING PURCHASE OF OR INFORMATION REQUESTS FOR OBJECTS IN DIGITAL CONTENT - A client computing system renders digital content (such as, for example, a movie or TV program) for a user. Based on the user's interest, the user may select an object image in a video frame of a sequence of video frames of the digital content being rendered. The user input data indicating the object image selection may be sent to a service provider server coupled to the client computing system over a network via a secure communications channel. The server obtains information about an object corresponding to the user-selected object image. The server sends the object information to the client computing system for display to the user. The object may be an object in the physical world, such as a consumer good. The object information may include information enabling the user to purchase the object. | 09-13-2012 |
20120250858 | APPLICATION USAGE CONTINUUM ACROSS PLATFORMS - A system for application usage continuum across client devices and platforms includes a first client device configured to execute a first instance of an application and a second client device configured to execute a second instance of the application. The first client device is configured to receive an indication to transfer operation of the first instance of the application running on the first client device to the second instance of the application on the second client device. The first client device is further configured to generate state information and data associated with execution of the first instance of the application on the first client device and cause the state information to be sent to the second client device to enable the second instance of the application on the second client device to continue operation of the application on the second client device using the state information from the first client device. | 10-04-2012 |
20120284499 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 11-08-2012 |
20130283392 | METHOD AND APPARATUS FOR POLICY-BASED CONTENT SHARING IN A PEER TO PEER MANNER USING A HARDWARE BASED ROOT OF TRUST - Securely sharing content between a first system and a second system is provided. A hardware-based root of trust is established between the first system and a server. Content requested by a user and an encrypted license blob associated with the content is received by the first system from the server. A first agent on the first system connects with a second agent on the second system. The encrypted license blob and a sub-license request are sent from the first agent to a security processor on the first system. The first security processor decrypts the encrypted license blob, validates the sub-license request, and if allowed, creates a sub-license to allow the second system to play the content. The first security processor sends the sub-license to a security processor on the second system. The first system provides access to the content to the second system for future playback according to the sub-license. | 10-24-2013 |
20140112471 | Method and Apparatus for Building a Hardware Root of Trust and Providing Protected Content Processing Within an Open Computing Platform - A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software. | 04-24-2014 |
20140280840 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A UNIVERSAL PERSISTENCE CLOUD SERVICE - Methods, systems, and computer program products that relate to managing persistence information of client devices for services registered with a persistence cloud service. A method from the perspective of a computing device associated with a registered service may include receiving, from a client device, a device identifier that identifies the client device to the registered service. The method further may include requesting, from a persistence cloud server associated with the persistence cloud service, persistence information associated with the device identifier. The method may also include receiving the persistence information, determining a level of service to provide to the client device based on the persistence information, and providing the level of service to the client device. The computing device may, for example, be a server associated with the registered service, or may, for example, be a router. | 09-18-2014 |