42nd week of 2011 patent applcation highlights part 59 |
Patent application number | Title | Published |
20110258346 | Method and System for Link Aggregation - The present invention relates to a method and system for link aggregation, in particular, a method for providing Link Aggregation Control between a plurality of systems adapted for Link Aggregation. A method for providing Link Aggregation Control between a plurality of systems adapted for Link Aggregation is provided. The plurality of systems includes a primary system, a first secondary system, and a second secondary system. The primary system comprises first primary ports being linked to first ports of the first secondary system by first links. Further, the primary system comprises second primary ports being linked to second ports of the second secondary system by second links. The method comprises forming a link aggregation group, wherein the link aggregation group includes at least one first link and at least one second link. A preferred system among the secondary systems having links within the link aggregation group is selected and further, the method comprises setting the status of the primary ports according to the selection of the preferred system. | 2011-10-20 |
20110258347 | COMMUNICATIONS SUPPORT IN A TRANSACTIONAL MEMORY - A system, method and computer program product are provided for supporting Transactional Memory communications. In one embodiment, the system comprises a transactional memory host with a host transactional memory buffer, an endpoint device, a transactional memory buffer associated with the endpoint device, and a communication path connecting the endpoint device and host. Input/Output transactions associated with the endpoint device executed in transactional memory on the host are stored in both the host transactional memory buffer and the transactional memory buffer associated with the endpoint device. In an embodiment, the Transactional Memory system further comprises an intermediate device located on the communication path between the host and the endpoint device, and an intermediate transactional memory buffer associated with said intermediate devices. In this embodiment, the Input/Output transactions associated with said endpoint device are stored in the intermediate transactional memory buffer associated with the intermediate device. | 2011-10-20 |
20110258348 | Electronic device having physical switch to select functionality exposed to host computing device - An electronic device has primary and secondary functionalities. The electronic device includes a physical switch to switch between a first mode and a second mode. The electronic device includes logic to, when the electronic device is connected to a host computing device, expose the primary functionality to the host computing device when in the first mode, and expose the secondary functionality to the host computing device when in the second mode. The host computing device typically requires a driver particular to the electronic device when the primary functionality is exposed, and does not typically require a driver particular to the electronic device when the secondary functionality is exposed. The secondary functionality may include acting as a removable storage device storing a text file. The text file may contain information regarding the electronic device, and a user may modify the text file to cause a corresponding action to be performed. | 2011-10-20 |
20110258349 | INFORMATION PROCESSING APPARATUS, PERIPHERAL DEVICE CONTROL METHOD, AND STORAGE MEDIUM - The view language of a specific application can be adaptively switched in response to a language switching request from a user. If the user selects the specific application via a user interface on a peripheral device management screen, it is determined whether view language information having been set matches view language information designated and received as an argument when the specific application is selected. If it is determined that the view language information having been set does not match the view language information designated and received as the argument, view language information set beforehand in a storage unit is replaced by the view language information designated and received as the argument. | 2011-10-20 |
20110258350 | APPARATUS AND METHOD FOR SUPPORTING EXTERNAL MEMORIES IN PORTABLE TERMINAL - An apparatus and method for supporting a plurality of external memories in a portable terminal are provided. The apparatus includes a first memory mounted in a first memory slot, a second memory mounted in a second memory slot, a control unit for creating a list of data items stored in at least one of the external memories and for outputting a command for selecting one of the external memories, and a switching unit for determining and selecting one of the external memories storing next data to reproduce during the reproduction of data included in the list, wherein the switching unit includes a multiplexer to which a command (CMD) interface for issuing a command to the selected external memory and a data (DAT) interface capable of reading/writing stored data are connected. | 2011-10-20 |
20110258351 | Private restricted access email & storage system & method - A private restricted access email & storage system which utilizes a connector for connection to a conventional computer, a flash drive connected to the connector and a micro-controller connected to at least one of the connector and the flash drive and which may, in combination with the permissions and compatibility detected in the conventional computer, enable selected access to the flash drive to perform private email and file access functions. | 2011-10-20 |
20110258352 | Inline PCI-IOV Adapter - A system for enabling input/out virtualization for a device is disclosed. In one embodiment, the system includes a plurality of host CPUs; a multi-root switch connected to each of the plurality of host CPUs via respective buses; and an inline PCI virtualizing device connected to the multi-root switch via a front-side bus and the device via a back-side bus, the inline PCI virtualizing device including a plurality sets of registers, each of the plurality sets of registers accessible by a corresponding host CPU of the plurality of host CPUs and implementing functionalities of the device. | 2011-10-20 |
20110258353 | Bus Arbitration Techniques to Reduce Access Latency - A method of arbitrating requests from bus masters for access to shared memory in order to reduce access latency, comprises looking ahead into currently scheduled requests to the shared memory and predicting latency of the requests based on characteristics of the currently scheduled requests, such as increasing page hit rate, or balancing read and write traffic. The requests are scheduled based at least in part on the predicted latency. | 2011-10-20 |
20110258354 | Methods of Bus Arbitration for Low Power Memory Access - Systems and method for arbitrating requests to a shared memory system for reducing power consumption of memory accesses, comprises determining power modes associated with memory channels of the shared memory system, assigning priorities to the requests based at least in part on the power modes, and scheduling the requests based on the assigned priorities. Latency characteristics and page hit rate are also considered for assigning the priorities. | 2011-10-20 |
20110258355 | MODULAR MASS STORAGE DEVICES AND METHODS OF USING - A modular mass storage device suitable for use with computers and other processing apparatuses. The mass storage device includes a controller board having a system interface connector, a memory controller, a cache device, and a second connector. The mass storage device further includes a daughter board having at least one non-volatile memory device for data storage, a read-only memory device containing firmware of the mass storage device, and a daughter board connector configured to mate with the second connector of the controller board and thereby form command, address and data paths between the memory controller and the memory device of the daughter board. The memory controller and the memory device are configured so that the memory controller reads the firmware of the read-only memory device when the daughter board connector is mated with the second connector of the controller board. | 2011-10-20 |
20110258356 | HOST APPARATUS AND OPERATION SYSTEM AND CONTROL METHOD THEREOF - An operation system module provided by the present invention comprises an interface slot unit, an interface card and a memory card. The interface slot is disposed on a circuit board. In addition, the interface card can be inserted into the interface slot unit. Wherein, the interface card has a memory card slot, so that the memory card can be inserted into the memory card slot. In particularly, an operation system is installed into the memory card, so as to control a host apparatus working. | 2011-10-20 |
20110258357 | SERIAL PORT CONNECTOR WITH POWER OUTPUT FUNCTION - A serial port connector with power output function includes a serial port having a plurality of pins. Under the existing EIA-RS-232, EIA-RS-422, and EIA-RS-485 standards for connectors, the definition of the pins of the serial port are altered, so that a pin that was originally defined as floating or for serial data communication signal is now changed to a power output specification. Thus, when the connector is connected via the same one cable to a serial port peripheral device, the connector can provide both functions of serial data communication signal transmission and power transmission to thereby largely increase the usability of the connector. | 2011-10-20 |
20110258358 | Device and Method for the Automated Detection of an Interface - In a device and a method for the automated detection of an interface between a position-measuring device and sequential electronics that are interconnected via a data-transmission channel, the position-measuring device includes an interface unit and a position-measuring unit. The interface unit is connected first of all to the data-transmission channel, and secondly to the position-measuring unit for the purpose of an internal data exchange. The interface to the sequential electronics is selectable in the interface unit from at least two interfaces. Also disposed in the position-measuring device is an interface-detection unit, which is supplied with at least one input signal that arrives from the sequential electronics via the data-transmission channel, and which includes a device for determining the time sequence of signal edges of the at least one input signal in conjunction with the signal status, as well as an evaluation unit in which the interface used to the sequential electronics is detectable by evaluating the time sequence determined, and is selectable in the interface unit. | 2011-10-20 |
20110258359 | SYSTEMS AND METHODS FOR CONDUCTING COMMUNICATIONS AMONG COMPONENTS OF MULTIDOMAIN INDUSTRIAL AUTOMATION SYSTEM - An improved industrial automation system and communication system for implementation therein, and related methods of operation, are described herein. In at least some embodiments, the improved communication system allows communication in the form of messages between modules in different control or enterprise domains. Further, in at least some embodiments, such communications are achieved by providing a communication system including a manufacturing service bus having two internal service busses with a bridge between the internal busses. Also, in at least some embodiments, a methodology of synchronous messaging is employed. | 2011-10-20 |
20110258360 | Methods and Systems to Accomplish Variable Width Data Input - Disclosed are methods and systems for variable width data input to a pattern-recognition processor. A variable width data input method may include receiving bytes over a data bus having a first width and receiving one or more signals indicating the validity of each of the one or more bytes. The valid bytes may be sequentially provided to a pattern-recognition processor in an 8-bit wide data stream. In an embodiment, a system may include one or more address lines configured to provide the one or more signals indicating the validity of the bytes transferred over the data bus. The system may include a buffer and control logic to sequentially process the valid bytes. | 2011-10-20 |
20110258361 | PETAFLOPS ROUTER - Disclosed is a method and system for performing operations on at least one input data vector in order to produce at least one output vector to permit easy, scalable and fast programming of a petascale equivalent supercomputer. A PetaFlops Router may comprise one or more PetaFlops Nodes, which may be connected to each other and/or external data provider/consumers via a programmable crossbar switch external to the PetaFlops Node. Each PetaFlops Node has a FPGA and a programmable intra-FPGA crossbar switch that permits input and output variables to be configurably connected to various physical operators contained in the FPGA as desired by a user. This allows a user to specify the instruction set of the system on a per-application basis. Further, the intra-FPGA crossbar switch permits the output of one operation to be delivered as an input to a second operation. By configuring the external crossbar switch, the output of a first operation on a first PetaFlops Node may be used as the input for a second operation on a second PetaFlops Node. An embodiment may provide an ability for the system to recognize and generate pipelined functions. Streaming operators may be connected together at run-time and appropriately staged to allow data to flow through a series of functions. This allows the system to provide high throughput and parallelism when possible. The PetaFlops Router may implement the user desired instructions by appropriately configuring the intra-FPGA crossbar switch on each PetaFlops Node and the external crossbar switch. | 2011-10-20 |
20110258362 | REDUNDANT DATA STORAGE FOR UNIFORM READ LATENCY - A memory apparatus ( | 2011-10-20 |
20110258363 | SUB-LUN INPUT/OUTPUT PROFILING FOR SSD DEVICES - Exemplary method, system, and computer program embodiments for profiling input/output (I/O) for solid state drive (SSD) devices in a computing storage environment by a processor device are provided. In one embodiment, a read/write ratio for each of a plurality of data segments classified in a hot category as hot data segments is determined. Each of the plurality of hot data segments is ordered by the read/write ratio in a descending order. Each of a plurality of available SSD devices is ordered by a remaining life expectancy in an ascending order. Those of the plurality of hot data segments are matched with those of the plurality of hot data segments with those of the plurality of available SSD devices such that a hot data segment having a higher read/write ratio is provided to an SSD device having a smaller remaining life expectancy than another hot data segment having a lower read/write ratio. | 2011-10-20 |
20110258364 | CONFIGURABLE MEMORY DEVICE - A method includes forming a memory device through providing an array of non-volatile memory cells including one or more non-volatile memory cell(s) and an array of volatile memory cells including one or more volatile memory cell(s) on a substrate. The method also includes appropriately programming an address translation logic associated with the memory device through a set of registers associated therewith to enable configurable mapping of an address associated with a sector of the memory device to any memory address space location in a computing system associated with the memory device. The address translation logic is configured to enable translation of an external virtual address associated with the sector of the memory device to a physical address associated therewith. | 2011-10-20 |
20110258365 | RAID CONTROLLER FOR A SEMICONDUCTOR STORAGE DEVICE - Provided is a RAID controlled storage device of a PCI-Express (PCI-e) type, which provides data storage/reading services through a PCI-Express interface. The RAID controller typically includes a disk mount coupled to a set of PCI-Express SSD memory disk units, the set of PCI-Express SSD memory disk units comprising: a set of volatile semiconductor memories; a disk monitoring unit coupled to the disk mount for monitoring the set of PCI-Express memory disk units; a disk plug and play controller coupled to the disk monitoring unit and the disk mount for controlling the disk mount; a high speed host interface coupled to the disk monitoring unit and the disk mount for providing high-speed host interface capabilities; a disk controller coupled to the high speed host interface and the disk monitoring unit; and | 2011-10-20 |
20110258366 | STATUS INDICATION IN A SYSTEM HAVING A PLURALITY OF MEMORY DEVICES - Status indication in a system having a plurality of memory devices is disclosed. A memory device in the system includes a plurality of data pins for connection to a data bus. The memory device also includes a status pin for connection to a status line that is independent from the data bus. The memory device also includes first circuitry for generating, upon completion of a memory operation having a first duration, a strobe pulse of a second duration much shorter than the first duration. The strobe pulse provides an indication of the completion of the memory operation. The memory device also includes second circuitry for outputting the strobe pulse onto the status line via the status pin. | 2011-10-20 |
20110258367 | MEMORY SYSTEM, CONTROL METHOD THEREOF, AND INFORMATION PROCESSING APPARATUS - According to the embodiment, a nonvolatile semiconductor memory that includes a plurality of banks capable of operating in parallel, a command analyzing unit that, upon receiving a power management command from a host, analyzes the received power management command, and a recording control unit that dynamically and variably controls an upper limit of the number of banks to be operated in parallel at a time of writing in accordance with an analysis result by the command analyzing unit are included, thereby suppressing the upper limit of a power consumption in accordance with an instruction from the host. | 2011-10-20 |
20110258368 | MEMORY SYSTEM AND OPERATING METHOD THEREOF - A memory system includes a non-volatile memory device including a plurality of pages and a controller connected electrically with the non-volatile memory device and configured to control the non-volatile memory device. The non-volatile memory device is configured to be capable of storing data from a set number of write operations before data erasing with respect to each page; and wherein the controller is configured to divide each page of the non-volatile memory device into first and second areas, to perform a write operation of the first area by the NOP, and to write an invalidation mark in the second area. | 2011-10-20 |
20110258369 | Data Writing Method and Data Storage Device - The invention provides a data writing method for a memory. In one embodiment, the memory comprises a data area and a spare area, the data area comprises a plurality of data blocks storing data, and the spare area comprises a plurality of spare blocks having no data stored therein. First, a write command for writing a write data to a first data block of the flash memory is received from a host. A first spare block with the earliest erase time index is then selected from the spare area. Whether an erase count of the first spare block is less than a first threshold is then determined When the erase count of the first spare block is less than the first threshold, the write data is written to the first spare block. Data is then erased from the first data block to convert the first data block to a spare block. | 2011-10-20 |
20110258370 | MULTIPLE PROGRAMMING OF FLASH MEMORY WITHOUT ERASE - To store, successively, in a plurality of memory cells, first and second pluralities of input bits that are equal in number, a first transformation transforms the first input bits into a first plurality of transformed bits. A first portion of the cells is programmed to store the first transformed bits according to a mapping of bit sequences to cell levels, but, if the first transformation has a variable output length, only if there are few enough first transformed bits to fit in the first cell portion. Then, without erasing a second cell portion that includes the first portion, if respective levels of the cells of the second portion, that represent a second plurality of transformed bits obtained by a second transformation of the second input bits, according to the mapping, are accessible from the current cell levels, the second portion is so programmed to store the second transformed bits. | 2011-10-20 |
20110258371 | METHOD FOR PERFORMING MEMORY ACCESS MANAGEMENT, AND ASSOCIATED MEMORY DEVICE AND CONTROLLER THEREOF - A method for performing memory access management includes: with regard to a same memory cell of a memory, according to a first digital value output by the memory, requesting the memory to output at least one second digital value, wherein the first digital value and the at least one second digital value are utilized for determining information of a same bit stored in the memory cell, and a number of various possible states of the memory cell is equal to a number of various possible combinations of all bit(s) stored in the memory cell; and based upon the at least one second digital value, generating/obtaining soft information of the memory cell, for use of performing soft decoding. An associated memory device and a controller thereof are also provided. | 2011-10-20 |
20110258372 | MEMORY DEVICE, HOST DEVICE, AND MEMORY SYSTEM - A memory device, a host device, and a memory system enable real-time recording of a plurality of files of data while preventing the buffer size of a host device from increasing. A memory device ( | 2011-10-20 |
20110258373 | Memory Module, Memory System,and Information Device - A memory system including ROM and RAM in which reading and writing are enabled. A memory system includes a non-volatile memory (FLASH), DRAM, a control circuit, and an information processing device. Data in FLASH is transferred to SRAM or DRAM in advance. Data transfer between the non-volatile memory and the DRAM can be performed in the background. The memory system including these plural chips is configured as a memory system module in which each chip is mutually laminated and each chip is wired via a ball grid array (BGA) and bonding wire between the chips. Data in FLASH can be read at the similar speed to that of DRAM by securing a region in which the data in FLASH can be copied in DRAM and transferring the data to DRAM in advance immediately after power is turned on or by a load instruction. | 2011-10-20 |
20110258374 | METHOD FOR OPTIMIZING THE MEMORY USAGE AND PERFORMANCE OF DATA DEDUPLICATION STORAGE SYSTEMS - A method and system of optimizing the memory usage and performance of data deduplication storage systems includes organizing the metadata of data blocks needed by deduplicating storage systems. A three level hierarchy is used. Level 1 stores the metadata on disk along with the user data. Level 2 uses low latency storage (e.g. RAM and Solid State Disks) to cache the on-disk meta data for faster direct access. Level 3 organizes the fingerprints using a Trie and is entirely resident in RAM. Thus, the search, to determine whether a data block is unique or not and a candidate for transfer, can be more efficiency executed and to ensure that the meta data is transactionally secure. | 2011-10-20 |
20110258375 | Method and Apparatus for In-Place Hold and Preservation Operation on Objects in Content Addressable Storage - A method and apparatus for performing a hold operation while keeping the data in place as the data is in a hold state. Such a method and apparatus substantially eliminates the need for a copy operation and thus provides advantages cost and management savings. The method and apparatus define a hold delete operation along with hold life points in a CAS system. | 2011-10-20 |
20110258376 | METHODS AND APPARATUS FOR CUT-THROUGH CACHE MANAGEMENT FOR A MIRRORED VIRTUAL VOLUME OF A VIRTUALIZED STORAGE SYSTEM - Methods and apparatus for cut-through cache memory management in write command processing on a mirrored virtual volume of a virtualized storage system, the virtual volume comprising a plurality of physical storage devices coupled with the storage system. Features and aspects hereof within the storage system provide for receipt of a write command and associated write data from an attached host. Using a cut-through cache technique, the write data is stored in a cache memory and transmitted to a first of the plurality of storage devices as the write data is stored in the cache memory thus eliminating one read-back of the write data for transfer to a first physical storage device. Following receipt of the write data and storage in the cache memory, the write data is transmitted from the cache memory to the other physical storage devices. | 2011-10-20 |
20110258377 | DISK ARRAY SYSTEM AND COMMAND PROCESSING METHOD FOR DISK ARRAY SYSTEM - Commands can be issued by being flexibly adjusted to each of an in-band method and an out-of-band method. | 2011-10-20 |
20110258378 | Optimizing a File System for Different Types of Applications in a Compute Cluster Using Dynamic Block Size Granularity - Embodiments of the invention relate to optimizing a file system for different types of applications in a compute cluster using dynamic block size granularity. An exemplary embodiment includes reserving a predetermined number of storage allocation regions for each node in a cluster, wherein each storage allocation region comprises a set of contiguous data blocks on a single storage disk of locally attached storage; using a contiguous set of data blocks on a single storage disk of locally attached storage as a file system's block allocation granularity for striping data to be stored in the file system for a compute operation in the cluster; and using a single data block of a shared storage subsystem as the file system's block allocation granularity for striping data to be stored in the file system for a data access operation in the cluster. | 2011-10-20 |
20110258379 | METHOD AND APPARATUS TO MANAGE TIER INFORMATION - A method of tier management of data comprises performing a tier migration log information setup process which includes selecting an area specified by a virtual volume address and a logical volume address; determining a destination tier for the area based on a number of accesses to the area; and updating a tier migration log information by inputting the determined destination tier and a time; and performing a process using the tier migration log information to determine whether to migrate a specific area which includes loading a tier migration log from the tier migration log information by selecting a specific time; checking if a current tier of the specific area equals a destination tier specified by the tier migration log; and if the current tier is not equal to the destination tier, migrating the specific area to the destination tier. | 2011-10-20 |
20110258380 | FAULT TOLERANT STORAGE CONSERVING MEMORY WRITES TO HOST WRITES - A data storage apparatus and associated method involving a memory with a plurality of storage elements defining an associated set of stored data, and memory control logic that, responsive to a request to store first data in a first storage element of the plurality of storage elements, computes without storing to any of the plurality of storage elements first redundancy data for the associated set of stored data inclusive of the first data. | 2011-10-20 |
20110258381 | DATA DUPLICATION RESYNCHRONISATION - There is provided a method of resynchronising a previous duplication, started at a first time, of a source logical drive on a destination logical drive. The method comprises tracking changes to the data on said source logical drive since said first time and starting a resynchronisation operation at a second time later than said first time. The resynchronisation operation comprises copying data from said source logical drive to said destination logical drive by copying only data which has changed since said first time. By providing such a method, the need to copy data which has not changed since the previous duplication operation is alleviated. This reduces the time and processing required to perform the resynchronisation operation by eliminating unnecessary transfer of data which has not changed since the earlier duplication. | 2011-10-20 |
20110258382 | RAID CONTROLLED SEMICONDUCTOR STORAGE DEVICE - Provided is a RAID controlled storage device of a serial attached small computer system interface/serial advanced technology attachment (PCI-Express) type, which provides data storage/reading services through a PCI-Express interface. The PCI-Express type storage device includes: a memory disk unit which includes a plurality of memory disks provided with a plurality of volatile semiconductor memories; a PCI-Express host interface unit which interfaces between the memory disk unit and a host; and a controller unit which adjusts synchronization of a data signal transmitted/received between the PCI-Express host interface unit and the memory disk unit to control a data transmission/reception speed between the PCI-Express host interface unit and the memory disk unit. The storage device can support a low-speed data processing speed for the host and simultaneously support a high-speed data processing speed for the memory disk unit, so that there are advantages in that the performance of the memory disk can be fully utilized to enable high-speed data processing in an existing interface environment. | 2011-10-20 |
20110258383 | METHOD OF SETTING UP A REDISTRIBUTION SCHEME OF A DIGITAL STORAGE SYSTEM - A method of setting up a redistribution scheme for redistributing digital data packages within a digital data storage system comprising a plurality of nodes, wherein the data packages are associated with respective keys and are distributed among the nodes according to a first distribution configuration within the digital data storage system. The method includes: determining a second distribution configuration, in accordance with which it is intended to redistribute the data packages; applying a migration function to the respective keys of each of the data packages, which function yields a migration value associated with each of the data packages; and assigning a migration time to each of the data packages based on its associated migration value, at which times it is intended to migrate the respective data packages to conformity with the second distribution configuration. A corresponding digital data storage system is described. | 2011-10-20 |
20110258384 | VIRTUAL DISK DRIVE SYSTEM AND METHOD - A disk drive system and method capable of dynamically allocating data is provided. The disk drive system may include a RAID subsystem having a pool of storage, for example a page pool of storage that maintains a free list of RAIDs, or a matrix of disk storage blocks that maintain a null list of RAIDs, and a disk manager having at least one disk storage system controller. The RAID subsystem and disk manager dynamically allocate data across the pool of storage and a plurality of disk drives based on RAID-to-disk mapping. The RAID subsystem and disk manager determine whether additional disk drives are required, and a notification is sent if the additional disk drives are required. Dynamic data allocation and data progression allow a user to acquire a disk drive later in time when it is needed. Dynamic data allocation also allows efficient data storage of snapshots/point-in-time copies of virtual volume pool of storage, instant data replay and data instant fusion for data backup, recovery etc., remote data storage, and data progression, etc. | 2011-10-20 |
20110258385 | VIRTUAL DISK DRIVE SYSTEM AND METHOD - A disk drive system and method capable of dynamically allocating data is provided. The disk drive system may include a RAID subsystem having a pool of storage, for example a page pool of storage that maintains a free list of RAIDs, or a matrix of disk storage blocks that maintain a null list of RAIDs, and a disk manager having at least one disk storage system controller. The RAID subsystem and disk manager dynamically allocate data across the pool of storage and a plurality of disk drives based on RAID-to-disk mapping. The RAID subsystem and disk manager determine whether additional disk drives are required, and a notification is sent if the additional disk drives are required. Dynamic data allocation and data progression allow a user to acquire a disk drive later in time when it is needed. Dynamic data allocation also allows efficient data storage of snapshots/point-in-time copies of virtual volume pool of storage, instant data replay and data instant fusion for data backup, recovery etc., remote data storage, and data progression, etc. | 2011-10-20 |
20110258386 | Partial Block Data Programming And Reading Operations In A Non-Volatile Memory - Data in less than all of the pages of a non-volatile memory block are updated by programming the new data in unused pages of either the same or another block. In order to prevent having to copy unchanged pages of data into the new block, or to program flags into superceded pages of data, the pages of new data are identified by the same logical address as the pages of data which they superceded and a time stamp is added to note when each page was written. When reading the data, the most recent pages of data are used and the older superceded pages of data are ignored. This technique is also applied to metablocks that include one block from each of several different units of a memory array, by directing all page updates to a single unused block in one of the units. | 2011-10-20 |
20110258387 | RAID Array Auto-Initialization (RAAI) Method - A system and method are provided for efficiently initializing a redundant array of independent disks (RAID). The method monitors host write operations and uses that information to select the optimal method to perform a parity reconstruction operation. The bins to which data access write operations have not occurred can be initialized using a zeroing process. In one aspect, the method identifies drives in the RAID array capable of receiving a ‘WriteRepeatedly’ command and leverages that capability to eliminate the need for the RAID disk array controller to provide initialization data for all disk array initialization transfers. This reduces the RAID array controller processor and I/O bandwidth required to initialize the array and further reduces the time to initialize a RAID array. In a different aspect, a method is provided for efficiently selecting a host write process for optimal data redundancy and performance in a RAID array. | 2011-10-20 |
20110258388 | VIRTUAL DISK DRIVE SYSTEM AND METHOD - A disk drive system and method capable of dynamically allocating data is provided. The disk drive system may include a RAID subsystem having a pool of storage, for example a page pool of storage that maintains a free list of RAIDs, or a matrix of disk storage blocks that maintain a null list of RAIDs, and a disk manager having at least one disk storage system controller. The RAID subsystem and disk manager dynamically allocate data across the pool of storage and a plurality of disk drives based on RAID-to-disk mapping. The RAID subsystem and disk manager determine whether additional disk drives are required, and a notification is sent if the additional disk drives are required. Dynamic data allocation and data progression allow a user to acquire a disk drive later in time when it is needed. Dynamic data allocation also allows efficient data storage of snapshots/point-in-time copies of virtual volume pool of storage, instant data replay and data instant fusion for data backup, recovery etc., remote data storage, and data progression, etc. | 2011-10-20 |
20110258389 | VIRTUAL STORAGE METHOD AND DEVICE - A virtual storage method and a device are disclosed. The virtual storage method includes: obtaining a volume management mode of a Logical Unit Number (LUN) from a storage array and recording the volume management mode into stitch data; and constructing a virtual LUN according to the LUN and the stitch data, and mapping the virtual LUN to a host to enable read/write access; and modifying a destination address of an Input/Output (I/O) data packet delivered by the host according to the stitch data after receiving the I/O data packet, delivering the I/O data packet to the virtual LUN, and delivering the I/O data packet which has been delivered to the virtual LUN to the storage array according to the stitch data, where an address of the storage array to which the I/O data packet is delivered is the same as the destination address of the I/O data packet before the destination address of the I/O data packet is modified. | 2011-10-20 |
20110258390 | SYSTEMS AND METHODS FOR MAINTAINING DATA INTEGRITY OF REMOVABLE MEDIA OF AN ELECTRONIC DEVICE - The described embodiments relate generally to methods, systems and devices for maintaining data integrity of a removable media card of a handheld electronic device, particularly when such media card is removed from such device. | 2011-10-20 |
20110258391 | APPARATUS, SYSTEM, AND METHOD FOR DESTAGING CACHED DATA - An apparatus, system, and method are disclosed for destaging cached data. A controller detects one or more write requests to store data in a backing store. The cache controller sends the write requests to a storage controller for a nonvolatile solid-state storage device. The storage controller receives the write requests and caches the data associated with the write requests in the nonvolatile solid-state storage device by appending the data to a log of the nonvolatile solid-state storage device. The log includes a sequential, log-based structure preserved in the nonvolatile solid-state storage device. The cache controller receives at least a portion of the data from the storage controller in a cache log order and destages the data to the backing store in the cache log order. The cache log order comprises an order in which the data was appended to the log of the nonvolatile solid-state storage device. | 2011-10-20 |
20110258392 | METHOD AND SYSTEM FOR PROVIDING DIGITAL RIGHTS MANAGEMENT FILES USING CACHING - A method for providing DRM files using caching includes identifying DRM files to be displayed in a file list in response to a request, decoding a number of first DRM files from among the identified DRM files and caching the first DRM files in a first memory space, and reading the first DRM files in the first memory space in response to the request. Then, a system displays the first DRM files as a file list in a display area. The second DRM files from among the identified DRM files other than the first DRM files are not initially decoded, and file data related to the second DRM files are cached in a second memory space. DRM files from among the second DRM files are subsequently decoded in response to a subsequent command. | 2011-10-20 |
20110258393 | MIRRORED CACHE PROTECTION - Methods of protecting cache data are provided. For example, various methods are described that assist in handling dirty write data cached in memory by duplication into other locations to protect against data loss. One method includes caching a data item from a data source in a first cache device. The data item cached in the first cache device is designated with a first designation. In response to the data item being modified by a data consumer, the designation of the data item in the first cache device is re-assigned from the first designation to a second designation, and the data item with the second designation is copied to a second cache device. | 2011-10-20 |
20110258394 | MERGING DATA IN AN L2 CACHE MEMORY - A method for merging data including receiving a request from an input/output device to merge a data, wherein a merge of the data includes a manipulation of the data, determining that the data exists in a local cache memory that is in local communication with the input/output device, fetching the data to the local cache memory from a remote cache memory or a main memory if the data does not exist in the local cache memory, merging the data according to the request to obtain a merged data, and storing the merged data in the local cache, wherein the merging of the data is performed without using a memory controller within a control flow or a data flow of the merging of the data. | 2011-10-20 |
20110258395 | Preventing Fast Read Before Write in Static Random Access Memory Arrays - A mechanism is provided for enabling a proper write through during a write-through operation. Responsive to determining the memory access as a write-through operation, first circuitry determines whether a data input signal is in a first state or a second state. Responsive to the data input signal being in the second state, the first circuitry outputs a global write line signal in the first state. Responsive to the global write line signal being in the first state, second circuitry outputs a column select signal in the second state. Responsive to the column select signal being in the second state, third circuitry keeps a downstream read path of the cache access memory at the first state such that data output by the cache memory array is in the first state. | 2011-10-20 |
20110258396 | DATA ACCESS AND MANAGEMENT SYSTEM AS WELL AS A METHOD FOR DATA ACCESS AND DATA MANAGEMENT FOR A COMPUTER SYSTEM - The present invention permits improved data access and improved data management in a computer system. To this end, data are divided into individual partial data (F) and stored in cells (Z) of storage devices (C) in such a way that the partial data (F) being accessed and managed are present in the computer system in a redundant manner. Computer units (CL) are able to access the redundantly stored data The fact that they are stored in the storage devices (C) ensures that the computer units (CL) accessing said data are supplied more rapidly. This is achieved in particular owing to the fact that the redundantly stored data are accessed in accordance with parameters of data transmissions between the computer units (CL) and the data storage devices (C) and that, in accordance with said data transmission parameters, the redundantly stored data are moved to and from the data storage devices (C) by corresponding copy and delete operations. | 2011-10-20 |
20110258397 | METHOD OF PROTECTION OF DATA DURING THE EXECUTION OF A SOFTWARE CODE IN AN ELECTRONIC DEVICE - The invention is a method of protecting a data intended to be accessed by an operating system embedded in an electronic device. The operating system is intended to manage an object comprising a header and a body. The data is stored in the body. The object is recorded in a memory of the electronic device. The electronic device comprises a memory manager able to provide access to the memory. The memory manager forbids the operating system to access the body as long as a preset action has not been successfully performed. | 2011-10-20 |
20110258398 | METHODS AND SYSTEMS FOR VECTORED DATA DE-DUPLICATION - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a vectoring method for data de-duplication wherein a stream of data is divided into “data sets” or blocks. For each block, a code, such as a hash or cyclic redundancy code may be calculated and stored. The first block of the set may be written normally and its address and hash can be stored and noted. Subsequent block hashes may be compared with previously written block hashes. | 2011-10-20 |
20110258399 | APPARATUS AND METHOD FOR IDENTIFYING DEVICE TYPES OF SERIES-CONNECTED DEVICES OF MIXED TYPE - A memory controller is unaware of device types (DTs) of a plurality (N) of series-connected memory devices in an interconnection configuration. Possible DTs include, e.g., random access memories and Flash memories. First, the memory controller sends a specific DT (“don't care”) and an initial number of binary code to the first device of the interconnection configuration and the binary code is propagated through the devices. Each device performs a “+1” calculation regardless of the DT. The last device provides the memory controller with Nד+1” from which the memory controller can obtain the number N of devices in the interconnection configuration. Thereafter, the memory controller sends a search number (SN) of binary code and a search DT for DT matching that propagate through the devices. Each device performs DT match determination of “previous match”, “present match” and “don't care match”. Based on the match determination, the SN and search DT are or not modified. The modified or non-modified SN and DT are propagated through the devices. Such processes are repeated. From the propagated SN and DT and the previously recognized number of the devices, the memory controller can identify the DT of each device in the interconnection configuration. | 2011-10-20 |
20110258400 | PARALLEL MEMORY DEVICE RANK SELECTION - A translator circuit translates a memory access conforming to a native FB-DIMM (Fully Buffered Dual In-Line Memory Module) protocol to a memory access for addressing more than two ranks of parallel memory devices. The parallel memory devices are distributed among plural non-fully-buffered DIMMs (Dual In-Line Memory Modules). | 2011-10-20 |
20110258401 | Queuing of conflicted remotely received transactions - Queuing of received transactions that have a resource conflict is disclosed. A first node receives a first transaction from a second node, where the first transaction relates to a resource of the first node. The transaction may be a request relating to a memory line of the first node, for instance. It is determined that a second transaction that relates to this resource of the first node is already being processed by the first node. Therefore, the first transaction is enqueued in a conflict queue within the first node. The queuing may be a linked list, a priority queue, or another type of queue. Once the second transaction has been processed, the first transaction is restarted for processing by the first node. The first transaction is then processed by the first node. | 2011-10-20 |
20110258402 | COMPUTER SYSTEM OR PERFORMANCE MANAGEMENT METHOD OF COMPUTER SYSTEM - This invention provides a system including a computer and a storage-subsystem comprising at least either a first storage area for storing data sent from the computer or a second storage area to be associated with the first storage area, for storing replicated data of data stored in the first storage area. This system includes a replication processing status referral unit for referring to a replication processing status of data of the first storage area and the second storage area to be associated, and an output unit for outputting first performance information concerning data I/O stored in the first storage area, and outputting second performance information concerning data I/O stored in the second storage area together with the first performance information when the replicated data is being subject to replication processing from the first storage area to the second storage area as a result of referring to the replication processing status. | 2011-10-20 |
20110258403 | MEMORY HUB WITH INTEGRATED NON-VOLATILE MEMORY - A method for initializing a memory sub-system is provided. The method includes loading configuration registers of a plurality of memory hubs with the configuration information provided by a respective one of a plurality of embedded non-volatile memories integrated in the respective memory hub. The non-VOLATILE memory is accessed through a first configuration path from a memory controller of the memory sub-system to the non-VOLATILE memory. | 2011-10-20 |
20110258404 | METHOD AND APPARATUS TO MANAGE GROUPS FOR DEDUPLICATION - A storage system comprises one or more pool volumes having chunks for storing data; one or more primary volumes; writable snapshots as virtual volumes for each primary volume which is a common ancestor of the writable snapshots, each primary volume and corresponding writable snapshots being members forming a snapshot group; and a storage controller which includes a processor, a memory storing, for each snapshot group, group information of the members within the snapshot group, and a deduplication module. The deduplication module may identify a snapshot group for deduplication based on the group information and perform deduplication of data for the identified snapshot group in a deduplication area, or perform deduplication of data in a deduplication area which is specified based on the group information of a snapshot group being generated in the storage system. | 2011-10-20 |
20110258405 | METHOD FOR CONTROLLING DATA WRITE TO VIRTUAL LOGICAL VOLUME CONFORMING TO THIN PROVISIONING, AND STORAGE APPARATUS - The virtual volume is a virtual logical volume that conforms to Thin Provisioning, and is a logical volume configured from a plurality of virtual areas and used by a plurality of applications. In a case where the storage apparatus receives a write request comprising write-destination information for identifying a write-destination virtual area in the virtual volume, and, in addition, the write-destination virtual area is an unallocated virtual area, the storage apparatus selects a medium, which corresponds to the write to the write-destination virtual area and/or the identification information of the source of this write, from a plurality of media, which have different performances and which are each configured from two or more real areas, and allocates a real area from the selected medium to the write-destination virtual area. | 2011-10-20 |
20110258406 | STORAGE APPARATUS AND CONTROL METHOD OF STORAGE APPARATUS - A storage apparatus having a plurality of logical volumes, each providing a data storage area to an external device, comprises a storage device providing a physical storage area, and a storage controller creating a plurality of unit physical storage areas from the storage device, operating each of the logical volumes as a virtual volume in which, in response to a data TO request from the external device, the unit physical storage area is added to each of the logical volumes, selecting any one of the logical volumes as a primary volume, selecting any one of the rest of the logical volumes as a secondary volume, the primary volume and the secondary volume being configured as a copy pair in which data in the primary volume can be copied to the secondary volume, in the case that the primary volume receives a discarding request for the unit physical storage area from the external device, determining whether or not the unit physical storage are exists, the unit physical storage area configuring the secondary volume corresponding to the unit physical storage area being a target of the discarding request, and in the case that it is determined that the unit physical storage area configuring the secondary volume exists, transmitting to the secondary volume an instruction for discarding the unit physical storage area assigned to the secondary volume. | 2011-10-20 |
20110258407 | STORAGE SYSTEM AND MANAGEMENT METHOD THEREOF - A storage system having at least two storage apparatuses capable of partitioning an internal resource into logical partitions and managing the logical partitions, and which replicates data written into a primary volume of a primary storage apparatus as the replication source storage apparatus to a secondary volume of a secondary storage apparatus as the replication destination storage apparatus, including: a configuration information sending unit for sending configuration information of the logical partition, to which the primary volume belongs, to the secondary storage apparatus; and a logical partition setting unit for setting the configuration of the logical partition to which the secondary volume belongs based on the configuration information of the logical partition to which the primary volume belongs sent from the configuration information sending unit. | 2011-10-20 |
20110258408 | CREATING A SNAPSHOT BASED ON A MARKER TRANSFERRED FROM A FIRST STORAGE SYSTEM TO A SECOND STORAGE SYSTEM - Storage arrangements including: a first storage system including: a first volume which includes a first data area storing data sent from a computer; and a first processor which stores data sent from the computer in the first volume; a second storage system including: a second volume which includes a second data area; a third volume; and a second processor which is configured to store data sent from the first storage system in the second volume; wherein the first processor transfers the data stored in the first data area of the first volume, to the second storage system, and the second processor stores the data in the second data area of the second volume; and wherein in executing a snapshot, the second processor checks and waits until a local copy control flag of the data that is stored in the second data area, is a predetermined value, before executing the snapshot. | 2011-10-20 |
20110258409 | MEMORY DEVICE, HOST DEVICE, AND MEMORY SYSTEM - A memory device is provided including: a storage section configured to store a content with a time limit for use; an elapsed time counting section configured to count the time limit; a battery section configured to be supplied with power from an external device accessing the time-limited content so as to be charged with power for operating the elapsed time counting section; and a control section configured to include a function of determining an expected time period during which the battery section can sustain the elapsed time counting section operating to count the time limit. | 2011-10-20 |
20110258410 | Selective Management Controller Authenticated Access Control to Host Mapped Resources - An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller. | 2011-10-20 |
20110258411 | STORAGE APPARATUS AND METHOD FOR SHREDDING STORAGE MEDIUM - Provided is a storage apparatus | 2011-10-20 |
20110258412 | COMPUTER SYSTEM, DATA MIGRATION MONITORING METHOD AND DATA MIGRATION MONITORING PROGRAM - A management computer monitors an allocated capacity of a source virtual volume and an allocated capacity of a virtual pool having a storage area allocated to a destination virtual volume in a storage, judges whether the allocated capacity of the source virtual volume can be covered in the virtual pool or not, and informs the user of a result that data migration fails when the allocated capacity of the source virtual volume cannot be covered. When the allocated capacity of the source virtual volume cannot be covered, the management computer uses another storage area to increase the capacity of the virtual pool. Accordingly, when data migration is performed between the virtual volumes, capacities of physical areas allocated to the source virtual volume and the destination virtual volume can be grasped so that the data migration can be performed accurately between the source virtual volume and the destination virtual volume. | 2011-10-20 |
20110258413 | APPARATUS AND METHOD FOR EXECUTING MEDIA PROCESSING APPLICATIONS - An apparatus and method for executing media processing applications in a heterogeneous multicore system are provided. The media processing application executing apparatus includes a configuration deciding unit to decide a configuration for a combination of computational kernels and cores in which the computation kernels are to be executed. The computation kernels are media processing components included in a media processing application. The media processing application executing apparatus also includes an execution unit including multiple heterogeneous cores, to execute the media processing application based on the determined configuration. | 2011-10-20 |
20110258414 | APPARATUS AND METHOD FOR PROCESSING DATA STREAMS - A distributed architecture and method for maintaining the integrity of data streams within a multi-pipelined processing environment. The architecture comprising a communications network for carrying a plurality of data streams and a master processor adapted to process one or more messages in at least one of the data streams, the message processing including the creation of one or more data packets within the stream, each packet encapsulating at least a transaction summary of the data that has been processed. The architecture further comprising at least one slave processor per master processor adapted to emulate the transactional state of the master processor by regenerating the data stream as a result of processing the one or more data packets, whereupon in response to an error event on the master processor, the slave processor acts to avoid interrupting the data stream by generating one or more successive data packet(s). Hence, the architecture and method serve as a high availability, robust fault tolerant system, mitigating against the loss of data within data streams. | 2011-10-20 |
20110258415 | APPARATUS AND METHOD FOR HANDLING DEPENDENCY CONDITIONS - Techniques for handling dependency conditions, including evil twin conditions, are disclosed herein. An instruction may designate a source register comprising two portions. The source register may be a double-precision register and its two portions may be single-precision portions, each specified as destinations by two other single-precision instructions. Execution of these two single-precision instructions, especially on a register renaming machine, may result in the appropriate values for the two portions of the source register being stored in different physical locations, which can complicate execution of an instruction stream. In response to detecting a potential dependency, one or more instructions may be inserted in an instruction stream to enable the appropriate values to be stored within one physical double precision register, eliminating an actual or potential evil twin dependency. Embodiments including a compiler that inserts instructions in a generated instruction stream to eliminate dependency conditions are also contemplated. | 2011-10-20 |
20110258416 | STATICALLY SPECULATIVE COMPILATION AND EXECUTION - A system, for use with a compiler architecture framework, includes performing a statically speculative compilation process to extract and use speculative static information, encoding the speculative static information in an instruction set architecture of a processor, and executing a compiled computer program using the speculative static information, wherein executing supports static speculation driven mechanisms and controls. | 2011-10-20 |
20110258417 | POWER AND THROUGHPUT OPTIMIZATION OF AN UNBALANCED INSTRUCTION PIPELINE - A method includes determining a rate of resource occupancy of a constituent stage of an unbalanced instruction pipeline implemented in a processor through profiling an instruction code. The method also includes performing data processing at a maximum throughput at an optimum clock frequency based on the rate of resource occupancy. | 2011-10-20 |
20110258418 | Load/Move Duplicate Instructions for a Processor - A method includes, in a processor, loading/moving a first portion of bits of a source into a first portion of a destination register and duplicate that first portion of bits in a subsequent portion of the destination register. | 2011-10-20 |
20110258419 | Attaching And Virtualizing Reconfigurable Logic Units To A Processor - In one embodiment, the present invention includes a pipeline to execute instructions out-of-order, where the pipeline has front-end stages, execution units, and back-end stages, and the execution units are coupled between dispatch ports of the front-end stages and writeback ports of the back-end stages. Further, a reconfigurable logic is coupled between one of the dispatch ports and one of the writeback ports. Other embodiments are described and claimed. | 2011-10-20 |
20110258420 | EXECUTION MIGRATION - An execution migration approach includes bringing the computation to the locus of the data: when a memory instruction requests an address not cached by the current core, the execution context (current program counter, register values, etc.) moves to the core where the data is cached. | 2011-10-20 |
20110258421 | Architecture Support for Debugging Multithreaded Code - Mechanisms are provided for debugging application code using a content addressable memory. The mechanisms receive an instruction in a hardware unit of a processor of the data processing system, the instruction having a target memory address that the instruction is attempting to access. A content addressable memory (CAM) associated with the hardware unit is searched for an entry in the CAM corresponding to the target memory address. In response to an entry in the CAM corresponding to the target memory address being found, a determination is made as to whether information in the entry identifies the instruction as an instruction of interest. In response to the entry identifying the instruction as an instruction of interest, an exception is generated and sent to one of an exception handler or a debugger application. In this way, debugging of multithreaded applications may be performed in an efficient manner. | 2011-10-20 |
20110258422 | MICROCOMPUTER - There is a need to provide a microcomputer capable of eliminating an external terminal for endian selection. Flash memory includes a user boot area for storing a program executed in user boot mode and corresponding endian information and a user area for storing a program executed in user mode and corresponding endian information. A data transfer circuit reads endian information stored in the user boot area or the user area in accordance with operation mode and supplies the endian information to a CPU before reset release of the CPU. Accordingly, an external terminal for endian selection can be eliminated. | 2011-10-20 |
20110258423 | COMPUTER PROCESSOR AND METHOD WITH INCREASED SECURITY POLICIES - A computer processor | 2011-10-20 |
20110258424 | Distributive Cache Accessing Device and Method for Accelerating to Boot Remote Diskless Computers - A distributive cache accessing device for accelerating to boot remote diskless computers mounted in a diskless computer equipped with WAN-bootable hardware, such as an iSCSI host bus adapter (HBA), allows to access data required to boot the diskless computers or run application programs thereon from an iSCSI target or other diskless computers having the distributive cache accessing device via a network. The retrieved iSCSI data blocks are temporarily stored in the local distributive cache accessing device. If any other diskless computer requests for the iSCSI data blocks, the temporarily stored iSCSI data blocks can be accessible to the diskless computer. Given installation of large number of diskless computers, the network traffic of the iSCSI target is alleviated and booting remote diskless computer is accelerated. | 2011-10-20 |
20110258425 | BOOT PARTITIONS IN MEMORY DEVICES AND SYSTEMS - The present disclosure includes boot partitions in memory devices and systems, and methods associated therewith. One or more embodiments include an array of memory cells, wherein the array includes a boot partition and a number of additional partitions. Sequential logical unit identifiers are associated with the additional partitions, and a logical unit identifier that is not in sequence with the sequential logical unit identifiers is associated with the boot partition. | 2011-10-20 |
20110258426 | BOOTING AND CONFIGURING A SUBSYSTEM SECURELY FROM NON-LOCAL STORAGE - According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor. | 2011-10-20 |
20110258427 | NAVIGATION DEVICE FOR VEHICLE - A navigation device for a vehicle includes: a memory device including a NAND type flash memory for storing a predetermined program and a boot program and a controller for searching a failure block in the flash memory and managing a corresponding relation between a logic block and a physical block with eliminating failure blocks; a back-up power source; a power source switch for coupling the memory device with the back-up power source; a power source for generating a predetermined voltage with using the back-up power source; a control device energized from the power source with the predetermined voltage so as to be activated; and a power source control device. The control device determines whether activation is performed for the first time. The control device executes a stand-by process, and then, executes a boot process when the activation is performed for the first time. The control device executes the boot process without executing the stand-by process when the activation is after the first time. The power source control device controls the power source to function when the power source control device receives an activation signal from the power source switch. When the power source switch stops the activation signal, the power source control device stops the operation state of the power source. | 2011-10-20 |
20110258428 | DATA PROCESSOR AND DATA PROCESSING SYSTEM - A reset controller is adopted which performs control for causing an external reset terminal to be shared for external output of a reset signal and input of a reset signal from outside, allowing a reset input from the external reset terminal in a state in which a power supply voltage is stable, and causing, when a reset factor due to turn-on of a power supply voltage or a reduction in the level of the power supply voltage is detected by a detection circuit, an input/output buffer to output a reset signal to the external reset terminal and masking the inflow of the reset signal from the input/output buffer to its input path, using a signal detected by the detection circuit. A mask period is assumed to be a period longer than a period from reset instructions to a reset release. | 2011-10-20 |
20110258429 | System and Method for Information Handling System Low Power Network Communications - Low power monitoring of a social networking network location is supported by a wireless networking subsystem running on an information handling system in a reduced power state, such as with a powered down CPU. Instructions executing on the wireless networking subsystem periodically checks a social networking location and issues a notification at the information handling system if an event is detected, such as a new social networking posting. For example, the wireless networking subsystem presents social networking information at the display, or initiates presentation of social networking information by an embedded controller or a messaging operating system kernel having limited functionality that supports presentation of social networking information and limited power consumption. | 2011-10-20 |
20110258430 | METHOD AND APPARATUS FOR APPLYING EXECUTION CONTEXT CRITERIA FOR EXECUTION CONTEXT SHARING - An approach is provided for applying execution context criteria for secure execution context sharing. A criterion application retrieves an execution context of a device. The criterion application determines one or more context criteria associated with the execution context. The context criteria include state information associated with the execution context. The criterion application encrypts the execution context using the one or more context criteria as a public key of an identity-based encryption. | 2011-10-20 |
20110258431 | SYSTEM AND METHOD FOR PROVIDING PREFIXES INDICATIVE OF MOBILITY PROPERTIES IN A NETWORK ENVIRONMENT - An example method includes receiving an Internet protocol (IP) address request in a network and selecting an IP address associated with a prefix that represents an IP subnet. The prefix includes a color attribute to be provided as part of a communication session that includes a plurality of packets. The prefix defines one or more properties associated with an application for the session. The prefix is communicated to a network element in a signaling plane, the prefix is configured to be used to make a routing decision for at least some of the plurality of packets. In more specific embodiments, the method can include applying one or more network policies based on the prefix associated with the IP address. The method could also include decrypting an encryption protocol in order to identify the prefix of a subsequent communication flow, and executing a routing decision based on the prefix. | 2011-10-20 |
20110258432 | METHOD AND SYSTEM FOR RELIABLE PROTOCOL TUNNELING OVER HTTP - The embodiments described herein generally relate to methods and systems for tunneling arbitrary binary data between an HTTP endpoint and an arbitrary destination. Such tunneling of data is valuable in an environment, for example, in which a browser-based client communicates in the HTTP protocol and desires to exchange data with a remote endpoint understanding non-HTTP communications. A relay server is used as a “middle man” to connect the client to the destination, and components supporting the necessary protocols for data exchange are plugged into the relay server. To achieve reliable and ordered transmission of data, the relay server groups sessions through the assignment of session identifiers and tracks the exchange of messages through the assignment of sequence and acknowledgment numbers. Further, the relay server provides for authenticating the HTTP endpoint with the destination and for handling other operations not available in the constrained environment of the Web-based client. | 2011-10-20 |
20110258433 | GATEWAY SUPPORTING TRANSPARENT REDUNDANCY IN PROCESS CONTROL SYSTEMS AND OTHER SYSTEMS AND RELATED METHOD - A method includes synchronizing a first gateway with information from a second gateway. The second gateway operates in a primary role with at least one primary network address. The second gateway communicates with at least one wireless device that uses at least one encryption key during at least one secure communication session. The information includes the at least one encryption key. The method also includes detecting a switchover event at the first gateway. The method further includes, in response to detecting the switchover event, switching the first gateway to the primary role, communicating using the at least one primary network address, and maintaining the at least one secure communication session at the first gateway after the first gateway switches to the primary role. | 2011-10-20 |
20110258434 | ONLINE SECURE DEVICE PROVISIONING WITH UPDATED OFFLINE IDENTITY DATA GENERATION AND OFFLINE DEVICE BINDING - A system for generating new identity data for network-enabled devices includes a whitelist reader configured to extract attributes from a whitelist. The whitelist includes, for each device specified in the whitelist, a previously assigned identifier of the first type. The previously assigned identifiers of the first type are linked to identity data previously provisioned in each of the respective devices. A data retrieval module is configured to receive the identifiers of the first type from the whitelist reader and, based on each of the identifiers, retrieve each of the previously provisioned identity data records linked thereto. A new data generation module is configured to (i) obtain a cryptographic key associated with the identity data previously provisioned in the devices specified on the whitelist and the corresponding identifiers of the first type, (ii) generate new identity data records each linked to a new identifier and (iii) encrypt each of the new identity data records with one of the cryptographic keys and link each new identity data record to the identifier of the first type corresponding to each respective cryptographic key. A data output module is configured to load onto an external source the encrypted new identity data records along with their respective new identifiers and their respective previously assigned identifiers of the first type. | 2011-10-20 |
20110258435 | Threat Mitigation in a Vehicle-to-Vehicle Communication Network - A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication. | 2011-10-20 |
20110258436 | System and Method for Providing Searchable Data Transport Stream Encryption - A packetized transport stream for protecting viewing content from unauthorized access and methods for manufacturing and using same. The transport stream includes a plurality of content frames, each having a frame header and a frame payload. Each frame header includes information for handling the content frame; whereas, the frame payload includes selected viewing content for which protection from unauthorized access is desirable. By encrypting only the frame payload, the header remains unencrypted and can be applied to prepare the encrypted frame payload for presentation. The viewing content thereby can be stored in an encrypted format and can be decrypted on-the-fly as the viewing content is needed for presentation. The combination of the unencrypted frame header and the encrypted frame payload advantageously enables the viewing content to be protected against unauthorized use, copying, and dissemination without impairing the presentation of the viewing content. | 2011-10-20 |
20110258437 | SECURE LOCAL UPDATE OF CONTENT MANAGEMENT SOFTWARE - This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys without the use of a key server. | 2011-10-20 |
20110258438 | System and Method for Providing Different Levels of Key Security for Controlling Access to Secured Items - With files secured by encryption techniques, keys are often required to gain access to the secured files. Techniques for providing and using multiple levels of keystores for securing the keys are disclosed. The keystores store keys that are needed by users in order to access secured files. The different levels of keystores offer compromises between security and flexibility/ease of use. | 2011-10-20 |
20110258439 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. | 2011-10-20 |
20110258440 | SYSTEM AND METHOD OF ENCRYPTING A DERIVATIVE WORK USING A CIPHER CREATED FROM ITS SOURCE - A derivative work is encrypted using a cipher created from digital sources used to create the derivative work. A software application made available for download permits a mix artist to generate a derivative-encrypted work from a derivative work that the mix artist has created using one or more of the digital sources. The derivative-encrypted work is streamed to a worldwide web server, where it is made available for download by consumers for a fee. The software application is also available for download by the consumers and permits the consumers to purchase and download any available derivative-encrypted work. However, the derivative-encrypted works can only be decrypted if the consumer has possession of a digital source for each of the source art works associated with the digital sources used to create the derivative work. | 2011-10-20 |
20110258441 | Secure Access to a Virtual Machine - A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user. | 2011-10-20 |
20110258442 | System and method for secured peer-to-peer broadcast of instantaneous testimony in text format - A method and apparatus for securely broadcasting an instantaneous deposition testimony is provided. The method includes capturing a witness's testimony, authenticating the testimony, transmitting the testimony in instantaneous to authorized subscribers, viewers and participants remotely located from the deposition through a peer-to-peer network connection using the Internet. Accordingly, the invention allows subscribing attorneys to interactively access and save the textual deposition documents, while also allowing interactive communication between the deposing attorney and attorneys or colleagues at the home-office or other remote locations, during the deposition. | 2011-10-20 |
20110258443 | USER AUTHENTICATION IN A TAG-BASED SERVICE - There is provided an exemplary method for accessing a personalized tag-based service using a mobile communication device. The service may be provided by an application server. The exemplary method comprises capturing the tag using a reader unit of the mobile communication device and passing information included in the tag to an application. The exemplary method also comprises generating a service request based on the information with the application, and adding to the service request a security feature, the security feature being generated using information uniquely assigned to a user of the mobile communication device. The service request may be transmitted from the mobile communication device to a certification unit. The exemplary method additionally comprises verifying with the certification unit the security feature included in the service request and confirming the authenticity of the service request to the application server in response to a successful verification of the security feature. | 2011-10-20 |
20110258444 | Network Controller Decryption - A system for selectively transmitting packets involves marking a plurality of packets coming into a transmit queue with an indicator of a packet type. Some packet types may take longer to process than others. For example, packets associated with security protocols may take a longer time to process than those that do not involve security processing. A dispatcher may determine based on the marking of the packet whether it is a security or a non-security packet and may determine when to transmit the packet based on that information. | 2011-10-20 |
20110258445 | Apparatus and method for signaling enhanced security context for session encryption and integrity keys - Disclosed is a method for establishing an enhanced security context between a remote station and a serving network. In the method, the remote station forwards a first message to the serving network, wherein the first message includes an information element signaling that the remote station supports an enhanced security context. The remote station generates at least one session key, in accordance with the enhanced security context, using the information element. The remote station receives, in response to the first message, a second message having an indication that the serving network supports the enhanced security context. The remote station, in response to the second message, has wireless communications protected by the at least one session key. | 2011-10-20 |