03rd week of 2013 patent applcation highlights part 48 |
Patent application number | Title | Published |
20130019016 | PRE-PROVISIONING VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENTAANM Anderson; Jason L.AACI San JoseAAST CAAACO USAAGP Anderson; Jason L. San Jose CA USAANM Boss; Gregory J.AACI SaginawAAST MIAACO USAAGP Boss; Gregory J. Saginaw MI USAANM Coveyduc; Jeffrey L.AACI San JoseAAST CAAACO USAAGP Coveyduc; Jeffrey L. San Jose CA USAANM Roach; Christopher W.AACI San JoseAAST CAAACO USAAGP Roach; Christopher W. San Jose CA US - In general, embodiments of the present invention provide an approach for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments of the present invention describe an approach to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests (e.g., instantiate/populate multiple e-commerce ‘shopping carts’). In a typical embodiment, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure. | 2013-01-17 |
20130019017 | CLIENT BUNDLE RESOURCE CREATIONAANM Bandera; Daniel Q.AACI AUSTINAAST TXAACO USAAGP Bandera; Daniel Q. AUSTIN TX USAANM CHARTERS; GRAHAM C.AACI HAMPSHIIREAACO GBAAGP CHARTERS; GRAHAM C. HAMPSHIIRE GBAANM HUGHES; JEREMY P.J.AACI HAMPSHIREAACO GBAAGP HUGHES; JEREMY P.J. HAMPSHIRE GBAANM WARD; TIMOTHY J.AACI SOUTHAMPTONAACO GBAAGP WARD; TIMOTHY J. SOUTHAMPTON GB - A first request for a bundle resource can be sent to a first location. A first response can be received that identifies a second location. The first response can be analyzed to identify the second location. A second request and a third request can be created for a metadata resource and for an artifact resource. The second request can be sent to the second location. The third request can be sent to a third location. A second response and a third response can be received. The second response can comprise the metadata resource. The third response can comprise the artifact resource. The second response can be evaluated to determine the metadata resource. The third response can be evaluated to determine the artifact resource. The bundle resource can be created. | 2013-01-17 |
20130019018 | OPTIMIZED SERVICE INTEGRATION - An optimized service mediation framework may use customized tokens for reducing cost and latencies per transaction. In particular, a token service and an integration service may function together to generate customized tokens for use by network components within a transaction pathway. Each network component may access information with the token for a predetermined time period and/or for a predetermined number of service calls for service processing tasks related to mapping, security, governing, bridging, transforming, orchestrating, generating events, managing workloads, routing, validating, managing cache, encrypting, queuing and staging, commodity services, transaction management, and quality of service (QoS)/resiliency, among other things. | 2013-01-17 |
20130019019 | Cloud servicing system configured for servicing smart phone or touch pad circuit applications and consumer programmable articles - A cloud servicing system is provided to support a consumer for interactively programming a programmable product such as programmable toys or home security system. A consumer friendly path driven programming method is introduced to supplement the servicing cloud and support the new world of intelligent home and consumer programmable applications. The system may comprise a consumer programmed smart phone/touch pad as well as proprietary smart phone circuit. | 2013-01-17 |
20130019020 | SMART WIRELESS CONNECTIONAANM Kang; FengAACI San DiegoAAST CAAACO USAAGP Kang; Feng San Diego CA USAANM Treebs; LelandAACI San DiegoAAST CAAACO USAAGP Treebs; Leland San Diego CA USAANM Zhou; YiAACI San DiegoAAST CAAACO USAAGP Zhou; Yi San Diego CA US - Disclosed are approaches for automatically forming a wireless connection for a computing device. In one embodiment, a method can include: determining that a first wireless connection for a computing device has been lost; receiving a browser indication from a browser running on the computing device that a second wireless connection is desired for the computing device; providing, in response to the browser indication, an automatic connection indication to a user of the computing device via a user interface; receiving an acceptance indication from the user interface in response to the automatic connection indication; and establishing the second wireless connection for the computing device in response to the acceptance indication from the user interface. | 2013-01-17 |
20130019021 | DATA PATH SELECTION METHOD FOR COMMUNICATION SESSIONAANM LAU; PriscillaAACI FremontAAST CAAACO USAAGP LAU; Priscilla Fremont CA US - A network controller may receive a communication session request from a user device via a network gateway. The communication session request may include a request to establish a communication session between two or more devices. The network controller may also determine that a communication session corresponding to the communication session request requires a network boarder controller, access a data structure that associates network gateways with network border controllers according to distance, and use the data structure to identify a network border controller that is located nearest to the network gateway. The network controller may establish a communication session comprising a data transport path between the network gateway and the network border controller, of a plurality of network border controllers, nearest to the network gateway. | 2013-01-17 |
20130019022 | SIP PARSER/GENESYS-SIP PARSER-TO PARSE SIP TELEPHONY EVENTS AND DECRYPT THE USERDATA IN IP TELEPHONY - An apparatus, method, and medium for retrieving information from an internet protocol network are provided. The apparatus includes a network interface that is in communication with the internet protocol network. The network interface accesses a plurality of session initiation protocol events and a plurality of non-session initiation protocol events via the internet protocol network. The plurality of session initiation protocol events are transmitted on the internet protocol network, and the plurality of non-session initiation protocol events are transmitted from a non-internet protocol network to the internet protocol network. An input receives a parsing parameter, and a processor parses the plurality of session initiation protocol events and the plurality of non-session initiation protocol events that are accessed by the network interface based on the parsing parameter. A reporter reports parsing results of the processor. | 2013-01-17 |
20130019023 | SYSTEMS, METHODS, AND APPARATUS FOR STREAM CLIENT EMULATORSAANM Hemed; NirAACI YehudAACO ILAAGP Hemed; Nir Yehud ILAANM Levi; IthaiAACI ShohamAACO ILAAGP Levi; Ithai Shoham IL - In one implementation, a stream client emulator includes a stream access module and a monitor module. The stream access module receives stream data from a streaming service and consumes the stream data according to an output rate of a stream without outputting the stream data. The monitor module determines that buffer events have occurred relative to the stream data and a buffer characteristic. | 2013-01-17 |
20130019024 | WIRELESS 3D STREAMING SERVERAANM Sheth; Soham V.AACI San DiegoAAST CAAACO USAAGP Sheth; Soham V. San Diego CA USAANM Raveendran; Vijayalakshimi R.AACI San DiegoAAST CAAACO USAAGP Raveendran; Vijayalakshimi R. San Diego CA USAANM Martinez Bauza; JuditAACI San DiegoAAST CAAACO USAAGP Martinez Bauza; Judit San Diego CA USAANM Bhamidipati; PhaniKumar K.AACI San DiegoAAST CAAACO USAAGP Bhamidipati; PhaniKumar K. San Diego CA USAANM Luo; XunAACI San DiegoAAST CAAACO USAAGP Luo; Xun San Diego CA US - An apparatus, system, method, and computer program product for streaming 3D content from a wireless device to a remote 3D display for the viewing of the 3D content on a larger screen. In some aspects, a wireless streaming server may encode 3D motion picture content in a certain format, where each image frame includes a 2D view concatenated side-by-side with a complementary frame of depth information. The combination of the 2D view and the depth information are capable of being processed by a client display to generate a stereoscopic image representing a 3D view. | 2013-01-17 |
20130019025 | SYSTEM AND METHOD FOR RELIABLE VIRTUAL BI-DIRECTIONAL DATA STREAM COMMUNICATIONS WITH SINGLE SOCKET POINT-TO-MULTIPOINT CAPABILITYAANM CHATURVEDI; SIVAKUMAR R.AACI ALLENAAST TXAACO USAAGP CHATURVEDI; SIVAKUMAR R. ALLEN TX USAANM GUNDABATHULA; SATISHAACI IRVINGAAST TXAACO USAAGP GUNDABATHULA; SATISH IRVING TX USAANM KRISHNAN; RAJARAMANAACI CHENNAIAACO INAAGP KRISHNAN; RAJARAMAN CHENNAI IN - An improved system and method are disclosed for reliable virtual bi-directional data stream (RVBDDS) connections. In one example, two communication devices create and exchange streaming data packets that are encapsulated in connection-less transport layer packets. The streaming data packets contain information used in managing the RVBDDS connection between the two devices. | 2013-01-17 |
20130019026 | SYSTEMS AND METHODS FOR STATEFULLY TRANSITIONING BETWEEN COMMUNICATION CHANNELSAANM Dutta; SiddharthaAACI PeoriaAAST AZAACO USAAGP Dutta; Siddhartha Peoria AZ US - A system for providing state awareness across communication channels and statefully transitioning a user between a source channel and a destination channel is disclosed. The method may comprise storing a unique identifier associated with the user and data associated with the user, retrieving the data associated with the user based upon the user identifier and in response to the user entering the destination channel that is different from the source channel, and populating the data associated with the user in the destination channel. The destination channel may comprise a display of a customer service representative, and the populating may occur automatically. Furthermore, the method may comprise placing a call to a telephone number associated with the user in response to at least one of: the user answering a requisite number of questions in the source channel and the user requesting a transition to a voice destination channel. | 2013-01-17 |
20130019027 | EFFICIENT DATA ACCESS ON A SHARED DATA NETWORKAANM Kazan; WissamAACI BellevueAAST WAAACO USAAGP Kazan; Wissam Bellevue WA USAANM Przysucha; MarcinAACI RedmondAAST WAAACO USAAGP Przysucha; Marcin Redmond WA USAANM Ponnuru; HemanthaAACI BellevueAAST WAAACO USAAGP Ponnuru; Hemantha Bellevue WA US - One or more techniques and/or systems are disclosed for providing efficient synchronized data access. A request to access data on a first data provider is received. The requested data on the first data provider is synchronized with a second data provider, such that the first and second data providers respectively comprise a same version of the requested data. A provider score can respectively be determined for the first data provider and for the second data provider, where the provider score utilizes heuristic data that may indicate a data access rate and/or a cost of data access, for the respective first data provider and second data provider. The request for data access can be routed to the data provider that comprises a desired provider score, where a desired provider score may indicate a desired rate of data access and/or cost of data access. | 2013-01-17 |
20130019028 | WORKFLOW SYSTEM AND METHOD FOR CREATING, DISTRIBUTING AND PUBLISHING CONTENT - Disclosed in some examples are systems, methods and machine readable media for the management of content creation. In some examples the system includes a content management component configured to store portions of an electronic content work and to implement version control of the electronic content work; a defect tracking component configured to store a defect record related to a stored portion of the electronic content work; a publication pipeline component configured to format the electronic content work for publication; and a integration component configured to present a graphical user interface which allows for editing the stored portions of the electronic content work, editing the defect record, and instructing the publication pipeline to format the electronic content work for publication. | 2013-01-17 |
20130019029 | LOSSLESS COMPRESSION OF A PREDICTIVE DATA STREAM HAVING MIXED DATA TYPESAANM Jagmohan; AshishAACI IrvingtonAAST NYAACO USAAGP Jagmohan; Ashish Irvington NY USAANM Lastras-Montano; Luis A.AACI Cortlandt ManorAAST NYAACO USAAGP Lastras-Montano; Luis A. Cortlandt Manor NY US - Lossless compression of a data stream having mixed data types, including a method for receiving a data stream that includes a plurality of different types of bit groups. Bit groups of at least two different types are extracted from the data stream to form a sub-stream. Circular shifts of the sub-stream are generated and then sorted into a sorted list of circular shifts. A transformed string that includes a bit group from each of the circular shifts is extracted from the sorted list of circular shifts. A location in the transformed string of a bit group from a pre-determined location in the sub-stream is identified. The transformed string is partitioned between the at least two different types of bit groups into transformed string partitions, and the transformed string partitions are compressed to form compressed transformed string partitions. The compressed transformed string partitions and the location are output. | 2013-01-17 |
20130019030 | HIGH SPEED BASEBOARD MANAGEMENT CONTROLLER AND TRANSMISSION METHOD THEREOFAANM Huang; Hung-JuAACI Hsinchu CityAACO TWAAGP Huang; Hung-Ju Hsinchu City TWAANM Huang Ho; Shu-AnAACI Hsinchu CityAACO TWAAGP Huang Ho; Shu-An Hsinchu City TWAANM Yuan; Jen-MinAACI Hsinchu CityAACO TWAAGP Yuan; Jen-Min Hsinchu City TW - A baseboard management controller is disclosed. The baseboard management controller adapted to monitor a host comprises a baseboard management control module, a memory controller and a video graphic array (VGA) module. The VGA module comprises a video controller, a decoder, a select circuit and a mapping circuit. The decoder receives a transaction signal from a first local bus and decodes a first address signal contained in the transaction signal. The select circuit selectively transfers data from one of the microprocessor bus, the video controller and the memory controller back to the first local bus according to a control signal. | 2013-01-17 |
20130019031 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR INSERTING A GAP IN INFORMATION SENT FROM A DRIVE TO A HOST DEVICE - A system, method, and computer program product are provided for inserting a gap in information sent from a drive to a host device. In operation, one or more commands are received at a drive from a host device. Additionally, information is queued to send to the host device. Furthermore, a gap is inserted in the information to send to the host device such that the host device is capable of sending additional commands to the drive. | 2013-01-17 |
20130019032 | APPARATUS AND METHOD FOR GENERATING INTERRUPT SIGNAL THAT SUPPORTS MULTI-PROCESSORAANM HAN; Dong-KuAACI Suwon-siAACO KRAAGP HAN; Dong-Ku Suwon-si KRAANM LEE; Kang-MinAACI Suwon-siAACO KRAAGP LEE; Kang-Min Suwon-si KRAANM LEE; Kyung-HaAACI Yongin-siAACO KRAAGP LEE; Kyung-Ha Yongin-si KR - A method for generating an interrupt signal in a memory controller and supporting a multi-processor is provided. Whether an access for a determined memory region occurs is determined. When the access for the determined memory region occurs, whether the access for the determined memory region has a right is determined. When the access for the determined memory region has the right, a core that will generate an interrupt signal is determined. The determined core is requested to generate the interrupt signal. | 2013-01-17 |
20130019033 | DATA TRANSFER APPARATUS AND IMAGE FORMING SYSTEMAANM SHIMA; TomohiroAACI KanagawaAACO JPAAGP SHIMA; Tomohiro Kanagawa JP - A data transfer apparatus includes a virtual channel unit configured to time share a serial bus for a first virtual channel and a second virtual channel and include a buffering control unit configured to receive data via the first virtual channel and the second virtual channel, first and second receive buffers being configured to store the data received via the first virtual channel and the second virtual channel, respectively; and a switching unit configured to control storing the data received via the first virtual channel in the second receive buffer when the buffering control unit receives the data from another data transfer apparatus which is configured to use only the first virtual channel and the capacity of the first receive buffer is smaller than that of the second receive buffer. | 2013-01-17 |
20130019034 | Method and system for USB connections over distinct network paths - Connecting USB devices with USB hosts over distinct network data plane connections, including the following steps: USB hosts are connected with respective USB host adaptors (USBHs) according to USB specification timings. USB devices are connected with respective USB device adaptors (USBDs). Enabling the USBDs and the USBHs to communicate over a network that can connect each USBD with each USBH, wherein the network includes network control plane and network data plane. Initiating first, second, and third USB-over-network-data-plane connections from the USB hosts to the USB devices. And operating the at least two USB-over-network-data-plane connections essentially simultaneously and without any common network node. | 2013-01-17 |
20130019035 | APPARATUS FOR PEER-TO-PEER COMMUNICATION OVER A UNIVERSAL SERIAL BUS LINKAANM CHANG; Ming-TeAACI New Taipei CityAACO TWAAGP CHANG; Ming-Te New Taipei City TW - An apparatus for peer-to-peer communication over a Universal Serial Bus (USB) link, the apparatus comprising a USB 3.0 compliant switch to be coupled between a first peer unit and a second peer unit to form a first path, wherein each of the first peer unit and the second peer unit supports a USB type of communication a USB 2.0 compliant bridge to be coupled between the first peer unit and the second peer unit to form a second path a detector to detect the USB type of each of the first peer unit and the second peer unit and a controller to establish the USB type of communication between the first peer unit and the second peer unit over a USB link via the first path or the second path, wherein the controller is configure to selectively switch the USB link to the first path or the second path based on the USB types of the first peer unit and the second peer unit. | 2013-01-17 |
20130019036 | Expanded Electronic Bus Communication Capacity - In an embodiment, an apparatus comprises a bus network having a set of lines, and a number of communication system devices associated with a number of electronics equipment connected to the bus in which each communication system device configures the electronics equipment to send and receive a plurality of signals on a line of the set of lines in a noise region of the set of lines. | 2013-01-17 |
20130019037 | BATTERY MANAGEMENT SYSTEMS WITH VERTICAL BUS CIRCUITSAANM Flippin; AllanAACI BrentwoodAAST CAAACO USAAGP Flippin; Allan Brentwood CA USAANM Densham; WilliamAACI Los GatosAAST CAAACO USAAGP Densham; William Los Gatos CA USAANM Goh; Jiun HengAACI SunnyvaleAAST CAAACO USAAGP Goh; Jiun Heng Sunnyvale CA USAANM Bucur; ConstantinAACI SunnyvaleAAST CAAACO USAAGP Bucur; Constantin Sunnyvale CA USAANM Lupu; FlaviusAACI San JoseAAST CAAACO USAAGP Lupu; Flavius San Jose CA USAANM Maireanu; StefanAACI SunnyvaleAAST CAAACO USAAGP Maireanu; Stefan Sunnyvale CA US - A battery management chip may include a battery management unit and a vertical bus circuit. The battery management unit can monitor a cell status of multiple cells in a battery module coupled to the battery management chip in response to an instruction from a host processor. The vertical bus circuit may transfer the instruction from the host processor to the battery management unit. The vertical bus circuit may include a first receiver, a command processor and a first transmitter. The first receiver can receive a first pair of differential input data signals. The command processor can process the first pair of differential input data signals. The first transmitter can output a first pair of differential output data signals. | 2013-01-17 |
20130019038 | MULTIPLE SLIMBUS CONTROLLERS FOR SLIMBUS COMPONENTS - Methods, systems, apparatuses, and computer-readable media for controlling components connected to and/or otherwise associated with a data bus are presented. According to one or more aspects of the disclosure, a plurality of processing devices having data bus management capability and at least one data bus associated with the plurality of processing devices may be identified. Subsequently, an inter-processor communication (IPC) layer for communication between the plurality of processing devices and the at least one data bus may be established over a messaging layer utilized by the at least one data bus. At least one component associated with the at least one data bus may then be controlled via the IPC layer using at least one of the plurality of processing devices. | 2013-01-17 |
20130019039 | SYSTEM AND METHOD FOR OPERATING A ONE-WIRE PROTOCOL SLAVE IN A TWO-WIRE PROTOCOL BUS ENVIRONMENT - A method for transmitting data on a data line of a two-wire bus wherein the bus includes a data line and a clock line includes the step of pulling the data line of the two-wire bus low to define a start condition. Next, a first group of fixed data bits enabling a slave device to determine a clock signal for an address portion of a transmission of data are transmitted between a master device and the slave device. An address of the slave device is transmitted from the master device in a second group of data bits. A third group of fixed data bits enabling the slave device to determine the clock signal for a data portion of the transmission of data between the master device and the slave device are transmitted from the master device to the slave device. | 2013-01-17 |
20130019040 | FIELD COMMUNICATION SYSTEMAANM Sueki; MasanoriAACI TokyoAACO JPAAGP Sueki; Masanori Tokyo JPAANM Emori; ToshiyukiAACI TokyoAACO JPAAGP Emori; Toshiyuki Tokyo JPAANM Mizushima; FuyukiAACI TokyoAACO JPAAGP Mizushima; Fuyuki Tokyo JP - A field communication system includes a field device as a slave device, having a first slave communication port and a second slave communication port, a communication module as a master device, having first master communication port and a second master communication port, configured to execute communication with the field device, a first communication line configured to connect the first slave communication port with the first master communication port, and
| 2013-01-17 |
20130019041 | BIT SLICE ROUND ROBIN ARBITERAANM Bays; Laurence E.AACI AllentownAAST PAAACO USAAGP Bays; Laurence E. Allentown PA USAANM Banerjee; BalloriAACI BangaloreAACO INAAGP Banerjee; Ballori Bangalore INAANM Vomero; James F.AACI OrefieldAAST PAAACO USAAGP Vomero; James F. Orefield PA US - The present disclosure describes systems and methods for arbitrating between a plurality of devices competing for a system resource. Operations of the system and method may include, but are not limited to: initializing two or more previous grant request states; generating an access grant signal according to the two or more requests for access to the shared resource, two or more token states and the two or more previous grant request states; and generating an access grant signal according to the two or more requests for access to the shared resource, two or more token states and the two or more previous grant request states. | 2013-01-17 |
20130019042 | MECHANISM TO SAVE SYSTEM POWER USING PACKET FILTERING BY NETWORK INTERFACEAANM Ertugay; Osman N.AACI BellevueAAST WAAACO USAAGP Ertugay; Osman N. Bellevue WA USAANM Thaler; David G.AACI RedmondAAST WAAACO USAAGP Thaler; David G. Redmond WA USAANM Hari; MahenderAACI RedmondAAST WAAACO USAAGP Hari; Mahender Redmond WA USAANM Ritz; Andrew J.AACI SammamishAAST WAAACO USAAGP Ritz; Andrew J. Sammamish WA USAANM Dabagh; AlirezaAACI KirklandAAST WAAACO USAAGP Dabagh; Alireza Kirkland WA US - A network interface that connects a computing device to a network may be configured to process incoming packets and determine an action to take with respect to each packet, thus decreasing processing demands on a processor of the computing device. The action may be indicating the packet to an operating system of the computing device immediately, storing the packet in a queue of one or more queues or discarding the packet. When the processor is interrupted, multiple packets aggregated on the network interface may be indicated to the operating system all at once to increase the device's power efficiency. Hardware of the network interface may be programmed to process the packets using filter criteria specified by the operating system based on information gathered by the operating system, such as firewall rules. | 2013-01-17 |
20130019043 | Vehicle Communications Interface and Method of Operations Thereof - A vehicle communication interface (VCI) that allows for a single communications protocol to be used between a software application and a plurality of software drivers that are connected to physical interfaces of the VCI. Also, a method of communicating with a vehicle using a host system such as a personal computer. The method also makes use of a single communications protocol between a software application that processes information received from a vehicle and a plurality of software drivers. | 2013-01-17 |
20130019044 | SEMICONDUCTOR DEVICEAANM KAIWA; NakabaAACI TokyoAACO JPAAGP KAIWA; Nakaba Tokyo JPAANM MATSUI; YoshinoriAACI TokyoAACO JPAAGP MATSUI; Yoshinori Tokyo JP - A semiconductor memory device includes a memory cell array section including a plurality of memory cell arrays, a peripheral circuit section, and an internal bus | 2013-01-17 |
20130019045 | Consolidating Computer Memory Drive Management In A Computing SystemAANM Andresen; Mark E.AACI CaryAAST NCAACO USAAGP Andresen; Mark E. Cary NC USAANM Newsom; Thomas H.AACI CaryAAST NCAACO USAAGP Newsom; Thomas H. Cary NC USAANM Nichols; Scott A.AACI CaryAAST NCAACO USAAGP Nichols; Scott A. Cary NC US - Consolidating computer memory drive management in a computing system, the computing system including a plurality of computer memory drives, a system memory drive manager, and one or more light pipes, including: detecting, by a system memory drive manager, an multi-drive tray memory drive manager; configuring the system memory drive manager to communicate with the memory drive over the light pipe; and communicating, by the system memory drive manager, with the memory drive over the light pipe. | 2013-01-17 |
20130019046 | DATA TRANSMITTING DEVICE AND SYSTEM FOR PORTABLE DEVICE AND METHOD THEREOFAANM SHIEH; Yeong-RueyAACI Hsinchu CityAACO TWAAGP SHIEH; Yeong-Ruey Hsinchu City TWAANM Cho; Shih-KengAACI Hsinchu CityAACO TWAAGP Cho; Shih-Keng Hsinchu City TWAANM Liu; Hsu-PinAACI Hsinchu CityAACO TWAAGP Liu; Hsu-Pin Hsinchu City TWAANM Hsu; Wei-ShuAACI Hsinchu CityAACO TWAAGP Hsu; Wei-Shu Hsinchu City TWAANM Lin; Chi-HanAACI Hsinchu CityAACO TWAAGP Lin; Chi-Han Hsinchu City TWAANM Wang; Yu-ShiangAACI Hsinchu CityAACO TWAAGP Wang; Yu-Shiang Hsinchu City TW - A data transmitting method for communicating one of a plurality of portable devices with a host computer via a data transmitting device having a plurality of USB connector is disclosed. In one embodiment of the present invention, the method includes the following steps: firstly, a switch circuit is configured in one of the portable devices. Then, the portable device having the switch circuit is coupled with the data transmitting device. Afterward, a data transmission path between the host computer and the portable device having the switch circuit is connected by the switch circuit to transmit data between the portable device having the switch circuit and the host computer, or the data transmission path between the USB connector, which is not connecting with the portable device having the switch circuit, and the host computer is connected by the switch circuit. | 2013-01-17 |
20130019047 | MEMORY CONFLICTS LEARNING CAPABILITYAANM Podvalny; DmitryAACI Petah TikvaAACO ILAAGP Podvalny; Dmitry Petah Tikva ILAANM Shinkar; AlexAACI Rishon-LezionAACO ILAAGP Shinkar; Alex Rishon-Lezion ILAANM Rachlevski; AssafAACI ModiinAACO ILAAGP Rachlevski; Assaf Modiin IL - An apparatus having a memory and circuit is disclosed. The memory may (i) assert a first signal in response to detecting a conflict between at least two addresses requesting access to a block at a first time, (ii) generate a second signal in response to a cache miss caused by an address requesting access to the block at a second time and (iii) store a line fetched in response to the cache miss in another block by adjusting the first address by an offset. The second time is generally after the first time. The circuit may (i) generate the offset in response to the assertion of the first signal and (ii) present the offset in a third signal to the memory in response to the assertion of the second signal corresponding to reception of the first address at the second time. The offset is generally associated with the first address. | 2013-01-17 |
20130019048 | Memory Access To A Dual In-line Memory Module Form Factor Flash MemoryAANM Bland; Patrick M.AACI RaleighAAST NCAACO USAAGP Bland; Patrick M. Raleigh NC USAANM Desai; Dhruv M.AACI CaryAAST NCAACO USAAGP Desai; Dhruv M. Cary NC USAANM Foster, SR.; Jimmy G.AACI MorrisvilleAAST NCAACO USAAGP Foster, SR.; Jimmy G. Morrisville NC USAANM Ono; MakotoAACI CaryAAST NCAACO USAAGP Ono; Makoto Cary NC US - Methods, apparatuses, and computer program products for memory access to a dual in-line memory module (DIMM) form factor flash memory are provided. Embodiments include receiving, by a controller from a processor through cacheable memory in the processor, a read request; transmitting, by the controller, the read request to the DIMM form factor flash memory; polling, by the controller, a read queue in the DIMM form factor flash memory until data is ready for the read request; copying from the DIMM form factor flash memory, by the controller, the data corresponding to the read request to a read queue in the controller; transmitting, by the controller on an interface between the controller and the processor, an invalidate command for the cacheable memory; and in response to receiving the invalidate command, reading by the processor the data stored in the read queue in the controller. | 2013-01-17 |
20130019049 | BLOCK MANAGEMENT METHOD, MEMORY CONTROLLER AND MEMORY STOARGE APPARATUSAANM Yeh; Chih-KangAACI Kinmen CountyAACO TWAAGP Yeh; Chih-Kang Kinmen County TW - A block management method for a rewritable non-volatile memory module having a plurality of physical blocks, and a memory controller and memory storage apparatus using the same are provided. The method includes logically grouping the physical blocks at least into a data area, a free area and a replacement area and configuring a plurality of logical blocks for mapping to the physical blocks of the data area. The method also includes assigning bad physical blocks into the data area and marking the logical blocks mapping to the bad physical blocks as bad logical addresses, thereby forbidding the access of the logical blocks mapping to the bad physical blocks. According, the method can effectively use the rewritable non-volatile memory module having too many bad physical blocks to store data. | 2013-01-17 |
20130019050 | FLEXIBLE FLASH COMMANDS - A method of controlling a flash media system. The method includes providing a flash lane controller having a processor control mode and creating and presenting soft contexts. The soft contexts generally place the flash lane controller into the processor control mode. In the processor control mode, the flash lane controller stores the entire soft context, finishes executing any outstanding contexts, suspends normal hardware automation, and then executes the soft context. | 2013-01-17 |
20130019051 | META DATA HANDLING WITHIN A FLASH MEDIA CONTROLLER - A method for handling meta data stored in a page of a flash memory within a flash media controller. The method generally includes (i) defining the meta data on a per context basis, where the context is defined on a per page basis, (ii) when a size of the meta data is less than or equal to a predefined threshold, storing the complete meta data within a structure of the context, and (iii) when the size of the meta data is greater than the predefined threshold, defining meta data pointers within the context. | 2013-01-17 |
20130019052 | EFFECTIVE UTILIZATION OF FLASH INTERFACE - An apparatus including a first circuit, a second circuit, and a third circuit. The first circuit may be configured to maintain die-based information used for operation of a flash lane controller (FLC). The second circuit may be configured to manage contexts that are actively being processed by the flash lane controller (FLC). The third circuit may be configured to perform pipeline execution of a plurality of the contexts managed by the second circuit. | 2013-01-17 |
20130019053 | FLASH CONTROLLER HARDWARE ARCHITECTURE FOR FLASH DEVICES - A flash media controller including one or more dedicated data transfer paths, one or more flash lane controllers, and one or more flash bus controllers. The one or more flash lane controllers are generally coupled to the one or more dedicated data transfer paths. The one or more flash bus controllers are generally coupled to the one or more flash lane controllers. | 2013-01-17 |
20130019054 | FLASH MEMORY DEVICE AND METHOD PERFORMING ERASE OPERATION USING OVER PROGRAMAANM JUNG; YOUNG-WOOAACI OSAN-SIAACO KRAAGP JUNG; YOUNG-WOO OSAN-SI KRAANM KIM; HWAN-CHUNGAACI NAMWON-SIAACO KRAAGP KIM; HWAN-CHUNG NAMWON-SI KRAANM SHIN; HEE-TAKAACI HWASEONG-SIAACO KRAAGP SHIN; HEE-TAK HWASEONG-SI KRAANM AHN; CHUN-SOOAACI SUWON-SIAACO KRAAGP AHN; CHUN-SOO SUWON-SI KRAANM JUNG; JIN-WOOAACI SEOULAACO KRAAGP JUNG; JIN-WOO SEOUL KR - A flash memory device performs an erase operation by execution of an over program. device. In response to an erase request directed to requested page data a logical page address is converted to a corresponding physical page address, an over program data pattern for an over program operation is generated, and the over program operation is executed using the PPA to change a threshold voltage distribution for at least one memory cell of the requested page data in accordance with the over program data pattern. | 2013-01-17 |
20130019055 | MEMORY CONTROL DEVICE AND METHODAANM KIM; Ji-minAACI Suwon-siAACO KRAAGP KIM; Ji-min Suwon-si KRAANM SEO; Yoon-bumAACI Seongnam-siAACO KRAAGP SEO; Yoon-bum Seongnam-si KR - A memory control device is provided. The memory control device includes a plurality of memories, a plurality of host control units which are connected to the plurality of memories, respectively, and a synchronization unit which collectively performs a data read or data write operation for the plurality of memories through the plurality of host control units. Accordingly, it is possible to simultaneously perform a data read or data write operation for a plurality of memory cards by simultaneously controlling the plurality of memory cards which perform the data read or data write operation at different points in time. | 2013-01-17 |
20130019056 | Data Storing Method and Apparatus Applied to Flash Memory Storage DeviceAANM Wang; Rui-qingAACI ShenzhenAACO CNAAGP Wang; Rui-qing Shenzhen CNAANM Li; Da-tengAACI ShenzhenAACO CNAAGP Li; Da-teng Shenzhen CNAANM Wu; WeiAACI ShenzhenAACO CNAAGP Wu; Wei Shenzhen CN - A data storage method applied to a flash memory storage device is provided. The method includes: identifying a first tag pointing to a storage unit storing a first data, the first data being a newly updated data; locating the storage unit storing the first data according to the first tag; storing a second data to another storage unit; pointing the first tag to the another storage unit storing the second data. A relationship between the first tag and the storage unit storing the first data is first built. The second data is stored to another storage unit different from the storage unit pointed by the first tag, and a relationship between the first tag and the another storage unit storage the second data is rebuilt. Therefore, data is efficiently stored by using a plurality of storage units to prolong a lifespan of the flash memory. | 2013-01-17 |
20130019057 | FLASH DISK ARRAY AND CONTROLLER - A data storage array is described, having a plurality of solid state disks configured as a RAID group. User data is mapped and managed on a page size scale by the controller, and the data is mapped on a block size scale by the solid state disk. The writing of data to the solid state disks of the RAID group is such that reading of data sufficient to reconstruct a RAID stripe is not inhibited by the erase operation of a disk to which data is being written. | 2013-01-17 |
20130019058 | MULTI-PARTITIONING OF MEMORIES - Various embodiments comprise apparatuses and methods including a method of reconfiguring partitions in a memory device as directed by a host. The method includes managing commands through a first interface controller to mapped portions of a first memory not having an attribute enhanced set, and mapping portions of a second memory having the attribute enhanced set through a second interface controller. Additional apparatuses and methods are described. | 2013-01-17 |
20130019059 | HARD DISK DRIVE ADAPTERAANM HU; WEN-SENAACI Shenzhen CityAACO CNAAGP HU; WEN-SEN Shenzhen City CNAANM HE; WEI-MINAACI Shenzhen CityAACO CNAAGP HE; WEI-MIN Shenzhen City CN - A hard disk drive (HDD) adapter includes a first connector, a second connector, and a signal reproduction circuit. The first connector is electrically connected to a motherboard of a computer server. The second connector is electrically connected to a number of hard disk drive (HDD) drives. The signal reproduction circuit is electrically connected to the first connector and the second connector, and reproduces a signal from the motherboard into a number of signals provided to the HDD drives. | 2013-01-17 |
20130019060 | CREATING MULTIPLE VERSIONS FOR INTERIOR POINTERS AND ALIGNMENT OF AN ARRAYAANM WILKENS; Tim J.AACI ModestoAAST CAAACO USAAGP WILKENS; Tim J. Modesto CA USAANM BERG; Michael C.AACI VancouverAAST WAAACO USAAGP BERG; Michael C. Vancouver WA US - A device identifies array accesses of variables in a program code that includes multiple arrays, and identifies array access patterns for one of the array accesses. The device also determines an order of the array access patterns identified for the array accesses, and calculates, based on the order, distances between the array access patterns. The device further shares address calculations amongst the array accesses associated with array access patterns with one or more of the distances that are equivalent. | 2013-01-17 |
20130019061 | DATA TRANSFER REDUCTION IN SCALE OUT ARCHITECTURESAANM Jayaraman; VinodAACI San FranciscoAAST CAAACO USAAGP Jayaraman; Vinod San Francisco CA USAANM Dinkar; AbhijitAACI San JoseAAST CAAACO USAAGP Dinkar; Abhijit San Jose CA US - Mechanisms are provided for data transfer reduction in scale out architectures. When a compute node receives a write input/output (I/O) request for a data stream, the compute node separates the data stream into chunks and generates fingerprints for the individual chunks. Fingerprints are then sent to a scale out node and compared to fingerprints of chunks already maintained at the scale out node. Write data transfers are only made for chunks not already maintained at the scale out node. For a read I/O request for a data stream, fingerprints for chunks of the data stream are requested by the compute node from a scale out node. Fingerprints received are compared to fingerprints of chunks already maintained at the compute node and read data transfers are only made for chunks not already maintained at the compute node. | 2013-01-17 |
20130019062 | RAIDed MEMORY SYSTEM - A memory system and a method for managing the system is described. The system is configured such a plurality of system controllers, which may be RAID controllers, receive requests from the external environment and distribute the requests to a plurality of memory modules such that data may be stored in the memory modules. A global sequence number is assigned to the data of a data stripe so that the operations related to the data stripe are performed in an ordered manner so that the data remains consistent. A plurality of system controllers may comprise a domain and access a plurality of memory controllers and a plurality of domains may include at least one common memory module. | 2013-01-17 |
20130019063 | STORAGE CONTROLLER CACHE PAGE MANAGEMENTAANM Astigarraga; TaraAACI TucsonAAST AZAACO USAAGP Astigarraga; Tara Tucson AZ USAANM Browne; Michael E.AACI StaatsburgAAST NYAACO USAAGP Browne; Michael E. Staatsburg NY USAANM Demczar; JosephAACI Salt PointAAST NYAACO USAAGP Demczar; Joseph Salt Point NY USAANM Wieder; Eric C.AACI New PaltzAAST NYAACO USAAGP Wieder; Eric C. New Paltz NY US - A cache page management method can include paging out a memory page to an input/output controller, paging the memory page from the input/output controller into a real memory, modifying the memory page in the real memory to an updated memory page and purging the memory page paged to the input/output controller. | 2013-01-17 |
20130019064 | POWER REDUCTION USING UNMODIFIED INFORMATION IN EVICTED CACHE LINESAANM Kumashikar; Mahesh K.AACI BangaloreAACO INAAGP Kumashikar; Mahesh K. Bangalore INAANM Jagannathan; AshokAACI BangaloreAACO INAAGP Jagannathan; Ashok Bangalore IN - Embodiments of the present disclosure describe techniques and configurations to reduce power consumption using unmodified information in evicted cache lines. A method includes identifying unmodified information of a cache line stored in a cache of a processor, tracking the unmodified information using a bit vector comprising one or more bits to indicate the unmodified information of the cache line, and selectively suppressing a write operation or send operation for the unmodified information of the cache line that is evicted from the cache to an input/output (I/O) component coupled to the cache, the selective suppressing being based on the one or more bits, and the I/O component being an outer component external to the cache. Other embodiments may be described and/or claimed. | 2013-01-17 |
20130019065 | Mobile Memory Cache Read OptimizationAANM Floman; MattiAACI KangasalaAACO FIAAGP Floman; Matti Kangasala FIAANM Mylly; KimmoAACI YlojarviAACO FIAAGP Mylly; Kimmo Ylojarvi FI - A method for enabling cache read optimization for mobile memory devices is described. The method includes receiving one or more access commands, at a memory device from a host, the one or more access commands instructing the memory device to access at least two data blocks. The at least two data blocks are accessed. The method includes generating, by the memory device, pre-fetch information for the at least two data blocks based at least in part on an order of accessing the at least two data blocks. Apparatus and computer readable media are also described. | 2013-01-17 |
20130019066 | CACHE DEVICE - A cache device interposed between a processor and a memory device, including: a cache memory storing data from the memory device; a buffer holding output data output from the processor; a control circuit determining, on the basis of a request to access the memory device, whether a cache hit has occurred or not and, if a cache miss has occurred, storing the output data in the buffer in response to the access request, outputting a read request for reading the data in a line containing data requested by the access request from the memory device, storing data output from the line of the memory device into the cache memory, and storing the output data from the buffer into the cache memory. | 2013-01-17 |
20130019067 | METHOD AND SYSTEM FOR ENSURING CACHE COHERENCE OF METADATA IN CLUSTERED FILE SYSTEMSAANM VILAYANNUR; MuraliAACI San JoseAAST CAAACO USAAGP VILAYANNUR; Murali San Jose CA USAANM LI; JinyuanAACI BellevueAAST WAAACO USAAGP LI; Jinyuan Bellevue WA USAANM VAGHANI; Satyam B.AACI San JoseAAST CAAACO USAAGP VAGHANI; Satyam B. San Jose CA US - Metadata of a shared file in a clustered file system is changed in a way that ensures cache coherence amongst servers that can simultaneously access the shared file. Before a server changes the metadata of the shared file, it waits until no other server is attempting to access the shared file, and all I/O operations to the shared file are blocked. After writing the metadata changes to the shared file, local caches of the other servers are updated, as needed, and I/O operations to the shared file are unblocked. | 2013-01-17 |
20130019068 | SYSTEMS AND METHODS FOR SHARING MEDIA IN A COMPUTER NETWORK - A computerized method for sharing removable storage media in a network, the method comprising associating, in an index entry, a first piece of removable storage media in a first storage device with at least a first storage policy copy and a second storage policy copy; copying, to the first piece of removable storage media, data associated with the first storage policy copy; and copying, to the first piece of removable storage media, data associated with the second storage policy copy. | 2013-01-17 |
20130019069 | MULTI-CORE PROCESSOR SYSTEM, MEMORY CONTROLLER CONTROL METHOD, AND COMPUTER PRODUCT - A multi-core processor system includes a memory controller that includes multiple ports and shared memory that includes physical address spaces divided among the ports. A CPU acquires from a parallel degree information table, the number of CPUs to which software that is to be executed by the multi-core processor system, is to be assigned. After this acquisition, the CPU determines the CPUs to which the software to be executed is to be assigned and sets for each CPU, physical address spaces corresponding to logical address spaces defined by the software to be executed. After this setting, the CPU notifies an address converter of the addresses and notifies the software to be executed of the start of execution. | 2013-01-17 |
20130019070 | CONSOLIDATING CONTROL AREASAANM Lehr; Douglas L.AACI AustinAAST TXAACO USAAGP Lehr; Douglas L. Austin TX USAANM McCune; Franklin E.AACI TucsonAAST AZAACO USAAGP McCune; Franklin E. Tucson AZ USAANM Reed; David C.AACI TucsonAAST AZAACO USAAGP Reed; David C. Tucson AZ USAANM Smith; Max D.AACI TucsonAAST AZAACO USAAGP Smith; Max D. Tucson AZ US - A detection module selects logically adjacent first and second control areas of a cluster. The detection module further determines that the first and second control areas satisfy a migration test wherein the first control area has free space exceeding a free threshold, the free space is at least equal to a space requirement for each second control area control interval, and the second control area has fewer control intervals than a control interval threshold. In addition, a copy module copies each second control area control interval to the first control area in response to determining that the first and second control areas satisfy the migration test. | 2013-01-17 |
20130019071 | DYNAMICALLY MANAGING AVAILABLE DATA STORAGE WITHIN AN AUTOMATED DATA STORAGE SYSTEMAANM Lewis; Cecilia C.AACI San JoseAAST CAAACO USAAGP Lewis; Cecilia C. San Jose CA USAANM Dearing; Gerard M.AACI San JoseAAST CAAACO USAAGP Dearing; Gerard M. San Jose CA USAANM Koester; Michael J.AACI HollisterAAST CAAACO USAAGP Koester; Michael J. Hollister CA US - In one embodiment, a computer program product includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code being configured to: assign volume(s) to either a storage group or a reserve storage pool group, designate each of the volume(s) assigned to the storage group as a storage volume, designate each of the volume(s) assigned to the reserve storage pool group as a reserve storage volume, receive policy attributes for the storage group including a storage utilization goal and a default reserve storage pool assignment, monitor a storage utilization level for the storage group, detect when the storage utilization level for the storage group falls outside of the ideal storage utilization range, and adjust an available storage amount for the storage group to bring the storage utilization level within the ideal storage utilization range. | 2013-01-17 |
20130019072 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING OUT-OF-SERVICE CONDITIONS - An adaptive logical storage element comprises a plurality of solid-state storage elements accessible in parallel. The logical storage element includes logical storage units, which may include logical page, logical storage divisions (erase blocks), and so on. Each logical storage unit comprises a plurality of physical storage units. A logical storage unit may include one or more physical storage units that are out-of-service (OOS). The OOS status of logical storage units is tracked by OOS metadata. When data is stored on the logical storage element, padding data is provided to physical storage units that are OOS, and valid and/or parity data is provided to in-service physical storage units. A write data pipeline accesses the OOS metadata to insert padding data, and a read data pipeline accesses the OOS metadata to strip padding data. | 2013-01-17 |
20130019073 | DISTRIBUTED IMAGE ACQUISITION, STORAGE, AND BACKUP SYSTEMAANM Cok; Ronald StevenAACI RochesterAAST NYAACO USAAGP Cok; Ronald Steven Rochester NY US - A distributed image acquisition, storage, and backup system includes a digital camera and a plurality of functionally identical independent storage devices storing digital images. Each digital image is stored as a working copy and a corresponding backup copy on a storage device different from the storage device storing the working copy. One or more storage devices store both a working copy of a first digital image and a backup copy of a second digital image different from the first digital image. Each storage device automatically sends a working copy or backup copy to another of the plurality of storage devices, automatically receives a working copy or backup copy from another of the plurality of storage devices, and automatically stores a received working copy or backup copy. | 2013-01-17 |
20130019074 | DATA PROTECTION SYSTEMS WITH MULTIPLE SITE REPLICATION - Systems and methods for replicating data from a first site to a second site remote from said first site are described. An embodiment includes storing compressed data on a hard disk appliance, reading said data without decompressing said data, sending said data over a wide-area-network (WAN) in a compressed state, and storing said data on a second hard disk appliance remote from said first hard disk appliance in its compressed state without performing an additional compression operation. | 2013-01-17 |
20130019075 | STORAGE SYSTEM AND REMOTE COPY RECOVERY METHOD - Data written in the primary logical volume of the first storage device are transmitted to the third storage device via the second storage device, the data being written in the same location as the primary logical volume within the secondary logical volume in the third storage device; when transmission of the data stops among the first to the third storage devices, the respective second storage device and the third storage device manage locations in the secondary logical volume where the data held thereby are to be written; and, when transmission of the data resumes among the first to the third storage devices, the locations in the secondary logical volume managed by the respective second and the third storage devices are aggregated, the data to be written in the respective aggregated location in the secondary logical volume being transmitted from the first storage device to the third storage device via the second storage device. | 2013-01-17 |
20130019076 | REDUNDANT BACKUP USING NON-VOLATILE MEMORY - Data stored in a volatile memory subsystem is backed up redundantly into first and second channels of a non-volatile memory subsystem. The data is retrieved from the volatile memory subsystem upon detection of a trigger condition indicative of real or imminent power loss or reduction and multiple copies are stored in dedicated non-volatile memory channels. The stored copies may be error checked and corrected, and re-written if necessary. The redundantly backed up data can be subsequently retrieved from the non-volatile memory subsystem, error-corrected, and an error-free copy communicated to the volatile memory subsystem. | 2013-01-17 |
20130019077 | STORAGE SYSTEMAANM Nagano; HiroakiAACI TokyoAACO JPAAGP Nagano; Hiroaki Tokyo JP - A storage system includes a replication source storage device equipped with a replication source storage unit storing replication target data, and a replication destination storage unit which is provided to a replication destination storage device and is a replication destination of the replication target data, which are connected with each other over a network. The replication destination storage unit is equipped with a host bus adapter which is an interface for connecting the replication destination storage unit with the network. Each of the replication source storage device and the host bus adapter provided to the replication destination storage unit is equipped with a connection device which uses the network, located between them, as an extension of a bus of the replication source storage device, and connects the replication source storage device and the host bus adapter provided to the replication destination storage unit with each other. | 2013-01-17 |
20130019078 | ACTIVE-ACTIVE REMOTE CONFIGURATION OF A STORAGE SYSTEM - A method for data storage, including configuring a first logical volume on a first storage system and a second logical volume on a second storage system. The second logical volume is configured as a mirror of the first logical volume, so that the first and second logical volumes form a single logical mirrored volume. The method also includes receiving at the second storage system a command submitted by a host to write data to the logical mirrored volume, and transferring the command from the second storage system to the first storage system without writing the data to the second logical volume. On receipt of the command at the first storage system, the data is written to the first logical volume. Subsequent to writing the data to the first logical volume, the data is mirrored on the second logical volume. | 2013-01-17 |
20130019079 | INTELLIGENT COMPUTER MEMORY MANAGEMENT - A plurality of memory allocators are initialized within a computing system. At least a first memory allocator and a second memory allocator in the plurality of memory allocators are each customizable to efficiently handle a set of different memory request size distributions. The first memory allocator is configured to handle a first memory request size distribution. The second memory allocator is configured to handle a second memory request size distribution. The second memory request size distribution is different than the first memory request size distribution. At least the first memory allocator and the second memory allocator that have been configured are deployed within the computing system in support of at least one application. Deploying at least the first memory allocator and the second memory allocator within the computing system improves at least one of performance and memory utilization of the at least one application. | 2013-01-17 |
20130019080 | DYNAMIC SIZING OF TRANSLATION LOOKASIDE BUFFER FOR POWER REDUCTIONAANM Levinsky; Gideon N.AACI Cedar ParkAAST TXAACO USAAGP Levinsky; Gideon N. Cedar Park TX USAANM Shah; Manish K.AACI AustinAAST TXAACO USAAGP Shah; Manish K. Austin TX US - Methods and mechanisms for operating a translation lookaside buffer (TLB). A translation lookaside buffer (TLB) includes a plurality of segments, each segment including one or more entries. A control unit is coupled to the TLB. The control unit is configured to determine utilization of segments, and dynamically disable segments in response to determining that segments are under-utilized. The control unit is also configured to dynamically enable segments responsive to determining a given number of segments are over-utilized. | 2013-01-17 |
20130019081 | SYSTEMS AND METHODS FOR MEMORY REGION DESCRIPTOR ATTRIBUTE OVERRIDEAANM MOYER; WILLIAM C.AACI Dripping SpringsAAST TXAACO USAAGP MOYER; WILLIAM C. Dripping Springs TX US - A memory protection unit (MPU) is configured to store a plurality of region descriptor entries, each region descriptor entry defining an address region of a memory, an attribute corresponding to the region, and an attribute override control corresponding to the attribute. A memory access request to a memory address is received and determined to be within a first address region defined by a first region descriptor entry and within a second address region defined by a second region descriptor entry. When the attribute override control of the first region descriptor entry indicates that override is to be performed, the value of the attribute of the first region descriptor entry is applied for the memory access. When the attribute override control of the second region descriptor entry indicates that override is to be performed, the value of the attribute of the second region descriptor entry is applied for the memory access. | 2013-01-17 |
20130019082 | Manifold Array Processor - An array processor includes processing elements arranged in to form a rectangular array. Inter-cluster communication paths are mutually exclusive. Due to the mutual exclusivity of the data paths, communications between the processing elements of each cluster may be combined in a single inter-cluster path, thus eliminating half the wiring required for the path. The length of the longest communication path is not directly determined by the overall dimension of the array, as in conventional torus arrays. Rather, the longest communications path is limited by the inter-cluster spacing. Transpose elements of an N×N torus may be combined in clusters and communicate with one another through intra-cluster communications paths. Transpose operation latency is eliminated in this approach. Each PE may have a single transmit port and a single receive port. Thus, the individual PEs are decoupled from the array topology. | 2013-01-17 |
20130019083 | Redundant Transactional MemoryAANM Cain, III; Harold W.AACI HartsdaleAAST NYAACO USAAGP Cain, III; Harold W. Hartsdale NY USAANM Daly; David M.AACI Croton on HudsonAAST NYAACO USAAGP Daly; David M. Croton on Hudson NY USAANM Ekanadham; KattamuriAACI Mohegan LakeAAST NYAACO USAAGP Ekanadham; Kattamuri Mohegan Lake NY USAANM Huang; Michael C.AACI RochesterAAST NYAACO USAAGP Huang; Michael C. Rochester NY USAANM Moreira; Jose E.AACI IrvingtonAAST NYAACO USAAGP Moreira; Jose E. Irvington NY USAANM Serrano; Mauricio J.AACI BronxAAST NYAACO USAAGP Serrano; Mauricio J. Bronx NY US - A mechanism is provided for redundant execution of a set of instructions. A redundant execution begin (rbegin) instruction to be executed by a first hardware thread on the first processor is identified in the set of instructions. The set of instructions immediately after the rbegin instruction are executed on the first hardware thread and on a second hardware thread. Responsive to both the first processor and the second processor ending execution of the set of instructions, responsive to a first set of cache lines in a first speculative store matching a second set of cache lines in a second speculative store, and responsive to a first set of register states in a first status register matching a second set of register states in a second status register, dirty lines in the first speculative store are committed thereby committing a redundant transaction state to an architectural state. | 2013-01-17 |
20130019084 | ProcessorAANM Orchard; David ArthurAACI MalvernAACO GBAAGP Orchard; David Arthur Malvern GBAANM Wilson; Rebecca AnneAACI MalvernAACO GBAAGP Wilson; Rebecca Anne Malvern GBAANM Pritchard; Jonathan Alexander SkoylesAACI MalvernAACO GBAAGP Pritchard; Jonathan Alexander Skoyles Malvern GBAANM Cooper; Martin JamesAACI MalvernAACO GBAAGP Cooper; Martin James Malvern GBAANM Shepherd; Terence JohnAACI MalvernAACO GBAAGP Shepherd; Terence John Malvern GBAANM Lewin; Andrew CharlesAACI MalvernAACO GBAAGP Lewin; Andrew Charles Malvern GBAANM Tapster; Paul RichardAACI MalvernAACO GBAAGP Tapster; Paul Richard Malvern GBAANM Bennett; Charlotte Rachel HelenAACI MalvernAACO GBAAGP Bennett; Charlotte Rachel Helen Malvern GB - Apparatus ( | 2013-01-17 |
20130019085 | Efficient Recombining for Dual Path ExecutionAANM Cain, III; Harold W.AACI HartsdaleAAST NYAACO USAAGP Cain, III; Harold W. Hartsdale NY USAANM Daly; David M.AACI Croton on HudsonAAST NYAACO USAAGP Daly; David M. Croton on Hudson NY USAANM Huang; Michael C.AACI RochesterAAST NYAACO USAAGP Huang; Michael C. Rochester NY USAANM Moreira; Jose E.AACI IrvingtonAAST NYAACO USAAGP Moreira; Jose E. Irvington NY USAANM Park; ILAACI SeoulAACO KRAAGP Park; IL Seoul KR - A mechanism is provided for reducing a penalty for executing a correct branch of a branch instruction. An execution unit in a processor of a data processing system executes a first branch of the branch instruction from a main thread of a processor and executes a second branch of the branch instruction from an assist thread of the processor. The execution unit determines whether the main thread is a correct branch of the branch instruction or the assist thread is the correct branch of the branch instruction. Responsive to the assist thread being the correct branch of the branch instruction, the execution unit pauses execution of the branch instruction on both the main thread and the assist thread. The execution unit then properly inherits a context of the main thread in order that execution of the second branch may continue. | 2013-01-17 |
20130019086 | HARDWARE SUPPORT FOR SOFTWARE CONTROLLED FAST MULTIPLEXING OF PERFORMANCE COUNTERS - Performance counters may be operable to collect one or more counts of one or more selected activities, and registers may be operable to store a set of performance counter configurations. A state machine may be operable to automatically select a register from the registers for reconfiguring the one or more performance counters in response to receiving a first signal. The state machine may be further operable to reconfigure the one or more performance counters based on a configuration specified in the selected register. The state machine yet further may be operable to copy data in selected one or more of the performance counters to a memory location, or to copy data from the memory location to the counters, in response to receiving a second signal. The state machine may be operable to store or restore the counter values and state machine configuration in response to a context switch event. | 2013-01-17 |
20130019087 | SYSTEM STRUCTURE MANAGEMENT DEVICE, SYSTEM STRUCTURE MANAGEMENT METHOD, AND PROGRAMAANM Osaki; TakaoAACI TokyoAACO JPAAGP Osaki; Takao Tokyo JPAANM Fujita; NaotakeAACI TokyoAACO JPAAGP Fujita; Naotake Tokyo JP - Physical configuration information stored in the physical configuration storage unit ( | 2013-01-17 |
20130019088 | METHOD FOR ESTABLISHING A WIRELESS LINK FOR A COMPUTER - Establishing a wireless link for a computer includes executing a basic input output system (BIOS), using a wireless module built in the computer to scan at least one nearby access point when executing the BIOS, and linking the wireless module to an access point of the at least one access point. Because the computer can scan nearby access points with the built in wireless module when executing the BIOS, an access point can be linked by the wireless module before an operating system is initialized. | 2013-01-17 |
20130019089 | APPLYING SETTINGS IN A CLOUD COMPUTING ENVIRONMENT BASED ON GEOGRAPHICAL REGIONAANM Guidotti; AliceAACI RomeAACO ITAAGP Guidotti; Alice Rome ITAANM Pastorelli; BernardoAACI L'AquilaAACO ITAAGP Pastorelli; Bernardo L'Aquila ITAANM Rosati; LeonardoAACI RomeAACO ITAAGP Rosati; Leonardo Rome ITAANM Salerno; PaoloAACI MonterotondoAACO ITAAGP Salerno; Paolo Monterotondo IT - A method, data processing system, and computer program product for applying a setting. A request for a set of resources is received. The request is to use the set of resources over a network connection. An address associated with a device from the request is identified. A geographic location of the device is identified based on the address. A set of settings for the set of resources is identified based on the geographic location of the device. The set of settings is applied to the set of resources. | 2013-01-17 |
20130019090 | Method and apparatus for certificate-based cookie securityAANM Wicker; Jason MatthewAACI PittsboroAAST NCAACO USAAGP Wicker; Jason Matthew Pittsboro NC US - A new cookie attribute is defined for use during secure HTTP transport sessions. This attribute is referred to herein as a “certificate attribute” or “server certificate attribute,” or servcertid. This attribute is adapted to point to a server-supplied certificate and, in particular, a digital certificate, such as an X.509 digital certificate. The cookie attribute includes a value, and that value is designed to correspond to one or more content fields in the digital certificate. According to one embodiment, and during a first https session, a first web application executing on a first server provides a web browser with the cookie having the server certificate identifier attribute set to a value corresponding to a content field in a server certificate. Later, when the browser is accessing a second server during a second https session that differs from the first https session, the browser verifies that the value in the cookie matches a corresponding value in the server certificate received from the second server (during the setup of the second https session) before sending the cookie to the second server. This approach ensures that the cookie is presented only over specified https connections and to trusted organizations (as identified by the servcertid value(s) encoded in the attribute). | 2013-01-17 |
20130019091 | AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS WITH ASSURED SYSTEM AVAILABILITY - A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities. | 2013-01-17 |
20130019092 | System to Embed Enhanced Security / Privacy Functions Into a User ClientAANM LEVOW; ZACHARYAACI MOUNTAIN VIEWAAST CAAACO USAAGP LEVOW; ZACHARY MOUNTAIN VIEW CA US - A system and method for provisioning enhanced security/privacy functions into a user client to detect, warn, and avoid man in the middle attacks and to improve privacy and security of data transmitted across the Internet without certificate authorities. | 2013-01-17 |
20130019093 | CERTIFICATE AUTHORITYAANM Seidl; RobertAACI KonigsdorfAACO DEAAGP Seidl; Robert Konigsdorf DEAANM Goetze; NorbertAACI EichenauAACO DEAAGP Goetze; Norbert Eichenau DEAANM Bauer-Hermann; MarkusAACI MunichAACO DEAAGP Bauer-Hermann; Markus Munich DE - A protocol for issuing and controlling digital certificates is described in which an identity management system is used to identify a user requesting a digital certificate and is also used to issue the digital certificate itself. Accordingly, an IDM-based PKI system is provided. | 2013-01-17 |
20130019094 | CREATING AND USING SECURE COMMUNICATIONS CHANNELS FOR VIRTUAL UNIVERSES - A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is sequentially encrypted with the public keys of servers in the path. Decryption and identification of the next server occurs in a sequential manner in which the path is known only to the sender. | 2013-01-17 |
20130019095 | Data services outsourcing verificationAANM Cohen; Alexander J.AACI BellevueAAST WAAACO USAAGP Cohen; Alexander J. Bellevue WA USAANM Jung; Edward K. Y.AACI BellevueAAST WAAACO USAAGP Jung; Edward K. Y. Bellevue WA USAANM Levien; Royce A.AACI LexingtonAAST MAAACO USAAGP Levien; Royce A. Lexington MA USAANM Lord; Robert W.AACI SeattleAAST WAAACO USAAGP Lord; Robert W. Seattle WA USAANM Malamud; Mark A.AACI SeattleAAST WAAACO USAAGP Malamud; Mark A. Seattle WA USAANM Mangione-Smith; William HenryAACI KirklandAAST WAAACO USAAGP Mangione-Smith; William Henry Kirkland WA USAANM Rinaldo, JR.; John D.AACI BellevueAAST WAAACO USAAGP Rinaldo, JR.; John D. Bellevue WA USAANM Tegreene; Clarence T.AACI BellevueAAST WAAACO USAAGP Tegreene; Clarence T. Bellevue WA US - A method and system for verifying outsource data and providing a certification system includes but is not limited to a method including receiving one or more deposits of one or more data elements in connection with an outsourcing transaction from or on behalf of a third party, verifying an identification of the third party, maintaining a transaction log to provide a validation record acknowledging receipt of the one or more deposits, and performing a cryptographic action against one or more aspects of the outsourcing transaction to provide a certified version of the transaction log to confirm the outsourcing transaction. | 2013-01-17 |
20130019096 | SYSTEM AND METHOD FOR COMMUNICATING BETWEEN DIFFERENT ENTITIES USING DIFFERENT DATA PORTIONS FOR DIFFERENT CHANNELS - A first entity for communicating with a second entity and a third entity includes a data subdivider for subdividing a data entity into a first data portion and a second data portion. The data portions are processed by an output interface for transmitting a first message to the third entity and the second message to the second entity. In the third entity, the data portion directly received from the first entity and the other data portion received via the second entity are reassembled. | 2013-01-17 |
20130019097 | Method and Apparatus for Securing Communication Between a Mobile Node and a Network - In accordance with the teachings of the present invention, a method and apparatus is presented for securely negotiating a session key between a mobile node and a network node, such as a first hop IP router. A session key is encoded using asymmetric encryption. The encrypted session key is then communicated to the first hop IP router for later use. In accordance with another teaching of the present invention, the session key is then used by the mobile node and a first hop IP router to authenticate a message. Lastly, in accordance with the third teaching of the present invention, a standardized protocol is used to securely negotiate the session key between the mobile node and the first hop IP router. | 2013-01-17 |
20130019098 | SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION - Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request, is received at an application server from the client. The application server constructs a signing key based on (i) the identity of the user making the request, (ii) a time based salt value, (iii) a secret shared between the application and transaction servers and, optionally, (iv) an identifier of the distributor or developer of the application. The signing key is embedded in an unbranded version of the application thereby branding the application. The branded application can sign a request with the signing key and submit the signed request to the transaction server with the identity of the user and the identifier of the distributor or developer of the application. | 2013-01-17 |
20130019099 | Strengthened Public Key Protocol - A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics. | 2013-01-17 |
20130019100 | INTELLIGENT REMOTE DEVICE - An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network. The intelligent remote device is adapted to emulate a local security device peripheral connected to the computer system. Multiple computer systems may be authenticated to using the intelligent remote device. Additionally, various secure communications connections mechanisms are described which are intended to augment existing security protocols available using wireless network equipment. Authentication of a user supplied critical security parameter is performed by the security token. The critical security parameter may be provided locally via the intelligent remote device or received from the wireless network and routed to the security token. Aural, visual or vibratory feedback may be provided to the user to signal a successful authentication transaction. | 2013-01-17 |
20130019101 | METHOD FOR CONFIGURING AND DISTRIBUTING ACCESS RIGHTS IN A DISTRIBUTED SYSTEM - The disclosure relates to a method and system for configuring and distributing access rights among intelligent devices within a distributed system. The distributed system includes a first intelligent device connected to further intelligent devices. Device-internal individual keys and a shared key are stored in the intelligent devices. A user account is created in the first device via a web client and is encrypted by the device-internal key of the first device and stored as a password file in the first device. Before being transmitted via the web client, the password file is encrypted by the shared key and the encrypted password file is transmitted to the further intelligent devices. The data stored in the encrypted password file are decrypted by the shared key. An encrypted storage of the password file is carried out by the device-internal key of the respective device. | 2013-01-17 |
20130019102 | System and method for encrypted smart card pin entry - A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then encrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers. | 2013-01-17 |
20130019103 | SYSTEM AND METHOD FOR GENERATING AND MANAGING ADMINISTRATOR PASSWORDS - A password management system and method for securing networked client terminals and mobile devices is provided. More specifically, the present invention provides a system and method for encrypting randomly generated administrator-level passwords and providing a means for decrypting the randomly generated passwords for single-use unrestricted access to a designated terminal or mobile device. When unrestricted access to the terminal or mobile device is required, the encrypted administrator-level password is decrypted using a shared symmetric key, which is generated during encryption of the administrator password, to reveal the administrator-level password for the terminal or mobile device. The administrator-level password is a single-use password, wherein upon use of the administrator-level password a new administrator-level password may be automatically generated for the corresponding terminal or mobile device. | 2013-01-17 |
20130019104 | CELL LEVEL DATA ENCRYPTIONAANM Halas; MiroslavAACI CharlottesvilleAAST VAAACO USAAGP Halas; Miroslav Charlottesville VA USAANM Umamaheswaran; RangarajanAACI Simi ValleyAAST CAAACO USAAGP Umamaheswaran; Rangarajan Simi Valley CA US - Embodiments of the invention provide for cell level data encryption. The methods, apparatus and computer program products herein described provide for the encryption of individual data values without requiring adjacent data valued to also be encrypted. For example, in situations where individual data values are arranged in a database that is visualized as a two-dimensional representation, individual data values may be encrypted without requiring horizontally or vertically adjacent data values to also be encrypted. In situations where data values is transmitted and visualized as a sequential stream of data values, one data value may be encrypted without requiring previous or subsequent data values to be encrypted. In some such examples, an individual data value may be encrypted without requiring the entire transmission channel to be encrypted. | 2013-01-17 |
20130019105 | SECURE SOFTWARE AND HARDWARE ASSOCIATION TECHNIQUEAANM Hussain; Muhammad RaghibAACI SaratogaAAST CAAACO USAAGP Hussain; Muhammad Raghib Saratoga CA US - Authenticated hardware and authenticated software are cryptographically associated using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. In one embodiment, critical security information associated with the equipment is loaded from a memory at startup time. The critical security information is stored in the memory, in encrypted form, using a unique secret value. The secret value is used to retrieve a chip encryption key and one or more image authentication keys that can be used to associate program code with an original equipment manufacturer. These keys are used to authenticate the program code. | 2013-01-17 |
20130019106 | METHODS AND APPARATUS FOR DIGITAL STEGANOGRAPHY - A computer-implemented digital steganography method includes providing a target dataset comprising a plurality of target data elements, providing a source dataset comprising a plurality of source data elements, and creating a grille dataset configured to map each of the target data elements in the target dataset with a corresponding source data element within the source dataset in accordance with a predefined extraction method. | 2013-01-17 |
20130019107 | FEDERATED DIGITAL RIGHTS MANAGEMENT SCHEME INCLUDING TRUSTED SYSTEMS - Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a network, a content server connected to the network and to a trusted system, a first device including a non-volatile memory that is connected to the network and a second device including a non-volatile memory that is connected to the network. In addition, the registration server is configured to provide the first device with a first set of activation information in a first format, the first device is configured to store the first set of activation information in non-volatile memory, the registration server is configured to provide the second device with a second set of activation information in a second format, and the second device is configured to store the second set of activation information in non-volatile memory. | 2013-01-17 |
20130019108 | ADDRESS TRANSLATION UNIT, DEVICE AND METHOD FOR REMOTE DIRECT MEMORY ACCESS OF A MEMORY - A method for Remote Direct Memory Access (RDMA) of a memory of a processor. An address translation unit comprises an address translator and a signer. The address translator is configured to translate a received virtual address in a real address of the memory. The signer is configured to cryptographically sign the real address. | 2013-01-17 |
20130019109 | METHOD AND APPARATUS FOR USING NON-VOLATILE STORAGE DEVICEAANM KANG; Bo-GyeongAACI Suwon-siAACO KRAAGP KANG; Bo-Gyeong Suwon-si KRAANM Kwon; Moon-SangAACI SeoulAACO KRAAGP Kwon; Moon-Sang Seoul KRAANM Lee; Byung-RaeAACI SeoulAACO KRAAGP Lee; Byung-Rae Seoul KRAANM Lee; Jae-BumAACI Yongin-siAACO KRAAGP Lee; Jae-Bum Yongin-si KR - A method and apparatus for using a non-volatile storage device includes reading device identification information from the non-volatile storage device, application identification information corresponding to a content application related to a type of content to be protected or utilized among a plurality of content applications is acquired, usage identification information is generated using the device identification information and the application identification information, and protecting or utilizing content using the usage identification information. | 2013-01-17 |
20130019110 | APPARATUS AND METHOD FOR PREVENTING COPYING OF TERMINAL UNIQUE INFORMATION IN PORTABLE TERMINALAANM LEE; Ji-HyunAACI Yongin-siAACO KRAAGP LEE; Ji-Hyun Yongin-si KRAANM JUNG; Hyung-ChulAACI Suwon-siAACO KRAAGP JUNG; Hyung-Chul Suwon-si KRAANM RIM; Heung-SoonAACI Yongin-siAACO KRAAGP RIM; Heung-Soon Yongin-si KRAANM CHO; Sung-KyuAACI Suwon-siAACO KRAAGP CHO; Sung-Kyu Suwon-si KR - An apparatus and a method for preventing copying of terminal unique information in a portable terminal are provided. The method includes storing a root public key for certifying the terminal unique information and a first model class ID of the portable terminal in an One-Time Programmable (OTP) region, encrypting the terminal unique information and certification information of the terminal unique information for certifying the terminal unique information with a terminal unique value and storing the encrypted terminal unique information and the encrypted certification information thereof, obtaining the certification information based on the root public key if certification with respect to the terminal unique information is requested, and certifying the terminal unique information based on the certification information. | 2013-01-17 |
20130019111 | SECURE DATA RECORDERAANM Martin; ThomasAACI SharjahAACO AEAAGP Martin; Thomas Sharjah AE - A method and apparatus for securely encrypting data is disclosed. Conventional protections against the loss or theft of sensitive data such as full disk encryption are not effective if the device is, or has recently been, running when captured or found because the keys used for full disk encryption will still be in memory and can be used to decrypt the data stored on the disk. Some devices, such as devices which gather sensitive data in use, must run in environments in which they might be captured by a person seeking access to the sensitive data already recorded by the device. An encryption method is proposed in which files on a recorder's persistent memory are initialised with pseudo-random masking data whilst the recorder is in a relatively secure environment. One or more parameters which can be used to re-create the pseudo-random masking data are encrypted with a public key using a public-key encryption algorithm and stored on the recorder. The device's memory is then purged to remove the one or more parameters. Later, when miming in a relatively insecure environment, the sensitive data is encrypted ( | 2013-01-17 |
20130019112 | Power control moduleAANM Chien; Chi-MingAACI Taipei CityAACO TWAAGP Chien; Chi-Ming Taipei City TW - A power control module installed in the power supply device of a computer for power control is disclosed to include an electric switch member for switching on/off power supply conduction between the power supply device and the motherboard of the computer, and a sensor for sensing the power-on/off current signal of the motherboard of the computer and driving the electric switch member to switch off power supply conduction between the power supply device and the motherboard of the computer when the user switched off the computer after work. | 2013-01-17 |
20130019113 | HOST DEVICE AND TERMINAL DEVICE, AND COMMUNICATION SYSTEMAANM YAMAYA; JunAACI KanagawaAACO JPAAGP YAMAYA; Jun Kanagawa JP - A host-side control unit | 2013-01-17 |
20130019114 | MOBILE TERMINAL AND POWER CONTROL METHODAANM Sumida; HaruhikoAACI KanagawaAACO JPAAGP Sumida; Haruhiko Kanagawa JP - A mobile terminal includes: a tamper-detection circuit ( | 2013-01-17 |
20130019115 | IMAGE FORMING APPARATUS AND CONTROL METHODAANM NISHIMURA; MichiakiAACI OsakaAACO JPAAGP NISHIMURA; Michiaki Osaka JP - Provided is an image forming apparatus including a plurality of processing sections each performing a different process, a switching section for switching the status of the apparatus from a normal status to a power-saving status which requires power consumption smaller than that in the normal status when none of the plurality of processing sections performs processing for a predetermined period of time, a return section for making the status of the apparatus return from the power-saving status to the normal status under a predetermined condition, a pre-energizing section for energizing each of the processing sections in advance when the status of the apparatus is returned to the normal status, a specifying section for specifying a process to be executed, and a stop section for selectively stopping pre-energization of each of the processing sections based on the process specified by the specifying section. | 2013-01-17 |