Patents by Inventor Thomas F. Wenisch

Thomas F. Wenisch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140317389
    Abstract: A multi-core processing system that uses computational sprinting to generate high levels of computational output for short periods of time at power consumption levels that are not sustainable over longer periods of time due to thermal and/or other constraints. This is done using a number of processing cores that, when operated simultaneously, utilize available thermal capacity within the system to consume power and produce heat that is in excess of a thermal design power (TDP) of the system, but is tolerable because of the short period of operation. The system and/or method described herein may include thermal capacitors in the form of phase change materials (PCMs), may implement normal, sprint and/or cooling modes of operation, and may employ parallel sprinting, frequency sprinting, sprint pacing and/or sprint-and-rest techniques, to cite several possibilities.
    Type: Application
    Filed: November 16, 2012
    Publication date: October 23, 2014
    Applicant: The Trustees Of The University Of Pennsylvania
    Inventors: Thomas F. Wenisch, Kevin Pipe, Marios Papaefthymiou, Milo M.K. Martin, Arun Raghavan
  • Patent number: 8751843
    Abstract: A power management method for use by a blade server or other networked computer having a CPU, memory, network interface, and timer. The method includes monitoring processes in the computer, determining that the computer has become idle, and switching the CPU and memory from an active state to a low power state while maintaining the network interface and timer in an active state. Power management for multicore processors is also provided. A power supply system can be used for providing shared power to groups of the networked computers that each have a similar active power demand. Each PSU in the power supply system is capable of supplying the active power demand at an efficiency greater than a preselected desired minimum efficiency. Changes in power requirements resulting from a computer switching between low power and active states can be accommodated by switching a single PSU into or out of the system.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: June 10, 2014
    Assignee: The Regents of the University of Michigan
    Inventors: David Meisner, Thomas F. Wenisch
  • Publication number: 20110264937
    Abstract: A power management method for use by a blade server or other networked computer having a CPU, memory, network interface, and timer. The method includes monitoring processes in the computer, determining that the computer has become idle, and switching the CPU and memory from an active state to a low power state while maintaining the network interface and timer in an active state. Power management for multicore processors is also provided. A power supply system can be used for providing shared power to groups of the networked computers that each have a similar active power demand. Each PSU in the power supply system is capable of supplying the active power demand at an efficiency greater than a preselected desired minimum efficiency. Changes in power requirements resulting from a computer switching between low power and active states can be accommodated by switching a single PSU into or out of the system.
    Type: Application
    Filed: December 16, 2009
    Publication date: October 27, 2011
    Applicant: THE REGENTS OF THE UNIVERSITY OF MICHIGAN
    Inventors: David Meisner, Thomas F. Wenisch
  • Patent number: 7162714
    Abstract: In a computer system which allows simultaneous operations of multiple processes, a software watchdog process operates to monitor a primary process through operating system calls. If the response to an operating system call shows that the primary process is not operating or is over utilizing CPU time, then the primary process is restarted. The software watchdog process may also check and correct configuration and data files before restarting the primary process. Alternatively, rather than using operating system calls, the software watchdog process and primary process may communicate through a loop back TCP/IP address for monitoring purposes.
    Type: Grant
    Filed: May 22, 2002
    Date of Patent: January 9, 2007
    Assignee: American Power Conversion Corporation
    Inventor: Thomas F. Wenisch
  • Patent number: 7100054
    Abstract: A method and system are provided for authenticating a user of a computer over a computer network. In one embodiment of the invention, the method includes transmitting an applet having a challenge string and a first encryption key, receiving a login packet having the challenge string and a password that is encrypted using the first encryption key, decrypting the password, receiving information from an authentication provider, and authenticating the password by using the information provided by the authentication provider. The challenge string can be either a sequence number or a session identifier. The authentication provider can be a software program or an authentication server. An advantage of embodiments of the present invention is that a computer can provide secure Internet communications using a web browser that does not support SSL and can provide secure integration with third party security systems.
    Type: Grant
    Filed: August 9, 2001
    Date of Patent: August 29, 2006
    Assignee: American Power Conversion
    Inventors: Thomas F. Wenisch, Stephen R. Berard, David J. Smith
  • Publication number: 20030221141
    Abstract: In a computer system which allows simultaneous operation of multiple processes, a software watchdog process operates to monitor a primary process through operating system calls. If the response to an operating system call shows that the primary process is not operating or is over utilizing CPU time, then the primary process is restarted. The software watchdog process may also check and correct configuration and data files before restarting the primary process. Alternatively, rather than using operating system calls, the software watchdog process and primary process may communication through a loop back TCP/IP address for monitoring purposes.
    Type: Application
    Filed: May 22, 2002
    Publication date: November 27, 2003
    Inventor: Thomas F. Wenisch
  • Publication number: 20030033548
    Abstract: Aspects of the invention are directed to configuring multiple uninterruptible power supply (UPS) devices coupled to a network. According to one aspect of the invention, multiple agents are coupled between the network and the multiple UPS devices to be managed, each agent being associated with a UPS device. A server stores an agent list containing the list of agents and configuration profiles having configuration settings that are used to configure the UPS devices. The server establishes communication with the agents of UPS devices that require configuration. The server transmits configuration setting of the configuration profile applicable to the UPS device, wherein the agent configures the UPS device using the transmitted configuration setting.
    Type: Application
    Filed: August 7, 2001
    Publication date: February 13, 2003
    Inventors: Christian L. Kuiawa, David A. Cardimino, Todd J. Giaquinto, Thomas F. Wenisch
  • Publication number: 20030033545
    Abstract: A method and system are provided for authenticating a user of a computer over a computer network. In one embodiment of the invention, the method includes transmitting an applet having a challenge string and a first encryption key, receiving a login packet having the challenge string and a password that is encrypted using the first encryption key, decrypting the password, receiving information from an authentication provider, and authenticating the password by using the information provided by the authentication provider. The challenge string can be either a sequence number or a session identifier. The login packet can further include a user name, wherein the session identification, the user name, and the password are encrypted. Additionally, the login packet can include a hash of the session identification, the user name, and the password.
    Type: Application
    Filed: August 9, 2001
    Publication date: February 13, 2003
    Inventors: Thomas F. Wenisch, Stephen R. Berard, David J. Smith