21st week of 2015 patent applcation highlights part 78 |
Patent application number | Title | Published |
20150143109 | Data Decryption Circuit and Associated Method - A data decryption circuit for decrypting a current encrypted data packet is provided. The current encrypted data packet includes a header and a payload. The data decryption circuit includes an operation unit and a decryption calculation unit. The operation unit generates first data according to the header and a pseudo-random number, second data according to a session key and a constant, and length information and start position information of the payload according to the header. The operation unit generates the first data, the second data, the length information and the start position information by executing a program code. The decryption calculation circuit, coupled to the operation unit, generates a decryption key according to the first and second data, retrieves the payload from the current encrypted data packet according to the start position information and the length information, and decrypts the payload by the decryption key. | 2015-05-21 |
20150143110 | MANAGE ENCRYPTED NETWORK TRAFFIC USING SPOOFED ADDRESSES - Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name; determining that the domain name is included in a predetermined set of domain names; associating a spoofed address with the domain name; sending a response to the request to resolve the domain name, the response including the spoofed address; receiving a secure request for a resource, the secure request directed to the spoofed address; determining that the secure request is directed to the domain name based on the association between the spoofed address and the domain name; and selectively decrypting the secure request based at least in part on determining that the secure request is directed to the domain name. | 2015-05-21 |
20150143111 | METHODS AND DEVICES FOR SECURING KEYS FOR A NONSECURED, DISTRIBUTED ENVIRONMENT WITH APPLICATIONS TO VIRTUALIZATION AND CLOUD-COMPUTING SECURITY AND MANAGEMENT - The present invention discloses methods and devices for securing keys for a non-secure computing-environment. Methods include the steps of: providing a security-key framework which is adapted, upon receiving an encryption request for protecting a secret item, for repetitively encrypting the secret item with each of a set of N location-specific secure-keys, wherein each location-specific secure-key corresponds to a respective encryption location, to create an encrypted item; wherein the locations are regions of memory located in computing resources operationally connected to the computing-environment; and concealing through encryption at least one location-specific secure-key such that the concealing is configured: to prevent at least one location-specific secure-key from ever being known in an unconcealed form on any computing resource in any computing-environment during the encrypting; and to allow mathematical operations, performed as part of the encrypting and concealing, to be performed while at least one location-specific secure-key is in its concealed form. | 2015-05-21 |
20150143112 | SYSTEM AND METHOD FOR DYNAMIC, NON-INTERACTIVE, AND PARALLELIZABLE SEARCHABLE SYMMETRIC ENCRYPTION - A method of searching encrypted data includes generating with a client computing device a search index identifier corresponding to a search term in an encrypted search table and transmitting the search index identifier, a first single use key and a second single use key to a server. The method includes generating a set of decrypted data with the server for a set of data in an encrypted search table corresponding to the search index identifier using the first single use key to decrypt a first portion of the data and the second single use key to decrypt a second portion of the data. The method further includes identifying one or more encrypted files stored on the server that include the encrypted search term based on the decrypted data from the search table, and transmitting the encrypted files or encrypted file identifiers to the client computing device. | 2015-05-21 |
20150143113 | METHOD AND SYSTEM FOR ENCRYPTING INFORMATION UTILIZING THREE-DIMENSIONAL SHAPES - Method and system is disclosed for encrypting information utilizing three-dimensional shapes. The method includes receiving one or more computer device usage metrics, one or more user files having information, and instructions for encrypting the one or more user files, selecting shape type from a plurality of predetermined shape types, determining shape dimensions and shape volume based upon quantity of information associated with the one or more user files, generating a shape based upon the selected shape type, the shape dimensions, and the shape volume, distributing axis coordinates for each axis, wherein a node is define at least by axis coordinates within the generated shape, associating information of the one or more user files with axis coordinates within the generated shape, and transmitting generated shape and data based upon the associating. | 2015-05-21 |
20150143114 | INFORMATION PROCESSING SYSTEM AND CONTROL METHOD OF INFORMATION PROCESSING SYSTEM - A first information processing device holds data and a key for encryption. A second information processing device does not have rights to share data not encrypted with the first information processing device and a client. The first information processing device transmits data and key to the client when receiving a request to use the data. The first information processing device generates first encrypted data encrypted with the key, and transmits it to the second information processing device. The client transmits information obtained by encrypting the result of processing on the data with the key to the second information processing device until the use of the data ends. The first information processing device acquires second encrypted data received by the second information processing device from the second information processing device, and decrypts and stores it when notified that the use of the data has ended. | 2015-05-21 |
20150143115 | METHOD AND APPARATUS FOR AVOIDING LICENSE STORMING DURING AN UNPLANNED REGIONAL BLACKOUT - A computer implemented method and apparatus for avoiding license storming during an unplanned regional blackout. The method comprises generating a leaf license for each geographic region of a plurality of geographic regions in a broadcast area, wherein each leaf license includes a first content encryption key for decrypting media content associated with the leaf license, and where each leaf license is bound to a root license for each geographic region in the plurality of geographic regions; and generating, in response to a blackout event, a new leaf license for each geographic region of the plurality of geographic regions that are located outside of a blackout area, wherein each new leaf license includes a second content encryption key different from the first content encryption key for decrypting protected media content, and wherein each new leaf license remains bound to the root license for each geographic region in the plurality of geographic regions. | 2015-05-21 |
20150143116 | SYSTEMS AND METHODS FOR CONVENIENT AND SECURE MOBILE TRANSACTIONS - Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are disclosed herein. In some embodiments, the payment terminal and the mobile device conduct a mutual authentication process that, if successful, produces a session key which can be used to encrypt sensitive data to be exchanged between the payment terminal and the mobile device. Payment and loyalty information can be securely communicated from the mobile device to the payment terminal using the session key. This can be done automatically, without waiting for the user to initiate a transaction, to shorten the overall transaction time. The transaction can also be completed without any user interaction with the mobile device, increasing the user's convenience since the mobile device can be left in the user's pocket, purse, vehicle, etc. | 2015-05-21 |
20150143117 | DATA ENCRYPTION AT THE CLIENT AND SERVER LEVEL - Embodiments of the present invention include a computer system and computer program product for implementing encryption of data. A computer system determines that a first data field of a plurality of data fields of a web form requires encryption. The computer system tags the first data field with one or more HTML encryption tags. The computer system displays the web form to a user. The computer system receives user input, wherein at least a portion of the user input is contained in the first data field of the web form. The computer system encrypts the first data field on a first computer, wherein a first user specific encryption key is associated with at least the first data field. The computer system inserts the encrypted first data field into at least one record stored on a second computer. | 2015-05-21 |
20150143118 | END-TO-END SECURE COMMUNICATION SYSTEM - The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, communication-related operations occurring within each client may also be secured. Each client may comprise a secure processing environment to process encrypted communication information received from other clients and locally-captured media information for transmission to other clients. The secure processing environment may include resources to decrypt received encrypted communication information and to process the communication information into media information for presentation by the client. The secure processing environment may also operate in reverse to provide locally recorded audio, image, video, etc. to other clients. Encryption protocols may be employed at various stages of information processing in the client to help ensure that information being transferred between the processing resources cannot be read, copied, altered, etc. In one example implementation, a server may manage interaction between clients, provision encryption keys, etc. | 2015-05-21 |
20150143119 | CONTENT DISTRIBUTION METHOD, CONTENT DISTRIBUTION SYSTEM, SOURCE DEVICE, AND SINK DEVICE - Provided is a content distribution method which allows a source device to safely distribute copyrighted content to a sink device in response to a request from the sink device as a trigger. The content distribution method includes a list transmission step S | 2015-05-21 |
20150143120 | Controlling Mobile Device Access to Secure Data - Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device. | 2015-05-21 |
20150143121 | PORTABLE COMPUTERIZED DEVICE ADAPTED FOR AD HOC SECURITY ASSOCIATIONS - A portable computing device configured to provide secure data communications with a network via a network communications interface. In one embodiment, the portable computing device includes a network security apparatus configured to communicate data with other network security apparatus over the network via the establishment of an association, the establishment of the association between the network security apparatus and the other network security apparatus resultant in the execution of a key generation algorithm configured to cause the network security apparatus and the other network security apparatus to exchange information utilized in the generation of cryptogaphic keys. | 2015-05-21 |
20150143122 | METHODS AND APPARATUS FOR PRIVATE SERVICE IDENTIFIERS IN NEIGHBORHOOD AWARE NETWORKS - Methods and apparatus in accordance with various embodiments provide for private service IDs for utilization in wireless devices in neighbor aware networks. One aspect of the subject matter described in the disclosure provides a method of transmitting service information in a wireless neighborhood aware network. The method includes generating a first message comprising a first service identifier, wherein the first service identifier includes a first hash value based on a service name and timing information, wherein the first hash value is generated by applying a first hash function. The method further includes transmitting the first message. | 2015-05-21 |
20150143123 | SYSTEMS AND METHODS FOR FUEL DISPENSER SECURITY - Systems and methods for fuel dispenser security are disclosed herein. In some embodiments, a user seeking access to a protected function of the fuel dispenser is presented with a challenge that is encrypted using a secret key that is unique to the fuel dispenser. To access the secured function, the user must obtain a session password from a server which authenticates the user, decrypts the challenge using a counterpart of the secret key, determines whether the user is authorized to access the secured function, and returns the session password extracted from the challenge only when the user is authorized. The server can thus control access to certain fuel dispenser functions according to a set of user access privileges. The challenge can also include additional information which can be used by the fuel dispenser and/or by the server to store a log of access activity. | 2015-05-21 |
20150143124 | SYSTEMS AND METHODS FOR FUEL DISPENSER SECURITY - Systems and methods for fuel dispenser security are disclosed herein. In some embodiments, a user seeking access to a protected function of the fuel dispenser is presented with a challenge that is encrypted using a secret key that is unique to the fuel dispenser. To access the secured function, the user must obtain a session password from a server which authenticates the user, decrypts the challenge using a counterpart of the secret key, determines whether the user is authorized to access the secured function, and returns the session password extracted from the challenge only when the user is authorized. The server can thus control access to certain fuel dispenser functions according to a set of user access privileges. The challenge can also include additional information which can be used by the fuel dispenser and/or by the server to store a log of access activity. | 2015-05-21 |
20150143125 | Key Derivation for a Module using an Embedded Universal Integrated Circuit Card - A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards. | 2015-05-21 |
20150143126 | METHOD AND APPARATUS FOR ESTABLISHING A SECURITY ASSOCIATION - A method for establishing a security association between a client and a service node for the purpose of pushing information from the service node to the client, where the client and a key server share a base secret. The method comprises sending a request for generation and provision of a service key from the service node to a key server, the request identifying the client and the service node, generating a service key at the key server using the identities of the client and the service node, the base secret, and additional information, and sending the service key to the service node together with said additional information, forwarding said additional information from the service node to the client, and at the client, generating said service key using the received additional information and the base key. A similar approach may be used to provide p2p key management. | 2015-05-21 |
20150143127 | SECURELY FILTERING TRUST SERVICES RECORDS - Embodiments include method, systems, and computer program products for filtering trust services records. Embodiments include receiving a trust services record that includes a plurality of security components and that is usable to secure data that is stored in an untrusted location. It is determined whether the trust services record has been tampered with, including verifying each of the plurality of security components of the trust services record. The trust services record is filtered based on the determination of whether the trust services record has been tampered with. The filtering includes, when the trust services record is determined to have not been tampered with, allowing performance of at least one task with respect to the secured data; and, when the trust services record is determined to have been tampered with, disallowing performance of any task with respect to the secured data. | 2015-05-21 |
20150143128 | METHOD AND DEVICE FOR PRODUCT AND DOCUMENT AUTHENTICATION - Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a replacement authentication code is generated based on the original authentication code and party-specific code. Documents and currencies can be authenticated independently of any party-specific code by an addition to or alteration of their authentication code with each authentication event. | 2015-05-21 |
20150143129 | Secure mobile identity - A “Secure Mobile Identity System” that enables the creation of secure digital credentials on mobile devices, prevents identity theft, prevents fraudulent financial transactions, protects privacy, enables a simplified federation process and provides a consumer friendly “One Click Sign On”™ process. Also, the user's credentials are secure if his/her mobile device is lost or stolen. | 2015-05-21 |
20150143130 | INTEGRATED CIRCUIT PROVISIONING USING PHYSICAL UNCLONABLE FUNCTION - A one-time programmable (OTP) memory of an integrated circuit is provisioned based on identifier data generated by a physical unclonable function (PUF) of the integrated circuit. The identifier data is used as part of cryptographic operations to secure provisioning of security information at an OTP memory of at the integrated circuit. Because of the physical characteristics of the PUF and its incorporation in the integrated circuit, the identifier information is unique to the integrated circuit. Accordingly, the provisioned security information is also unique to the integrated circuit. The OTP memory can therefore be securely provisioned at later stages of the integrated circuit manufacturing and configuration process, such as after the integrated circuit has been packaged or attached to a printed circuit board. | 2015-05-21 |
20150143131 | INFORMATION PROCESSING DEVICE, INFORMATION STORAGE DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - According to a first aspect of the present disclosure, there is provided an information storage device including a storage unit that stores encrypted content, usage control information of the encrypted content, and a revocation list in which revocation information of a content reproduction device is recorded, and a data processing unit that determines whether content reproduction of an information processing device which performs decoding of the encrypted content is permitted. The data processing unit acquires an entry identifier which is designation information for a registration entry of the revocation list recorded in the usage control information, executes an identifier registration determination process for determining whether an identifier of the information processing device which performs decoding of the encrypted content is registered in the entry of the revocation list identified according to the acquired entry identifier, and determines whether a subkey which is a generation key for a title key applied to the decoding of the encrypted content is to be provided to the information processing device based on a result of the identifier registration determination process. | 2015-05-21 |
20150143132 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, an information processing device includes a first manager, a second manager, and a generator. The first manager loads a first class of a first object that requests execution of methods contained in a second object and a third class of a limiter configured to limit access from the first object to the methods. The second manager loads a second class of the second object. The generator generates the second object from the second class upon receiving a generation request for generating the second object from the first object, generates the limiter from the second object and the third class, and transmits the limiter to the first object. | 2015-05-21 |
20150143133 | Systems For Embedding Information In Data Strings - A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters. | 2015-05-21 |
20150143134 | SECURE DATA ENCRYPTION IN SHARED STORAGE USING NAMESPACES - A data storage device in a distributed computing system has physical block addresses that are each allocated to multiple namespaces. To access the data storage device, a host system issues a command to the data storage device that includes an access key and a virtual block address to be accessed. The data storage device converts the virtual block address to a physical block address of the data storage device using a mapping associated with the access key. Access to a physical data block associated with a particular namespace is granted only if an access key for that namespace is provided to the data storage device. | 2015-05-21 |
20150143135 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - The present disclosure realizes a structure that can unify the management of the storage block for the encryption key to be used in decrypting encrypted content stored in a memory card. This structure includes: an information processing apparatus that stores content into an information storage device such as a memory card including an access allowed block based on an access right check made on each block, and uses the content; a content usage managing server that provides content usage permission information to the information processing apparatus; and a content correspondence information providing server that provides the encryption key to be used in decrypting the encrypted content stored in the information storage device. The content usage managing server determines the block for storing the encryption key and notifies the content correspondence information providing server of a block identifier that is the identifier of the determined block, and the content correspondence information providing server performs a process to write the encryption key into the block corresponding to the received block identifier. | 2015-05-21 |
20150143136 | DELETION OF CONTENT IN DIGITAL STORAGE SYSTEMS - A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data maintenance structure of encrypted partition tables and hash-nodes forming a rooted tree, where a given partition table comprises a first reference to a given encrypted data object and a first cryptographic key for decryption thereof, where a given hash-node comprises a second reference to a partition tables or hash-node and a second cryptographic key being suitable for decryption thereof, and where the root node is decipherable using a master cryptographic key stored in the hardware security module, the given data object being assigned to the root node via the first and second references of the given partition table and the given hash-nodes forming a set of successive nodes in the rooted tree. | 2015-05-21 |
20150143137 | INFORMATION PROCESSING APPARATUS, CONTROL DEVICE, AND CONTROL METHOD - An information processing apparatus includes a monitoring unit that monitors a reception of a power-on instruction from a second control device among the plurality of control devices, and a prevention unit that prevents an issue of the power-on instruction to the second control device when the monitoring unit detects the power-on instruction from the second control device. Therefore, the control device can prevent the occurrence of unintended power-on operations. | 2015-05-21 |
20150143138 | SYSTEM FOR DETECTING UNIVERSAL SERIAL BUS (USB) DEVICE AND METHOD THEREOF - A system for detecting universal serial bus (USB) device and method thereof are described. The system and method utilizes a USB controller to control a switch module and to detect the signal level of USB interface for determining whether the USB device is electrically connected to the host unit. Therefore, the system and method are capable of improving the power consumption of the host unit. | 2015-05-21 |
20150143139 | Providing Per Core Voltage And Frequency Control - In one embodiment, the present invention includes a processor having a plurality of cores and a control logic to control provision of a voltage/frequency to a first core of the plurality of cores independently of provision of a voltage/frequency to at least a second core of the plurality of cores. In some embodiments, the voltages may be provided from one or more internal voltage regulators of the processor. Other embodiments are described and claimed. | 2015-05-21 |
20150143140 | SYSTEM AND METHOD FOR PROVIDING MODULAR AND SCALABLE POWER INFRASTRUCTURE OUTSIDE OF USABLE IT SPACE - In accordance with the present disclosure, a system and method for providing scalable and modular power infrastructure outside of usable rack space is described. The system may include a chassis configured to mount on the side of a rack. A power cable interface box (PCIB) may be disposed within the chassis, and the PCIB may receive alternating current (AC) power. The system may further include at least one power supply unit disposed within a slot of the chassis, with the at least one power supply unit receiving AC power from the PCIB and outputting direct current (DC) power to a busbar. The system may also include a battery back-up unit (BBU) element disposed within the chassis. The BBU element may charge from and discharge to the busbar. | 2015-05-21 |
20150143141 | SHARED INTERRUPT MULTI-CORE ARCHITECTURE FOR LOW POWER APPLICATIONS - A multicore architecture is configured to exploit explicit task parallelism to save power by sharing interrupt sources that trigger independent tasks. | 2015-05-21 |
20150143142 | SYSTEM AND METHOD FOR DYNAMIC DCVS ADJUSTMENT AND WORKLOAD SCHEDULING IN A SYSTEM ON A CHIP - Various embodiments of methods and systems for dynamically adjusting operating frequency settings of one or more processing components in a portable computing device (“PCD”) are disclosed. One such method involves receiving a request to adjust an operating frequency setting of a processing component to a required frequency (“F_req”) to process a workload. Factor readings associated with the operating capacity of the processing component may be taken. Based on the readings, performance curves associated with the processing component may be queried. The performance curves are used to determine the optimal operating frequency (“F_opt”) for the processing component. The F_opt is compared to the F_req and, if the F_req is less than F_opt, the operating frequency setting of the processing component is set to F_opt. Advantageously, as compared to F_req, at F_opt workload processing may be more efficient and a low power mode may be entered sooner. | 2015-05-21 |
20150143143 | METHOD AND SYSTEM FOR OPTIMIZING A CORE VOLTAGE LEVEL AND ENHANCING FREQUENCY PERFORMANCE OF INDIVIDUAL SUBCOMPONENTS FOR REDUCING POWER CONSUMPTION WITHIN A PCD - A method and system for optimizing a core voltage level of a portable computing device (“PCD”) and enhancing frequency performance of individual subcomponents are disclosed. A plurality of voltage values is determined for a plurality of subcomponents within the PCD. Next, a reduced set of voltage values may be calculated with a voltage aggregator based on the plurality of voltage values. An optimized voltage level for a shared power domain may then be determined by a voltage optimizer within the PCD from the reduced set of voltage values. A shared power domain may then be set to the optimized voltage level. Subsequently, an operating frequency of each subcomponent may be optimized with a frequency performance enhancer based on the optimized voltage level. An optimal power collapse duration may also be calculated by the frequency performance enhancer and set for each subcomponent from the optimal frequency. | 2015-05-21 |
20150143144 | METHOD FOR TRANSMITTING DATA BETWEEN NODES OF A MOTOR VEHICLE USING AN ETHERNET TRANSPORT PROTOCOL AND CONTROL UNIT CONFIGURED TO CARRY OUT SAID METHOD - A method for transmitting data in a motor vehicle from an application using an Ethernet transport protocol between nodes of the motor vehicle includes: the application transmitting data via an Ethernet-based network at cyclic intervals; deactivating local transmitters and receivers of a node in non-use periods, in which no data need to be transmitted; activating again the local transmitters and receivers of the node when data are pending transmission; transferring the local transmitters and receivers from an operating active mode to a quiescent mode in a deactivation time; transferring the local transmitters and receivers from the quiescent mode to the operating active mode in an activation time; and the application lowering the transmission frequency at least until a prescribed limit value is reached based at least in part on a requirement to save energy. | 2015-05-21 |
20150143145 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - When an amount of a change of a temperature sensor output value is greater than a threshold, the occupation ratio is updated. When the amount of the change of the temperature sensor output value is equal to or smaller greater than the threshold, the occupation ratio is not updated and the background temperature is updated by using the occupation ratio at the time one sampling period before. When a difference between the temperature sensor output value and the background temperature calculated in this way becomes equal to or smaller than a threshold for an absence stated determination, it is determined an user is in an absence state. | 2015-05-21 |
20150143146 | SUBSTRATE PROCESSING APPARATUS AND CONTROL METHOD - According to one embodiment, there is provided a substrate processing apparatus including a substrate processing unit, a power supply, and a control unit. The substrate processing unit is configured to conduct processing on a substrate successively under first and second processing conditions each including a plurality of kinds of processing parameters to process the substrate. The power supply is capable of supplying power, which is one of the processing parameters included in each of the first and second processing conditions, to process the substrate. The control unit is configured to, during a period over which power supplied from the power supply is kept at a first level corresponding to the first processing condition, start a preparation operation to change over other processing parameters different from the power, from a level corresponding to the first processing condition to a level corresponding to the second processing condition. | 2015-05-21 |
20150143147 | FAN CONTROL DURING LOW TEMPERATURE OPERATIONS TO REDUCE PLATFORM POWER - In general, in one aspect, the disclosure describes running a cooling fan within a computer at low speed while the computer is in low temperature operations (e.g., idle). The operation of the cooling fan may reduce CPU temperature enough to decrease CPU leakage power, offsetting the power consumption of the fan, and possibly resulting in a net system power reduction. The benefit at the platform level increases further when considering the low efficiency of voltage regulation (VR) in this lower power regime, and potentially reductions in other components (e.g., graphics processor). The optimal fan speed is the speed at which the overall system power is reduced the most (e.g., CPU power savings is greater than fan power utilized). The optimal temperature may be determined dynamically during-operation or may be determined in manufacturing and applied statically during operation. | 2015-05-21 |
20150143148 | METHOD AND SYSTEM FOR OPTIMIZING A CORE VOLTAGE LEVEL AND ENHANCING FREQUENCY PERFORMANCE OF INDIVIDUAL SUBCOMPONENTS FOR REDUCING POWER CONSUMPTION WITHIN A PCD - A method and system for optimizing a core voltage level of a portable computing device (“PCD”) and enhancing frequency performance of individual subcomponents are disclosed. A plurality of voltage values for a plurality of subsystems is determined. At least one subsystem is a multiplexed subsystem. Next, a reduced set of voltage values is calculated based on the plurality of voltage values and an optimized voltage level is determined for a shared power domain. The shared power domain is subsequently set to the optimized voltage level. If the optimized voltage level is determined to exceed a required voltage level for the at least one multiplexed subsystem when it is running the plurality of processing engines, a subset of the plurality of processing engines may be identified to process a workload of the multiplexed system at a more efficient level of power consumption than the full plurality of processing engines. | 2015-05-21 |
20150143149 | EFFICIENT POWER MANAGEMENT OF A SYSTEM WITH VIRTUAL MACHINES - Efficient power management of a system with virtual machines is disclosed. In particular, such efficient power management may enable coordination of system-wide power changes with virtual machines. Additionally, such efficient power management may enable coherent power changes in a system with a virtual machine monitor. Furthermore, such efficient power management may enable dynamic control and communication of power state changes. | 2015-05-21 |
20150143150 | DC-Powered System Side Control Of AC-DC Adapter Primary Side Switching Circuitry - Systems and methods are provided for enabling control of adapter primary side switching circuitry of an AC-DC adapter by a DC-powered information handling system that is connected to the AC-DC adapter for receiving DC power from the AC-DC adapter. | 2015-05-21 |
20150143151 | METHOD FOR OPERATING MULTIPLE STANDBY STATES AND BROADCAST RECEIVING APPARATUS USING THE SAME - A method for operating multiple standby states and a broadcast receiving apparatus using the same are provided. The method for operating multiple standby states includes releasing, by a framework, a full wake lock for an electronic device, and acquiring, by the framework, a partial wake lock for the electronic device and entering a first standby state. Accordingly, a broadcast receiving apparatus based on an Android framework can operate multiple standby states which are designated by an application. | 2015-05-21 |
20150143152 | METHOD AND APPARATUS FOR A POWER-EFFICIENT FRAMEWORK TO MAINTAIN DATA SYNCHRONIZATION OF A MOBILE PERSONAL COMPUTER TO SIMULATE A CONNECTED SCENARIO - An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed. | 2015-05-21 |
20150143153 | AUTOMATED INFRASTRUCTURE MANAGEMENT SYSTEMS AND METHODS FOR ENABLING REAL TIME ENERGY MANAGEMENT - Automated infrastructure management systems and methods document infrastructure elements within a facility, provide a comprehensive record of all network-connected equipment within a facility, and facilitate trouble shooting of network-connected equipment. An automated infrastructure management system includes a plurality of intelligent patch panels, each comprising a plurality of connector ports connected to individual communication channels of a network, a controller in communication with at least some of the intelligent patch panels that obtains connectivity information for the intelligent patch panel's ports, and management software in communication with the controller. The management software performs various functions including correlating the interconnection information for the intelligent patch panels with the physical location information for telecommunications in its database, applying energy management policies to a respective communication channel, providing real time physical location information for devices connected to communication channels to a network switch, and displaying real time physical location information of the devices. | 2015-05-21 |
20150143154 | COMPUTER SYSTEMS AND METHODS OF DETECTING AC FAILURE - A computer system that includes a power supply unit that generates at least one secondary supply voltage (V | 2015-05-21 |
20150143155 | DATA STORAGE APPARATUS - A data storage apparatus includes a controller including a controller input/output unit suitable for receiving a ready/busy delay signal and generating a ready/busy output signal in response to a first control signal, and a memory chip including a memory input/output unit suitable for receiving a chip enable delay signal and generating a chip enable output signal in response to a second control signal. The ready/busy delay signal and the chip enable delay signal are transmitted through a substantially same transmission line. | 2015-05-21 |
20150143156 | Systems and Methods for Tracking Elapsed Time - A system utilizing time tracking is disclosed. The system includes a real time clock, a time component, and a controller. The real time clock is configured to track time. The time component is configured to measure a time value without an additional power source. The controller is configured to determine an elapsed time using the time value and calibration information and to update the real time clock using the elapsed time in a restart mode. | 2015-05-21 |
20150143157 | Method for controlling operations of server cluster - A server cluster has a plurality of application servers. During failover of a failed node of the application servers, right to use of internet protocol (IP) address of the failed node is transferred to a surviving node of the server cluster according to a failed-link index of the failed node, the total number of surviving nodes of the server cluster, and successful link indexes of the surviving nodes. | 2015-05-21 |
20150143158 | Failover In A Data Center That Includes A Multi-Density Server - Failover in a data center that includes a multi-density server, where the multi-density server includes multiple independent servers, includes; detecting, by a management module, a failure of one of the independent servers of the multi-density server; identifying, by the management module, a failover target; determining, by the management module, whether the failover target is a non-failed independent server included in the multi-density server; and responsive to determining that the failover target is a non-failed independent server included in the multi-density server, migrating, by the management module, the failed independent server's workload to another server that is not included in the multi-density server. | 2015-05-21 |
20150143159 | FAILOVER IN A DATA CENTER THAT INCLUDES A MULTI-DENSITY SERVER - Failover in a data center that includes a multi-density server, where the multi-density server includes multiple independent servers, includes; detecting, by a management module, a failure of one of the independent servers of the multi-density server; identifying, by the management module, a failover target; determining, by the management module, whether the failover target is a non-failed independent server included in the multi-density server; and responsive to determining that the failover target is a non-failed independent server included in the multi-density server, migrating, by the management module, the failed independent server's workload to another server that is not included in the multi-density server. | 2015-05-21 |
20150143160 | MODIFICATION OF A CLUSTER OF COMMUNICATION CONTROLLERS - Provided is a system having a cluster of communication controllers, a method for modification of the latter, and a computer program product carrying computer executable code for execution of the method. Each communication controller is operable for providing network connections of the computer system with external computer systems using communication protocols of a first type and a second type. The first type is a failover tolerant communication protocol type. The second type is a failover non-tolerant communication protocol type. All network connections of each communication controller are disconnected during the modification of said communication controller. | 2015-05-21 |
20150143161 | DISASTER RECOVERY APPLIANCE - A disaster recovery appliance is described herein. The disaster recovery appliance is coupled to one or more servers. The disaster recovery appliance continuously receives backup data for each of the one or more servers. When a server fails, the disaster recovery appliance, replaces the failed server. While the failed server is inaccessible, the disaster recovery appliance is able to mimic the functionality of the failed server. In some embodiments, the disaster recovery appliance is able to act as a server in addition to a backup device for the other servers. | 2015-05-21 |
20150143162 | Two-Tier Failover Service for Data Disaster Recovery - Technologies are described herein for providing a two-tier failover service. A request to access content by an application associated with an application identifier may be identified. A first record corresponding to the application identifier may be retrieved from a database information table. The first record may include a reference identifier, a database name of a database, and a failover value. A second record corresponding to the reference identifier may be retrieved from a server information table. The second record may include an indication of a first server computer as a primary server computer and an indication of a second server computer as a secondary server computer. A connection specification to either the first server computer or the second server computer may be generated based on the first record and the second record. | 2015-05-21 |
20150143163 | PREVENTING A ROLLBACK ATTACK IN A COMPUTING SYSTEM THAT INCLUDES A PRIMARY MEMORY BANK AND A BACKUP MEMORY BANK - Preventing a rollback attack in a computing system that includes a primary memory bank and a backup memory bank, including during startup of the computing system: determining whether the computing system is attempting to use firmware in the backup memory bank; responsive to determining that the computing system is attempting to use firmware in the backup memory bank, determining whether the firmware in the backup memory bank is a previous version of firmware in the primary memory bank; responsive to determining that the firmware in the backup memory bank is a previous version of firmware in the primary memory bank, determining whether a system administrator has authorized the use of the firmware in the backup memory bank; and responsive to determining that the system administrator has authorized the use of the firmware in the backup memory bank, configuring the computing system to utilize the firmware in the backup memory bank. | 2015-05-21 |
20150143164 | I/O REQUEST MIRRORING IN A CLUSTERED STORAGE SYSTEM - Clustered storage systems and methods are presented herein. One clustered storage system includes a logical volume comprising first and second pluralities of storage devices. The first plurality of storage devices is different from the second plurality of storage devices and includes at least the same data as the second plurality of devices. The storage system also includes a first storage node operable to process first I/O requests to the first plurality of storage devices and a second storage node communicatively coupled to the first storage node and operable to process second I/O requests to the second plurality of storage devices. An I/O request of the first I/O requests initiates a redirection condition that the first storage node detects. Then, based on the redirection condition, the first storage node directs the second storage node to process data of the I/O request. | 2015-05-21 |
20150143165 | MEMORY SYSTEMS AND METHODS OF MANAGING FAILED MEMORY CELLS OF SEMICONDUCTOR MEMORIES - A memory system includes a memory controller configured to replace a memory block including a failed memory cell with a unit cache block of a cache memory in response to detection of the failed memory cell in the memory block. The unit cache block is smaller than a minimum size of a memory cell array capable of being blocked by an operating system, and the unit cache block has substantially the same storage capacity as the memory block. | 2015-05-21 |
20150143166 | SECURITY KEY ENTRY USING ANCILLARY INPUT DEVICE - A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. In addition, a key may be represented by a pattern of unreadable errors in a computer-readable medium. | 2015-05-21 |
20150143167 | STORAGE CONTROL APPARATUS, METHOD OF CONTROLLING STORAGE SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM STORING STORAGE CONTROL PROGRAM - A storage control apparatus for controlling a storage system including a plurality of storage devices includes a monitor unit that collects statistics from each of the storage devices; and a selection unit that, in the event of a failure of any of the storage devices, selects a storage device to which data in the failed storage device is to be reconstructed, based on the statistics collected by the monitor unit. | 2015-05-21 |
20150143168 | RESTORE IN CASCADED COPY ENVIRONMENT - In one aspect of the present description, handling multiple backup processes comprises detecting that a defined storage volume is present in a first cascade of storage volumes; detecting that the defined storage volume is present in a second cascade of storage volumes; receiving a data write for a last storage volume in the first cascade of storage volumes; and performing a cleaning data write on the defined storage volume in the second cascade of storage volumes, wherein the cleaning data write corresponds to the received data write. Other aspects may be utilized, depending upon the particular application. | 2015-05-21 |
20150143169 | STORAGE CONTROL DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN PROGRAM, AND CONTROL METHOD - There is provided a storage control device that is communicably connected to a plurality of storage devices and a plurality of spare storage devices through a plurality of paths. The storage control device includes: a memory configured to store path information associating the plurality of spare storage devices and the plurality of paths with each other; and a selection unit configured to select a spare storage device that is a replacing apparatus from among the plurality of spare storage devices based on a path connection condition determined in accordance with a path in which the storage device that is a replacement target among the plurality of storage devices is connected and the path information. | 2015-05-21 |
20150143170 | STORAGE DEVICE FAILURE RECOVERY SYSTEM - A storage device failure recovery system includes a storage IHS and a user IHS coupled together over a network. The user IHS includes a storage system having a storage device, and a storage repair function that periodically provides a storage device image over the network to the storage IHS using data from the storage device. The storage repair function detects a failure of the storage device and streams an operating system on the user IHS using the storage device image stored on the storage IHS. While streaming the operating system on the user IHS using the storage device image stored on the storage IHS, the storage repair function analyzes the failure of the storage device, determines a storage system failure recovery procedure, and performs the storage system failure recovery procedure to restore the storage system while a user remains productive on the user IHS via the streamed operating system. | 2015-05-21 |
20150143171 | METHOD, ELECTRONIC DEVICE AND CONTROLLER FOR RECOVERING ARRAY OF MEMORY CELLS - A method, an electronic device and a controller for recovering an array of memory cells are provided. The method comprises the following steps. Whether a recovery control signal is received or not is determined. A retention checking procedure is executed for identifying whether a threshold voltage distribution of at least one bit of the memory cells in high threshold state is shifted or not, if the recovery control signal is received. A retention writing procedure is executed on the memory cells, if the memory cells in high threshold state do not pass the retention checking procedure. | 2015-05-21 |
20150143172 | COMPUTING DEVICE AND METHOD FOR AUTOMATICALLY RECOVERING BIOS OF COMPUTING DEVICE - In a method for automatically recovering a basic input-output system (BIOS) of a computing device, the computing device includes a serial peripheral interface (SPI) ROM, a storage device, and a supper I/O (SIO) controller. The SPI ROM stores a first BIOS booting block and a main BIOS, and the SIO controller stores a second BIOS booting block. An integrity of the main BIOS stored in the SPI ROM is checked when the computing device is powered on. The first BIOS booting block boots the computing device when the main BIOS is partially damaged, and the second booting block powers on the computing device when the main BIOS is fully damaged. A backup BIOS is obtained from the storage device, and is written into the SPI ROM to update data of the main BIOS. | 2015-05-21 |
20150143173 | DETERMINING PERFORMANCE STATES OF PARENT COMPONENTS IN A VIRTUAL-MACHINE ENVIRONMENT BASED ON PERFORMANCE STATES OF RELATED CHILD COMPONENTS DURING A TIME PERIOD - Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance. | 2015-05-21 |
20150143174 | METHOD AND APPARATUS FOR RECOVERING METADATA LOST DURING AN UNEXPECTED POWER DOWN EVENT - A system including first and second memories and a control module. The first memory stores a first lookup table (LUT) with first metadata. The first metadata maps logical addresses to physical addresses. The first metadata is lost due to an unexpected power down event. The second memory stores an event log and a second LUT with second metadata. The second metadata maps the logical addresses to the physical addresses. The event log includes entries that indicate updated associations between the logical addresses and the physical addresses. The control module, prior to the unexpected power down event, performs segmented flushes that include updating segments of the second metadata with segments of the first metadata. As a result of the unexpected power down event, the control module walks the event log from a first entry to a second entry to recover a single full flush cycle of segments in the first memory | 2015-05-21 |
20150143175 | INFORMATION PROCESSING APPARATUS, CONTROL DEVICE, AND COMPUTER-READABLE RECORDING MEDIUM HAVING STORED CONTROL PROGRAM - A first control device includes: a switch device including a first port connected to a second control device among the plurality of control devices via a first channel and a second port connected to the second control device via a second channel and to which a processing device is connected; a detection unit that detects an error in the control devices; a first reset processing unit that performs a port reset of the first port included in the switch device; and a transmitting unit that transmits a reset instruction to the second control device; thereby propagation of an error occurred in a control device can be inhibited. | 2015-05-21 |
20150143176 | IDENTIFICATION SYSTEM, IDENTIFICATION METHOD, AND PROGRAM - The present invention is an identification system comprising: an irrelevance trigger interpreting section for calculating a logical formula of irrelevance triggers for a component in a system from a cut set logical formula f of a system failure; and minimal cut set evaluating means for minimizing the logical formula of the irrelevance triggers, which has been calculated by said irrelevance trigger interpreting section, to calculate the irrelevance triggers for said component. | 2015-05-21 |
20150143177 | ANALYSIS STACK FOR AN EVENT FLOW - An analysis module is configured to receive data associated with an event flow. The data is received from a first analysis module (e.g., in a stack of analysis modules) or from the event flow. The analysis module is configured to execute an analysis operation on the data to generate a result. The analysis module can output the result to a second analysis module (e.g., in the stack of analysis modules) or to a user interface. | 2015-05-21 |
20150143178 | TESTING FRAMEWORK FOR CONTROL DEVICES - The present disclosure generally relates to the automated testing of a system that includes software or hardware components. In some embodiments, a testing framework generates a set of test cases for a system under test using a grammar. Each test case may perform an action, such as provide an input to the system under test, and result in an output from the system under test. The inputs and outputs are then compared to the expected results to determine whether the system under test is performing correctly. Specifically, the system under test may be analyzed to determine whether it is capable of properly processing control instructions and input signals and/or generating expected output control signals and additional control/feedback information. The data can then be interpreted in the grammar system and/or used as input to a fault isolation engine to determine anomalies in the system under test. | 2015-05-21 |
20150143179 | System and Method for Progressive Fault Injection Testing - A system and method for performing a progressive fault injection process to verify software is provided. In some embodiments, the method comprises loading a software product into the memory of a testbed computing system, wherein the software product includes a function and a statement that calls the function. A data structure is updated based on an error domain of the function. The calling statement is executed for each of one or more error return codes of the error domain. For each iteration of the execution, a call of the function by the calling statement is detected, and, in response, an error return code of the one or more error return codes is provided in lieu of executing the function. The software product is monitored to determine a response to the provided error return code. In some embodiments, the error return code to provide is determined by querying the data structure. | 2015-05-21 |
20150143180 | VALIDATING SOFTWARE CHARACTERISTICS - Aspects of the subject matter described herein relate to software validation. In aspects, code may be instrumented to generate certain records upon execution. The code may be further instrumented to generate start and stop records that correspond to the start and stop events of a scenario of a program. The start and stop event records allow correlation of the scenario with other records written to the log. With the correlation and appropriate instrumentation, a tool may determine performance, memory usage, functional correctness, and other characteristics of program at the granularity of the scenario. | 2015-05-21 |
20150143181 | DUAL ENDIANESS AND OTHER CONFIGURATION SAFETY IN LOCK STEP DUAL-CORE SYSTEM, AND OTHER CIRCUITS, PROCESSES AND SYSTEMS - An electronic circuit includes a microcontroller processor ( | 2015-05-21 |
20150143182 | Varying Logging Depth Based On User Defined Policies - Techniques for writing logging files, where the logging files include multiple pieces of logging information. The pieces of logging information are based on operation of a computer system. The writing of the logging information includes the following steps (not necessarily in the following order): (i) choosing a set of logging rules; which logging rules determine the selection of which pieces of operational information relating to the computer system will be written to a non-volatile log file; (ii) operating the computer system; (iii) during operation of the computer system, collecting a first set of pieces of operational information; (iv) saving the first set of pieces of operational information to a volatile buffer memory; and (v) writing only a first sub-set of the first set of pieces of operational information to a first log file. | 2015-05-21 |
20150143183 | STORAGE CONTROL APPARATUS AND METHOD FOR CONTROLLING STORAGE APPARATUS - A storage control apparatus for controlling a storage apparatus including inside a casing thereof one or more storage units and two or more fans for cooling the storage units includes a processor. The processor is configured to obtain abnormality information regarding abnormalities in access in each of the storage units. The processor is configured to switch a control state between a first control state and a second control state. The first control state corresponds to a first combination of operation modes of the fans. The second control state corresponds to a second combination of operation modes of the fans. The second combination is different from the first combination. The processor is configured to detect, among the fans, a first fan that is related to an abnormality in the storage units on basis of first abnormality information for the first control state and second abnormality information for the second control state. | 2015-05-21 |
20150143184 | NETWORK MANAGEMENT SERVER AND RECOVERY METHOD - A network management server stores, in terms of a transmission path within the network, each occurrence pattern of a failure occurrence area in which a failure has occurred in a communication apparatus through which the transmission path passes. Information for identifying a recovery plane serving as a set of recovery paths corresponding to each occurrence pattern and information for identifying the communication apparatus through which each of the recovery paths passes is also stored. When a failure occurs in any one of the plurality of areas, whether or not the failure corresponds to any one of the failure occurrence patterns, the information for identifying the recovery plane corresponding to the identified failure occurrence patterns is acquired; and the communication apparatus through which each of the recovery paths included in the recovery plane passes is notified of the information for identifying the recovery plane acquired. | 2015-05-21 |
20150143185 | DATA STORAGE AND VARIABLE LENGTH ERROR CORRECTION INFORMATION - A corresponding portion of storage (such as one or more storage cells) is assigned one of multiple different error correction modes depending on a respective ability of the corresponding portion of storage cells to store data without error. Groups of storage cells that are less prone to failures (i.e., loss of data) are assigned a first error correction mode in which a first length error correction code is used to generate error correction information for a given sized segment of data. Groups of storage cells that are more prone to failures are assigned a second error correction mode in which a second length error correction code is used to generate error correction information for the given sized segment of data. | 2015-05-21 |
20150143186 | SYSTEMS AND METHODS FOR DETECTING A DIMM SEATING ERROR - DIMM seating errors may be detected. An example detection method includes determining whether a training error has occurred for a number of dynamic random access memories (DRAMs) of a DIMM. The Example method includes identifying a location for each of the DRAMs. The example method includes determining whether a seating error has occurred based on the training error, the number, and the location of the DRAMs. | 2015-05-21 |
20150143187 | IMPLEMENTING ENHANCED PERFORMANCE WITH READ BEFORE WRITE TO PHASE CHANGE MEMORY - A method and apparatus are provided for implementing enhanced performance with read before write to phase-change-memory. Each write to PCM is preceded by a read and a calculation to discover a location of any bad bits. The write data is converted to a format that can be corrected for a given number of previously undiscovered bit errors, and the writes are unverified. | 2015-05-21 |
20150143188 | METHODS FOR ACCESSING A STORAGE UNIT OF A FLASH MEMORY AND APPARATUSES USING THE SAME - An embodiment of a method for accessing a storage unit of a flash memory, performed by a control unit, is disclosed to include at least the following steps. A transaction is appended to a bad-column table each time a bad column of a block within the storage unit is inspected. It is determined whether a total number of the transactions within the bad-column table is odd when the control unit determines that the last column of the block is a regular column. A transaction is appended to the bad-column table to indicate that the last column of the block is a bad column when the control unit determines that the total number of the transactions within the bad-column table is odd. | 2015-05-21 |
20150143189 | COVERAGE ENHANCEMENT AND POWER AWARE CLOCK SYSTEM FOR STRUCTURAL DELAY-FAULT TEST - Methods and devices applying to a clock system of scan circuits to enhance the test coverage for structural delay-fault tests are provided. According to an aspect, a method applying to a clock system of a scan circuit of a scan test containing one or more clock gating cells includes at any stage of the scan test outputting a controllable waveform of a clock signal at each clock gating cell, and eliminating a partially enabled clock signal during a capture cycle at each clock gating cell. | 2015-05-21 |
20150143190 | PARTIAL SCAN CELL - An integrated circuit | 2015-05-21 |
20150143191 | SHADOW ACCESS PORT METHOD AND APPARATUS - The disclosure describes a novel method and apparatus for providing a shadow access port within a device. The shadow access port is accessed to perform operations in the device by reusing the TDI, TMS, TCK and TDO signals that are used to operate a test access port within the device. The presence and operation of the shadow access port is transparent to the presence and operation of the test access port. According to the disclosure, the shadow access port operates on the falling edge of the TCK signal while the test access port conventionally operates on the rising edge of the TCK signal. | 2015-05-21 |
20150143192 | APPLICATION SERVER AND METHOD OF ERROR RECOVERY WHEN DOWNLOADING DATA FILES - In a method of error recovery when downloading data files using an application server, the application server connects to at least one terminal device and several file servers. The application server receives a file downloading request from the terminal device, finds a first file server nearest to the terminal device, and downloads the required data file from the first file server to the terminal device. The application server searches a file configuration table to find a second file server which is away from the first file server when the data file has not been successfully downloaded from the first file server, downloads the required data file from the second file server to the terminal device, and synchronizes the data file of the second file server to recovery the data file of the first file server when the data file has been successfully downloaded from the second file server. | 2015-05-21 |
20150143193 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR THE SAME AND STORAGE MEDIUM - An information processing apparatus, connected to a management server managing a set value used among a plurality of information processing apparatuses, can perform an appropriate process according to the situation of an information processing system and can prevent wasteful power consumption thereof. A set value acquired from the management server and changed by the information processing apparatus is transmitted to the management server, but when the transmission fails, the transmission of the changed set value is retried, and it is switched according to a classification of the set value to be transmitted whether the retry is stopped or is continued. | 2015-05-21 |
20150143194 | REDUCED COMPLEXITY NON-BINARY LDPC DECODING ALGORITHM - Decoding logic is provided that is operational upon a data buffer to represent a plurality of variable nodes and a plurality of check nodes. For a respective one of the variable nodes, a vector component is selected from a confidence vector associated with the variable node. Using a respective one of the check nodes, a check node return value is calculated based on one or more other vector components from one or more other vectors and one or more vector indices corresponding to the one or more other vector components. The confidence vector is then updated based on the check node return value and an index for the check node return value, and a current state of a memory cell associated with the respective one of the variable nodes is determined based on a location of a primary one of multiple vector components within the updated confidence vector. | 2015-05-21 |
20150143195 | Encoding and decoding using constrained interleaving - Serially-concatenated codes are formed in accordance with the present invention using a constrained interleaver. The constrained interleaver cause the minimum distance of the serial concatenated code to increase above the minimum distance of the inner code alone by adding a constraint that forces some or all of the distance of the outer code onto the serially-concatenated code. This allows the serially-concatenated code to be jointly optimized in terms of both minimum distance and error coefficient to provide significant performance advantages. These performance advantages allow a noise margin target to be achieved using simpler component codes and a much shorter interleaver than was needed when using prior art codes such as Turbo codes. Decoders are also provided. Both encoding and decoding complexity can be lowered, and interleavers can be made much shorter, thereby shortening the block lengths needed in receiver elements such as equalizers and other decision-directed loops. Also, other advantages are provided such as the elimination of a error floor present in prior art serially-concatenated codes. That allows the present invention to achieve much higher performance at lower error rates such as are needed in optical communication systems. | 2015-05-21 |
20150143196 | Systems and Methods for FAID Follower Decoding - Systems and method relating generally to data processing, and more particularly to systems and methods for decoding information. | 2015-05-21 |
20150143197 | Codes for Enhancing the Repeated Use of Flash Memory - A basic property of flash memory is that: a 0-bit can be changed into a 1-bit, but not vice-versa, which severely limits the possibilities of reusing storage space with new data. A family of new coding methods is presented that enables double use of the memory, effectively expanding the combined amount of stored data. This can then be used as a compression booster, adding an additional layer to, and improving the compression of some rewriting methods that are not context sensitive. | 2015-05-21 |
20150143198 | METHOD AND APPARATUS FOR MULTIPLE-BIT DRAM ERROR RECOVERY - A system for replacing a page stored in system memory when reading the page incurs a multiple-bit error. Upon reading a page in system memory for which a multiple-bit error is detected, backup data in flash memory is loaded into a redundant page in the system memory, and a re-mapper is configured so that future accesses to the page are redirected to the redundant page. | 2015-05-21 |
20150143199 | COMPUTER MEMORY POWER MANAGEMENT - A method of operating a computer memory system with ECC features that will enable operational modes with less electrical power consumption. A chip mark normally used to mark a failing DRAM device may instead be used to mark a non-failing DRAM device before a computer memory system shuts off electrical power to the marked non-failing DRAM device to reduce power consumption, putting the rank of memory that contains the DRAM device in a low power consumption mode. Upon a request from the computer memory system, the chip mark may be removed from the marked non-failing DRAM device in order to return the non-failing DRAM device to normal operation. | 2015-05-21 |
20150143200 | COMPUTER MEMORY POWER MANAGEMENT - A method of operating a computer memory system with ECC features that will enable operational modes with less electrical power consumption. A chip mark normally used to mark a failing DRAM device may instead be used to mark a non-failing DRAM device before a computer memory system shuts off electrical power to the marked non-failing DRAM device to reduce power consumption, putting the rank of memory that contains the DRAM device in a low power consumption mode. Upon a request from the computer memory system, the chip mark may be removed from the marked non-failing DRAM device in order to return the non-failing DRAM device to normal operation. | 2015-05-21 |
20150143201 | ERROR-CORRECTING CODE DISTRIBUTION FOR MEMORY SYSTEMS - According to one embodiment, a memory system includes a plurality of memory devices and a memory controller operatively coupled to the memory devices. The memory controller is configured to partition write data into a plurality of data blocks, where each data block is associated with one of the memory devices. The memory controller is further configured to generate an instance of a local error-correcting code (ECC) corresponding to each data block, and merge each data block with the corresponding instance of the local ECC to form an encoded data block for each memory device. Additionally, the memory controller is configured to write each encoded data block to the memory devices such that each memory device stores one of the data blocks with the corresponding instance of the local ECC. A global ECC and a local ECC of the global ECC can also be included in the memory system. | 2015-05-21 |
20150143202 | Systems and Methods for Soft Decision Generation in a Solid State Memory System - Systems and method relating generally to solid state memory, and more particularly to systems and methods for generated data from a solid state memory. | 2015-05-21 |
20150143203 | SEMICONDUCTOR DEVICE AND METHOD OF OPERATING THE SAME - A semiconductor device includes a memory device suitable for outputting health monitoring data including information on a threshold voltage distribution, and outputting read data read from memory cells included in the memory device, and a controller suitable for receiving a predetermined quantity of the read data from the memory device based on the health monitoring data, and performing a decoding operation for an error correction by using the received read data. | 2015-05-21 |
20150143204 | TRANSMISSION DEVICE, RECEPTION DEVICE, TRANSMISSION METHOD, AND RECEPTION METHOD - A transmission device for rigorously protecting important information when information is transferred via a best-effort network. In this transmission device, a quality control information retention unit ( | 2015-05-21 |
20150143205 | DTV TRANSMITTING SYSTEM AND METHOD OF PROCESSING BROADCAST DATA - A DTV transmitting system includes an encoder, a randomizer, a block processor, a group formatter, a deinterleaver, and a packet formatter. The encoder codes enhanced data for error correction, permutes the coded data, and further codes the permuted data for error detection. The randomizer randomizes the coded enhanced data, and the block processor codes the randomized data at an effective coding rate of 1/H. The group formatter forms a group of enhanced data having data regions, and inserts the coded enhanced data into at least one of the data regions. The deinterleaver deinterleaves the group of enhanced data, and the packet formatter formats the deinterleaved data into corresponding data bytes. | 2015-05-21 |
20150143206 | METHOD FOR PERFORMING ERROR CORRECTIONS OF DIGITAL INFORMATION CODIFIED AS A SYMBOL SEQUENCE - A method and system for making error corrections on digital information coded as symbol sequences, for example digital information stored in electronic memory systems or transmitted from and to these systems is described, provides the 5 transmission of sequences incorporating a portion of error corrector code allowing the sequence which is more probably the original transmitted through the calculation of an error syndrome using a parity matrix to be restored when received. Advantageously according to embodiments of the invention, the error code incorporated in the original sequence belongs to a non Boolean group. | 2015-05-21 |
20150143207 | COMPUTATIONALLY EFFICIENT CONVOLUTIONAL CODING WITH RATE-MATCHING - An error coding circuit comprises a non-systematic convolutional encoder for coding an input bit stream to produce two or more groups of parity bits, an interleaver circuit for interleaving parity bits within each group of parity bits, and a rate-matching circuit for outputting a selected number of the interleaved parity bits ordered by group to obtain a desired code rate. | 2015-05-21 |
20150143208 | SIGNAL QUALITY EVALUATION APPARATUS, SIGNAL QUALITY EVALUATION METHOD, AND REPRODUCING DEVICE - Provided is a signal quality evaluation apparatus, including an error pattern detection unit to which binarized data obtained by performing a PRML decoding process on a reproduced signal of bit information by partial response equalization and maximum likelihood decoding is input, the error pattern detection unit configured to detect at least one specific error pattern that is a bit pattern that is longer than a constraint length of the PRML decoding process, a metric difference calculation unit configured to calculate a metric difference of the at least one specific error pattern that has been detected by the error pattern detection unit, and an index value generation unit configured to generate an index value of a reproduced signal quality by using a distribution of the metric difference obtained by the metric difference calculation unit. | 2015-05-21 |