12th week of 2015 patent applcation highlights part 72 |
Patent application number | Title | Published |
20150081976 | CACHING FOR HETEROGENEOUS PROCESSORS - A multi-core processor providing heterogeneous processor cores and a shared cache is presented. | 2015-03-19 |
20150081977 | EXTENDING A CACHE COHERENCY SNOOP BROADCAST PROTOCOL WITH DIRECTORY INFORMATION - In one embodiment, a method includes receiving a read request from a first caching agent, determining whether a directory entry associated with the memory location indicates that the information is not present in a remote caching agent, and if so, transmitting the information from the memory location to the first caching agent before snoop processing with respect to the read request is completed. Other embodiments are described and claimed. | 2015-03-19 |
20150081978 | Dynamic Sizing of Memory Caches - Disclosed are cache management apparatus and methods. A mobile device can include a global cache manager (GCM), a processor, and a storage medium. The GCM can manage a cache for an application of the mobile device. The storage medium can store instructions that, upon the processor's execution, cause the mobile device to perform functions. The functions can include: receiving an indication of a triggering event related to memory allocated for the application; the GCM responsively determining an amount of memory allocated to the application; the GCM determining whether a memory limit for the application is within a threshold amount of being exceeded by the amount of memory allocated to the application; and responsive to determining that the memory limit for the application is within the threshold amount of being exceeded, instructing the application to cease utilization of a portion of memory allocated to the cache. | 2015-03-19 |
20150081979 | STORAGE INTEGRATION FOR HOST-BASED WRITE-BACK CACHING - Techniques for enabling integration between a storage system and a host system that performs write-back caching are provided. In one embodiment, the host system can transmit to the storage system a command indicating that the host system intends to cache, in a write-back cache, writes directed to a range of logical block addresses (LBAs). The host system can further receive from the storage system a response indicating whether the command is accepted or rejected. If the command is accepted, the host system can initiate the caching of writes in the write-back cache. | 2015-03-19 |
20150081980 | METHOD AND APPARATUS FOR STORING A PROCESSOR ARCHITECTURAL STATE IN CACHE MEMORY - A method includes storing architectural state data associated with a processing unit in a cache memory using an allocate without fill mode. A system includes a processing unit, a cache memory, and a cache controller. The cache controller is to receive architectural state data associated with the processing unit and store at least a first portion of the architectural state data in the cache memory using a first fill mode responsive to a first value of a fill mode flag and store at least a second portion of the architectural state data in the cache memory using a second fill mode responsive to a second value of a fill mode flag, wherein the first fill mode differs from the second fill mode with respect to whether previous values of the architectural state data are retrieved prior to storing the first or second portions in the cache memory. | 2015-03-19 |
20150081981 | GENERATING PREDICTIVE CACHE STATISTICS FOR VARIOUS CACHE SIZES - Technology is disclosed for generating predictive cache statistics for various cache sizes. In some embodiments, a storage controller includes a cache tracking mechanism for concurrently generating the predictive cache statistics for various cache sizes for a cache system. The cache tracking mechanism can track simulated cache blocks of a cache system using segmented cache metadata while performing an exemplary workload including various read and write requests (client-initiated I/O operations) received from client systems (or clients). The segmented cache metadata corresponds to one or more of the various cache sizes for the cache system. | 2015-03-19 |
20150081982 | SHIELDING A MEMORY DEVICE - A method of shielding a memory device ( | 2015-03-19 |
20150081983 | PRE-FETCH IN A MULTI-STAGE MEMORY MANAGEMENT SYSTEM - A memory management system for managing a memory and includes a multi-stage memory management unit including control circuitry and cache memory. The cache memory may have a respective translation look-aside buffer for each stage of the multi-stage memory management unit. The control circuitry may be configured to generate a blank data request including a virtual address and information that specifies that data is not to be read from the memory, perform address translations based on the generated blank data request in multiple stages until a physical address is obtained, and discard the blank data request. | 2015-03-19 |
20150081984 | HIGH PERFORMANCE INTERCONNECT COHERENCE PROTOCOL - A request is received that is to reference a first agent and to request a particular line of memory to be cached in an exclusive state. A snoop request is sent intended for one or more other agents. A snoop response is received that is to reference a second agent, the snoop response to include a writeback to memory of a modified cache line that is to correspond to the particular line of memory. A complete is sent to be addressed to the first agent, wherein the complete is to include data of the particular line of memory based on the writeback. | 2015-03-19 |
20150081985 | ADMINISTERING INTER-CORE COMMUNICATION VIA SHARED MEMORY - Administering inter-core communication via shared memory may be carried out in a system in which each core is associated with a mailbox in a shared memory region. Such administration may include constructing a mailbox latency table describing latency of writing data from each core to each mailbox; constructing a locking latency table describing latency of each core in acquiring a lock for each of the mailboxes; identifying, from the tables, groups of a cores having mailbox and locking latency within a predefined range of acceptable latency values; and for each identified group of cores, establishing, for every pair of cores in the group of cores, a private channel, including pinning, for each private channel established for a pair of cores, one local memory segment per core. | 2015-03-19 |
20150081986 | MODIFYING NON-TRANSACTIONAL RESOURCES USING A TRANSACTIONAL MEMORY SYSTEM - Techniques are provided for reliable and efficient access to non-transactional resources using transactional memory. In certain aspects, a device may include memory and one or more processing entities, configurable to execute a first transaction comprising one or more write operations to a first memory address, and a second transaction comprising one or more write operations to a second memory address. The first memory address and the second memory address may be mapped to the same controller for a hardware component and the one or more processing entities may commence execution of the second transaction after the first transaction starts execution and before the completion of the first transaction. The device may also include a transactional memory system configurable to communicate data written to the first memory address from the first transaction and the second memory address from the second transaction to the controller upon completion of the respective transactions. | 2015-03-19 |
20150081987 | DATA SUPPLY CIRCUIT, ARITHMETIC PROCESSING CIRCUIT, AND DATA SUPPLY METHOD - An data supply circuit includes a buffer configured to store a plurality of data items each having a first width, a memory access unit configured to read source data stored in memory and to store the source data as one or more data items each having the first width in the buffer, and a selection control unit configured to repeat multiple times an operation of reading a data item having a second width shorter than or equal to the first width to read a plurality of data items each having the second width contiguously and sequentially from the buffer and configured to continue to read from a head end of the source data upon a read portion reaching a tail end of the source data. | 2015-03-19 |
20150081988 | METHOD AND SYSTEM FOR PARALLEL PROGRAM EXECUTION - A method for executing a program in parallel includes creating a program replica, which includes a write operation on and an identifier of an object and is a copy of the program, for a thread. The identifier specifies whether the object is thread-local. The method includes modifying the write operation based on a speculation that the write operation uses only thread-local objects. The write operation executes in a transaction of the thread. The method includes determining, while executing the program replica and using the identifier, that the object used by the write operation is not thread-local, de-optimizing the write operation by adding instrumentation to implement a software transactional memory (STM) system for the write operation to obtain a de-optimized write operation, and performing the de-optimized write operation on the object to obtain a result and store the result in a redo log. | 2015-03-19 |
20150081989 | SEMICONDUCTOR DEVICES INCLUDING APPLICATION PROCESSOR CONNECTED TO HIGH-BANDWIDTH MEMORY AND LOW-BANDWIDTH MEMORY, AND CHANNEL INTERLEAVING METHOD THEREOF - A memory system includes a high-bandwidth memory device, the high-bandwidth memory device having a relatively high operation bandwidth, the high-bandwidth memory device having a plurality of access channels. A low-bandwidth memory device has a relatively low operation bandwidth relative to the high-bandwidth memory device, the low-bandwidth memory device having one or more access channels. An interleaving unit performs a memory interleave operation among the plurality of access channels of the high-bandwidth memory device and an access channel of the one or more access channels of the low-bandwidth memory device. | 2015-03-19 |
20150081990 | Intelligent Partitioning of External Memory Devices - Multiple memory devices, such as hard drives, can be combined and logical partitions can be formed between the drives to allow a user to control regions on the drives that will be used for storing content, and also to provide redundancy of stored content in the event that one of the drives fails. Priority levels can be assigned to content recordings such that higher value content can be stored in more locations and easily accessible locations within the utilized drives. Users can control and organize how recorded content is stored between the drives such that an external drive may be removed from a first gateway device and attached to a second gateway device without losing the ability to access the recorded content from the first gateway device at a later time. In this manner, a user is provided with the ability to transport an external drive containing stored content recordings between multiple different gateway devices such that the recordings may be accessed at different locations or user premises. | 2015-03-19 |
20150081991 | INFORMATION PROCESSING APPARATUS AND ACCESS CONTROL METHOD - Upon receipt of an instruction to access a logical address of a storage medium, an information processing apparatus controls access to its corresponding physical address of the storage medium. A management unit manages mapping between a continuous series of logical addresses and discrete physical addresses skipping a predetermined number of replacement areas. A controller identifies to which physical address the received logical address is mapped, and controls access to the storage medium using the identified physical address. When a defect occurs in a storage area indicated by a physical address, the information processing apparatus remaps its corresponding logical address to a replacement area adjacent to the defective physical address. | 2015-03-19 |
20150081992 | METHOD, DEVICE, AND SYSTEM FOR DATA STORAGE MANAGEMENT - The disclosure involves a method for saving data from webpages. The method can be realized through the following steps: when the request of saving data from a target webpage is received, whether assigned saving space is big enough for storing all the data from a target webpage is judged in the beginning; if the assigned saving space is not big enough to store all the data from the target webpage, estimate the number of page views of the current collection of webpages in the next pre-set circle and the current collection of webpages is correspondent to webpage data saved in the saving space; based on the estimated amount of page view, eliminate webpage data saved in the saving space in order to make the saving space have the ability to save all the webpage data of the collection of the webpages mentioned above; and then all the webpage data of the collection of the webpages mentioned above is saved in the space. The disclosure also provides a device for storing webpage data. The disclosure helps improving the efficiency of saving data and the utilization rate of the saved webpage data. | 2015-03-19 |
20150081993 | INCREMENTAL BACKUPS USING RETIRED SNAPSHOTS - Systems and methods for performing backups to a storage device are provided. For virtual disks of a virtual machine, snapshots are used to backup data periodically to a storage device. A disk virtualization layer “retires” data blocks associated with a snapshot, while retaining a list of block addresses, for comparison in future backup operations. The retired snapshot can be compared against future snapshots to generate incremental backups without occupying storage space with data blocks that have already been copied to another storage device. | 2015-03-19 |
20150081994 | INCREMENTAL BACKUPS USING RETIRED SNAPSHOTS - Systems and methods for performing backups to a storage device are provided. For virtual disks of a virtual machine, snapshots are used to backup data periodically to a storage device. A disk virtualization layer “retires” data blocks associated with a snapshot, while retaining a list of block addresses, for comparison in future backup operations. The retired snapshot can be compared against future snapshots to generate incremental backups without occupying storage space with data blocks that have already been copied to another storage device. | 2015-03-19 |
20150081995 | DATA PROTECTION WITH MULTIPLE SITE REPLICATION - Systems and methods for replicating data from a first site to a second site remote from said first site are described. An embodiment includes storing compressed data on a hard disk appliance, reading said data without decompressing said data, sending said data over a wide-area-network (WAN) in a compressed state, and storing said data on a second hard disk appliance remote from said first hard disk appliance in its compressed state without performing an additional compression operation. | 2015-03-19 |
20150081996 | PAUSELESS GARBAGE COLLECTOR WRITE BARRIER - An example method of managing memory includes identifying a first object of the first type to update, the first object being stored on a heap. The method also includes reading a first memory address stored in a second object of the second type and storing a copy of the first object at a second memory address. The first memory address is an initial memory address of the first object. The method further includes after the copy is stored, reading a third memory address stored in the second object. The third memory address is a current memory address of the first object. The method also includes determining whether the first memory address matches the third memory address, and when the first memory address is determined to match the third memory address, updating the first memory address stored in the second object with the second memory address. | 2015-03-19 |
20150081997 | USING AN ALIAS VOLUME NAME FOR A VOLUME TO ALLOCATE SPACE TO A DATA SET - Provided are a computer program product, system, and method for using an alias volume name for a volume to allocate space to a data set. An assignment of a plurality of volumes to a data set is maintained, wherein the volumes are configured in a storage system. A request is received to extend the data set. An alias volume name is assigned to the data set for a previously assigned volume to the data to extend the data set in response to one of the previously assigned volumes having available space to extend the data set. A base volume name is assigned to the data set for a volume not assigned to the data set in response to one of the previously assigned volumes to the data set not having available space to extend the data set. | 2015-03-19 |
20150081998 | BLOCK-BASED STORAGE DEVICE WITH A MEMORY-MAPPED INTERFACE - Described herein are methods for accessing a block-based storage device having a memory-mapped interface and a block interface. In one embodiment, an apparatus (e.g., block-based storage device) includes a storage array to store data and a memory-mapped interface that is coupled to the storage array. The memory-mapped interface includes memory-mapped memory space. The memory-mapped interface receives direct access requests from a host to directly access memory-mapped files. The apparatus also includes a block interface that is coupled to the storage array. The block interface receives block requests from a storage driver to access the storage array. | 2015-03-19 |
20150081999 | MEMORY MAPPING IN A PROCESSOR HAVING MULTIPLE PROGRAMMABLE UNITS - The disclosure includes, in general, among other aspects, an apparatus having multiple programmable units integrated within a processor. The apparatus has circuitry to map addresses in a single address space to resources within the multiple programmable units where the single address space includes addresses for different ones of the resources in different ones of the multiple programmable units and where there is a one-to-one correspondence between respective addresses in the single address space and resources within the multiple programmable units. | 2015-03-19 |
20150082000 | SYSTEM-ON-CHIP AND ADDRESS TRANSLATION METHOD THEREOF - A memory management unit comprises an address translation unit that receives a memory access request as a virtual address and translates the virtual address to a physical address. A translation lookaside buffer stores page descriptors of a plurality of physical addresses, the address translation unit determining whether a page descriptor of a received virtual address is present in the translation lookaside buffer. A prefetch buffer stores page descriptors of the plurality of physical addresses. The address translation unit, in the event the page descriptor of the received virtual address is not present in the translation lookaside buffer, further determines whether the page descriptor of the received virtual address is present in the prefetch buffer; updates the translation lookaside buffer with the page descriptor in response to the determination; and performs a translation of the virtual address to a physical address using the page descriptor. | 2015-03-19 |
20150082001 | TECHNIQUES FOR SUPPORTING FOR DEMAND PAGING - One embodiment of the present invention includes techniques to support demand paging across a processing unit. Before a host unit transmits a command to an engine that does not tolerate page faults, the host unit ensures that the virtual memory addresses associated with the command are appropriately mapped to physical memory addresses. In particular, if the virtual memory addresses are not appropriately mapped, then the processing unit performs actions to map the virtual memory address to appropriate locations in physical memory. Further, the processing unit ensures that the access permissions required for successful execution of the command are established. Because the virtual memory address mappings associated with the command are valid when the engine receives the command, the engine does not encounter page faults upon executing the command. Consequently, in contrast to prior-art techniques, the engine supports demand paging regardless of whether the engine is involved in remedying page faults. | 2015-03-19 |
20150082002 | DYNAMIC HETEROGENEOUS HASHING FUNCTIONS IN RANGES OF SYSTEM MEMORY ADDRESSING SPACE - Dynamic heterogeneous hashing function technology for balancing memory requests between multiple memory channels is described. A processor includes functional units and multiple memory channels, and a memory controller unit (MCU) coupled between them. The MCU includes a dynamic heterogeneous hashing module (DHHM) that includes multiple specific-purpose hashing function blocks that define different interleaving sequences for memory requests to alternately access the multiple memory channels. The DHHM also includes a hashing-function selection block. The hashing-function selection block is operable to identify a requesting functional unit originating a current memory request and to select one of the specific-purpose hashing function blocks for the current memory request in view of the requesting functional unit. | 2015-03-19 |
20150082003 | Multiprocessor Having Associated RAM Units - A multiprocessor has a plurality of arithmetic units, each having two input registers and one output register, and a plurality of RAM units each having RAM memory and a pointer associated with the RAM memory such as a program pointer, an address pointer, a stack pointer or a subroutine claim pointer. | 2015-03-19 |
20150082004 | Faster and More Efficient Different Precision Sum of Absolute Differences for Dynamically Configurable Block Searches for Motion Estimation - This invention is a digital signal processor form plural sums of absolute values (SAD) in a single operation. An operational unit performing a sum of absolute value operation comprising two sets of a plurality of rows, each row producing a SAD output. Plural absolute value difference units receive corresponding packed candidate pixel data and packed reference pixel data. A row summer sums the output of the absolute value difference units in the row. The candidate pixels are offset relative to the reference pixels by one pixel for each succeeding row in a set of rows. The two sets of rows operate on opposite halves of the candidate pixels packed within an instruction specified operand. The SAD operations can be performed on differing data widths employing carry chain control in the absolute difference unit and the row summers. | 2015-03-19 |
20150082005 | PROCESSING SYSTEM AND METHOD OF INSTRUCTION SET ENCODING SPACE UTILIZATION - A processing system comprises a processing device; a first instruction set encoded in a first encoding space and comprising one or more first instructions; a second instruction set encoded in a second encoding space different from the first encoding space and comprising two or more orthogonal second instructions; and an instruction encoder arranged to encode and encapsulate subsets of the second instructions in instruction containers, each instruction container sized to comprise a plurality of the second instructions. | 2015-03-19 |
20150082006 | System and Method for an Asynchronous Processor with Asynchronous Instruction Fetch, Decode, and Issue - Embodiments are provided for an asynchronous processor with an asynchronous Instruction fetch, decode, and issue unit. The asynchronous processor comprises an execution unit for asynchronous execution of a plurality of instructions, and a fetch, decode and issue unit configured for asynchronous decoding of the instructions. The fetch, decode and issue unit comprises a plurality of resources supporting functions of the fetch, decode and issue unit, and a plurality of decoders arranged in a predefined order for passing a plurality of tokens. The tokens control access of the decoders to the resources and allow the decoders exclusive access to the resources. The fetch, decode and issue unit also comprises an issuer unit for issuing the instructions from the decoders to the execution unit | 2015-03-19 |
20150082007 | REGISTER MAPPING WITH MULTIPLE INSTRUCTION SETS - A processor core supports execution of program instruction from both a first instruction set and a second instruction set. An architectural register file | 2015-03-19 |
20150082008 | FORMING INSTRUCTION GROUPS BASED ON DECODE TIME INSTRUCTION OPTIMIZATION - Instructions are grouped into instruction groups based on optimizations that may be performed. An instruction is obtained, and a determination is made as to whether the instruction is to be included in a current instruction group or another instruction group. This determination is made based on whether the instruction is a candidate for optimization, such as decode time instruction optimization. If it is determined that the instruction is to be included in another group, then the other group is formed to include the instruction. | 2015-03-19 |
20150082009 | METHOD AND APPARATUS FOR THE DYNAMIC CREATION OF INSTRUCTIONS UTILIZING A WIDE DATAPATH - A processing system and method includes a predecoder configured to identify instructions that are combinable to form a single executable internal instruction. Instruction storage is configured to merge instructions that are combinable. An instruction execution unit is configured to execute the single, executable internal instruction on a hardware wide datapath. | 2015-03-19 |
20150082010 | SHIFT INSTRUCTION WITH PER-ELEMENT SHIFT COUNTS AND FULL-WIDTH SOURCES - Techniques for packing and unpacking data from a source register using a particular shift instruction are provided. The shift instructions takes, as input, a source register that contains a plurality of elements and a shift count register that contains a plurality of shift counts. Each shift count indicates how much to shift bits from the source registers. Where “source” bits are shifted (or copied) to in an output register depends on the position of the shift count in the shift count register. The shift counts may correspond to one or more bytes from the source register. The shift instruction may initiate a left shift operation or a right shift operation. | 2015-03-19 |
20150082011 | FAST RECALIBRATION CIRCUITRY FOR INPUT/OUTPUT (IO) COMPENSATION FINITE STATE MACHINE POWER-DOWN-EXIT - Fast recalibration circuitry for input/output (IO) compensation finite state machine power-down exit is described. The fast recalibration circuitry includes a finite state machine having a volatile memory to store an IO compensation setting and a power supply coupled to the volatile memory to provide power to the volatile memory. The fast recalibration circuitry includes a persistent memory coupled to the volatile memory and one or more circuits, coupled to the volatile memory and the persistent memory, to identify an event to enter a power-down mode, wherein the power-down mode comprises the power supply removing power from the volatile memory and transfer the IO compensation setting in the volatile memory to the persistent memory prior to the power supply removing the power from the volatile memory. | 2015-03-19 |
20150082012 | SYSTEMS AND METHODS FOR PROVISIONING AN INFORMATION HANDLING SYSTEM FOR OPERATING SYSTEM STREAMING BASED ON INFORMATION HANDLING RESOURCE INVENTORY - In accordance with embodiments of the present disclosure, a method for provisioning an information handling system for operating system streaming, the information handling system having one or more information handling resources, may be provided. The method may include receiving from the information handling system a boot request to boot a streaming operating system. The method may also include, responsive to determining that an operating system image associated with the information handling system is not available, instructing the information handling system to boot a service operating system for generating an inventory of the one or more information handling resources. The method may additionally include receiving the inventory from the information handling system. The method may further include generating a new operating system image including drivers for supporting the one or more information handling resources identified in the inventory. | 2015-03-19 |
20150082013 | BOOTSTRAP OS PROTECTION AND RECOVERY - A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer system to access the Internet. A method for protecting a computer system includes reading stored status information indicating whether network connectivity was available the last time an operating system of the computer system was operational, when the stored status information indicates that network connectivity was not available, obtaining a software patch, and executing and applying the software patch. | 2015-03-19 |
20150082014 | Virtual Storage Devices Formed by Selected Partitions of a Physical Storage Device - Disclosed is a computer system with a physical storage device. The physical storage device has a plurality of partitions and allows a user to select and combine at least two partitions to form a virtual storage device to be accessed by the operating system and makes unselected partitions inaccessible to the operating system. | 2015-03-19 |
20150082015 | LOW-POWER STARTUP METHOD AND USER EQUIPMENT - The present invention discloses a low-power startup method and a user equipment. The method includes: running, by a user equipment UE, a first subprogram in a boot load program bootloader, so as to determine whether the UE is charged through a universal serial bus interface USB; if the UE is charged through the USB and battery power is lower than a starting threshold, initializing, by the UE, the USB; when the USB successfully enumerates the UE, running, by the UE, a second subprogram in the bootloader to initialize an off-chip random memory in the UE; running, by the UE, a third subprogram in the bootloader to read a system mirror from an off-chip flash memory in the UE and load the system mirror to the off-chip random memory; and running, by the UE, the system mirror to complete a startup. | 2015-03-19 |
20150082016 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIUMS FOR UPDATING COMPONENTS IN A CONVERGED INFRASTRUCTURE SYSTEM - Methods, systems, and computer readable mediums for updating components in a converged infrastructure system are disclosed. According to one method, the method includes identifying components in a converged infrastructure system that require remediation in order to comply with a defined converged infrastructure configuration and determining remediation content to enable each of the identified components to be compliant with the defined converged infrastructure configuration. The method further includes retrieving the remediation content for the identified components from a repository and utilizing the remediation content to update the identified components on the converged infrastructure system in accordance with the defined converged infrastructure configuration. | 2015-03-19 |
20150082017 | ELECTRONIC DEVICE HAVING A PIN FOR SETTING ITS MODE OF OPERATION AND METHOD TO SET A MODE OF OPERATION FOR AN ELECTRONIC DEVICE HAVING A PIN - An electronic device having a pin for setting its mode of operation, wherein the pin is connected or connectable to a first connection of a resistor, wherein the electronic device is arranged to detect a location of the resistor, wherein the electronic device is arranged to detect a size of the resistor, wherein the electronic device is arranged to determine a first setting based on the location of the resistor, and wherein the electronic device is arranged to determine a second setting based on the size of the resistor. | 2015-03-19 |
20150082018 | SECURE DATA EXCHANGE METHOD, AND COMMUNICATION DEVICE AND SYSTEM IMPLEMENTING SAME - The invention relates to a method for securely exchanging data ( | 2015-03-19 |
20150082019 | Private Data Processing in a Cloud-Based Environment - In one embodiment, a method for securing data on a semi-trusted server is implemented on a computing device and includes: receiving at least a current session key from a user device for use during a current session, where the current session key is suitable for encrypting data and for decrypting data encrypted with the current session key, decrypting communications received from the user device during the session with said session key, encrypting with the session key at least one of communications to be sent to said user device and personal data generated during the session, storing the encrypted personal data, and discarding the current session key upon completion of the session, thereby limiting possible access to the stored encrypted personal data other than during the session. Related apparatus and methods are also described. | 2015-03-19 |
20150082020 | STREAMING ONE TIME PAD CIPHER USING ROTATING PORTS FOR DATA ENCRYPTION - A streaming one time pad cipher using rotating ports for data encryption uses a One Time Pad (OTP) and an Exclusive Or (XOR) (or other cipher) with a public key channel to encrypt and decrypt OTP data. There is no method in cryptography to thwart the OTP/XOR method and it is proven impossible to crack. The method also rotates the ports of the channels periodically to increase communication obfuscation. Through pre-fetching and cache of OTP data, latency increases from encryption are kept to an absolute minimum as the XOR for encryption and decryption is done with a minimal number of instructions. | 2015-03-19 |
20150082021 | MOBILE PROXY FOR WEBRTC INTEROPERABILITY - An example method and system for a mobile proxy for WebRTC interoperability is discussed. The method may include receiving a DTLS security handshake from a WebRTC API of a browser endpoint, negotiating an encryption mechanism through a signaling protocol with a non-WebRTC enabled endpoint, completing, using one or more hardware processors, the DTLS security handshake with the WebRTC API of the browser endpoint based on the encryption mechanism, and exchanging, through a mobile proxy, first media traffic from the browser endpoint with the non-WebRTC enabled endpoint and second media traffic from the non-WebRTC enabled endpoint with the browser endpoint. In various embodiments, if the non-WebRTC endpoint uses SDES for negotiation of the encryption mechanism, the encryption mechanism may include SDES-conveyed key information. However, if the non-WebRTC endpoint uses RTP for media exchange of the second media traffic, the encryption mechanism may correspond to a null cipher mode | 2015-03-19 |
20150082022 | DEVICES AND TECHNIQUES FOR CONTROLLING DISCLOSURE OF SENSITIVE INFORMATION - Devices and techniques for controlling disclosure of sensitive information are provided. A request for information may be received through a first communication channel. The request may be provided using an account of a user. First encrypted data, which includes the requested information and has been encrypted with a first asymmetric encryption key, may be decrypted. The decrypted information may be re-encrypted with a second asymmetric encryption key different from the first asymmetric encryption key to obtain second encrypted data comprising the information. The second encrypted data may be sent to the user through a second communication channel different from the first communication channel. | 2015-03-19 |
20150082023 | Aggregator Node, Method for Aggregating Data, and Computer Program Product - According to an aspect of the invention, an aggregator node is conceived for use in a network, wherein said aggregator node is arranged to aggregate encrypted data, and wherein said aggregator node comprises a secure element which is arranged to perform the aggregation of the encrypted data in a secure manner. | 2015-03-19 |
20150082024 | TECHNOLOGIES FOR SYNCHRONIZING AND RESTORING REFERENCE TEMPLATES - Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices. In some embodiments one or more client devices may register with a synchronization server and provide encrypted copies of their reference templates to the server. In a restoration operation, the synchronization server may provide an encrypted copy of a client's reference template(s) to the client, which may decrypt them in a protected environment. In a synchronization operation, the synchronization server may provide encrypted copy of a first client's template(s) to a plurality of second clients. The second clients may then decrypt the encrypted template(s) within a protected environment using an appropriate decryption key. | 2015-03-19 |
20150082025 | AUTHENTICATION AND SECURED INFORMATION EXCHANGE SYSTEM, AND METHOD THEREFOR - Identity based encryption (IBE). An IBE server assigns a private and public key pair to a client device based on a unique identification of the client device. To establish an encrypted session with the client device a server device requests the client device's public key from the IBE server. Authentication of the client and the server by the IBE server is based on credentials or a token. Assigned keys are securely stored in an embedded trusted platform provided in the client device. | 2015-03-19 |
20150082026 | SYSTEMS AND METHODS FOR LOCKING AN APPLICATION TO DEVICE WITHOUT STORING DEVICE INFORMATION ON SERVER - A system and method for locking an application to specific hardware device without storing device or user information on server. A lock registration is performed during the first usage of the application where the application sends a unique value to the server through secured channel. This unique value is combination of user specific information and device information. The server receives the unique value, and sends the encrypted value to the device, which is stored in predefined location of device. During lock validation, which is initiated during every request to the server or on every session creation, the device unique value and encrypted value is sent to the server. The server receives it, decrypts the encrypted value, and compares with the received unique value. If both the values are same, the server validates application instance by sending the response to the device else error message is sent to the device. | 2015-03-19 |
20150082027 | DRM METHOD AND DRM SYSTEM FOR SUPPORTING OFFLINE SHARING OF DIGITAL CONTENTS - The present invention provides a DRM method and system for supporting offline sharing of digital resources. When a client applies for joining in a domain, the client sends its own device information to a server, and obtains feature data of the domain by receiving a sharing certificate sent by the server. Wherein, the sharing certificate is created by encrypting the feature data of the domain by using the equipment information of the client as a cipher. The client decrypts the sharing certificate by using its own equipment information to obtain the feature data. Since the feature data has already been obtained in the procedure of applying for joining the domain, a client is able to use the digital resources by using the feature data even if the client cannot connect to network, thus, an advantage of supporting offline sharing of digital resources is achieved. | 2015-03-19 |
20150082028 | SECURING DIGITAL CONTENT SYSTEM AND METHOD - A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like. | 2015-03-19 |
20150082029 | SHARED PORTAL CONTEXT SESSION - The present disclosure involves systems, software, and computer implemented methods for sharing session state between portal application portlets associated with different domains. One example method includes setting a cookie for use in a portal environment. The cookie is encrypted with a key and stores at least a portion of a session state associated with a current portal session. The encrypted cookie is provided for storage at a client associated with the portal session. Execution of a portal application is initiated within the portal environment. The portal application is provided with a copy of the encrypted cookie. A copy of the key is provided to the portal application. The provided copy of the key is used to decrypt the cookie at the portal application. The session state stored in the cookie is used to set at least a portion of the session state of the portal application. | 2015-03-19 |
20150082030 | Security Mechanism for Video Storage System - A video storage system includes a security mechanism between a CVR unit and a CVR manager. The security mechanism provides public and private keys according to asymmetric cryptography. The public key is sent to the CVR manager. The CVR manager produces a plaintext of a video footage from an IP camera. The CVR manager produces and uses a random key according to symmetric cryptography to turn the plaintext of the video footage into an encrypted text, uses the public key to turn the random key into an encrypted text, and respectively sends the encrypted texts into video and key databases in the CVR unit. The encrypted texts can be received from the databases. The private key turns the encrypted text of the random key into the random key. The random key turns the encrypted text of the video footage into the plaintext. | 2015-03-19 |
20150082031 | Method and System to Securely Migrate and Provision Virtual Machine Images and Content - A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key. | 2015-03-19 |
20150082032 | DISTRIBUTION OF USER CREDENTIALS - A method relates to distributing user credentials in a distributed physical access control system, and more generally to distributing user credentials in a distributed system. A method may include storing a user credential database (DB), a first transformed credential DB and a second transformed credential DB for authenticating users to access a first and a second service provided by the device. The method may include generating the first transformed credential DB and the second transformed credential DB based on the user credential DB and comparing a credential received from a user to the first or the second transformed credential DB to determine whether to grant access to the first or the second service. The method may include distributing the user credential DB to a plurality of other devices connected in a network for the other devices to generate transformed credential DBs for authenticating users to access services. | 2015-03-19 |
20150082033 | ANONYMOUS DECISIONS IN AN ACCESS CONTROL SYSTEM - A controller device may correspond to a physical access controller in a distributed physical access control system. The controller device may include logic configured to obtain access to a global database that include access control information for a plurality of controller devices. The logic may be further configured to derive a local access rules table from the global database, wherein the local access rules table relates users to access rules, and wherein the local access rules table is encrypted with a local access rules key; and derive a local credentials table from the global database, wherein the local credentials table relates hashed credentials to users, wherein the local credentials table stores, for a user, the local access rules key encrypted with unhashed credentials associated with the user, wherein the unhashed credentials are not stored in the controller device. | 2015-03-19 |
20150082034 | METHOD AND APPARATUS FOR TRANSMITTING DATA USING ENCODED PATTERNS OF CHANGING COLORS - A system and method for encoding, transmitting and decoding data is described which defines a plurality of bit patterns into a predetermined color combination of RGB values. A message is formed from the plurality of bit patterns and the message is then arranged into a recognizable format with a message protocol. The message is transmitted to a decoder, which decodes the message and displays the message on a display. A use is provided to establish a two factor authentication mechanism to authenticate a user by a requester. | 2015-03-19 |
20150082035 | METHOD OF PROVISIONING PERSISTENT HOUSEHOLD KEYS FOR IN-HOME MEDIA CONTENT DISTRIBUTION - A method of providing a household key to a client device, comprising receiving a key request including a subscriber identifier at an update server from a client device, and determining whether the subscriber identifier has previously been associated with a household encryption key. The household encryption key can be configured to be used by the client device to encrypt recordings of media content it makes and/or decrypt recordings of media content it previously made or that it receives from another client device that encrypted the recording using the household key. If the subscriber identifier has previously been associated with a household encryption key, the update server retrieves the household key and sends it to the client device. If the subscriber identifier has not previously been associated with a household encryption key, the update server retrieves a new household key from a pool, associates the new household key with the subscriber identifier, and sends it to the client device. | 2015-03-19 |
20150082036 | IMAGE FORMING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM - An image forming apparatus includes a storage unit configured to store a plurality of encryption keys, wherein the plurality of encryption keys includes at least a default key, a setting unit configured to set an encryption key to be used for encryption communication according to a specific protocol, wherein the encryption key is selected from the plurality of encryption keys, an obtaining unit configured to obtain security setting information for limiting use of an encryption key, and a control unit configured to, in the case where the security setting information is obtained, determine whether or not the encryption key set by the setting unit has a predetermined encryption strength, wherein the control unit is configured to change the set encryption key to the default key in response to determining that the set encryption key has not the predetermined encryption strength. | 2015-03-19 |
20150082037 | AUTHENTICATING CREDENTIALS FOR MOBILE PLATFORMS - Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service. | 2015-03-19 |
20150082038 | DISPLAY CONTROL APPARATUS, DISPLAY CONTROL METHOD AND SERVER SYSTEM - A display control apparatus performs download processing and streaming processing. In the download processing, after first mutual authentication between removable media and a license server, the removable media receive and store a first title key from a license server and first encrypted content from a content server. In the streaming processing, the removable media and the license server perform second mutual authentication, the removable media receive and store a second title key and a content address from the license server, the removable media and the display control apparatus perform third mutual authentication, the display control apparatus acquires the second title key and the content address recorded on the removable media, the display control apparatus streams and receives second encrypted content from the content server, and the display control apparatus decodes the streamed-and-received second encrypted content using the second title key, and streams and reproduces the decoded second encrypted content. | 2015-03-19 |
20150082039 | NETWORK CONNECTION AUTOMATION - A computing resource service provider receives a request from a customer to establish a physical connection between a provider network device and a customer network device in a colocation center. Once the connection has been established, the customer may transmit cryptographic authentication information, through the physical connection, to the provider network device. The provider network device transmits this information to an authentication service operated by the computing resource service provider to verify the authenticity of the information. If the information is authentic, the authentication service may re-configure the provider network device to allow the customer to access one or more services provided by the computing resource service provider. The authentication service may transmit cryptographic authentication information to the customer to verify the identity of the computing resource service provider. | 2015-03-19 |
20150082040 | METHOD, INFORMATION SERVICE SYSTEM AND PROGRAM FOR INFORMATION ENCRYPTION/DECRYPTION - With a portal server, a request for information from a terminal of a second user that is an agent for a first user is received, and an encrypted data directed to a terminal of the first user, stored in an encrypted-data memory unit, is re-encrypted using a re-encryption key for the second user, stored in a first encryption-key memory unit, arid is transmitted to the terminal of the second user, with the terminal of the second user, the re-encrypted data received is decrypted using an encryption key for the second user, stored in a second encryption-key memory unit, and time keys specified by the terminal of the first user, related to a time-period during which browsing of the information is permitted. | 2015-03-19 |
20150082041 | MULTI - REPOSITORY KEY STORAGE AND SELECTION - System for performing a cryptographic operation, comprising a client system and a server system; said server comprising a multi-repository manager, repositories of cryptographic keys,a processor and a memory; and said client comprising a processor and a memory; wherein said two memories store computer executable instructions that, when executed, cause the client and the server to perform a method comprising: the client sending a request of the cryptographic operation to the server;the multi-repository manager obtaining a set of references to cryptographic keys allowed to the request from the repositories of cryptographic keys; the multi-repository manager establishing a cryptographic key referenced in said set of references as the cryptographic key to be used; the multi-repository manager requesting performance of the cryptographic operation to the repository wherein the cryptographic key to be used is stored; the multi-repository manager obtaining the result of the cryptographic operation from the repository that has performed the cryptographic operation; and the server sending the result of the cryptographic operation to the client. | 2015-03-19 |
20150082042 | FIELD PROGRAMMABLE SMART CARD TERMINAL AND TOKEN DEVICE - A digital programmable smart card terminal device and token collectively known as the token device is disclosed. The token device comprises a field programmable token device which accepts a user's smart card. The combination of token device and smart card may then be used for a variety of applications that include user authentication, secure access, encryption. One specific application is that of an electronic wallet. In one embodiment, an electronic smart card terminal includes a smart card reader adapted to receive and communicate with a smart card having smart card data stored thereon; token personality logic programmed based on the smart card data as a token personality subsequent to insertion of the smart card in the smart card reader; and a communications mechanism for communicating authentication data derived from the token personality. Since the smart card terminal only gains its token personality when a smart card is inserted, manufacture and distribution of the terminal on a wide scale is possible. | 2015-03-19 |
20150082043 | TERMINAL, SERVER AND DIGITAL CONTENT AUTHORIZATION METHOD - The present application provides a terminal, a server and a digital content authorization method. The terminal comprises: an extracting unit, configured to extract identification information of the terminal when the terminal requests an authorization for a designated layer of content of digital contents from a server; a transceiver unit, configured to transmit the identification information of the terminal to the server and receive an authorization certificate and the designated layer of content of the digital contents from the server; and a decryption unit, configured to decrypt the designated layer of content of the digital contents based on the identification information and the authorization certificate. Embodiments of the present invention may support the copyright protection by using layered encryption technique. The digital content cannot be read only by copying so as to enhance the protection of the digital contents. | 2015-03-19 |
20150082044 | APPARATUS AND METHOD FOR INCORPORATING SIGNATURE INTO ELECTRONIC DOCUMENTS - Embodiments relate to methods and apparatus for facilitating the protection from tampering of an electronic document to which an electronic signature is applied. In non-limiting examples, techniques may relate to the handling of document appearance data, dynamic signature biometric data, digital footprints data, pixel history data, and camera-acquired image data. | 2015-03-19 |
20150082045 | ORIGINATOR PUBLISHING AN ATTESTATION OF A STATEMENT - Methods, systems and apparatuses for an originator publishing an attestation of a statement are disclosed. One method includes obtaining information, wherein the information includes the attestation of the statement, wherein the statement includes at least a portion of the information to be attested to, and wherein the attestation includes a context describing conditions of the attestation, and wherein the attestation includes a cryptographic signature of the context and the statement. The method further includes validating the information. The method further includes communicating after validating the information the information to a destination while maintaining at least one of data privacy or data provenance, including creating a new statement by transforming the statement to a form suitable for the destination, creating, by the computing device, a new attestation by signing the new statement with a new context specific to the computing device, and making available the new attestation to the destination. | 2015-03-19 |
20150082046 | PASSWORD GENERATION AND RETRIEVAL SYSTEM - The present invention seeks to meet these needs by providing a password generation and retrieval system (PGRS) that generates encrypted passwords with a computer program using an algorithm that combines a website information such as a domain name or email address, the user's own text input or phrase, and the user's own numeric value or pin number. The present invention does not involve the maintenance of a database of any kind. As such, there is no login required and no records are kept of the visitors, their input or the passwords generated. Preferably, the process is carried out using a website, browser extension, smart phone application and/or a stand-alone executable program. | 2015-03-19 |
20150082047 | EFFICIENT MULTIPLICATION, EXPONENTIATION AND MODULAR REDUCTION IMPLEMENTATIONS - In one embodiment, the present disclosure provides a method that includes segmenting an n-bit exponent e into a first segment e | 2015-03-19 |
20150082048 | KEYING INFRASTRUCTURE - A keying infrastructure may generate and/or manage cryptographic keys. The cryptographic keys may include identity keys, encryption keys, and a variety of other types of keys. The cryptographic keys may be derived or created with a key derivation function (KDF) or other one-way function. The cryptographic keys may include keys that are accessible to a boot loader, keys that are accessible to particular components of a Trusted Execution Environment (TrEE), and so on. In some examples, a key may be derived from a preceding key in a sequence of keys. The preceding key may be deleted when the key is derived. | 2015-03-19 |
20150082049 | ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES - Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets). | 2015-03-19 |
20150082050 | Anonymous Links to Protect Consumer Privacy - A method and system for bringing together online and offline advertising uses anonymous links that are associated with consumer data. The anonymous links allow processing without personally identifiable information (PII) in a secure environment. Data is matched using the anonymous links. The method and system allows a marketer to utilize offline data to precisely target advertisements without the use of PII, and to perform analytics concerning the use of the online advertisements to more precisely determine the effectiveness of multichannel marketing efforts. | 2015-03-19 |
20150082051 | Method for Formatting and Distributing Electronic Data - A method for formatting and distributing electronic data through a middleware system. A data unit received by the middleware system from an originating system is converted into a formatted data unit and forwarded to a primary destination system. A primary destination identification is retrieved from an information table of the data unit. The primary destination identification is compared to a destination identification in a register of destination systems for a plurality of destination systems. If the primary destination identification matches the destination identification of one of the plurality of destination systems, then formatting specifics for the primary destination system are retrieved from the register of destination systems. The data unit is then converted into the formatted data unit according to the formatting specifics of the primary destination system and the formatted data unit is sent to the primary destination system. Methods for encrypting, decrypting, and authenticating data are also employed. | 2015-03-19 |
20150082052 | ENCRYPTION-ENABLED INTERFACES - Decryption apparatus includes an input memory ( | 2015-03-19 |
20150082053 | INFORMATION PROCESSING APPARATUS AND PROGRAM EXECUTION METHOD - According to one embodiment, an information processing apparatus includes a processor, a main memory, and a memory controller. The memory controller executes an access restriction for each memory region. A first program decodes a protected program which was encrypted in a secure mode. The first program places the protected program which was decoded in a memory region. A second program executes the protected program in a secure mode. The processor places a code region and a protected data region in the protected program which was decoded in a memory region having an access restriction by using the first program. When an access to the protected data region is confirmed, the processor confirms by using the second program that the access is caused by a command from the code region placed by the first program, and then, executes the command. | 2015-03-19 |
20150082054 | System and Method for Establishing a Secure Digital Environment - Systems and methods for providing secure data using a two-layered security mechanism. The systems and methods generate key data based on received input and generate a hash for a given key. The generated hash is utilized as an asymmetric or symmetric encryption key for encrypting data and is simultaneously used as an identifier for subsequent identification and retrieval. | 2015-03-19 |
20150082055 | Changing Output Power to be Within a Range Based on a Power Use Efficiency Peak - If a total output power provided to a computer is less than a minimum of a power capacity range around a power use efficiency peak, and the occurrence of the total output power being less than the minimum value occurs more than a first threshold number of times within a time period, a first action is performed that causes the total output power provided to the computer to change to exceed the minimum of the power capacity range. If the total output power provided to the computer is greater than a maximum of the power capacity range, and the occurrence of the total output power being greater than the maximum occurs more than a second threshold number of times within the time period, a second action is performed that causes the total output power provided to the computer to change to be less than the maximum of the power capacity range. | 2015-03-19 |
20150082056 | COMPUTER DEVICE AND METHOD FOR CONVERTING WORKING MODE OF UNIVERSAL SERIAL BUS CONNECTOR OF THE COMPUTER DEVICE - A computer device and a method for converting a working mode of a universal serial bus (USB) connector of the computer device. The computer device comprises a USB connector, a power interruption unit, a first switch unit, a south bridge chip, a reading unit, a control unit, and a charging control unit. The USB connector is linked to an external USB device. When a fast charging instruction is received, the power interruption unit interrupts the power supply of the USB connector; the first switch unit performs switching, so that the USB connector works in a fast charging mode. When the control unit receives a common charging instruction, the power interruption unit interrupts the power supply of the USB connector; the first switch unit performs switching, so that the USB connector works in a common charging mode, and data transmission can be performed. | 2015-03-19 |
20150082057 | Desk Top Item with LED Means has USB-Units or USB- Module to Charge Other Electric or Digital Data Devices - Desk top items with LEDs also include USB-unit(s) or USB-module(s) and, optionally, additional outlet-units, to supply charging power to other electric or digital devices such as a smart phone or digital data device. The USB-unit(s) or USB-module(s) are arranged to supply power only, and do not have an additional USB data transfer function. | 2015-03-19 |
20150082058 | SCREEN IMAGE MIRRORING METHOD AND APPARATUS - A display apparatus for mirroring a screen image is provided. The display apparatus includes a display unit configured to display a predetermined screen image, an input unit configured to receive a predetermined command or data, a control unit configured to control the predetermined screen image to be transmitted to another display apparatus in order to make the other display apparatus mirror the predetermined screen image, and to reduce power consumption used to display the predetermined screen image when screen image mirroring is requested, and a communication unit configured to transmit the predetermined screen image to the other display apparatus. Also, the display apparatus reduces the power consumption caused when a mirroring service is used. | 2015-03-19 |
20150082059 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 2015-03-19 |
20150082060 | POWER CONSUMPTION MANAGEMENT SYSTEM AND METHOD - A power consumption management system for a central processing unit may include a power consumption estimation block and an activity control block. The power consumption estimation block may be configured to estimate power consumption of the central processing unit based on information related to a status of the central processing unit. The activity control block may be configured to use the estimated power consumption to determine a control to be applied to the central processing unit for regulating a rate of change in power consumption of the central processing unit. | 2015-03-19 |
20150082061 | Information Handling System Docking with Cable Based Power and Video Management - A docking station connects through a docking port and docking cable with an information handling system to support communication between the information handling system and docking station peripherals. The docking cable includes an integrated input device, such as a mechanical button or fingerprint scanner, which accepts an end user input to command a power state transition at the information handling system, such as a transition between an on state and a reduced power state. The power state transition is sent directly from the integrated input device to the information handling system or, alternatively, from the integrated input device to the docking station and then from the docking station to the information handling system. | 2015-03-19 |
20150082062 | HETEROGENOUS MEMORY ACCESS - A memory controller operable for selective memory access to areas of memory exhibiting different attributes leverages different memory capabilities that vary access speed, retention time and power consumption, among others. Different areas of memory have different attributes while remaining available to applications as a single contiguous range of addressable memory. The memory controller employs an operating mode that identifies operational priorities for a computing device, such as speed, power conservation, or efficiency. The memory controller identifies an area of memory based on an expected usage of the data stored in the area, for example an access frequency indicating future retrieval. The memory controller therefore selects areas of memory based on the operating mode and the expected usage of data to be stored in the area according to a heuristic that favors areas of memory based on those exhibiting attributes having a high correspondence to the expected usage of the data. | 2015-03-19 |
20150082063 | BASEBOARD MANAGEMENT CONTROLLER STATE TRANSITIONS - An apparatus can include a circuit board; a processor mounted to the circuit board; memory accessible by the processor; a storage subsystem accessible by the processor; a network interface that includes network states; a controller mounted to the circuit board and operatively coupled to the network interface where the controller includes power states; and transition circuitry that transitions the controller from one of the power states to another one of the power states responsive to a transition of the network interface from one of the network states to another one of the network states. Various other apparatuses, systems, methods, etc., are also disclosed. | 2015-03-19 |
20150082064 | Power Management in a Configurable Bus - A system includes a bus and a component interconnected via the bus. The component may enter a sleep mode during a period of no data transmission involving the component. | 2015-03-19 |
20150082065 | ACCELERATING MICROPROCESSOR CORE WAKE UP VIA CHARGE FROM CAPACITANCE TANK WITHOUT INTRODUCING NOISE ON POWER GRID OF RUNNING MICROPROCESSOR CORES - A mechanism is provided for an integrated circuit with power gating. A power switch is configured to connect and disconnect circuits to a common voltage source. A capacitor tank is configured to supply wakeup charge to a given circuit. A controllable element is connected to the given circuit and to the capacitor tank. The controllable element is configured to controllably connect and disconnect the capacitor tank to the given circuit in order to supply the wakeup charge to the given circuit. The controllable element is configured to, responsive to the power switch disconnecting the given circuit from the common voltage source and to the given circuit being turned on to wakeup, supply the wakeup charge to the given circuit being turned on by transferring the wakeup charge from the capacitor tank to the given circuit. This reduces the electrical charge transferred from the circuits connected to the common voltage source. | 2015-03-19 |
20150082066 | ACCELERATING THE MICROPROCESSOR CORE WAKEUP BY PREDICTIVELY EXECUTING A SUBSET OF THE POWER-UP SEQUENCE - A mechanism is provided for an integrated circuit with power gating. A power header switch is configured to connect and disconnect any one of multiple circuits to a common voltage source, where a powered off circuit is disconnected from the common voltage source. A power-up sequencer includes an initial stages power-up component and a final stages power-up component. The final stages power-up component is configured to execute final stages of a power-up process for the powered off circuit, and the initial stages power-up component is configured to execute initial stages of the power-up process for the powered off circuit. The initial stages power-up component is activated in response to a predictive power-up request. | 2015-03-19 |
20150082067 | INFORMATION PROCESSING APPARATUS AND POWER-OFF CONTROL METHOD OF INFORMATION PROCESSING APPARAUS - Provided are an information processing apparatus and a power-off control method of an information processing apparatus. An information processing apparatus includes a nonvolatile memory; a cache memory for cashing data to be written into the nonvolatile memory; a power switch; a spatial change detecting section configured to detect a change in state of a space around the power switch; a notification section configured to send a user a notification; and a control section. The control section is configured to determine an action of a user likely to turn the power switch off, based on a detection signal outputted by the spatial change detecting section; operate the notification section to send a user a notification that the action is being performed, in response to recognizing the action; and write data stored in the cache memory into the nonvolatile memory after operating the notification section to send the user the notification. | 2015-03-19 |
20150082068 | DUAL-MODE, DUAL-DISPLAY SHARED RESOURCE COMPUTING - A dual-mode, dual-display shared resource computing (SRC) device is usable to stream SRC content from a host SRC device while in an on-line mode and maintain functionality with the content during an off-line mode. Such remote SRC devices can be used to maintain multiple user-specific caches and to back-up cached content for multi-device systems. | 2015-03-19 |
20150082069 | ACCELERATING MICROPROCESSOR CORE WAKE UP VIA CHARGE FROM CAPACITANCE TANK WITHOUT INTRODUCING NOISE ON POWER GRID OF RUNNING MICROPROCESSOR CORES - A mechanism is provided for an integrated circuit with power gating. A power switch is configured to connect and disconnect circuits to a common voltage source. A capacitor tank is configured to supply wakeup charge to a given circuit. A controllable element is connected to the given circuit and to the capacitor tank. The controllable element is configured to controllably connect and disconnect the capacitor tank to the given circuit in order to supply the wakeup charge to the given circuit. The controllable element is configured to, responsive to the power switch disconnecting the given circuit from the common voltage source and to the given circuit being turned on to wakeup, supply the wakeup charge to the given circuit being turned on by transferring the wakeup charge from the capacitor tank to the given circuit. This reduces the electrical charge transferred from the circuits connected to the common voltage source. | 2015-03-19 |
20150082070 | ACCELERATING THE MICROPROCESSOR CORE WAKEUP BY PREDICTIVELY EXECUTING A SUBSET OF THE POWER-UP SEQUENCE - A mechanism is provided for an integrated circuit with power gating. A power header switch is configured to connect and disconnect any one of multiple circuits to a common voltage source, where a powered off circuit is disconnected from the common voltage source. A power-up sequencer includes an initial stages power-up component and a final stages power-up component. The final stages power-up component is configured to execute final stages of a power-up process for the powered off circuit, and the initial stages power-up component is configured to execute initial stages of the power-up process for the powered off circuit. The initial stages power-up component is activated in response to a predictive power-up request. | 2015-03-19 |
20150082071 | Smart Monitoring Apparatus - A smart monitoring apparatus and a monitoring method using the apparatus. A smart monitoring apparatus is provided in a PC system to monitor a state of a PC-based embedded controller, the apparatus including: a monitoring block for monitoring a state in the system and creating state information; a logging block for receiving the state information created by the monitoring block and storing the state information in a form of a log in real-time so that the stored log and current state information may be confirmed; and a battery for supplying power to the logging block when an operating system in the system does not operate or power supplied to the system is cut off. | 2015-03-19 |
20150082072 | MEMORY CONTROLLER WITH FLEXIBLE DATA ALIGNMENT TO CLOCK - A system includes a memory controller and a plurality of memory devices that are connected in-series to the memory controller. The system operation is synchronous with clock that is provided in a fashion of source synchronous clock structure. The source synchronous clock structure includes a PLL (Phase-Locked Loop) that reshapes an incoming clock and a reshaped clock is provided. The PLL provides a shifted clock in phase of 90°. The phase-shifted clock and data are transmitted from the first device to the second device. Clock phase shift provides a center-edge clock with data to be transmitted. The devices are assigned with unique IDs. The least significant bit of the ID number of the last device is used for determination of clock alignment: edge- or center-aligned clock with data produced by the memory controller. | 2015-03-19 |
20150082073 | Circuit and method for producing USB host working clock - A circuit for producing USB host working clock comprises: an internal oscillator, a controllable frequency divider, a frequency multiplier, a USB host interface, and a frequency division controller. According to the frequency multiplier providing clock, the USB host interface configures with USB peripherals for responding. The frequency division controller is connected to the USB host interface and the controllable frequency divider. The USB host interface transmits a response result that the USB host interface configures with USB peripherals for responding to the frequency division controller. According to the USB host interface feeding back the response result, the frequency division controller regulates a frequency dividing ratio of the controllable frequency divider in set scope of the frequency dividing ratio. After regulating the frequency dividing ratio of the controllable frequency divider, the frequency division controller controls the controllable frequency divider that is processed with frequency division in fixed frequency dividing ratio. | 2015-03-19 |
20150082074 | TECHNIQUE FOR SCALING THE BANDWIDTH OF A PROCESSING ELEMENT TO MATCH THE BANDWIDTH OF AN INTERCONNECT - A transmitter is configured to scale up a low bandwidth delivered by a first processing element to match a higher bandwidth associated with an interconnect. A receiver is configured to scale down the high bandwidth delivered by the interconnect to match the lower bandwidth associated with a second processing element. The first processing element and the second processing element may thus communicate with one another across the interconnect via the transmitter and the receiver, respectively, despite the bandwidth mismatch between those processing elements and the interconnect. | 2015-03-19 |
20150082075 | TECHNIQUE FOR SCALING THE BANDWIDTH OF A PROCESSING ELEMENT TO MATCH THE BANDWIDTH OF AN INTERCONNECT - A transmitter is configured to scale up a low bandwidth delivered by a first processing element to match a higher bandwidth associated with an interconnect. A receiver is configured to scale down the high bandwidth delivered by the interconnect to match the lower bandwidth associated with a second processing element. The first processing element and the second processing element may thus communicate with one another across the interconnect via the transmitter and the receiver, respectively, despite the bandwidth mismatch between those processing elements and the interconnect. | 2015-03-19 |