Methods for analyzing text corpora for inferring potential threats and risks are becoming ever more established. While the present achievements are based on an analyst-driven analytical process, the embodiments provide for a semantic analysis of dynamic developments in changing text corpora, involving an acquisition of text corpora, application of a probabilistic concept model, and providing a similarity remapping.
The invention relates to a method (100) for controlling a traffic system (1) with a plurality of intersections (3) with switchable traffic light systems (5) and road sections (4) lying between the intersections (3). The method (100) has the following steps: detecting (101) traffic loads for multiple relevant road sections (4); determining (102) a local stress function for each relevant road section (4) on the basis of the detected traffic loads for each relevant road section (4); determining (103) a global stress function for the entire traffic system (1) on the basis of the local stress functions; determining (104) optimized switching times for the traffic light systems (5) of the intersections (3) lying on the relevant road sections (4) using a quantum concept processor (11), wherein the optimized switching times are determined such that the global stress function assumes the smallest discoverable value; and switching (105) the traffic light systems (5) according to a switching model which is based on the optimized switching times. The invention additionally relates to a corresponding device (7), a computer program, and a computer-readable storage medium.
The invention relates to a method for specifying a power limit of a processor (2) of a computer system (1). The total power of the computer system (1) or a variable (II) which corresponds to the total power of the computer system (1) is acquired as a total power variable. Furthermore, the power of the processor (2) or a variable corresponding to the power of the processor (2) is acquired as a processor power variable. The difference between the total power variable and the processor power variable is determined, and a power limit of the processor (2) is ascertained using the difference between the total power variable and the processor power variable. The ascertained power limit of the processor (2) is set in the processor (2). In this manner, a dynamic adaptation of the power limit of the processor (2) is made possible on the basis of the additional power consumption in the computer system (1).
G06F 1/3206 - Monitoring of events, devices or parameters that trigger a change in power modality
G06F 1/3234 - Power saving characterised by the action undertaken
4.
Method for a secured start-up of a computer system, and configuration comprising a computer system and an external storage medium connected to the computer system
A method of starting-up a computer system includes accessing a second storage area of a storage in which program data are stored; loading and executing the program data from a second storage area; mounting an external storage medium connected to the computer system, wherein a file system key that decrypts a file system data is stored on an external storage medium, wherein the file system key is encrypted on the external storage medium; loading the encrypted file system key from the external storage medium into the computer system; decrypting the encrypted file system key by a key stored in the second storage area; setting the decrypted file system key in a cryptographic module established by the start-up process; and decrypting and loading file system data of the encrypted file system by the cryptographic modules by the set file system key, whereby the computer system is started up completely.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
The invention relates to a mainboard (1), which is designed to receive an exchangeable input-output module (2) for providing an input-output interface for an external device, to provide an interface voltage on the input-output module (2), and to receive an exchangeable supply module (3) for providing a supply voltage for the external device. The mainboard (1) has an integrated changeover device (4) for changing over between the interface voltage provided by the mainboard (1) and the supply voltage provided by the supply module (3). The mainboard (1) is designed to provide the supply voltage provided by the supply module (3) via an integrated conductor (5a) by means of the changeover device (4) alternatively to the interface voltage on the input-output module (2).
The invention relates to a method (30) for generating a representation of a program logic (PL), comprising: capturing (S1) first program code in a low-level programming language, the program code having been generated by compiling a program logic (PL) defined in a high-level language; dividing (S2) the captured first program code into a sequence of code portions on the basis of a predefined set of at least partially parameterized code patterns specific to a compiler, specific parameter values being captured for each code portion, and a terminal symbol of an intermediate language being assigned to each code portion; assigning (S3) the assigned terminal symbols (TS) to nonterminal symbols (NTS) of the intermediate language (IL) on the basis of a context-free grammar, the entirety of the assigned nonterminal symbols (NTS) describing the program logic (PL) of the first program code in the intermediate language (IL); and generating (S4) a representation of the program logic (PL) independent of the first processor architecture on the basis of the assigned nonterminal symbols (NTS) of the intermediate language (IL) and the captured parameter values.
EAEEE) to the voltage regulator (6) if an impedance of the voltage regulator (6) exceeds a predetermined impedance value. The invention also relates to an operating method for such a protection circuit (2) and to a computer system.
G06F 1/28 - Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
G05F 1/569 - Regulating voltage or current wherein the variable actually regulated by the final control device is DC using semiconductor devices in series with the load as final control devices sensing a condition of the system or its load in addition to means responsive to deviations in the output of the system, e.g. current, voltage, power factor for protection
8.
IOT COMPUTER SYSTEM AND ARRANGEMENT HAVING SUCH AN IOT COMPUTER SYSTEM AND AN EXTERNAL SYSTEM
The invention relates to an IoT computer system (1), in particular what is known as an edge computer system, in which a first virtual operating environment (2) and a second virtual operating environment (3) are set up, wherein the virtual operating environments (2, 3) are logically separate from one another, and an arrangement having such an IoT computer system (1) and at least one external system or device (13, 14, 15, 16) to which the IoT computer system (1) is connected.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 29/06 - Communication control; Communication processing characterised by a protocol
9.
METHOD FOR SECURELY BOOTING UP A COMPUTER SYSTEM, AND ASSEMBLY COMPRISING A COMPUTER SYSTEM AND AN EXTERNAL STORAGE MEDIUM CONNECTED TO THE COMPUTER SYSTEM
The invention relates to a method for securely booting up a computer system having an encrypted file system. The method comprises the following steps: initiating a startup process of the computer system by accessing program data necessary for the startup process; loading and executing the program data; linking an external storage medium connected to the computer system, wherein a file system key for decrypting file system data of the encrypted file system is stored on the external storage medium, the file system key on the external storage medium being encrypted; loading the encrypted file system key from the external storage medium into the computer system; decrypting the encrypted file system key by means of a key stored in the computer system; setting the decrypted file system key in a cryptography module established by the startup process; and decrypting and loading file system data of the encrypted file system by the cryptography module by means of the set file system key, as a result of which the computer system is completely booted up.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
The invention relates to a computer system (1) having at least one interface (2), in particular at least one USB type C interface. The computer system (1) comprises at least one apparatus for voltage monitoring (9) and at least one interface control apparatus (10) comprising a signalling circuit (16). The interface control apparatus (10) is set up to restrict a power delivery via the interface to a predetermined power level if the apparatus for voltage monitoring (9) registers a fall in a supply voltage (U) of the computer system (1) below a first limit value (G1), and the signalling circuit (16) is set up to signal the restriction of the power delivery to a peripheral device (3). Moreover, the invention relates to a method for limiting a power delivery via at least one interface (2) of a computer system (1), in particular at least one USB type C interface.
The invention relates to a computer system architecture (1) comprising a virtual environment wherein the virtual environment comprises at least one virtual machine (VM) and at least one virtual network bridge (br) of at least one virtual communication sub-network (3, 31, 32, 33, 34). The virtual machine (VM) can communicate with other virtual machines (VM) within the virtual communication sub-network (3, 31, 32, 33, 34), however the establishment of a connection of the virtual machine (VM) in an external physical network (N, N1, N2) which is different from the virtual communication sub-network (3, 31, 32, 33, 34) is not possible. Network ports (4) of the physical computer system (2), on which the virtual environment is designed, allow a communication to be transmitted within the virtual communication sub-network (3, 31, 32, 33, 34) using the external physical network (N, N1, N2), preventing however, a connection being established independently of the virtual communication sub-network (3, 31, 32, 33, 34) from the external physical network (N, N1, N2) to the physical computer system (2).
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
12.
CONTROL UNIT, COMPUTER SYSTEM, EXTERNAL DISPLAY DEVICE, ASSEMBLY, AND METHOD FOR OPERATING A CONTROL UNIT
The invention relates to a control unit (100) for controlling a voltage supply for an external display device (200). The control unit (100) comprises a first graphics interface (101) for connecting the external display (200), the first graphics interface having a connection (102), which is designed to output a supply voltage for the external display device (200) and is also designed to output an auxiliary voltage instead of the supply voltage. The control unit (100) also comprises a control device (103), which is connected to the first graphics interface (101) and is designed to identify a display device (200) connected to the first graphics interface (101). The control unit (100) also comprises a multiplexer, which is designed to switch a current path in accordance with a control signal from the control device (103) such that either the auxiliary voltage or the supply voltage is present at the connection (102). The control device (103) is also designed to apply the supply voltage to the connection (102) if an external display device (200) that can draw the supply voltage via an interface input (202) of a graphics interface (201) of the external display device (200) has been identified. The invention further relates to a computer system (300), to an external display device (200), to an assembly, and to a method for operating the control unit (100).
G09G 5/00 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
G06F 1/26 - Power supply means, e.g. regulation thereof
G09G 5/36 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators characterised by the display of individual graphic patterns using a bit-mapped memory
13.
COMPUTER SYSTEM, EXPANSION COMPONENT, AUXILIARY SUPPLY COMPONENT, AND USE THEREOF
The invention relates to a computer system (1) comprising a power supply unit for providing operating energy to the computer system (1) and a system circuit board (2) which is connected to the power supply unit and which comprises a plurality of expansion terminals (7) for connecting a corresponding plurality of expansion components, wherein each expansion terminal (7) is assigned a fixed output budget for supplying a corresponding expansion component. The computer system further comprises a first expansion component which is connected to a first expansion terminal (7a) of the system circuit board (2) and at least one auxiliary supply component which is arranged in the region of a second expansion terminal (7b) of the system circuit board (2). The auxiliary supply component is electrically connected to the first expansion component and is designed to dispense at least one part of the output budget assigned to the second expansion terminal (7b) to the first expansion component. The invention additionally relates to an expansion component and an auxiliary supply component for use in such a computer system (1).
G06F 1/26 - Power supply means, e.g. regulation thereof
14.
METHOD FOR UNBLOCKING EXTERNAL COMPUTER SYSTEMS IN A COMPUTER NETWORK INFRASTRUCTURE, DISTRIBUTED COMPUTING NETWORK WITH A COMPUTER NETWORK INFRASTRUCTURE OF THIS TYPE, AND COMPUTER PROGRAM PRODUCT
The invention relates to a method for unblocking external computer systems for communication with secured processing computer systems in a computer network infrastructure. An instruction packet is transmitted from an external computer system to a switching computer system within the computer network infrastructure. A random port number of a network port is then generated by the switching computer system, and the random port number is transmitted to a processing computer system. The processing computer system at least temporarily keeps predetermined network ports closed, so that access by the external computer system via the network by means of these network ports is prevented, the random port number and/or other information being able to be interchanged between the processing computer system and the switching computer system, however. Subsequently, the network port corresponding to the random port number is unblocked by the processing computer system, and a connection to the unblocked network port of the processing computer system is set up by the external computer system.
A system includes a first network with a first computer and a first release computer; a second network with a second computer and a second release computer; a perimeter network with a first data server and a second data server; wherein the first network and the second network connect via a firewall to the perimeter network; the first data server has a storage area accessible to the first computer and a storage area inaccessible to the first computer and the second computer; and the system is configured to carry out the method.
The invention relates to a method for the secure booting of a computer system (10). In a first step, program code of at least one boot loader for loading a kernel is executed. In a second step, the program code of the boot loader is checked, after at least one part of the program code of the boot loader has been executed. The booting of the computer system can be interrupted if a result of the checking of the program code of the boot loader indicates a manipulation of the program code of the boot loader. The invention also relates to a computer system comprising a memory for a program code of a boot loader.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
17.
METHOD FOR EXECUTING A SECURITY-RELEVANT APPLICATION, COMPUTER SYSTEM AND ARRANGEMENT
The invention relates to a method for executing a security-relevant application on a computer system (12, 12'). In this case, a data network connection is established between the computer system (12, 12') and a server (11). After the data network connection has been established, the computer system (12, 12') searches for at least one predetermined file (14) on the server (11). If the at least one predetermined file (14) has been found, a signature (15) of the at least one predetermined file (14) is checked. The at least one predetermined file (14) is downloaded if the checking of the signature (15) was successful. The at least one predetermined file (14) which has been downloaded is executed. A system file is changed in this case. If the at least one predetermined file (14) has been executed, the security-relevant application is then started. The invention also relates to a computer system (12, 12', 12'') having a data network interface (13) and to an arrangement comprising a computer system (12, 12') and a server (11).
The invention relates to an embedded system (1) having a data processing apparatus (2) for executing program code and a sequencing controller (6) for switching components (2, 3) of the embedded system (1) on and off. In this case, the data processing apparatus (2) and the sequencing controller (6) are connected to one another by means of a single control signal line (5). The sequencing controller (6) is configured to take a time profile for a control signal received via the control signal line (5) as a basis for either switching off or restarting the embedded system (1). The invention furthermore relates to a method of operation for a sequencing controller (6) and to the use of the embedded system (1) or of the method of operation in a cash register system.
The invention relates to an energy supply arrangement comprising a supply input which provides a first voltage (VIN) with a maximum output current, a first voltage converter, which is connected to the supply input, for converting the first voltage (VIN) into a second voltage, and a temporary store (12), which is connected to the first voltage converter, for temporarily storing electric energy of the second voltage. The arrangement further comprises at least one first supply output, which is connected to the supply input, for providing the first voltage (VOUT1), at least one second supply output, which is connected to the temporary store (12), for providing another supply voltage (VOUT2), a measuring device for measuring a current received via the supply input and/or a current output via the first supply output (8), and a control circuit (22). The control circuit (22) is designed to actuate the first voltage converter on the basis of the measured current such that the current output via the at least one first supply output together with the current received by the first voltage converter do not exceed the maximum output current. The invention additionally relates to a checkout system (1) with a powered USB host adapter (35).
The invention relates to a computer system (10) having an RFID interface (11). The computer system (10) is in this case set up to request an authentication via the RFID interface (11) in addition to capturing a boot command, and to boot the computer system (10) only when the authentication has been performed successfully. The invention furthermore relates to a method for protecting a computer system (10) having an RFID interface (11).
G06F 21/43 - User authentication using separate channels for security data wireless channels
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 29/06 - Communication control; Communication processing characterised by a protocol
The invention relates to a computer system (1) having - a sheet-metal support (2) and a wall (3) which is arranged perpendicularly relative to the sheet-metal support (2); - a printed circuit board (4) with a plug connector (5), said printed circuit board being fixed parallel to the sheet-metal support (2); - a plug-in card (6) with a slotted angle (8) which is fixed to the plug-in card (6) in the region of a first face (7) of the plug-in card (6), said plug-in card (6) being electrically coupled to the plug connector (5) and being fixed to the wall (3) by means of the slotted angle (8); and - a retaining bracket (12), a first end region (13) of which is fixed to the sheet-metal support (2) and a second end region (14) of which surrounds the plug-in card (6) in the region of a second face (9) opposite the first face (7) such that the plug-in card (6) is mechanically secured to the sheet-metal support (2) in the region of the second face (9) by means of the retaining bracket (12). The invention further relates to a retaining bracket (12).
H05K 7/14 - Mounting supporting structure in casing or on frame or rack
22.
METHOD FOR UNBLOCKING EXTERNAL COMPUTER SYSTEMS IN A COMPUTER NETWORK INFRASTRUCTURE, DISTRIBUTED COMPUTING NETWORK WITH A COMPUTER NETWORK INFRASTRUCTURE OF THIS TYPE, AND COMPUTER PROGRAM PRODUCT
The invention relates to a method for unblocking external computer systems for communication with secured processing computer systems in a computer network infrastructure. An authentication packet is transmitted from an external computer system to a switching computer system within the computer network infrastructure. The authentication packet contains signed information for authenticating the external computer system and/or the user thereof. In addition, the authentication packet is transmitted by the switching computer system to at least one processing computer system within the computer network infrastructure. The processing computer system keeps specific network ports closed, at least temporarily, so that an access to the network via this network port is prevented, wherein the processing computer system can, however, access the switching computer system in order to pick up the authentication packet from the switching computer system. An unblocking of a selective network port is subsequently carried out by the processing computer system and an establishment of a link to the processing computer system by the external computer system.
The invention relates to a method for distributing tasks between secured computer systems in a computer network infrastructure. The method comprises the following steps: parallel receiving of a task file via a plurality of switching computer systems; negotiating of a primary switching computer system from the group of switching computer systems for further processing of the task file; transferring of task information out of the task file from the primary switching computer system to a primary processing computer system from a plurality of processing computer systems; and performing of at least one action in the primary processing computer system on the basis of the transferred task information. In addition, all members of the group of processing computer systems keep the network ports predefined for said method closed, so that no connection is allowed to be established to the processing computer systems from outside and, therefore, access via a network by means of said network ports is prevented. Each of the processing computer systems can establish a connection to each of the switching computer systems in order to retrieve corresponding task information out of the task file from the switching computer system.
The invention relates to a method for communication between secured computer systems (Zone1, Zone2) in a computer network infrastructure. Data packets are transmitted between a plurality from a group of processing computer systems (10, 11), such transmission being performed by means of at least one switching computer system (1, 2). The data packets are advantageously routed via at least one relay system (5, 6, 7) that is connected upstream or downstream of the switching computer system (1, 2) in a transmission path for the data packets. All from the group of processing computer systems (10, 11) keep predetermined network ports at least temporarily closed, so that access to a respective processing computer system (10, 11) via a network by means of these network ports is prevented. The relay system (5, 6, 7) keeps predetermined network ports closed at least to the switching computer system (1, 2) that has the relay system (5, 6, 7) connected downstream, so that access to the relay system (5, 6, 7) via a network by means of these network ports is prevented. In addition, a computer network infrastructure and a computer program product for carrying out a corresponding method are described.
The invention relates to a routing method for forwarding task instructions in a computer network infrastructure. For this purpose, routing information is processed, which defines at least one routing to one or more compulsorily linked computer systems along a communication path between a key computer system, a group made of one or more brokering computer systems, and a target computer system within the computer network infrastructure. A task file, which comprises the routing information, is transmitted by means of the routing information along the communication path from the key computer system by means of the group of brokering computer systems to the target computer system and executed there. The key computer system and also the target computer system keep predetermined network ports closed in such a way that no connection can be externally established to the key computer system or to the target computer system, wherein, however, the key computer system or the target computer system can establish a connection to a brokering computer system in order to store a data file in the brokering computer system or to collect such a data file therefrom.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
26.
METHOD FOR FORWARDING DATA BETWEEN COMPUTER SYSTEMS, COMPUTER NETWORK INFRASTRUCTURE, AND COMPUTER PROGRAM PRODUCT
The invention relates to a method for forwarding data between secured computer systems in a computer network structure. Data packets are transmitted along a predetermined communication path structure from a source computer system to al least one target computer system by means of a group of task servers, wherein the communication path structure comprises a plurality of parallel partial paths. The source computer system and also the target computer system keep predetermined network ports closed, in such a way that no connection can be externally established to the source computer system or to the target computer system, wherein, however, the source computer system or the target computer system can establish a connection to a respective task server in order to store data packets in the task server or to collect them therefrom. The method has the advantage that a high availability or disaster capability is combined with data security through encapsulated source and target computer systems.
The invention relates to a power supply arrangement (10) for an electronic device, comprising a first switching converter (11) having a first regulating circuit (16) for providing a regulated output voltage (DC-out) to a node point (18) and a second switch converter (12) having a second regulating circuit (17) for alternatively providing the regulated output voltage (DC-out) to the node point (18). The power supply arrangement (10) furthermore comprises a control circuit connected to the first regulating circuit (16) and the second regulating circuit (17). The control circuit is configured to hold an existing regulating state of the first regulating circuit (16) upon a switching of the power supply from the first switching converter (11) to the second switching converter (12) and to deactivate the first switching converter (11) and, upon switching the power supply from the second switch converter (12) to the first switch converter (11), to reactivate the first switch converter (11) using the held regulating state.
H02J 9/06 - Circuit arrangements for emergency or stand-by power supply, e.g. for emergency lighting in which the distribution system is disconnected from the normal source and connected to a standby source with automatic change-over
H02M 3/335 - Conversion of DC power input into DC power output with intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode to produce the intermediate AC using devices of a triode or a transistor type requiring continuous application of a control signal using semiconductor devices only
A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data network link via the data network connection as the computer system is starting up and said security device further receives access data either via the data network link or via the reading device and the input component, and said security device compares the received access data with a data record stored in a firmware on a memory element and boots the computer system if the comparison was successful.
H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 29/06 - Communication control; Communication processing characterised by a protocol
The invention relates to a method for destroying data contents of a data file. The method comprises the following steps: - storing the data file in a previously defined file format; - integrating an algorithm into the date file for the destruction of data contents presenting previously defined trigger criteria; - examining the previously defined trigger criteria when the data file is opened; and - destroying data contents if at least one previously defined trigger criterion is satisfied.
The invention relates to a method for improved access to a main memory (1) of a computer system. In this case, a main memory (1) comprising at least one first memory (14) according to a first memory type (2) and one second memory (10) according to a second memory type (10) is provided, and a choice between the first memory (14) and the second memory (10) is provided for access to the main memory (1). The choice is used to distinguish between access to the first memory (14) and access to the second memory (10) on the basis of the particular access behaviour of the first memory (14) and of the second memory (10). The choice is advantageously provided by a running application program (6). A computer system and a computer program product are also described, wherein the computer system is set up to carry out a corresponding method and the computer program product carries out a corresponding method during the execution thereof on a computer system.
The invention relates to an operating method (14) for a system (1) for securely supplying a file from a first computer (5) in a first network (2) for retrieval by a second computer (7) in a second network (4), both the first network (2) and the second network (4) being connected to a perimeter network (3) via a firewall (11, 12). The invention further relates to a system (1).
The invention relates to a method for storing biometric access data for a computer system (10) having biometric access control. The method comprises the following steps: recording biometric access data; checking if biometric access data are stored and associated with a user profile after biometric access data have been recorded; recording and examining non-biometric access data of the user profile if the check was negative; and storing the recorded biometric access data for the user profile. The invention further relates to a computer system (10) and to a data memory.
The invention relates to a method for communicating between secured computer systems (WS, WS1, WS2, PS) comprising the steps: augmenting a prepared task file with specified information in a source computer system (WS, WS1, WS2); transmission of the augmented task file from the source computer system (WS, WS1, WS2) to a task computer system (TS1, TS2); transmission of the augmented task file form the task computer system (TS1, TS2) to a target computer system (PS); verification of the validity of the augmented task file by the target computer system (PS); execution of at least one task in the target computer system (PS) on the basis of the augmented task file, in the event that verification of the validity of the augmented task file is successful; wherein the source computer system (WS, WS1, WS2) and also the target computer system (PS) keep specified network ports closed, at least temporarily, so that access via a network by means of these network ports is prevented. The advantage of the method over conventional security solutions consists in that an information exchange is possible despite encapsulated source- or target-systems by means of the task computer system.
The invention relates to a method for starting up a production computer system (1). The method comprises the steps: collecting information about system data of the production computer system (1), transmitting the information about the system data of the production computer system (1) to a key computer system (2) and comparing the collected information with comparison information stored in the key computer system (2), transmitting a pass phrase from the key computer system (2) to the production computer system (1) for decrypting encrypted file system data inside the production computer system (1) if the comparison is successful, decrypting the encrypted file system data by means of the pass phrase, and loading the encrypted file system data and starting up the production computer system (1).
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
The invention relates to a cooling arrangement (3) for a computer system (1) comprising - a motherboard (4) with a first heat-generating component and a second heat-generating component; - a first heat sink (6) thermally coupled to the first heat-generating component and a second heat sink (7) thermally coupled to the second heat-generating component; and - a first fan (8) for generating an air flow in the direction of the first heat sink (6); wherein - the second heat sink (7) is arranged downstream of the first heat sink (6) in the flow direction of the air flow generated by the first fan (8); and - an air scoop (10) is arranged between the first heat sink (6) and an outlet opening (9) of the first fan (8) in such a way that a first part of the generated air flow is supplied to the first heat sink (6) via the air scoop (10) and a second part of the generated air flow is circulated around the first heat sink (6) via the air scoop (10).
The invention relates to a display device (110, 410) comprising interface circuitry configured for receiving a display signal from an external computing device (170, 470), a display screen (150) configured for displaying the received display signal and an energy management function configured for controlling the operating state of the display device (110, 410). The display device (110, 410) further comprises a sensor (160) configured for providing at least one control signal indicative of the presence of a user in a predefined area in front of the display screen (150) and a control unit configured for selecting an energy saving mode from a plurality of energy saving modes based at least on the control signal provided by the sensor (160). The energy management function is configured to control the operating state based on the selected energy saving mode,and the interface circuitry is configured for transmitting control information regarded a determination of an operating state of the external computing device (170, 470)back to the external computing device (170, 470). The invention also relates to a computer system (100, 400) comprising such a display device (110, 410) and a method for operating a computer system (100, 400).
The invention relates to a method for accessing a physically secured rack (1). A task identification (task-PIN) is assigned by means of a key computer system (2) and specifies a task for access to the rack (1) to an administrator (A, B, C, D). The task identification (task-PIN) is subsequently transmitted to the administrator (A, B, C, D) and to an access control unit (4) for the rack (1). In addition, a query and verification of the task identification (task-PIN) is carried out and a query and verification of a personal access identification (ID) of the administrator (A, B, C, D) is carried out by the access control unit (4). A physical security access system for the rack (1) is released in the case where both previously mentioned verification steps were successful. The method has the advantage that access to the rack (1) is not exclusively possible through an entity (Administrator) outside of the rack (1), but instead must be additionally authorized by an entity at or in the rack (1) (access control unit) on the basis of identification assigned specifically for the task.
The invention relates to a POSIX-compatible file system (2) comprising at least one directory (A) and a plurality of files (a1, a2) stored in the directory (A), wherein each file (a1, a2) has an associated inode (7) with metadata about the respective file (a1, a2), and the directory (A) comprises an association between file names (14) of the plurality of files (a1, a2) and the inode (7) respectively associated with a file (a1, a2). The metadata about the respective file (a1, a2) comprises at least the file names (14) of the associated file (a1, a2) and/or information about the at least one directory (A). The invention additionally relates to a method for producing a file list (10), to the use of extended attributes of a POSIX-compatible file system (2) and to a memory apparatus (50).
An electronic access protection system for a computer system includes an access-protected apparatus having a firmware component and a data processing device that executes program code of the firmware component; a reading device coupled to the apparatus that reads chip cards; and at least one chip card having at least one chip-card-specific access procedure, wherein a predetermined memory area of the at least one chip card stores first information concerning the at least one chip-card-specific access procedure; and the at least one firmware component has executable program code that reads in and evaluates data from the at least one chip card and performs the at least one chip-card-specific access procedure for the at least one chip card on the basis of the first information stored in the first memory area.
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Ingest data for virtual volumes (V) is split into segments (B1, B2, B3, B4) of a size that can be buffered in main memory. Data deduplication processing then occurs directly on the segments (B1, B2, B3, B4) in main memory, without the need for disk I/O.
A transmitting device that transmits data signals into a primary electricity grid, wherein the transmitting device connects to a power input of a computer system and overlays signals returned by the computer system into the primary electricity grid by modulating random data signals onto a line connected to the power input of the computer system.
The invention relates to a circuit arrangement for current monitoring for a plurality of outputs (12V1,…,12V5) of a power supply unit. For each output (12V1,…,12V5), the circuit arrangement in this case comprises a comparison element (COMP1,... COMP5), which is set up to compare two input voltages, a current measuring resistor, which is arranged in a current path of the output, and a resistance component. In this arrangement, a first side of the current measuring resistor (RS1,... RS5) is connected to a first input of the comparison element (COMP1,... COMP5) and a second side of the current measuring resistor (RS1,... RS5) is connected to a second input of the comparison element (COMP1,... COMP5). In addition, the resistance component is connected to an input of the comparison element (COMP1,... COMP5). All resistance components of the plurality of outputs (12V1,…,12V5) are connected to a reference voltage circuit (RS) of the circuit arrangement via a reference voltage line (RL). The reference voltage circuit (RS) is set up to provide a constant reference voltage. The invention additionally relates to a power supply unit (13) having a plurality of outputs (12V1,…,12V5).
G01R 19/00 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof
G01R 19/165 - Indicating that current or voltage is either above or below a predetermined value or within or outside a predetermined range of values
G01R 19/25 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof using digital measurement techniques
G01R 31/36 - Arrangements for testing, measuring or monitoring the electrical condition of accumulators or electric batteries, e.g. capacity or state of charge [SoC]
44.
COMPUTER SYSTEM, USE OF A SYSTEM MANAGEMENT COMPONENT, AND METHOD FOR BIDIRECTIONALLY EXCHANGING DATA
The invention relates to a computer system (100) comprising a system component (110) with at least one expansion bus (160) and comprising at least one processor (130) coupled to at least one expansion bus (160) for running a program code of at least one operating system (122). The computer system (100) further comprises a system management component (180) arranged on the system component (110) and at least one memory unit (140, 182). The system management component (180) is coupled to the at least one expansion bus (160), and the at least one expansion bus (160) allows direct access to the at least one memory unit (140, 182). The system management component (180) has an interface (320) for implementing a protocol stack (300, 400) with a bidirectional transport layer via which a specified shared memory unit region (240) of the at least one memory unit (140, 182) is provided for exchanging data with the operating system (122). The invention further relates to the use of a system management component (180) for monitoring a computer system (100) and to a method for bidirectionally exchanging data between an operating system (122) and a system management component (180) of a computer system (100).
The invention relates to a power distribution unit (11), comprising at least one first port (13) for connecting the power distribution unit (11) to a power source and comprising a plurality of second ports (19) for connecting loads (12) to the power distribution unit (11). The power distribution unit (11) additionally comprises a plurality of interruption apparatuses (20), associated with the second ports (19), for interrupting a connection between the first port (13) and a respective second port (19a, 19b, 19c), and comprises at least one control unit that is coupled to the plurality of the second ports (19). The control unit is set up to use an interruption apparatus (20a) to interrupt a supply of power on a selected second port (19a) associated with the interruption apparatus (20a), to receive during the interruption a piece of information regarding an identifier of a load (12a) that is connected to the selected second port (19a) via a power supply line and, following reception of the information, to restore the supply of power on the selected second port (19a). The invention additionally relates to a computer arrangement having at least one power distribution unit (11) and also to a method for capturing port information for at least one power distribution unit (11).
The invention relates to a server insert (SE) for a server rack, which server insert has an insert housing (EG) with a housing floor (GB). The server insert (SE) further has at least one installation cage apparatus which is arranged within the insert housing (EG) on the housing floor (GB) and extends substantially over an entire width of the insert housing (EG). The server insert (SE) further has a printed circuit board (LP), in particular a backplane or midplane, which is fixed, substantially perpendicular to the housing floor (GB), to the installation cage apparatus in a force-fitting manner and is arranged on the housing floor (GB) in an interlocking manner, so that the printed circuit board (LP) mechanically reinforces the installation cage apparatus, and the insert housing (EG) is reinforced.
The invention relates to an assembly (AO) for a server insert of a server system which has an insert housing having a housing floor (GB). The assembly (AO) additionally has a power supply (NT) arranged on the housing floor (GB) having a plug contact (SK). A primary circuit board (HP) is arranged parallel to the housing floor (GB) within the insert housing. The assembly (AO) additionally has an angle plug (WS) which has a counter-plug contact (GS) and a connection region (AB), for connecting the power supply (NT) to the primary circuit board (HP), wherein, upon connection to the primary circuit board (HP), the angle plug (WS) is connected to the connection region (AB) at a first installation height (EH1) of the primary circuit board (HP) on a top side (OS) of the primary circuit board (HP) and, at a second installation height (EH2) of the primary circuit board (HP), is connected to a bottom side (US) of the primary circuit board (HP), such that a height equalization to the plug contact (SK) of the power supply (NT) is produced in each case. The invention further relates to an angle plug (WS).
The invention relates to a computer system (1), comprising a system component, at least one non-volatile mass memory and at least one power supply unit (3) for supplying power. In this arrangement, the computer system (1) has at least one system software component having an interface (23, 24) for selecting functions for saving power, which provides at least one function (25) for operating the computer system (1) in an absence mode (42), in which at least one first application (37) running on the computer system (1) can be addressed via a network connection. During operation of the computer system (1), at least one software component (16) is executed by an operating system (15) that is set up to stop at least one second application (38) upon recognising that a user is absent and to use the interface (23, 24) to call the function for operating the computer system (1) in the absence mode (42).
The invention relates to a main board (HP) for a computer system, in particular for a desktop PC, which main board (HP) is electrically connected to a tone generator (TG) for emitting tone signals, in particular to a piezo sound transducer. The main board (HP) has a first tone-generating circuit (TES1), which is designed to generate a first control signal for the tone generator (TG). Furthermore, the main board (HP) has a second tone-generating circuit (TES2), which is designed to generate a second control signal for the tone generator (TG). The main board (HP) also has a logic circuit (LS), which is electrically coupled via a first signal line (SL1) to the first tone-generating circuit (TES1) and via a second signal line (SL2) to the second tone-generating circuit (TES2) and is designed to transmit the first control signal or the second control signal to the tone generator (TG). The invention further relates to a computer system having such a main board.
The invention relates to a computer system (1), which has a component (4) that consumes power and a power supply unit (2) for converting a primary mains voltage into a secondary supply voltage. The computer system (1) additionally has a voltage regulator (3), which converts the secondary supply voltage into at least one operating voltage for the component (4) that consumes power. The computer system (1) further has an overload protection circuit (5). The overload protection circuit (5) is equipped to monitor a level of the secondary supply voltage and, when the secondary supply voltage falls below a predetermined voltage value, to send a control signal to the component (4) that consumes power. As a result of the sending of the control signal, the power consumption of the component (4) that consumes power is reduced. The overflow protection circuit (5) is equipped to monitor the secondary supply voltage between the power supply unit (2) and the voltage regulator (3). The invention further relates to an overload protection circuit for use in such a computer system (1).
The invention relates to an arrangement (AO) for a blade server drawer, which has a main board (HP) having a connector (SV). The arrangement (AO) further has a riser card (RK), which is inserted into the connector (SV) of the main board (HP). A carrier plate (TB) is fixed in the blade server drawer substantially parallel to the main board, said carrier plate having a first opening (OE1), which is arranged in alignment with exposed plug contacts (SK) of the inserted riser card (RK). The arrangement (AO) furthermore has a retaining element (HE), which has a main body (GK) having a continuous, second opening (OE2), wherein the retaining element (HE) is designed to be pushed onto the riser card (RK) in a form-fitting manner by means of the second opening (OE2) and to latch with the carrier plate (TB), such that the riser card (RK) is fixed in a mechanically secure manner to the carrier plate (TB) and the plug contacts (SK) of the riser card (RK) are accessible via the second opening (OE2).
The invention relates to a monitoring circuit (ÜS) for a switched-mode power supply with a rectifier circuit (G) for rectifying a primary mains alternating current (AC). The monitoring circuit (ÜS) comprises two resistance dividers (W1, W2) each comprising two resistors (R1, R2, R3, R4). The resistors (R1, R2, R2, R4) are each connected in series between a phase conductor (PH1, PH2) of a mains connection before the rectifier circuit (G) and a reference point after the rectifier circuit (G). The monitoring circuit further comprises a subtraction device (OP) with two inputs, wherein each of the two inputs of the subtraction device (OP) is connected between the resistors (R1, R2, R3, R4) of one of the resistance dividers (W1, W2) in each case. The invention further relates to the use of a monitoring circuit.
H02M 1/42 - Circuits or arrangements for compensating for or adjusting power factor in converters or inverters
H02M 7/06 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes without control electrode or semiconductor devices without control electrode
H02M 7/12 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes with control electrode or semiconductor devices with control electrode
G01R 19/00 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof
The invention relates to a method for deleting information from a memory (CL) which is provided via a data network and has dynamic storage location allocation, in particular a cloud memory. The method comprises the step of determining the size and name of files stored in the memory (CL) and the step of creating files with a predetermined content and with a size and a name corresponding to the determined sizes and names of the files stored in the memory (CL). The method also comprises the step of overwriting the stored files in the memory (CL) with the corresponding files which have been created and the step of writing at least one file with a predetermined content to the entire, remaining available memory. The method also comprises the step of waiting for a period of time, which is predetermined by a storage provider for backing up the memory (CL), after completion of the overwriting and writing steps. The invention also relates to the use of a method, to a computer program product and to a computer system (CS).
The invention relates to an assembly comprising a PCI express card (1) for housing at least one SSD (3), said assembly having at least one hot plug connection (4) between the PCI express card (1) and a housed SSD (3). The PCI express card (1) has a carrier part (2, 9) for mechanically housing the SSD (3).
An operating method for a computer system having system firmware and an operating element to switch on the computer system includes monitoring the operating element for an actuation, immediately after starting actuation of the operating element, performing a first part of a boot sequence, determining a time period for which the operating element is actuated, executing a remaining part of full boot sequence with the system firmware if the determined time period exceeds a predetermined time period, where the full boot sequence includes activation of a keyboard and mouse through the firmware, and executing a remaining part of limited boot sequence with the system firmware if the determined time period does not exceed the predetermined time period, wherein the limited boot sequence does not include at least one of activation of a keyboard and mouse through the firmware.
A method of performing tasks on a production computer includes retrieving a one task description file stored on a task computer and containing a description of a task on a production computer, transferring the task description file from the task computer to a production computer, causing the production computer to check that the file is associated with at least one task stored on the production computer, performing the task associated with the file in the production computer using the file, if the association check was successful, wherein the task computer has open ports and the production computer keeps the ports closed so that access by a user of a first user group to the task computer is arranged, but access by a user of the group to the production computer is prevented while steps above are performed in a predetermined operating state of the production computer.
The invention relates to a method (V) for securely erasing a non-volatile semiconductor mass memory (HMS) having a plurality of physical memory units. The semiconductor mass memory (HMS) comprises a controller (CNT), which is designed, when a command to overwrite memory units associated with a first memory area (SB1) is received via the interface (SS), to change the association of the memory units with the first memory area (SB1) and a second memory area (SB2) in accordance with an algorithm in order to produce wear levelling. The method (V) comprises the following steps: - marking the entire addressable first memory area (SB1) for erasing; - sending out a release command; - releasing the first memory area (SB1); - sending out at least one first write command to the controller (CNT) via the interface (SS) in order to write to the entire first memory area (SB1); and - sending out at least one second write command to the controller via the interface in order to overwrite at least a predetermined part of previously written data blocks. The invention further relates to a computer system (CS) and a computer program product.
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
58.
COMPUTER SYSTEM AND METHOD FOR SECURELY BOOTING A COMPUTER SYSTEM
The invention relates to a computer system (10) comprising a data network connection (12), a reading device (13), an input component (14) and a securing device (11), said securing device (11) being designed to establish a data network link (17) when the computer system (10) is booted via the data network connection (12). The safety device (11) is further designed to receive access data either via the data network link (17) or via the reading device (13) and the input component (14), to compare the data with a data record (16) deposited in a firmware in a memory component (15) and to boot the computer system (10) when the comparison was successful. The invention further relates to a method for such a computer system (10).
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
59.
SENSOR DEVICE, OPERATING METHOD FOR A SENSOR DEVICE AND USE OF A SENSOR DEVICE
The invention relates to a sensor device (S1) comprising at least one transceiver (SE) and a data processing device (DV) that is connected to the transceiver (SE). The data processing device is designed to calculate, at pre-defined time intervals, the signal power of signals received by the transceiver (SE). In addition, the data processing device (DV) is designed to transmit a transmission signal to the transceiver (SE) during a time interval which correlates with one of the time intervals during which a calculated signal power lies below a pre-determined threshold value. The invention further describes an operating method for a sensor device (S1) for selecting a transmission interval and the use of said device.
The invention relates to a sensor device (SE) for a computer system (CS), said device comprising a transceiver (SUE) and a data processing device (DV) that is connected to the transceiver (SUE). The data processing device (DV) is designed to pre-define for the transceiver (SUE) the transmission of signals (US) at measuring intervals (MI). The data processing device (DV) is also designed to recognize, with the aid of received, reflected signals, signal ranges (S1, S2) that can be associated with objects (O1, O2). The data processing device (DV) is further designed to determine a deviation, in particular a variance (VAR), in the intensities (INT) of the received signal ranges (S1, S2) for recognized signal ranges (S1, S2) that belong together, over a number of measuring intervals (MI) and to decide, with the aid of the deviation that has been determined, whether an object associated with the respective recognized signal range (S1, S2) has been modified. The invention also relates to a computer system and to an operating method.
G10K 9/12 - Devices in which sound is produced by vibrating a diaphragm or analogous element, e.g. fog horns, vehicle hooters or buzzers electrically operated
61.
METHOD FOR THE PROTECTED RECOVERY OF DATA, COMPUTER PROGRAMME PRODUCT AND COMPUTER SYSTEM
Disclosed is a method for the protected recovery of data (D_A, D_B, D_C), which is stored in a back-up computer system (1), into a source computer system (A, B, C). A control of access (2, 2B, 6) is provided, which requests from a user group access information for accessing a recovery process (Recover), but which denies the user group access to the data (D_A, D_B, D_C) in the back-up computer system (1). The execution of the recovery process (Recover) can be commanded by a user of the user group if the requested access information corresponds to deposited access information for the user group and the commanded recovery process (Recover) comprises the restoration of selected data (D_A, D_B, D_C) from the back-up system (1) to the source computer system (A, B, C).
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
62.
METHOD FOR THE PROTECTED DEPOSIT OF EVENT PROTOCOL DATA OF A COMPUTER SYSTEM, COMPUTER PROGRAMME PRODUCT AND COMPUTER SYSTEM
The invention relates to a method for the protected deposit of event protocol data (Log_A_B) of a computer system (1). A control of access is provided, which (2, 7, 9) denies access to the event protocol data (Log_A_B) in the computer system (1) and also carries out the following steps: - reading of the event protocol data (Log_A_B) that is generated in the computer system (1), - sequential assignment of individual data sections (A1, A2, B1, B2) of the read event protocol data (Log_A_B) to one of at least two categories (A, B) in accordance with predefined criteria, - merging the categorised data sections (A1, A2, B1, B2) for each respective category (A, B) in a respective sub-file (Log_A, Log_B) and - separate storage of all created sub-files (Log_A, Log_B) and setting up of an access option for accessing the individual sub-files (Log_A, Log_B). Also disclosed is a computer system comprising an access control unit (2, 7, 9) designed to carry out a method of this type.
The invention relates to a computer arrangement (10) comprising a plurality of cluster systems (11a, 11b, 11c) for archiving data from at least one data-processing unit (13), wherein each of the plurality of cluster systems (11a, 11b, 11c) is modularly constructed. Each of the cluster systems (11a, 11b, 11c) comprises a plurality of component computers (14b, 14c), at least one mass storage system (12) for temporarily storing data to be archived and a cluster control unit (17) for controlling the individual component computers (14b, 14c) of each cluster system (11a, 11b, 11c). Furthermore, the computer arrangement comprises at least one data connection for the data coupling of the plurality of cluster systems (11a, 11b, 11c) and at least one integrated control unit (20) for requesting status data about a request interface (24) of the cluster control units (17) of the plurality of cluster systems (11a, 11b, 11c) and for transmitting work orders to a control interface (23) of the cluster control units (17) of the plurality of cluster systems (11a, 11b, 11c).
The invention relates to an arrangement (21) for a computer system (1) with a heat-producing expansion card (8) and a cooling device (9). The cooling device (9) has at least one fan (13) and a hollow body (10) with a first opening (11) and a second opening (12) for cooling the expansion card (8). The hollow body (10) is arranged with the first opening (11) on the expansion card (8). Furthermore, the at least one fan (13) is attached to the hollow body (10) in the region of the second opening (12) or is at least partly surrounded by the hollow body (10) by means of the second opening (12). The at least one fan (13) is designed to produce a flow of air through the hollow body (10) for cooling the expansion card (8). The invention further relates to a computer system (1).
The invention relates to a server rack (1) comprising a door element (4) that has at least one first suspension device (7) and at least one vertical carrier profile (2). The server rack (1) also comprises at least one hinge element (3) that has a second suspension device (8) and a stop element (9). The at least one hinge element (3) is secured to said at least one vertical carrier profile (2). The door element (4) can be suspended, by means of the first suspension device (7), in the second suspension device (8) of the at least one hinge element (3). The stop element (9) is arranged on the at least one hinge element (3) such that a maximum opening angle of the door element (4) relative to the server rack (1) may be set by an outer side (21) of the door element (4) being stopped at said stop element (9).
The invention relates to a display device (11, 21) comprising at least one first direction-dependent sensor (13, 22) that is arranged on a housing part (12) for the purpose of detecting the presence of at least one person (16) in a predetermined region (15) in front of the display device (11, 21). The display device (11, 21) can be pivoted about at least one axis (14) such that the alignment of said at least one first sensor (13, 22) is altered, and said display device (11, 21) comprises at least one second sensor (23) that is configured to detect the alignment of the display device (11, 21), as well as a control unit (24) that is configured to generate, depending on the alignment of the display device (11, 21) as detected by the second sensor (23), a control signal which indicates that recognition of a person (16) by the first sensor (13, 22) cannot be guaranteed.
The invention relates to an electronic device having a pivotable monitor screen (1), a base part (2) for setting up on a set-up surface and at least one pivot bearing (6) between the base part (2) and the monitor screen (1), wherein according to the invention the at least one pivot bearing comprises an angle-dependent and/or direction-dependent section modulus M when the monitor screen is pivoted relative to the base part. By means of the angle-dependent and/or direction-dependent section modulus M of the pivot bearing (6) the monitor screen can also be used for touch-screen data input when the monitor screen (1) is pivoted relative to the base part (2) and the monitor screen withstands the finger pressure during said touch-screen data input. The monitor can, however, be comfortably pivoted relative to the base part.
The invention relates to a working method for a mass system (100, 600), particularly a RAID system (500). The system comprises the steps of providing a virtual data file system (610) for at least one user of the mass system (100, 600), and determining an access probability for data (620, 630) that are logically stored in said virtual data file system (610). Data files (620) whose access probabilities lie above a predetermined limiting value (TREF) are stored distributed in a plurality of first physical mass memories (642, 644, 646) which are independent of one another and have independent writer/reader units. Data files (630) whose access probabilities lie below the predetermined limiting value (TREF) are stored together in at least one contiguous region of at least one second physical mass (660). Moreover, the invention also relates to a mass system (100, 600) which is configured to carry out the method, as well as to a computer program product that is suitable for implementing said method.
The invention relates to the determination of a substitute value (E) of an input power of a power supply unit on the primary side. The method comprises the steps of capturing a first measured value (A) with regard to input power of a power supply unit on the primary side, the repeated capturing of a second measured value (B) with regard to at least one output power of the power supply unit on the secondary side, the determination of a level of efficiency (C, D) of the power supply unit, and the calculation of a substitute value (E) for the input power on the primary side on the basis of the preceding steps.
The invention relates to a server system (50) comprising a supply line (25) external to the server and at least one first redundant power supply (12) that can be coupled to said supply line (25) external to the server. The server system (50) further comprises at least one first server (10), the first server (10) having at least one first internal power supply (11a) for supplying power to the first server (10), at least one first port (19) for connecting the first server (10) to the supply line (25) external to the server, at least one energy consumer (13) and at least one first control circuit (30). The first redundant power supply (12) is detachably connected via the supply line (25) external to the server to the at least one energy consumer (13) of the first server (10) by means of the first control circuit (30). The first control circuit (30) arranged in the first server (10) is designed to create a connection of the at least one energy consumer (13) to the supply line (25) external to the server in case of a failure of the first internal power supply (11) of the first server (10). The invention further relates to a control circuit (30) for a server (10).
The invention relates to an electronic apparatus (10), particularly a computer, thin client or zero client, for connecting to an Ethernet network and for operation by Power over Ethernet, wherein the electronic apparatus (10) has the following: - an interface (1) for Power over Ethernet, with which the electronic apparatus (10) can be connected to an Ethernet network via a wiring section, wherein the electronic apparatus (10) is set up both for data exchange and also for supplying current via such a wiring section; - a measuring unit (3), with the aid of which the power consumption of an external wiring section connected upstream of the interface (1) can be determined via the interface (1); and - a control unit (5) which establishes a maximum power consumption (Pmax) of the electronic apparatus (10) permissible using Power over Ethernet as a function of the determined power consumption of the external wiring section and monitors the compliance of the thus-established maximum permissible power consumption (Pmax) of the electronic apparatus (10).
The invention concerns a high-availability computer system (100) comprising a plurality of computer nodes (110) for parallel data processing, each computer node (110) having at least one data processing component and one working memory. The computer system (100) further comprises a plurality of memory nodes (130), each memory node (130) having at least one non-volatile mass storage device. The plurality of computer nodes (110) is partitioned into a plurality of computer groups (120), each of the plurality of computer groups (120) having at least one redundant computer node (110). Each computer group has a local connection structure which is associated with the respective computer group and connects the memory nodes (130) associated with the respective computer group to the computer nodes (110) of the respective computer group (120). The invention also concerns a working method for a high-availability computer system (100) and the use of a high-availability computer system (100).
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
73.
COMPUTER SYSTEM AND METHOD FOR OPERATING A COMPUTER SYSTEM
The invention comprises a computer system (1) having a power supply unit (2), a system component (3) comprising at least one processor (4), a microcontroller (5) and a memory (6) which is functionally connected to the microcontroller (5) and is intended to store information relating to an interruption in at least one operating voltage of the computer system (1). When at least one secondary standby voltage is applied to the microcontroller (5) and the information relating to an interruption in the primary supply voltage of the computer system (1) is read from the memory (6), the microcontroller (5) is set up to selectively switch the computer system (1) to a first operating state on the basis of the information which has been read. The invention also relates to a method for operating such a computer system (1).
The invention relates to a method for parameterizing a signal modifying unit in order to modify received signals (r(n)) in a data transmission system (1) comprising at least two electronic devices (A, B). The method has the following steps: A) detecting a bit error rate (BER) of received digitized signals by means of a detecting unit of the first device (A, B), B) transmitting the detected bit error rate (BER) from the first device (A, B) to the second device (A, B), C) changing the signal amplitude (A_T) of a specified training signal (T(n)) in the second device (A, B) if the bit error rate (BER) exceeds a specified threshold (G_BER), D) transmitting the changed training signal (T(n)) from the second device (A, B) to the first device (A, B) during a training phase, and E) ascertaining parameter values of the signal modifying unit in order to modify received signals (r(n)) in the first device (A, B) using the transmitted training signal (T(n)) during the training phase.
The invention relates to an electronic access-protection system (1) for a computer system (2) or the like. The electronic access-protection system (1) comprises an access-protected device having a firmware component (6) and a data-processing unit for the execution of program code of the firmware component (6). The access-protection system (1) further comprises a read device (3) coupled to the device for the reading of chip cards (4) and at least one chip card (4) having at least one chip-card-specific access procedure. First information relating to the at least one chip-card-specific access procedure is stored in a predetermined storage area of the at least one chip card (4), and the at least one firmware component (6) is set up to execute the at least one chip-card-specific access procedure for the at least one chip card (4) on the basis of the first information stored in the first storage area. The invention further relates to a method (30) for operating a computer system, a chip card (4) and a firmware component (6).
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
76.
ELECTRONIC DEVICE FOR CONNECTING TO AN ETHERNET NETWORK
The invention relates to an electronic device (10), in particular a computer, thin client or zero client, for connecting to an Ethernet network, the electronic device (10) having the following: - a display (50), - an interface (1) which allows data exchange between the electronic device (10) and an Ethernet network (20) and current supply of the electronic device (10) via an Ethernet network (20), - a line section (2) which proceeds from the interface (1) and to which one or a plurality of power users (31, 32, 33,…) are and/or can be connected, - a measurement unit (3) which measures power usage (P) on the line section (2) or a miscellaneous variable related thereto, such as current strength (I), and - a calculation unit (5) which calculates a control signal (S) for setting maximum admissible display brightness (H) from a maximum admissible upper limit value (G) of the power usage (Pmax) or of the current strength (Imax) and from a measured value of the power usage (P) or of the current strength (I), - the electronic device (10) limiting the brightness of the display (50) with the aid of the control signal (S).
The invention relates to a switched-mode power supply (1) having a first switching stage (6) for generating a rectified intermediate voltage (Vc) from a primary AC voltage (Vp), having a memory element (7) for buffer storing the intermediate voltage (Vc) which is generated by the first switching stage (6), and having a second switching stage (8) for generating a secondary output voltage (Vs) from the buffer-stored intermediate voltage (Vc). The switched-mode power supply (1) has a control circuit (9) for activating and deactivating the first switching stage (6), wherein the control circuit (9) is designed to activate the first switching stage (6) for a subregion, which is determined by the control circuit (9), of a first half-wave (11) of the primary AC voltage (Vp) and to deactivate the first switching stage (6) for at least one subsequent half-wave (12, 13) of the primary AC voltage (Vp). The invention also relates to an operating method for operating a switched-mode power supply (1) of this kind.
H02M 3/158 - Conversion of DC power input into DC power output without intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators including plural semiconductor devices as final control devices for a single load
A monitoring system includes a database storing configuration information about a plurality of objects in the data center; a first inventory instance that adds a first object to the database, where the first inventory instance classifies the first object based on a set of classification rules to select a set of monitoring rules for the first object based on its classification and add configuration information about the first object to the configuration database; and a first monitoring instance to monitor the first object, the monitoring instance monitoring status of the first object based on respective configuration information in the database; at least one of the first inventory instance and the first monitoring instance identifying a further object functionally connected to the first object, the further objects added to the database by the first or a second inventory instance and monitored by the first or a second monitoring instance.
A method of accessing an operating system in a distributed computer arrangement comprising loading an auxiliary operating system from a write-protected area of a removable storage medium, executing the loaded auxiliary operating system on a first computer, setting up a data link between the first computer and a second computer via a data network under control of the auxiliary operating system, executing a main operating system on the second computer and progressively transmitting inputs from a user from the first computer via the data link to the main operating system, and progressively transmitting outputs from the main operating system via the data link to the first computer.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 9/44 - Arrangements for executing specific programs
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
The invention relates to a rack server slide-in module with a height of one height unit and an installation area (14) for a dual-slot expansion card (15), wherein either a single-slot or a dual-slot expansion card (15) is received in said installation area. The aim of the invention is to allow a dissipation of the high level of lost heat of the dual-slot expansion card (15) in said extremely limited installation space. According to the invention, this is achieved in that an air inlet (7a) is provided on the front face (1) of the rack server slide-in module so as to be aligned with the installation area (14) for the expansion card (15), an air outlet (21) is provided on the rear face (2) of the rack server slide-in module so as to be aligned behind the installation area (14) for the expansion card, and three fans (9a-c) are arranged adjacently to one another between the air inlet (7a) and the installation area (14) for the expansion card (15), said fans generating an increased flow pressure of the cooling air onto the installation area (14) of the expansion card (15).
The invention relates to a modular server system (5), comprising a plurality of server groups (5) and a plurality of I/O-groups (7), wherein each I/O-group (7) or each server group (6) has a switch arrangement with at least one switch element (4). The at least one switch arrangement is connected by a data link to at least one other switch arrangement of another I/O-group (7) or server group (6). The invention also relates to an I/O module (16) for setting up and a switching method for operating such modular server systems.
The invention relates to a server system (10, 30) comprising a housing (18) for accommodating a plurality of servers (11) and at least two servers (11), wherein each of the servers (11) has at least one power supply unit (12) and an input circuit (15). The server system (10, 30) has at least one secondary voltage supply line (17) arranged in the housing (18), wherein the power supply units (12) of the at least two servers (11) are set up to generate a secondary DC supply voltage from at least one primary AC supply voltage and to pass said DC supply voltage to the at least one secondary voltage supply line (17) arranged in the housing (18). The input circuits (15) of the at least two servers (11) each have a power limitation element (25) for limiting a maximum power consumption of the associated server (11) and are set up to receive an operating voltage for the particular server (11) from the at least one secondary voltage supply line (17) arranged in the housing (18). The invention also relates to an input circuit (15) for a server (11).
The invention relates to a cluster storage system (100) and particularly to a storage cloud. The cluster storage system (100) comprises a plurality of mass storage systems (140) for providing storage capacity for storing data blocks, middleware (220) for providing a plurality of virtual storage pools (180) for a plurality of users and at least one user interface (240) for accessing the storage pool (180) associated with a user. In this case, the middleware (220) comprises at least one erasure algorithm (260) for safely erasing data blocks and the at least one user interface (240) provides an erasure function for erasing the storage pool (180) associated with the user. The middleware (220) is set up to erase all data blocks associated with the user from the plurality of mass storage systems (140) using the at least one erasure algorithm (260) when the erasure function is called by the user and to report the successful erasure via the user interface (240). The invention furthermore relates to a method for safely erasing data and to a computer program product for carrying out the method.
The invention relates to a foot (1) for a computer casing (2), having - a base element (3) for contact with an underlying surface, - a damping element (4) for damping vibrations, and - a fastening element (5) for fastening the foot (1) to a computer casing (2), wherein the damping element (4) is arranged mechanically between the base element (3) and the fastening element (5) in such a way that the fastening element (5) and the base element (3) are mechanically decoupled. The damping element (4) is of annular shape with a centrally arranged raised part (4a) and with an adjoining, radially outwardly extending part (4b), and is guided by way of the raised part (4a) through a central opening (5a) of the fastening element (5) such that the fastening element (5) makes contact with the damping element (4) both radially and axially. Also described is a computer casing having a foot of said type.
The invention relates to a server system (1), comprising a chassis (2) having a plurality of slots (22) for accommodating a plurality of rack servers (6). The server system (1) also comprises at least one circuit board arranged in the chassis (2) for contacting rack servers (6) accommodated in the slots (22), wherein the circuit board has at least one first microcontroller (19a). The server system (1) also comprises a first rack server (6), which is arranged in the first slot (22a) and which is coupled to the at least one circuit board, wherein the first rack server (6) has a first system management controller (16). The first microcontroller (19a) and the first system management controller (16) are coupled to each other by means of at least one first signal line (23a), and the first microcontroller (19a) is designed to provide at least one chassis-specific configuration value to the first system management controller (16). The invention further relates to a method (30) for transmitting at least one chassis-specific configuration value in such a server system (1).
Disclosed is an electronic device (1), in particular a computer (2), comprising a housing that includes a standard mounting interface (10) for mechanical attachment to a second mounting interface (16) of an object (15), wherein the housing includes a housing cover (5) into which the mounting interface (10) is integrated. The outer face of the housing cover (5) can be mounted on the second mounting interface (10) of an object (15) by means of the mounting interface (10), and the housing cover (5) can be opened or removed such that the mounting interface (10) can be accessed from the inner face of the housing cover (5).
The invention relates to a computer housing (1) for accommodating at least one motherboard, a power supply (2) and further modules, wherein the housing (1) has at least a first plane and a second plane, wherein the second plane is arranged horizontally above the first plane, and an at least bipartite motherboard carrier (3a, 3b) is arranged on the second plane, wherein a first part of the motherboard carrier (3a) is fixedly connected to the housing (1) and a second part of the motherboard carrier (3b) is embodied in a removable fashion. Below the first part of the motherboard carrier (3a), the power supply (2) is arranged on the first plane and, below the second part of the motherboard carrier (3b), a power supply cable and the further modules are arranged on the first plane.
The invention relates to a cluster system (20, 30) comprising a plurality of server computers (12) and a data network (15). The cluster system (20, 30) is arranged for running a plurality of virtual machines (11), wherein each of the virtual machines (11) has at least one virtual mass storage device (13) assigned to it. Each virtual machine (11) has a first copy (24) of the data in the associated virtual mass storage device (13) on at least one local mass storage device (22a) of a first server computer (12a), and a second copy (25) of the data in the associated virtual mass storage device (13) on at least one local mass storage device (22b) of a second server computer (12b). The invention further relates to a method for running a plurality of virtual machines (11) on a plurality of server computers (12).
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
The invention relates to a flow-guiding hood (10) for guiding the flow of air in a computer (15) or in another electronic device (20). The flow-guiding hood (10) is composed of multiple individual parts and comprises at least the following: a first flow-guiding element (1) which is used for guiding the flow and which consists of a flat first material (11); and at least one second flow-guiding element (2) which is likewise used for guiding the flow and which consists of another, second material (12), wherein the second flow-guiding element (2) lies on the first flow-guiding element (1) and/or is secured thereto.
The invention relates to a computer comprising an EMC-shielded case (1) and an installation site for a drive (9), the installation site for the drive (9) being arranged in a depression (8) outside the shielding area of the case (1). Thereby the problem of large openings and the associated reduced EMC shielding effect is solved in an extremely simple manner.
The invention relates to an operating method for a computer system (10) having system firmware (18) and an operating element for switching the computer system (10) on. The operating method comprises the steps of monitoring the operating element for actuation and determining a time period (T) for which the operating element is actuated. The operating method also comprises the steps of executing a complete boot sequence (43) by means of the system firmware (18) if the certain time period (T) exceeds a predetermined time period (S) and executing a limited boot sequence (44) by means of the system firmware (18) if the certain time period (T) does not exceed the predetermined time period (S). The invention further relates to a computer system (10) that is designed to perform the operating method.
The invention relates to an arrangement for fixing a computer component in a server rack (1) with vertical support profiles (3), comprising two retaining rails (6a, 6b), each of which can be fixed in a parallel manner to each other on two vertical support profiles (3). The retaining rails (6a, 6b) are designed such that the computer component can be inserted into the retaining rails (6a, 6b) from the rear face (R) of the server rack. Due to the claimed arrangement, lateral access to the server rack is not required in order to assemble the computer component. The invention also relates to a method for assembling such an arrangement.
The invention relates to a printed circuit board (1) for a computer system having at least one first slot (2) for an expansion card. In this arrangement, the at least one first slot (2) has at least one first port (B14) for the connection of at least one first data line and at least one second port (B66) for the connection of at least one second data line. The at least one first port (B14) is electrically coupled to a first interface device on the basis of the first interface standard, and the at least one second port (B66) is electrically coupled to a second interface device on the basis of a second interface standard. Furthermore, the invention relates to expansion cards (20, 30) which are suitable for being held in such a slot (2).
The invention relates to a mounting cage (1) for a computer having a backplane (2), wherein the mounting cage (1) has an upper part (4) and a lower part (3), and the upper part (4) or the lower part (3) has at least two side walls (5), wherein the backplane (2) is attached to the mounting cage (1) without screws. The backplane (2) is connected to the mounting cage (1) by plug-connection or clamp-connection. The upper part (4) and the lower part (3) each have at least one fork-like or u-shaped receiving rail (6), wherein the receiving rails (6) are arranged in a location where the backplane (2) comes into contact with the upper part (4) or lower part (3), and therefore the backplane (2) can be plugged into the receiving rail (6) and as a result can be fixed to the mounting cage (1). The invention also relates to a method for fitting and removing a mounting cage (1) of the above-mentioned type.
The invention relates to a method of operation (20) for a memory system (1) having a primary mass memory (2) and a secondary mass memory (3), wherein access operations on the secondary mass memory (3) are slower on average than access operations on the primary mass memory (2). The method comprises the steps of determining a use factor for the relocation of a data record, determining a disadvantage factor for the relocation of the data record, stipulating a displacement priority by weighing up the determined use factor and the determined disadvantage factor, and relocating the data record from the primary mass memory (2) to the secondary mass memory (3) if the stipulated displacement priority exceeds a comparison value. Furthermore, the invention relates to a memory system (1) and to a computer program product.
The invention relates to a server (1) having a cuboid housing (2), having first heat generating components (5) arranged on the front side (3), such as hard drives and operable drives, system fans (6) arranged behind which generate an air flow (7) from the front side (3) of the server to the rear side (4) and additional heat generating components (10) arranged downstream of the system fans (6) in the flow direction of the air flow (7), such as memory modules, DC/DC converter components of the CPU and expansion cards, characterized in that a heat exchanger (8) is arranged in front of the additional heat generating components (10). The invention further relates to a method for cooling a server.
The invention relates to a computer system (10, 20), comprising at least one server computer, wherein the server computer comprises at least one processor, a main memory and a system management component (13). The computer system (10, 20) additionally comprises a management station (15) and at least one data network, via which the at least one server computer and the management station (15) are coupled for data purposes. The system management component (13) of the at least one server computer is equipped to send, upon activation of the system management component (13), at least one inquiry to the management station (15) with regard to a server profile (17) that is assigned by the management station and to configure at least one component of the server computer using at least one network identifier transmitted by the management station (15). If no management connection can be established with the management station (15), the system management component prevents a start of the at least one server computer with a network identifier that was previously transmitted by the management station (15). The invention further relates to a method for starting a server computer, to a server computer, to a management station, and to a use of a system management component.
The invention relates to a blade server system (300), comprising an enclosure (310), at least one power supply unit (332, 334, 336), at least one management blade (350) having at least one controller (352), and at least one blade server (342, 344, 346, 348) having at least one processor (362, 364, 366, 368) and a remote management controller (372, 374, 376, 378). The controller (352) of the management blade (350) is configured to query the at least one power supply unit (332, 334, 336) to determine a total available power for the blade server system (300), to determine a power limit for the at least one blade server (342, 344, 346, 348). The remote management controller (372, 374, 376, 378) of the at least one blade server (342, 344, 346, 348) is configured to increase a counter associated with the blade server if an associated power monitoring means indicates that a current power consumption of the at least one blade server exceeds the stored power consumption limit. The controller (352) of the management blade (350) is further configured to determine a new power consumption limit for the at least one blade server (342, 344, 346, 348) based on the total available power and the value of the counter associated with the at least one blade server (342, 344, 346, 348) after a predetermined monitoring interval. The invention further relates to a method for power management and a data processing system (100).
The invention relates to a switched-mode power supply unit (100) for a computer or the like. The switched-mode power supply unit comprises at least one switching element (120) for switching a charging current for charging a storage element (130), at least one secondary output circuit, at least one controllable oscillator circuit (160) for providing a switching clock and at least one control circuit (150) for determining a switch-off time for the at least one switching element (120). In this arrangement, operation of the switched-mode power supply unit (100) involves a mean oscillator clock from the oscillator circuit (160) being regulated on the basis of a controlled variable (Vcontrol) from the secondary output circuit (140) and a switch-on time for the at least one switching element (120) being determined on the basis of the mean oscillator clock and a random deviation. The invention likewise relates to a method of operation for such a switched-mode power supply unit (100) and to the use of such a switched-mode power supply unit (100) in a computer.
H02M 3/335 - Conversion of DC power input into DC power output with intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode to produce the intermediate AC using devices of a triode or a transistor type requiring continuous application of a control signal using semiconductor devices only
H02M 1/44 - Circuits or arrangements for compensating for electromagnetic interference in converters or inverters
H02M 7/217 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only
G06F 1/26 - Power supply means, e.g. regulation thereof
The invention relates to a vario carrier (1) and to a method for installing a vario carrier on two vertical carrier profiles (19) of a rack, wherein the vertical carrier profiles (19) of the rack have holes (20) in a standard grid, and the vario carrier (1) can be secured through the holes (20) to the vertical carrier profiles (19). According to the invention, the vario carrier (1) has a ratchet mechanism for latching the vario carrier (1) to a vertical carrier profile (19) of a rack, so that the installation can be carried out without using tools and in a simple manner.