44th week of 2009 patent applcation highlights part 58 |
Patent application number | Title | Published |
20090271542 | SYSTEMS, METHODS, AND APPARATUS FOR PIXEL FETCH REQUEST INTERFACE - Presented herein are system(s) and apparatus for a memory access unit for accessing data for a module. The memory access unit comprises an output port for providing access requests for lists of addresses in a memory over a link to a memory controller. | 2009-10-29 |
20090271543 | Storage device with instructions for performing methods of processing I/O requests - The invention classifies volumes (e.g., file systems or LUNS) of a data storage system according to application requirements and allocates space for the volumes on storage devices (e.g., hard disk drives) accordingly. A person such as an IT administrator configures the volumes specifying size, type (e.g., file system or SAN LUN), and priority (e.g., high, medium, low, or archive). The host schedules I/O requests to the storage devices in priority queues using the volume definition to match the application requirements and reduce storage seek time between volumes of different priorities. The host also allocates high performance bands of the storage devices to high performance applications and lower performance bands to lower performance applications. In this manner, the data storage system places data on the band of the storage device that best supports its performance needs. | 2009-10-29 |
20090271544 | APPARATUS AND METHOD FOR WRITING DATA TO RECORDING MEDIUM - A distance calculating unit calculates a distance from a current position on a tape to the end of the tape. A command processing unit receives a write command. If the distance is small, a determining unit sets a usable capacity of a buffer to be equal to a maximum capacity of the buffer. If the distance is large, the determining unit sets the usable capacity of the buffer according to the distance. If a capacity for data indicated by the write command is less than or equal to a difference between the usable capacity and current usage of the buffer, a buffer managing unit stores the data in the buffer. When the command processing unit receives a write FM command, the buffer managing unit reads the data from the buffer, updates the current usage, and a channel input/output unit writes the data to the tape. | 2009-10-29 |
20090271545 | Enqueue event first-In, first-out buffer (FIFO) - In one embodiment, an apparatus comprises a queue, write control logic coupled to the queue and operable in a write clock domain, and a first-in, first-out buffer (FIFO) coupled to the write control logic. The queue is configured to store a plurality of data items, wherein each data item has a type which is one of a plurality of types of data items that can be stored in the queue. The write control logic is configured to maintain write pointers that identify entries in the queue for each of the plurality of types. The write control logic is configured to update the write pointer corresponding to an input type for an input data item written to the queue. Additionally, the write control logic is configured to enqueue a write event in the FIFO to transport the enqueue event to a read clock domain different from the write clock domain. | 2009-10-29 |
20090271546 | Apparatus and method to set a communication speed for a SAS/SATA distance extender - A method to set a communication speed in a Serial-Attached Small Computer System Interface (“SAS”)/Serial-ATA (“SATA”) distance extender apparatus comprising a plurality of supported communication speeds and a local communication speed, a fibre channel interface, a memory, a processor, and a communication bus interconnecting the SAS/SATA Interface, the Fibre Channel interface, the memory, and the processor. The method detects traffic received by the Fibre Channel interface, and determines if the traffic comprises a SAS/SATA Open Address frame If the traffic comprises a SAS/SATA Open Address frame, the method then determines if the local communication speed matches a communication speed utilized by an interconnected remote SAS/SATA Interface. If the local communication speed matches a communication speed utilized by an interconnected remote SAS/SATA Interface, the method transmits the traffic using the local SAS/SATA Interface. | 2009-10-29 |
20090271547 | Target Discovery and Virtual Device Access Control based on Username - This invention is for discovery of a target such as iSCSI and virtual device access control based on a username and its synonyms. Since the same username can be entered from any initiator, the target discovery and virtual device access control will work from any initiator. In other words, this new method will be user-specific instead of being initiator-specific. | 2009-10-29 |
20090271548 | INTERRUPT RESPONSE CONTROL APPARATUS AND METHOD THEREFOR - An interrupt response control apparatus comprises an input for receiving an interrupt request. A response monitoring module is arranged to detect performance of a first function in response to the interrupt request. A timer is used to determine whether a period of time has elapsed, and if the interrupt request has not been serviced by the first function within the elapsed period of time, a function initiation module initiates a second function in response to failure to provide the first function within the elapsed period of time. | 2009-10-29 |
20090271549 | INTERRUPT HANDLING USING SIMULTANEOUS MULTI-THREADING - Disclosed are a method, information processing system, and computer readable medium for managing interrupts. The method includes placing at least one physical processor of an information processing system in a simultaneous multi-threading mode. At least a first logical processor and a second logical processor associated with the at least one physical processor are partitioned. The first logical processor is assigned to manage interrupts and the second logical processor is assigned to dispatch runnable user threads. | 2009-10-29 |
20090271550 | Method and Apparatus for Adding a Communication Connection to a Vectored Group - Methods for adding a communication connection to a vectored group of communication connections and corresponding apparatuses are disclosed. | 2009-10-29 |
20090271551 | EXPANSION STRUCTURE FOR MICROCOMPUTER - An expansion structure for microcomputer includes a case having two end panels; a motherboard being installed in the case and provided with at least a connection port, a central processing unit, a plurality of electronic elements, a storage unit, and a plurality of push keys and external peripheral device connectors accessible at the end panels of the case; an adaptation connector arranged on the motherboard and electrically connected to the connection port, and the adaptation connector having a socket located on one of the end panels of the case; and an expansion interface card having an I/O connector provided along an edge thereof for plugging in the connection port on the motherboard. Desired external peripheral devices may be connected to the adaptation connector and/or the expansion interface card to conveniently achieve the expansion of the functionality of a microcomputer. | 2009-10-29 |
20090271552 | DEVICE INTERFACE MODULE - A computer, such as a portable computer, can include a removable interface module. The module can contain a device having a computer interface. The device can be a radio or a fiber optic communications device, for example. The use of such a module can facilitate repair and reconfiguration of the portable computer in the field. Such computers can be used by military personnel, police, emergency medical personnel, fire fighters, and the like. | 2009-10-29 |
20090271553 | METHOD AND APPARATUS FOR OBTAINING TRACE INFORMATION OF MULTIPLE PROCESSORS ON AN SOC USING A SEGMENTED TRACE RING BUS TO ENABLE A FLEXIBLE TRACE OUTPUT CONFIGURATION - An integrated bus architecture for transmitting trace information from a plurality of processors included on an integrated chip having one or more peripheral I/O channels comprises a segmented bus having a plurality of segments arranged in a ring topology and configured to transmit trace information in a circular pathway from upstream segments to downstream segments, and one or more trace output circuits each connected to a respective segment and each including a switch configured to be dynamically toggled between enabled and disabled states. The plurality of segments includes a respective segment for each processor having a coupling unit connected to a trace port of the processor. The coupling unit is configured to receive trace information from the trace port, to receive trace information from the adjacent upstream segment, and to transmit items of trace information to the adjacent downstream segment. Each trace output circuit is configured to transmit trace information to a respective peripheral I/O channel when in the enabled state. Each trace output circuit is configured to transmit trace information to the adjacent downstream segment when in the disabled state. | 2009-10-29 |
20090271554 | Method and apparatus for data movement in a system on a chip - There is provided a system for comprising a plurality of blocks, each block comprising any hardware element and a plurality of segments for providing interconnection of the plurality of blocks. A segment comprises a connector between multiple blocks and other segments and segments are connected via the ports of blocks or other segments. Communications between blocks is packet based, each packet including at least a destination block. The packet includes at least one of data, packet/message identification and padding. Blocks have an associated address. A block has one or more input ports and one or more output ports. Segments include means for routing packets to destinations. Each block and segment includes properties. Properties include one or more of clocks, bandwidth, bit widths, and latencies. The plurality of segments for multiple packets to be active on different segments. A single segment includes a plurality of ports for multiple packets to be active on different ports of the segment. | 2009-10-29 |
20090271555 | ACCESSING DATA - A method of accessing data in a device comprising: a first integrated circuit having a processor, a memory connected to the processor and a direct memory access engine operatively coupled to the memory and to the microprocessor; a second integrated circuit comprising storage means for holding data values in respective locations, the second integrated circuit being connected to the first integrated circuit via a serial link, the method comprising: the processor generating a plurality of memory access requests independent from one another and supplying a bundle of said independent memory access requests to the direct memory access engine, each memory access request comprising an address of a storage location in the storage means; the direct memory access engine sequentially supplying the memory access requests via the serial link to the second integrated circuit; the second integrated circuit returning a data value responsive to each memory access request and appending to the data value said address of the location where the data value was stored in the storage means; and storing in the memory of the first integrated circuit the returned data value and its appended address. | 2009-10-29 |
20090271556 | CONNECTING MULTIPLE PERIPHERAL INTERFACES INTO ONE ATTACHMENT POINT - An interconnect apparatus is provided for connecting at least one peripheral device to a multi-channel interface. The apparatus includes an incoming connector having a first incoming channel connector and at least one second incoming channel connector, wherein the incoming connector is operable to detachably connect to an interface cable, a first outgoing connector having a first outgoing channel connector, at least one second outgoing connector having at least one second outgoing channel connector, and routing logic operable to propagate a first signal between the first incoming channel connector and the first outgoing channel connector, and to propagate at least one second signal between the at least one second incoming channel connector and the at least one second outgoing channel connector; wherein a position of the first outgoing channel connector in the first outgoing connector corresponds to a position of the at least one second outgoing channel connector in the at least one second outgoing connector. | 2009-10-29 |
20090271557 | Non-volatile memory storage device with high transmission rate - A non-volatile memory storage device with a virtual USB host controller and a PCIe transmission interface is disclosed. The non-volatile memory storage device is a USB client device, although data access from a host apparatus is conducted by the PCIe interface. The virtual USB host controller comprising: a set of Registers, a Finite State Machine and a virtual USB wrapper implements a high speed storage device with USB client device through the PCIe interface. | 2009-10-29 |
20090271558 | PROGRAMMABLE CHANNEL - A programmable channel circuit can include a control circuit having at least one bidirectional I/O terminal, at least one programming terminal, and one or more processing elements, and an interface circuit having first and second field terminals/The interface circuit is coupled to the control circuit via the processing elements. The control circuit can be operable to respond to a programming signal on the programming terminal for automatically selecting one of a plurality of communications modes. The selection couples the bidirectional I/O terminal to the first terminal via one of the processing elements associated with the selected communications mode. | 2009-10-29 |
20090271559 | Method for Storing Individual Data Items of a Low-Voltage Switch - A method is disclosed for storing individual data items of a low-voltage switch provided with a microcontroller triggering unit. According to an embodiment, the ROM cells of a dead microcontroller ROM which are not occupied by a program code memory cells are occupied by the individual data items of the low-voltage switch. | 2009-10-29 |
20090271560 | Dynamic Fix-Up of Global Variables During System BIOS Execution - A method is described for preserving the flexibility associated with relative memory addressing in programs designed to be stored in read-only memory. | 2009-10-29 |
20090271561 | MEDIUM FOR INTEGRATING STORING CAPACITIES OF MULTIPLE STORAGE DEVICES - A medium for integrating storing capacities of multiple storage devices has multiple memory card connectors, a memory card interface management module, a control module and a communication interface. Each memory card connector is used to connect to a memory card. The memory card interface management module is connected to the memory card connectors. The control module is connected to the memory card interface management module and stores a mount and unmount management process. The control module executes the mount and unmount management process to integrate storing capacities of all connected memory cards into a single storing capacity and unintegrate the storing capacity of the impendingly removed memory cards from the storing capacity of all connected memory cards. The communication interface is used to connect to a computer. Therefore, it is convenient for users to change the storing capacity of the medium based on different requirements. | 2009-10-29 |
20090271562 | Method and system for storage address re-mapping for a multi-bank memory device - A method and system for storage address re-mapping in a multi-bank memory is disclosed. The method includes allocating logical addresses in blocks of clusters and re-mapping logical addresses into storage address space, where short runs of host data dispersed in logical address space are mapped in a contiguous manner into megablocks in storage address space. Independently in each bank, valid data is flushed within each respective bank from blocks having both valid and obsolete data to make new blocks available for receiving data in each bank of the multi-bank memory when an available number of new blocks falls below a desired threshold within a particular bank. | 2009-10-29 |
20090271563 | FLASH MEMORY TRANSACTIONING - Providing for improved transactioning for Flash memory is described herein. By way of example, transactioning operations associated with abstract data structures can be bundled into a common layer of a Flash management protocol stack, to reduce transaction redundancy at abstracted layers. In some aspects, the common layer can be a block level layer providing relatively direct access to low level Flash. Thus, a file system or database application, operating at a higher, abstracted layer of the Flash management protocol stack, can offload transactioning operations to a block level process that has access to underlying Flash memory. As a result, increased efficiency, throughput, and added flexibility can be achieved for storage system transactioning. | 2009-10-29 |
20090271564 | STORAGE SYSTEM - A storage system has a storage controller and a flash memory module that is coupled to the storage controller. The storage controller manages the status of a storage area in a flash memory chip of the flash memory module. When a portion of the storage area in the flash memory chip becomes unwritable, the storage controller carries out control so as to use a free storage area as an alternate area for the unwritable storage area, and to store data that has been stored in the unwritable storage area, in the alternate area. | 2009-10-29 |
20090271565 | METHOD OF PROCESSING HARD DISK DRIVE - A method of processing a hard disk drive. The method can include downloading at least two process codes and a main code to a first storage area of the hard disk drive, sequentially performing processes based on the at least two process codes, and installing the main code in a second storage area. | 2009-10-29 |
20090271566 | METHOD FOR CONFIGURING OR RE-CONFIGURING PROGRAMMABLE DEVICE AND APPARATUS ASSOCIATED THEREWITH - A method of configuring a programmable device may include connecting an electronic storage medium to a configuration system with user-friendly input/output capabilities to establish configuration information for the programmable device, which may have limited input/output capabilities. The configuration information may be applied to the programmable device when the electronic storage medium is connected to the programmable device. Additional programmable devices may be configured when connected to the electronic storage medium. Further embodiments of the method and apparatus to provide the programmable device configuration service are also provided. | 2009-10-29 |
20090271567 | METHODS FOR MANAGING BLOCKS IN FLASH MEMORIES - A method for managing blocks in a flash memory is provided, which includes dynamic and static block managing methods. In the dynamic block managing method, a blank block is selected as a swap block for write operation. During each write operation, new data and/or original data in an object block to be operated are written into the swap block, and the object block is erased. Then, a logical address of the object block is changed to be a logical address of the swap block, so that the object block served as the swap block for a next write operation. In the static block managing method, a variable seed parameter is set. Different values of the seed parameter are each associated with a logical address of a respective flash memory block. When the value of the seed parameter varies, data in the flash memory block and the swap block associated to the value of the seed parameter are exchanged, so that the flash memory block associated to the value of the seed parameter becomes the swap block for the next write operation. | 2009-10-29 |
20090271568 | FLASH MEMORY SYSTEM AND DATA WRITING METHOD THEREOF - Provided are a flash memory system and a data reading method thereof, the method including serially reading groups of data and parity codes corresponding to each of the respective groups from a page buffer; calculating the parity for each serially read group; checking for errors in each serially read group by comparing each calculated parity with a corresponding serially read parity code, respectively; and providing an output signal indicative of any comparative parity errors detected, wherein the reading of each group of data is followed by the reading of the parity code for the group, and the checking for errors in each group of data is done during the serial reading operation. | 2009-10-29 |
20090271569 | PARTITIONED MANAGEMENT DATA CACHE - A system and method for decreasing system management data access time. A system includes a device, a cache memory coupled to the device, and a cache memory refresh controller. The device provides system management information. The cache memory stores system management information. The system management information stored in the cache is partitioned into a first portion and a second portion. The cache refresh program refreshes the system management information stored in the cache memory. The first portion is refreshed after expiration of a predetermined refresh time interval. The second portion is refreshed when the second portion is accessed. | 2009-10-29 |
20090271570 | Content-Addressable Memory Lookup Operations with Error Detection - Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with content-addressable memory lookup operations with error detection. Lookup operations are performed on two identical sets of content-addressable memory entries to identify two lookup results. An error detection operation is performed on the highest-priority matching entry of each set of content-addressable memory entries. An overall lookup result is determined based on the lookup and error detection results. | 2009-10-29 |
20090271571 | STORAGE SERVER - A storage server includes a plurality of first disk drives ( | 2009-10-29 |
20090271572 | Dynamically Re-Classifying Data In A Shared Cache - In one embodiment, the present invention includes a method for determining if a state of data is indicative of a first class of data, re-classifying the data from a second class to the first class based on the determination, and moving the data to a first portion of a shared cache associated with a first requester unit based on the re-classification. Other embodiments are described and claimed. | 2009-10-29 |
20090271573 | PARTITIONED MANAGEMENT DATA CACHE - A system and method for decreasing system management data access time. A system includes a device, a cache memory coupled to the device, and a cache memory refresh controller. The device provides system management information. The cache memory stores system management information. The system management information stored in the cache is partitioned into a first portion and a second portion. The cache refresh program refreshes the system management information stored in the cache memory. The first portion is refreshed after expiration of a predetermined refresh time interval. The second portion is refreshed when the second portion is accessed. | 2009-10-29 |
20090271574 | METHOD FOR IMPROVING FREQUENCY-BASED CACHING ALGORITHMS BY MAINTAINING A STABLE HISTORY OF EVICTED ITEMS - The invention provides a method for improving frequency-based caching algorithms by maintaining a stable history of evicted items. One embodiment involves a process for caching data in a cache memory including logical pages including, upon detecting that a first page is being evicted from the cache memory, performing an addition process by adding metadata of the first page to a stable history list. Upon detecting a cache miss for a second page, if the stable history list contains metadata for the second page, then removing the second page metadata from the stable history list and applying a promotion determination for the second page to determine a priority value for the second page metadata and placing the second page in the cache memory based on the priority data. Upon detecting that metadata of a third page is to be evicted from the stable history list, applying an eviction determination to evict metadata of the third page from the stable history list based on a predetermined caching rule. | 2009-10-29 |
20090271575 | CACHE MEMORY, SYSTEM, AND METHOD OF STORING DATA - A cache memory according to the present invention is a cache memory that has a set associative scheme and includes: a plurality of ways, each way being made up of entries, each entry holding data and a tag; a first holding unit operable to hold, for each way, a priority attribute that indicates a type of data to be preferentially stored in that way; a second holding unit which is included at least in a first way among the ways, and is operable to hold, for each entry of the first way, a data attribute that indicates a type of data held in that entry; and a control unit operable to perform replace control on the entries by prioritizing a way whose priority attribute held by the first holding unit matches a data attribute outputted from a processor, wherein when a cache miss occurs and in the case where (i) valid data is held in an entry of the first way among entries that belong to a set selected based on an address outputted from the processor, (ii) all of the following attributes match: the data attribute of the entry; the data attribute outputted from the processor; and the priority attribute of the first way, and (iii) an entry of a way other than the first way does not hold valid data, the entry being one of the entries that belong to the selected set, the control unit is further operable to store data into the entry of the way other than the first way. | 2009-10-29 |
20090271576 | DATA PROCESSOR - There is a need for providing a data processor capable of easily prefetching data from a wide range. A central processing unit is capable of performing a specified instruction that adds an offset to a value of a register to generate an effective address for data. This register can be assigned an intended value in accordance with execution of an instruction. A buffer maintains part of instruction streams and data streams stored in memory. The buffer includes cache memories for storing the instruction stream and the data stream. From the memory, the buffer prefetches a data stream containing data corresponding to an effective address designated by the specified instruction stored in the cache memory. A data prefetch operation is easy because a data stream is prefetched by finding the specified instruction from the fetched instruction stream. Data can be prefetched from a wider range than the use of a PC-relative load instruction. | 2009-10-29 |
20090271577 | PEER-TO-PEER NETWORK CONTENT OBJECT INFORMATION CACHING - In a peer-to-peer network system, a local node communicates with a remote node on which detailed information about content objects resides and optionally, the content objects reside. The local node uses caching, message request resizing and predictive message requesting to speed response time to user requests and internal control node requests. | 2009-10-29 |
20090271578 | Reducing Memory Fetch Latency Using Next Fetch Hint - In one aspect, a processor is provided. The processor may include logic, coupled to the processor, and to issue a currently issued memory fetch over a processor bus. The currently issued memory fetch may include a next fetch hint that may include information about a next memory fetch. | 2009-10-29 |
20090271579 | Storage subsystem and storage system - Provided is a storage subsystem that can reflect, when merging storage update information and local update information, those two kinds of update information in relevant volumes without overlapping the storage update information and the local update information. When reflecting update information in a storage subsystem | 2009-10-29 |
20090271580 | INFORMATION PROCESSING APPARATUS FOR MANAGING HISTORY OF ELECTRONIC INFORMATION - An electronic information format includes a header module and a history module in addition to source electronic information. A control program is incorporated in the header module, and the control program is expanded on a reception side. An operation on the electronic information on the reception side is recorded by the control program, and is written in the history module when the electronic information is closed. On a providing side, there are provided a program for creating electronic information of the present format, and a program for reading the history data from the electronic information. By this system, when the electronic information is provided, an operation, which is executed on the electronic information on the reception side, is recorded, and the record can be confirmed on the providing side. | 2009-10-29 |
20090271581 | SYSTEMS AND METHODS FOR RELIABLY MANAGING FILES IN A COMPUTER SYSTEM - Systems and methods allow for reliably and efficiently managing files stored on a data storage medium associated with a computer system such as a set-top box. The computer system manages a collection of metadata describing each of the files stored on the data storage medium in a memory during operation of the computer system. A current snapshot of the collection of metadata is periodically or otherwise stored to the data storage medium. Following a reboot of the computer system, the collection of metadata can be recovered to the memory from the snapshot of the collection of metadata stored on the data storage medium. | 2009-10-29 |
20090271582 | Information System and I/O Processing Method - First and second storage apparatuses respectively and internally set a remote copy pair for copying data of a first volume to a second volume and associate a third volume with a remote copy pair according to an external command. When an I/O request to the first volume ends in an error, a host computer sends an I/O request directed to the second volume to the second storage apparatus. If the first and the second storage apparatuses detect a failure in the first or the second storage apparatus of the other side or a connection failure between the first and the second storage apparatuses, the first and the second storage apparatuses store in the third volume a failure information flag showing that the failure was detected. | 2009-10-29 |
20090271583 | Monitoring transactions in a data processing apparatus - Apparatus for processing data is provided comprising processing circuitry and monitoring circuitry for monitoring write transactions and performing transaction authorisations of certain transactions in dependence upon associated memory addresses. The processing circuitry is configured to enable execution of a write instruction corresponding to a write transaction to be monitored to continue to completion whilst the monitoring circuitry is performing monitoring of the write transactions and the monitoring circuitry is arranged to cause storage of write transaction data in an intermediate storage element for those transactions for which an authorisation is required. Storage of write transaction data in an intermediate storage element enables the write transaction to be reissued in dependence upon the result of the transaction authorisation although the corresponding write instruction has already completed. | 2009-10-29 |
20090271584 | CONTROLLER OF STORAGE DEVICE, STORAGE DEVICE, AND CONTROL METHOD OF STORAGE DEVICE - A controller of a storage device having a user area storing an operating system, the storage device developing the operating system stored in the user area on a host device in accordance with an access from the host device. The controller includes a user authentication routine storage controlling unit that stores a user authentication routine for executing user authentication before startup of the operating system, in a predetermined area inside the user area, and an access controlling unit that permits access to the predetermined area from the host device when the user authentication routine is used, while prohibiting access to the predetermined area from the host device when the user authentication routine is not used. | 2009-10-29 |
20090271585 | DATA ACCESSING SYSTEM AND RELATED STORAGE DEVICE - A data accessing system includes a host computer and a storage device. The host computer has a first media access control (MAC) address, and the storage device includes a first storage region, a second storage region, and a controller. The first storage region is utilized for storing data. The second storage region stores a second media access control address. The controller couples to the first storage region and the second storage region for executing a security checking function to determine if the host computer is qualified to access the first storage region according to the first media access control address. | 2009-10-29 |
20090271586 | METHOD AND SYSTEM FOR PROVIDING RESTRICTED ACCESS TO A STORAGE MEDIUM - A method of restricting file access is disclosed wherein a set of file write access commands are determined from data stored within a storage medium. The set of file write access commands are for the entire storage medium. Any matching file write access command provided to the file system for that storage medium results in an error message. Other file write access commands are, however, passed onto a device driver for the storage medium and are implemented. In this way commands such as file delete and file overwrite can be disabled for an entire storage medium. | 2009-10-29 |
20090271587 | CONTENT CONTROL SYSTEMS AND METHODS - What is disclosed is a control system which includes an interface configured to receive a content request from a request source wherein the content request identifies content stored on a storage medium. The control system also includes a processing system coupled to the interface and configured to process the content request to determine when the request source is a valid destination for the content based on a first identifier stored with the content on the storage medium and a second identifier provided with the content request. The interface is further configured to transfer the content to the request source when the request source is a valid destination. | 2009-10-29 |
20090271588 | Migrating Program Objects in a Multi-Node Computer System - Embodiments of the invention enable application programs running across multiple compute nodes of a highly-parallel system to selectively migrate objects from one node to another. For example, when an object becomes too large, a node containing the object may migrate the object to another node, thereby freeing memory space. Whether a large object is migrated can be dependent on how frequently the object is used by the application. Because the memory used by such an object is freed for other uses by the application, overall application performance may be improved. On large parallel systems with thousands of compute nodes, even relatively small improvements in application performance an individual compute node may be magnified many times, resulting in dramatic improvements in overall application performance. | 2009-10-29 |
20090271589 | STORAGE VIRTUALIZATION SYSTEM - Storage virtualization systems and methods that allow customers to manage storage as a utility rather than as islands of storage which are independent of each other. A demand mapped virtual disk image of up to an arbitrarily large size is presented to a host system. The virtualization system allocates physical storage from a storage pool dynamically in response to host IO requests, e.g., SCSI I/O requests, allowing for the amortization of storage resources-through a disk subsystem while maintaining coherency amongst I/O RAID traffic. In one embodiment, the virtualization functionality is implemented in a controller device, such as a controller card residing in a switch device or other network device, coupled to a storage system on a storage area network (SAN). The resulting virtual disk image that is observed by the host computer is larger than the amount of physical storage actually consumed. | 2009-10-29 |
20090271590 | METHOD AND SYSTEM FOR LATENCY OPTIMIZED ATS USAGE - Methods and systems for latency optimized ATS usage are disclosed. Aspects of one method may include communicating a memory access request using an untranslated address and also an address translation request using the same untranslated address, where the translation request may be sent without waiting for a result of the memory access request. The memory access request and the address translation request may be made in either order. A translation agent may be used to translate the untranslated address, and the translated address may be communicated to the device that made the memory access request. The translated address may also be used to make the memory access. Accordingly, by communicating the translated address without having to wait for completion of the memory access, or vice versa, the requesting device may reduce latency for memory accesses when using untranslated addresses. | 2009-10-29 |
20090271591 | VECTOR SIMD PROCESSOR - A data processor whose level of operation parallelism is enhanced by composing floating-point inner product execution units to be compatible with single instruction multiple data (SIMD) and thereby enhancing the operation processing capability is made possible. An operating system that can significantly enhance the level of operation parallelism per instruction while maintaining the efficiency of the floating-point length-4 vector inner product execution units is to be implemented. The floating-point length-4 vector inner product execution units are defined in the minimum width (32 bits for single precision) even where an extensive operating system becomes available, and compose the inner product execution units to be compatible with SIMD. The mutually augmenting effects of the inner product execution units and SIMD-compatible composition enhances the level of operation parallelism dramatically. Composition of the floating-point length-4 vector inner product execution units to calculate the sum of the inner product of length-4 vectors and scalar to be compatible with SIMD of four in parallel results in a processing capability of 32 FLOPS per cycle. | 2009-10-29 |
20090271592 | Apparatus For Storing Instructions In A Multithreading Microprocessor - A circuit for selecting one of N requesters in a round-robin fashion is disclosed. The circuit 1-bit left rotatively increments a first addend by a second addend to generate a sum that is ANDed with the inverse of the first addend to generate a 1-hot vector indicating which of the requestors is selected next. The first addend is an N-bit vector where each bit is false if the corresponding requester is requesting access to a shared resource. The second addend is a 1-hot vector indicating the last selected requestor. A multithreading microprocessor dispatch scheduler employs the circuit for N concurrent threads each thread having one of P priorities. The dispatch scheduler generates P N-bit 1-hot round-robin bit vectors, and each thread's priority is used to select the appropriate round-robin bit from P vectors for combination with the thread's priority and an issuable bit to create a dispatch level used to select a thread for instruction dispatching. | 2009-10-29 |
20090271593 | PATCHING DEVICE FOR PATCHING ROM CODE, METHOD FOR PATCHING ROM CODE, AND ELECTRONIC DEVICE UTILIZING THE SAME - An electronic device comprising a ROM, a reprogrammable memory, a processor, and a patching device. The ROM stores a first function starting from a first address, the reprogrammable memory stores a second function starting from a second address, the patching device couples to the ROM and the reprogrammable memory, and the processor couples to the patching device. The patching device receives directive information from the processor and determines whether the processor is going to fetch the first function, and generates and returns a branch instruction to the processor when the processor is going to fetch the first function. After receiving the branch instruction, the processor executes the branch instruction to cause an unconditional jump to the second address and subsequently fetches the second function. | 2009-10-29 |
20090271594 | SEMICONDUCTOR INTEGRATED CIRCUIT, SEMICONDUCTOR INTEGRATED CIRCUIT CONTROL DEVICE, LOAD DISTRIBUTION METHOD, LOAD DISTRIBUTION PROGRAM, AND ELECTRONIC DEVICE - A damage control unit includes: a switching judgment unit to judge the CPU configuration which performs smoothing of the damage ratio, according to the damage ratio of the CPUs; and a switching unit to perform switching of I/O signals of all the CPUs. The switching judgment unit observes the damage ratio calculated from values such as the temperature, voltage, current consumption amount, operation ratio, the number of accesses to the resources in the CPU, at all times or at some extent of time intervals and notifies the switching unit of the CPU configuration to be changed by using the calculation method for smoothing the damage ratio of each CPU. The switching unit makes a connection to the I/O signals of all the CPUs and a system bus and switches the I/O signal of the CPU to be switched according to the notification from the switching judgment unit. | 2009-10-29 |
20090271595 | Configuring An Application For Execution On A Parallel Computer - Methods, systems, and products are disclosed for configuring an application for execution on a parallel computer that include: booting up a first subset of a plurality of nodes in a serial processing mode; booting up a second subset of the plurality of nodes in a parallel processing mode; profiling, prior to application deployment on the parallel computer, the application to identify the serial segments and the parallel segments of the application; and deploying the application for execution on the parallel computer in dependence upon the profile of the application and proximity within the data communications network of the nodes in the first subset relative to the nodes in the second subset. | 2009-10-29 |
20090271596 | Executing An Application On A Parallel Computer - Methods, systems, and products are disclosed for executing an application on a parallel computer having a plurality of nodes. Executing an application on a parallel computer includes: booting up a first subset of a plurality of nodes in a serial processing mode; booting up a second subset of the plurality of nodes in a parallel processing mode; profiling, prior to application execution, an application to identify serial segments of the application, parallel segments of the application, and application data utilized by each of the serial segments and the parallel segments; and executing the application on the plurality of nodes, including migrating, in dependence upon the profile for the application upon encountering the parallel segments during execution, only specific portions of the application and the application data from the nodes booted up in the serial processing mode to the nodes booted up in the parallel processing mode. | 2009-10-29 |
20090271597 | Branch Prediction In A Computer Processor - Methods, apparatus, and products for branch prediction in a computer processor are disclosed that include: recording for a sequence of occurrences of a branch, in an algorithm in which the branch occurs more than once, each result of the branch, including maintaining a pointer to a location of a most recently recorded result; resetting the pointer to a location of the first recorded result upon completion of the algorithm; and predicting subsequent results of the branch, in subsequent occurrences of the branch, in dependence upon the recorded results. | 2009-10-29 |
20090271598 | APPARATUS, SYSTEM, AND METHOD FOR ADAPTER CODE IMAGE UPDATE - An apparatus, system, and method are disclosed for updating a code image for a communication adapter. The apparatus includes a save module, an update module, and a restore module. The save module saves configuration data associated with a connection at a communication adapter. The update module updates a code image on the communication adapter. The restore module restores the configuration data in response to the code image update. Advantageously, the apparatus eliminates the need for conventional host recovery, including relogin and reestablishment of paths and connections, after the code image update. | 2009-10-29 |
20090271599 | METHOD FOR SETTING TO ENABLE OR DISABLE SOFTWARE FUNCTION - A method for setting to enable or disable a software function is provided. The method is suitable for setting each hardware relevant software function in a system to either “enable” or “disable.” First, a customized database, which includes a specification required data of the hardware to decide to enable or disable the relevant software function, is established. Then, the specification required data is read from the customized database. Afterwards, a hardware configuration key is established according to the specification required data. Finally, the hardware configuration key is written to a registry of the system, so as to set the software function to either “enable” or “disable” according to the registry. | 2009-10-29 |
20090271600 | METHOD OF USING AN INFORMATION HANDLING SYSTEM HAVING A BOOT FILE, AND AN INFORMATION HANDLING SYSTEM AND MACHINE-EXECUTABLE CODE FOR CARRYING OUT THE METHOD - An information handling system and a method of using it can allow the information handling system to be started or restarted and have an operating system loaded, even if a boot variable within a persistent memory is currently invalid. The method can detect and determine a hardware path name to a new drive that has an operating system. The new drive can have a relative path name to boot entries that include a pointer to a boot file. The boot file can be executed to run a boot loader that loads the operating system. During loading of the operating system, other boot entries within the drive can provide boot parameters. The boot variable within persistent memory, and potentially the relative path name or boot parameter(s) can be updated on the new drive. In a particular embodiment, the information handling system can include a unified extensible firmware interface (UEFI). | 2009-10-29 |
20090271601 | METHOD, DEVICE, AND SYSTEM FOR PRE-MEMORY SYMMETRIC MULTIPROCESSING FLOW - A cache-as-RAM (CAR) system of a multi-processor system that includes a plurality of processors may be initialized. The CAR system may assign a physical data address range for each of the plurality of processors such that the physical data address ranges allocated to all of the plurality of processors overlap with each other. A boot code stream may be executed with the CAR appearing to the executing boot stream as a memory store for executing the boot code stream. Other embodiments are described and claimed. | 2009-10-29 |
20090271602 | Method for Recovering Data Processing System Failures - A method for recovering from software and/or hardware failures occurred in a data processing system is disclosed. A current version of boot code and an updated version of boot code are stored in a first memory region and a second memory region, respectively, of a non-volatile memory of the data processing system. The updated version of boot code is periodically replaced by a latest version of boot code downloaded from a support center. After an occurrence of a system crash, a determination is made if the system crash was caused by a known problem that can be remedied by the updated version of boot code. If so, the data processing system is rebooted using the updated version of boot code. Otherwise, data related to the system crash is collected, and the data processing system is rebooted using the current version of boot code. | 2009-10-29 |
20090271603 | EMBEDDED SYSTEM AND STARTUP METHOD THEREOF - An embedded system includes a controller and a memory. The memory includes a primary firmware module, a backup firmware module, and a boot loader module. The primary firmware module has a primary firmware id_address. The backup firmware module has a backup firmware id_address. The boot loader module has a boot loader id_address. The controller is capable of activating the boot loader module to check status of the primary firmware module via the primary firmware id_address. Upon the condition that status of the primary firmware module is ok, the controller is capable of activating the primary firmware module. Upon the condition that status of the primary firmware module is not ok, the controller is capable of activating the backup firmware module via the backup firmware id_address. | 2009-10-29 |
20090271604 | APPARATUS AND METHOD TO DRIVE DEVICES - A device driving apparatus includes a storage unit to store a plurality of device driving programs, a plurality of devices to receive the plurality of device driving programs, and a switching unit to transfer the plurality of device driving programs. | 2009-10-29 |
20090271605 | METHOD AND APPARATUS FOR RESTORING SYSTEM USING VIRTUALIZATION - A method and apparatus to restore a system using virtualization, the method including: if a system restoration at a target restoration time point from among at least one restoration time points is requested, generating a virtualization layer; if a use of a system is requested by an application layer, accessing the target restoration time point using the virtualization layer; and performing a system restoration at the accessed target restoration time point. | 2009-10-29 |
20090271606 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING SYSTEM - According to one embodiment, an information processing device includes an acquisition module configured to get information for executing an authentication process and information on power-on security policy, from a server connected to a network during power-on, a storage module configured to store the information on power-on security policy in a storage device, an authentication module configured to execute the authentication process by using the information for executing the authentication process, a boot module for executing a process of booting an operating system, when the authentication process has succeeded, and a power-on security policy execution module configured to execute a process which is based on a power-on security policy stored in the storage device, when the information for executing the authentication process and the information on power-on security policy cannot be got. | 2009-10-29 |
20090271607 | Method and Apparatus for Dynamic Provisioning in Data Processing Environment - Techniques are disclosed for the dynamic introduction of new components to be used during provisioning of solutions in data processing system environments such as service delivery environments. For example, in a provisioning system that manages provisioning of components in a data processing system, an automated method of dynamically provisioning one or more new components in the data processing system comprises the provisioning system performing the following steps. The provisioning system accepts a registration of a new component during a runtime period of the data processing system, wherein the new component has not been previously registered in the data processing system prior to the runtime period, and further wherein the registration comprises obtaining information relating to at least one of one or more prerequisites and a configuration associated with the new component. The provisioning system causes a modification to the data processing system by enabling use of the registered new component therein. | 2009-10-29 |
20090271608 | Temperature Threshold Application Signal Trigger for Real-Time Relocation of Process - A method of managing a process relocation operation in a computing system is provided and includes determining respective operating temperatures of first, second and additional nodes of the system, where the first node has an elevated operating temperature and the second node has a normal operating temperature, notifying first and second kernels respectively associated with the first and second nodes, of a swapping condition, initially managing the first and second kernels to swap an application between the first and the second nodes while the swapping condition is in effect, and secondarily managing the first and second kernels to perform a barrier operation to end the swapping condition. | 2009-10-29 |
20090271609 | SYSTEM AND METHOD FOR TRANSFERRING USER PREFERENCES - A system and method for customizing a device includes identifying a user of a device and determining a profile for the user of the device from a network. The profile includes a record of at least one user preference for a type of the device. The profile is translated to a configuration of the device. The device is modified according to the configuration to permit use of the device with the at least one user preference. | 2009-10-29 |
20090271610 | Multi-Function Apparatus and Method of Restricting Use of Multi-Function Apparatus - A multi-function apparatus which has plural functions includes: an authentication information acquiring unit which acquires authentication information on a user desiring to use the functions by use of an authentication information inputting unit; a use restriction unit which determines whether the user desiring to use the functions has use authority on the basis of the acquired authentication information, and permits the user to use the functions on condition of determining that the user has the use authority; an operation determination unit which determines whether at least one of the authentication information inputting unit, the authentication information acquiring unit, and the use restriction unit normally operates; and a setting change unit which changes setting of the use restriction unit on the basis of an input from the user by executing transfer to a setting change mode on condition that an operation of the transfer to the setting change mode is executed by the user, when the unit determined not to normally operate is present. | 2009-10-29 |
20090271611 | SYSTEM AND METHOD OF MANAGED CONTENT DISTRIBUTION - A system and method of managing content distribution is disclosed. The system and method comprise at least one first user interface for publishing content to one or more web servers, at least one application server for generating a set of instructions describing one or more parameters for downloading said content, and at least one second user interface for receiving said set of instructions from the application server and downloading said content, wherein the at least one second user interface uses said set of instructions to determine which of the one or more web servers the content should be downloaded from. | 2009-10-29 |
20090271612 | METHOD, SYSTEM AND DEVICE FOR REALIZING MULTI-PARTY COMMUNICATION SECURITY - A method for realizing multi-party communication security includes: performing identification authentication and negotiating to create an initiation session through running the transport layer security protocol or datagram transport layer security protocol by a Group Control and Keying Server and a group member device; distributing a group session and a rekeying session to the group member device through running a group key management sub-protocol on the Group Control and Keying Server and the group member devices; rekeying through running the group key management sub-protocol on the Group Control and Keying Server and the group member devices, when a rekeying event is detected by the Group Control and Keying Server. A relevant multi-party communication security system and a device are further provided in the present invention. | 2009-10-29 |
20090271613 | METHOD AND SYSTEM FOR PROVIDING NON-PROXY TLS/SSL SUPPORT IN A CONTENT-BASED LOAD BALANCER - Methods and systems for providing non-proxy Secure Sockets Layer and Transport Layer Security (SSL/TLS) support in a content-based load balancer are described. A Transmission Control Protocol (TCP) connection is accepted from a client, and an SSL/TLS connection is established with the client such that random data used in key generation is created. A request is received from the client, and the request is decrypted. The request is processed, a target stack is selected, and the TCP connection, the SSL/TLS connection, and the random data are transferred to the selected target stack such that the client and selected target stack maintain an end-to-end TCP connection with a non-proxy SSL/TLS connection. | 2009-10-29 |
20090271614 | MOBILITY ARCHITECTURE USING PRE-AUTHENTICATION, PRE-CONFIGURATION AND/OR VIRTUAL SOFT-HANDOFF - In some illustrative embodiments, a novel system and method is provided that can, for example, extend concepts of pre-authentication (such as, e.g., IEEE 802.11i pre-authentication) so as to operate across networks or subnetworks (such as, e.g., IP subnets). In preferred embodiments, a novel architecture includes one or both of two new mechanisms that substantially improve, e.g., higher-layer handoff performance. A first mechanism is referred to as “pre-configuration,” which allows a mobile to pre-configure higher-layer information effective in candidate IP subnets to handoff. A second mechanism is referred to as “virtual soft-handoff,” which allows a mobile to send or receive packets through the candidate IP subnets even before it is actually perform a handoff to any of the candidate IP subnets. | 2009-10-29 |
20090271615 | BRIDGING SYSTEM, BRIDGE, AND BRIDGING METHOD | 2009-10-29 |
20090271616 | Method for transferring encoded messages - Disclosed is a method for transferring encoded messages between at least two users, particularly cryptographic protocol, the message transaction taking place by inserting an authentication device which decodes the messages received from the users and sends especially encoded messages to the users. Said method comprises the following steps: a1) the user (A) sends a message (NA | 2009-10-29 |
20090271617 | PRIVACY PROTECTED COOPERATION NETWORK - A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft. | 2009-10-29 |
20090271618 | ATTESTATION OF COMPUTING PLATFORMS - A method and apparatus for attesting the configuration of a computing platform to a verifier. A signature key (SK) is bound to the platform and bound to a defined configuration of the platform. A credential (C(SK), C | 2009-10-29 |
20090271619 | External storage apparatus and method of preventing information leakage - Proposed is an apparatus and method of preventing the leakage of information from an external storage apparatus even when such external storage apparatus is stolen or accessed from an unauthorized host computer. This external storage apparatus accessible from a host computer or another external storage apparatus via a network encrypts or decrypts data written from a host computer to be stored in the storage area, sends a request for existence confirmation to the host computer or the other external storage apparatus every predetermined period of time, and zeroizes an encryption key to be used in the encryption calculation for encrypting or decrypting data to be performed by the encryption calculation unit based on the result of a response from the host computer or the other external storage apparatus in reply to the request. | 2009-10-29 |
20090271620 | TECHNIQUES FOR SECURE DATA MANAGEMENT IN A DISTRIBUTED ENVIRONMENT - Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users. | 2009-10-29 |
20090271621 | SIMPLIFIED LOGIN FOR MOBILE DEVICES - Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials. | 2009-10-29 |
20090271622 | Securing Wireless Body Sensor Networks Using Physiological Values for Nonces - A key establishment protocol for securing wireless body sensor networks using environmental data for nonce values. To establish a secure communication between sensors in a sensor network using environmental data, the protocol measures a first environmental value at a first sensor and a trusted third party. A second environmental value is measured at a second sensor and the trusted third party. The trusted third party then sends to the second sensor a first authentication construct comprising the second environmental value, wherein the second environmental value is used by the second sensor to prevent replay attacks of messages between the trusted third party and second sensor. The trusted third party also sends to the first sensor a second authentication construct comprising the first environmental value, wherein the first environmental value is used by the first sensor to prevent replay attacks of messages between the trusted third party and first sensor. | 2009-10-29 |
20090271623 | Intersystem mobility security context handling between different radio access networks - A method and apparatus for intersystem mobility security context handling between different radio access networks which can include a receiver configured to receive a tracking area update message from a user terminal. The message can include a first key identifier configured to identify a mapped security context and a second key identifier configured to identify a cached security context. A verifier can be configured to verify the tracking area update message with a key identified by the first or second key identifier. | 2009-10-29 |
20090271624 | Authentication method, system, server, and user node - The embodiments of the present disclosure disclose an authentication method, a system, a server, and a user node are disclosed herein. The method includes: generating, by a server, a server session key according to the identity information, at least one login information parameter, and the validity period included in the login information, generating at least one session key parameter of a user node according to the generator point of the algebraic curve, and sending at least one session key parameter of the user node to the user node; generating, by the user node, a user node session key according to at least one session key parameter of the user node; performing, by the server and the user node, mutual authentication according to the session keys. The authentication solution under the present disclosure is simple and practicable, and is also applicable to authenticating the user node in a grid computing platform. | 2009-10-29 |
20090271625 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY GENERATION AND USE FOR SERVICE ACCESS - A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link. | 2009-10-29 |
20090271626 | METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS IN COMMUNICATIONS SYSTEMS - A method of providing secure communications between a base station, a relay station, and a mobile station in a communication network includes authenticating the mobile station over the communication network; generating, by the base station, security material, wherein the security material comprises at least one of a traffic encryption key (TEK) and a message authentication code key (MACK); transmitting, by the base station, the security material to the mobile station; and transmitting, by the base station, the security material to the relay station. | 2009-10-29 |
20090271627 | Secure Data Transmission - A method of facilitating secure sending of a message from a sender to a recipient over a network, comprising establishing communication between a sender side and a recipient trusted server having knowledge of an encryption key of recipient; obtaining a messaging key comprising a messaging encryption key and a messaging decryption key; exchanging messaging key data between sender side and recipient trusted server such that sender side has knowledge of the messaging encryption key and recipient trusted server has knowledge of the messaging decryption key; encrypting messaging decryption key with recipient's encryption key by recipient trusted server; transmitting messaging decryption key encrypted by recipient's encryption key from recipient trusted server to sender side, and transmitting messaging decryption key encrypted by recipient's encryption key from sender side to recipient and transmitting the message encrypted by messaging encryption key directly from sender side to recipient. | 2009-10-29 |
20090271628 | METHOD AND SYSTEM FOR KEY EXCHANGE AND METHOD AND APPARATUS FOR REDUCING PARAMETER TRANSMISSION BANDWIDTH - The embodiments of the present disclosure disclose a method and apparatus for reducing the parameter transmission bandwidth. The parameter sender reduces the values of the parameters before sending the parameters to the parameter receiver. This scheme reduces the bandwidth consumed during parameter transmission, thus makes the transmission more efficient. The embodiment of the present disclosure also discloses a method for key exchange. This method reduces the values of the transmission parameters before sending the transmission parameters. This saves the bandwidth compared with the protocol in the prior art. Besides, the embodiment of the present disclosure discloses a system for key exchange. The parameter sender sends the transmission parameters to the bandwidth processing unit. The bandwidth processing unit performs a modulo operation on the received transmission parameters and then sends the processed transmission parameters to the parameter receiver, thus reducing the bandwidth consumed in the transmission of transmission parameters. | 2009-10-29 |
20090271629 | WIRELESS PAIRING CEREMONY - A security token is coupled to a computer and is available for use by both local and remote processes for on-demand response to a challenge. To minimize the security risk of an unattended session, the challenge may be issued to verify the presence of the token. When the token has a user interface, it may be used in conjunction with the computer to require that a user also participate in transferring displayed data between the token and computer. This helps to ensure that not only the token, but the user are both present at the computer during operation. For the most sensitive operations, such a confirmation may be required with each data submission. | 2009-10-29 |
20090271630 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND TERMINAL DEVICE - Provided are an authentication method, authentication system and a terminal device in which the authentication of a non-participating third node is can be simplified and can be executed in the case of multicast by using an authentication ticket in a distributed processing network system, the non-participating third node being intended to access each of the nodes, including a first and a second node, constituting a workgroup. The first node that has already participated in the workgroup authenticates the third node intended to participate in the workgroup and issues the authentication ticket including the signatures of both nodes, and when the authentication ticket is submitted to the second node, the second node permits the third node to access, without password-based-authentication, by authenticating the first node and the second node which have signed the authentication ticket. | 2009-10-29 |
20090271631 | ELECTRONIC SIGNATURE SYSTEM AND ELECTRONIC SIGNATURE VERIFYING METHOD - A key creating device creates a first public key and a first secret key of the electronic signature method satisfying the noncounterfeitability and a second public key and the first secret key of the chameleon commitment method. The signature device generates a commitment, a first random number according to the Com algorithm, and a first signature by using the first secret key. The signature device further generates a second random number according to the Cam algorithm by using the message written by adding a first signature to an object message, and creates an electronic signature by combining the first signature and the second random number. A verifying device receives the signed message written by adding the first signature included in the electronic signature to the object message, creates a commitment according to the ComVer algorithm, and performs verification by using the commitment and the first signature. | 2009-10-29 |
20090271632 | SECRET AUTHENTICATION SYSTEM - Authentication data indicating authenticity of a client is distributed into a plurality of function data as distributed data, the plurality of function data including function data specifying a function and rule data specifying the authentication data from the function. The client and a server shares a portion of the plurality of function data. The client calculates verification data from the function data unshared with the server, by performing a calculation process difficult for a third party to calculate the function data, and transmits the verification data to the server. The server verifies authenticity of the client based on the authentication data and distributed data per client stored therein, and the verification data received from the client. | 2009-10-29 |
20090271633 | Data Access and Identity Verification - A user access interface for a processor device comprises a control program adapted to receive a first access data indicative of a first access key, so that upon receiving the first access data the control program causes the database to be interrogated, thereby obtaining a first verification data that is indicative of access verification for one or more accessible services associated with the first access data, the physical access key and a respective registered first user. | 2009-10-29 |
20090271634 | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens - Techniques, systems and methods are described relating to combining biometric and cryptographic techniques to support securely embedding data within a token and subsequent biometrically-enabled recovery of said data. Various transformation approaches are described that provide a secure means for transforming a stored or live, secure biometric-based identity token, embedding data into such tokens and biometric-based matching to both verify the user's identity and recover the embedded data. Security enhancements to a range of existing protocols are described using the techniques. Systems using novel protocols based on these techniques are described | 2009-10-29 |
20090271635 | METHODS AND SYSTEMS FOR AUTHENTICATION - The present invention discloses a method and system for authentication. The method for authentication includes: acquiring the privilege security level corresponding to a client-end; inquiring the identity security level corresponding to the privilege security level according to an established relation of association between privilege security level and identity security level; determining the authentication parameters for identity authentication according to the identity security level; performing identity authentication on the client-end using the authentication parameters; and obtaining an authentication result. The identity authentication and privilege authentication are combined, and identity authentication is performed according to the identity security level in accord with the privilege security level so that rules of identity authentication can be adjusted, and the flexibility of the process of authentication may be improved. | 2009-10-29 |
20090271636 | COMPUTER ENABLED SECURE STATUS RETURN - Computer related method and apparatus to transmit a logical value (e.g., 1 or 0) between two entities, such as an operating system and application program, in a secure way in an insecure environment. The logical status is sent by in effect encrypting it using two random numbers, one from each entity, before sending it to the other entity. However the encrypting is much “lighter” (requiring much less computer or circuit resources) than any conventional secure cipher and has a built-in verification feature. | 2009-10-29 |
20090271637 | INFORMATION PROCESSING TERMINAL AND STATUS NOTIFICATION METHOD - The present invention aims at providing an information processing terminal, a status notification system, and a status notification method that can protect both privacy and security when a status of the information processing terminal is notified to a server. An information processing terminal | 2009-10-29 |
20090271638 | Storage system with an encryption function - To reduce the performance degradation of storage system, this invention provides a storage system comprising a disk drive and a disk controller. The disk controller provides a storage area of the disk drive to a host computer; executes a processing of switching an encryption key that is used to encrypt data stored in the logical volume from a first encryption key to a second encryption key; encrypts write data requested to be written with the second encryption key when the write request for one of storage areas within the logical volume that stores data for which switching of encryption keys has not been finished is received while the encryption key switching processing is being executed; and writes the encrypted write data in the logical volume to switch encryption keys for data stored in the storage area where the data is requested to be written by the received write request. | 2009-10-29 |
20090271639 | Personal Wireless Network Power-Based Task Distribution - Apparatus and method for dynamically reassigning between a plurality of personal portable devices in a wireless network one or more task portions of a task that have been distributed among the personal portable devices in response to at least one of the personal portable devices having diminishing access to electric power. A reassignment may be prompted by the remaining electric power available to one of the personal portable devices diminishing to a predetermined level, and/or it may be prompted as a result of a goal of causing the remaining operating times of the personal portable devices engaged in performing the task to be as close to equal as possible. A reassignment may be prompted by the remaining electric power available to one of the personal portable devices being changed either by the coupling of that personal portable device to an external power supply or by a suspension of execution of a task routine associated with a task portion that had been assigned to that personal portable device. A reassignment of a particular task routine between two of the personal portable devices may be forestalled as a result of it being impermissible to transmit a copy of a task routine associated with a task portion and/or a piece of data associated with that task routine from one of the two personal portable devices to the other. A task portion reassigned between two personal portable devices may be associated with communications between personal portable devices and its reassignment may result in a changing in topological positions of the two personal portable devices within the topology of the wireless network. | 2009-10-29 |
20090271640 | Storage device and method of starting the same - An OOB sequence monitoring unit detects that an OOB sequence carried out between a base device as a superior device and a connection I/F which operates even if an extension device is in a standby state has proceeded to a given stage. Based on the detection by the OOB sequence monitoring unit, a power supply control unit instructs a starting power supply unit to supply power. When the extension device starts, the OOB sequence is carried out between the extension device and the connection I/F of another extension device in the same manner. As a result, extension devices are started in decreasing order from the extension device closest to the superior device. | 2009-10-29 |
20090271641 | Method and apparatus for quick resumption - When transitioning from sleep mode to active mode, a processing system loads first stage resume content and second stage resume content into a volatile memory of the processing system. The first stage resume content may contain contextual data for a first program that was in use before the processing system transitioned to sleep mode. The second stage resume content may contain contextual data for another program that was in use before the processing system transitioned to sleep mode. The processing system may provide a user interface for the first program before all of the second stage resume content has been loaded into the volatile memory. Other embodiments are described and claimed. | 2009-10-29 |