49th week of 2011 patent applcation highlights part 59 |
Patent application number | Title | Published |
20110302384 | COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A computer readable medium stores a program causing a computer to execute a process including receiving an instruction for deleting an information group from a first memory; extracting, from the first memory, information regarding information groups having a parent-child relationship with a target information group to be deleted in accordance with the received instruction; extracting a user identification code associated with the target information group from a second memory; storing an identification code of the target information group, the information regarding the information groups, and the extracted user identification code in association with one another in a third memory; deleting the target information group from the first memory; and changing the structure information stored in the first memory to structure information obtained after the target information group has been deleted from the first memory, by changing the child information group as a child of the parent information group. | 2011-12-08 |
20110302385 | MEMORY DEVICE SYNCHRONIZATION - A memory controller includes first and second output modules for driving first and second data, respectively, to be written to a memory device. The memory controller also includes a clock module for providing an internal clock signal and a timing control module for producing a first and second timing control signals. The first and second timing control signals are supplied to the first and second output modules, respectively. | 2011-12-08 |
20110302386 | METHOD AND APPARATUS TO MANAGE SPECIAL REARRANGEMENT IN AUTOMATED TIER MANAGEMENT - A storage controller performs automated page-based tier management of storing data in tiered storage using pool groups, which includes evaluating the pool groups based on a preset rule in order to determine an evaluation result for each pool group, and using the evaluation results among the pool groups to determine which pool group is to be selected for allocation against portions of one storage volume of a plurality storage volumes. In response to receiving an instruction for rearrangement of data in the tiered storage, the instruction including a requirement to be satisfied in selecting the plurality of tiers within a pool group based on access characteristics for allocation against portions of the one storage volume, the storage controller analyzes the pool groups according to the requirement to determine whether any of the pool groups is appropriate to possess the one storage volume for storing the data. | 2011-12-08 |
20110302387 | METHOD FOR MANAGING STORAGE, PROGRAM AND SYSTEM FOR THE SAME - A system including plural storage devices provides a technique for controlling storage devices in which files are located by a file system, and turning on or off the storage devices based on prediction of the start or end of access to the files. A program that manages power to the storage devices and data access to the storage devices via the files includes means or functions for allocating a storage device as an area in which a file is located, for selecting a storage device in which a file is located, for predicting that access to a file is started for commanding turning on power to a storage device based on the prediction that access to a file is started, for predicting that access to a file terminates, and for commanding turning off power to a storage device based on the prediction that access to a file terminates. | 2011-12-08 |
20110302388 | Hierarchical Scalable Memory Allocator - Aspects of the subject matter described herein relate to memory management. In aspects, a hierarchical, customized memory allocator may be created that allocates memory to memory consumers. The memory allocator may use a data structure to classify blocks of memory at each level in the hierarchy according to fill factors of the blocks of memory. Allocations may be based on lifetime characteristics, proximity to consumer, fill factor, and other factors. An allocator may use one or more active blocks to allocate memory to consumers. The number of active blocks for an allocator may depend on contention. | 2011-12-08 |
20110302389 | MEMORY MANAGEMENT METHODS IN A COMPUTER SYSTEM WITH SHARED MEMORY MAPPINGS - A memory management sub-system includes code executable by a processor fir performing selecting a plurality of contexts, and selecting a sample of the separately allocable portions of an address space for each of the contexts. For each of the selected allocable portions, a corresponding portion of the host memory to which the selected allocable portion is mapped is determined, and a count corresponding to a number of separately allocable portions of any context that are commonly mapped to the corresponding portion of the host memory. For each context, a metric is computed that is a function of the counts for that context. Host memory is allocated among the contexts at least in part based on their respective metrics. | 2011-12-08 |
20110302390 | SYSTEMS AND METHODS FOR PROCESSING COMMUNICATIONS SIGNALS fUSING PARALLEL PROCESSING - Systems and methods for performing processing of communications signals on multi-processor architectures. The system consists of a digital interface that translate numbers that represent a waveform in some format to analog signals for use in transmission and translating analog signals to numbers representing those waveforms in some format that can be processed by the commodity digital hardware and software combination. The digital hardware and software incorporates parallel hardware and software that can process single or multiple streams and multiple processing steps as required for the communications system in any combination. In the examples, the use of general purpose graphics processing units (GPGPUs) is illustrated, but the system is not necessarily limited to such an implementation. The system is highly scalable and modular for addressing a wide range of radio requirements, preferably using commodity components. | 2011-12-08 |
20110302391 | DIGITAL SIGNAL PROCESSOR - A digital signal processor comprises an instruction analysis unit, a digital signal processor (DSP) core and a memory unit. The instruction analysis unit receives an instruction and determines the required bit width M for the data process corresponding to the instruction. The DSP core performs the M-bit data process based on the bit width M determined by the instruction analysis unit, and the memory unit stores multiple data and performs the M-bit access based on the bit width M determined by the instruction analysis unit thereby allowing the DSP core to access, and at lest one available space in the memory unit will be adjusted such that only the access space having the bit width M for the operation corresponding to the instruction will be open in each access, thereby effectively achieving the effect of power-saving. | 2011-12-08 |
20110302392 | INSTRUCTION TRACKING SYSTEM FOR PROCESSORS - A method and apparatus for tracking instructions in a processor. A completion unit in the processor receives an instruction group to add to a table to form a received instruction group. In response to receiving the received instruction group, the completion unit determines whether an entry is present that contains a previously stored instruction group in a first location and has space for storing the received instruction group. In response to the entry being present, the completion unit stores the received instruction group in a second location in the entry to form a stored instruction group. | 2011-12-08 |
20110302393 | CONTROL SYSTEMS AND DATA PROCESSING METHOD - When executing sequential processing such as a ladder logic, converting a program formed of an instruction set of another processor to a program executable by an own processor in software and then conducting processing lowers the real time property. In a control system, a storage unit stores a program for the own processor and a program for another processor. A processor reads data from the storage unit, executes processing described as a program, and gives an instruction to change over a method for acquiring data from the storage unit, to a conversion instruction unit according to data contents. A changeover unit is connected to the storage unit directly or via the conversion unit to change over the data acquiring method according to an instruction from the conversion instruction unit. The conversion unit converts data read from the storage unit to data executable by the processor, according to a conversion scheme. | 2011-12-08 |
20110302394 | SYSTEM AND METHOD FOR PROCESSING REGULAR EXPRESSIONS USING SIMD AND PARALLEL STREAMS - A system and method for performing regular expression computations includes loading a plurality of input values corresponding to one or more input streams as elements of a vector register implemented on programmable storage media. New state indexes are computed using the input values, and current state values corresponding to different automata by using single instruction, multiple data (SIMD) vector operations. New state values associated with the different automata are determined using the new state indexes to look up new state values such that state transitions for a plurality of regular expressions are processed concurrently. | 2011-12-08 |
20110302395 | HARDWARE ASSIST THREAD FOR DYNAMIC PERFORMANCE PROFILING - A method and data processing system for managing running of instructions in a program. A processor of the data processing system receives a monitoring instruction of a monitoring unit. The processor determines if at least one secondary thread of a set of secondary threads is available for use as an assist thread. The processor selects the at least one secondary thread from the set of secondary threads to become the assist thread in response to a determination that the at least one secondary thread of the set of secondary threads is available for use as an assist thread. The processor changes profiling of running of instructions in the program from the main thread to the assist thread. | 2011-12-08 |
20110302396 | IMAGE PROCESSING APPARATUS THAT PERFORMS PROCESSING ACCORDING TO INSTRUCTION DEFINING THE PROCESSING, CONTROL METHOD FOR THE APPARATUS, AND STORAGE MEDIUM - An image processing apparatus which makes it possible to select a plurality of instructions at a time, and connect a plurality of documents together so that they can be processed as one document. The image processing apparatus has a reading unit, which reads an image on an original to generate image data, and performs processing according to an instruction defining reading processing to be performed, as well as processing on the generated image data. The selected plurality of instructions are analyzed, and based on the analysis result, the selected plurality of instructions are connected together to create a new instruction. | 2011-12-08 |
20110302397 | Method and Apparatus for Improved Secure Computing and Communications - A computing and communications system and method may comprise a primitive recursive function computing engine including an instruction set architecture prohibiting loop operations that continue for an indefinite time. The system and method may further comprise the instruction set architecture comprising system identifiers selected from a group comprising things, places, paths, actions and causes. The instruction set architecture may comprise organizing at least one data thing into a processing path to be acted upon by an action. The instruction set architecture may comprise defining a processing element as comprising an input interface configured to receive a data thing into the processing path; a processor in the processing path configured to perform the action on the data thing; and an output interface configured to receive a result of performing of the action on the data thing configured to provide the result as an output of the processing element. | 2011-12-08 |
20110302398 | KEY PROTECTORS BASED ON ONLINE KEYS - An online key stored by a remote service is generated or otherwise obtained, and a storage media (as it applies to the storage of data on a physical or virtual storage media) master key for encrypting and decrypting a physical or virtual storage media or encrypting and decrypting one or more storage media encryption keys that are used to encrypt a physical or virtual storage media is encrypted based at least in part on the online key. A key protector for the storage media is stored, the key protector including the encrypted master key. The key protector can be subsequently accessed, and the online key obtained from the remote service. The master key is decrypted based on the online key, allowing the one or more storage media encryption keys that are used to decrypt the storage media to be decrypted. | 2011-12-08 |
20110302399 | Rapid activation of service management processor subsystem for server device - A bootloader process executing on a service management processor (SMP) subsystem for a server device determines whether an initialization flag stored within non-volatile memory of the subsystem is set. The initialization flag corresponds to whether a full cold initialization process of the subsystem is to occur. In response to determining that the initialization flag has not been set, the bootloader process loads an image stored in the non-volatile memory into volatile memory of the subsystem. The image corresponds to processes properly running on the SMP subsystem after the SMP subsystem has booted, including a management process. The processes begin executing on the subsystem. The management process, determines whether a hardware configuration change within the subsystem has been made since when the image was saved to the non-volatile memory. In response to determining that the hardware configuration change has been made, the management process sets the initialization flag and rebooting the subsystem. | 2011-12-08 |
20110302400 | SECURE VIRTUAL MACHINE BOOTSTRAP IN UNTRUSTED CLOUD INFRASTRUCTURES - Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure. | 2011-12-08 |
20110302401 | Information processing apparatus, information processing method and recording medium - An information processing apparatus includes a receiver configured to receive a packet via a communication line, an operating processor configured to suspend an operation thereof when the information processing apparatus is in an energy saving mode, a first storage configured to store the packet received by the receiver, a determining unit including a table in which different operations of the operating processor are recorded in association with different patterns of packets and configured to determine whether to restart the operating processor when the information processing apparatus is in the energy saving mode based on a pattern of the packet stored in the first storage and the patterns of the packets in association with the operations of the operating processor recorded in the table, and a power manager configured to supply power to the operating processor based on a result determined by the determining unit to restart the operating processor. | 2011-12-08 |
20110302402 | ON-CHIP SECURITY METHOD AND APPARATUS - A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been initiated. A predetermined security value, or password, is stored, for example in BootROM. A value of a security location within FLASH memory is read and the two values are compared. Polling of the serial port is selectively performed, depending on the result of such comparison. In a presently preferred embodiment, if the value in the security location matches the predetermined security value, then polling of the serial port is not performed. This reduces potential security breaches caused in conventional arrangements where code may be downloaded from the serial port and executed, which allows anyone to access and upload programs and data in the FLASH memory, including confidential and proprietary information. | 2011-12-08 |
20110302403 | SYSTEM AND METHOD FOR CONFIGURING PLURAL SOFTWARE PROFILES - A computer with multiple software applications has defined for it plural software profiles for selection of one of the profiles in response to a system and/or user signal. Each profile when selected enables a respective set of applications to run on the system. | 2011-12-08 |
20110302404 | System for secure variable data rate transmission - Secure Variable Data Rate Transceivers and methods for implementing Secure Variable Data Rate are presented. An efficient and systematic method and circuit for implementing secure variable data rate transceivers are presented. The SVDR method is based on block ciphers. An index method is presented for minimizing transmission overhead. This allows SVDR to achieve higher security by using the full ciphermode stream. | 2011-12-08 |
20110302405 | MOBILE WORKFORCE APPLICATIONS WHICH ARE HIGHLY SECURE AND TRUSTED FOR THE US GOVERNMENT AND OTHER INDUSTRIES - A convenient, easy to use ubiquitous secure communications capability can automatically encrypt and decrypt messages without requiring any special intermediating security component such as gateways, proxy servers or the like. Trusted/secure applications for the mobile workforce can significantly improve productivity and effectiveness while enhancing personal and organizational security and safety. | 2011-12-08 |
20110302406 | METHOD AND SYSTEM FOR RECOVERING A SECURITY CREDENTIAL - A system and method for recovering a security credential is provided. A security credential stored in the storage of a computing device is encrypted using a first encryption key generated by a server. A first decryption key for decrypting the security credential and a second encryption key for re-encrypting the security credential are received. The first decryption key and the second encryption key are generated by the server. The security credential is decrypted using the first decryption key. The security credential is communicated to a user of the computing device. The security credential is re-encrypted in the storage of the computing device using the second encryption key. | 2011-12-08 |
20110302407 | SYSTEM AND METHOD FOR SENDING ENCRYPTED MESSAGES TO A DISTRIBUTION LIST - A system and method for sending encrypted messages to a distribution list that facilitates the sending of such messages only to individuals or other entities associated with the distribution list that will be able to read the message. In one embodiment, the method comprises the steps of: identifying a distribution list address in a message; determining one or more member addresses associated with the distribution list address; for each member address, determining if a public key for a member identified by the respective member address is available on the computing device; encrypting the message to each member identified by the one or more member addresses for which a public key for the respective member is available on the computing device; sending the encrypted message to the distribution list address if each of the one or more member addresses associated with the distribution list identifies a member for which a public key is available on the computing device; and sending the message to each of the one or more member addresses that identifies a member for which a public key is available on the computing device otherwise. | 2011-12-08 |
20110302408 | Secure Communication Systems, Methods, and Devices - In par, the invention relates to a secure communication system. The system includes a voice call processing server; a user database in communication with the server; and a security gateway in communication with the server and the database, wherein the gateway transmits an encrypted signaling key and at least one encrypted media key in response to validating a mobile device using configuration data stored in the database, wherein the server tracks call traffic encrypted using the at least one media key, the call traffic routed using the Internet. | 2011-12-08 |
20110302409 | METHOD AND SYSTEM FOR VERIFICATION OF AN ENDPOINT SECURITY SCAN - A method of granting access to resources includes the step of receiving a request from a node to access a resource. A scanning agent is generated to gather information about the node. A key is generated and embedded in the scanning agent. The scanning agent is transmitted to the node and gathers information regarding the node. The scanning agent encrypts the gathered information using the at least one generated key. The encrypted gathered information is received from the scanning agent and decrypted. | 2011-12-08 |
20110302410 | SECURE DOCUMENT DELIVERY - A method, machine-readable medium, and server to create a key, set an expiration event for the key to expire, send the key to a first client device to encrypt the document, authenticate a second client device that is in receipt of the encrypted document, delete the key if the expiration event has occurred, and send the key from to the authenticated second client device to decrypt the document if the expiration event has not yet occurred. For one embodiment, the key is used by client devices for encryption and decryption of the document only and is not otherwise accessible to the client devices. For one embodiment, the server facilitates sending the encrypted document to the second client device but does not retain a copy of the encrypted document. | 2011-12-08 |
20110302411 | METHOD AND SYSTEM FOR UPDATING AND USING DIGITAL CERTIFICATES - A method and system for updating and using a digital certificate, and the method comprises: a first terminal establishing a secure link with an access point and using the secure link to send a certificate updating request to the access point, where the certificate updating request includes a digital certificate to be updated which is currently used by the first terminal; and the access point sending the digital certificate to be updated to a local Authentication Service Unit which issues the certificate to be updated; and the local Authentication Service Unit which issues the digital certificate to be updated verifying the digital certificate to be updated, and after the digital certificate is verified to be valid, a local Authentication Service Unit corresponding to the access point generating a new digital certificate of the first terminal and sending the new digital certificate to the first terminal through the access point. | 2011-12-08 |
20110302412 | PSEUDONYMOUS PUBLIC KEYS BASED AUTHENTICATION - Systems and methods for pseudonymous public keys based authentication are described that enable an authentication to achieve pseudonymity and non-repudiation, for example, at the same time. Pseudonymity may provide, for example, that a user can show to different parties different digital identifiers for authentication instead of, for example, always using a single digital identifier everywhere, which may lead to a breach of privacy. Non-repudiation may provide, for example, that the authentication data at the server side can be used, for example, to verify a user's authentication request, but not to generate an authentication request, which might lead to user impersonation. A user may use a physical token to generate the authentication request corresponding to the user's identity to pass the authentication. | 2011-12-08 |
20110302413 | Authorizing Information Flows Based on a Sensitivity of an Information Object - A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow. | 2011-12-08 |
20110302414 | REMOTE CONTROL OF MEDICAL DEVICES USING INSTANT MESSAGING INFRASTRUCTURE - Systems and methods for remote control and management of medical workstations using an instant messaging infrastructure. A remote client, such as a mobile phone, laptop, tablet, or other computing device, is used to generate instructions or information requests in one or more data packets. The remote client sends the one or more data packets using the instant messaging infrastructure to a medical workstation at another location. A service application in communication with the medical workstation receives the data packets and causes the medical workstation to retrieve the requested information or execute the instruction. The communications between the remote client and the service application are encrypted and signed to ensure secure communications. | 2011-12-08 |
20110302415 | SECURING CUSTOMER VIRTUAL MACHINES IN A MULTI-TENANT CLOUD - A trusted virtualization platform protects sensitive customer data during operation of virtual machines in a multi-tenant cloud computing center. The trusted virtualization platform limits administrator access to the data and state of the virtual machines running thereon, reports any changes made thereto, and requires keys provided by the customer or a trusted third party of the customer to perform management operations on the virtual machines. By requiring cloud computing centers to use such trusted virtualization platforms, customers uploading their virtual machines into the cloud computing center can be assured that cloud administrators will not be able to access or tamper with their private data. Furthermore, customers can directly audit all important state or configuration changes for their virtual machines as the trusted virtualization platform can be configured to report all such changes according to a security policy set by the customer. | 2011-12-08 |
20110302416 | METHOD AND SYSTEM FOR SECURED COMMUNICATION IN A NON-CTMS ENVIRONMENT - A method for bypassing a Cable Modem Termination System (CMTS), the method includes: receiving, by a session manager, an encrypted Security Association Identifier (SAID) and an encrypted Traffic Encryption Key (TEK) that are associated with unicast transmission from the CMTS to a cable modem. The encrypted SAID and the encrypted TEK are upstream transmitted from the cable modem. Providing to an edge device, over a secured link a representation of the SAID and a representation of the TEK. Receiving by the edge device information that is associated with the SAID and should be downstream transmitted to the cable modem. Encrypting, by the edge device, the information by the TEK to provide encrypted information. Transmitting, by the edge device, the encrypted information to the cable modem while bypassing the CMTS. | 2011-12-08 |
20110302417 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 2011-12-08 |
20110302418 | INFORMATION PROCESSING DEVICE - One embodiment is an information processing device for obtaining an HMAC, including a padding circuit for generating first key data by adding a first constant with respect to secret key data when a secret key length of input secret key data is shorter than a block length of a hash function, setting the secret key data as second key data when the secret key length is equal to the block length, generating third key data by adding the first constant with respect to a first digest value when the secret key length is longer than the block length, and performing an exclusive OR operation with a second constant with respect to one of the first key data, the second key data, or the third key data to calculate first data; a hash calculation circuit for obtaining the first digest value and obtaining a second digest value; and a control unit for managing a processing state for calculating the HMAC, wherein the hash calculation circuit outputs a first midway progress value when interrupting a calculation process of the first digest value in the middle, and resumes the calculation process of the first digest using the first midway progress value when a signal indicating resuming instruction of the calculation process of the first digest value is input to the control unit. | 2011-12-08 |
20110302419 | IMAGE MANAGING METHOD AND IMAGE MANAGING SYSTEM - An image managing method includes dividing the original moving image into a header and a body and generating the group hash value of the header portion, generating the hash value of each item of still image data, connecting the group hash value of the header portion and the hash value of each item of still image data to generate connected hash values, generating a group of the connected hash values as a hash value list, generating the hash value of a Huffman table on the basis of cutting out one still image, and signing to generate signature information of the original moving image, using the group hash value of the header portion, the hash value of the Huffman table, and the hash list as verification data of the original moving image, by adding a digital signature of a video recording terminal to it. | 2011-12-08 |
20110302420 | SYSTEM AND METHOD FOR AUTHENTICATED AND PRIVACY PRESERVING BIOMETRIC IDENTIFICATION SYSTEMS - A biometric based identification and authorization for a collected physical biometric for a security infrastructure is presented. The biometric identification and authorization is achieved with an identity verification template (IVT) generated from a User Biometric (UB) collected from a human or non-human object and stored on an biometric storage device (e.g., a magnetic strip card, smart card, Universal Serial Bus (USB) flash drive or a Radio Frequency Identifier (RFID) device, etc.). The generated UB is discarded. The IVT does not contain complete information from the UB but allows for accurate verification of the human or non-human object when another UB is generated for the human or non-human object at a later time. | 2011-12-08 |
20110302421 | Authentication Method And Apparatus Using One Time Pads - An authentication method is provided between entities ( | 2011-12-08 |
20110302422 | HASH FUNCTION USING A REPEATED FUNCTION WITH SHIFTS - In the data security field, a modular cryptographic hash function process is embodied in a computer system or hardware (circuitry). The process is based on the mode of operation of the known “Shabal” hash function which uses a keyed permutation applied to each word of the message. Here a function is substituted for the permutation and additional final rounds are added to the function. Security is further enhanced over that of the Shabal hash function by avoiding use of the message blocks in computing certain of the data arrays, in order to frustrate known message attacks. | 2011-12-08 |
20110302423 | METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 2011-12-08 |
20110302424 | Software Self-Checking Systems and Methods - Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques. | 2011-12-08 |
20110302425 | SYSTEMS, METHODS, AND APPARATUS TO VIRTUALIZE TPM ACCESSES - Embodiments of system, method, and apparatus for virtualizing TPM accesses is described. In some embodiments, an apparatus including a CPU core to execute a software program, a manageability engine coupled to the CPU core, the manageability engine to receive a trusted platform module (TPM) command requested by the software program and to process the TPM command utilizing a manageability firmware by at least creating a TPM network packet, and a network interface coupled to the manageability engine to transmit the TPM network packet to a remote TPM that is external to the apparatus for processing is utilized as a part of this virtualization process. | 2011-12-08 |
20110302426 | Method for generating a bit vector - A method and a circuit configuration for generating a bit vector are described. At least two configurations, each having state machines of the same design, are used, to whose inputs an input signal is sent and which generate an output signal as a function of their state, each state machine always having a different state than the other state machine of one configuration, so that the bit vector is generated by a linear gating of the output signals of the state machines of different configurations. | 2011-12-08 |
20110302427 | METHOD FOR ACTIVATING AT LEAST A FUNCTION ON A CHIPSET AND CHIPSET FOR THE IMPLEMENTATION OF THE METHOD - A method for activating a function of a chipset comprising at least a memory and a calculation module in charge of cryptographic operations, the memory containing at least a seed and the calculation module containing at least one cryptographic algorithm, the method comprising the steps of: receiving at least one of a segmentation key, a global key and a global cryptographic algorithm selector; transmitting at least two items selected from the group consisting of the seed, the received segmentation key, the global key and the global cryptographic algorithm selector, to the calculation module, each of the items being provided by different entities; generating in the calculation module, a temporary key by using one of said at least one cryptographic algorithm of the calculation module and at least the two items; and verifying an authenticity of a received activation message using the temporary key and controlling activation based on the verification. | 2011-12-08 |
20110302428 | METHOD, SYSTEM AND MEDIUM FOR ANALOG ENCRYPTION IN A FLASH MEMORY - A system and method for analog encryption and decryption, in which the encryption and encoding processes are interrelated, such that by failing to decrypt the retrieved data, decryption fails. | 2011-12-08 |
20110302429 | SERVER RACK SYSTEM - A rack system for a server includes a number of server units, which includes first to the third sets of server units, voltage converter, first to third power supply circuits. The voltage converter receives and converters a three-phase alternating current (AC) power signal to provide first to third single-phase power signals. The first to the third sets of power supply circuits respectively provides first to third direct current (DC) power signals according to the first to the third single-phase power signals. The first set to the third set of server units is respectively powered by first to the third DC power signals or respectively powered by first part, second part, and third part of the first to the third DC power signals. | 2011-12-08 |
20110302430 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 2011-12-08 |
20110302431 | METHOD AND SYSTEM FOR MANAGING POWER CONSUMPTION UTILIZING INTER-GATEWAY COMMUNICATION - Aspects of a method and system for managing power consumption utilizing inter-gateway communication are provided. In this regard, a first broadband gateway residing in a first location may determine past, present, and/or expected power consumption of the first location. The gateway may receive, from one or more other broadband gateways residing in one or more other locations, information that enables determining past, present, and/or expected power consumption of the other location(s). The gateway may control power consumption of the first location by controlling a state of operation of devices residing in the first location. The gateway may determine aggregate power consumption of the first location and the other location(s). The gateway may control power consumption of the first location by enabling operation of one or more devices during periods of lower aggregate power consumption and disabling operation the devices during periods of higher aggregate power consumption. | 2011-12-08 |
20110302432 | SUPER CAPACITOR SUPPLEMENTED SERVER POWER - Super capacitor supplemented server power is described. In embodiments, a power system manager is implemented to monitor the capability of one or more power supplies to provide power for a server system. The power system manager can determine that the capability of the power supplies to provide the power is deficient, and then engage one or more super capacitor power modules to provide supplemental power for the server system to mitigate the power deficiency. | 2011-12-08 |
20110302433 | CONTROL CIRCUIT OF POWER-SAVING SOCKET - A control circuit is provided for a power-saving socket and includes a central processing unit, a relay, a sensor unit, a time counting unit, a standby current setting unit, and a current monitoring unit. The central processing unit, upon receiving a human approaching signal from the sensor unit, issues a control signal to the relay to switch a contact of the relay to a closed condition, whereby an electrical appliance plugged to the socket is allowed to operate. When the electrical appliance plugged to the socket stays in a standby mode, the central processing unit receives a current value from the current monitoring unit, which is equal to or smaller than an appliance standby current level, and the time counting unit starts time counting for a specific period of time. Once the detected current value from the current monitoring unit maintains equal to or smaller than the appliance standby current level within the whole specific period of time, the central processing issues a control signal to the relay to switch the contact of the relay to an open condition, whereby power supplied to the electrical appliance plugged to the socket is completely cut off and the electrical appliance consumes no standby power. In this way, power saving can be achieved. | 2011-12-08 |
20110302434 | METHOD AND DEVICE OF POWER SAVING FOR TRANSMITTING SIGNALS - A method and device of the power saving for transmitting a signal is provided. The method comprises the steps of: transmitting a test signal with a first test amplitude from a local terminal, wherein the first test amplitude is selected from a plurality of preset amplitudes; acknowledging that the test signal with the first test amplitude has been received by a remote terminal if an acknowledgement signal is transmitted from the remote terminal for a response to the test signal; and transmitting a data signal having a data amplitude based on the first test amplitude. The device can transmit the data signal with a small data signal amplitude by the method to achieve the saving power. | 2011-12-08 |
20110302435 | POWER MANAGEMENT METHOD AND APPARATUS, AND POWER SUPPLY SYSTEM - A power management method and apparatus, and a power supply system are provided. The method includes: obtaining a power demand value of each module and a rated output power of each power supply unit (PSU) in a communication equipment; calculating the obtained power demand value of each module to acquire a total power demand value of the modules; and adjusting, according to the calculated total power demand value of the modules and the obtained rated output power of each PSU, the current number of the PSUs actually turned on in the communication equipment. | 2011-12-08 |
20110302436 | System Wakeup on Wireless Network Messages - While an information handling device is in a reduced power state, the information handling device transitions from the reduced power state to a higher power state in response to receiving a message over an established wireless network connection that maintains a presence on a wireless network. In turn, the information handling device processes the message accordingly in the higher power state. | 2011-12-08 |
20110302437 | SWITCH-OFF OF A MICRO CONTROLLER UNIT IN BATTERY MODE - Disclosed are apparatus and methodology for providing battery protection for devices operating in a battery supplied low-power mode. Micro controller operated devices (such as electricity meters) that may be stored for extended periods after manufacture and before deployment are provided backup battery protection by insertion of an overcurrent operable switch between the battery and the micro controller. A timer causes the micro controller to switch to a normal power mode after a predetermined time period during which no external supply voltage is provided. Normal power mode operation under battery powered supply only will cause the overcurrent switch to open, so as to disconnect the battery from the micro controller. Alternatively, instead of switching the micro controller to a normal power mode after a predetermined time period, the battery powered supply is shorted to ground using an internal switch of the micro controller, to achieve the same result of disconnecting the battery from the micro controller. | 2011-12-08 |
20110302438 | METHOD AND SYSTEM FOR MANAGING THE OPERATION OF A MULTICORE DATA PROCESSING DEVICE - The data processing device comprising at least two processing units, each processing unit (CR | 2011-12-08 |
20110302439 | METHODS AND APPARATUS FOR ADJUSTING PRINTING DEVICE POWER CONSUMPTION BASED ON USAGE DATA - Methods and apparatus for adjusting printing device power consumption based on previously acquired usage data. The printing device has multiple energy consumption states including at least a ready state in which the printing device is ready to commence processing of a print job immediately upon receipt and including at least a low power state where the printing device is not ready to commence processing of a newly received print job. Acquired usage data includes parameters of print jobs submitted during a data collection period of time. The parameters may include time and date of submitted print jobs. Based on the usage data a usage profile is determined. The usage profile identifies one or more high usage periods of time and one or more low usage periods of time. Methods and apparatus then switch the printing device among the multiple energy consumption states based on the usage profile. | 2011-12-08 |
20110302440 | DIGITAL POWER BALANCING CONTROLLER - An apparatus, system, and method are disclosed for providing power balancing for power supplies. A power module measures an amount of input power for each of a plurality of switching power supplies. A conversion module converts the measured amount of input power of each power supply to a digital power measurement signal. An averaging module determines an average amount of input power per power supply based on a summation of the digital power measurement signal of each power supply. A comparison module compares the digital power measurement signal of a power supply to the determined average amount of input power per power supply. An input power adjustment module adjusts the input power of the power supply to cause the amount of input power of the power supply to be substantially equal to the determined average amount of input power per power supply. | 2011-12-08 |
20110302441 | CALCULATING POWER INPUT TO A COMPUTER - One embodiment is a computer that includes a controller and a battery with a fuel gauge. The fuel gauge reports voltage and current input to charge the battery while the computer is in an off-state. The controller receives information about the voltage and current input to charge the battery from the fuel gauge and uses the information to calculate power being input to the computer while the computer is in an on-state. | 2011-12-08 |
20110302442 | Method and System for Combining and/or Blending Multiple Content From Different Sources in a Broadband Gateway - A method and system are provided in which a broadband gateway may receive different content from different sources, may combine the content to produce a combined content, and may communicate the combined content to a device connected to the broadband gateway. The content may be automatically and/or manually synchronized. The synchronization may be based on a clock signal received from the device, a clock signal from another device connected to the broadband gateway, and/or a clock signal received through one or more network access service providers. The content may be video image data and/or audio data. Moreover, user-generated content may be received and combined by the broadband gateway when in a peer-to-peer communication configuration with the source of the content. When more than two different content are received, the broadband gateway may be utilized to select which contents to combine. | 2011-12-08 |
20110302443 | Method and System for Synchronizing Multiple Secure Clocks - A method for synchronizing secure clocks in a system without using any external clock, a system configured to perform the method, and a computer medium storing system code. Each secure clock is adjustable subject to a set of predetermined adjustment constraints. The intersection of the adjustment constraints of all the clocks is a limit intersection. The clocks may be synchronized to an average adjusted time of the secure clocks (if the average adjusted time is within the limit intersection) or to a substitute average adjusted time within the limit intersection if the average adjusted time is outside the limit intersection. Synchronization can occur in response to a request to adjust at least one of the clocks by a proposed clock adjustment value or to synchronize at least one of them without otherwise adjusting them. | 2011-12-08 |
20110302444 | Information processing apparatus and driver execution control method - An information processing apparatus includes a process monitor configured to monitor the status of processes executed in accordance with respective monitored driver programs which are to be monitored among driver programs associated with respective devices, an error processor configured to operate when a processing error is detected by the process monitor, to register, in a nonvolatile memory, driver information indicating the driver program with respect to which the error has been detected, and an execution controller configured to call and execute the driver programs, wherein when the information processing apparatus is started, the execution controller skips execution of the driver program indicated by the driver information registered in the nonvolatile memory. | 2011-12-08 |
20110302445 | SELECTIVE RETIREMENT OF BLOCKS - Systems and methods are provided for selectively retiring blocks based on refresh events of those blocks. In addition to refresh events, other criteria may be applied in making a decision whether to retire a block. By applying the criteria, the system is able to selectively retire blocks that may otherwise continue to be refreshed. | 2011-12-08 |
20110302446 | MONITORING LOST DATA IN A STORAGE SYSTEM - A data validation method comprises associating a validation chunk with one or more data chunks stored on one or more storage mediums. The validation chunk comprises validation information for verifying whether data recorded in a subdivision of the one or more data chunks is lost. A request is received for an operation to be performed on first data stored in a first subdivision of a first data chunk from among said one or more data chunks. One or more portions of the validation information are examined to determine whether the data recorded in said first subdivision is deemed to be lost. | 2011-12-08 |
20110302447 | INFORMATION SYSTEM AND DATA TRANSFER METHOD - Availability of an information system including a storage apparatus and a computer is improved. First and second storage apparatuses execute remote copy of copying data written into a first primary volume from the computer to a second primary volume, at least one of the first and second storage apparatuses executes local copy of copying the data written into the first or second primary volume in a self-storage apparatus to the corresponding first or second secondary volume, and the computer switches the destination of a write request of the data from the first storage apparatus to the second storage apparatus in case of a failure occurring in the first storage apparatus. | 2011-12-08 |
20110302448 | IMAGE PROCESSING APPARATUS - An image processing apparatus includes: a switch of a main power supply unit that is switched between ON and OFF in response to a user's operation so as to switch the power supply between a supply of power and an interruption of the supply; a first notification unit that sends an interrupt request notification for requesting to interrupt a process in a recoverable way to all of or a part of the applications being run if the switch of a main power supply unit is turned off; and a power supply control unit that interrupts the supply from the power supply when a time lapse, that is measured since a time when the notification unit has sent the interrupt request notification, exceeds a first predetermined time. | 2011-12-08 |
20110302449 | COLLECTION ORDERING FOR REPLICATED STATE MACHINES - A replicated state machine with N replica servers may be configured to tolerate a count of F faults. A first operation (of a first ordering type) executes when a first quorum of correctly functioning replicas is available. A second operation (also of the first operation type) executes when a second quorum of correctly functioning replicas is available. A third operation (of a second ordering type) executes when a third quorum of correctly functioning replicas are available. The operations are executed by the replicated state machine such that: (1) the replicated state machine does not guarantee operational ordering between the first operation and the second operation; (2) the replicated state machine guarantees ordering between the first operation and the third operation; and (3) the replicated state machine guarantees ordering between the second operation and the third operation. | 2011-12-08 |
20110302450 | FAULT TOLERANT STABILITY CRITICAL EXECUTION CHECKING USING REDUNDANT EXECUTION PIPELINES - A circuit arrangement and method utilize existing redundant execution pipelines in a processing unit to execute multiple instances of stability critical instructions in parallel so that the results of the multiple instances of the instructions can be compared for the purpose of detecting errors. For other types of instructions for which fault tolerant or stability critical execution is not required or desired, the redundant execution pipelines are utilized in a more conventional manner, enabling multiple non-stability critical instructions to be concurrently issued to and executed by the redundant execution pipelines. As such, for non-stability critical program code, the performance benefits of having multiple redundant execution units are preserved, yet in the instances where fault tolerant or stability critical execution is desired for certain program code, the redundant execution units may be repurposed to provide greater assurances as to the fault-free execution of such instructions. | 2011-12-08 |
20110302451 | FINANCIAL INTEGRATION TEST PROCESS - A method for testing financial operations of network applications within a computer network generates a test matrix to store test data relating to testing of financial operations related to the network applications within the computer network. A unique testing scenario is developed for testing the financial operations across a plurality of network applications and stored within the test matrix. An expected financial result achieved in accordance with execution of the unique testing scenario is calculated and stored within the test matrix. The unique testing scenario is executed using the network applications within the computer network to achieve an actual financial test result which is stored within the test matrix. The expected financial result is compared with the actual financial result to detect issues within the network applications relating to financial operations. | 2011-12-08 |
20110302452 | CIRCUITRY TO FACILITATE TESTING OF SERIAL INTERFACES - Circuitry to facilitate testing of serial interfaces is described. Specifically, some embodiments of the present invention facilitate testing the clock and data recovery functionality of a receiver. A serial interface can include a multiplying phase locked loop (MPLL) clock generator, a transmitter, and a receiver. The MPLL clock generator can generate a first clock signal and a second clock signal, and can vary a phase and/or frequency difference between the first clock signal and the second clock signal. During test, the transmitter and the receiver can be directly or capacitively coupled to each another. Specifically, during test, the serial interface can be configured so that the transmitter transmits data using the first clock signal, and the receiver receives data using the second clock signal. The clock and data recovery functionality of the receiver can be tested by comparing the transmitted data with the received data. | 2011-12-08 |
20110302453 | DEBUG METHOD FOR COMPUTER SYSTEM - A debug method for computer system is disclosed. The method includes the following steps. Firstly, a first index is increased. Next, a first debug data to a j | 2011-12-08 |
20110302454 | PERFORMING ASYNCHRONOUS TESTING OF AN APPLICATION OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method, system, and computer-readable medium having instructions for performing asynchronous testing of an application that is occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the at least a portion of the online services database is authorized for replication at a software application, information is determined for an entity for an application database from the metadata, a request is sent for a database using the software application interface and the request has an asynchronous operation call to the database for the entity, an execution of the asynchronous operation call is recorded within a callback function, a response is received for the asynchronous operation call, and a result is determined for the software application performance. | 2011-12-08 |
20110302455 | TARGETED BLACK BOX FUZZING OF INPUT DATA - Technologies are described herein for performing targeted, black-box fuzzing of input data for application testing. A dataflow tracing module traces an application while it reads and processes a set of template data to produce operation mapping data that maps data locations in the template data to operations performed by the application in processing the data at the location. The tracing is performed without requiring the application source code, knowledge of the syntactical structure of the input data, or specially instrumented binaries for the application. A fuzzing module is then utilized to target a specific operation or operations in the application by fuzzing data locations within the template data according to the operation mapping data until the desired outcome is achieved. | 2011-12-08 |
20110302456 | SEMICONDUCTOR INTEGRATED CIRCUIT, OPERATING METHOD OF SEMICONDUCTOR INTEGRATED CIRCUIT, AND DEBUG SYSTEM - A current measurement unit measuring power supply currents each consumed in a plurality of circuit blocks of which at least one of the circuit blocks includes a processor, and outputting the measurement result as the power supply current values. A selection unit selecting at least one of the power supply current values according to selection information, A trace buffer sequentially holding the power supply current values being selected by the selection unit together with execution information of the processor, and sequentially outputting the held information. By selecting the power supply current values of the circuit blocks required for debugging according to the selection information, the number of external terminals of a semiconductor integrated circuit required for the debugging which includes tracing the power supply current values may be reduced. As a result, a chip size of the semiconductor integrated circuit with a debug function may be reduced. | 2011-12-08 |
20110302457 | METHOD OF DETERMINING A UNIQUE SUBSCRIBER FRM AN ARBITRARY SET OF SUBSCRIBER ATTRIBUTES - Various exemplary embodiments relate to a subscriber profile repository (SPR) for determining a subscriber associated with a set of subscription identifiers. The subscriber profile repository may include: an interface which receives a subscriber profile request including at least one subscription identifier; a subscriber record database that includes a set of subscription identifiers; a subscriber record cache that contains a subset of the records contained in the subscriber record database; and a search manager that queries the subscriber record cache using each subscription identifier and queries the subscriber record database when the subscriber record cache does not contain a record matching a subscription identifier. The SPR may also include a results manager that compares subscriber records and updates the cache when a result is found in the subscriber records database. Various exemplary embodiments relate to a method performed by the SPR and a machine-readable medium including instructions for an SPR. | 2011-12-08 |
20110302458 | FRAMEWORK FOR MANAGING FAILURES IN OUTBOUND MESSAGES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN), a request from a requesting node for an establishment of a first service data flow (SDF); generating a first rule set for implementing the first SDF in response to the request; transmitting a first rule of the rule set to a first node for installation of the first rule; waiting for a period of time for a response from the first node; determining from the response whether installation of the first rule at the first node failed or succeeded; and if installation of the first rule succeeded, transmitting a second rule of the first rule set to a second node for installation of the second rule. | 2011-12-08 |
20110302459 | SYSTEM AND METHOD FOR TESTING HARD DISK PORTS - A method tests hard disk ports located on a motherboard of a computing device. Each of the hard disk ports connects to a respective serial port of a test fixture. The test fixture includes a group of serial ports, a multiplexer and a storage device. Each of the hard disk ports is selected to be tested during the process of hard disk ports test. A data transmission path is formed by building a connection between the storage device and a channel of the multiplexer corresponding to the hard disk port. Data are written to the storage device and read from the storage device through the data transmission path. The hard disk port is working normal if the written data are identical to the read data. The hard disk port is not working normally if the written data are not identical to the read data. | 2011-12-08 |
20110302460 | Apparatus and method for detecting an approaching error condition - An apparatus and method are provided for detecting an approaching error condition within a data processing apparatus. The data processing apparatus includes a second sequential storage structure which is arranged to latch the output signal generated by combinatorial circuitry dependent on a second clock signal. The second sequential storage structure has a main storage element to latch a value of the output signal for provision to subsequent combinatorial circuitry, and transition detection circuitry for detecting a change of the value of the output signal latched by the main storage element during a predetermined timing window, said change indicating an approaching error condition whilst the value stored in the main storage element is still correct. The second sequential storage structure can be operated in either a first mode of operation or a second mode of operation. In the first mode of operation, the predetermined timing window is a timing window ahead of a time at which the main storage element latches said value of the output signal, to thereby enable an approaching setup timing error due to a propagation delay within the combinatorial circuitry to be detected. In the second mode of operation, the predetermined timing window is a timing window after the time at which the main storage element latches said value of the output signal such that an approaching hold timing error due to an increase in skew between the first and second clock signals is detected. Such a technique provides a simple and efficient mechanism for detecting a variety of approaching error conditions whilst the second sequence storage structure continues to operate correctly. | 2011-12-08 |
20110302461 | ERROR PATTERN IDENTIFICATION IN AN INSTALLED BASE OF SYSTEMS - A system and method of servicing a group of similar types of equipment that maybe installed at geographically separated locations is described. The method makes use of error messages produced by the equipment and service requests received by a servicing center. Data mining techniques are used to establish error patterns associated with specific failure modes so that future error messages may be processed to determine if an identified failure mode has occurred. This will enable the efficient dispatch of spare parts and service personnel to the location where the failure has occurred. | 2011-12-08 |
20110302462 | SEVERITY MAP OF CHANGE-INDUCED PERVASIVE SERVICES OUTAGES - A computer implemented method, system and/or computer program product handle problems caused by a modification to an information technology (IT) system. Problem-data, describing a known problem to a first IT system that occurred during a modification to the first IT system; severity-data, describing a severity of the known problem; and solution-data, describing a solution of steps to be taken to correct the known problem, are received and stored. A modification alert indicates that the modification will be applied to a second IT system that is different from the first IT system. If the first IT system and the second IT system share a pre-determined amount of common features, then a severity map, which describes the known problem, the severity of the known problem, and the solution to the known problem as applied to the second IT system, is displayed to a user of the second IT system. | 2011-12-08 |
20110302463 | APPROXIMATE ERROR CONJUGATION GRADIENT MINIMIZATION METHODS - In one embodiment, a method includes selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, calculating an approximate error using the subset of rays, and calculating a minimum in a conjugate gradient direction based on the approximate error. In another embodiment, a system includes a processor for executing logic, logic for selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, logic for calculating an approximate error using the subset of rays, and logic for calculating a minimum in a conjugate gradient direction based on the approximate error. In other embodiments, computer program products, methods, and systems are described capable of using approximate error in constrained conjugate gradient minimization problems. | 2011-12-08 |
20110302464 | DIGITAL DATA TRANSMISSION SYSTEM USING TRANSMITTING UNIT AND RECEIVING UNIT AND TRANSMISSION METHOD - A digital data transmission system includes a transmission unit and a reception unit. The transmission unit includes: a transmission-side logic section configured to transmit digital data in parallel onto data lines; and a deskew data generating section configured to transmit deskew data onto a deskew signal line. The deskew data includes sample data and parity data for each of line components of the digital data. The reception unit includes: a skew adjusting section configured to perform deskew processing on the digital data recovered from the data transmitted on the data lines based on the deskew data recovered from the data transmitted on the deskew signal line; an error correcting section configured to perform error correction on the recovered digital data subjected to the deskew processing based on the parity data of the recovered deskew data; and a reception-side logic section configured to execute a predetermined process to the recovered digital data subjected to the error correction. | 2011-12-08 |
20110302465 | MISALIGNMENT COMPENSATION FOR PROXIMITY COMMUNICATION - In a proximity communication system, transmit elements on one chip are aligned with receive elements on a second chip juxtaposed with the first chip. However, if the elements are misaligned, either statically or dynamically, the coupling between chips is degraded. The misalignment may be compensated by controllably degrading performance of the system. For example, the transmit signal strength may be increased. The bit period or the time period for biasing each bit may be increased, thereby decreasing the bandwidth. Multiple coupling elements, such as capacitors, may be ganged together, thereby decreasing the number of channels. The granularity of symbols, such as images, may be increased by decreasing the number of bits per symbol. Multiple coupling elements, such as capacitors, may be ganged together, thereby decreasing the number of channels. | 2011-12-08 |
20110302466 | SIGNAL TRANSMISSION DEVICE FOR ELEVATOR - Each of a control panel node | 2011-12-08 |
20110302467 | Memory test system with advance features for completed memory system - In a memory test system with advance features for completed memory system, the hardware components are independently configured to generate versatile test patterns for performing a programmable-loading test, a real case test, and a write-feedback test. The write-feedback test is employed to independently test a memory controller which is embedded in an integrated circuit without communicating with the external SDRAM. In the integrated circuit verification stage, the memory test system supports for analyzing and distinguishing the problems inside or outside of the integrated circuit, and testing individual write and read commands. | 2011-12-08 |
20110302468 | Memory system and method of accessing a semiconductor memory device - A memory system is provided with a processor, a main memory, and a flash memory. Performance of the memory system is improved through achievement of speed-up and high data reliability. The memory system includes a nonvolatile memory device and a controller configured to drive a control program to control the nonvolatile memory device. The control program executes a second access operation for the nonvolatile memory device even before a first access operation to the nonvolatile memory device is completed. | 2011-12-08 |
20110302469 | NONVOLATILE SEMICONDUCTOR MEMORY DEVICE - According to one embodiment, a nonvolatile semiconductor memory device comprises a memory cell array, a write control circuit, a latch circuit, an address control circuit, a scan control circuit, and an address latch circuit. The write control circuit executes write and verify for each page of the memory cell array. The latch circuit holds data of the verify result. The address control circuit divides the page into zones and sequentially selects the address of each of the zones. The scan control circuit executes scan so as to count the number of fail bits in zone selected by the address control circuit and determine whether the number of fail bits is not more than the number of allowable bits. The address latch circuit holds the address of a no fail zone, out of the plurality of zones, in which the number of fail bits is 0. | 2011-12-08 |
20110302470 | TEST MODE FOR PARALLEL LOAD OF ADDRESS DEPENDENT DATA TO ENABLE LOADING OF DESIRED DATA BACKGROUNDS - One or more embodiments of the invention enable a memory device to load its memory array with desired background data, such as to reduce total test time and costs associated with testing. A background data loading circuit according to one embodiment of the invention includes a buffer, a data loading circuit, and a pattern generating logic. The buffer is coupled to the array of memory cells. The data loading circuit is coupled to load data into the buffer to be transferred to a respective row of the memory cells. The pattern generating logic is coupled to the data loading circuit. The pattern generating logic applies a pattern generating algorithm corresponding to a test mode when the memory devices is in the test mode and generates patterns of data each for a respective row of the memory cells according to the pattern generating algorithm. The pattern generating logic further causes the data loading circuit to load each of the generated patterns of data into the buffer for transferring to a respective row of the memory cells. | 2011-12-08 |
20110302471 | CIRCUITRY FOR BUILT-IN SELF-TEST - A method of testing a data connection using at least one test sequence, the method including providing a first bit sequence by a first generator; duplicating the first bit sequence to generate a second bit sequence identical to the first; and generating the at least one test sequence based on the first and second bit sequences and transmitting the at least one test sequence over a data connection to be tested. | 2011-12-08 |
20110302472 | CONFIGURABLE TEST SUITE - A system and method for testing a control module includes a microprocessor, where the microprocessor has a programming environment. The programming environment has a test data structure, a configuration data structure, and a monitor data structure each containing data. At least one test data instance is associated with the test data structure and at least one configuration data instance is associated with the configuration data structure. The configuration data instance is a diagnostic test that monitors a parameter of the microprocessor, and the monitor data structure creates the test data instance such that each test data instance corresponds to one of the configuration data instances. The program includes a first control logic for associating the test data structure, the configuration data structure and the monitor data structure as part of a core infrastructure portion of the programming environment, where the core infrastructure portion of the program is static. | 2011-12-08 |
20110302473 | ERROR CORRECTION CODING - Coded video data may be transmitted between an encoder and a decoder using multiple FEC codes and/or packets for error detection and correction. Only a subset of the FEC packets need be transmitted between the encoder and decoder. The FEC packets of each FEC group may take, as inputs, data packets of a current FEC group and also an untransmitted FEC packet of a preceding FEC group. Due to relationships among the FEC packets, when transmission errors arise and data packets are lost, there remain opportunities for a decoder to recover lost data packets from earlier-received FEC groups when later-received FEC groups are decoded. This opportunity to recover data packets from earlier FEC groups may be useful in video coding and other systems, in which later-received data often cannot be decoded unless earlier-received data is decoded properly. | 2011-12-08 |
20110302474 | Ensuring a Most Recent Version of Data is Recovered From a Memory - Method and apparatus for ensuring a most recent version of data is retrieved from a memory, such as a non-volatile flash memory array. In accordance with various embodiments, a controller is adapted to sequentially store different versions of an addressable data block having a selected logical address in different locations within a memory. The controller assigns a revision indication value to each said version, with at least two of said stored versions concurrently sharing the same revision indication value. In some embodiments, the revision indication value constitutes a repeating cyclical sequence count that is appended to each block, or logically combined with a code value and stored with each block. The total number of counts in the sequence is less than the total number of versions resident in the memory. | 2011-12-08 |
20110302475 | Advanced Bitwise Operations and Apparatus in a Multi-Level System with Nonvolatile Memory - A digital system, components and method are configured with nonvolatile memory for storing digital data using codewords. The data is stored in the memory using multiple bits per memory cell of the memory. A code efficiency, for purposes of write operations and read operations relating to the memory, can be changed on a codeword to codeword basis based on input parameters. The code efficiency can change based on changing any one of the input parameters including bit density that is stored by the memory. Storing and reading fractional bit densities is described. | 2011-12-08 |
20110302476 | Memory system and method of accessing a semiconductor memory device - A memory system is provided with a processor, a main memory, and a flash memory. Performance of the memory system is improved through achievement of speed-up and high data reliability. The memory system includes a nonvolatile memory device and a controller configured to drive a control program to control the nonvolatile memory device. The control program executes a second access operation for the nonvolatile memory device even before a first access operation to the nonvolatile memory device is completed. | 2011-12-08 |
20110302477 | Data Hardening to Compensate for Loss of Data Retention Characteristics in a Non-Volatile Memory - Method and apparatus for enhancing reliability and integrity of data stored in a non-volatile memory, such as in a solid-state drive (SSD) having an array of flash memory cells. In accordance with various embodiments, a controller is adapted to harden data stored in a first location of said memory in relation to a detected loss of retention characteristics of the first location. In some embodiments, the data are hardened by storing redundancy information associated with said data in a second location of said memory. The redundancy information can be a redundant set of the data or higher level error correct codes (ECC). The hardened data can be recovered to the host during a read operation by accessing the data stored in both the first and second locations. | 2011-12-08 |
20110302478 | POWER AND PIN EFFICIENT CHIP-TO-CHIP COMMUNICATIONS WITH COMMON-MODE REJECTION AND SSO RESILIENCE - In bus communications methods and apparatus, a first set of physical signals representing the information to be conveyed over the bus is provided, and mapped to a codeword of a spherical code, wherein a codeword is representable as a vector of a plurality of components and the bus uses at least as many signal lines as components of the vector that are used, mapping the codeword to a second set of physical signals, wherein components of the second set of physical signals can have values from a set of component values having at least three distinct values for at least one component, and providing the second set of physical signals for transmission over the data bus in a physical form. | 2011-12-08 |
20110302479 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RESOLVING A DATA CONFLICT - In accordance with embodiments, there are provided mechanisms and methods for resolving a data conflict. These mechanisms and methods for resolving a data conflict can enable an improved user experience, increased efficiency, time savings, etc. | 2011-12-08 |
20110302480 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING CONTROL INFORMATION OF MIMO SYSTEM - The present invention relates to a method and a system for transmitting and receiving control information of an Multi-Input Multi-Output (MIMO) system, wherein the control information consists of information bits and parity bits. A base station transmits the control information including the location information for where the control information of the other terminal is transmitted. A terminal receives the control information of the other terminal based on the location information for where the control information of the other terminal is received. Therefore, the precoding matrix of the other terminal can be obtained from the received control information. The invention enables the removal of interference through the obtained precoding matrix when receiving a data symbol in an environment where a channel is not in a good state. | 2011-12-08 |
20110302481 | Translation Between A First Communication Protocol And A Second Communication Protocol - Translating between a first communication protocol used by a first network component and a second communication protocol used by a second network, where translating includes: receiving, by a network engine adapter operating independently from the first and second network components, data packets from the first and second network components; and performing, by the network engine, a combined communication protocol based on the first communication protocol and the second communication protocol, including manipulating data packets of at least one of the first communication protocol or the second communication protocol, thereby offloading performance requirements for the combined communication protocol from the first and second network components. | 2011-12-08 |
20110302482 | METHOD AND APPARATUS FOR IMPROVED INFORMATION TRANSACTIONS - Methods and systems for analyzing an image, such as a newspaper or magazine pager or the like including text by mapping the image to determine regions of text and analyzing portions of the image in accordance with characteristics of selected regions of the text to develop a desired ordering of at least the selected regions in accordance with a textual relationship between the selected regions. The desired order may be related to the order in which the selected regions, and or words therein, are to be presented in a different format appropriate for a specific use, such by a human reader, for transferring the text over a network, for use in a database or by a search function, word processor or printer. Normalizing, columnizing, regionalizing, frameset building and article tracing functions may be used to develop the desired order in related regions in an article within the image. | 2011-12-08 |
20110302483 | FORMS INTEGRATION TOOLKIT - The invention is a Forms Integration Toolkit (FIT) application, which is a zero-footprint software toolset that allows users to create forms without the need for software development. The FIT consists of a two-module forms tool and a two-module wizard tool. The forms tool modules are the FIT Configuration Manager and the FIT viewer. The FIT Wizard modules are the Wizard Configuration Manager and the Wizard Viewer. Several unique features differentiate the FIT from other forms tools on the market including the ability to specify a form and mapping instructions for populating multiple targets, including databases and web-services, with information received through the form in a single submit event. | 2011-12-08 |