25th week of 2013 patent applcation highlights part 75 |
Patent application number | Title | Published |
20130159681 | VERIFYING SPECULATIVE MULTITHREADING IN AN APPLICATION - Verifying speculative multithreading in an application executing in a computing system, including: executing one or more test instructions serially thereby producing a serial result, including insuring that all data dependencies among the test instructions are satisfied; executing the test instructions speculatively in a plurality of threads thereby producing a speculative result; and determining whether a speculative multithreading error exists including: comparing the serial result to the speculative result and, if the serial result does not match the speculative result, determining that a speculative multithreading error exists. | 2013-06-20 |
20130159682 | DECIMAL FLOATING-POINT PROCESSOR - A method for operating a decimal-floating point (DFP) processor. The method includes identifying a first op-code requiring read access to a first plurality of DFP operands in a vector register of the DFP processor; granting read access from a first port of the vector register to a first execution unit of the DFP processor selected to execute the first op-code; initializing a read pointer of the first port; reading out, from the first port and based on the read pointer, a first DFP operand of the plurality of DFP operands in response to a read request from the first execution unit; and adjusting the read pointer of the first port in response to reading out the first DFP operand. | 2013-06-20 |
20130159683 | INSTRUCTION PREDICATION USING INSTRUCTION ADDRESS PATTERN MATCHING - A particular method includes receiving, at a processor, an instruction and an address of the instruction. The method also includes preventing execution of the instruction based at least in part on determining that the address is within a range of addresses. | 2013-06-20 |
20130159684 | BATCHED REPLAYS OF DIVERGENT OPERATIONS - One embodiment of the present invention sets forth an optimized way to execute replay operations for divergent operations in a parallel processing subsystem. Specifically, the streaming multiprocessor (SM) includes a multistage pipeline configured to batch two or more replay operations for processing via replay loop. A logic element within the multistage pipeline detects whether the current pipeline stage is accessing a shared resource, such as loading data from a shared memory. If the threads are accessing data which are distributed across multiple cache lines, then the multistage pipeline batches two or more replay operations, where the replay operations are inserted into the pipeline back-to-back. Advantageously, divergent operations requiring two or more replay operations operate with reduced latency. Where memory access operations require transfer of more than two cache lines to service all threads, the number of clock cycles required to complete all replay operations is reduced. | 2013-06-20 |
20130159685 | CONTROL FLOW-BASED APPROACH IN IMPLEMENTING EXCEPTION HANDLING ON A GRAPHICS PROCESSING UNIT - A function in source code is processed by a compiler for execution on a graphics processing unit, wherein the function includes an exception handling structure. An exception raising block is converted into a first control flow and an exception handler block is converted into a second control flow. The first control flow includes setting an exception raised indicator and finding an exception handler to process the raised exception. The exception raised indicator remains set until an appropriate exception handler is found. The second control flow includes clearing the exception raised indicator and processing the exception. | 2013-06-20 |
20130159686 | MANAGING CONFIGURATION AND OPERATION OF AN ADAPTER AS A VIRTUAL PERIPHERAL COMPONENT INTERCONNECT ROOT TO EXPANSION READ-ONLY MEMORY EMULATION - A method of managing an adapter includes identifying a firmware image configured to enable configuration firmware of a logical partition, where the firmware image is associated an expansion read-only memory (ROM). Access to the firmware image may be enabled by the logical partition, and the firmware image may be used to control of an operation of the adapter. | 2013-06-20 |
20130159687 | Memory Training Results Corresponding To A Plurality Of Memory Modules - Methods, apparatuses, and computer program products for improving memory training results corresponding to a plurality of memory modules are provided. Embodiments include detecting a hardware configuration change upon initiating a boot sequence of a system that includes the plurality of memory modules; generating for a plurality of training iterations, reference training values corresponding to aligning of a data strobe (DQS) signal with a data valid window of data (DQ) lines of the plurality of memory modules; identifying for each training iteration, any outer values within the reference training values generated for that training iteration; eliminating the identified outer values from the reference training values; generating a final reference training value based on an average of the remaining reference training values; and using the final reference training value as the DQ-DQS timing value for the boot sequence of the system. | 2013-06-20 |
20130159688 | ELECTRONIC DEVICE AND METHOD OF SETTING REMOVAL POLICY OF USB DEVICE - A method for setting removal policy of a USB device includes: obtaining device information of a USB device connected to a USB port when the electronic device is started up and on a BIOS process; comparing the obtained device information with device information stored in a storage unit to determine whether the obtained device information matches one of the device information stored in the storage unit, thus producing a comparison result; and setting removal policy of the USB device connected to the USB port according to the comparison result. | 2013-06-20 |
20130159689 | METHOD AND APPARATUS FOR INITIALIZING EMBEDDED DEVICE - The present invention relates generally to a method and apparatus for initializing an embedded device. When a boot loader is executed and a kernel is loaded, an initialization program is executed, and a booting sequence including information about an operating sequence of a boot process is loaded. Thereafter, initialization functions which are included in a script replacement function module of the embedded device are executed, and then a state of the embedded device is set to a usable state. Accordingly, the method and apparatus can efficiently perform the operations of an initialization program that is used to solve the complexity of the initialization of an OS inevitably appearing on mobile devices and high-performance embedded devices, and an initialization script that is operated to flexibly execute the initialization program on various devices having different characteristics. | 2013-06-20 |
20130159690 | METHOD OF STARTING A COMPUTER USING A BIOMETRIC AUTHENTICATION DEVICE - A computer is made usable in a short time using a fingerprint authentication device. When a fingerprint authentication device performs authentication successfully, the fingerprint authentication device sends a startup signal to a power controller via a line. The power controller controls a DC/DC converter to supply power to devices. The fingerprint authentication device sets whether normal boot or fast boot that is completed in a shorter time than the normal boot is successful, in a register via a line. In the fast boot, initialization of a USB interface of a line and password input by a user are skipped, and a BIOS accesses a system by single sign-on using a password stored in a secure area. | 2013-06-20 |
20130159691 | PROCESSING FRAMEWORK FOR GENERATING PRE-CONFIGURATION PACKAGES - Reference packages may include a self-contained set of implementation tasks, that when executed at a computing system, provide the computing system with a particular functionality. Implementation tasks in a reference package may be compared to an existing configuration of a computing system to determine which of the implementation tasks have already been executed/installed in the computing system and which have not. Implementation tasks that have not been installed may be selected for inclusion in a final target package. Implementation tasks that have been partially installed or installed differently in the existing computing system from the implementation tasks may have secondary tasks added to them in the final target package. Each secondary task may enable a change to the configuration of the existing system to resolve the configuration inconsistency between the existing configuration in the computing system and the configuration specified in a corresponding implementation task. | 2013-06-20 |
20130159692 | ELECTRONIC APPARATUS AND BIOS UPDATING APPARATUS THEREOF - An electronic apparatus including a central processing unit (CPU), a chipset, a first interface circuit, a temporary memory, a BIOS (basic input/output system) memory, a second interface circuit and a first switcher is provided. The chipset is coupled to the CPU and the first switcher. The temporary memory is coupled to the first switcher and the first interface circuit. The first interface circuit is coupled to the electronic apparatus and an extended storage including a first BIOS. The second interface circuit is coupled to the first switcher and the BIOS memory. If the first BIOS is stored in the temporary memory, the temporary memory is coupled to the chipset by the first switcher; if the first BIOS is not stored in the temporary memory, the second interface circuit is coupled to the chipset by the first switcher. The electronic device can safely updates the BIOS. | 2013-06-20 |
20130159693 | Automatic Configuration Sampling for Managing Configuration Parameters of a Computer System - A computer configuration utility automatically alters system configuration parameters to sample multiple different configurations. At least one workrate metric is measured at each sampled configuration. The workrate measurements for the multiple different configurations are compared to determine the effect of different configurations with respect to at least one optimization criterion. System configuration is automatically adjusted to the optimum configuration. Preferably, the workrate metric is (non-idle) instructions executed per unit of time. | 2013-06-20 |
20130159694 | DOCUMENT PROCESSING METHOD AND SYSTEM - A document processing method and system are provided. A client divides at least one document into a plurality of document pages, and individually encrypts the document pages by a first key to obtain a plurality of encrypted pages. The client removes a part of words from the document pages to obtain a plurality of significant words, and individually encrypts the significant words by a second key different to the first key to obtain a plurality of encrypted significant words. The client records the encrypted significant words and a plurality of first index information in a significant word set (SWS), where the first index information indicates a page in the encrypted pages where the encrypted significant word comes from. Then, the client transmits the encrypted pages and the SWS to a remote server for storage. | 2013-06-20 |
20130159695 | DOCUMENT PROCESSING METHOD AND SYSTEM - A document processing method and system divides a document into document pages, and encrypts the document pages by first key to obtain a plurality of encrypted pages; picks a part of words from the document pages and encrypts them by second key to obtain a Significant Word Set (SWS); picks a part of words from the picked part of words and encrypts them by third key to obtain a Most Relevant Word Set (MRWS). The encrypted pages, the SWS and the MRWS are transmits to a remote server for storage. When user search a keyword in the document, the keyword is encrypted by the second and third keys for performing two query. The first query result is decrypted to obtain the search result. The second query result is decrypted and then checked whether it is a subset of the first decrypted query result for detecting unfaithful execution. | 2013-06-20 |
20130159696 | SENDING MESSAGES BY OBLIVIOUS TRANSFER - A system includes a server connectable to a client, the server configured to allow the client to acquire a message of an index designated by the client among N messages held by the server where N is an integer of two or more. The server includes a classification unit configured to classify the N messages into M classified messages by contents of the messages; a message encryption unit configured to encrypt each of the M classified messages; a message provision unit configured to provide the M encrypted classified messages to the client; and a key sending unit configured to send the client, by oblivious transfer, a message key for decrypting the classified message corresponding to the message of the index designated by the client. | 2013-06-20 |
20130159697 | DISTRIBUTING DATA TO MULTIPLE CLIENTS FROM SERVER - Provided are techniques for distributing data in a trackable manner while suppressing an increase in the size of data to be distributed as much as possible and minimizing interruption of usage of the data. A method for distributing data to multiple clients from a server includes the steps of: generating a common noise by using noises unique to the multiple clients, respectively; embedding the common noise in the data to be distributed to make the data unusable; and distributing the data containing the embedded common noise, so that the data containing the embedded common noise is made usable by each of the multiple clients using a unique noise generated in the client. | 2013-06-20 |
20130159698 | CHAOTIC CRYPTOGRAPHY FOR OFDM BASED COMMUNICATIONS SYSTEMS - A chaotic cryptographic technique for orthogonal frequency division multiplexing (OFDM) based wireless/wired communication systems is implemented with an OFDM symbol structure based on symmetric key cryptography. At the receiver side, data detection becomes infeasible without knowledge of the secret key. Without the knowledge of the key, the signal will be a noise-like signal. The computational power required to implement the technique is very low, rendering the system an attractive option for high data rate communications based on OFDM technology. The system security is proportional to (L×N)! where N is the number of subcarriers in the OFDM system and L is the number of OFDM symbols involved in the encryption process. For OFDM applications where ≧256, L may be set to 1 and breaking the system would require N! exhaustive-search trials. In the case that N<256, L may be increased. | 2013-06-20 |
20130159699 | Password Recovery Service - According to aspects of the present invention there are provided methods and apparatus for enabling a user to secure and back-up an encryption key for use by a client device in encrypting and decrypting data, enabling the user to change a user secret previously used to secure the encryption key, and enabling a server to update the user secret with a new user secret for securing a previous user encrypted key. The new user encrypted key can be used by the client device for encrypting and decrypting data, including data encrypted and decrypted using the previous user encrypted key. The methods for enabling a user to secure and back-up the encryption key and enabling a user to change the user secret may be performed on the client device or a trusted third party or service provider device. The method for updating the user secret with a new user secret may be performed on a service operator server or system. | 2013-06-20 |
20130159700 | COMPUTER SYSTEM AND VOLUME MIGRATION CONTROL METHOD USING THE SAME - A computer system regarding which there is no possibility that data loss or data leakage will occur caused by volume migration is provided. | 2013-06-20 |
20130159701 | SECURING DIGITAL CONTENT SYSTEM AND METHOD - A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like. | 2013-06-20 |
20130159702 | COMBINED DIGITAL CERTIFICATE - A system can comprise a memory to store computer readable instructions and a processing unit to access the memory and to execute the computer readable instructions. The computer readable instructions can comprise a certificate manager configured to request generation of N number of random values, where N is an integer greater than or equal to one. The certificate manager can also be configured to request a digital certificate from at least one certificate authority of at least two different certificate authorities. The request can include a given one of the N number of random values. The certificate manager can also be configured to generate a private key of a public-private key pair, wherein the private key is generated based on a private key of each of the least two certificate authorities. | 2013-06-20 |
20130159703 | UTILIZING A STAPLING TECHNIQUE WITH A SERVER-BASED CERTIFICATE VALIDATION PROTOCOL TO REDUCE OVERHEAD FOR MOBILE COMMUNICATION DEVICES - A certificate issuer ( | 2013-06-20 |
20130159704 | SYSTEM AND METHOD OF ENFORCING A COMPUTER POLICY - A method and system of enforcing a computer policy uses a central server to manage user profiles, policies and encryption keys. The server securely supplies the keys to client devices only after checking that the policy has been complied with. The checks include both the identity of the user and the machine identity of the client device. The keys are held in a secure environment of the client device, for example in a Trusted Platform Module (TPM), and remain inaccessible at all times to the end user. Theft or loss of a portable client device does not result in any encrypted data being compromised since the keys needed to decrypt that data are not extractable from the secure environment. | 2013-06-20 |
20130159705 | SECURITY SYSTEM FOR HANDHELD WIRELESS DEVICES USING TIME-VARIABLE ENCRYPTION KEYS - In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as PDA, smartphone, cellular telephone or the like, characterized by a relatively robust data processing capability and a body mounted key generating component which is adapted to be mounted on an individual's body, in a permanent or semi-permanent manner, for wirelessly broadcasting, within the immediate proximity of the individual, a secret or private key identifying signal corresponding to a time variable secure key information under the control of the certification authority. The key identifying signal is generated in a format that facilitates secure wireless communication with the individual in accordance with a predetermined encryption algorithm including a PKI encryption algorithm. The disclosed system may be used with a console for coordinating access to a variety of different communication system and networks. | 2013-06-20 |
20130159706 | SECRET COMMUNICATION METHOD AND SYSTEM BETWEEN NEIGHBORING USER TERMINALS, TERMINAL, SWITCHING EQUIPMENT - The present invention provides a secret communication method, apparatus and system. The method comprises: 1) determining a neighboring encryption switching equipment shared by a first user terminal and a second user terminal, wherein the first user terminal and the second user terminal are neighboring user terminals ( | 2013-06-20 |
20130159707 | Host Device and Method for Super-Distribution of Content Protected with a Localized Content Encryption Key - In one embodiment, a host device creates a super-distribution token by encrypting a content encryption key with a super-distribution key and stores the super-distribution token and encrypted content retrieved from a source storage device in a target storage device. In another embodiment, a host device provides a super-distribution token to a server, wherein the server is configured to generate an activation token from the super-distribution token, receive the activation token from the server, retrieve a content encryption key from the activation token, and decrypt encrypted content received from a storage device using the content encryption key retrieved from the activation token. | 2013-06-20 |
20130159708 | SYSTEM AND METHOD FOR THE PROVISION OF MULTIMEDIA MATERIALS - A method for enabling the storage, distribution, and use of associated text and media files comprises a webpage interface coupled to an information and support system, an account creation and login system, a user media storage system, a solicitation assistance and user matching system, a solicitation and collaboration agreement system, a media collaboration and project creation system, and a product gallery and sales system. Means are provided for a user to gain access to the inventive systems through an Internet connection on a local user computing device. In accordance with the invention, information is input into a database storage medium coupled to an operator system computing device which then combines the information into an augmented text-media file output. The inventive systems also distribute augmented text-media file output products to users of the inventive systems through a webpage interface system. | 2013-06-20 |
20130159709 | SESSION COMPLETION THROUGH CO-BROWSING - A method, system and computer program product for session completion through co-browsing is claimed. The method can include establishing a content browsing session between a first computing device and a content server serving access to content to the first computing device and maintaining state data for the content browsing session. A co-browsing arrangement of the content can be created as between the first computing device and a second computing device and at least a subset of the state data can be cloned for use by the second computing device during co-browsing of the content. Thereafter, a modified form of the subset of the state data can be received from the second computing device resulting from the co-browsing of the content by the second computing device and the modified form of the subset of the state data can be provided to the first computing device for use during the content browsing session. | 2013-06-20 |
20130159710 | SYSTEM AND METHOD FOR KEY MANAGEMENT FOR ISSUER SECURITY DOMAIN USING GLOBAL PLATFORM SPECIFICATIONS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key management for Issuer Security Domain (ISD) using GlobalPlatform Specifications. A client receives from a server an authorization to update a first ISD keyset. The client encrypts, via a client-side secure element, a second ISD keyset with a server public key. The client sends the encrypted second ISD keyset to the server for updating the first ISD keyset with the encrypted second ISD keyset. Prior to updating, the client generates the first ISD keyset at a vendor and sends the first ISD keyset to the client-side secure element and sends the first ISD keyset encrypted with the server public key to the server. The disclosed method allows for updating of an ISD keyset of which only the client-side secure element and a server have knowledge. | 2013-06-20 |
20130159711 | Communication System and Method - Data can be transmitted from a user terminal to a decryption component over a network in a limited connectivity environment At the user terminal, the data can be received from a user. If it is determined that the data is sensitive data, the data is encrypted using a secure encryption key. A packet is generated based on a tunneling protocol. The packet includes command data and encrypted sensitive data. The command data includes an address of a network component, command and command identifier. The command identifies that the secure encryption key has been used to encrypt the sensitive data. At the network component identified in the address, the packet is received at a first port; the command is read; the packet is forwarded via a second port to the decryption component for decryption; and a response packet is forwarded, including a response and the command identifier, to the user terminal. | 2013-06-20 |
20130159712 | SYSTEM AND METHOD FOR VERIFYING AND MANAGING DISTRIBUTION OF PRODUCTS - A system and method for verifying, validating and otherwise managing distribution of products and medicines reduces the instances of counterfeit medicines. A pharmaceutical company typically provides medicines/products to users either directly or through representatives for the pharmaceutical company. The products have associated identifying or authentication codes that are used to authenticate the validity of the medicine/product. The system encrypts and decrypts code data employing appropriate client- and server-based applications to securely manage and print the authenticating code data. A covert identification technique, such as a special ink or material can provide an additional level of security in authenticating the medicine to ensure it is not counterfeit. The special ink or material can be tested locally by the user or sent to a remote location for testing to ensure accuracy of the medicine/product. | 2013-06-20 |
20130159713 | AUTHENTICATION METHOD - An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number. | 2013-06-20 |
20130159714 | MEASUREMENT PROBE SYSTEMS FOR CO-ORDINATE POSITIONING APPARATUS - A measurement probe, such as a touch trigger measurement probe, is described that comprises a measurement portion for measuring an object and a data transfer portion for receiving data from and/or transmitting data to an associated unit. The measurement device also comprises an authentication module for verifying the authenticity of the associated unit. The authentication module may include a processor for running a one-way hash algorithm. Authenticity may be established using a challenge and response authentication process. | 2013-06-20 |
20130159715 | Secure Peer-to-Peer Messaging Invitation Architecture - First and second communication devices respectively have first and second personal identification numbers (PINs). The first communication device transmits to the second communication device a first encryption key, and receives from the second communication device the second PIN that has been encrypted by the second communication device using the first encryption key. The first communication device receives from the second communication device a second encryption key, decrypts the encrypted second PIN, and encrypts the first PIN using the second encryption key, and transmits the encrypted first PIN to the second communication device. The first communication device conducts, with the second communication, device a peer-to-peer messaging session by transmitting to the second communication device peer-to-peer messages that contain the second PIN and receiving from the second communication device peer-to-peer messages that contain the first PIN. Each message is routed by a routing server based on the respective first and second PINs. | 2013-06-20 |
20130159716 | METHOD FOR PERSONALIZING AN AUTHENTICATION TOKEN - An authentication token using a smart card that an organisation would issue to its customer, the smart card having a processor for executing a software application that is responsive to a user input to generate a one-time password as an output. The smart card co-operates with an interface device for inputting the user input and displaying the one-time password. The authentication token may be used in combination with a remote authentication server for validation of the password and hence authentication of the user. | 2013-06-20 |
20130159717 | METHOD AND APPARATUS FOR SECURE FIRMWARE DOWNLOAD USING DIAGNOSTIC LINK CONNECTOR (DLC) AND ONSTAR SYSTEM - A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first trusted source and signing the firmware or a second part of the firmware with a second private key at a second trusted source. The method also includes validating the signed firmware or the first part of the firmware using a first public key at the controller and validating the firmware or the second part of the firmware using a second public key at the controller. The method further includes authenticating the firmware if the firmware or the first part of the firmware is validated by the first public key at the controller and the firmware or the second part of the firmware is validated by the second public key at the controller. | 2013-06-20 |
20130159718 | UPDATING SIGNATURE ALGORITHMS FOR STRONG NAME BINDING - The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair. | 2013-06-20 |
20130159719 | APPARATUS AND METHOD FOR SIGNING APPLICATION - When a signature apparatus cooperating with a market server receives signature request information for an optional application from the market server to sign an application, the signature apparatus determines whether an authentication note has been issued corresponding to application identification information included in the signature request information based on the application identification information. When the authentication note has not been issued; the signature apparatus issues the authentication note using the application identification information, generates signature information for the to application using the application identification information, and signs the application including the authentication note and the signature information. | 2013-06-20 |
20130159720 | MOBILE SOLUTION FOR SIGNING AND RETAINING THIRD-PARTY DOCUMENTS - Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives an electronic signature document on a mobile device, the signer may use a client module executing on the mobile device to import the document into the ESS. Once the document is imported into the ESS, the signer can access, review, and sign the document at the ESS via the mobile device. After signing the document, the signer can use the mobile device to cause the ESS to provide the signed document to one or more recipients. | 2013-06-20 |
20130159721 | APPARATUS AND METHOD FOR SIGNATURE VERIFICATION - A receiver comprises a security processor and a first memory that stores software code or second stage authentication key and a signature for the software or the second stage key. The receiver also stores a plurality of verification keys (PUAK). When the receiver is switched on or reset, the software or second stage key and the signature are loaded from the first memory. The security processor then loads a PUAK and uses it to verify the signature. In case of successful verification, the software code or second stage key is used and the verification method ends; it is then possible to activate CA specific functions in the receiver. However, if the verification is unsuccessful, then it is verified if there are untried PUAKs. If there are no untried signatures, then the verification has failed and the software cannot be verified; the verification method ends. If there are untried signatures, then the next PUAK is loaded. | 2013-06-20 |
20130159722 | ACTIVE SENSING FOR DYNAMIC SPECTRUM ACCESS - Various communication systems may benefit from physical layer watermarking. For example, active sensing for dynamic spectrum access may be performed using physical layer watermarking, such as watermarking based on channel effects and/or receiver distortion. A method may include, for example, obtaining an original signal to be transmitted to at least one receiver. The method may also include watermarking the original signal with at least one of authentication data or ancillary data to provide an enhanced signal. The watermarking can include a physical layer watermark. The physical layer watermark can be configured to emulate at least one a channel effect or a receiver distortion. The method can further include transmitting the enhanced signal to the at least one receiver. | 2013-06-20 |
20130159723 | METHODS, APPARATUS AND SYSTEMS FOR MONITORING LOCATIONS OF DATA WITHIN A NETWORK SERVICE - In one embodiment, a data set is received at a network service element of a network service, a location record for that data set is generated, and the location record is sent to a location registry within the network service to monitored locations of that data set within a network service. The network service element is operatively coupled to a communications link. The location record is generated based on a portion of the data set and a cryptographic key associated with the network service element. The location record uniquely identifies the presence of the data set at the network service element. | 2013-06-20 |
20130159724 | Method And Apparatus For A Scalable And Secure Transport Protocol For Sensor Data Collection - A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids keeping security and communication state per client through the notion of a secure “state-token”. The state token is issued with each server message and is subsequently attached to corresponding client messages delivered to the server. An implementation is provided in which the server encrypts and authenticates the associated session state, and then gives the resulting encryption for the client to temporarily store and return to the server with a next message. In this way, a server does not keep session state after sending the encryption back to a client and can quickly restore session state when the next message from the client arrives. | 2013-06-20 |
20130159725 | FPGA APPARATUS AND METHOD FOR PROTECTING BITSTREAM - An FPGA apparatus and a method for protecting bitstreams are provided. The FPGA apparatus includes: a key storage unit, which is configured to be accessed only from within the FPGA, and having stored therein the encryption/decryption key and the initial key generated by the random number generator; a setting bitstream storage unit, which is an internal non-volatile memory stored with bitstreams for setting authentication and encryption/decryption; and an authentication and encryption/decryption setting unit, which is configured to call the encryption and decryption key and the initial value stored in the key storage unit to store encrypted bitstreams and authentication codes generated as a result of performing encryption on the bitstreams stored in the setting bitstream storage unit in external non-volatile memory, and verity the integrity of the encrypted bitstreams stored in the external non-volatile memory at the time of designing of the FPGA using the encrypted bitstreams. | 2013-06-20 |
20130159726 | METHOD AND APPARATUS TO PROVIDE SECURE APPLICATION EXECUTION - A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed. | 2013-06-20 |
20130159727 | SECURE REPLAY PROTECTED STORAGE - Embodiments of the invention create an underlying infrastructure in a flash memory device (e.g., a serial peripheral interface (SPI) flash memory device) such that it may be protected against user attacks—e.g., replacing the SPI flash memory device or a man-in-the-middle (MITM) attack to modify the SPI flash memory contents on the fly. In the prior art, monotonic counters cannot be stored in SPI flash memory devices because said devices do not provide replay protection for the counters. A user may also remove the flash memory device and reprogram it. Host platforms alone cannot protect against such hardware attacks. | 2013-06-20 |
20130159728 | SYSTEM AND METHOD THAT USES CRYPTOGRAPHIC CERTIFICATES TO DEFINE GROUPS OF ENTITIES - A system and method for issuing a cryptographic certificate comprises describing one or more prerequisite condition on the cryptographic certificate. The one or more prerequisite conditions comprise membership in one or more prerequisite group of entities. An entity may be a participant, a resource or a privilege, etc. One or more target groups of entities may be named on the cryptographic certificate. One or more prerequisite group stakeholder that authorizes an entity in the one or more prerequisite group of entities to be added as members in another group of entities sign the cryptographic certificate. The cryptographic certificate may also be signed by one or more target group stakeholders that authorizes an entity to be added as a member of the one or more target groups. Exemplary prerequisite conditions relate to one or more of a membership in another group of entities, a physical characteristic, a temporal characteristic, a location characteristic or a position characteristic, among others. | 2013-06-20 |
20130159729 | SOFTWARE-BASED TRUSTED PLATFORM MODULE - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices. | 2013-06-20 |
20130159730 | ATTRIBUTE-BASED DIGITAL SIGNATURES - An attribute-based digital signature system is disclosed. A first signature generating unit ( | 2013-06-20 |
20130159731 | ENCRYPTED DATABASE SYSTEM, CLIENT TERMINAL, ENCRYPTED DATABASE SERVER, NATURAL JOINING METHOD, AND PROGRAM - A client terminal is provided with: a column encryption unit that, from an encryption key, a table identifier, and a column identifier, generates a column private key, a column public key, and a comparison value, from which the unit generates a concealed comparison value and a ciphertext, thus encryption a particular column; and an encrypted table natural joining request unit that issues a natural joining request text that requests natural joining related to the column encrypted from the encryption key, table identifier, and column identifier. The natural joining request text contains as a table joining key the column public key and column private key that were generated by the encryption key from the table identifier of a first and second tables and the column identifier of the a-th column and b-th column. Then, an encrypted database server executes natural joining using the table joining key, and returns the result. | 2013-06-20 |
20130159732 | PASSWORD-LESS SECURITY AND PROTECTION OF ONLINE DIGITAL ASSETS - Digital assets stored on an asset server by an asset owner are protected without a password. Instead, the digital assets are functionally handicapped by removing at least a portion of digital data (or a key) associated with the digital asset and discarding the key after being sent to an enabling device. The portion of digital data (or a key) is then handicapped by the enabling device by a cryptographic key which is formed from a human gesture and subsequently discarded. When access to the digital asset is requested, an asset owner is notified by the enabling device for approval. A human gesture from the asset owner first provides a key to reconstitute the digital data portion which is transmitted to the asset server to reconstitute the digital asset upon which the access is granted and logged. | 2013-06-20 |
20130159733 | MEMORY DEVICE WHICH PROTECTS SECURE DATA, METHOD OF OPERATING THE MEMORY DEVICE, AND METHOD OF GENERATING AUTHENTICATION INFORMATION - In one embodiment, the memory device includes a first memory area and a second memory area. The first memory area stores secure data. The first memory area is inaccessible by an external device. The second memory area is configured to store encrypted secure data. The second memory area is accessible by the external device, and the encrypted secure data is an encrypted version of the secure data in the first memory area. | 2013-06-20 |
20130159734 | Power Management Methods for System on a Chip - Methods for reducing power consumption of a system on a chip (SOC) are disclosed. The system comprises multiple subsystems. Each of the subsystems comprises a first voltage regulator and a second voltage regulator that may be placed closely on a layout. The first voltage regulator is coupled to at least one performance sensor. A controller initiates a power optimization program that determines minimal output voltage of the first voltage regulator for achieving minimal acceptable performances of the performance sensors. Determined output voltage is duplicated to a second voltage regulator to supply power for system components of the subsystem. | 2013-06-20 |
20130159735 | POWER MANAGEMENT SYSTEM AND METHOD - A power management system of a server includes a power supply unit, and a power backup unit connecting to an input terminal and an output terminal of the power supply unit. The power backup unit further includes a charging unit, a power storage unit, and a converting unit. The charging unit uses an output power from the output terminal to charge the power storage unit when an external power source is supplying power to the power supply unit. The converting unit converts a stored power of the power storage unit to provide a backup power to the input terminal when the external power source is shutdown. The disclosure further provides a power management method. | 2013-06-20 |
20130159736 | ELECTRONIC APPARATUS WITH LOW POWER CONSUMPTION, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - An electronic apparatus in which an AC power source and a secondary battery are used in combination and which is capable of reducing power consumption. Among plural apparatuses that constitute an image processing apparatus serving as an electronic apparatus, part of the plural apparatuses can be supplied with power from a secondary battery. In a case where power use efficiency attained when required power for all apparatuses to be operated, among the part of the plural apparatuses, is supplied from the secondary battery is higher than conversion efficiency of an AC power unit attained when the required power is supplied from the AC power unit, FETs are controlled such that power is supplied from the secondary battery to the apparatuses to be operated. | 2013-06-20 |
20130159737 | Universal Serial Bus Current Limit - A load device includes a power input having an interface to a power supply; a peripheral power bus including an internal capacitance, and an active switch coupled to the power input and the peripheral power bus for applying power from the power input to the peripheral power bus. The load device also includes a switch controller coupled to the active switch for regulating the in-rush current drawn by the internal capacitance through the active switch while the internal capacitance is being charged. | 2013-06-20 |
20130159738 | SYSTEM AND METHOD FOR USING A NETWORK TO CONTROL A POWER MANAGEMENT SYSTEM - Some embodiments relate to a method of using a network to control a power management system. The method includes using the network to access a generator controller that is part of the power management system. The method further includes using the network to exchange communications with the generator controller in order permit the generator controller to control other electronic components that are part of the power management system. | 2013-06-20 |
20130159739 | Power Controller, Processor and Method of Power Management - A processor includes a plurality of exclusive resources, a shared resource, and a controller configured to manage power state transitions of each of the plurality of exclusive resources and the shared resource. The controller receives a request from a resource to transition from a first power state to a lower power state and, in response to receiving the request, the controller controls power state transitions of the resource according to a first power control threshold when the resource is one of the plurality of exclusive resources and according to a second power control threshold that is greater than the first power control threshold when the resource is the shared resource. | 2013-06-20 |
20130159740 | ELECTRONIC DEVICE AND METHOD FOR ENERGY EFFICIENT STATUS DETERMINATION - The invention relates to an electronic device and a method for event handling in an electronic device comprising a bus master and a memory for storing a software program. A status of a software and/or hardware module is polled in a polling loop. | 2013-06-20 |
20130159741 | Method, Apparatus, and System for Energy Efficiency and Energy Conservation Including Power and Performance Balancing Between Multiple Processing Elements and/or a Communication Bus - An apparatus, method and system is described herein for efficiently balancing performance and power between processing elements based on measured workloads. If a workload of a processing element indicates that it is a bottleneck, then its performance may be increased. However, if a platform or integrated circuit including the processing element is already operating at a power or thermal limit, the increase in performance is counterbalanced by a reduction or cap in another processing elements performance to maintain compliance with the power or thermal limit. As a result, bottlenecks are identified and alleviated by balancing power allocation, even when multiple processing elements are operating at a power or thermal limit. | 2013-06-20 |
20130159742 | Method, System, and Apparatus for Dynamic Thermal Management - A method, apparatus, article of manufacture, and system, the method including, in some embodiments, processing a computational load by a first core of a multi-core processor, and dynamically distributing at least a portion of the computational load to a second core of the multi-core processor to reduce a power density of the multi-core processor for the processing of the computational load. | 2013-06-20 |
20130159743 | IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR AND STORAGE MEDIUM - A second control unit in an image processing apparatus receives a packet transmitted from an external apparatus, copies and stores the received packet, analyzes the header of the received packet, deletes the analyzed header, and, when transitioning the image processing apparatus from a second power mode to a first power mode based on the result of analysis in the case where the image processing apparatus is in the second power mode, transitions the image processing apparatus from the second power mode to the first power mode, and transfers to the first control unit the received packet that was stored and does not transfer to the first control unit the received packet from which the header was deleted. | 2013-06-20 |
20130159744 | ADAPTIVE RECOVERY FOR PARALLEL REACTIVE POWER THROTTLING - Power throttling may be used to conserve power and reduce heat in a parallel computing environment. Compute nodes in the parallel computing environment may be organized into groups based on, for example, whether they execute tasks of the same job or receive power from the same converter. Once one of compute nodes in the group detects that a parameter (i.e., temperature, current, power consumption, etc.) has exceeded a first threshold, power throttling on all the nodes in the group may be activated. However, before deactivating power throttling, a plurality of parameters associated with the group of compute nodes may be monitored to ensure they are all below a second threshold. If so, the power throttling for all of the compute nodes is deactivated. | 2013-06-20 |
20130159745 | OPTIMIZING POWER CONSUMPTION AND PERFORMANCE IN A HYBRID COMPUTER ENVIRONMENT - A method for optimizing efficiency and power consumption in a hybrid computer system is disclosed. The hybrid computer system may comprise one or more front-end nodes connected to a multi-node computer system. Portions of an application may be offloaded from the front-end nodes to the multi-node computer system. By building historical profiles of the applications running on the multi-node computer system, the system can analyze the trade offs between power consumption and performance. For example, if running the application on the multi-node computer system cuts the run time by 5% but increases power consumption by 20% it may be more advantageous to simply run the entire application on the front-end. | 2013-06-20 |
20130159746 | DATA PROCESSING DEVICE AND DATA PROCESSING SYSTEM - A step down unit steps down an external power supply voltage Vcc. A bias current control circuit controls the magnitude of bias current flowing through an auxiliary path connecting an output node and the ground. A system controller increases the magnitude of the bias current, prior to a change of the operation state of a load circuit by which a relatively large change occurs to the amount of current consumed by the load circuit including a central processing unit. | 2013-06-20 |
20130159747 | DATA PROCESSING APPARATUS AND METHOD FOR MAINTAINING A TIME COUNT VALUE - A counting circuit for a data processing apparatus has a normal mode in which a main counter increments the time count value in response to edges of a main clock signal, and a power saving mode in which the main clock signal is disabled and a further clock counter counts elapsed edges of a further clock signal having a lower frequency than the main clock signal. On switching to power saving mode, a reference time count value of the main counter is captured at a timing triggered by an edge of the further clock signal. On switching back to normal mode, an expected time count value from the main counter is calculated based on the captured reference value and the counted number of elapsed edges during the power saving mode, and the main counter is restarted at a timing triggered by another edge of the further clock signal. | 2013-06-20 |
20130159748 | Energy-Efficient Polling Loop - Logic is provided for increasing energy-efficiency of a data processing system. First logic continuously checks a plurality of I/O ports for incoming workload. Responsive to the incoming workload being lower than a low workload threshold for a current operating frequency, second logic reduces an operating frequency of the processor. Responsive to the incoming workload being higher than a high workload threshold, the second logic increases the operating frequency of the processor. | 2013-06-20 |
20130159749 | POWER CONSERVATION TECHNIQUES FOR USE IN DEVICES WITH SELECTABLE POWER MODES - Techniques are provided which may be implemented in various methods, apparatuses, and/or articles of manufacture for use in and/or with an electronic device that is operable in a plurality of selectable power modes, including at least a “higher power mode” and a “lower power mode”. In an example implementation, with an electronic device operating in a higher power mode may selectively transition to a lower power mode based, at least in part, on at least phase value obtained from a signal acquired from a ground-based transmitter. Further techniques are provided which may be implemented to allow electronic device to selectively transition from a lower power mode to one or more other selectable power modes, e.g., including various “medium power modes”, and various “higher power modes”. | 2013-06-20 |
20130159750 | METHOD AND APPARATUS FOR TRANSITIONING A SYSTEM TO AN ACTIVE DISCONNECT STATE - A processor includes a processor core and a power management controller operable to receive a timer event, store the timer event, generate a hardware system sleep command to enter a hardware system sleep state, and restore the timer event upon exiting from the hardware system sleep state. | 2013-06-20 |
20130159751 | INSTALLATION OR DEVICE WITH A HIGH-DEFINITION MULTIMEDIA INTERFACE - The Installation is equipped with a power supply unit and a High-Definition Multimedia Interface (HDMI), this installation being able to be connected to a second HDMI device with which it can communicate by using a protocol defined in the HDMI Standard, this installation or device being able to be set in Standby or Power-down mode and to be removed from this Standby or Power-down mode by said second HDMI device via a Consumer Electronic Control (CEC) line. The installation has a Power Management Unit (PMU) arranged on the primary side of said power supply unit, this PMU having its own power supply circuit directly connected to the power supply source of this installation or device and being arranged for switching OFF the electrical energy on the secondary side of said power supply unit when this installation or device enters said Standby or Power-down mode. | 2013-06-20 |
20130159752 | LOW POWER PAGING OF CONSUMER ELECTRONICS - Systems, apparatuses, and methods are configured to monitor signals received via a transmission medium by a paging monitor to detect an activity trigger. Systems, apparatuses, and methods are further configured to, in response to detecting the activity trigger, cause, by the paging monitor, a main receiver to transition from an energy conservation mode to an active mode to monitor the transmission medium for data traffic. | 2013-06-20 |
20130159753 | APPARATUS, SYSTEMS AND METHODS FOR MODIFYING OPERATING STATES BASED ON MONITORED HDMI CEC COMMUNICATIONS - Systems and methods provide control of operating states of an electronic device. A first exemplary electronic device detects a consumer electronic control (CEC) communication sent from a second electronic device to a third electronic device, the CEC communication communicated over high-definition multimedia (HDMI) connectors communicatively coupling the first electronic device, the second electronic device and the third electronic device; determines, based on information in the CEC communication, whether the CEC communication is one of a first kind of CEC communication or a second kind of CEC communication; in response to determining that the CEC communication is one of the first kind of CEC communication, transitions the first electronic device to a predefined operating state; and in response to determining that the CEC communication is one of the second kind of CEC communication, maintains the first electronic device in a current operating state. | 2013-06-20 |
20130159754 | APPARATUS FOR POWERING AN ELECTRICAL CONSUMER VIA A DATA CONNECTION - The invention relates to an apparatus ( | 2013-06-20 |
20130159755 | APPARATUS AND METHOD FOR MANAGING POWER ON A SHARED THERMAL PLATFORM FOR A MULTI-PROCESSOR SYSTEM - A method and apparatus includes a multi-processor apparatus including a plurality of integrated circuit processors having a shared thermal platform. Each processor has at least one subsystem operable at a plurality of different power settings, at least one internal thermal parameter detector providing power data related to the processor, and a power management unit. The method and apparatus illustratively shares power data from the at least one internal thermal parameter detector of each processor between the power management units of the plurality of processors; compares the shared power data from the plurality of processors to a thermal design power limit for the shared thermal platform; and controls a power setting of the at least one subsystem of the plurality of processors within the shared thermal platform based on the comparison of the shared power data to the thermal design power limit for the shared thermal platform. | 2013-06-20 |
20130159756 | Methods And Systems For Blind Analysis of Resource Consumption - Methods and systems for analyzing gross resource consumption data to determine resource consumption of individual devices are disclosed. In some embodiments, the methods and methods include the following: obtaining a first data that includes a time series of a gross resource consumption for a location; using blind signal separation techniques, identifying power-on and power-off events within the first data, the events being caused by turning particular devices at the location on and off during the time series and each of the events reflecting a power consumption signature for each of the particular devices; associating each of the events with a known device, the known device being substantially similar to one of the particular devices at the location; and determining a portion of the gross resource consumption consumed by each of the particular devices. | 2013-06-20 |
20130159757 | MEMORY ARRAY CLOCK GATING SCHEME - Dynamic power consumption is reduced by clock gating registers that synchronize memory input signals in an embedded memory array. Where a memory enable signal associated with a memory interface input signal does not meet setup timing for clock gating input registers of the memory interface signal, a clock gate enable signal may be generated prior to evaluation of the memory enable signal. The clock gate enable signal includes all functions of the memory enable signal and additional conditions because it is generated prior to evaluation of conditions on which the memory enable signal may depend. Pre-evaluated clock gate enable signals may be generated within a processor core and used to clock gate read address registers, write address registers, data input registers, and/or CAM reference address registers of an embedded memory array. | 2013-06-20 |
20130159758 | SYNCHRONIZING COMPUTE NODE TIME BASES IN A PARALLEL COMPUTER - Synchronizing time bases in a parallel computer that includes compute nodes organized for data communications in a tree network, where one compute node is designated as a root, and, for each compute node: calculating data transmission latency from the root to the compute node; configuring a thread as a pulse waiter; initializing a wakeup unit; and performing a local barrier operation; upon each node completing the local barrier operation, entering, by all compute nodes, a global barrier operation; upon all nodes entering the global barrier operation, sending, to all the compute nodes, a pulse signal; and for each compute node upon receiving the pulse signal: waking, by the wakeup unit, the pulse waiter; setting a time base for the compute node equal to the data transmission latency between the root node and the compute node; and exiting the global barrier operation. | 2013-06-20 |
20130159759 | Signal Conditioning By Combining Precursor, Main, and Post Cursor Signals Without A Clock Signal - Embodiments of an apparatus for signal conditioning, a serial data interface, and a method for a programmable delay filter are disclosed. In an embodiment of an apparatus for signal conditioning, a wave shaping circuit has a precursor signal, a post cursor signal, and a main signal combined to provide an output signal. The precursor signal, the post cursor signal, and the main signal are provided for combination independently of a clock signal. The main signal is delayed relative to the precursor signal, and the post cursor signal is delayed relative to the main signal. | 2013-06-20 |
20130159760 | Synchronizing Compute Node Time Bases In A Parallel Computer - Synchronizing time bases in a parallel computer that includes compute nodes organized for data communications in a tree network, where one compute node is designated as a root, and, for each compute node: calculating data transmission latency from the root to the compute node; configuring a thread as a pulse waiter; initializing a wakeup unit; and performing a local barrier operation; upon each node completing the local barrier operation, entering, by all compute nodes, a global barrier operation; upon all nodes entering the global barrier operation, sending, to all the compute nodes, a pulse signal; and for each compute node upon receiving the pulse signal: waking, by the wakeup unit, the pulse waiter; setting a time base for the compute node equal to the data transmission latency between the root node and the compute node; and exiting the global barrier operation. | 2013-06-20 |
20130159761 | Parallel Data Communications Mechanism Having Reduced Power Continuously Calibrated Lines - A communications link includes multiple continuously calibrated parallel lines, wherein one or more lines are at least partially powered down while being continuously calibrated to reduce power consumption. In one aspect, at least N+1 lines (where N is the logical bus width) are periodically recalibrated, and at least one redundant line is powered down between calibrations. The redundant line could be either a true spare available for use as a replacement, or an extra line which carries functional data while other lines are being calibrated in turn. In another aspect, the logical bus width is variable, but does not exceed N | 2013-06-20 |
20130159762 | CONTAINER SYSTEM AND MONITORING METHOD FOR CONTAINER SYSTEM - A container system and a monitoring method for the container system are provided. The container system includes a plurality of servers and a master server node. The servers are arranged in N areas. The master server node is coupled to the servers. The master server node selects one of a plurality of servers in an i | 2013-06-20 |
20130159763 | Dynamic Allocation of Network Security Credentials For Alert Notification Recipients - Methods, apparatuses, and computer program products for dynamic allocation of network security credentials for alert notification recipients are provided. Embodiments include receiving from a managed system, by an alert management system, an alert indicating one of a failure in the managed system and a pending failure in the managed system; selecting, by the alert management system, a remote device from a plurality of remote devices registered for remote access with the alert management system; preapproving, by the alert management system, network security clearance of the selected remote device, the network security clearance for remote access to the management system via a virtual private network (VPN) interface; and transmitting to the selected remote device, by the alert management system, an alert notification that includes an internet address corresponding to the VPN interface. | 2013-06-20 |
20130159764 | PCI Express Error Handling and Recovery Action Controls - An apparatus and method of PCIe error handling and recovery actions taken in the event of an error. An error reporting extension defines a set of commonly used actions that are taken by a device in response to the detection of an error. This minimizes the side effects of continued device operation following the occurrence of an error. The device's error handling capabilities are advertised and the system software specifies the desired device action to take upon occurrence of a particular error. The particular error handling action is defined uniquely for each PCIe function and error type, such that different errors trigger a different type of action, thereby affecting only specific device functions or the entire device, depending on the configuration. Error handling actions and control fields are placed in the extension portion of the PCI Express Advanced Error Reporting configuration space. | 2013-06-20 |
20130159765 | STORAGE SUBSYSTEM AND METHOD FOR RECOVERING DATA IN STORAGE SUBSYSTEM - When a double failure occurs in a storage device storing a mutual conversion table such as a track management information table in thin provisioning, the storage address of the track within the storage subsystem cannot be specified and user data is lost. In order to solve the problem, the present invention provides a storage subsystem capable of recovering data by referring to a track address stored in an accessible track management information table or a user data section, renewing the damaged track management information table to restore the corresponding relationship between track management information tables, and enabling the user data to be accessed again. | 2013-06-20 |
20130159766 | WEAR LEVELING OF MEMORY DEVICES - A method of managing wear leveling in a data storage device includes determining whether a reliability measurement associated with a first portion of a first nonvolatile memory die satisfies a threshold. The first nonvolatile memory die is included in a plurality of memory dies. The method includes, in response to determining that the reliability measurement associated with the first portion of the first nonvolatile memory die satisfies the threshold, transferring first data from the first portion of the first nonvolatile memory die to a second nonvolatile memory die of the plurality of memory dies. | 2013-06-20 |
20130159767 | CLIENT SELECTABLE SERVER-SIDE ERROR RESOLUTION - An illustrative embodiment of a computer-implemented process for client selectable server-side data error resolutions receives a request from a client to perform an action on a server, identifies a data error during performance of the action of the request and generates a response including an error description and a resolution subset for the identified error. The computer-implemented process further sends a response to the client, receives a selected resolution returned from the client, and responsive to a determination the selected resolution associated with the token returned executes on the server, executes the selected resolution, associated with the token returned, on the server to correct the data error. | 2013-06-20 |
20130159768 | SYSTEM AND METHOD FOR RESTORING DATA - A method for recovering data using metadata includes the steps of: receiving, at a storage location, data from a computing application; associating, at said storage location, metadata to said data received at said storage location; and storing said data and associated metadata in said storage location; wherein said data stored in said storage location is identifiable by said computing application using said metadata, thereby to recover said data in response to a data recovery event. | 2013-06-20 |
20130159769 | RECTIFYING CORRUPT SEQUENCE VALUES IN DISTRIBUTED SYSTEMS - Embodiments of the present invention relate to detecting and rectifying corruption in a distributed clock in a distributed system. Aspects may include receiving a sequence number used as part of the distributed clock at a node and determining if the sequence number is corrupt. In order to provide an effective mechanism for determining a sequence number is corrupt and taking corrective actions, a valid sequence number range may be determined, a propagation count associated with the sequence number may be evaluated, an estimated sequence number may be calculated, and an epoch number associated with the sequence number may be evaluated. Additionally, in exemplary aspects node with a corrupt trusted sequence values may self diagnosis and terminate associated processes to prevent further propagation of the corrupt sequence number. | 2013-06-20 |
20130159770 | SYSTEM AND METHOD FOR ACQUIRING BASIC INPUT/OUTPUT SYSTEM DEBUG CODES - A system is used for acquiring Basic Input/Output System (BIOS) debug codes. The system includes a platform controller hub (PCH), a storage chip, and a baseboard management controller (BMC). The PCH reads power-on self tests (POST) codes from an address port of a bus, and converts the POST codes to binary data and stores the binary data in the storage chip. The BMC reads the binary data stored in the storage chip and defines the binary data as virtual sensor data, which conform with threshold type data, and decodes the virtual sensor data to POST codes and controls a display unit to display the POST codes. | 2013-06-20 |
20130159771 | Accelerated Processing Unit Debugging Using a Graphics Processing Unit Centric Debug Core - An Accelerated Processing Unit (APU) comprising a central processing unit (CPU) core portion and a graphics processing unit (GPU) core portion coupled to the CPU core portion. The GPU core portion includes a GPU core and a dedicated GPU debugging core, the dedicated GPU debugging core enabling performance of GPU centric debug functions. | 2013-06-20 |
20130159772 | Verifying Speculative Multithreading In An Application - Verifying speculative multithreading in an application executing in a computing system, including: executing one or more test instructions serially thereby producing a serial result, including insuring that all data dependencies among the test instructions are satisfied; executing the test instructions speculatively in a plurality of threads thereby producing a speculative result; and determining whether a speculative multithreading error exists including: comparing the serial result to the speculative result and, if the serial result does not match the speculative result, determining that a speculative multithreading error exists. | 2013-06-20 |
20130159773 | INFORMATION PROCESSING APPARATUS AND OPERATION STATUS MONITORING METHOD - An information processing apparatus includes a plurality of controller modules capable of performing communications with each other, and a memory included in each controller module to be stored with status information reflecting a status of an error occurring during the communications with other controller modules with respect to the controller module of a communication partner apparatus and/or the controller module of the self-apparatus, wherein, when determining whether or not a fault occurs in a certain controller module in the plurality of controller modules, the controller module different from a determination target controller module determines, based on status information of the determination target controller module that is stored on the memories of two or more controller modules different from the determination target controller module, whether the fault occurs in the determination target controller module. | 2013-06-20 |
20130159774 | DYNAMIC REPRIORITIZATION OF TEST CASES DURING TEST EXECUTION - Systems and methods are described that dynamically reprioritize test cases for Model-Based Testing (MBT) during test execution. Test case execution is prioritized according to their potential to detect uncovered failures within a design model. | 2013-06-20 |
20130159775 | Debug Registers for Halting Processor Cores after Reset or Power Off - A method and apparatus of stopping a functional block of an integrated circuit (IC) for debugging purposes is disclosed. In one embodiment, an IC includes a number of functional units accessible by an external debugger via a debug port (DP). During a debug operation, a power controller in the IC may power down a functional unit. When the functional unit is powered off, a first register may be programmed. Responsive to the programming of the first register, a first signal may be asserted and provided to the functional unit. When power is restored to the functional unit, operation of the functional unit may be halted prior to execution of instructions or other operations, responsive to the signal. | 2013-06-20 |
20130159776 | DATA PROCESSING APPARATUS AND METHOD FOR IDENTIFYING DEBUG EVENTS - A data processing apparatus has at least one circuit block accessible for debugging by a debugger, the block having a set of debug status registers and a debug event register which is set by the circuit block to indicate occurrence of a debug event. Debug interface circuitry interfaces with the set of debug status registers for each circuit block. The circuitry includes at least a first portion which is in a first power domain that remains in a fully powered state whilst the debugger is connected to the circuitry. Status registers are provided in a second power domain which transitions between the fully powered state and at least one low power state whilst the debugger is connected to the circuitry. Content of the debug status registers is only accessible to the debugger when the second power domain is in the fully powered state. | 2013-06-20 |
20130159777 | TESTING SYSTEM AND METHOD FOR TESTING ELECTRONIC DEVICE - A testing system for testing an under test electronic device, includes an error capturing and latching unit, a storage unit, and a control terminal. The error capturing and latching unit detects and captures running error signals of the under test electronic device. The storage unit stores the running error signals. The control terminal is connected to the storage unit. The control terminal picks out the running error signals from the storage unit and analyzes these signals. | 2013-06-20 |
20130159778 | OPERATIONS MANAGEMENT APPARATUS, OPERATIONS MANAGEMENT METHOD AND PROGRAM THEREOF - A candidate to cause a fault is identified, in case that correlation destruction is detected in some processing apparatuses or the like due to spread of the fault within a system. | 2013-06-20 |
20130159779 | FRAMEWORK FOR THE REMOTE DEBUGGING OF WEB APPLICATIONS - In one embodiment, a remote debugging infrastructure may allow a local application | 2013-06-20 |
20130159780 | CORRELATING TRACES IN A COMPUTING SYSTEM - An apparatus, processor, and method for synchronizing trace data. A processor includes multiple cores, and each core operates at a different local clock frequency. A global clock is distributed to each core, and a timestamp is generated using the global clock and the local clock. The timestamp and a local clock saturation value are included in each trace entry, and the local clock saturation value is equal to the ratio between the local clock and the global clock. The trace entries from separate cores are time-correlated in a post-processing phase based on the timestamp and local clock saturation values. | 2013-06-20 |