40th week of 2014 patent applcation highlights part 81 |
Patent application number | Title | Published |
20140297941 | NON-HOMOGENEOUS DISK ABSTRACTION FOR DATA ORIENTED APPLICATIONS - One embodiment of the system described herein facilitates a virtualized heterogeneous disk that supports differentiated storage service qualities. During operation, the system mounts a plurality of partitions of a heterogeneous disk at different mount points, each mount point corresponding to a level of quality of service (QoS). The system then receives a write command and identifies a QoS level indication associated with the write command. Subsequently, the system selects a partition on the heterogeneous disk with performance parameters matching the identified QoS level and writes data to the selected partition. The heterogeneous disk is an abstraction of a plurality of virtualized storage devices. Furthermore, the heterogeneous disk has a single block address space, and the virtualized storage devices are allowed to have differentiated performance parameters, thereby facilitating differentiated QoS levels in the heterogeneous disk. | 2014-10-02 |
20140297942 | DATA CACHE FOR A STORAGE ARRAY - Embodiments of the present disclosure provide for a storage system that includes an array of disk drives and a controller communicatively coupled to the array of disk drives. The controller includes a dual purpose cache. The controller is configured to perform maintenance operations and host input/output (I/O) operations using the dual purpose cache. | 2014-10-02 |
20140297943 | Data Storage Apparatus - Data Storage Apparatus Anapparatus( | 2014-10-02 |
20140297944 | RECORDING MEDIUM, SYSTEM AND METHOD - A non-transitory computer-readable recording medium has stored therein a program for causing a computer to execute a process. The process includes identifying a data block from among a plurality of data blocks in a first storage for relocation to a second storage, determining an access mode of the identified data block, the access mode including sequential access or random access, and relocating the identified data block to the second storage based on the determined access mode. | 2014-10-02 |
20140297945 | STORAGE APPARATUS AND COPY CONTROL METHOD - A storage apparatus includes a plurality of drives having different response speeds, a memory that stores location information of data stored in the plurality of drives, and a processor operable to execute performing rearrangement of the data among the plurality of drives in accordance with a specific condition, updating the location information of the data whose rearrangement has been performed, and starting copying from data that is used for startup of a host connected to another storage apparatus among a plurality of pieces of data to be copied to the other storage apparatus in accordance with the location information stored in the memory, the other storage device being redundantly configured with the storage apparatus. | 2014-10-02 |
20140297946 | STORAGE SYSTEM AND METHOD FOR MANAGING STORAGE APPARATUSES - A processor of a distribution device included in a storage system is configured to manage an initial write position and a current write position for each of a plurality of storage apparatuses. The initial write position varies for the storage apparatuses. The processor is configured to receive a write request and give an instruction for writing data to each of the storage apparatuses in accordance with the current write position by distributing the write request to each of the storage apparatuses. The processor is configured to manage offset information indicating a write position relative to a top of a storage device corresponding to the current write position for each of the storage apparatuses. The processor is configured to receive a read request and select, based on the offset information, one of the storage apparatuses so as to send the read request to the selected storage apparatus. | 2014-10-02 |
20140297947 | STORAGE SYSTEM, STORAGE APPARATUS, CONTROL METHOD OF STORAGE SYSTEM, AND COMPUTER PRODUCT - A storage system includes a first storage apparatus that stores a first data group selected, based on an access time of each data among plural data; a second storage apparatus that stores a second data group; and a control apparatus that includes a memory unit that stores a Bloom filter in which a property value is registered, and obtained by extracting a property in identification information of each data among the first data group; a processor that is configured to judge whether the property value obtained by extracting the property in the identification information of given data that is to be accessed among the plural data is registered in the Bloom filter; and transmit an access request for the given data to any one among the first storage apparatus and the second storage apparatus, based on results of judgment of whether the property value is registered. | 2014-10-02 |
20140297948 | METHOD FOR PROCESSING DATA - A method for operating a system on a chip comprising a conventional processor unit (CISC, RISC, VLIW, DSP) and an array processor having a multidimensional arrangement of arithmetic units. Operation information for the array processor are stored in a memory shared between the conventional processor and the array processor. At runtime the conventional processor points the array processor to the memory area comprising the operation information. A management unit inside the array processor is autonomously loading the operation information into the array processor | 2014-10-02 |
20140297949 | DISK ARRAY DEVICE - The disk array device includes an allocation control unit that allocates a physical sector to a logical sector, and an erasure control unit that erases data written on a logical sector. The allocation control unit stores a logical sector and a physical sector allocated thereto in a translation table in association with each other, and stores allocation information representing that the physical sector is allocated to the logical sector, in an allocation table. The erasure control unit registers logical disk information specifying a logical disk, to which an erasure request has been made, in an under-erasure table, specifies a physical sector allocated to a logical sector formed in the logical disk to which the erasure request has been made, based on the allocation table and the translation table, and performs erasure processing on the specified physical sector. | 2014-10-02 |
20140297950 | STORAGE SYSTEM, RECORDING MEDIUM STORING DATA REBALANCING PROGRAM, AND DATA REBALANCING METHOD - A storage system includes a plurality of storing devices configured to store data, a cache memory configured to hold data, an access control unit configured to make an access to any one of the plurality of storing devices when an access request for reading of target data or writing of the target data is made from an information processing terminal, and to store the target data in the cache memory, and a writing unit configured to write the target data stored in the cache memory in the storing device which has not stored the target data among the plurality of storing devices. | 2014-10-02 |
20140297951 | ALLOCATING STORAGE UNITS IN A DISPERSED STORAGE NETWORK - A method begins by a processing module detecting a new storage unit within a dispersed storage network DSN. The method continues with the processing module determining to affiliate the new storage unit with a virtual memory vault, where the virtual memory vault is mapped to a set of storage units of the DSN, where data objects are dispersed storage error encoded into pluralities of sets of encoded data slices that are stored in the set of storage units. The method continues with the processing module determining virtual DSN addresses of the virtual memory vault to allocate the new storage unit. The method continues with the processing module updating vault information regarding the virtual memory vault to include the allocation of the virtual DSN addresses to the new storage unit. | 2014-10-02 |
20140297952 | CONFIGURABLE AND SCALABLE STORAGE SYSTEM - The system utilizes a plurality of layers to provide a robust storage solution. One layer is the RAID engine that provides parity RAID protection, disk management and striping for the RAID sets. The second layer is called the virtualization layer and it separates the physical disks and storage capacity into virtual disks that minor the drives that a target system requires. A third layer is a LUN (logical unit number) layer that is disposed between the virtual disks and the host. By using this approach, the system can be used to represent any number, size, or capacity of disks that a host system requires while using any configuration of physical RAID storage. | 2014-10-02 |
20140297953 | Removable Storage Device Identity and Configuration Information - In embodiments of removable storage device identity and configuration information, a removable storage device is accessible by device applications while connected to a computing device, such as to access application data. A device manager can identify one or more storage volumes on the removable storage device while the removable storage device is connected to the computing device. A storage volume may be previously identified as a storage location for another computing device when the removable storage device is connected to the other computing device. The device manager can also determine whether at least one of the storage volumes is associated with a user of the computing device if the storage volume is identified on the removable storage device, and then add the storage volume to a library of storage locations for the computing device at the identified storage location that is the same for the other computing device. | 2014-10-02 |
20140297954 | CACHING MECHANISM TO IMPROVE USER INTERFACE RESPONSIVENESS - A method to preferentially wait for fresh data from a primary source to become available in a system where there is also an older set of data from a secondary source. The method includes receiving a data request that is to be displayed and determining if the data from the primary source is available. If the primary source is not available, a dynamic threshold value is tested to detect if a wait time for access to the primary source is exceeded. If the wait time for access to the primary source is exceeded, then older data from the secondary source instead of the primary source is acquired. The dynamic threshold includes an elapsed time since receipt of the request as measured from a receipt time of a prior request. | 2014-10-02 |
20140297955 | STORAGE CONTROL DEVICE AND CONTROL METHOD - The first storage area stores original data of an update target that is to be updated by a host. The controller divides data to be written over the original data of the update target stored in the first storage area into a plurality of pieces of update data and thereby distributes the plurality of pieces of update data for each of successive addresses. The second storage area stores the plurality of update data distributed by the controller. The third storage area stores information in which an update area address, which is an address of the first storage area to be overwritten by the plurality of pieces of update data of the original data of the update target, is associated with a storage destination address, which is an address of the second storage area that has stored the plurality of pieces of update data. | 2014-10-02 |
20140297956 | ARITHMETIC PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF ARITHMETIC PROCESSING APPARATUS - An arithmetic processing apparatus includes a plurality of first processing units to be connected to a cache memory; a plurality of second processing units to be connected to the cache memory and to acquire, into the cache memory, data to be processed by the first processing unit before each of the plurality of first processing units executes processing; and a schedule processing unit to control a schedule for acquiring the data of the plurality of second processing units into the cache memory. | 2014-10-02 |
20140297957 | OPERATION PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS - An operation processing apparatus includes an operation processing unit to perform an operation process using first data administered by the own operation processing apparatus and second data acquired from another operation processing apparatus; a main memory to store the first data; and a control unit to include a storing unit to store status of data indicating whether or not the first data is held by another operation processing apparatus and a indicating unit to indicate a transition between the status in which the first data is held by another operation processing apparatus and the status in which the first data is not held thereby, wherein when the indicating unit indicates that the first data is not held by another operation processing apparatus and a data acquisition request occurs for the first data, the control unit skips a process for referring to the status of use of the first data. | 2014-10-02 |
20140297958 | SYSTEM AND METHOD FOR UPDATING AN INSTRUCTION CACHE FOLLOWING A BRANCH INSTRUCTION IN A SEMICONDUCTOR DEVICE - A semiconductor device includes a memory for storing a plurality of instructions therein, an instruction queue which temporarily stores the instructions fetched from the memory therein, a central processing unit which executes the instruction supplied from the instruction queue, an instruction cache which stores therein the instructions executed in the past by the central processing unit, and a control circuit which controls fetching of each instruction. When the central processing unit executes a branch instruction, and an instruction of a branch destination is being in the instruction cache and an instruction following the instruction of the branch destination is stored in the instruction queue, the control circuit causes the instruction queue to fetch the instruction of the branch destination from the instruction cache and causes the instruction queue not to fetch the instruction following the instruction of the branch destination. | 2014-10-02 |
20140297959 | ADVANCED COARSE-GRAINED CACHE POWER MANAGEMENT - Methods and apparatuses for reducing power consumption of a system cache within a memory controller. The system cache includes multiple ways, and each way is powered independently of the other ways. A target active way count is maintained and the system cache attempts to keep the number of currently active ways equal to the target active way count. The bandwidth and allocation intention of the system cache is monitored. Based on these characteristics, the system cache adjusts the target active way count up or down, which then causes the number of currently active ways to rise or fall in response to the adjustment to the target active way count. | 2014-10-02 |
20140297960 | MULTI-CORE SYSTEM AND METHOD OF DATA CONSISTENCY - A system comprises a plurality of cores and a communication bus enabling the cores to communicate with one another, a core having a processor and of at least one cache memory area. At least one core comprises a table of patterns storing a set of patterns, a pattern corresponding to a series of memory addresses associated with a digital data item made up of binary words stored at these addresses. This core also comprises means for mapping one of the memory addresses AdB of a digital data item to a pattern that is associated with it when said core needs to access this data item and means for transmitting a unique message for access to a digital data item located in the cache memory of at least one other core of the system, said message including the memory addresses that make up the pattern of the data item sought. | 2014-10-02 |
20140297961 | SELECTIVE CACHE FILLS IN RESPONSE TO WRITE MISSES - A cache memory receives a request to perform a write operation. The request specifies an address. A first determination is made that the cache memory does not include a cache line corresponding to the address. A second determination is made that the address is between a previous value of a stack pointer and a current value of the stack pointer. A third determination is made that a write history indicator is set to a specified value. The write operation is performed in the cache memory without waiting for a cache fill corresponding to the address to be performed, in response to the first, second, and third determinations. | 2014-10-02 |
20140297962 | INSTRUCTIONS AND LOGIC TO PROVIDE ADVANCED PAGING CAPABILITIES FOR SECURE ENCLAVE PAGE CACHES - Instructions and logic provide advanced paging capabilities for secure enclave page caches. Embodiments include multiple hardware threads or processing cores, a cache to store secure data for a shared page address allocated to a secure enclave accessible by the hardware threads. A decode stage decodes a first instruction specifying said shared page address as an operand, and execution units mark an entry corresponding to an enclave page cache mapping for the shared page address to block creation of a new translation for either of said first or second hardware threads to access the shared page. A second instruction is decoded for execution, the second instruction specifying said secure enclave as an operand, and execution units record hardware threads currently accessing secure data in the enclave page cache corresponding to the secure enclave, and decrement the recorded number of hardware threads when any of the hardware threads exits the secure enclave. | 2014-10-02 |
20140297963 | PROCESSING DEVICE - When an invalidation request is inputted from another processing device, a cache controller registers a set of an invalidation request address which the invalidation request has and an identifier of the other processing device which outputted the invalidation request in an invalidation history table. When a central processing unit attempts to read data at a first address not stored in a cache memory, if the first address is registered in the invalidation history table, the cache controller outputs a coherent read request containing the first address to the other processing device indicated by the identifier of the other processing device which outputted the invalidation request corresponding to the first address, or if the first address is not registered in the invalidation history table, the cache controller outputs a coherent read request containing the first address to all other processing devices. | 2014-10-02 |
20140297964 | STORAGE SYSTEM, STORAGE CONTROLLER, AND METHOD FOR MANAGING MAPPING BETWEEN LOCAL ADDRESS AND PHYSICAL ADDRESS - According to one embodiment, a mapping manager of a storage controller changes a first chunk from a second state to a third state if an access condition to the first chunk is a first condition that needs high speed access and the first chunk is in the second state. The second state is a state in which a first logical address of the first chunk is mapped to a first physical address in a second storage device slower and having a larger capacity than a first storage device. In the third state, the first logical address is mapped to a second physical address in the first storage device and also mapped to the first physical address in the second storage device. | 2014-10-02 |
20140297965 | CACHE ACCESS ARBITRATION FOR PREFETCH REQUESTS - A processor employs a prefetch prediction module that predicts, for each prefetch request, whether the prefetch request is likely to be satisfied from (“hit”) the cache. The arbitration priority of prefetch requests that are predicted to hit the cache is reduced relative to demand requests or other prefetch requests that are predicted to miss in the cache. Accordingly, an arbiter for the cache is less likely to select prefetch requests that hit the cache, thereby improving processor throughput. | 2014-10-02 |
20140297966 | OPERATION PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS - An operation processing apparatus connected with another operation processing apparatus including an operation processing unit to perform an operation process using first data administered by the own operation processing apparatus and second data administered by and acquired from another operation processing apparatus, a main memory to store the first data, and a control unit to include a setting unit which sets the operation processing unit to an operating state or a non-operating state and a cache memory which holds the first and second data, wherein when the setting unit sets the operation processing unit to the non-operating state and receives a notification related to discarding of the first data from another operation processing apparatus, the control unit acquires the first data from the main memory and holds the acquired data in the cache memory. | 2014-10-02 |
20140297967 | INTER-QUEUE ANTI-STARVATION MECHANISM WITH DYNAMIC DEADLOCK AVOIDANCE IN A RETRY BASED PIPELINE - Methods and apparatus relating to an inter-queue anti-starvation mechanism with dynamic deadlock avoidance in a retry based pipeline are described. In one embodiment, logic may arbitrate between two queues based on various rules. The queues may store data including local or remote requests, data responses, non-data responses, external interrupts, etc. Other embodiments are also disclosed. | 2014-10-02 |
20140297968 | MAGNETIC TUNNELING JUNCTION DEVICES, MEMORIES, MEMORY SYSTEMS, AND ELECTRONIC DEVICES - Provided is a magnetic tunneling junction device including a first structure including a magnetic layer; a second structure including at least two extrinsic perpendicular magnetization structures, each including a magnetic layer and; a perpendicular magnetization inducing layer on the magnetic layer; and a tunnel barrier between the first and second structures. | 2014-10-02 |
20140297969 | INFORMATION PROCESSING DEVICE, METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE, AND PROGRAM FOR CONTROLLING INFORMATION PROCESSING DEVICE - An information processing device includes a processor, and a plurality of memories arranged on the processor and coupled to the processor, wherein the plurality of memories are stacked on each other, and wherein a first memory that is located farthest from the processor among the plurality of memories is allocated for a program for managing the information processing device, and the processor executes the program. | 2014-10-02 |
20140297970 | Concurrent Execution of Critical Sections by Eliding Ownership of Locks - Critical sections of multi-threaded programs, normally protected by locks providing access by only one thread, are speculatively executed concurrently by multiple threads with elision of the lock acquisition and release. Upon a completion of the speculative execution without actual conflict as may be identified using standard cache protocols, the speculative execution is committed, otherwise the speculative execution is squashed. Speculative execution with elision of the lock acquisition, allows a greater degree of parallel execution in multi-threaded programs with aggressive lock usage. | 2014-10-02 |
20140297971 | CONTROL PROGRAM OF STORAGE CONTROL DEVICE, CONTROL METHOD OF STORAGE CONTROL DEVICE AND STORAGE CONTROL DEVICE - For segments having the number of IOs exceeding a threshold, a data collection unit connects adjacent segments whose distance is within “s” to each other and extracts the connected segments and segments in the range of “s” from outside of the connected segments as an n_segment. A workload analysis unit then determines a target whose data is moved from an HDD to an SSD in units of n_segments. | 2014-10-02 |
20140297972 | MEMORY CONTROL DEVICE AND MEMORY CONTROL METHOD - A memory control device has a write-request distribution unit and controllers. The write-request distribution unit divides data to be written in a memory and outputs a plurality of divided data blocks obtained by the division while distributing the divided data blocks to a plurality of buses. The controllers write the plurality of divided data blocks output by the write-request distribution unit in the memory through the plurality of buses, with the divided data blocks being in contact with each other in each of the buses. | 2014-10-02 |
20140297973 | STORAGE SYSTEM AND INFORMATION PROCESSING APPARATUS - A storage system includes an information processing apparatus and plural storage nodes. A replication unit replicates plural data elements respectively stored in plural data regions of one of the plural storage nodes, and stores replicated data elements respectively in plural data regions of each of the other storage nodes. A parity generation unit generates a parity corresponding to the data elements respectively stored in the plural data regions, and stores the parity in the parity region, for each of the storage nodes. The data selection unit selects one or more data regions that hold data elements, from among the plural data regions, and releases one or more non-selected data regions, for each of the storage nodes, so as to reduce a multiplicity of the data elements respectively stored in the plural data regions of each of the plural storage nodes. | 2014-10-02 |
20140297974 | MEMORY HUB ARCHITECTURE HAVING PROGRAMMABLE LANE WIDTHS - A processor-based system includes a processor coupled to a system controller through a processor bus. The system controller is used to couple at least one input device, at least one output device, and at least one data storage device to the processor. Also coupled to the processor bus is a memory hub controller coupled to a memory hub of at least one memory module having a plurality of memory devices coupled to the memory hub. The memory hub is coupled to the memory hub controller through a downstream bus and an upstream bus. The downstream bus has a width of M bits, and the upstream bus has a width of N bits. Although the sum of M and N is fixed, the individual values of M and N can be adjusted during the operation o the process-based system to adjust the bandwidths of the downstream bus and the upstream bus. | 2014-10-02 |
20140297975 | PRIMARY MEMORY MODULE WITH RECORD OF USAGE HISTORY - Provided is a primary memory module including a counter for providing a count indicative of the numbers of times the primary memory module has ever been read/written by a processor. With the count, an operating situation of the primary memory module is evaluated so as to optimize memory allocation performed by the operation system, adjust the operating mode of the primary memory module, and send a warning message to a user, for example. | 2014-10-02 |
20140297976 | ELECTRONIC DEVICE WITH REVERSING STACK DATA CONTAINER AND RELATED METHODS - An electronic device may include a memory, and a processor coupled to the memory for storing and accessing data in the memory. The processor may arrange the data in a stack data container including values extending from a stack top to a stack bottom, operate the stack data container in first and second modes of operation, and while in the first mode of operation, push and pop a respective value from the stack top of the stack data container. The processor may also while in the second mode, reverse an orientation of the stack data container and the values therein, and push and pop a respective value from the stack bottom of the reversed stack data container. | 2014-10-02 |
20140297977 | MANAGING APPARATUS - A managing server includes a predicting unit and a controlling unit. The predicting unit predicts either a time or a time period at which frequency of accesses from a plurality of apparatuses to a storage device storing data therein will exceed a predetermined threshold value, on a basis of a status of the accesses from the plurality of apparatuses to the storage device. The controlling unit controls the storage device so as to transmit the data stored therein to at least one of the plurality of apparatuses, prior to the predicted time or time period. | 2014-10-02 |
20140297978 | Methods For Synchronizing Storage System Data - In accordance with one example, a method for comparing data units is disclosed comprising generating a first digest representing a first data unit stored in a first memory. A first encoded value is generated based, at least in part, on the first digest and a predetermined value. A second digest representing a second data unit stored in a second memory different from the first memory, is generated. A second encoded value is derived based, at least in part, on the second digest and the predetermined value. It is determined whether the first data unit and the second data unit are the same based, at least in part, on the first digest, the first predetermined value, the first encoded value, and the second digest, by first processor. If the second data unit is not the same as the first data unit, the first data unit is stored in the second memory. | 2014-10-02 |
20140297979 | LIVE MIGRATION OF VIRTUAL DISKS - A system and method are disclosed for live migration of a virtual disk of a virtual machine between storage devices. In accordance with one example, a computer system prepares a first area of a first storage device and a second area of a second storage device for a live snapshot of a virtual disk of a virtual machine. A transaction is then executed that comprises: storing the live snapshot in the first area of the first storage device, copying the live snapshot to the second area of the second storage device, and mirroring a change to the virtual disk that occurs after the creation of the live snapshot, where the mirroring is via one or more write operations to the live snapshot in the first area and to the copy of the live snapshot in the second area. | 2014-10-02 |
20140297980 | Storage System, Storage Controller, and Method for Eliminating Data Duplication Based on Hash Table - According to one embodiment, a storage controller includes a dividing unit, a duplication manager, and a duplication determination unit. The dividing unit divides data specified in a write request from a host computer into a plurality of chunks. The duplication manager preferentially stores a first hash value of a first chunk in a first table in a hash table in association with the first chunk when the first chunk is written to a storage device. The hash table includes a second table having more entries than the first table. The duplication determination unit first searches the first table for a third hash value matching a second hash value of a second chunk when the second hash value has been calculated. | 2014-10-02 |
20140297981 | INFORMATION PROCESSING SYSTEM, STORAGE DEVICE, AND BACKUP METHOD - An information processing system includes a processing device; and a storage device that is accessed by the processing device. The storage device includes a storage unit, and a processor coupled to the storage unit. The processor is configured to build a virtual device, determine an I/O request to the virtual device from the processing device, as a copy request to the storage unit, and execute a copy instruction to the storage unit in response to the copy request. | 2014-10-02 |
20140297982 | Multi-Tier Storage for Delivery of Services - Methods, systems, and computer readable media can be operable to facilitate the transfer of content between two or more storage units. The transfer of content between two or more storage units can be based upon a count of the number of hits to a storage unit entry associated with the content. In embodiments, the transfer of content between two or more storage units can be further based upon a predetermined threshold associated with a period. | 2014-10-02 |
20140297983 | METHOD OF ARRANGING DATA, INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM - A method of arranging data in a stratified storage region includes: acquiring an index value related to data stored in the stratified storage region based on a predetermined rearrangement condition; and determining, based on the index value, data to be migrated from the data stored in the stratified storage region. | 2014-10-02 |
20140297984 | STORAGE APPARATUS AND CONTROL METHOD OF THE SAME - A storage management system, if the required response performance of the file is added to the access request from the host computer, compares the required response performance of the file with the response performance of the pool volume assigned to the page. If the response performance of the compared pool volume does not satisfy the required response performance, the storage management system selects a pool volume whose response performance satisfies the required response performance from the pool volumes, migrates the page to the selected pool volume, and stores the data in the page to which the pool volume is assigned. | 2014-10-02 |
20140297985 | SHIFTABLE MEMORY SUPPORTING IN-MEMORY DATA STRUCTURES - A shiftable memory supporting in-memory data structures employs built-in data shifting capability. The shiftable memory includes a memory having built-in shifting capability to shift a contiguous subset of data from a first location to a second location within the memory. The shiftable memory further includes a data structure defined on the memory to contain data comprising the contiguous subset. The built-in shifting capability of the memory to facilitate one or more of movement of the data, insertion of the data and deletion of the data within the data structure. | 2014-10-02 |
20140297986 | SEMICONDUCTOR MEMORY DEVICES AND SEMICONDUCTOR SYSTEMS INCLUDING THE SAME - The semiconductor memory device includes an internal flag signal generator and an active information generator. The internal flag signal generator generates a plurality of internal flag signals which are selectively enabled when combination signals of bank address signals and row address signals supplied are inputted from an external device at least a predetermined number of times. The active information generator outputs a flag signal enabled when at least one of the plurality of internal flag signals is enabled in response to a start signal for extracting information on a number of times that a word line is activated and outputs a plurality of bank information signals according to the plurality of internal flag signals. The active information generator generates internal bank address signals and internal row address signals according to the plurality of internal flag signals to refresh a bank. | 2014-10-02 |
20140297987 | Managing Capacity of a Thinly Provisioned Storage System - A thinly provisioned storage system detects whether physical storage capacity is available when there is a request to allocate storage capacity, prior to data being written to the storage system. In particular, at the time when the file system allocates storage, such as when creating a file or performing an extending write (append) operation, allocating storage to an unallocated region of a sparse file, defragmenting a file, and the like, a storage system can verify that actual physical storage capacity is available. Thus, if there is insufficient actual physical capacity at the time when a storage allocation is attempted, then an error message can be sent and remedial action can be taken. | 2014-10-02 |
20140297988 | STORAGE DEVICE, ALLOCATION RELEASE CONTROL METHOD - A storage device that allocates an unused physical storage area to logical storage areas to which write has been requested by an upper device, the storage device including a pattern test unit that tests whether a data pattern written to each of the logical storage areas is a data pattern indicating that allocation of the physical storage area is needed, a skip control unit that determines a skip object for which the pattern test unit does not perform the test among the logical storage areas being test objects of the pattern test unit, and excludes the skip object from the test objects, and a release control unit that releases allocation of a physical storage area to a logical storage area, tested by the pattern test unit, to which the data pattern indicating that allocation of the physical storage area is not needed. | 2014-10-02 |
20140297989 | INFORMATION PROCESSING APPARATUS AND MEMORY CONTROL METHOD - An information processing apparatus comprises a plurality of processor elements, and a memory having a plurality of banks. Statistical information representing an access frequency distribution to each memory area of the memory by the plurality of processor elements is obtained. An allocation process of allocating the banks to the memory areas is performed based on the statistical information. | 2014-10-02 |
20140297990 | MEMORY ADDRESS TRANSLATION - The present disclosure includes devices, systems, and methods for memory address translation. One or more embodiments include a memory array and a controller coupled to the array. The array includes a first table having a number of records, wherein each record includes a number of entries, wherein each entry includes a physical address corresponding to a data segment stored in the array and a logical address. The controller includes a second table having a number of records, wherein each record includes a number of entries, wherein each entry includes a physical address corresponding to a record in the first table and a logical address. The controller also includes a third table having a number of records, wherein each record includes a number of entries, wherein each entry includes a physical address corresponding to a record in the second table and a logical address. | 2014-10-02 |
20140297991 | INSTRUCTIONS FOR STORING IN GENERAL PURPOSE REGISTERS ONE OF TWO SCALAR CONSTANTS BASED ON THE CONTENTS OF VECTOR WRITE MASKS - According to one embodiment, an occurrence of an instruction is fetched. The instruction's format specifies its only source operand from a single vector write mask register, and specifies as its destination a single general purpose register. In addition, the instruction's format includes a first field whose contents selects the single vector write mask register, and includes a second field whose contents selects the single general purpose register. The source operand is a write mask including a plurality of one bit vector write mask elements that correspond to different multi-bit data element positions within architectural vector registers. The method also includes, responsive to executing the single occurrence of the single instruction, storing data in the single general purpose register such that its contents represent either a first or second scalar constant based on whether the plurality of one bit vector write mask elements in the source operand are all zero. | 2014-10-02 |
20140297992 | APPARATUS AND METHOD FOR GENERATING VECTOR CODE - An apparatus and method for generating vector code are provided. The apparatus and method generate vector code using scalar-type kernel code, without user's changing a code type or modifying data layout, thereby enhancing user's convenience of use and retaining the portability of OpenCL. | 2014-10-02 |
20140297993 | UNCORE MICROCODE ROM - A microprocessor includes a plurality of processing cores each comprises a corresponding memory physically located inside the core and readable by the core but not readable by the other cores (“core memory”). The microprocessor also includes a memory physically located outside all of the cores and readable by all of the cores (“uncore memory”). For each core, the uncore memory and corresponding core memory collectively provide M words of storage for microcode instructions fetchable by the core as follows: the uncore memory provides J of the M words of microcode instruction storage, and the corresponding core memory provides K of the M words of microcode instruction storage. J, K and M are counting numbers, and M=J+K. The memories are non-architecturally-visible and accessed using a fetch address provided by a non-architectural program counter, and the microcode instructions are non-architectural instructions that implement architectural instructions. | 2014-10-02 |
20140297994 | PROCESSORS, METHODS, AND SYSTEMS TO IMPLEMENT PARTIAL REGISTER ACCESSES WITH MASKED FULL REGISTER ACCESSES - A method includes receiving a packed data instruction indicating a first narrower source packed data operand and a narrower destination operand. The instruction is mapped to a masked packed data operation indicating a first wider source packed data operand that is wider than and includes the first narrower source operand, and indicating a wider destination operand that is wider than and includes the narrower destination operand. A packed data operation mask is generated that includes a mask element for each corresponding result data element of a packed data result to be stored by the masked packed data operation. All mask elements that correspond to result data elements to be stored by the masked operation that would not be stored by the packed data instruction are masking out. The masked operation is performed using the packed data operation mask. The packed data result is stored in the wider destination operand. | 2014-10-02 |
20140297995 | FAULT-TOLERANT SYSTEM AND FAULT-TOLERANT OPERATING METHOD - A fault-tolerant system including a calculation unit and an output synthesizer is provided. The calculation unit receives a first environmental parameter and input data, wherein the calculation unit further includes a first and a second calculation circuits. The first calculation circuit is arranged to perform a calculation on the input data in response to the first environmental parameter to generate a first calculation result. The second calculation circuit is different from the first calculation circuit, and arranged to perform the calculation on the input data in response to the first environmental parameter to generate a second calculation result. The output synthesizer selects a first and a second set of bits from the first and the second calculation result according to a control signal, and synthesizes the first set of bits and the second set of bits in sequence to generate an adjusted calculation result. | 2014-10-02 |
20140297996 | MULTIPLE HASH TABLE INDEXING - A processor includes storage elements to store a first and second value, as well as a plurality of hash units coupled to the storage elements. Each hash unit performs a hash operation using the first value and the second value to generate a corresponding hash result value. The processor further includes selection logic to select a hash result value from the hash result values generated by the plurality of hash units responsive to a selection input generated from another hash operation performed using the first value and the second value. A method includes predicting whether a branch instruction is taken based on a prediction value stored at an entry of a branch prediction table indexed by an index value selected from a plurality of values concurrently generated from an address value of the branch instruction and a branch history value representing a history of branch directions at the processor. | 2014-10-02 |
20140297997 | AUTOMATED COOPERATIVE CONCURRENCY WITH MINIMAL SYNTAX - Various embodiments are generally directed to techniques for reducing syntax requirements in application code to cause concurrent execution of multiple iterations of at least a portion of a loop thereof to reduce overall execution time in solving a large scale problem. At least one non-transitory machine-readable storage medium includes instructions that when executed by a computing device, cause the computing device to parse an application code to identify a loop instruction indicative of an instruction block that includes instructions that define a loop of which multiple iterations are capable of concurrent execution, the instructions including at least one call instruction to an executable routine capable of concurrent execution; and insert at least one coordinating instruction into an instruction sub-block of the instruction block to cause sequential execution of instructions of the instruction sub-block across the multiple iterations based on identification of the loop instruction. Other embodiments are described and claimed. | 2014-10-02 |
20140297998 | MEMORY VIRTUALIZATION-BASED SNAPSHOT BOOT APPARATUS AND METHOD - The present invention relates to a memory virtualization-based snapshot boot apparatus and method. The memory virtualization-based snapshot boot apparatus includes hardware unit including a processor, memory, and storage, the storage storing status information corresponding to an operating system, and a Virtual Machine Monitor (VMM) operated by the processor and configured to operate the operating system by loading the status information into the memory. In accordance with the present invention, technology for loading only a part of a snapshot image and booting a system is implemented using virtualization technology, thus shortening the booting time of the system. | 2014-10-02 |
20140297999 | COMPUTER SYSTEM AND METHOD FOR CONTROLLING ACPI INFORMATION - A computer system configured to control advanced configuration and power interface ACPI information is provided. The computer system includes a non-volatile memory configured to store an ACPI table, and a processor configured to execute a unified extensible firmware interface (UEFI), wherein a boot service of the UEFI provides a shell application, and the shell application includes an extended command to control information of the ACPI table. | 2014-10-02 |
20140298000 | System and Method for Pre-Operating System Memory Map Management to Minimize Operating System Failures - A method includes booting an information handling system, providing by an EFI of the information handling system a memory segment for a first EFI type memory access, reserving a first portion of the segment from access by an operating system of the information handling system, determining a size of the first portion, determining a size of a second portion of the segment based upon the size of the first portion, allocating a third portion of the segment for the first EFI type memory access, the third portion including the first portion and the second portion, and passing a memory map to the operating system, the memory map including the third portion, wherein the third portion is reserved from access by the operating system. | 2014-10-02 |
20140298001 | DETECTING A COMPUTING SYSTEM BASIC INPUT/OUTPUT SYSTEM ISSUE - A method begins where a processing module accesses at least some of a set of basic input/output system (BIOS) memories to retrieve a decode threshold number of encoded BIOS slices, where a BIOS program is dispersed storage error encoded to produce the set of encoded BIOS slices. The method continues with the processing module reconstructing the BIOS program from the decode threshold number of encoded BIOS slices. The method continues with the processing module detecting a BIOS issue based on one or more of an operational issue with one or more BIOS memories of the set of BIOS memories, a rebuild issue with one or more encoded BIOS slices of the one or more sets of encoded BIOS slices, and a modification to the BIOS program. The method continues with the processing module determining a BIOS change regarding the BIOS issue and implementing the BIOS change. | 2014-10-02 |
20140298002 | METHOD AND DEVICE FOR IDENTIFYING A DISK BOOT SECTOR VIRUS, AND STORAGE MEDIUM - The present disclosure discloses a method and a device for identifying a disk boot sector virus, and a storage medium. The method comprises steps of: obtaining a known behavior pattern that is prestored, and obtaining a master boot record (MBR) and disk data called when the MBR is executed; establishing a simulated execution environment according to the MBR and the disk data obtained, and simulating an execution process of the MBR; analyzing and recording a simulated behavior pattern of the MBR during the process of simulating the execution process of the MBR; and identifying a disk boot sector virus via a contrast analysis between the recorded simulated behavior pattern and the known behavior pattern. The solution of the present disclosure has the beneficial effect that a new boot sector virus can be identified timely and accurately. | 2014-10-02 |
20140298003 | WEB-BASED INTERFACE TO ACCESS A FUNCTION OF A BASIC INPUT/OUTPUT SYSTEM - A web-based interface in an electronic device receives a request to access a function of a Basic Input/Output System. | 2014-10-02 |
20140298004 | ELECTRONIC SYSTEM WITH SYSTEM MODIFICATION CONTROL MECHANISM AND METHOD OF OPERATION THEREOF - An electronic system and method of operation thereof includes: a control unit for receiving a patterned signal; a recognizer module, coupled to the control unit, for recognizing an unique trigger from the patterned signal; an operation module, coupled to the recognizer module, for detecting an operational mode from the unique trigger; and a change module, coupled to the operation module, for configuring a system state change of a memory sub-system based on the operational mode. | 2014-10-02 |
20140298005 | MICROPROCESSOR DEVICE, AND METHOD OF MANAGING RESET EVENTS THEREFOR - A microprocessor device comprises at least one reset management module. The at least one reset management module is arranged to detect a reset event comprising a first reset level, determine if at least one reset condition has been met upon detection of the reset event comprising the first reset level, and cause a reset of a second reset level upon determining that the at least one reset condition has been met. | 2014-10-02 |
20140298006 | DATA ENCRYPTION AND DECRYPTION - Systems and methods for data encryption and decryption are provided. Packets of a streaming video from a video source are received. A first packet of the streaming video is encrypted with a encryption key and transmitted to a client device. The first packet is encrypted with a reference key and is designated as a reference packet. A number of packets of the encrypted media that follow the first packet are selected. For each of one or more selected packets, an XOR operation is performed on the respective selected packet with the reference packet. Result values of the XOR operation are rearranged by a shuffle key and divided into segments. Each of the segments is assigned to an even list or an odd list, which are combined to form a respective encrypted packet. The respective encrypted packet is designated as a non-reference packet and is transmitted to the client device. | 2014-10-02 |
20140298007 | NETWORK SWITCH CONFIGURATION - Provided is a method of configuring a network switch. A configuration file is allowed to be edited on a server. The compatibility of the configuration file with a network switch is validated on the server. The configuration file is encrypted and applied to the network switch. | 2014-10-02 |
20140298008 | Control System Security Appliance - A widespread security strategy for industrial control networks is physical isolation of the network, also known as an “air gap.” But the network might still be infected with unauthorized software if, say, an infected USB drive were to be plugged into one of the network's computers. The invention relates to a security module placed between the network and a device in the network. Each security module in the network mimics the Internet protocol (IP) configuration of its protected device. Each security module includes a private encryption key and a signed public key that it automatically shares with other security modules discovered on the network. These keys permit the security module to perform asymmetric point-to-point encryption of traffic from the protected device to the corresponding security module for a target device node and to detect (and thus block) unauthorized devices. | 2014-10-02 |
20140298009 | DATA SEARCH DEVICE, DATA SEARCH METHOD, DATA SEARCH PROGRAM, DATA REGISTRATION DEVICE, DATA REGISTRATION METHOD, DATA REGISTRATION PROGRAM, AND INFORMATION PROCESSING DEVICE - A data search server stores a system ciphertext including a data ciphertext and a keyword ciphertext in each category-specific DB unit for each data category, and stores each category-determination secret key being associated with each category-specific DB unit. A search request receiving unit receives from a data search terminal a search request including a search trapdoor and an index tag. A data searching unit searches for a category-determination secret key with which the index tag is decrypted to the same value as a key-determination value. Using the search trapdoor, the data searching unit performs a search of a Public-key Encryption with Keyword Search scheme on system ciphertexts in a category-specific DB unit associated with this category-determination secret key. A search result transmitting unit transmits to the data search terminal a data ciphertext included in a system ciphertext which has been found as a hit in the search. | 2014-10-02 |
20140298010 | PUBLIC-KEY CERTIFICATE MANAGEMENT SYSTEM AND METHOD - Methods and systems for public-key certificate management comprise storing digital certificates in data structures that allow the manager to provide a verifiable proof about the validity status of a certificate. The certificates are stored in two data structures in a database. One data structure stores items in chronological order and is queried to establish a proof that a later snapshot of the database is an extension of an earlier snapshot of the database. Another data structure is ordered by user identifier and is queried to establish a proof that a given digital certificate is currently valid. | 2014-10-02 |
20140298011 | SECURE AND EFFICIENT AUTHENTICATION USING PLUG-IN HARDWARE COMPATIBLE WITH DESKTOPS, LAPTOPS AND/OR SMART MOBILE COMMUNICATION DEVICES SUCH AS IPHONES.TM. - A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into or entering into a transaction with a network site. The apparatus includes a communications port to connect and disconnect the apparatus to and from the network device and to establish a communication link with the network device when connected thereto. A processor receives a secure message from the network security server via the port. The message has a PIN for authenticating the user to the network site, and is readable only by the apparatus. The processor either transfers, via the port, the received PIN to an application associated with the network site that is executing on the network device or causes the apparatus to display the received PIN for manual transfer to the application associated with the network site. | 2014-10-02 |
20140298012 | SYSTEMS AND METHODS FOR SECURE DATA SHARING - Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup key associated with the data file and unique information associated with the data file. The file-level key may be used to encrypt and split data. Systems and methods are also provided for sharing data without replicating the data on an end user machine. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data. | 2014-10-02 |
20140298013 | DYNAMIC ENCRYPTION METHOD - Disclosed is a method of transmitting a data set using encryption, wherein the method comprises the steps of: selecting a first encryption technique, wherein said first encryption technique comprises a first encryption algorithm for encrypting plain data into cipher data, and a first decryption algorithm for on provision of a specific key, decrypting cipher data and reproduce plain data; encrypting the first data package comprising plain data, using a first encryption program implementing the first encryption algorithm of said first encryption technique, creating a first encrypted data package comprising cipher data; obtaining a first decryption program; and transmitting said first decryption program and said first encrypted data package to a receiver, wherein the first decryption, upon provision of the specific key and the first encrypted data package, will decrypt the cipher data in the first encrypted data package and reproduce the plain data of the first data package. | 2014-10-02 |
20140298014 | SYSTEMS AND METHODS FOR ESTABLISHING TRUSTED, SECURE COMMUNICATIONS FROM A MOBILE DEVICE TO A MULTI-FUNCTION DEVICE - The present invention generally relates to systems and methods for establishing trusted, secure communications from a mobile device, such as a smart phone, to an immobile device, such as a multi-function device. The disclosed techniques can include the immobile device displaying a pattern that encodes a cryptographic key. The mobile device can obtain an image of the pattern and decode it to obtain the cryptographic key. Because the mobile device obtained the image within its line-of-sight, for example, it can be assured that it communicated with the immobile device, and only the immobile device. The mobile device and the immobile device can use the cryptographic key to secure further communications. | 2014-10-02 |
20140298015 | PRIVACY SYSTEM - The disclosure relates generally to mobile device applications, and more particularly, to a privacy system for a mobile device application. In one embodiment, a computer-implemented method of sending and receiving encrypted messages between users within an associated group of users is provided. The method includes: receiving a first message from a first user within the group of users, wherein the first message includes proprietary information; encrypting the first message into ciphertext; transforming the ciphertext into a second message, wherein the second message includes quotidian information; and sending the second message to a second user within the group of users. Once the second user receives the second message, the second user will assay the second message to be an encryption of an unknown first message. The second message is received from the second user, and is decrypted into the first message, which is displayed to the second user. | 2014-10-02 |
20140298016 | METHOD AND APPARATUS FOR IDENTITY BASED TICKETING - A method, apparatus, system and computer program where an apparatus stores user specific credentials, receives a certificate via the communication interface from a certificate authority and stores the certificate in the memory. The apparatus further stores a private key and a public key in the memory and attempts authenticating of the apparatus to a ticket reader for accessing a service, by transmission of one or more messages, wherein the messages contain an authenticator that has at least one of the following: the certificate or its cryptographic derivative; one or more data items contained by the certificate or a cryptographic derivative thereof. The messages are prepared such that the public key is not recoverable from outside of the authenticator. | 2014-10-02 |
20140298017 | METHODS AND SYSTEMS FOR BROADCASTING PICTURES - A method and system for broadcasting pictures across multiple user terminals are provided. The method includes generating a user signature based on information associated with the picture, and receiving a request to broadcast the picture, the request including the user signature. The method further includes broadcasting the picture if the user signature is valid. The method and system may improve a user's online experience by eliminating unauthorized broadcasts from unauthorized users. | 2014-10-02 |
20140298018 | APPARATUS AND METHODS FOR DISTRIBUTING AND STORING ELECTRONIC ACCESS CLIENTS - Apparatus and methods for efficiently distributing and storing access control clients within a network. In one embodiment, the access clients include electronic Subscriber Identity Modules (eSIMs), and an eSIM distribution network infrastructure is described which enforces eSIM uniqueness and conservation, distributes network traffic to prevent “bottle necking” congestion, and provides reasonable disaster recovery capabilities. In one variant, eSIMs are securely stored at electronic Universal Integrated Circuit Card (eUICC) appliances which ensure eSIM uniqueness and conservation. Access to the eUICC appliances is made via multiple eSIM depots, which ensure that network load is distributed. Persistent storage is additionally described, for among other activities, archiving and backup. | 2014-10-02 |
20140298019 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member. | 2014-10-02 |
20140298020 | RECEPTION DEVICE AND METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - The present technology relates to a reception device and method, a program, and an information processing system which can securely provide path information capable of equalizing a burden of a usage fee for a connection service to an external network. | 2014-10-02 |
20140298021 | METHOD AND SYSTEM FOR STORING INFORMATION BY USING TCP COMMUNICATION - The present invention relates to a method and system for storing information using TCP communication, and the method includes a communication connection request operation of transmitting, by a client, to a server a first TCP packet containing a header with a SYN field set to be active and an SEQ field in which a random number generated by the client is included, to request a TCP communication connection with the server, an encryption operation of encrypting, by the server, at least one piece of information to be stored in the first TCP packet, a communication connection confirmation operation of transmitting, by the server, to the client a second TCP packet containing a header with a SYN field set to be active, a SEQ field in which the encrypted information is stored, and an ACK field in which a value obtained by adding 1 to the random number included in the SEQ field of the first TCP packet is stored, a response operation of transmitting, by the client, to the server a third TCP packet containing a header with an ACK field set to be active, a SEQ field in which a value obtained by adding 1 to the random number stored in the SEQ field in the header of the first TCP packet is stored, and the ACK field in which a value obtained by adding 1 to the encrypted information is included, a decryption operation of decrypting, by the server, the ACK field in the header of the third TCP packet to acquire the encrypted information, and a determination operation of comparing, by the server, information stored in an IP packet residing at a lower level than the second TCP packet to a value obtained by decrypting a result of subtracting 1 from the ACK field in the header of the third TCP packet, and if they are identical, determining that the information is stored in the SEQ field of the second TCP packet and the ACK field of the third TCP packet. | 2014-10-02 |
20140298022 | MOBILE VIRTUALIZATION PLATFORM FOR THE REMOTE CONTROL OF A MEDICAL DEVICE - The invention concerns a medical assembly which insures a secured communication between a medical device (like a insulin pump) and its remote control which manages the medical device. To this effect, said assembly use an external microcontroller (MCU) which contains the secured data and uses a cryptographic mechanism to communicate with the medical device. One single external microcontroller (MCU) is paired with only one medical device in such a way the patient can change several times of remote device although aware that the re mote device, in which said external protected MCU is inserted, is the single remote device paired with the medical device. In said assembly, said medical device and said external microcontroller (MCU) comprise secured memories which contain the wireless communication configuration in such a way the devices know in advance the good configuration. | 2014-10-02 |
20140298023 | METHOD AND SYSTEM FOR ENABLING A TECHNICAL APPARATUS - A method and a system transmit data between a technical apparatus which has a reception unit, a transmission unit and a computer unit, an external device which has a reception unit, a transmission unit and a computer unit, and a mobile terminal which has a reception unit, a transmission unit and a memory unit. The method and system allow registered, authenticated users to use the mobile terminal to perform safe reservation or enabling for a technical apparatus, without requiring an online connection and check between the technical apparatus and the external device for the purpose of authorization and authentication of the user. | 2014-10-02 |
20140298024 | Method for granting access to a network and device for implementing this method - A method for granting access to a network to an electronic communication device via a router using a secure key to encrypt the communication between the router and the electronic communication device, comprising the steps of establishing a first link between a key carrier and the electronic communication device for transferring said secure key to an application software installed in the communication device, and using said secure key to encrypt and decrypt the data transferred between the router and the electronic communication device via a wireless second link. | 2014-10-02 |
20140298025 | METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS - Disclosed examples involve decoding information from a mobile device into a plurality of encrypted identifiers identifying at least one of the mobile device or a user of the mobile device, sending ones of the encrypted identifiers to corresponding database proprietors, receiving a plurality of user information corresponding to the ones of the encrypted identifiers from the corresponding database proprietors, and associating the plurality of user information with at least one of a search term collected at the mobile device or a media impression logged for media presented at the mobile device. | 2014-10-02 |
20140298026 | INFORMATION PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a device includes a processor unit, a control unit, a setting unit, a writing unit, and an executing unit. The processor unit is configured to switch between secure and non-secure modes, read/write data from/to a memory unit, and write an OS execution image of a secure OS unit to the memory unit. The setting unit is configured to set a shared memory area allowing reading and writing in both modes and an execution module memory area allowing reading and writing in the secure mode but not allowing reading or writing in the non-secure mode with respect to the control unit. The writing unit is configured to write an execution module to be executed in the secure OS unit to the shared memory area. The executing unit is configured to execute the execution module that has been written to the execution module memory area. | 2014-10-02 |
20140298027 | INTEGRATED CONTACTLESS MPOS IMPLEMENTATION - Disclosed herein is a method for performing an integrated contactless point-of-sale transaction. More particularly, there is disclose a method comprising: receiving, by a mobile device | 2014-10-02 |
20140298028 | CRYPTOGRAPHIC PROCESSING SYSTEM, CRYPTOGRAPHIC PROCESSING METHOD, CRYPTOGRAHPIC PROCESSING PROGRAM, AND KEY GENERATION DEVICE - A cryptographic processing system and method to decrease the sizes of public parameters and a master secret key, and shorten the time taken for the generation process of the secret key to be supplied to the user and the encryption process. A generation device generates a basis B and a basis B* that form public parameters and a master secret key using a sparse matrix in which each row and each column have at least one value other than 0. An encryption device generates a vector in the basis B, the vector being embedded with predetermined information, as a cipher vector. A decryption device, by treating a predetermined vector in the basis B* as a key vector, conducts a pairing operation for the cipher vector and the key vector, to decrypt the cipher vector. | 2014-10-02 |
20140298029 | CONTACTLESS SEED PROGRAMMING METHOD AND SYSTEM THEREOF - The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains corresponding first seed data according to the token ID, communicates with the dynamic token contactlessly, obtains first seed data from the dynamic token, decrypts the first seed data so as to obtain second seed data, encrypts the second seed data with the first data so as to obtain third seed data and sends the third seed data to the dynamic token; and the dynamic token decrypts the seed and updates seed stored in itself. By the invention, programming operation is simplified and programming efficiency is improved by communicating with the dynamic token contactlessly and security is ensured by transferring the encrypted seed during communication between the programming device and the token. | 2014-10-02 |
20140298030 | COMPUTER ASSISTED NAME-BASED AGGREGATION SYSTEM FOR IDENTIFYING NAMES OF ANONYMIZED DATA, AS WELL AS A METHOD AND COMPUTER PROGRAM THEREOF - A computer assisted name-based aggregation system that acquires anonymized data from a plurality of service providing systems without obtaining the personal information, and identifies the name of the acquired anonymized data. The computer assisted name-based aggregation system transmits a transmission request that requests transmission of data, and a value that changes for each transmission request to the plurality of service providing systems; receives a set containing hash values created based on an identification number for controlling data and the aforementioned value, and the anonymized data specified by the identification number, from the plurality of service providing systems; and identifies the name of anonymized data specified by the hash value from the anonymized data received from each of the plurality of service providing systems. | 2014-10-02 |
20140298031 | Method for Determining Debug Authorization for Motherboard Control Module and Associated Motherboard Control Module - By comparing a chip unique password, certification for activating a debug function can be established on the chip unique password. Thus, even when the chip unique password is lost due to negligence, not only certification for activating debugging on other motherboards of the same model number can remain unaffected, but also risks caused by replacing a chip or by a private key leakage from a system manufacturer are eliminated. | 2014-10-02 |
20140298032 | Authentication System for Gaming Machines - Disclosed is a system and method that uses digital signature technology to authenticate the contents of one or more manifests located on a storage device. Each manifest contains a list of file records, where each record contains the name of a file stored on the storage device, and a SHA1 hash value derived from the contents of the file. At boot time, the gaming machine first authenticates the contents of the manifest and then verifies the contents of the files using the SHA1 value stored in the manifest. Files are verified using the SHA1, as they are needed, during the boot up of the operating system and throughout normal operation. This method reduces the boot time of the gaming machine and eliminates the need to check digital signatures for each individual file or over the entire contents of a non-secure media. | 2014-10-02 |
20140298033 | HYBRID SIGNATURE SCHEME - A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. | 2014-10-02 |
20140298034 | DATA AUTHENTICITY ASSURANCE METHOD, MANAGEMENT COMPUTER, AND STORAGE MEDIUM - A data authenticity assurance method carried out by a management computer including: a first step of receiving the first data piece from the computer; a second step of selecting a plurality of second data pieces at predetermined intervals in chronological order from among the plurality of second data pieces held in the data holding part; a third step of performing an arithmetic operation for each of the hash values of the selected plurality of second data pieces; a fourth step of generating signature target data by combining the first data piece received from the computer with the hash values of the selected plurality of second data pieces; and a fifth step of generating a second data piece by assigning the digital signature to the signature target data by using the preset key, and holding the generated second data piece in chronological order sequentially in the data holding part. | 2014-10-02 |
20140298035 | SYSTEM AND METHOD FOR LOCATION ASSURANCE USING PASSIVE COMPUTATIONAL TAGS - In implementations, a computer-implemented method for location assurance is disclosed. The method can include receiving, by an application executing on a mobile computing device, an electronic token from a server, wherein the electronic token comprises a timestamp signed using a cryptographic signing algorithm; providing, by the application, the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag; receiving, by the application, the electronic token that was countersigned by the passive computational tag; and providing, by the application, the electronic token that was countersigned to the server. | 2014-10-02 |
20140298036 | SYSTEM AND METHOD FOR PROTECTING SECRETS FILE - A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory. | 2014-10-02 |
20140298037 | METHOD, APPARATUS, AND SYSTEM FOR SECURELY TRANSMITTING DATA - The present invention provides a method, an apparatus, and a system for securely transmitting data. A method for securely transmitting data is provided, where the method includes: sending, by a user terminal, a resource access request carrying a first authentication header field to a server, where the first authentication header field includes a user identifier and a server identifier; and receiving a request response returned by the server, where the request response includes a second authentication header field and a message body, where the second authentication header field carries a third integrity digest, and the third integrity digest is obtained by the server by performing, after receiving the resource access request, calculation by using a third message-digest algorithm further according to a user password and message content; so that M2M transmission based on the CoAP protocol can be performed securely and reliably. | 2014-10-02 |
20140298038 | GENERATION OF RANDOMIZED MESSAGES FOR CRYPTOGRAPHIC HASH FUNCTIONS - Method(s) and system(s) for generation of randomized messages for cryptographic hash functions are described herein. The method includes obtaining a random value based on a randomization criterion to randomize a message. Further, a last data block of the message is populated with a randomization parameter to obtain a randomized message. The randomization parameter populated in the last block is computed using the random value. | 2014-10-02 |
20140298039 | PROGRAMMABLE INTELLIGENT SEARCH MEMORY ENABLED SECURE DRAM - A dynamic random access memory (DRAM) comprising a programmable intelligent search memory (PRISM) for regular expression search using non-deterministic finite state automaton and further comprising a cryptography processing engine for performing encryption and decryption, said PRISM and cryptography processing engines creating a secure DRAM for use in a system. | 2014-10-02 |
20140298040 | SYSTEMS, METHODS AND APPARATUSES FOR SECURE STORAGE OF DATA USING A SECURITY-ENHANCING CHIP - A computer processor and a security enhancing chip may be provided. In one aspect, the computer processor may comprise a storage for storing an encryption key, a central processing unit (CPU) configured to execute one or more software programs, and a circuit configured to calculate a hash function to generate a hash value for data loaded into the computer processor and generate an authentication token for a request initiated by a software program running on the CPU. In another aspect, the security enhancing chip may comprise a first storage for storing an encryption key, a second storage for storing a certificate, a hash storage and circuit components configured to validate, using the first certificate, command(s) adding the encryption key to the first storage and storing a first hash to the hash storage, and to process a request if a second hash in the request is equal to the first hash. | 2014-10-02 |