47th week of 2010 patent applcation highlights part 59 |
Patent application number | Title | Published |
20100299502 | BAD BRANCH PREDICTION DETECTION, MARKING, AND ACCUMULATION FOR FASTER INSTRUCTION STREAM PROCESSING - An apparatus for extracting instructions from a stream of undifferentiated instruction bytes in a microprocessor having an instruction set architecture in which the instructions are variable length. Decode logic decodes the instruction bytes of the stream to generate for each a corresponding opcode byte indictor and end byte indicator and receives a corresponding taken indicator for each of the instruction bytes. The taken indicator is true if a branch predictor predicted the instruction byte is the opcode byte of a taken branch instruction. The decode logic generates a corresponding bad prediction indicator for each of the instruction bytes. The bad prediction indicator is true if the corresponding taken indicator is true and the corresponding opcode byte indicator is false. The decode logic sets to true the bad prediction indicator for each remaining byte of an instruction whose opcode byte has a true bad prediction indicator. Control logic extracts instructions from the stream and sends the extracted instructions for further processing by the microprocessor. The control logic foregoes sending an instruction having both a true end byte indicator and a true bad prediction indicator. | 2010-11-25 |
20100299503 | APPARATUS AND METHOD FOR MARKING START AND END BYTES OF INSTRUCTIONS IN A STREAM OF INSTRUCTION BYTES IN A MICROPROCESSOR HAVING AN INSTRUCTION SET ARCHITECTURE IN WHICH INSTRUCTIONS MAY INCLUDE A LENGTH-MODIFYING PREFIX - An apparatus in a microprocessor that has an instruction set architecture in which instructions may include a length-modifying prefix used to select an address/operand size other than a default address/operand size, wherein the apparatus marks the start byte and the end byte of each instruction in a stream of instruction bytes. Decode logic decodes each instruction byte of a predetermined number of instruction bytes to determine whether the instruction byte specifies a length-modifying prefix and generates a start mark and an end mark for each of the instruction bytes based on an address/operand size. Operand/address size logic provides the default operand/address size to the decode logic to use to generate the start and end marks during a first clock cycle during which the decode logic decodes the predetermined number of instruction bytes. If during the first clock cycle and any of N subsequent clock cycles the decode logic indicates that one of the predetermined number of instruction bytes specifies a length-modifying prefix, the operand/address size logic provides to the decode logic on the next clock cycle the address/operand size specified by the length-modifying prefix to use to generate the start and end marks. | 2010-11-25 |
20100299504 | MICROPROCESSOR WITH MICROINSTRUCTION-SPECIFIABLE NON-ARCHITECTURAL CONDITION CODE FLAG REGISTER - A microprocessor includes an architectural register and a non-architectural register, each having a plurality of condition code flags. A first instruction of the microarchitectural instruction set of the microprocessor instructs the microprocessor to update the plurality of condition code flags based on a result of the first instruction. The first instruction includes a field for indicating whether to update the plurality of condition code flags of the architectural or non-architectural register. A second instruction of the microarchitectural instruction set instructs the microprocessor to conditionally perform an operation based on one of the plurality of condition code flags. The second instruction includes a field for indicating whether to use the one of the plurality of condition code flags of the architectural or non-architectural register to determine whether to perform the operation. | 2010-11-25 |
20100299505 | INSTRUCTION FUSION CALCULATION DEVICE AND METHOD FOR INSTRUCTION FUSION CALCULATION - An instruction fusion calculation device of the present invention includes an instruction fusion detection circuit, an instruction fusion circuit, and a calculator. The instruction fusion detection circuit determines whether or not a fusion of a preceding instruction and a subsequent instruction that have a flow dependence relationship between them can be made. The instruction fusion circuit fuses the preceding instruction and the subsequent instruction to which it is determined by the instruction fusion detection circuit that the instructions can be fused into one instruction. The calculator executes the fused instruction into which the instructions are fused by the instruction fusion circuit to output the calculation result and outputs at least one of the calculation results obtained by executing the preceding instruction and the subsequent instruction as an intermediate result. | 2010-11-25 |
20100299506 | ROTATE THEN OPERATE ON SELECTED BITS FACILITY AND INSTRUCTIONS THEREFORE - A rotate then operate instruction having a T bit is fetched and executed wherein a first operand in a first register is rotated by an amount and a Boolean operation is performed on a selected portion of the rotated first operand and a second operand in of a second register. If the T bit is ‘0’ the selected portion of the result of the Boolean operation is inserted into corresponding bits of a second operand of a second register. If the T bit is ‘1’, in addition to the inserted bits, the bits other than the selected portion of the rotated first operand are saved in the second register. | 2010-11-25 |
20100299507 | ON-LINE TESTING FOR DECODE LOGIC - Methods and apparatuses for on-line testing for decode logic are presented. In one embodiment, a processor comprises translation logic to decode an instruction to micro-operations and extraction logic to determine first information about numbers of occurrences of fields in the micro-operations. In one embodiment, the processor further comprises verification logic to indicate whether the decoding results of the instruction are accurate based at least on the first information. | 2010-11-25 |
20100299508 | DYNAMICALLY ALLOCATED STORE QUEUE FOR A MULTITHREADED PROCESSOR - Systems and methods for storage of writes to memory corresponding to multiple threads. A processor comprises a store queue, wherein the queue dynamically allocates a current entry for a committed store instruction in which entries of the array may be allocated out of program order. For a given thread, the store queue conveys store data to a memory in program order. The queue is further configured to identify an entry of the plurality of entries that corresponds to an oldest committed store instruction for a given thread and determine a next entry of the array that corresponds to a next committed store instruction in program order following the oldest committed store instruction of the given thread, wherein said next entry includes data identifying the entry. The queue marks an entry as unfilled upon successful conveying of store data to the memory. | 2010-11-25 |
20100299509 | SIMULATION SYSTEM, METHOD AND PROGRAM - A computer-implemented pipeline execution system, method, and program product for executing loop processing in a multi-core or a multiprocessor computing environment, where the loop processing includes multiple function blocks in a multiple-stage pipeline manner. The system includes: a pipelining unit for pipelining the loop processing and assigning the loop processing to a computer processor or core; a calculating unit for calculating a first-order gradient term from a value calculated with the use of a predicted value of the input to a pipeline; and a correcting unit for correcting an output value of the pipeline with the value of the first-order gradient term. | 2010-11-25 |
20100299510 | BLUETOOTH PRE-BOOT AUTHENTICATION IN BIOS - The disclosed invention includes, among other things, methods and techniques for controlling usage of a computing device in the form of a Bluetooth® capable portable electronic device that provides for authentication of the computing device prior to any operating system being loaded onto the computing device. The portable electronic device operates cooperatively with the computing device to provide authentication information, such as the portable electronic device's Bluetooth device information. Previously developed implementations have shortcomings especially in the degree of security provided that are overcome by the present invention, especially its operation in a pre-boot environment. | 2010-11-25 |
20100299511 | Method of Masking the End-of-Life Transition of an Electronic Device, and a Device Including a Corresponding Control Module - A method of masking the end-of-life transition of a microprocessor electronic device including reprogrammable non-volatile memory containing an end-of-life state variable. On booting, the value of the variable is loaded into RAM. After executing any current command, it is verified whether the value of the variable stored in RAM is FALSE. If the response is negative, the end-of-life transition is executed. Otherwise, initialization or execution of the command is continued. On detecting an intrusive attack, it is instantiated by writing the TRUE value to the end-of-life state variable in RAM only and then deferring writing of the TRUE value to the variable in the non-volatile memory until the next write operation. The invention is applicable to any electronic device, smart card, etc. | 2010-11-25 |
20100299512 | Network Boot System - To minimize network access to a server in a network boot system. A server which stores an OS operating on a client terminal and a client terminal which includes a physical storage device are connected to each other over a network. The client terminal includes a physical memory and a network interface, and the OS includes a network driver for driving the network interface, a filter driver for converting access to a local bus of the client terminal into access to the network, and a read cache driver for driving the storage device. The read cache driver caches data which is read out from the server by the filter driver in the storage device. | 2010-11-25 |
20100299513 | MEMORY APPARATUS AND METHOD THEREFOR - A memory apparatus and an operation of the memory apparatus which allow quick booting are provided. The memory apparatus includes a volatile memory, a non-volatile memory, and a memory control unit to control input/output of data stored in the volatile memory and the non-volatile memory. The memory control unit restores data, according to a control command input from outside of the memory apparatus, from the non-volatile memory to the volatile memory in an on-demand fashion during booting. | 2010-11-25 |
20100299514 | HOST BUILD AND REBUILD SYSTEM AND METHOD - Methods of building a host computer system. The methods may comprise the steps of discovering hardware components present at the host and determining whether the hardware components are certified. The methods may also comprise the step of determining whether a build of the host is requested. According to various embodiments, a profile may also be downloaded to the host. The profile may comprise an indication of an operating system, an indication of an application, and an indication of a configuration parameter. The methods may also comprise the steps of installing the operating system to the host; installing the application to the host; and configuring the host according to the configuration parameter. | 2010-11-25 |
20100299515 | TRACING COPIES OF AN IMPLEMENTATION | 2010-11-25 |
20100299516 | CONTENTS PROTECTION PROVIDING METHOD AND PROTECTED CONTENTS CONSUMING METHOD AND APPARATUS THEREOF - The contents protection providing method includes: creating an encrypted stream with encrypted data; creating a key stream including key information for decrypting the encrypted data; creating reference information for connecting the key information to the encrypted data corresponding to the key information; and transmitting the encrypted stream, key stream, and reference information to a terminal. | 2010-11-25 |
20100299517 | Network System with a Plurality of Networked Devices with Various Connection Protocols - Methods and devices for retrieving data from a variety of devices, such as biomedical devices, are disclosed. In an embodiment, a communications path is established between a device manager and a device configured to collect data from a patient. A device type associated with the device is detected. Based on the device type, connections settings required to exchange data between the device manager and the device are requested from a first server. A patient identifier is also obtained. The patient identifier is sent to a second server, which may be the same as the first server. Verification of the patient identifier is received at the device manager from the second server. Data is then received at the device manager from the device. Upon receipt, the data is either stored in a storage or the data is sent via an encrypted communication channel to a server for data format conversion. | 2010-11-25 |
20100299518 | PORTABLE SECURE COMPUTING NETWORK - As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device and a portable storage device. A connection is initiated between a second computing device (e.g., remote device), connected to an untrusted network, and the first computing device, comprising initiating a proxy server protocol from the portable storage device (e.g., attached to the second device), using the second computing device. A secure connection between the first and second devices is created using the encryption keys. | 2010-11-25 |
20100299519 | METHOD FOR MANAGING WIRELESS MULTI-HOP NETWORK KEY - A method for managing wireless multi-hop network key is applicable to a security application protocol when a WAPI frame method (TePA, an access control method based on the ternary peer-to-peer identification) is applied in a concrete network containing a Wireless Local Area Network, a Wireless Metropolitan Area Network AN and a Wireless Personal Area Network. The key management method of the present invention includes the steps of key generation, key distribution, key storage, key modification and key revocation. The present invention solves the technical problems that the prior pre-share-key based key management method is not suitable for larger networks and the PKI-based key management method is not suitable for wireless multi-hop networks; the public-key system and the ternary structure are adopted, thereby the security and the performance of the wireless multi-hop networks are improved. | 2010-11-25 |
20100299520 | COMMUNICATION SYSTEM AND METHOD IN PUBLIC KEY INFRASTRUCTURE - In a communication system wherein a device and a client communicate data with each other through a network, the device holds a root certificate including a public key in a pair of the public key and a private key and signed with the public key. When data is sent, a certificate creator creates a second certificate including the root certificate designated as a certificate authority at a higher level and signed with the root certificate, and the second certificate is sent to the client. In the client, the root certificate has been stored beforehand, and a verifier verifies the signature of the second certificate with the root certificate. | 2010-11-25 |
20100299521 | KEY MANAGEMENT SYSTEM, KEY MANAGEMENT METHOD, SERVER APPARATUS AND PROGRAM - Disclosed is a key management system including plural terminal devices and a server. Each of the terminal devices includes: authentication means for authenticating a user and acquiring user information; delivery key registration means for registering a delivery key linked to the user information based on corresponding information, transmitted from the server, between the user information and the delivery key; encryption key receiving means for receiving an encryption key using the delivery key. The server includes terminal information storage means for storing the terminal identification information, user information on the user utilizing the terminal device and the delivery key, wherein the terminal identification information, the user information and the delivery key are linked to each other; and encryption key delivering means for transmitting the encryption key using the delivery key linked to the user information on the user performing secret communication. | 2010-11-25 |
20100299522 | Content Sharing Systems and Methods - Systems and methods are described for peer-to-peer sharing of electronic content. In one embodiment, if a license associated with a content item permits a sharing peer to share the content item with a receiving peer, the sharing peer rebinds a cryptographic key associated with the content item to the receiving peer and generates a sharing license for the content item. The sharing peer sends the sharing license and the content item to the receiving peer for consumption. | 2010-11-25 |
20100299523 | MOBILE HOST USING A VIRTUAL SINGLE ACCOUNT CLIENT AND SERVER SYSTEM FOR NETWORK ACCESS AND MANAGEMENT - A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network. | 2010-11-25 |
20100299524 | METHOD, APPARATUS, AND SYSTEM FOR CONFIGURING KEY - A method, an apparatus, and a system for configuring a key are provided. The method includes the following steps. A mobile node (MN) and an authentication authorization accounting home server (AAAH) generate a domain specific root key (DSRK) of a visited domain respectively. The AAAH sends the DSRK to an AAA visited server (AAAV). The MN and the AAAV generate a domain specific media independent handover service root key (DS-MIHS-RK) by using the DSRK respectively. The AAAV sends the DS-MIHS-RK to a visited domain media independent handover (MIH) authenticator. Thus, cumbersomeness and risks of errors in configuring and authenticating a password manually are avoided, so that large-scale and secure deployment of the MIH service becomes possible. | 2010-11-25 |
20100299525 | METHOD AND APPARATUS FOR SPLIT-TERMINATING A SECURE NETWORK CONNECTION, WITH CLIENT AUTHENTICATION - A method and apparatus are provided for split-terminating a secure client-server communication connection, with client authentication. During handshaking between the client and the server, cooperating network intermediaries relay the handshaking messages, without altering the messages. At least one of the intermediaries possesses a private key of the server, and extracts a set of data fields from the handshaking messages, including a Client-Key-Exchange message that can be decrypted with the private key. The intermediary uses the extracted data to compute the client-server session key separate from the client's and the server's similar computation, and may transmit the key to the other intermediary via a secure communication channel. The client and the server thus establish the end-to-end client-server connection, and may authenticate each other, after which the network intermediaries may intercept and optimize the client-server communications transparently to the client and the server. | 2010-11-25 |
20100299526 | NETWORK HAVING QUANTUM KEY DISTRIBUTION - A method of performing quantum key distribution across a network. The method involves a first node first agreeing a quantum key with a first intermediate node in the path. Next the intermediate node exchanges a quantum signal with the next node in the path—which is a targeted node. The intermediate node communicates with the first node using the previous established quantum key details of the quantum signal sent or received by the intermediate node. The first node then performs a key agreement step to agree a quantum key directly with the targeted node. Having established a quantum key with the current targeted node the method can be repeated but with the next node in the network path as the targeted node until a destination node is reached. The final quantum key agreed with the destination node can then be used for encrypting communication between those nodes across the network. | 2010-11-25 |
20100299527 | NEAR FIELD COMMUNICATION (NFC) DEVICE AND METHOD FOR SELECTIVELY SECURING RECORDS IN A NEAR FIELD COMMUNICATION DATA EXCHANGE FORMAT (NDEF) MESSAGE - Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place marker signature record is a modified signature Record Type Definition (RTD). A first set of records preceding the place marker signature record in the NDEF message is unsecured. The method also includes securing a second set of records following the place marker signature record. Another method includes placing a secured bytes field in the signature RTD. The secured byte field indicates a number of bytes of data to be secured preceding this field. The method also includes securing data in records preceding this field in the signature RTD, based on a value of the secured bytes field. | 2010-11-25 |
20100299528 | METHOD FOR PROVIDING ACCESS CONTROL TO MEDIA SERVICES - The present invention proposes a solution to prevent a program flow in a processing unit from being modified with respect to an intended program flow, thereby ensuring that important steps such as verifying or authenticating are not bypassed. The invention is particularly aimed at security modules within receiver/decoders in a pay-TV system and involves performing a set of predetermined operations during the processing of entitlement management messages and/or entitlement control messages, said operations being redundant with respect to the normal processing of said messages while leading to the calculation of keys which can then be used to verify that the intended program flow has been respected. | 2010-11-25 |
20100299529 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication. | 2010-11-25 |
20100299530 | USER AUTHENTICATION SYSTEM AND METHOD - A high security computer system and method that authenticates a user using iris recognition and liveliness detection. The method for authenticating the user to the secure system includes capturing an image of the user's face and generating an iris template from the image. While the iris template is being generated, liveliness verification is performed on the user's face. User access is granted if the iris template matches the enrolled iris template and if the liveness verification demonstrates the user's face is live, and denied if otherwise. The method may optionally silently re-authenticate the user after access is granted to the secure system. The authentication system includes an image capture device for capturing an image, an iris template generation component to generate an iris template from the image, a liveness detection component, and an iris comparison component adapted to compare the iris template to iris templates of previously enrolled users. | 2010-11-25 |
20100299531 | Methods for Processing Genomic Information and Uses Thereof - Methods for processing and storing genomic information in a secure manner are described. In particular, methods for processing, splitting and storing genomic information or portions thereof are disclosed. An individual's genomic information is digitized and a splitting algorithm applied to fragment and randomise the digitized genomic information into at least two separate datasets. Access to at least one dataset is retained by the individual and the second dataset is stored on a central server as a secure database record. Each dataset in isolation presents uninformative data and it is only when all datasets are combined that the data is capable of being presented into a useable and informative format. | 2010-11-25 |
20100299532 | INFORMATION RECORDING DEVICE, INFORMATION REPRODUCING DEVICE, PROGRAM, AND RECORDING MEDIUM - In an information recording device ( | 2010-11-25 |
20100299533 | METHOD FOR SECURING AUTHORIZED DATA ENTRY AND THE DEVICE TO PERFORM THIS METHOD - The method for authorized data entry and securing the authenticity of such data when entering cryptographic operations provides that the application in the computer (A), requiring authorized data entry, sends a specific command to the STM module (C) which defines a template of input data intended to be cryptographically processed. This specific command switches the STM module (C) over to the secure typing mode, the STM module (C) autonomously controls the typing of required data items of the data template, by recording characters typed on the connected entry device (D) and the recorded characters are arranged by the STM module (C) in its internal memory in requested data structures defined by the input data template, and such created data are sent by the STM module (C) directly to the token (E) where the requested cryptographic operation is called, the result of which is sent to the computer (A) by the STM module (C), and subsequently the STM module (C) switches back to the transparent mode. For the devices according to the present invention, both the data entry device (D) and the external token (E) are connected to the computer (A) via an additional STM module (C) which is standardly in the transparent mode when transferring data between the computer (A) and connected peripherals, such as the data entry device (D) and the token (E), without affecting the process, with the computer (A) and connected peripherals, such as the data entry device (D) and the token (E), without affecting the process, with the specific command sent from the application in the computer (A) being a transferrable template of data defining the requirements for the input data of cryptographic operations and the STM module (C) which can be switched over to the secure typing mode where the STM module (C) autonomously controls data typing on the data entry device (D) and their cryptographic processing in the token (E). | 2010-11-25 |
20100299534 | DATA STORAGE DEVICE AND DATA STORAGE SYSTEM - In a data storage device, unauthorized access to stored data in the data storage device can be effectively prevented by encrypting and storing security data needed for data encryption, setting an encryption key to encrypt/decrypt the security data by a user, and receiving the encryption key from a host, if necessary, not storing the encryption key in the data storage device. | 2010-11-25 |
20100299535 | METHOD AND APPARATUS FOR EXTRACTING RASTER IMAGES FROM PORTABLE ELECTRONIC DOCUMENT - A disclosed method for extracting a raster image of a page from a portable electronic document that includes (a) acquiring commands and resources of the raster image of the page by analyzing a format of the portable electronic document, (b) extracting first and second candidate raster images by processing the commands and the resources of the raster image of the page, (c) integrating the first and second candidate raster images as an integrated candidate raster image provided that the first and second candidate raster images are linked together, and (d) removing a pseudo-raster image from the integrated candidate raster image. | 2010-11-25 |
20100299536 | ELECTRONIC DISCOVERY COMPUTER PROGRAM PRODUCT - A system, apparatus, method, and computer program product for electronically stored file profiling and conversion including converting printable files to images, supported by meta-data, and one or more searchable master text files. | 2010-11-25 |
20100299537 | SECURE PROCESSING DEVICE WITH KEYSTREAM CACHE AND RELATED METHODS - A secure processing device may include an external memory storing encrypted data, and a processor cooperating with the external memory. The processor is configured to generate address requests for the encrypted data in the external memory, cache keystreams based upon an encryption key, and generate decrypted plaintext based upon the cached keystreams and the encrypted data requested from the external memory. For example, the processor may be further configured to predict a future address request, and the future address request may be associated with a cached keystream. | 2010-11-25 |
20100299538 | Systems and Methods for Low-Latency Encrypted Storage - Encrypted storage often introduces unwanted latency in access. This delay can result in a processor having to wait for critical data thus slowing performance. Generally speaking, the latency is at most an issue when reading from encrypted storage, since the processor may need the information read from encrypted storage to proceed. During a write operation, there typically is not an issue because the processor does not need to wait for the end of the write operation to proceed. A variant of counter (CTR) mode for a block cipher can be used to perform the majority of the decryption operation without knowledge of the ciphertext, therefore the majority of the decryption operation can be performed concurrently with the retrieval of the ciphertext from memory. In order to further secure the encrypted storage, a light encryption can be performed to further obfuscate the ciphertext. | 2010-11-25 |
20100299539 | ENCRYPTION BASED STORAGE LOCK - In one embodiment an encryption based storage lock comprises at least one storage media, at least one processor, at least one drive controller, and logic to; store at least a first encryption key in a persistent memory location, establish a logical association between the first encryption key and a first drive, receive a write operation in a drive controller, wherein the write operation is associated with the first drive in the network attached storage device, encrypt data associated with the write operation using the first encryption key, and store the encrypted data in the first drive in the network attached storage device. | 2010-11-25 |
20100299540 | COMPUTING SYSTEM WITH POWER REQUIREMENT EVALUATION - A computing system is provided and includes recording media relative to which input/output (I/O) operations are executable, and a processor, disposed in signal communication with the recording media, which is configured to execute the I/O operations and to evaluate power requirements associated with executions of the I/O operations relative to each individual recording medium. The processor includes a computer-readable medium having a set of instructions stored thereon, which, when executed, cause the processor to schedule the executions of the I/O operations relative to each individual recording medium or to refuse the executions of the I/O operations in accordance with the evaluated power requirements. | 2010-11-25 |
20100299541 | MULTI-CORE PROCESSOR SYSTEM - A multi-core processor system includes: a plurality of processor cores; a power supply unit that stops supplying or supplies power to each of the processor cores individually; and a thread queue that stores threads that the multi-core processor system causes the processor cores to execute. Each of the processor cores includes: a power-supply stopping unit that causes the power supply unit to stop power supply to an own processor core when a number of threads stored in the thread queue is equal to or smaller than a first threshold; and a power-supply resuming unit that causes the power supply unit to resume power supply to the other stopped processor cores when the number of threads stored in the thread queue exceeds a second value equal to or lager than the first threshold. | 2010-11-25 |
20100299542 | TWO WIRE TRANSMITTER WITH ISOLATED CAN OUTPUT - A process variable transmitter that preferably includes a transmitter output circuit that provides bidirectional HART and controller area network communication transceiver lines. The transmitter output circuit also includes sensor circuit interface contacts. An isolated circuit couples to the sensor circuit interface contacts. The isolated circuit includes sensor circuitry sensing a process variable. The isolated circuit further comprises a galvanic isolation barrier galvanically isolating the sensor circuitry from the HART and controller area network transceiver lines. A stacked power supply provides power management. Other aspects may include a controller area network current limiter diagnostic output, timed sequencing of microcontroller startup and shutdown, a local operator interface and power management. | 2010-11-25 |
20100299543 | DISPLAY APPARATUS AND METHOD FOR SAVING POWER THEREOF - A display apparatus includes: a command receiver configured to receive power on or off command from an exterior, a power supply unit configured to supply power to the display apparatus and a control unit coupled to the command receiver and the power supply unit, determining whether auxiliary power exists when the power off command is received, wherein the control unit is configured for two power saving modes. | 2010-11-25 |
20100299544 | Enabling/Disabling Power-Over-Ethernet Software Subsystem In Response To Power Supply Status - An Ethernet switch includes 12-Volt and 48-Volt power sourcing modules, system software, Ethernet interface modules and optional power over Ethernet (PoE) modules. The Ethernet interface modules are motherboards that include the circuitry required to implement a non-PoE system. The PoE modules are daughter boards that include the circuitry required to supply powered devices in a PoE subsystem. A PoE module may be connected to a corresponding Ethernet interface module. During start up, all of the Ethernet interface modules are first powered up in response to the 12-Volt power sourcing module. If the system software subsequently determines that the 48-Volt power sourcing module is operational, then (and only then) the system software attempts to detect the presence of any PoE modules. Upon detecting one or more PoE modules, the PoE modules are initialized and configured, thereby enabling PoE operation. | 2010-11-25 |
20100299545 | Methods of power management and apparatus thereof - A method of power management detects a workload rate of a processor, increases a power level of the processor based on a first value that is an average of the detected workload rate over an up reference time, and decreases the power level of the processor based on a second value that is an average of the detected workload rate over a down reference time. The down reference time may be longer than the up reference time. A power management apparatus includes a processor, a workload detector configured to detect a workload rate of the processor, a power management unit configured to receive the workload rate of the processor and generate a level control signal indicating a power level of the processor, a voltage control unit configured to provide the processor with a supply voltage corresponding to the level control signal, and a clock control unit configured to provide the processor with a clock signal having a frequency corresponding to the level control signal. | 2010-11-25 |
20100299546 | Method for Operating a Control Computer - A method for operating a control computer connected to a system to be controlled. The system is connected to a power supply line by a first switch, with the control computer being shut down by execution of a control command to enter an idle state. An uncoordinated switching of the control computer and the system is thereby avoided and operational reliability is increased. | 2010-11-25 |
20100299547 | POWER-SAVING CONTROL APPARATUS AND METHOD - A power-saving control apparatus and method capable of power-saving and prevention of decrease in the speed of accessing files of a high level of importance is suggested. | 2010-11-25 |
20100299548 | Blade server - A blade server | 2010-11-25 |
20100299549 | POWER MANAGMENT FOR STORAGE DEVICES - Methods and systems are provided for managing power allocation to a SAS target coupled with a SAS initiator through a SAS expander. The expander exchanges messages with the target to manage the power allocation to the target. The target transmits a power request message through the expander to the initiator. In some embodiments, the initiator transmits a power request received message to the expander. The expander may then transmit a power grant message to the target in response to receiving the power request received message. In other embodiments, the expander monitors the messages transmitted from the target to the initiator. The expander may then transmit a power grant message to the target in response to the expander monitoring the power request message. | 2010-11-25 |
20100299550 | Two Global Precise Times For Synchronization - Method of controlling a wind power system comprising a plurality of system elements, the wind power system including a plurality of data processors distributed in the system elements, the method includes the steps of: synchronizing at least a part of the data processors to at least one reference signal distributed to the data processors from a time synchronization arrangement, associating the data processors with local clock generation circuitries, wherein the local clock generation circuitries associated with data processors of a first subset of the data processors have a peak-to-peak tracking jitter higher than or equal to a predetermined threshold value and wherein a second subset of the data processors have a peak-to-peak tracking jitter less than the predetermined threshold value, controlling at least one of said system elements at least partly by mechanism of a data processor from said first or second subset of data processors. | 2010-11-25 |
20100299551 | MESSAGE PROCESSING METHOD, APPARATUS AND IP COMMUNICATION SYSTEM BASED ON THE SIP PROTOCOL - The present invention provides a message processing method, apparatus based on the SIP Protocol and an IP communication system, wherein the method comprises: a step for processing messages from a core network, for using a SIP proxy server as a uniform access interface for SIP messages from the core network to judge and distribute the received SIP messages to corresponding application servers for processing; a step for processing messages from the application servers, for using the SIP proxy server as a uniform access interface for SIP messages from the application servers to distribute, according to instructions from the application servers, the received SIP messages to corresponding core network device for processing. Thus, with the method and system of the present invention, when the processing capability of one application server is not enough, the processing capability of the application server could be improved by expanding the number of the application servers without any need to perform modification of the configuration by the core network device. | 2010-11-25 |
20100299552 | METHODS, APPARATUS AND COMPUTER READABLE MEDIUM FOR MANAGED ADAPTIVE BIT RATE FOR BANDWIDTH RECLAMATION - A method, apparatus and computer program product for managing content sessions within a network is presented. The systems disclosed herein are able to detect a requirement to modify bandwidth usage within the network either proactively or reactively. In response, example embodiments apply an adaptive bit rate adjustment technique to the content sessions to adjust a data rate associated with each content session according to the requirement to modify bandwidth usage within the network. Example embodiments also then apply a quality of service adjustment technique to the content sessions to adjust a bandwidth allocation assigned between a client and server based upon the adaptive bandwidth adjustment technique. Application of the adaptive bit rate and quality of service adjustment techniques may be policy based. Example embodiments also may monitor a plurality of servers supporting content sessions, detect a failure at a first server and move content sessions to a second server. | 2010-11-25 |
20100299553 | Cache data processing using cache cluster with configurable modes - Processing cache data includes sending a cache processing request to a master cache service node in a cache cluster that includes a plurality of cache service nodes, the cache cluster being configurable in an active cluster configuration mode wherein the plurality of cache service nodes are all in working state and a master cache service node is selected among the plurality of cache service nodes, or in a standby cluster configuration mode, wherein the master cache service node is the only node among the plurality of cache service nodes that is in working state. It further includes waiting for a response from the master cache service node, determining whether the master cache service node has failed; and in the event that the master cache service node has failed, selecting a backup cache service node. | 2010-11-25 |
20100299554 | DATA CONSISTENCY IN LONG-RUNNING PROCESSES - Long running computer implemented processes are dynamically adapted to improve data consistency. A range of process steps in a long running computer implemented process is specified. Additionally, each of the computer-implemented process partners that are associated with the execution of the long running process are identified within the range of specified process steps. Monitoring information is also collected with regard to at least one identified process partner. An automatic determination is made as to whether each monitored process partner is available before initiating execution of the specified range of process steps in an instance of the long running computer implemented process and a flow of the long running computer implemented process is transformed based at least in part upon the determination as to whether each monitored process partner is available. | 2010-11-25 |
20100299555 | PROTECTION OF DATA ON FAILING STORAGE DEVICES - A management apparatus operable for protecting data on a failing storage device in a data processing system including a storage array having at least one of a plurality of storage devices. The management apparatus includes a receiver component for receiving a failure message indicating that the plurality of storage devices comprises the failing storage device. An analyzer component is in communication with the receiver component and responsive to receipt of the failure message, for analyzing the failure message. A sender component is in communication with the analyzer component. The sender component is adapted for, in response to the analyzer component determining the failing storage device, sending a zoning message, the zoning message instructing the storage array to isolate the failing storage device, and sending a protect message. The protect message instructs the storage array to protect data on the failing storage device. | 2010-11-25 |
20100299556 | GAMING MACHINE HAVING GAME PLAY SUSPENSION AND RESUMPTION FEATURES USING BIOMETRICALLY-BASED AUTHENTICATION AND METHOD OF OPERATING SAME - A gaming machine includes a processor adapted to execute a program of a game; a biometric reader configured to capture first biometric data from the player, and a trusted cache. The trusted cache includes a nonvolatile memory that is configured to store the first biometric data; a context data save engine configured to save the context of the program to the nonvolatile memory and to associate the stored first biometric data with the saved context of the program upon the processor receiving a request from the player to suspend game play, and a context data recovery engine configured to recover the saved context from the nonvolatile memory and to cause continued execution of the program from the recovered saved context upon the biometric reader capturing second biometric data from the player that matches the stored first biometric data and receiving a request from the player to resume game play. | 2010-11-25 |
20100299557 | Providing tuning limits for operational parameters in data processing apparatus - The application discloses a means of setting tuning limits for operational parameters in a processing stage within a data processing apparatus for processing a signal. The processing stage comprises: an input for receiving the signal, processing circuitry for processing the signal and an output for outputting the processed signal at an output time; an error detecting circuit for determining if a signal output by the processing stage between the output time and a predetermined time later does not have a stable value, the predetermined time later being before a next output time, and for signaling an error if the signal is not stable; a tuning circuit for adjusting at least one operational parameter of the processing stage; a tuning limiting circuit for providing at least one tuning limit for the tuning circuit, such that the at least one operational parameter is not adjusted beyond the corresponding at least one tuning limit, a tuning limiting circuit for providing at least one tuning limit for said tuning circuit, such that said at least one operational parameter is not adjusted beyond said corresponding at least one tuning limit, the tuning limiting circuit being configured to provide the at least one tuning limit such that a signal passing along a critical path of the processing stage tuned to the tuning limit is estimated to reach the output of the processing stage at a preset time later than the output time, the preset time being less than the predetermined time. | 2010-11-25 |
20100299558 | DATA STORAGE DEVICE AND METHOD - An apparatus includes a cache memory for storing user data and control information of the apparatus, a nonvolatile memory and a processor for executing a process including when the power failure occurs, saving the user data and the control information stored in the cache memory into the nonvolatile memory, when the power failure recovers, restoring the data stored in the nonvolatile memory into the cache memory, and erasing the data stored in the nonvolatile memory after restoring the data into the cache memory and when another power failure occurs during erasing the data stored in the nonvolatile memory, erasing the control information stored in the nonvolatile memory if the control information is remained in the nonvolatile memory and saving, into the nonvolatile memory, the updated control information stored in the cache memory and the user data which has been erased from the nonvolatile memory. | 2010-11-25 |
20100299559 | METHOD FOR PROCESSING THE VOLUME OF INFORMATION HANDLED DURING THE DEBUGGING PHASE OF OPERATIONAL SOFTWARE ONBOARD AN AIRCRAFT AND DEVICE FOR IMPLEMENTING THE SAME - A method for processing the volume of information handled during the debugging phase of an operational software onboard an aircraft includes: dividing the execution path of the operational software into functional intervals by placing progression points at each function of the program; placing control points associated with each progression point; normal execution of the program that includes: storing the execution state of the program at the location of each progression point, wherein the storage of an execution state results in the suppression of the execution state previously stored for said progression point; upon the detection of an error, searching the progression point corresponding to a faulty function; searching for a software start execution state; regenerating the start execution state; correcting the error in the faulty function; and re-executing the program. | 2010-11-25 |
20100299560 | COMPUTER SYSTEM WITH DAMAGED BIOS DATA RECOVERING FUNCTION AND RECOVERING METHOD THEREOF - A computer system with a damaged BIOS data recovering function is disclosed. When BIOS data in the computer are damaged, the computer system may update and recover the BIOS of the storage unit of the computer system in a standby mode via an external electronic device (another computer or a USB flash disk). The computer system includes a storage unit, a data transferring interface, a power supply unit, and a control unit. The computer system is electrically connected with the external electronic device via the data transferring interface. The power supply unit provides standby power (in the standby mode) when the computer system is shut down. The control unit is electrically connected with the power supply unit and the data transferring interface, respectively. The control unit is actuated via the standby power, receives the external BIOS stored in the external electronic device. | 2010-11-25 |
20100299561 | SYSTEMS AND METHODS FOR MANAGING TESTING FUNCTIONALITIES - Described herein are systems and methods for managing testing functionalities. One such method includes receiving, from a test tool, data indicative of a user-created test script, being a data-bound test script in the present example. The data-bound test script is created for testing a target application, and is bound to a predetermined data set. This received data is then processed, thereby to define data indicative of an unbound test script. A user interface is provided for allowing a user to associate the unbound test script with one or more data sets selected from a repository of stored data sets. Responsive to a user command, data indicative of a new data-bound test scripts is defined based on the association of the unbound test script with the selected one or more data sets. This new defined data-bound test script is executable via the test tool. For example, instructions are provided to the test tool such that those scripts are executed for the testing of the target application. In some cases, multiple unbound test scripts are effectively bolted together to create more complex scenarios for testing. | 2010-11-25 |
20100299562 | Reducing bandwidth required for trace data - A data processing apparatus is disclosed including trace logic for monitoring behaviour of a portion of said data processing apparatus and prediction logic for providing at least one prediction as to at least one step of the behavior of the portion of the data processing apparatus. The trace logic monitors behavior of the portion of the data processing apparatus, determines from the monitored behaviour whether the at least one prediction is correct, and outputs a prediction indicator indicating whether the at least one prediction is correct. | 2010-11-25 |
20100299563 | HVAC SYSTEM, A METHOD FOR DETERMINING A SOURCE OF A RESET AND A HVAC CONTROLLER CONFIGURED FOR THE SAME - An HVAC controller, a method for determining the source of a reset of a HVAC unit and a HVAC system are disclosed herein. In one embodiment, the HVAC controller includes: (1) a power on reset (POR) register configured to indicate if a POR has occurred for said controller, (2) a non-volatile memory having a first reset code section and a second reset code section, wherein said first and second reset code sections are each configured to store a reset code and (3) a processor configured to deduce when a source of a reset for said controller is a watchdog reset based on content of said POR register, said first reset code section and said second reset code section. | 2010-11-25 |
20100299564 | TRACE/FAILURE OBSERVATION SYSTEM, TRACE/FAILURE OBSERVATION METHOD, AND TRACE/FAILURE OBSERVATION PROGRAM - There is provided a trace/failure observation system which is capable of comprehensive collection of information that is needed for checking a desired operation in a system or the like where the amount of information to be observed is large, and which allows easy analysis of the desired operation. The system includes, in a system LSI to be subjected to trace/failure observation: an event detecting means for observing behavior of a portion to be observed; a first data reducing means for performing observation data reduction processing so that observation data from the event detecting means has an amount of information processable to a second data reducing means; and the second data reducing means for performing one or more steps of observation data reduction processing. | 2010-11-25 |
20100299565 | CONTROLLING APPARATUS AND CONTROLLING METHOD - A controlling apparatus for controlling a disk array unit includes a cache memory for caching data of the disk array unit; a nonvolatile memory for storing the data in the cache memory; and a control unit for detecting a defective location in the nonvolatile memory where the data is stored defectively and updating information indicating the defection location, for generating an error detection code of the updated information, for writing the generated information and the associated error detection code into an area of the nonvolatile memory different from any area where any information indicating any defective location previously detected and stored into the nonvolatile memory, and for controlling writing the data in the cache memory into a location of the nonvolatile memory designated by any selected one of the information stored in the nonvolatile memory. | 2010-11-25 |
20100299566 | DEBUGGING MODULE FOR ELECTRONIC DEVICE AND METHOD THEREOF - A debugging module for connecting an IC to a JTAG debugger device includes a JTAG interface, an earphone circuit, a USB interface, a switching unit, and a reset circuit. The earphone circuit is electrically connected to the JTAG interface via the switching unit. The USB interface and the reset circuit are electrically connected to the JTAG interface. When a JTAG debugger device is connected to the earphone circuit and the USB interface, the earphone circuit and the USB interface, respectively, can establish a connection between the JTAG debugger device and the JTAG interface. | 2010-11-25 |
20100299567 | On-Chip Logic To Support Compressed X-Masking For BIST - Techniques are provided for X-masking using at least some masking information provided by on-chip logic, in lieu of masking information provided from off of the integrated circuit being tested. The masking information is provided by a masking information source on the integrated circuit being tested, such as, for example, a read-only memory (ROM) circuit, that feeds the masking information to the X-masking logic. With these implementations of the invention, it is possible to perform X-masking independent from any external data, thus enabling X-masking for a logic built-in self-test without requiring an external testing device. | 2010-11-25 |
20100299568 | SELECTIVELY ACCESSING TEST ACCESS PORTS IN A MULTIPLE TEST ACCESS PORT ENVIRONMENT - A TAP linking module ( | 2010-11-25 |
20100299569 | WAFER SCALE TESTING USING A 2 SIGNAL JTAG INTERFACE - Testing of die on wafer is achieved by; (1) providing a tester with the capability of externally communicating JTAG test signals using simultaneously bidirectional transceiver circuitry, (2) providing die on wafer with the capability of externally communicating JTAG test signals using simultaneously bidirectional transceiver circuity, and (3) providing a connectivity mechanism between the bidirectional transceiver circuitry's of the tester and a selected group or all of the die on wafer for communication of the JTAG signals. | 2010-11-25 |
20100299570 | SELECTIVELY ACCESSING TEST ACCESS PORTS IN A MULTIPLE TEST ACCESS PORT ENVIRONMENT - A TAP linking module ( | 2010-11-25 |
20100299571 | SELECTIVELY ACCESSING TEST ACCESS PORTS IN A MULTIPLE TEST ACCESS PORT ENVIRONMENT - A TAP linking module ( | 2010-11-25 |
20100299572 | DATA PROCESSING APPARATUS AND DATA PROCESSING METHOD AS WELL AS ENCODING APPARATUS AND ENCODING METHOD - A data processing apparatus, a data processing method, an encoding apparatus and an encoding method which can be applied, for example, to a transmission system for transmitting an LDPC code and so forth, and which can improve the tolerance to errors. Of an LDPC code which is prescribed in the DVB-S.2 and has a code length of 64,800 and an encoding rate of ⅔, mb code bits are replaced, and the code bits after the replacement become symbol bits of b symbols. When m is 8 and b is 2, where the i+1th bit from the most significant bit of 8×2 code bits and 8×2 symbol bits of two successive symbols are represented by b | 2010-11-25 |
20100299573 | Systems and methods for LDPC coded modulation - Typical forward error correction methods employ Trellis Code Modulation. By substituting low density parity check coding in place of the convolution code as part of a combined modulation and encoding procedure, low density parity check coding and modulation can be performed. The low density parity check codes have no error floor, no cycles, an equal bit error rate for the information bits and the parity bits, and timely construction of both a parity check matrix with variable codeword size and a generator matrix is possible. | 2010-11-25 |
20100299574 | Systems and methods for LDPC coded modulation - Typical forward error correction methods employ Trellis Code Modulation. By substituting low density parity check coding in place of the convolution code as part of a combined modulation and encoding procedure, low density parity check coding and modulation can be performed. The low density parity check codes have no error floor, no cycles, an equal bit error rate for the information bits and the parity bits, and timely construction of both a parity check matrix with variable codeword size and a generator matrix is possible. | 2010-11-25 |
20100299575 | METHOD AND SYSTEM FOR DETECTION AND CORRECTION OF PHASED-BURST ERRORS, ERASURES, SYMBOL ERRORS, AND BIT ERRORS IN A RECEIVED SYMBOL STRING - Embodiments of the present invention include ECC-based encoding-and-decoding schemes that are well suited for correcting phased bursts of errors or erasures as well as additional symbol errors and bit errors. Each encoding-and-decoding scheme that represents an embodiment of the present invention is constructed from two or more component error-correcting codes and a mapping function ƒ(). The composite error-correcting codes that represent embodiments of the present invention can correct longer phased bursts or a greater number of erasures in addition to single-bit errors and symbol errors, respectively, than either of the component codes alone, and are more efficient than previously developed ECC-based encoding-and-decoding schemes for correcting phased bursts of symbol errors and erasures combined with additional bit errors and symbol errors. | 2010-11-25 |
20100299576 | System to Improve Miscorrection Rates in Error Control Code Through Buffering and Associated Methods - A system to improve miscorrection rates in error control code may include an error control decoder with a safe decoding mode that processes at least two data packets. The system may also include a buffer to receive the processed at least two data packets from the error control decoder. The error control decoder may apply a logic OR operation to the uncorrectable error signal related to the processing of the at least two data packets to produce a global uncorrectable error signal. The system may further include a recipient to receive the at least two data packets and the global uncorrectable error signal. | 2010-11-25 |
20100299577 | INTERSYMBOL INTERFERENCE ENCODING IN A SOLID STATE DRIVE - Methods and devices are provided for intersymbol interference encoding in a solid state drive. In an illustrative embodiment, an nth data signal is received as input to a processing component. An intersymbol interference signal applicable to the nth data signal is provided, based on a set of prior-written data in a data storage array and a set of intersymbol interference behavior of the set of prior-written data in the data storage array, the data storage array being communicatively connected to the processing component. The nth data signal and the intersymbol interference signal applicable to the nth data signal are combined into an intersymbol-interference-corrected encoding of the nth data signal. The intersymbol-interference-corrected encoding of the nth data signal is provided as output from the processing component. | 2010-11-25 |
20100299578 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING DATA - A transmitting apparatus in a transport network performs forward error correcting encoding for each virtual lane set as a multiple of the transmission channels, to generate virtual frames including independent parity bytes for each virtual lane. The generated virtual frames are transmitted through at least one transmission channel. In addition, a receiving apparatus detects the virtual frames for each virtual lane from a signal received through a transmission channel by using a frame assignment sequence, and performs forward error correcting decoding by using the parity bytes included in the virtual frames detected for each virtual lane. | 2010-11-25 |
20100299579 | Methods and Systems for Error-Correction in Convolutional and Systematic Convolutional Decoders in Galois Configuration - Convolutional coders having an n-state with n≧2 Linear Feedback Shift Registers (LFSR) in Galois configuration with k shift register elements with k>1 are provided. Corresponding decoders are also provided. A convolutional coder generates a sequence of coded n-state symbols. A content of a starting position of an LFSR in a decoder is determined when sufficient error free coded symbols are available. Up to k symbols in error are corrected. A systematic convolutional coder and decoder are also provided. | 2010-11-25 |
20100299580 | BCH OR REED-SOLOMON DECODER WITH SYNDROME MODIFICATION - An apparatus generally having a first circuit, a second circuit and a third circuit is disclosed. The first circuit may be configured to calculate a plurality of preliminary syndromes from a plurality of received symbols. The second circuit may be configured to calculate a plurality of normal syndromes by modifying the preliminary syndromes using at most two Galois Field multiplications. The third circuit is generally configured to calculate an errata polynomial based on the normal syndromes. | 2010-11-25 |
20100299581 | SERIAL TURBO TRELLIS CODED MODULATION USING A SERIALLY CONCATENATED CODER - Serial concatenated trellis coded modulation (SCTCM) includes an outer coder, an interleaver, a recursive inner coder and a mapping element. The outer coder receives data to be coded and produces outer coded data. The interleaver permutes the outer coded data to produce interleaved data. The recursive inner coder codes the interleaved data to produce inner coded data. The mapping element maps the inner coded data to a symbol. The recursive inner coder has a structure which facilitates iterative decoding of the symbols at a decoder system. The recursive inner coder and the mapping element are selected to maximize the effective free Euclidean distance of a trellis coded modulator formed from the recursive inner coder and the mapping element. The decoder system includes a demodulation unit, an inner SISO (soft-input soft-output) decoder, a deinterleaver, an outer SISO decoder, and an interleaver. | 2010-11-25 |
20100299582 | MULTI-TAP FREQUENCY DOMAIN EQUALIZATION WITH DECISION FEEDBACK AND TRELLIS DECODING - An input estimator is based on a combined MFDQ-DF and trellis for use in, for example, an ADSL environment. In particular, for an ADSL implementation, the system will have one feedback tap for the decision feedback. However, it should be appreciated that the idea and basic concept of using the structure of a trellis to aid in determining the feedback point can be extended to any system using a feedback equalizer to estimate input to a trellis decoder. | 2010-11-25 |
20100299583 | OPTIMIZED VITERBI DECODER AND GNSS RECEIVER - A Viterbi decoder which is based on a special instruction set implemented in the processor, enabling it to handle the Viterbi processing with a much lower CPU loading without significantly increasing the hardware complexity. By careful application of appropriate design constraints specific to the SV navigation and analysis of the Viterbi algorithm an optimised architecture can be realised for embedding Viterbi acceleration logic efficiently into a GNSS chipset. | 2010-11-25 |
20100299584 | METHOD OF GENERATING AND PROCESSING RANGING RESPONSE MESSAGE IN WIRELESS COMMUNICATION SYSTEM - The present invention relates to ranging response message generating and processing methods that can reduce overhead in a wireless portable Internet system. A method of generating a ranging response message according to an exemplary embodiment of the present invention includes: adding to the ranging response message a first field indicating the number of responses for CDMA codes included in the ranging response message and received from terminals; adding to the ranging response message second fields indicating ranging code attributes as the responses for the CDMA codes by a value of the first field; and adding to the ranging response message a plurality of third fields indicating transmission parameter adjustment values corresponding to the individual second fields. | 2010-11-25 |
20100299585 | SERIAL DATA COMMUNICATION - CAN MEMORY ERROR DETECTION METHODS - A method is provided for formatting a message, with a first plurality of bits forming a data component, and a second plurality of bits forming a reserved component, for transmission in a vehicle. The method comprises the steps of calculating an initial checksum from the data component, calculating a revised checksum at least from the initial checksum, and storing the revised checksum in the reserved component. The number of bits in the reserved component is less than the number of bits in the data component. | 2010-11-25 |
20100299586 | Open Theme Builder and API - Methods and system for customizing a webpage include generating a schematic representation of the webpage. The webpage includes a plurality of section elements that are customizable. The schematic representation identifies a plurality of schematic section elements corresponding to the plurality of section elements of the webpage. The schematic representation is rendered alongside the webpage and provides visual navigation through various section elements of the webpage. A schematic section element is identified and selected from the schematic representation, for customizing. The selection of the schematic section element triggers rendering of one or more navigation links associated with the selected schematic section element. The navigation links provide tools or options enabling customization. Changes to one or more attributes associated with the selected schematic section element representing customization are received and the attributes are updated at the schematic representation in real-time. The changes are cascaded to the corresponding section elements of the webpage in substantial real-time based on user interaction. | 2010-11-25 |
20100299587 | Column Selection, Insertion and Resizing in Computer-Generated Tables - Embodiments of the present invention provide for manipulating a table within a client-based web-application. To provide a user with a more fluid process by which to manipulate a table structure within his/her document, the present invention provides the ability for the user to select, insert, and resize rows and columns of the table intuitively and easily via on-object user interfaces. | 2010-11-25 |
20100299588 | METHOD AND SYSTEM FOR PROVIDING INTERACTION BETWEEN A HOST SYSTEM AND WEB PAGES - A method and a system for providing interaction between a host system and a plurality of web pages in a Wide Area Network are disclosed. The method includes receiving a request from a web page for information of a peripheral device present at the host system. The method further includes creating an iframe element of the web page. The iframe element includes a Uniform Resource Indicator (URI) of an actual script file for the web page. Further, the method includes extracting a serialized form of the request based on a navigation event corresponding to the iframe element of the web page. The navigation event is triggered by a web browser of the host system. The method further includes generating a response attribute corresponding to the request based on the serialized form of the request. Thereafter, the method includes providing the response attribute to the iframe element of the web page. | 2010-11-25 |
20100299589 | KEYWORD DISPLAY METHOD AND KEYWORD DISPLAY SYSTEM - To display information that is related to a keyword described on a webpage. A keyword display method includes a first step of listing DOM (Document Object Model) nodes according to a DOM definition, and extracting text from an HTML document of the webpage; a second step of extracting a word, which matches a word stored in a pre-registered dictionary, as a keyword from the extracted text; and a third step of changing a DOM node of the extracted keyword. | 2010-11-25 |
20100299590 | Method and system for processing xml-type telecommunications documents - Techniques for use in telecommunications products and services for processing XML-type (e.g., CCXML or VXML) documents in association with the operation of a telecommunications network include parsing a XML-type document a single time for all instruction execution relating to the XML-type document for generating an XML-type reference document. Compiling the XML reference document occurs next for generating a XML-type binary reference file comprising a plurality of binary data sets derived from the XML-type reference document. Then, the method and system convert the XML-type binary reference file to an object tree for use of the contents of the XML-type binary reference file at essentially execution speeds. The method and system provide for storing data in a cache memory, the data relating to the XML-type binary reference file at a point essentially approximating the execution point of the data in the processing of the XML-type document. Furthermore, the method and system execute instructions for the processing of the XML-type document using the data and the XML-type binary reference file. | 2010-11-25 |
20100299591 | MARKUP LANGUAGE DOCUMENT CONVERSION SYSTEM, DEVICE, METHOD, AND PROGRAM - In a markup language document conversion system, the conversion server | 2010-11-25 |
20100299592 | CUSTOMIZATION OF GUI LAYOUT BASED ON HISTORY OF USE - A hand-held electronic device, method of operation and computer readable medium are disclosed. The device may include a case having one or more major surfaces. A visual display and a touch interface are disposed on at least one of the major surfaces. A processor is operably coupled to the visual display and touch screen. Instructions executable by the processor may be configured to a) present an image on the visual display containing one or more active elements; b) correlate one or more active portions of the touch interface to one or more corresponding active elements in the image on the visual display; and c) adjust a layout of content shown on the display according to a probability of one or more actions that may be taken with the one or more active elements. | 2010-11-25 |
20100299593 | APPARATUS AND METHOD FOR PROCESSING A DOCUMENT CONTAINING VARIABLE PART - A document processing apparatus efficiently corrects contents data improperly selected upon editing a document. The apparatus displays a document, selects content data from the displayed document, based on a user's operation, displays, as deriving process information, a creation rule, personal data and metadata which are referred to in using the selected content data to create the document, and corrects the displayed deriving process information, based on a user's operation. | 2010-11-25 |
20100299594 | TOUCH CONTROL WITH DYNAMICALLY DETERMINED BUFFER REGION AND ACTIVE PERIMETER - A hand-held electronic device, method of operation and computer readable medium are disclosed. The device may include a case having one or more major surfaces. A visual display and a touch interface are disposed on at least one of the major surfaces. A processor is operably coupled to the visual display and touch screen. Instructions executable by the processor may be configured to a) present an image on the visual display containing one or more active elements; b) correlate one or more active portions of the touch interface to one or more corresponding active elements in the image on the visual display; and c) re-purpose one or more portions of the touch interface outside the one or more active portions to act as inputs for commands associated with the one or more active elements. | 2010-11-25 |
20100299595 | HAND-HELD DEVICE WITH TWO-FINGER TOUCH TRIGGERED SELECTION AND TRANSFORMATION OF ACTIVE ELEMENTS - A hand-held electronic device, method of operation and computer readable medium are disclosed. The device may include a case having one or more major surfaces. A visual display and a touch interface are disposed on at least one of the major surfaces. A processor is operably coupled to the visual display and touch screen. Instructions executable by the processor may be configured to a) present an image on the visual display containing one or more active elements; b) correlate one or more active portions of the touch interface to one or more corresponding active elements in the image on the visual display; c) operate the one or more active elements according to a first mode of operation in response to a first mode of touch on one or more of the active portions; and d) operate the one or more active elements according to a second mode of operation in response to a second mode of touch on one or more of the active portions, wherein in the second mode of operation, the second mode of touch activates an enhancement of one or more of the active elements. | 2010-11-25 |
20100299596 | DYNAMIC RECONFIGURATION OF GUI DISPLAY DECOMPOSITION BASED ON PREDICTIVE MODEL - A hand-held electronic device, method of operation and computer readable medium are disclosed. The device may include a case having one or more major surfaces. A visual display and a touch interface are disposed on at least one of the major surfaces. A processor is operably coupled to the visual display and touch screen. Instructions executable by the processor may be configured to a) present an image on the visual display containing one or more active elements; b) perform a tessellation that divides the image into one or more regions that fill the display, wherein each region corresponds to a different active element, wherein a size of each region depends on a corresponding probability that a user will use the corresponding active element within a given time frame; and c) correlating one or more active portions of the touch interface to one or more corresponding active elements. | 2010-11-25 |
20100299597 | DISPLAY MANAGEMENT METHOD AND SYSTEM OF MOBILE TERMINAL - A display management method and system of a mobile terminal for switching between user interfaces of applications is disclosed. A display management method of a mobile terminal according to the present invention includes displaying a first execution screen of a first application on a display; detecting an input signal for activating a second application; and displaying a second execution screen corresponding to the second application in response to the input signal, wherein displaying the second execution screen comprising presenting at least one of a first intermediate image obtained by downsizing an image contained within the first execution screen, a second intermediate image obtained by downsizing an image contained within the second execution screen, and a task window containing at least the downsized first and second intermediate images in a sequential order. | 2010-11-25 |
20100299598 | METHOD FOR PROVIDING PAGES AND PORTABLE TERMINAL ADAPTED TO THE METHOD - A method for providing pages and a portable terminal adapted thereto are disclosed. The display unit displays pages belonging to a same category or a different category, according to the generation of different input signals, wherein pages are displayed in accordance with their arrangement within a corresponding category | 2010-11-25 |
20100299599 | MOBILE DEVICE AND METHOD FOR EXECUTING PARTICULAR FUNCTION THROUGH TOUCH EVENT ON COMMUNICATION RELATED LIST - A mobile device and a touch-based operation method allow a user to easily and conveniently use a desired communication-related function through a touch-sensitive interface. The mobile device displays a scrollable communication-related list that includes but is not limited to a call log list, a message list, a phonebook list, and an email list. When a specific item is selected in response to a first touch event, the mobile device determines whether or not a second touch event occurs on the selected item in a non-scrollable direction. Then the mobile device executes a particular function predefined in the selected item in response to the second touch event occurring in the non-scrollable direction. | 2010-11-25 |
20100299600 | ELECTRONIC COOKBOOK - The present invention relates to an electronic cookbook that can be mounted in a kitchen environment. The electronic cookbook includes means for indexing one or more types of electronic recipes on a display using a data processor and displaying the indexed types of electronic recipes on the display. Indexed electronic recipes can be selected and a list, such as in alphabetical order, can be displayed. One or more of the indexed electronic recipes can be selected and interactively displayed. The electronic cookbook can be set up for a particular language and/or measurement unit. The electronic recipes can be stored at the data processor. The electronic cookbook can include a speech recognition device for translating speech spoken into a microphone into text. The electronic cookbook can also include a USB port for receiving a USB insertable memory stick including stored electronic recipes. | 2010-11-25 |
20100299601 | CONFIGURING CHANNELS FOR SHARING MEDIA - A user interface for sharing media items with others. From a sender's perspective, embodiments of the invention allow for an easy-to-use drag-and-drop technique that is more user-friendly than conventional techniques. From the recipient's perspective, embodiments of the invention allow media items from multiple sources to be aggregated into a single viewport, providing a cohesive and unified approach to media items received from others. | 2010-11-25 |