14th week of 2014 patent applcation highlights part 58 |
Patent application number | Title | Published |
20140095848 | Tracking Operand Liveliness Information in a Computer System and Performing Function Based on the Liveliness Information - Operand liveness state information is maintained during context switches for current architected operands of executing programs the current operand state information indicating whether corresponding current operands are any one of enabled or disabled for use by a first program module, the first program module comprising machine instructions of an instruction set architecture (ISA) for disabling current architected operands, wherein a current operand is accessed by a machine instruction of said first program module, the accessing comprising using the current operand state information to determine whether a previously stored current operand value is accessible by the first program module. | 2014-04-03 |
20140095849 | INSTRUCTION AND LOGIC FOR OPTIMIZATION LEVEL AWARE BRANCH PREDICTION - A computer-readable storage medium, method and system for optimization-level aware branch prediction is described. A gear level is assigned to a set of application instructions that have been optimized. The gear level is also stored in a register of a branch prediction unit of a processor. Branch prediction is then performed by the processor based upon the gear level. | 2014-04-03 |
20140095850 | LOOP VECTORIZATION METHODS AND APPARATUS - Loop vectorization methods and apparatus are disclosed. An example method includes generating a first control mask for a set of iterations of a loop by evaluating a condition of the loop, wherein generating the first control mask includes setting a bit of the control mask to a first value when the condition indicates that an operation of the loop is to be executed, and setting the bit of the first control mask to a second value when the condition indicates that the operation of the loop is to be bypassed. The example method also includes compressing indexes corresponding to the first set of iterations of the loop according to the first control mask. | 2014-04-03 |
20140095851 | Delaying Interrupts for a Transactional-Execution Facility - A mechanism is provided for completing of set of instructions while receiving interrupts. The mechanism executes a set of instructions. Responsive to receiving an interrupt and determining that the interrupt requires processing within an implementation time frame, the mechanism delays the interrupt for a predetermined time period. Responsive to completing the set of instructions within the predetermined time period, the mechanism processes the interrupt. | 2014-04-03 |
20140095852 | MULTI-PERSONA COMPUTING BASED ON REAL TIME USER RECOGNITION - A computing device may configure one or more applications on the computing device for a specific user in response to identifying that the specific user is operating the device and may make relevant content available to such applications. The identification of the specific user may be performed using a signal from one or more user identification sensors. | 2014-04-03 |
20140095853 | ALTERNATIVE BOOT PATH SUPPORT FOR UTILIZING NON-VOLATILE MEMORY DEVICES - Embodiments of the invention describe apparatuses, systems and method for particularly to providing alternative boot paths for computing devices. In embodiments of the invention, a non-volatile controller subsystem is powered up by default in order to allow memory operations to one or more non-volatile devices prior to PCIe/USB enumeration. Logic such as a system SPI controller receives a request to access an SPI flash device for executing a firmware image instruction; however, embodiments of the invention either do not include or do not utilize an SPI flash device. Instead of notifying an SPI flash device, the host SPI controller redirects this request to the non-volatile controller subsystem. The non-volatile controller accesses one or more non-volatile device(s) for executing the firmware image instruction. Furthermore, embodiments of the invention may also support the protection of storage operations initiated from the host controller to the non-volatile device from hardware attacks. | 2014-04-03 |
20140095854 | COMPUTER AND HARDWARE PARAMETER CONFIGURING METHOD THEREOF - A hardware parameter configuring method operating under in an Extensible Firmware Interface-based basic input/output system mode includes reading a currently-existing hardware profile including multiple hardware parameters; reading a preloading hardware profile including multiple hardware parameters; comparing the currently-existing hardware parameters with their corresponding preloading hardware parameters to generate a comparison result; displaying the comparison result through a graphical interface; and loading the preloading hardware parameters to the hardware units to replace the currently-existing hardware parameters when receiving confirmation signal. Moreover, a computer having a central processing unit (CPU) used for implementing the steps including reading a current-existing hardware profile; reading a preloading hardware profile, comparing the currently-existing hardware parameters with their corresponding preloading hardware parameters to generate a comparison result; displaying the comparison result through a graphical interface; and loading the preloading hardware parameters to the hardware units to replace the currently-existing hardware parameters when receiving confirmation signal. | 2014-04-03 |
20140095855 | SECURE SYSTEM FLASH SHARING - Systems and methods may provide for securely transferring data from a flash component. In one example, the method may include receiving a download request from an embedded controller chip, obtaining information from the flash component in response to the download request, and transferring the information to the embedded controller chip. | 2014-04-03 |
20140095856 | PINNING BOOT DATA FOR FASTER BOOT - Methods and apparatus are provided for reducing computer system boot up times in systems with composite HDD-SSD storage devices. Booting a computer system having a composite storage device that includes a magnetic storage device (HDD) and a solid state storage device (SSD) includes identifying boot data read from the magnetic storage device during an initial boot process, pinning the boot data to the solid state storage device, wherein pinning causes the boot data to be retained on the solid state storage device during movement of infrequently-used data from the solid state storage device to the magnetic storage device, and reading, by the computer system, the boot data from the solid state storage device during a subsequent boot process. Booting can also include moving infrequently accessed data from the solid state storage device to the magnetic storage device, and the boot data on the solid state storage device. | 2014-04-03 |
20140095857 | Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image. | 2014-04-03 |
20140095858 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The method includes determining the hardware devices operatively connected with the target system; sending a first list of identifiers of the determined hardware devices to a server system; receiving the first list of device identifiers; automatically selecting at least one driver operable to control the identified device, thereby generating a sub-set of said set of drivers; and complementing a core program logic with said driver sub-set to generate the customized program logic. | 2014-04-03 |
20140095859 | APPARATUS AND METHOD FOR MANAGING REGISTER INFORMATION IN A PROCESSING SYSTEM - The setting in a configuration register is controlled based on a value stored in a management register and/or based on generation of a reset signal during a debugging operation or detection of a malfunction or power state transition in an electronic system. The management register may allocate a single bit to each configuration register, and the setting to be loaded into the configuration register is to be controlled based on the value of the bit. Additionally, or alternatively, the setting in the configuration register may be controlled when the reset signal assumes a value indicating that a default setting is to be stored. | 2014-04-03 |
20140095860 | ARCHITECTURE FOR CLOUD COMPUTING USING ORDER PRESERVING ENCRYPTION - A method for providing enhanced security in cloud computing architecture by managing the types of interaction a server should be allowed, thus preventing decryption of private data. A client may encrypt data using an order preserving encryption (OPE) algorithm. One application of the method and system is a browser-based webmail application where a client may receive email from one or more servers then store the received email that has been associated with OPE data, on a separate server that is not used to send or receive email. | 2014-04-03 |
20140095861 | Input Consistency Verification for Server Assisted Secure Function Evaluation - Server-assisted secure function evaluation (SFE) is performed with input consistency verification for two parties that want to evaluate a function. The server computes a garbled circuit corresponding to the function. A predefined bit of the 0-secret of wire i in the garbled circuit is set to a random bit b | 2014-04-03 |
20140095862 | SECURITY ASSOCIATION DETECTION FOR INTERNET PROTOCOL SECURITY - According to an example, a detection message may be sent for security association detection for Internet protocol security. The detection message includes a detection flag. The detection message may be an encapsulated message including the detection flag. | 2014-04-03 |
20140095863 | INTERNET BASED SECURITY INFORMATION INTERACTION APPARATUS AND METHOD - The present invention discloses a device and method for security information interaction. The device for security information interaction includes: an interface circuit, configured to connect the device for security information interaction to an internet terminal; an information input unit, configured to allow user to input security information; a secure encryption/decryption unit, configured to store and process the security information; an information reader, configured to read information data from an external information carrier; wherein the secure encryption/decryption unit processes the security information in connection with the information data, and complete a business function on the secure channel through the interaction with the security information processing server. The device and method for security information interaction disclosed in the present invention improves the flexibility and efficiency of the information processing system, enhances the security of the information processing system, and extending new applications of an external information carrier in an open network environment. | 2014-04-03 |
20140095864 | REDUCED AUTHENTICATION TIMES IN CONSTRAINED COMPUTER NETWORKS - In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the authentication time with the location of the one or more nodes in the LLN in order to identify one or more authentication-delayed nodes. The node may then select, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys so that the key-delegation nodes may perform localized authentication of one or more of the authentication-delayed nodes. The capable node may then distribute the one or more network keys to the one or more key-delegation nodes. | 2014-04-03 |
20140095865 | EXCHANGE OF DIGITAL CERTIFICATES IN A CLIENT-PROXY-SERVER NETWORK CONFIGURATION - Various techniques are described to authenticate the identity of a proxy in a client-proxy-server configuration. The configuration may have a client-side and a server-side SSL session. In the server-side session, if the proxy has access to the private keys of the client, the proxy may select a client certificate from a collection of client certificates and send the selected certificate to the server to satisfy a client authentication request of the server. If the proxy does not have access to the private keys, the proxy may instead send an emulated client certificate to the server. Further, the client certificate received from the client may be embedded within the emulated client certificate so as to allow the server to directly authenticate the client, in addition to the proxy. An emulated client certificate chain may be formed instead of an emulated client certificate. Similar techniques may be applied to the client-side session. | 2014-04-03 |
20140095866 | SYSTEM AND METHOD FOR VERIFICATION OF DIGITAL CERTIFICATES - Analysis of authenticity digital certificates includes. Initial information pertaining to digital certificates is collected from diverse information sources. For each of the digital certificates the initial information includes intrinsic parameter data from among contents of the digital certificate and extrinsic parameter data pertaining to the digital certificate and comprising static data not contained in the contents of the digital certificate. Selected parameter data is stored and analyzed to determine a measure of suspiciousness for each of the digital certificates. If necessary, circumstantial data based on actual usage of one or more of the digital certificates are collected. The initial data and supplemental data are compared against a set of decision criteria that define fraudulent activity, and a determination of authenticity of each of the digital certificates is made. | 2014-04-03 |
20140095867 | DEVICE, METHOD, AND SYSTEM FOR SECURE TRUST ANCHOR PROVISIONING AND PROTECTION USING TAMPER-RESISTANT HARDWARE - A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified. | 2014-04-03 |
20140095868 | SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT - Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection. | 2014-04-03 |
20140095869 | SECURE DATA STORAGE - Methods and systems for obscuring the location of critical system files are provided. In particular, the locations of files stored within a file system are selected by applying various inputs to a hash algorithm. For system files, the inputs applied to the hash algorithm can include a user name and password. For data files, the information provided to the hash algorithm can include the file name. In addition to providing random file locations, a file system in accordance with embodiments of the present invention can homogenize other information, including file names, sizes and creation dates. | 2014-04-03 |
20140095870 | DEVICE, METHOD, AND SYSTEM FOR CONTROLLING ACCESS TO WEB OBJECTS OF A WEBPAGE OR WEB-BROWSER APPLICATION - A method and device for securely displaying web content with secure web objects across untrusted channels includes downloading web content from a web server. The web content includes tags that a web browser uses to authenticate the current user and identify encrypted web objects packaged in the web content. The computing device authenticates the current user using a biometric recognition procedure. If the current user is authenticated and determined to be authorized to view the decrypted web object, the encrypted web object is decrypted and displayed to the user. If the user is unauthenticated, the encrypted web object is displayed in place of the encrypted web object such that the decrypted web object is displayed for only authorized persons physically present at the computing device. The biometric recognition procedure and web object decryption processes are protected through secure media path circuitry and secure memory. | 2014-04-03 |
20140095871 | Protecting Online Meeting Access Using Secure Personal Universal Resource Locators - Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a first user for addressing collaborative resource; responsive to the first user accessing the first user-specific URL, granting by a computing system access to the collaborative event to the first user; and responsive to a second user accessing the first user-specific URL, preventing by a computing system access to the collaborative event to the second user. Optionally, time criteria for accessing the first user-specific URL may be used to invalidating the first user-specific URL, wherein access to the collaborative resource is disabled. | 2014-04-03 |
20140095872 | ANALYTE DATA RETRIEVER - Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include receiving, at a first processing system including a user interface, an installation package including a plug-in and code configured to provide at the first processing system an interface between a sensor system configured to measure an analyte concentration level in a host and a second processing system; storing, by the first processing system, the installation package in a location based on a role of a user initiating the installation of the code; installing the plug-in for the user interface to enable the plug-in to control one or more aspects of an installation of the code; and initiating, by at least the plug-in, the installation of the code at the first processing system to provide the interface. Related systems, methods, and articles of manufacture are also disclosed. | 2014-04-03 |
20140095873 | METHOD AND SYSTEM FOR HYPERTEXT TRANSFER PROTOCOL DIGEST AUTHENTICATION - A method and system for hypertext transfer protocol digest authentication through the use of a token issuing entity trusted by both a client and a service provider. The token issuing entity may issue an encrypted token and a token secret to the client. The client may then use the token secret instead of a password for digest authentication, and provided the encrypted token along with the digest authentication response to the service provider. The service provider may decrypt the encrypted token to obtain the token secret, which may then be used for digest authentication with the client. | 2014-04-03 |
20140095874 | METHOD AND SYSTEM FOR SECURED INTER-APPLICATION COMMUNICATION IN MOBILE DEVICES - This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network. | 2014-04-03 |
20140095875 | USE OF APPLICATION IDENTIFIER AND ENCRYPTED PASSWORD FOR APPLICATION SERVICE ACCESS - To support authentication of a mobile device, an application server obtains an application identifier and password and creates an encrypted value by encrypting a combination of the password and a lime based value. The application server transmits the application identifier and encrypted value over a communication network to the mobile device as a credential, and the mobile device sends the credential over the network to a secure server providing an application assistance service. The secure server independently computes an encrypted value by encrypting the combination of the password and the time-based value. If the encrypted value front the received credential matches the encrypted value computed by the secure server, that server grants access to the assistance service for the mobile device. | 2014-04-03 |
20140095876 | INTRODUCTION OF DISCRETE ROOTS OF TRUST - Systems and methods may provide introducing a first root of trust on a platform to a second root of trust on the same platform. In one example, the method may include using an authenticated code module to transfer a first encryption key from a first root of trust on a platform to a second root of trust on the platform, receiving a challenge response from the first root of trust at the second root of trust, and using the first encryption key to verify the challenge response | 2014-04-03 |
20140095877 | TRANSMITTING APPARATUS, COMMUNICATING SYSTEM - According to an aspect of the embodiment, there is provided a transmitting apparatus, including a data storage, a first key storage, a second key storage, an additional information generating unit, a first authenticator generating unit, a second authenticator generating unit, a third authenticator generating unit, and a packet transmitting unit. | 2014-04-03 |
20140095878 | KEY CHANGE MANAGEMENT APPARATUS AND KEY CHANGE MANAGEMENT METHOD - According to one embodiment, an apparatus includes a permission/inhibition information storage which stores a permission/inhibition information file, a changer which changes a first encryption key of a first private key encrypted with the first public key to the second public key by using the first re-encryption key, a first storage which stores a second private key in a device private key temporary storage, a second storage which stores a second re-encryption key in a re-encryption key storage, a permission/inhibition information registration module which registers second permission/inhibition information in the permission/inhibition information file, and a transmitter which transmits the second private key in the re-encryption key storage to the second terminal. | 2014-04-03 |
20140095879 | STORING A KEY IN A REMOTE SECURITY MODULE - A system obtains assurance by a content provider that a content control key is securely stored in a remote security module for further secure communications between the content provider and the security module. A security module manufacturer, which has a pre-established trustful relation with the security module, imports a symmetric transport key into the security module. The symmetric transport key is unique to the security module. The content provider shares the symmetric transport key with the security module manufacturer. The content provider exchanging messages with the security module through a security module communication manager in order to get the proof that the security module stores the content control key. At least a portion of the messages exchanged between the content provider and the security module are protected using the symmetric transport key. The symmetric transport key is independent of said content control key. | 2014-04-03 |
20140095880 | SYSTEM AND METHOD FOR SOFTWARE PROTECTION AND SECURE SOFTWARE DISTRIBUTION - The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for downloading to a client and identifies the sections for encoding. APIs are inserted in the identified sections. A unique ID is created based on the identity of the each client to generate an encryption algorithm, decryption key and decryption algorithm. The identified sections are encrypted with the generated encryption algorithm. The encrypted application along with encryption algorithm, decryption key and decryption algorithm are downloaded to the driver of the client machine. The API makes call to the driver by sending the encrypted segment when the encrypted portion is reached during the execution of software in the client machine so that the driver decrypts the encoded portion using the received key and the decryption algorithm to enable the continuous execution of the downloaded software. | 2014-04-03 |
20140095881 | FILE SHARING WITH CLIENT SIDE ENCRYPTION - Technology is disclosed herein for sharing encrypted data within a client-server distributed data storage system. According to at least one embodiment, a first computing device encrypts multiple data sets of the first computing device using symmetric encryption keys. Each of the data sets is encrypted using a different symmetric encryption key among the symmetric encryption keys. The first computing device shares the encrypted data sets with a second computing device. The first computing device further sends the symmetric encryption keys to the second computing device via a secured channel. The symmetric encryption keys are suitable for decrypting the encrypted data sets at the second computing device. The secured channel is through a server connected with the first and second computing devices. The server cannot access the contents of the secured channel and cannot access contents of the encrypted data sets. | 2014-04-03 |
20140095882 | METHOD FOR PROVIDING CRYPTOGRAPHIC KEY PAIRS - The invention relates to a method for creating a second asymmetric cryptographic pair of keys, wherein a first private key (G | 2014-04-03 |
20140095883 | HARDENING OF DIRECT ANONYMOUS ATTESTATION FROM SIDE-CHANNEL ATTACK - Various embodiments are generally directed to hardening the performance of calculations of a digital signature system for authenticating computing devices against side-channel attacks. An apparatus comprises a processor circuit and an interface operative to communicatively couple the processor circuit to a network; a storage communicatively coupled to the processor circuit and arranged to store instructions operative on the processor circuit to digitally sign a message to create a first signature using a modular arithmetic operation arranged to compensate for a value of a variable greater than a modulus without use of a branching instruction; and transmit the first signature to a verifying server via the network. Other embodiments are described and claimed herein. | 2014-04-03 |
20140095884 | MULTI-FACTOR AUTHENTICATION USING BIOMETRIC DATA - Technologies for enabling biometric multi-factor authentication includes a transform selector value, a transform function that uses the transform selector value and a biometric user identifier as input, a salt derived from the output of the transform function, and a cryptographic hash function that generates a hash value based on the salt and a non-biometric user identifier. | 2014-04-03 |
20140095885 | METHODS FOR BIOMETRIC REGISTRATION AND VERIFICATION, AND RELATED SYSTEMS AND DEVICES - The invention relates to a registration method for future biometric verification purposes, including the following steps for one person (I): obtaining first biometric data ( | 2014-04-03 |
20140095886 | METHODS, SYSTEMS AND APPARATUS TO SELF AUTHORIZE PLATFORM CODE - Methods and apparatus are disclosed to self authorize platform code. A disclosed example method includes storing a hash of a first public key in a policy data structure of a platform at a first time, extracting a second public key from a signature block associated with a data structure to be authenticated at a second time, when a hash of the second public key matches the hash of the first public key, extracting an encrypted hash from that signature block, decrypting the encrypted hash using the second public key to determine a decrypted value, and comparing the decrypted value with a hash of the data structure to verify the data structure integrity. | 2014-04-03 |
20140095887 | METHOD AND APPARATUS FOR MAINTAINING TRUSTED TIME AT A CLIENT COMPUTING DEVICE - In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for maintaining trusted time at a client computing device including, for example, executing a computer program within a client device; initiating a call from the computer program to a secure time service of the client device requesting a trusted time stamp; retrieving, via the secure time service of the client device, a protected time from protected clock hardware of the client device; generating, at the secure time service of the client device, the trusted time stamp by signing the protected time retrieved from the protected clock hardware of the client device; and returning the trusted time stamp to the computer program. Other related embodiments are disclosed. | 2014-04-03 |
20140095888 | MATRIX CODE FOR ENCRYPTION, STORAGE, AND TRANSMISSION OF DATA - A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and identifies a first mask within a data region of the matrix code, wherein the first mask includes public user data, and identifies a second mask within the data region of the matrix code, wherein the second mask include private user data. The computer decodes the public user data and the private user data from the matrix code, and decrypts one or both of the public user data and the private user data. The computer also removes a distortion operation from the second mask, wherein removing the distortion operation includes reversing a transformation, rotation, skew, shear, reflection, or projection operation. | 2014-04-03 |
20140095889 | ENCRYPTED SEARCH DATABASE DEVICE, ENCRYPTED SEARCH DATA ADDING/DELETING METHOD AND ADDING/DELETING PROGRAM - The encrypted search result adding module of the encrypted search database device includes: a search result generating unit which generates a linear list as a list of search results for newly registered document data; an initial point information generating unit which generates initial point information as address of first data corresponding to a keyword; an initial point information encrypting unit which encrypts and adds/stores generated initial point information with an encryption key; and an encrypted linear list adding unit which generates and adds/stores an encrypted linear list by encrypting the linear list with the encryption key, and stores each keyword and final point information as the address of last data in the encrypted linear list for the keyword as adding information. | 2014-04-03 |
20140095890 | SYSTEMS AND METHODS FOR MANIPULATING SENSITIVE INFORMATION IN A SECURE MOBILE ENVIRONMENT - Methods and devices for protecting and manipulating sensitive information in a secure mobile environment are disclosed. Methods and devices for processing secure transactions and secure media processing up to rendering in human readable form using abstract partitioning between non-secure and secure environments are disclosed. | 2014-04-03 |
20140095891 | INSTRUCTION SET FOR SHA1 ROUND PROCESSING ON 128-BIT DATA PATHS - According to one embodiment, a processor includes an instruction decoder to receive a first instruction to process a SHA1 hash algorithm, the first instruction having a first operand, a second operand, and a third operand, the first operand specifying a first storage location storing four SHA states, the second operand specifying a second storage location storing a plurality of SHA1 message inputs in combination with a fifth SHA1 state. The processor further includes an execution unit coupled to the instruction decoder, in response to the first instruction, to perform at least four rounds of the SHA1 round operations on the SHA1 states and the message inputs obtained from the first and second operands, using a combinational logic function specified in the third operand. | 2014-04-03 |
20140095892 | DIGITAL INFORMATION PROTECTING METHOD AND APPARATUS, AND COMPUTER ACCESSIBLE RECORDING MEDIUM - In a method for protecting digital information, a processor converts a protected address range into a plurality of address blocks of a storage device based on a preset conversion unit, and generates an address block rearranging rule using the address blocks as a parameter. When it is desired to load data into a space of an address batch of the protected address range, the processor converts the address batch into a plurality of address blocks based on the conversion unit, locates rearranged addresses of the address blocks in the protected address range according to the address block rearranging rule, and loads the data into spaces of the rearranged addresses. | 2014-04-03 |
20140095893 | METHOD AND APPARATUS FOR ENCRYPTION - Method and apparatus for encryption, and a non-transitory computer-readable medium that stores instructions for performing encryption. The method includes loading a virtual system driver module in a host operating system and constructing a virtual operating system, wherein the virtual operating system comprises a micro-kernel; preparing and providing context of a processor and a memory page table by the virtual system driver for the micro-kernel, and mapping, in the memory page table, original data and a physical address of a buffer area that receives data after encryption computation is completed; and completing the encryption computation in the virtual operating system and saving the computation result in the buffer area. | 2014-04-03 |
20140095894 | Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things. | 2014-04-03 |
20140095895 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SECURELY COLLECTING, SAFEGUARDING, AND DISSEMINATING ELECTRONICALLY STORED INFORMATION - Applicant has created methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information to facilitate an account owner's management of her personal, private, business, and legal documents. The method for safeguarding can include a double authentication process that only grants exclusive access to an account owner's encrypted information through the use of a uniquely generated security key. The method for collecting information can include a real-time encryption process to permit an account holder to securely upload and store electronic media in category-based compartmentalized locations. Further, the method can include a process for generating category-based advertisements through an integrated marketing platform with geo-fencing capabilities to facilitate the account owner's selection of a variety of services related to the stored information. Finally, the method for disseminating information can include authenticating a request to disseminate the stored information to one or more trustees. | 2014-04-03 |
20140095896 | EXPOSING CONTROL OF POWER AND CLOCK GATING FOR SOFTWARE - A processor includes at least one power domain, each power domain including at least one core that switchably receives power supply from a voltage regulator and switchably receives a clock signal from a clock source, a cache, and at least one control registers having stored thereon data indicating power management states of the at least one power domain and the cache. | 2014-04-03 |
20140095897 | ELECTRONIC DEVICE AND METHOD TO EXTEND BATTERY LIFE - An electronic apparatus is provided that includes a processor, a voltage regulator, a battery controller and an embedded controller. The voltage regulator to receive an input voltage and to provide an output voltage to the processor. The battery controller to store electronic device information and to receive battery information related to a current battery power. The embedded controller to receive the electronic device information and the battery information from the battery controller, and the embedded controller to provide power information to the processor based on the received information. | 2014-04-03 |
20140095898 | FUEL CELL FOR POWERING COMPUTER APPARATUS - A computer peripheral device incorporates a fuel cell that may be used to supply power to a computer device coupled to the peripheral device. The peripheral device comprises a housing and circuitry within the housing to provide at least one computer peripheral function. A data interface provides for data transfer to and/or from a computer device. A fuel cell power source is incorporated into the peripheral device. A power interface provides power transfer to the computer device when connected thereto. A power controller is configured to supply power from the fuel cell power source to the power interface for supplying said power to said computer device when connected thereto. | 2014-04-03 |
20140095899 | INFORMATION HANDLING SYSTEM ADAPTIVE HIGH PERFORMANCE POWER DELIVERY - An information handling system provides power to a peripheral though a peripheral interface, such as a USB interface, by communicating power availability with a primary set of power parameters through a data link and communicating power availability with a secondary set of power parameters through a power link. If a peripheral device has the capability to draw power at the second power parameters, it does so while monitoring for a fold back of host power that indicates power is not available at the second power parameters. | 2014-04-03 |
20140095900 | POWER SUPPLY SYSTEM - A power supply system for an information handling system is provided. The information processing system is electrically coupled to an AC power source and includes at least one computer unit. The power supply system includes: at least one AC power supply unit electrically coupled to the at least one computer unit and the AC power source; at least one DC power supply unit electrically coupled to the at least one computer unit; and a backup power unit electrically coupled to the at least one DC power supply unit. In response to the at least one AC power supply unit not supplying power, the at least one DC power supply unit supplies power to the at least one computer unit. A data center having the power supply system is further provided. | 2014-04-03 |
20140095901 | SYSTEM AND METHOD FOR MANAGING A POWER MODE OF A DESIGNATED ELECTRONIC DEVICE - A system and method for managing a power mode of a designated electronic device are provided. A geographical location of a mobile electronic device is determined. A comparison of the determined geographical location of the mobile electronic device and a stored location of a designated electronic device in a power-off mode is made. A wake-up signal is sent to the designated electronic device if the determined geographical location of the mobile electronic device is within a proximity threshold of the designated electronic device, where the designated electronic device is configured to enter a power-on mode upon receipt of the wake-up signal. | 2014-04-03 |
20140095902 | Power Saving Traffic Management Policies - A method and system are provided for reducing power usage in a telecommunications network. Policies are applied during traffic management of packets, the policies taking into account the power cost of transmitting a packet onward, including over a network. Embodiments are provided in which such policies are used during classification, scheduling, and traffic shaping of packets. | 2014-04-03 |
20140095903 | POWER EXCURSION TOLERANT POWER SYSTEM - A power excursion tolerant power system includes at least one powered component. A system capacitance and at least one power supply are coupled to the at least one powered component. The at least one power supply is operable as a voltage controlled current source to supply power to the at least one powered component when a system load is below a predetermined threshold. The at least one power supply is operable as a constant current source, and together with the system capacitance, to supply power to the at least one powered component when the system load is above the predetermined threshold. A load reduction mechanism is coupled to the at least one powered component and operable to perform at least one load reduction action when the system load is above the predetermined threshold. | 2014-04-03 |
20140095904 | Apparatus and Method For Determining the Number of Execution Cores To Keep Active In A Processor - A processor is described that includes a plurality of execution cores. The processor also includes power management circuitry to dynamically determine a number of the execution cores that, when active, will cause the processor to operate in a substantially linear power consumption vs. frequency region of operation such that performance gain as a function of power consumption increase with the number of cores is higher as compared to any other number of active execution cores within an established power envelope. | 2014-04-03 |
20140095905 | Computing System and Processor With Fast Power Surge Detection And Instruction Throttle Down To Provide For Low Cost Power Supply Unit - A processor is described that includes a quick signal path from an input of the processor to logic circuitry within the processor. The input is to receive a fast throttle down signal. The logic circuitry is to throttle down a rate at which the processor issues instructions for execution in response to the fast throttle down signal. The quick signal path is to impose practicably minimal propagation delay of the fast throttle down signal within the processor. | 2014-04-03 |
20140095906 | Rotational Graphics Sub-Slice and Execution Unit Power Down to Improve Power Performance Efficiency - Methods and apparatus relating to rotational graphics sub-slice and Execution Unit (EU) power down to improve power performance efficiency are described. In one embodiment, power-gating is rotated amongst single sub-slices within each slice of a plurality of slices based on an indication to reduce power consumption of a computational logic. The computational logic includes the plurality of slices and each of the plurality of slices includes a plurality of sub-slices to perform one or more computations. Other embodiments are also disclosed and claimed. | 2014-04-03 |
20140095907 | Method of Conserving Power Based on Electronic Device's I/O Pattern - A method of affecting power used by an electronic device is provided for an electronic device having storage media and running at least one application. Each application interfaces with the storage media through an input/output (I/O) path executing I/O activities that access the storage media in accordance with configurable parameters of the I/O path. A run-time I/O pattern defined by the I/O activities is determined during a run-time period of the electronic device. At least one of the I/O path's configurable parameters is then modified based on the run-time I/O pattern. The method is readily adapted for power conservation by providing selections for the configurable parameters with each of the selections optimizing power usage for a hypothetical I/O pattern. Then, one or more configurable parameters are modified in accordance with one of the selections for which the hypothetical I/O pattern associated therewith is closest to the run-time I/O pattern. | 2014-04-03 |
20140095908 | DOWNSTREAM DEVICE SERVICE LATENCY REPORTING FOR POWER MANAGEMENT - For one disclosed embodiment, a transition from a first state to a second, different state for at least a portion of a downstream device may be identified. The first and second states may correspond to different levels relating to activity for at least a portion of the downstream device. Data corresponding to a service latency may be transmitted to an upstream device in response to the identified transition for one or more upstream devices to manage power based at least in part on the service latency. Other embodiments are also disclosed. | 2014-04-03 |
20140095909 | MULTIPLE CLOCK DOMAIN CYCLE SKIPPING UTILIZING OPTIMAL MASKS TO MINIMIZE VOLTAGE NOISE - Implementations of the present disclosure involve an apparatus and/or method for providing one or more clock signals that include a skipped clock cycle to a portion of a computing system. The skipped cycle clock signals may be changed by the computing system during operation of the system by altering masks applied to a global clock signal. However, the flexibility to alter various skipped cycle clock signals may introduce noise or signal disruptions within the system. Thus, the present disclosure may also involve an apparatus and/or method for managing the altering of the clock cycle skipping masks to manage the voltage noise introduced into the system by the adjustment of the operating frequency of the portions of the system. In one embodiment, the method includes prioritizing or otherwise ordering the bits of the masks applied to the global clock signal to attempt to prevent similar bits from being altered simultaneously. | 2014-04-03 |
20140095910 | Method and Apparatus For Efficient Store/Restore of State Information During A Power State Transition - A processor is described having streamlining circuitry that has a first interface to receive information from a memory describing: i) respective addresses for internal state information of a power domain; ii) respective addresses of a memory where the internal state information is stored when the power domain is powered down; and, iii) meta data for transferring the state information between the power domain and where the internal state information is stored when the power domain is powered down. | 2014-04-03 |
20140095911 | Controlling Power Consumption By Power Management Link - Methods and apparatus relating to controlling power consumption by a power management link are described. In one embodiment, the physical interface of a power management (PM) link is shut down when a processor is in a sleep state (e.g., to conserve power), while maintaining the availability of the processor for communication to a (e.g., embedded) controller over the PM link. Other embodiments are also disclosed and claimed. | 2014-04-03 |
20140095912 | Micro-Architectural Energy Monitor Event-Assisted Temperature Sensing - Methods and apparatus relating to micro-architectural energy monitor event-assisted temperature sensing are described. In one embodiment, at least one of a plurality of slices of a computational logic or at least one of a plurality of sub-slices of the computational logic are powered down or powered up based on a comparison of a temperature value, that is determined based on one or more micro-architectural events, and a threshold value. Other embodiments are also disclosed and claimed. | 2014-04-03 |
20140095913 | ELECTRONIC APPARATUS - An electronic apparatus is disclosed. The electronic apparatus comprises a capacitive sensor and a central processing unit (CPU). The capacitive sensor comprises a sensor output pin, and the CPU comprises a wake-up pin. The wake-up pin is coupled to the sensor output pin. | 2014-04-03 |
20140095914 | INFORMATION PROCESSING APPARATUS AND OPERATION CONTROL METHOD - According to one embodiment, an information processing apparatus includes a display processor and a power-saving setup module. The display processor displays on a screen a first interface including a slider which is movable along a path. The power-saving setup module sets values of a plurality of power-saving setup items in accordance with a position of the slider on the path, such that the information processing apparatus operates in a power-saving mode of one of a plurality of power-saving levels. The display processor changes, if a value of at least one power-saving item of the plurality of power-saving setup items is changed by a second interface which is different from the first interface, the position of the slider on the path. | 2014-04-03 |
20140095915 | PORTABLE ELECTRONIC DEVICE CARRIER WITH ELECTRONIC INTERFACE FOR RECHARGING DEVICE BATTERY - An electronics device carrier for porting a battery powered electronic device is formed by outer walls surrounding a hollow volume. The electronic device is held within the hollow volume and can be operated without removing the electronic device from the carrier. An input interface comprising interface elements external to the outer walls provides an element suitable for interfacing with external power devices such as a power source or another power load. A device interface includes interface elements at least partially disposed internal to the outer walls for interfacing with the electronic device battery. A charge controller is disposed between the input interface and the device interface and is operable to connect elements connected to the input interface to the device battery to either recharge the device battery or use the device battery as a power source. | 2014-04-03 |
20140095916 | POWER SUPPLY CIRCUIT FOR PCI-E AND MOTHERBOARD HAVING SAME - An exemplary power supply circuit for a PCI-E on a motherboard includes a first power supply, a detection unit, a power control unit, and a discharge unit. The first power supply supplies power for the PCI-E via a power pin of the PCI-E. The detection unit detects whether the motherboard receives a soft shutdown command. The power control unit cuts off or maintains an electrical connection between the first power supply and the PCI-E under control of the detection unit. The discharge unit discharges residual electrical charges in the PCI-E when the motherboard receives the soft shutdown command. | 2014-04-03 |
20140095917 | DYNAMIC POWER SYSTEM ADJUSTMENT TO STORE ENERGY FOR POWER EXCURSIONS - A power system is coupled to a powered system and a system capacitance. The power system includes a power system output sensor, a power conversion device, and a power system output controller. The power system output controller includes a powered system threshold that is related to a power excursion capability of the powered system. The power system output controller is operable, in response to receiving a power system output signal from the power system output sensor that exceeds the powered system threshold, to control the power conversion device to increase the power system output from the power conversion device in order to increase the energy stored in the system capacitance for use by the powered system during a power excursion. The powered system may include processors that draw power from the system capacitance during power excursions so as to not exceed the limits of the power system. | 2014-04-03 |
20140095918 | Method and Apparatus for Maintaining Secure Time - An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE), and a separate Trusted Execution Environment (TEE). The TEE maintains a real-time clock (RTC) that provides a RTC time to the REE. A RTC offset is stored in non-volatile memory, with the RTC offset indicating a difference between the RTC time and a protected reference (PR) time. Responsive to a request from the REE to read the RTC time, a current RTC time is returned to the REE. Responsive to a request from the REE to adjust the RTC time, the RTC time and the corresponding RTC offset are adjusted by a same amount, such that the PR time is not altered by the RTC adjustment. An exemplary computing device operable to implement the method is also disclosed. | 2014-04-03 |
20140095919 | CLOCK CONTROL METHOD FOR PERFORMANCE THERMAL AND POWER MANAGEMENT SYSTEM - A control method for a clock signal for a CPU contained in a CMOS circuit includes: when a load current for the CMOS circuit is enabled, generating a first clock signal; in a first period, selectively gating certain cycles of the first clock signal to generate a second clock signal which has a clock rate less than a clock rate of the first clock signal; and in a second period, dithering in the gated cycles to increase the clock rate of the second clock signal to be equal to that of the first clock signal. The second clock signal is continuously input to the CMOS circuit during the first period and the second period. | 2014-04-03 |
20140095920 | Variable clocked serial array processor - A serial array processor may have an execution unit, which is comprised of a multiplicity of single bit arithmetic logic units (ALUs), and which may perform parallel operations on a subset of all the words in memory by serially accessing and processing them, one bit at a time, while an instruction unit of the processor is pre-fetching the next instruction, a word at a time, in a manner orthogonal to the execution unit. | 2014-04-03 |
20140095921 | INFORMATION PROCESSING APPARATUS, STARTUP PROGRAM, AND STARTUP METHOD - An information processing apparatus that performs a startup control of redundantly configured modules includes a memory to retain abnormality information regarding an abnormality that occurs at time of startup control of the modules, and a startup controller section executing a startup process by sequentially executing the process, generating the abnormality information, determining whether a reduced operation is possible or not when the module in which an abnormality occurs at the time of startup control is detected, completing an execution of the process block in progress when it is determined that the reduced operation is possible, executing a restart process on a module selected from all the modules in which abnormalities occur at the time of startup control based on the abnormality information and completing an execution of the process block in progress after completing the restart process when determined that the reduced operation is not possible. | 2014-04-03 |
20140095922 | SYSTEM AND METHOD OF FAILOVER FOR AN INITIATED SIP SESSION - An initial SIP message is sent to establish a first SIP communication session from a first SIP device. The initial SIP message is sent via a first of a plurality of session managers to a second SIP device. After receiving the initial SIP message at the second SIP device and before ending the first SIP communication session, either the first or second SIP device sends a second SIP message. The second SIP message is sent to the first of the plurality of session managers. Either the first or second SIP devices detects that a response SIP message to the sent second SIP message was not received within a defined time period. In response to detecting that the SIP response message was not received within the defined time period, either the first or second SIP device resends the second SIP message to a second one of the plurality of session managers. | 2014-04-03 |
20140095923 | FINAL FAULTY CORE RECOVERY MECHANISMS FOR A TWO-DIMENSIONAL NETWORK ON A PROCESSOR ARRAY - Embodiments of the invention relate to faulty recovery mechanisms for a two-dimensional (2-D) network on a processor array. One embodiment comprises a processor array including multiple processors core circuits, and a redundant routing system for routing packets between the core circuits. The redundant routing system comprises multiple switches, wherein each switch corresponds to one or more core circuits of the processor array. The redundant routing system further comprises multiple data paths interconnecting the switches, and a controller for selecting one or more data paths. Each selected data path is used to bypass at least one component failure of the processor array to facilitate full operation of the processor array. | 2014-04-03 |
20140095924 | End to End Multicast - IP multicast enabled devices, systems and methods for use on an end-to-end IP multicast-enabled network are disclosed. An IP multicast system, device and method operable on the network includes an IP multicast-engine, and storage for storing instruction sets to instruct the engine to send messages according to a select multicast application. A plurality of devices become members of an IP multicast group such that sending a message to a single multicast address can provide for the concurrent control of, and the delivery of the multicast message to, the devices of the group. Error conditions in a multicast source may be handled by preserving the multicast session resources, and reassigning a multicast source address from a faulty source encoding device to an alternate device. | 2014-04-03 |
20140095925 | CLIENT FOR CONTROLLING AUTOMATIC FAILOVER FROM A PRIMARY TO A STANDBY SERVER - A primary server and a standby server operating according as a redundant server pair are connected to a common network, and the operational state of each is monitored by a first and a second client function each of which run on a device connected to the common network. Each of the client functions operate to notify the standby server in the event that the primary server ceases to be operational. The standby server determining whether the primary server is operational based upon notification received from both of the first and second client functions. | 2014-04-03 |
20140095926 | DYNAMIC CACHE CORRECTION MECHANISM TO ALLOW CONSTANT ACCESS TO ADDRESSABLE INDEX - A technique is provided for a cache. A cache controller accesses a set in a congruence class and determines that the set contains corrupted data based on an error being found. The cache controller determines that a delete parameter for taking the set offline is met and determines that a number of currently offline sets in the congruence class is higher than an allowable offline number threshold. The cache controller determines not to take the set in which the error was found offline based on determining that the number of currently offline sets in the congruence class is higher than the allowable offline number threshold. | 2014-04-03 |
20140095927 | ACHIEVING ULTRA-HIGH AVAILABILITY USING A SINGLE CPU - Techniques for achieving high-availability using a single processor (CPU). In a system comprising a multi-core processor, at least two partitions may be configured with each partition being allocated one or more cores of the multiple cores. The partitions may be configured such that one partition operates in active mode while another partition operates in standby mode. In this manner, a single processor is able to provide active-standby functionality, thereby enhancing the availability of the system comprising the processor. | 2014-04-03 |
20140095928 | STORAGE CONTROL APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM RECORDED WITH CONTROL PROGRAM - A storage control apparatus includes a detection unit that detects a soft error of a memory for setting information included in a programmable logic circuit, when the soft error is detected, a communication control unit that changes a state of a communication path between the communication device and an upper device to a busy state, and a recovery processing unit that performs recovery processing of the memory for setting information of the programmable logic circuit, thereby efficiently resolving a soft error of the programmable logic circuit. | 2014-04-03 |
20140095929 | INTERFACE FOR RESOLVING SYNCHRONIZATION CONFLICTS OF APPLICATION STATES - Technology is disclosed herein for resolving synchronization conflicts when synchronizing application state data between computing devices. According to at least one embodiment, a server detects a first set of application state data at a first computing device conflicting with a second set of application state data at a second computing device. The first and second sets of application state data represent application states of the same computer application running at the first and second computing devices, respectively. Accordingly, the first computing device presents a user interface prompting a user to choose a preferred set of application state data between the first and second sets of application state data. If the user chooses the second set of application state data as the preferred set, the first computing device uses the second set of application state data to overwrite the first set of application state data at the device. | 2014-04-03 |
20140095930 | ENHANCED ARBITRATION PROTOCOL FOR NODES IN A CLUSTER - Arbitrating node failures. A method includes determining at a first node that communication to a second node has been lost. The method further includes sending an arbitration request to a plurality of arbitrators. The method further includes receiving from the plurality of arbitrators a sufficient number of arbitration reply grant messages to have arbitration reply grant messages from a quorum of the arbitrators. As a result of receiving a sufficient number of arbitration reply grant messages to have arbitration reply grant messages from a quorum of the arbitrators, the method further includes declaring the second node down. | 2014-04-03 |
20140095931 | Method and system for automating the process of testing a device - Device Test Automation framework. This embodiment provides a device test automation framework for automating testing of embedded systems. The device test automation framework—DTAF allows user to test embedded device software using test scripts, which can capture various interfaces of device under test. A Graphical User Interface—GUI tool is created based on device under test configuration and user input. This GUI tool shows various interface of device under test. A device test automation framework hardware enables communication between test tool and the device under test. DTAF allows testing process to dramatically improve productivity, effectiveness, efficiency and coverage of embedded software testing | 2014-04-03 |
20140095932 | DEBUG SYSTEM, AND RELATED INTEGRATED CIRCUIT AND METHOD - A system includes a processor and a plurality of circuits connected through an interconnection network, wherein associated to each circuit is a respective communication interface configured for exchanging data between the respective circuit and the interconnection network. In particular, a debug unit is associated with each communication interface. Each debug unit is configurable as a data-insertion point, wherein the debug unit transmits data by means of the respective communication interface to the interconnection network, or each debug unit is configurable as a data-reception point, wherein the debug unit receives data by means of the respective communication interface from the interconnection network. | 2014-04-03 |
20140095933 | TESTING MOBILE APPLICATIONS - The present disclosure involves systems, software, and computer implemented methods for identifying test cases. One example process includes operations for identifying a mobile application to perform testing upon. A test environment and at least one risk situation associated with the mobile application are identified. For each of the at least one identified risk situations, at least one risk situation-relevant context parameter is identified. A standard operations path is created, as is at least one operations path-variant for each of the at least one identified risk situation-relevant context parameters. The corresponding operations path-variant is analyzed to identify a set of test cases for the context parameter, for each of the at least one identified context parameters. | 2014-04-03 |
20140095934 | TEST CASE PRODUCTION UTILIZING PROBLEM REPORTS - Accessing a problem report data store including customer problem reports. Each customer problem report includes configuration and platform data. Calculating a number of instances each platform is stored, and identifying platforms that satisfy a platform threshold. Calculating a number of instances each configuration is stored, and identifying configurations that satisfy a configuration threshold. Calculating a number of instances each platform is associated with each configuration, and generating a data structure with a plurality of nodes and edges. Each of the nodes identifies one of the platforms and configurations. The weight of the edge connecting a platform to a configuration indicates a number of instances that the platform is associated with the configuration in the data store. Identifying a weighted edge that satisfies a weight threshold, where the weighted edge connects a first platform to a first configuration and, in response, generating a test case for development of a software product. | 2014-04-03 |
20140095935 | SIMULATION BASED FAULT DIAGNOSIS USING EXTENDED HEAT FLOW MODELS - In order to reduce computation time and cost involved with detecting and diagnosing a fault in a system, simplified representations of components of the system are used to estimate valid intervals for state variables at the components. Generic failure rules are configured to compare the estimated valid intervals to related intervals for the same state variables, from either observations or propagations, for overlap. Failure output vectors are generated based on the comparison, and the failure output vectors are compared to diagnostic matrices to determine a source of the fault. | 2014-04-03 |
20140095936 | System and Method for Correct Execution of Software - In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein. | 2014-04-03 |
20140095937 | LATENT DEFECT INDICATION - A method of determining test data for use in testing a software. The method includes determining that at least part of a software structure of the software to be tested is similar to, or the same as, a software structure associated with a defect. The method also includes retrieving information regarding operational circumstances for causing the defect in the software associated with the defect. The method further includes creating, based upon the retrieved information, test data for testing the software to be tested. | 2014-04-03 |
20140095938 | LATENT DEFECT IDENTIFICATION - A method of determining test data for use in testing software involves identifying software that is known to have one or more bugs and which has a similar structure to software under test before using knowledge of those one or more bugs to create test data for the software under test. | 2014-04-03 |
20140095939 | METHOD FOR PERFORMING CONDITION BASED DATA ACQUISITION IN A HIERARCHICALLY DISTRIBUTED CONDITION BASED MAINTENANCE SYSTEM - A method for accumulating fault condition data from a hierarchical system is presented comprising monitoring an operation of a component with a computing node that includes a processor and a memory. The memory contains a configuration file comprising failure modes (FM), symptoms, tests that identify the symptoms and a corrective action for the symptom. The method further comprises populating at least one of the processor and the memory of the computing node with one or more standardized executable application modules (SEAM) and a workflow service. The one or more SEAMS is configured to create a fault condition record by collecting all FMs that manifest the symptom. For all FMs collected, a list of unique symptoms is produced. Further all tests that can identify the listed unique symptoms and all of the corrective actions associated with the FMs that manifest the symptom are determined from the memory device. | 2014-04-03 |
20140095940 | DEBUG TRACE STREAM TIMESTAMPING USING DOWNSTREAM CORRELATION - A method of correlating the timing of multiple interleaved trace data streams. A Time Stamp Trace stream logic monitors the event trace stream for a synchronization point. When a synchronization point is detected a time stamp value is inserted into the trace stream along with any relevant identification markers available in the detected synchronization point. | 2014-04-03 |
20140095941 | DYNAMIC HARDWARE TRACE SUPPORTING MULTIPHASE OPERATIONS - A method and system for tracing in a data processing system. The method includes receiving a plurality of signals associated with an operation during execution of the operation. The method also includes, in response to an indication that the operation is a multiphase operation, during execution of the operation, selection logic, during a first phase of the multiphase operation, selecting and outputting as a trace signal a first signal of the plurality of signals, and during a second phase of the multiphase operation, selecting and outputting as the trace signal a second signal of the plurality of signals. | 2014-04-03 |
20140095942 | PROVIDING SERVICE ADDRESS SPACE FOR DIAGNOSTICS COLLECTION - A method and system are provided for providing a service address space for diagnostics collection. The method includes: providing a service co-processor attached to a main processor, wherein the service co-processor maintains an independent copy of the main processor's address space in the form of a service address space; and updating the service address space by receiving storage update packets from the main processor and applying the storage update packets to the service address space. | 2014-04-03 |
20140095943 | PREDICTIVE PRECACHING OF DATA BASED ON CONTEXT - A device and method for predictively precaching content on a mobile communication device includes monitoring numerous data sources for contextual data on the activities of the user. The mobile communication device predicts network connectivity outages and affected applications using the contextual data. The mobile communication device notifies the affected applications of the predicted network connectivity outage, and in response the affected applications precache suitable content. The affected applications may employ several precaching strategies in response to the notification, such as downloading content from a remote content server, adjusting content streaming, or adjusting content buffering prior to the predicted network connectivity outage. During the network outage, application service is provided using the precached content. Such precaching may also be accomplished using a local caching proxy server. | 2014-04-03 |
20140095944 | METHOD AND APPARATUS FOR OPTIMIZING POWER AND LATENCY ON A LINK - An apparatus and method are disclosed to optimize the latency and the power of a link operating inside a processor-based system. The apparatus and method include a latency meter built into a queue that does not rely on a queue-depth threshold. The apparatus and method also include feedback logic that optimizes power reduction around an increasing latency target to react to sluggish re-provisioning behavior imposed by the physical properties of the link. | 2014-04-03 |
20140095945 | METHOD AND SYSTEM FOR PREEMPTIVE DETECTION OF OCCURRENCE OF FAULTY CONDITIONS BASED ON RESOURCE USAGE - A method and a system have been disclosed for the preemptive detection of occurrence of one or more faulty conditions based on the usage of one or more resources. The faulty conditions are detected during an execution of a program; the program includes at least one function. The method includes initializing Application Program Interfaces (APIs) across the at least one function. After this, calls to the APIs used within a namespace of the program are intercepted. The interception is performed by the at least one function through extended method classes. Thereafter, the usage of the resources for the at least function intercepting the APIs is checked against a corresponding predetermined threshold limit. Once the usage of the resources is checked, context of the usage of the resources is identified based on a predefined knowledge. Subsequently, the occurrence of the faulty conditions is determined based on the identification. | 2014-04-03 |
20140095946 | TRANSACTION-LEVEL TESTING OF MEMORY I/O AND MEMORY DEVICE - A memory subsystem includes a test engine coupled to a memory controller that can provide memory access transactions to the memory controller, bypassing a memory address decoder. The test engine receives a command to cause it to generate transactions to implement a memory test. The command identifies the test to implement, and the test engine generates one or more memory access transactions to implement the test on the memory device. The test engine passes the transactions to the memory controller, which can schedule the commands with its scheduler. Thus, the transactions cause deterministic behavior in the memory device because the transactions are executed as provided, while at the same time testing the actual operation of the device. | 2014-04-03 |
20140095947 | FUNCTIONAL MEMORY ARRAY TESTING WITH A TRANSACTION-LEVEL TEST ENGINE - A memory subsystem includes a test engine coupled to a memory controller that can provide memory access transactions to the memory controller, bypassing a memory address decoder. The test engine hardware is configurable for different tests. The test engine identifies a range of addresses through which to iterate a test sequence in response to receiving a software instruction indicating a test to perform. For each iteration of the test, the test engine, via the selected hardware, generates a memory access transaction, selects an address from the range, and sends the transaction to the memory controller. The memory controller schedules memory device commands in response to the transaction, which causes the memory device to execute operations to carry out the transaction. | 2014-04-03 |