Patents by Inventor Stephen R. Berard
Stephen R. Berard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8645734Abstract: A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement. The policies may allow some processes to operate while consuming less energy, while other processes may be configured to maximize performance.Type: GrantFiled: October 24, 2012Date of Patent: February 4, 2014Assignee: Microsoft CorporationInventors: Stephen R Berard, Sean N McGrane, Bruce L Worthington
-
Patent number: 8321703Abstract: A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement. The policies may allow some processes to operate while consuming less energy, while other processes may be configured to maximize performance.Type: GrantFiled: December 12, 2009Date of Patent: November 27, 2012Assignee: Microsoft CorporationInventors: Stephen R. Berard, Sean N. McGrane, Bruce L. Worthington
-
Patent number: 8245060Abstract: A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state where the access times may increase for the memory objects. By operating at least some of the memory regions in a low power state, significant power savings can be realized. The computer system may have several memory regions that may be independently controlled and may move memory objects to various memory regions in order to optimize power consumption. In some embodiments, an operation system level function may manage memory objects based on parameters gathered from usage history, memory topology and performance, and input from applications.Type: GrantFiled: October 15, 2009Date of Patent: August 14, 2012Assignee: Microsoft CorporationInventors: Bruce L. Worthington, Stephen R. Berard, Sean N. McGrane
-
Patent number: 8046600Abstract: A plurality of power budgets are sent to a corresponding plurality of power consumers by a power management point, wherein a total power budget managed by the power management point includes a sum of the plurality of power budgets and an available power budget not assigned to the plurality of power consumers. An additional power request having a power increase amount is received from a first power consumer of the plurality of power consumers. The additional power request is approved when the power increase amount does not exceed the available power budget. The available power budget is decreased by the power increase amount. An approval of the additional power request is sent to the first power consumer.Type: GrantFiled: October 29, 2007Date of Patent: October 25, 2011Assignee: Microsoft CorporationInventors: Matthew H. Holle, Stephen R. Berard, Sean N. McGrane, John M. Parchem
-
Publication number: 20110145609Abstract: A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement.Type: ApplicationFiled: December 12, 2009Publication date: June 16, 2011Applicant: MICROSOFT CORPORATIONInventors: Stephen R. Berard, Sean N. McGrane, Bruce L. Worthington
-
Publication number: 20110093726Abstract: A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state where the access times may increase for the memory objects. By operating at least some of the memory regions in a low power state, significant power savings can be realized. The computer system may have several memory regions that may be independently controlled and may move memory objects to various memory regions in order to optimize power consumption. In some embodiments, an operation system level function may manage memory objects based on parameters gathered from usage history, memory topology and performance, and input from applications.Type: ApplicationFiled: October 15, 2009Publication date: April 21, 2011Applicant: MICROSOFT CORPORATIONInventors: Bruce L. Worthington, Stephen R. Berard, Sean N. McGrane
-
Publication number: 20110022870Abstract: A component level power monitoring system may analyze workloads by determining energy consumed by individual components for the workload. By comparing different system configurations or by modifying the software operation, an optimized workload may be performed per energy consumed. In some embodiments, several system configurations may be attempted to determine an optimized system configuration. In other embodiments, a monitoring system may change how an application is executed by changing thread affinity or otherwise assigning certain operations to specific components. The component level monitoring may be implemented as operating system level function calls.Type: ApplicationFiled: July 21, 2009Publication date: January 27, 2011Applicant: MICROSOFT CORPORATIONInventors: Sean N. McGrane, Stephen R. Berard, Bruce L. Worthington
-
Publication number: 20100235834Abstract: A system includes hardware, a software layer, a platform layer, and a management communication channel between the software layer and the platform layer. The management communication channel provides an interface to enable the software layer to issue a hardware management command to the platform layer, where the hardware management command is to specify a change of a setting of the hardware, and where the management communication channel allows a hardware management engine of the platform layer to collaborate with the software layer to perform the change of the setting of the hardware.Type: ApplicationFiled: March 16, 2009Publication date: September 16, 2010Inventors: Scott P. Faasse, Nicholas S. Judge, Stephen R. Berard, Tristan A. Brown
-
Publication number: 20090113221Abstract: A plurality of power budgets are sent to a corresponding plurality of power consumers by a power management point, wherein a total power budget managed by the power management point includes a sum of the plurality of power budgets and an available power budget not assigned to the plurality of power consumers. An additional power request having a power increase amount is received from a first power consumer of the plurality of power consumers. The additional power request is approved when the power increase amount does not exceed the available power budget. The available power budget is decreased by the power increase amount. An approval of the additional power request is sent to the first power consumer.Type: ApplicationFiled: October 29, 2007Publication date: April 30, 2009Applicant: MICROSOFT CORPORATIONInventors: Matthew H. Holle, Stephen R. Berard, Sean N. McGrane, John M. Parchem
-
Patent number: 7100054Abstract: A method and system are provided for authenticating a user of a computer over a computer network. In one embodiment of the invention, the method includes transmitting an applet having a challenge string and a first encryption key, receiving a login packet having the challenge string and a password that is encrypted using the first encryption key, decrypting the password, receiving information from an authentication provider, and authenticating the password by using the information provided by the authentication provider. The challenge string can be either a sequence number or a session identifier. The authentication provider can be a software program or an authentication server. An advantage of embodiments of the present invention is that a computer can provide secure Internet communications using a web browser that does not support SSL and can provide secure integration with third party security systems.Type: GrantFiled: August 9, 2001Date of Patent: August 29, 2006Assignee: American Power ConversionInventors: Thomas F. Wenisch, Stephen R. Berard, David J. Smith
-
Publication number: 20030033545Abstract: A method and system are provided for authenticating a user of a computer over a computer network. In one embodiment of the invention, the method includes transmitting an applet having a challenge string and a first encryption key, receiving a login packet having the challenge string and a password that is encrypted using the first encryption key, decrypting the password, receiving information from an authentication provider, and authenticating the password by using the information provided by the authentication provider. The challenge string can be either a sequence number or a session identifier. The login packet can further include a user name, wherein the session identification, the user name, and the password are encrypted. Additionally, the login packet can include a hash of the session identification, the user name, and the password.Type: ApplicationFiled: August 9, 2001Publication date: February 13, 2003Inventors: Thomas F. Wenisch, Stephen R. Berard, David J. Smith