03rd week of 2012 patent applcation highlights part 55 |
Patent application number | Title | Published |
20120017038 | Non-Volatile Memory And Method With Control Data Management - In a nonvolatile memory with block management system, critical data such as control data for the block management system is maintained in duplicates. Various methods are described for robustly writing and reading two copies of critical data in multi-state memory. In another aspect of the invention, a preemptive garbage collection on memory block containing control data avoids an undesirable situation where a large number of such memory blocks need be garbage collected at the same time. | 2012-01-19 |
20120017039 | CACHING USING VIRTUAL MEMORY - In a first embodiment of the present invention, a method for caching in a processor system having virtual memory is provided, the method comprising: monitoring slow memory in the processor system to determine frequently accessed pages; for a frequently accessed page in slow memory: copy the frequently accessed page from slow memory to a location in fast memory; and update virtual address page tables to reflect the location of the frequently accessed page in fast memory. | 2012-01-19 |
20120017040 | Maintaining Data Consistency in Mirrored Cluster Storage Systems Using Bitmap Write-Intent Logging - Techniques for maintaining mirrored storage cluster data consistency can employ write-intent logging. The techniques can be scaled to any number of mirror nodes. The techniques can keep track of any outstanding I/Os, data in caches, and data that has gone out of sync between mirrored nodes due to link failures. The techniques can ensure that a power failure on any of the storage nodes does not result in inconsistent data among the storage nodes. The techniques may keep track of outstanding I/Os using a minimal memory foot-print and having a negligible impact on the I/O performance. Properly choosing the granularity of the system for tracking outstanding I/Os can result in a minimal amount of data requiring transfer to synchronize the mirror nodes. The capability to vary the granularity based on physical and logical parameters of the storage volumes may provide performance benefits. | 2012-01-19 |
20120017041 | MANAGING EXTENDED RAID CACHES USING COUNTING BLOOM FILTERS - Contentual metadata of an extended cache is stored within the extended cache. The contentual metadata of the extended cache is approximated utilizing a counting Bloom filter. The counting Bloom filter is stored within a primary cache. Contentual metadata of the primary cache is stored within the primary cache. One of a data read or a data write is executed without accessing the contentual metadata of the extended cache stored within the extended cache. | 2012-01-19 |
20120017042 | STORAGE CONTROL APPARATUS AND STORAGE SYSTEM COMPRISING MULTIPLE STORAGE CONTROL APPARATUSES - A storage system has multiple disk controller (DKC) units that are coupled to one another in accordance with a coupling mode that satisfies the following (a1) through (a3):
| 2012-01-19 |
20120017043 | METHOD AND SYSTEM FOR HETEROGENEOUS DATA VOLUME - A method and system is disclosed for providing a heterogeneous data storage comprising a plurality of storage devices of different types with respect to device vendor, model, capacity, performance and/or function. The present invention employs data access mechanisms specific to the type of underlying storage and the type of data to be stored or retrieved, and provides for integrated remote mirroring, disaster recovery and hierarchical storage management (HSM), as well as improved I/O performance and life expectancy of storage disks. A method of writing to and reading from heterogeneous data volume is also disclosed. | 2012-01-19 |
20120017044 | Information Handling System Image Restoration - An information handling system is returned to its original manufacture state with a tool stored on a detachable memory device that retrieves image restore information from non-volatile memory of the information handling system, cleanses information stored on the non-volatile memory and then returns the image restore information to the non-volatile memory. By executing an image restore tool that applies the image restore information, the original manufacture image is re-built in the non-volatile memory after the cleansing so that any personal information stored on the non-volatile memory by a previous user is erased. | 2012-01-19 |
20120017045 | MULTI-RESOLUTION CACHE MONITORING - Multi-resolution cache monitoring devices and methods are provided. Multi-resolution cache devices illustratively have a cache memory, an interface, an information unit, and a processing unit. The interface receives a request for data that may be included in the cache memory. The information unit has state information for the cache memory. The state information is organized in a hierarchical structure. The process unit searches the hierarchical structure for the requested data. | 2012-01-19 |
20120017046 | UNIFIED MANAGEMENT OF STORAGE AND APPLICATION CONSISTENT SNAPSHOTS - A storage management application of a storage array is operable to create a new volume on the storage device array, and to automatically configure, responsive to user selection of an application protection profile, data protection services for application data to be stored on the volume, and/or, responsive to user selection of an application performance profile, application specific performance parameters. The application protection profile specifies scheduling and replication of snapshots for application data to be stored on the volume, and the application performance profile specifies performance parameters such as setting a block size, enabling or modifying a data caching algorithm, turning on or modifying data compression, etc. The scheduling, replication and/or application performance may be managed by a daemon associated with the storage management application which communicates with an agent associated with an application server on which the application executes. | 2012-01-19 |
20120017047 | DATA VAULTING IN EMERGENCY SHUTDOWN - A data storage apparatus includes a processor, a write cache in operable communication with the processor, an auxiliary storage device in operable communication with the write cache, and a temporary power source in electrical communication with each of the processor, write cache, and auxiliary storage device for supplying power in the event of a loss of primary, external power. The auxiliary storage device is dimensioned to have sufficient size for holding dirty pages cached in the write cache, and the temporary power source is configured with sufficient energy for, subsequent to the loss of the external power, powering the processor, the write cache, and the auxiliary storage device for an entire duration of a backup process. | 2012-01-19 |
20120017048 | INTER-FRAME TEXEL CACHE - Methods, apparatuses, and systems are presented for caching. A cache memory area may be used for storing data from memory locations in an original memory area. The cache memory area may be used in conjunction with a repeatedly updated record of storage associated with the cache memory area. The repeatedly updated record of storage can thus provide a history of data storage associated with the cache memory area. The cache memory area may be loaded with entries previously stored in the cache memory area, by utilizing the repeatedly updated record of storage. In this manner, the record may be used to “warm up” the cache memory area, loading it with data entries that were previously cached and may be likely to be accessed again if repetition of memory accesses exists in the span of history captured by the repeatedly updated record of storage. | 2012-01-19 |
20120017049 | METHOD AND APPARATUS FOR IMPLEMENTING CACHE COHERENCY OF A PROCESSOR - An advanced processor comprises a plurality of multithreaded processor cores each having a data cache and instruction cache. A data switch interconnect is coupled to each of the processor cores and configured to pass information among the processor cores. A messaging network is coupled to each of the processor cores and a plurality of communication ports. In one aspect of an embodiment of the invention, the data switch interconnect is coupled to each of the processor cores by its respective data cache, and the messaging network is coupled to each of the processor cores by its respective message station. Advantages of the invention include the ability to provide high bandwidth communications between computer systems and memory in an efficient and cost-effective manner. | 2012-01-19 |
20120017050 | LOCAL CACHE PROVIDING FAST CHANNEL CHANGE - Methods, systems, and apparatuses facilitate the processing of requests for media content, which can originate from a request by a user or device to change a channel. The media content for a subset of channels can be locally cached and fetched for quick retrieval. | 2012-01-19 |
20120017051 | ISOLATION-FREE IN-CIRCUIT PROGRAMMING SYSTEM - Disclosed is an isolation-free in-circuit programming system including an in-circuit programmer and an application board connected to the in-circuit programmer through a peripheral interface bus and having a bus controller and a memory, wherein the bus controller is connected to the memory through a system bus, in which the in-circuit programmer includes a leakage current discharging circuit connected to the bus controller for detouring a leakage current flowing from the memory or the in-circuit programmer to the bus controller to flow therethrough. The in-circuit programmer also includes an input level shifter for receiving data signals from the memory and adjusting the high-level input voltage of the in-circuit programmer to decode any weak high-level output voltage from the memory, thereby allowing the high-level output voltage of the memory to be higher than the high-level input voltage of the in-circuit programmer. | 2012-01-19 |
20120017052 | Information Handling System Universal Memory Wear Leveling System and Method - An information handling system universal memory architecture assigns memory blocks to information handling system functions, such as a persistent storage function and a working storage function, that have different relative rates of writes of information. The blocks are periodically analyzed for remaining memory life to reassign blocks to functions that result in wear leveling across the blocks. For example, blocks having relatively low life remaining that are assigned to functions having a relatively high number of writes have their function switched with blocks that have a relatively high life remaining that are assigned to functions having a relatively low number of writes. In addition, wear leveling performed within a block ensures even wear of the memory cells within the block. | 2012-01-19 |
20120017053 | NONVOLATILE MEMORY APPARATUS FOR PERFORMING WEAR-LEVELING AND METHOD FOR CONTROLLING THE SAME - Various embodiments of a nonvolatile memory apparatus are disclosed. In one exemplary embodiment, the nonvolatile memory apparatus may include: a host interface; a memory controller coupled to the host interface; and a memory area including a plurality of chips controlled by the memory controller. The memory controller may be configured to assign logical addresses to the plurality of chips to form a plurality of virtual logical groups, set a plurality of threshold values and a plurality of scan ranges depending on the total erase count (TEC) of each logical group, and perform wear-leveling in stages. | 2012-01-19 |
20120017054 | STORAGE SUB-SYSTEM AND METHOD FOR CONTROLLING THE SAME - The present invention provides means for effectively reducing the amount of data by means of de-duplication in a disk array apparatus having a data guarantee code. A control means for the disk array apparatus that adds a data guarantee code to each logical data block and checks the data guarantee code when reading data has a de-duplication performing function and control means for: generating LA substitution information for a function checking the data guarantee code or read data location address substitution information when performing the de-duplication and storing data; performing the de-duplication using the above-mentioned information when reading data; and thereby avoiding false diagnosis of the data guarantee code check. | 2012-01-19 |
20120017055 | Method and device for scheduling queues based on chained list - The present invention discloses a method for scheduling queues based on a chained list. The method includes the following steps: setting the number of addresses in a queuing chained list not less than the number of queues, and partitioning the queuing chained list into different queuing sub-chained lists according to the priorities of the queues, wherein the number of the addresses in the queuing sub-chained list is not less than the total number of the queues whose priorities correspond to the queuing sub-chained list; setting for each queue a queuing chained list identifier identifying whether the each queue has queued in the queuing chained list; determining whether a queue satisfying queuing criteria has queued in the queuing chained list according to the queuing chained list identifier of the queue before the queue is added to the queuing chained list; if it has queued, adding is not processed, otherwise, the queue is added to the end of the queuing sub-chained list which corresponds to the priority of the queue, and the queuing chained list identifier of the queue is modified to an identifier identifying the queue has already queued in the queuing chained list. The present invention also discloses a device for scheduling queues based on a chained list. The present invention ensures impartiality when queues having the same priority are scheduled. | 2012-01-19 |
20120017056 | COMPUTER READABLE MEDIUM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A computer readable medium stores a program causing a computer to execute a process. The process includes receiving from a user a request for performing a process for copying information; executing the process for copying information in accordance with the received request; and performing control to determine whether or not copied information and a change history of original information from which the copied information is produced are to be stored in a memory in association with each other, when the process for copying information is executed, in accordance with whether or not a relationship between information relating to a user associated with the original information and information relating to a user who has made the request for performing the process for copying information satisfies a predetermined condition. | 2012-01-19 |
20120017057 | DATA COPYING DEVICE, METHOD FOR COPYING DATA AND DATA STORAGE DEVICE - A data copying device that copies data stored in a first data storage device to a second data storage device is disclosed. The data copying device includes a data reading unit that reads data that has an amount determined based on a number of a plurality of logical volumes included in the first data storage device storing the data to be copied and an amount of data to be transferred from each of the logical volumes, a storage unit that stores the data read by the data reading unit, and a data transfer unit that transfers the data stored in the storage unit to the second storage device. | 2012-01-19 |
20120017058 | COMPUTER SYSTEM AND METHOD OF MANAGING STATUS THEREOF - There is disclosed a data storage system used in a computer environment where there are plural host computers and plural storage array controllers. When a remote copy is made while assuring the order of writing across plural storage array controllers, one of the host computers gains copy information about all the storage array controllers associated with the remote copy as a representative. The representative one of the storage array controllers collects and stores copy statuses which are individually managed by the storage array controllers for which a remote copy is made. The host computer gains the copy statuses from the representative controller using an instruction to gain the copy statuses. | 2012-01-19 |
20120017059 | MAKING A PHYSICAL COPY OF DATA AT A REMOTE STORAGE DEVICE - Systems and methods relating to making a physical copy at a remote storage device of data on a local storage device in response to a command from a backup application operatively associated with the local storage device are disclosed. An exemplary method comprises replicating the data from the local storage device on the remote storage device. The method also comprises copying the data replicated at the remote storage device to a physical medium operatively associated with the remote storage device in response to a command from the backup application operatively associated with the local storage device. | 2012-01-19 |
20120017060 | DEDUPLICATION OF DATA STORED IN A COPY VOLUME - A source volume and a copy volume are stored, where the copy volume contains data that has been modified by writes to the source volume. In response to a write to a particular location and resource volume, a deduplication data structure is checked to determine whether the copy volume contains data that is the same as data in the particular location. In response to determining from the deduplication data structure that a copy volume contains the same data as the data in the particular location, a reference to the first location of the copy volume storing the same data is added instead of repeating storing of the data of the particular location in the copy volume. | 2012-01-19 |
20120017061 | METHODS AND APPARATUS FOR CONTROLLING DATA BETWEEN STORAGE SYSTEMS PROVIDING DIFFERENT STORAGE FUNCTIONS - A system comprises a plurality of storage systems, which provides different storage functions, and is controlled by a management server. The management server determines whether to change the control of the storage controller between the storage systems, or to mount the target volume as an external volume and keep the storage controller under control so that the storage function provided to the source volume is maintained even after the configuration change between the storage systems. After the determination, the management server instructs the storage system to perform according to the determination. | 2012-01-19 |
20120017062 | Data Processing Using On-Chip Memory In Multiple Processing Units - Methods are disclosed for improving data processing performance in a processor using on-chip local memory in multiple processing units. According to an embodiment, a method of processing data elements in a processor using a plurality of processing units, includes: launching, in each of the processing units, a first wavefront having a first type of thread followed by a second wavefront having a second type of thread, where the first wavefront reads as input a portion of the data elements from an off-chip shared memory and generates a first output; writing the first output to an on-chip local memory of the respective processing unit; and writing to the on-chip local memory a second output generated by the second wavefront, where input to the second wavefront comprises a first plurality of data elements from the first output. Corresponding system and computer program product embodiments are also disclosed. | 2012-01-19 |
20120017063 | MECHANISM TO HANDLE PERIPHERAL PAGE FAULTS - A page service request is received from a peripheral device requesting that a memory page be loaded into system memory. Page service request information corresponding to the received page service request is written as a queue entry into a queue structure in system memory. The processor is notified that the page request is present in the queue. The processor may be notified with an interrupt of a new queue entry. The processor processes the page service request and the peripheral device is notified of the completion of the processing of the request. | 2012-01-19 |
20120017064 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus is disclosed which is connected to a network and which includes: an address translation section configured such that when a virtual address assigned to a virtual storage area is held in an address translation module and associated therein with network node information designating the location of a storage portion connected to the network and with a physical address in the storage portion, the address translation section translates the virtual address into the network node information and the physical address based on the address translation module; and an access communication section configured such that based on the network node information and the physical address acquired by the address translation section, the access communication section accesses one of a plurality of storage areas held by the storage portion connected to the network, the accessed storage area being designated by the physical address. | 2012-01-19 |
20120017065 | PARALLELIZED CHECK POINTING USING MATs AND THROUGH SILICON VIAs (TSVs) - A system and method that includes a memory die, residing on a stacked memory, which is organized into a plurality of mats that include data. The system and method also includes an additional memory die, residing on the stacked memory, that is organized into an additional plurality of mats and connected to the memory die by a Through Silicon Vias (TSVs), the data to be transmitted along the TSVs. | 2012-01-19 |
20120017066 | LOW LATENCY MASSIVE PARALLEL DATA PROCESSING DEVICE - Data processing device comprising a multidimensional array of ALUs, having at least two dimension where the number of ALUs in the dimension is greater or equal to 2, adapted to process data without register caused latency between at least some of the ALUs in the corresponding array. | 2012-01-19 |
20120017067 | ON-DEMAND PREDICATE REGISTERS - In accordance with at least some embodiments, a digital signal processor (DSP) includes an instruction fetch unit and an instruction decode unit in communication with the instruction fetch unit. The DSP also includes a register set and a plurality of work units in communication with the instruction decode unit. The register set includes a plurality of legacy predicate registers. Separate from the legacy predicate registers, a plurality of on-demand predicate registers are selectively signaled without changing the opcode space for the DSP. | 2012-01-19 |
20120017068 | PROCESSORS - A processing system comprises a plurality of processors ( | 2012-01-19 |
20120017069 | OUT-OF-ORDER COMMAND EXECUTION - Techniques are described for reordering commands to improve the speed at which at least one command stream may execute. Prior to distributing commands in the at least one command stream to multiple pipelines, a multimedia processor analyzes any inter-pipeline dependencies and determines the current execution state of the pipelines. The processor may, based on this information, reorder the at least one command stream by prioritizing commands that lack any current dependencies and therefore may be executed immediately by the appropriate pipeline. Such out of order execution of commands in the at least one command stream may increase the throughput of the multimedia processor by increasing the rate at which the command stream is executed. | 2012-01-19 |
20120017070 | COMPILE SYSTEM, COMPILE METHOD, AND STORAGE MEDIUM STORING COMPILE PROGRAM - To provide a compile system, a compile method, and a compile program capable of improving the execution speed of a program. A compile system according to the present invention includes a primary arithmetic unit | 2012-01-19 |
20120017071 | Apparatus and Method Thereof for Reliable Booting from NAND Flash Memory - An apparatus for enabling booting from a NAND flash memory comprises a NAND flash controller connected to the NAND flash memory, wherein the NAND flasher memory is configured to include at least a starter section for storing boot code, the starter section includes a predefined number of blocks to store copies of the boot code duplicated in a configurable number of blocks; and a fetch emulator for fetching a valid and complete starter block that includes the boot code. | 2012-01-19 |
20120017072 | MODIFYING A VIDEO RESOLUTION OF VIDEO DATA IN A PRE-OPERATING SYSTEM ENVIRONMENT | 2012-01-19 |
20120017073 | CONFIGURATION OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to configuring a Basic Input/Output System (BIOS) of a computing device. An embodiment of a method may present, by the computing device, a first request relating to a first functionality of the computing device controlled by one or more settings of the BIOS, and may receive a first user response corresponding to the first request. The method may also present a second request relating to a second functionality of the computing device controlled by one or more settings of the BIOS, with the second request being selected based on the first user response. The method may then receive a second user response corresponding to the second request. In addition, the method may configure at least one setting of the BIOS based on the first and second user responses. Embodiments of a related computing device and computer-readable storage medium are also disclosed. | 2012-01-19 |
20120017074 | DYNAMIC SYSTEM MODE SWITCHING - A system and method of controlling the system mode of a computer. The method comprises sending an Intelligent Platform Management Interface (IPMI) command to a baseboard management controller (BMC), wherein the IPMI command provides a system mode instruction to the BMC. The BMC then sends an operating parameter instruction to a plurality of hardware devices within the computer in response to receiving the IPMI command, wherein the operating parameter instruction sent to the plurality of hardware devices is associated with the system mode. Accordingly, each of the hardware devices operates according to the operating parameter instruction received from the BMC. Preferably, such a method allows the system mode to be changed without shutting down an operating system or rebooting the computer system. Optionally, the BMC may communicate with the hardware devices over an Inter Integrated Circuit (I2C) bus, a General Purpose Input Output (GPIO) pin of the BMC, or a combination thereof. | 2012-01-19 |
20120017075 | REGISTRY KEY FEDERATION SYSTEMS AND METHODS - According to certain aspects, a method is disclosed for registry key management in a network. The method includes detecting registry keys stored in a registry of a plurality of client computing devices and storing on a remote database a copy of the registry keys. The remote database is in communication with each of the client computing devices. The method further includes tracking with a management module running on the client computing devices modifications made to the registry of the first client device. In addition, the method includes modifying the copy of the registry keys on the remote database to reflect the modifications to the registry of the first client computing device; detecting a rebuild operation of the first client computing device; and automatically reinstalling registry keys on the first client computing device based on the copy of the registry keys stored on the remote database. | 2012-01-19 |
20120017076 | Method of Customizing An Operating Configuration of a Portable Electronic Device and System Using the Method - A method of customizing an operating configuration of a portable electronic device and a system using the method are disclosed. The method is used for a server, the server comprises a device database, and the server is provided to the portable electronic device for logging in through a communication network and operating software. The method comprises the steps of: accepting the portable electronic device login; determining whether the device database comprising a device profile of the portable electronic device; and if yes, generating operating configuration information, wherein the operating configuration information comprises the operating configuration of altering the operating configuration of the portable electronic device. | 2012-01-19 |
20120017077 | Managing Hardware Resources For Soft Partitioning - Methods and apparatus for partitioning a computer server system ( | 2012-01-19 |
20120017078 | PERIMETER ENCRYPTION METHOD AND SYSTEM - A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain. | 2012-01-19 |
20120017079 | Secure Acknowledgment Device For One-Way Data Transfer System - An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash number calculator for hashing the message from the inlet interface, an outlet interface for sending the hashed message to the second node, a first one-way data link for unidirectional transfer from the inlet interface to the hash number calculator, and a second one-way data link for unidirectional transfer from the hash number calculator to the outlet interface, is provided. While the apparatus is capable of bidirectional communications with either or both of the first and second nodes through the respective interfaces, the unidirectionality of data flow through the apparatus is strictly enforced by the hardware of the apparatus. The apparatus provides a secure mechanism and communication channel for relaying hashed acknowledgment messages from a receive node to a send node to inform the status of data transfer from the send node to the receive node across a one-way data link. The apparatus may be further implemented with the capability of comparing hashed messages from the two nodes. | 2012-01-19 |
20120017080 | METHOD FOR ESTABLISHING SAFE ASSOCIATION AMONG WAPI STATIONS IN AD-HOC NETWORK - The present invention discloses a method for establishing a security association among WAPI stations in an ad-hoc network, and the method comprises: when a security association between two stations in the ad-hoc network is to be established, one station STA | 2012-01-19 |
20120017081 | METHOD FOR AUTHENTICATING DEVICE CAPABILITIES TO A VERIFIED THIRD PARTY - A system, devices and methods for verifying an administrator computing device to a guest computing device, verifying the guest device to the administrator device and outputting a list of the guest device capabilities for the administrator device such that the guest device is capable of verifying the administrator device, for example to ensure it does not divulge its capabilities to imposters, and the administrator device is capable of identifying whether the list of device capabilities is authentic. Verification can be achieved through cryptographic hashes of private certificates, digital signatures or expected output from verified modules. The list of device capabilities may be restricted based on the authorization granted to the administrator computer and may be altered or watermarked for verification. A failure to verify the administrator device may restrict execution of instructions on the guest device to prevent unauthorized access to the guest device's capabilities. | 2012-01-19 |
20120017082 | Virtual Private Supply Chain - A generic Internet based system for viewing supply chain data is provided. The system includes an Internet based data viewing engine and a data store that holds both viewable data and metadata associated with the viewable data. The metadata can be employed by the Internet based data viewing engine to control the presentation of the viewable data. The generic Internet based supply chain data viewing engine may be employed in a virtual private supply chain (VPSC). A VPSC includes a data acceptor that can receive supply chain data items from supply chain members, a supply chain data store that can store transformed, validated supply chain data items received from the supply chain members and a data accessor operable to selectively present supply chain data items stored in the supply chain data store to viewing supply chain members. One example of the data accessor is the generic Internet based viewing engine. | 2012-01-19 |
20120017083 | GROUP SIGNATURE WITH LOCAL REVOCATION VERIFICATION WITH CAPACITY FOR LIFTING ANONYMITY - The cryptographic scheme subdivides time into periods with an index j=0, 1, 2, etc. A public key indicates elements u and v of a first cyclic group G | 2012-01-19 |
20120017084 | Storage Device and Method for Providing a Partially-Encrypted Content File to a Host Device - A storage device and method for providing a partially-encrypted content file to a host device are provided. In one embodiment, the storage device retrieves a content file from memory in the storage device and partially-encrypts the content file by encrypting some portions of the content file. The storage device sends the partially-encrypted content file to a host device and informs the host device of which portions of the partially-encrypted content file are encrypted. In one embodiment, the remaining portions of the content file are in clear text form and do not need to be decrypted. Because the host device only needs to decrypt the portions of the content file that are encrypted—and not the entire content file—the host device can decrypt the partially-encrypted content file, even if it does not have the processing power to decrypt a fully-encrypted version. In another embodiment, at least some of the remaining portions of the content file are encrypted with at least one additional key. | 2012-01-19 |
20120017085 | TECHNIQUES FOR IDENTITY-ENABLED INTERFACE DEPLOYMENT - Techniques for providing identity-enabled interfaces for deployment are presented. Specifically, an agent of an enterprise infrastructure authenticates and acquires an agent identity for interacting with a cloud processing environment. Once the agent is deployed in the cloud processing environment, enterprise policy can be enforced within the cloud processing environment on actions occurring within the cloud. The agent acts as an Application Programming Interface between the enterprise and the cloud processing environment. The reverse is also achievable, where a cloud deploys an agent to the enterprise to deploy a cloud interface within the enterprise for policy enforcement. | 2012-01-19 |
20120017086 | INFORMATION SECURITY TRANSMISSION SYSTEM - Provided herein is an information security transmission system, comprising a first information equipment and a second information equipment, wherein the first information equipment can obtain at least one certification data, connecting to the second information equipment through a network for processing an information transmission, accordingly, a key pair used for encryption/decryption can be obtained through the certificate authority or that can be obtained without the certificate authority selectively, such that the information transmission security channel can be established and the data transmission security can be ensured. The first information equipment and the second information equipment respectively comprises a first dynamic codec and a second dynamic codec for processing a coding/decoding process depending on a dynamic code book, furthermore, an automatic error detecting mechanism and an error correcting mechanism can be associated for ensuring the data transmission security and the data correction especially at one time transmission. | 2012-01-19 |
20120017087 | CONTENT DELIVERY NETWORK ENCRYPTION - A system and method for delivering content to end users encrypted within a content delivery network (CDN) for content originators is disclosed. CDNs transport content for content originators to end user systems in a largely opaque manner. Caches and origin servers in the CDN are used to store content. Some or all of the content is encrypted within the CDN. When universal resource indicators (URIs) are received from an end user system, the CDN can determine the key used to decrypt the content object within the CDN before delivery. Where there is a cache miss, an origin server can be queried for the content object, which is encrypted in the CDN. | 2012-01-19 |
20120017088 | WIRELESS LOCAL AREA NETWORK TERMINAL PRE-AUTHENTICATION METHOD AND WIRELESS LOCAL AREA NETWORK SYSTEM - A method for pre-authenticating a wireless local area network terminal and a wireless local area network system. The pre-authentication method includes after a current access point (AP) which has set up security association with a station (STA) receiving a pre-authentication start packet sent by the STA, the current AP interacting with a destination AP to verify certificates of the current AP and the destination AP for each other. If a certificate of the destination AP is verified to be valid, the current AP sending key information of the security association set up with the STA by the current AP to the destination AP, and the destination AP saving the key information, the key information including a basic key generated by negotiation between the STA and the current AP. | 2012-01-19 |
20120017089 | CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION - Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token. | 2012-01-19 |
20120017090 | SYSTEM AND METHOD FOR ZONE SIGNING AND KEY MANAGEMENT IN A DNS SYSTEM - Methods and systems for signing a DNS zone file and managing zone file signing are provided. An indication of a first DNS zone to be signed is received from one of several remote users, where each such remote user has control over a separate DNS zone. Unsigned zone data is retrieved for the first DNS zone to be signed and is cryptographically signed. The signed zone data is provided to a signed zone master for propagation to one or more DNS servers. | 2012-01-19 |
20120017091 | METHODS AND APPARATUS FOR THWARTING WATERMARK DETECTION CIRCUMVENTION - Methods and apparatus for thwarting circumvention of watermark detection are provided. When content is received at a device that is equipped with a watermark extractor, an attacker may disguise the form of the received content in an attempt to circumvent detection of watermarks that are embedded in the content. A signal processing operation is performed on the received content such that the signal processing operation does not significantly degrade the perceptual quality of the content if the content is indeed in the form that is purported to be. The signal processing operation, however, significantly degrades the perceptual quality of the content if the content is in a different form, thereby discouraging the attacker's attempts to thwart watermark detection. | 2012-01-19 |
20120017092 | NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A non-transitory computer readable medium storing a program causing a computer to execute a process including: accepting an instruction for verifying an electronic signature added to information; verifying the electronic signature on the basis of an electronic certification corresponding to the electronic signature in accordance with the accepted instruction; calculating, when it is determined that the information has not been tampered with, a hash value of a combination of the information, the electronic signature, and validity-period information indicating a validity period of the electronic certification; adding a time stamp to the calculated hash value; outputting the information, the electronic signature, the hash value, and the validity-period information to a storage device; and outputting, when it is determined that the information has not been tampered with, a verification result including information indicating that the information has not been tampered with. | 2012-01-19 |
20120017093 | TRUSTWORTHY TIMESTAMPS AND CERTIFIABLE CLOCKS USING LOGS LINKED BY CRYPTOGRAPHIC HASHES - A method and apparatus for creating and/or using trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes. In one embodiment, the method comprises maintaining a first, chained-hash log; associating a first clock with the chained-hash log, and entangling the first log; with a second by adding a time-stamped synchronization entry to the chained-hash log, where the synchronization entry has a second time indication associated with the second log and a hash of one or more entries in the first log. | 2012-01-19 |
20120017094 | MANAGING USER ACCOUNTS - The present disclosure relates to managing user accounts in one or more computer systems. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of storing on a client computing device a first cookie containing plaintext representations of one or more user identifications, and a second cookie containing encrypted versions of the one or more user identifications; updating the cookies in coordination with each other based on communications received from a central server system in response to actions by a user of the client computing device to log on or off of accounts managed by the computer server system; and mediating user access to data stored locally on the client computing device by using the first and second cookies and determining whether the data is associated with one of the user identifiers. | 2012-01-19 |
20120017095 | Software Service for Encrypting and Decrypting Data - A system for making encryption and decryption available to software applications as a service is disclosed. An encryption/decryption server verifies the credentials of human operators, hardware devices, or combinations of operators and hardware devices and determines the cryptographic keys to which they have access, and provides access to said keys. Client software applications send service requests to the encryption/decryption server to encrypt or decrypt data. The server encrypts or decrypts the data as requested if the operator or device has the proper credentials to access the required key. The system may include multiple levels of security access. | 2012-01-19 |
20120017096 | More Elegant Exastore Apparatus and Method of Operation - An apparatus to scale for multiple petabyte backup in redundant locations. Workload is automatically shared among many servers by a characteristic derived from the content itself. Duplicate storage is eliminated by checking for the existence or absence of simple files and appending client identification to files shared among multiple subscribers. Replication depends on simple atomic file operations rather than use of tables or databases. An efficient storage method for much larger quantities of data than conventional services. | 2012-01-19 |
20120017097 | System And Method For Securely Storing Data In An Electronic Device - There is provided an enhanced method of securely storing and retrieving information in an electronic device. The method comprises generating a plurality of random encryption keys and storing the plurality of random encryption keys in a memory region of a first component of the electronic device. The method may additionally comprise encrypting data using a different one of the plurality of random encryption keys for each of a plurality of regions of a memory of a second component of the electronic device. The method may also comprise transferring encrypted data to the memory of the second component of the electronic device. | 2012-01-19 |
20120017098 | Computer Memory With Cryptographic Content Authentication - A computer memory with cryptographic content authentication that provides a means of verifying that the contents of the memory are those intended. | 2012-01-19 |
20120017099 | METHOD AND APPARATUS TO LIMIT MEMORY POWER - In one embodiment, the present invention includes a power manager to receive a memory power usage value, to determine an available power based at least in part on a power budget and the memory power usage value, and to change a memory power state based at least in part on the available power, wherein the memory power state comprises a memory frequency and a memory voltage. Other embodiments are described and claimed. | 2012-01-19 |
20120017100 | Power System Optimization and Verification for Embedded System Design - Tools and methods for developing and verifying a power management solution for an embedded system are provided. The firmware for an embedded system is partitioned into layers, including a control layer. The control layer implements a high-level power management behavior for the embedded system. A power profile development tool is also provided. The tool includes modules for describing the power functioning of the hardware of the embedded system, defining the desired power management behavior of the embedded system, and configuring the control layer within the firmware for the embedded system to implement the desired power management behavior. Furthermore, modules that interface with the embedded system and receive power system events and power status information and simulating the expected power management behavior based in part upon the received power event data and comparing the simulated behavior to the received power status behavior may also be provided. | 2012-01-19 |
20120017101 | Bios Controlled Peripheral Device Port Power - A computing device (101, 400, 500) has a processor (401) and at least one peripheral device port (106, 107, 108, 109, 410-1 to 410-5). The processor (401) is configured to selectively power the at least one peripheral device port (106, 107, 108, 109, 410-1 to 410-5) when the processor (401) is in a sleep state (302, 303, 304, 305, 306) according to at least one setting stored by firmware (405) of the processor (401). | 2012-01-19 |
20120017102 | EVENT BASED CORRELATION OF POWER EVENTS - Systems, methods, and other embodiments associated with event based correlation of power events are described. One example method includes storing a power distribution unit (PDU) event data that identifies an occurrence of a suspected power event associated with a device. The method can then provide a PDU-server correlation signal that identifies a connection between a PDU and a device. | 2012-01-19 |
20120017103 | ELECTRICALLY ISOLATING A SYSTEM FROM AN EXTERNAL POWER SOURCE - A system includes a power supply and a power switch to connect an external power source that is external to the system to the power supply. The power switch has an on position and an off position. The power switch if actuated to the off position causes the system to be electrically isolated from the external power source. A control circuit is responsive to actuation of the power switch to provide a signal to cause software control of a power state of the system. | 2012-01-19 |
20120017104 | COMPUTER AND POWER MANAGEMENT SYSTEM FOR COMPUTER - The power consumption of a computer is dynamically managed independent of the OS or applications and without any delay time caused by system control. A blade server has server blades each including a processor, a power-saving control unit and a power sensor unit; a power supply box that supplies power to the server blades; and a single service processor which defines an electric current consumption upper limit value in the power sensor unit via the power-saving control unit of each server blade. When the electric current consumption of the server blades exceeds the electric current consumption upper limit value, a signal outputted by the power sensor unit is communicated to the processor, the operating frequency of the processor is controlled, and the maximum average power is controlled to be at or below the power consumption upper limit value. | 2012-01-19 |
20120017105 | ENERGY EFFICIENT ETHERNET NETWORK NODES AND METHODS FOR USE IN ETHERNET NETWORK NODES - The present invention relates to a transmitting node for transmitting data to a receiving node over at least one Ethernet link comprising a data communication unit arranged to transmit data over the at least one Ethernet link, and a control unit arranged to control the data communication unit so as to maintain the at least one Ethernet link in a link active state, characterized in that the control unit is arranged to operate in a first IDLE state in which IDLE data packets are transmitted periodically through the data communication unit over the at least one Ethernet link according to at least one predetermined IDLE data packet timing interval, and in said first IDLE state, power down at least one component comprised in the data communication unit in between the periodic transmissions of IDLE data packets. The present invention further relates to a method for use in a transmitting node, a receiving node, a network node and a system. | 2012-01-19 |
20120017106 | MULTIPLE-SPEED INTERFACE - The present invention provides a security module having a communication interface being capable of operating according to any from a selection from a plurality of predetermined operation modes or communication protocols. The security module further comprises a voltage detector to detect the voltage on the module's power supply connection. Depending on the value of the detected voltage or to which of a plurality of predetermined voltage ranges the detected voltage may be categorized, the security module is made to function according to one from the plurality of predetermined communication protocols. According to an embodiment of the present invention the plurality of communication protocols require that the security module operate at a plurality of different frequencies | 2012-01-19 |
20120017107 | SYNCHRONOUS BUS DRIVING WITH REPEATERS - Present techniques involve systems and methods for driving a synchronous bus by implementing repeaters along the bus to restore and/or amplify a signal transmitted through the bus. In one embodiment, a repeater may be implemented at different sections of a synchronous bus, and each repeater may be activated according to where a signal is to be transmitted. In another embodiment, decoders may be configured to each repeater on the synchronous bus. As a signal directed to a section of a bus is transmitted through the bus, each sequential decoder may identify the bus section to which a signal is directed. The decoder may enable its corresponding repeater based on the bus section to which the signal is directed, such that all repeaters along the bus which come before the signal destination may be enabled to allow signal transmission through the bus and signal restoration by the repeaters. | 2012-01-19 |
20120017108 | SERIAL CONTROLLER AND BI-DIRECTIONAL SERIAL CONTROLLER - A serial controller is adapted to receive an external clock and an input data, and output an inverted clock and an output data. The serial controller includes an inverter, a serial position detector, a synchronous clock generator, a serial register, and a half-cycle delay unit. Thereby, through the serial controller, the problem that the data signal and the driving clock are not synchronous when the clock series are inverted is avoided. Besides, a bi-directional serial controller further includes an identification unit and a data directing unit, and the serial controller is enabled to return the current status to a central control unit to serve as the reference for error detection. | 2012-01-19 |
20120017109 | PREVENTING CIRCUMVENTION OF FUNCTION DISABLEMENT IN AN INFORMATION HANDLING SYSTEM - For disabling a first function in an information handling system, a dynamic signal is disabled. The first function is inoperable in response to the dynamic signal being disabled. At least a second function in the information handling system is operable irrespective of whether the dynamic signal is disabled. | 2012-01-19 |
20120017110 | FAULT-TOLERANCE AND RESOURCE MANAGEMENT IN A NETWORK - A method including receiving network topology and resource management information; generating a mapping between the network topology of a network and resource reservation paths associated with flows using the network based on the network topology and resource management information; generating a failure recovery plan (FRP) based on the mapping, wherein the FRP instructs one or more other network devices on how to manage a failure such that one or more resource reservation paths associated with flows impacted by the failure are not deleted; and loading the FRP on the one or more other network devices. | 2012-01-19 |
20120017111 | KERNEL SWAPPING SYSTEMS AND METHODS FOR RECOVERING A NETWORK DEVICE - In certain embodiments, a method is disclosed for recovering a failed client device in a network. The method includes booting a failed one of a plurality of client devices in the network with a generic image having a generic kernel usable with each of the plurality of client devices. The method further includes downloading, using said generic kernel, from at least one backup server an abbreviated kernel uniquely associated with the failed client device, the abbreviated kernel comprising substantially less data than an original kernel of the failed client device immediately prior to failure of the failed client device, the abbreviated kernel comprising a boot kernel image and at least one device driver. The method includes swapping the abbreviated kernel with the generic kernel; restoring, using said abbreviated kernel, remaining backup data from the at least one backup server to the failed client device; and rebooting the failed client device. | 2012-01-19 |
20120017112 | System and method for provisioning and running a cross-cloud test grid - An automated method for provisioning a grid used to run a load test on a target website includes sending one or more requests in a multi-threaded manner to at least one cloud provider, the one or more requests for an allocation of N load server instances and M result server instances which comprise the grid. Requests received back from the cloud provider are also handled in a multi-threaded manner; any errors occurring during the allocation being corrected automatically. The N load server instances and the M result server instances are then verified to be operational and correctly running software deployed to provide defined test services. Errors identified during the verification are automatically corrected either by attempting to restart a failed instance or allocating a different instance. | 2012-01-19 |
20120017113 | Control Device - The control device has a receiving device, an output stage, a checking device and a reset device. The receiving device is used to receive at least one data block including control commands from a data bus, the output stage is used to output an output signal in response to the control commands, the checking device is used to output an error signal if the at least one received data block is faulty and/or if no data block is received within a predetermined time, and the reset device is used to reset the output stage in a predefined state if the checking device outputs the error signal. The control device is thus able to react automatically to faultily transmitted data blocks without having to wait for return messages from a transmitting central processor unit. | 2012-01-19 |
20120017114 | Systems, Methods, and Computer Program Products for Instant Recovery of Image Level Backups - Systems, methods, and computer program products are provided for instant recovery of a virtual machine (VM) from a compressed image level backup without fully extracting the image level backup file's contents to production storage. The method receives restore parameters and initializes a virtual storage. The method attaches the virtual storage to a hypervisor configured to launch a recovered VM. The method stores virtual disk data changes inflicted by a running operating system (OS), applications, and users in a changes storage. The method provides the ability to migrate the actual VM disk state (taking into account changed disk data blocks accumulated in changes storage) so as to prevent data loss resulting from the VM running during the recovery and accessing virtual storage, to production storage without downtime. In embodiments, the method displays receives restore parameters in an interactive interface and delivers the recovery results via an automated message, such as an email message. | 2012-01-19 |
20120017115 | APPARATUS AND METHOD FOR OPERATING A COMPUTING PLATFORM WITHOUT A BATTERY PACK - An application control engine computing platform having a shut-down mechanism that permits the platform to adequately start up and operate upon return of power after a power interruption, without a need of a battery pack. The mechanism may target the saving of control object runtime values and operational settings of those objects, rather than the saving of the complete set of objects, and all unsaved alarm and history records upon a power interruption. | 2012-01-19 |
20120017116 | MEMORY CONTROL DEVICE, MEMORY DEVICE, AND MEMORY CONTROL METHOD - According to one embodiment, a memory control device includes a first controller, a second controller, an access module, and a response sort module. The first controller controls processing of a data access command to a nonvolatile memory from a host. The second controller controls processing assigned to the second controller between the first controller and the second controller. The access module performs data access to the nonvolatile memory in response to a command from the first controller or the second controller. When an error occurs in the data access by the access module, the response sort module returns a response to the second controller instead of the first controller. | 2012-01-19 |
20120017117 | Solving Hybrid Constraints to Validate Specification Requirements of a Software Module - In one embodiment, a method includes analyzing one or more first numeric constraints and one or more first string constraints associated with a software module including one or more numeric variables and string variables; inferring one or more second numeric constraints applying to specific ones of the string variables; inferring one or more second string constraints applying to specific ones of the numeric variables; representing each one of the first and second numeric constraints with an equation; representing each one of the first and second string constraints with a finite state machine; and validating the software module with respect to one or more requirements associated with the software module by attempting to solve for a solution including one or more values for specific ones of the numeric and string variables that satisfies all the first and second numeric constraints, all the first and second string constraints, and all the requirements. | 2012-01-19 |
20120017118 | METHOD AND APPARATUS FOR TESTING AN INTEGRATED CIRCUIT INCLUDING AN I/O INTERFACE - Methods and apparatus provide for testing an integrated circuit including an input/output (I/O) interface. The method and apparatus place the I/O interface in a test mode by test enabling logic. During the test mode, the method and apparatus also provide, by a clock generator in the I/O interface, an internal phase-aligned receiver clock signal to a plurality of transceivers in the I/O interface. The clock generator is a transmitter portion of one of the plurality of transceivers in the I/O interface. The method and apparatus then monitor for errors in loopback data from the plurality of transceivers in the I/O interface by an automatic test equipment (ATE). The phase of the internal phase-aligned receiver clock signal is aligned with the loopback data of the plurality of transceivers, and the frequency of the internal phase-aligned receiver clock signal may be above about 200 MHz. | 2012-01-19 |
20120017119 | Solving Hybrid Constraints to Generate Test Cases for Validating a Software Module - In one embodiment, a method includes analyzing one or more first numeric constraints and one or more first string constraints associated with a software module including one or more numeric variables and string variables; inferring one or more second numeric constraints applying to specific ones of the string variables; inferring one or more second string constraints applying to specific ones of the numeric variables; representing each one of the first and second numeric constraints with an equation; representing each one of the first and second string constraints with a finite state machine; and testing the software module for one or more possible errors by attempting to solve for a solution including one or more values for specific ones of the numeric and string variables that satisfies all the first and second numeric constraints and all the first and second string constraints. | 2012-01-19 |
20120017120 | MONITORING ACTIVITY WITH RESPECT TO A DISTRIBUTED APPLICATION - Techniques are described herein that are capable of monitoring activity with respect to a distributed application. A server system includes logical tiers, each including processing system(s) configured to process messages in accordance with a respective protocol (e.g., an ASP.net® protocol, WCF protocol, SQL protocol, etc.). When a user initiates an activity with respect to a distributed application, hops are performed between the logical tiers and/or between components of the distributed application to complete the requested activity. A hop is a transfer of a message or a procedure call from one processing system to another processing system. A common identifier may be assigned to each of the hops that are performed with regard to the activity. If a failure occurs with respect to the activity, the common identifier may be used to gather information regarding the hops. For instance, the information may be used to determine a source of the failure. | 2012-01-19 |
20120017121 | MONITORING NETWORK PERFORMANCE AND DETECTING NETWORK FAULTS USING ROUND TRIP TRANSMISSION TIMES - A computer program product is provided for performing a method including: receiving transmission data over a selected time interval for each of a plurality of communication paths; calculating an average round-trip transmission time for each of the plurality of communication paths over the time interval; comparing an average round-trip transmission time for a communication path having the highest average round-trip transmission time to a threshold value and to a multiple of an average round-trip transmission time for a communication path having the lowest average round-trip transmission time; and determining, based on a result of comparing the highest round-trip transmission time to the threshold value and to a multiple of the lowest round-trip transmission time, whether the time period indicates a delay in communication between the I/O subsystem and the control unit requiring at least one of a monitoring action and a recovery action. | 2012-01-19 |
20120017122 | INPUT/OUTPUT DEVICE WITH CONFIGURATION, FAULT ISOLATION AND REDUNDANT FAULT ASSIST FUNCTIONALITY - A process control system is provided having a plurality of I/O devices in communication using a bus. A primary redundant I/O device and a secondary redundant I/O device are coupled to the bus, where the secondary redundant I/O device is programmed to detect a primary redundant I/O device fault. The secondary redundant I/O device, upon detecting the primary redundant I/O device fault, publishes a primary redundant I/O device fault message on the bus. The controller may deactivate the primary redundant I/O device and activate the secondary redundant I/O device responsive to the primary redundant I/O device fault message. | 2012-01-19 |
20120017123 | Time-Based Trace Facility - Method, system, and computer program product embodiments of a time-based trace facility for facilitating software debugging without interfering with the run-time behavior, performance or resource usage of the traced software are provided. The trace facility resides in a different address space than the target address space and uses different time-slices of CPU resources to execute the instructions in the address spaces. The trace facility uses a cross-memory mode to read the state data from the target address space in accordance with a time schedule. The trace facility writes the state data to a trace area, which may be located in either the target or trace address spaces or external storage. With this approach, the trace facility can read a large amount of state data frequently to construct the type of historical record needed to analysis run-time behavior, performance and resource usage. The trace facility may use a parameter file to configure a particular trace e.g. specify the target address space, one or more processing tasks within the target address space, a specific trace module, filters to extract specific state data, the time interval, the trace area, etc. | 2012-01-19 |
20120017124 | METHOD, APPARATUS AND SOFTWARE FOR DETECTING YIELD IN A MECHANICAL STRUCTURE BY MEANS OF ACOUSTIC EMISSION DATA FROM SAID STRUCTURE - A method, apparatus and software is disclosed for using parameters of acoustic emissions emitted from an structure, such as aircraft landing gear, for detecting yield in the structure. | 2012-01-19 |
20120017125 | SYSTEM AND METHOD FOR BOUNCING FAILURE ANALYSIS - A method for analyzing fault modes that may cause a fault is presented in which a multi-point analysis may be performed to identify multi fault modes that are interrelated in causing the fault. The method provides for easy and systematic switching from a top-down to bottom-up approaches of analysis to insure accurate and easy to perform multi-point analysis of the related fault modes. | 2012-01-19 |
20120017126 | COMMUNICATION MONITORING APPARATUS, COMMUNICATION MONITORING METHOD, AND STORAGE MEDIUM STORING COMMUNICATION MONITORING PROGRAM - A communication monitoring apparatus that is capable of preventing determination of communication error due to communication shutdown accompanying the communication speed change so as not to inspire a user with unnecessary uneasiness. The communication monitoring apparatus monitors a connecting condition of communication between a terminal that can change a communication speed and a host apparatus through a network. A check unit periodically checks whether the connecting condition of communication between the terminal and the host apparatus through the network is normal or abnormal at first set time, and determines that a communication error occurs when the checked result shows abnormal connecting condition. A control unit detects a communication speed change in the terminal, and stops the check by the check unit before the communication speed change concerned. | 2012-01-19 |
20120017127 | COMPUTER SYSTEM MANAGEMENT METHOD AND MANAGEMENT SYSTEM - There is provided a failure analysis function capable of reducing the time required to resolve a failure in a piece of equipment to be monitored. When the failure analysis function senses that the status of a piece of equipment which had been abnormal has returned to normal, it displays, of failure analysis results, one based on an equipment abnormality which has been resolved in a GUI separately from the other analysis results. If a failure analysis result is derived based on a plurality of failure events, the failure analysis function displays the failure analysis result in the GUI separately from the other failure analysis results when all of the failure events are confirmed to be resolved (see FIG. | 2012-01-19 |
20120017128 | SYSTEM FOR TREE SEQUENCE TESTING OF A DEVICE AND METHOD FOR TREE SEQUENCE TESTING OF A DEVICE IN A TEST FRAMEWORK ARCHITECTURE - A system comprises a test framework architecture for tree sequence testing of a device, comprising a plurality of hierarchical layers at least comprising an upmost layer and a lowest layer, each layer of the plurality of hierarchical layers comprising at least one of a plurality of test sequences, each test sequence comprising a plurality of test steps, each test step comprising a current layer information; a test action information for carrying out a test action on the device; and a recovery information for carrying out a recovery action on reception of a recovery call from a next lower layer. | 2012-01-19 |
20120017129 | HIGH SPEED DOUBLE DATA RATE JTAG INTERFACE - A process and apparatus provide a JTAG TAP controller ( | 2012-01-19 |
20120017130 | CIRCUIT FOR TESTING INTEGRATED CIRCUITS - An integrated circuit is configured to receive a test clock input and includes circuitry configured to generate test clocks from the test clock input, and test circuitry configured to use the test clocks in a test mode. | 2012-01-19 |
20120017131 | METHODS AND APPARATUS FOR PROVIDING A BUILT-IN SELF TEST - A built-in self test (BiST) system is described. The BiST system includes a circuit-under-test. The BiST system also includes one or more embedded sensors. Each of the embedded sensors includes one or more switches connected to one or more nodes within the circuit-under-test. The BiST system further includes a signal generator. The BiST system also includes a bus interface. The bus interface provides for external access of the BiST system. | 2012-01-19 |
20120017132 | LOCAL AND GLOBAL INTERLEAVING/DE-INTERLEAVING - In one embodiment, a de-interleaver receives soft-output values corresponding to bits of an LDPC-encoded codeword. The de-interleaver has scratch pad memory that provides sets of the soft-output values to a local de-interleaver. The number of values in each set equals the number of columns in a block column of the LDPC H-matrix. Each set has at least two subsets of soft-output values corresponding to at least two different block columns of the LDPC H-matrix, where the individual soft-output values of the at least two subsets are interleaved with one another. Local de-interleaving is performed on each set such that the soft-output values of each subset are grouped together. Global de-interleaving is then performed on the subsets such that the subsets corresponding to the same block columns of the H-matrix are arranged together. In another embodiment, an interleaver performs global then local interleaving to perform the inverse of the de-interleaver processing. | 2012-01-19 |
20120017133 | MANAGEMENT OF DECODING EFFORT IN AN ITERATIVE DECODING SCENARIO - Schemes for creating a surplus of decoding iterations in a decoder are described. The surplus can be used to augment the decoding of signal blocks. The option of using an idle decoder to decode blocks marked as unproductive for decoding is also described. | 2012-01-19 |
20120017134 | DTV TRANSMITTING SYSTEM AND RECEIVING SYSTEM AND METHOD OF PROCESSING BROADCAST SIGNAL - A television transmitting system includes an encoder, a data randomizing and expanding unit, a group formatter, a deinterleaver, and a packet formatter. The encoder codes enhanced data for error correction, permutes the coded data, and further codes the permuted data for error detection. The randomizing and expanding unit randomizes the error-detection-coded data and expands the randomized data. The group formatter forms a group of enhanced data having one or more data regions and inserts the expanded enhanced data into at least one of the regions. The deinterleaver deinterleaves the group of enhanced data, and the packet formatter generates enhanced data packets. | 2012-01-19 |
20120017135 | Combined Single Error Correction/Device Kill Detection Code - In one embodiment, an apparatus includes a check/correct circuit coupled to a control circuit. The check/correct circuit is coupled to receive a block of data and corresponding check bits. The block of data is received as N transmissions, each transmission including M data bits and L check bits. The check/correct circuit is configured to detect one or more errors in each of a plurality of non-overlapping windows of K bits in the M data bits, responsive to the M data bits and the L check bits. The control circuit is configured to record which of the plurality of windows have had errors detected and, if a given window of the plurality of windows has had errors detected in each of the N transmissions of the block, the control circuit is configured to signal a device failure. Each of K, L, M, and N are integers greater than one. | 2012-01-19 |
20120017136 | SYSTEMS AND METHODS FOR ENCODING INFORMATION FOR STORAGE IN AN ELECTRONIC MEMORY AND FOR DECODING ENCODED INFORMATION RETRIEVED FROM AN ELECTRONIC MEMORY - Method and system embodiments of the present invention are directed to encoding information in ways that are compatible with constraints associated with electrical-resistance-based memories and useful in other, similarly constrained applications, and to decoding the encoded information. One embodiment of the present invention encodes k information bits and writes the encoded k information bits to an electronic memory, the method comprising systematically encoding the k information bits to produce a vector codeword, with additional parity bits so that the codeword is resilient to bit-transition errors that may occur during storage of the codeword in, and retrieval of the codeword from, the electronic memory, ensuring that the codeword does not violate a weight constraint, and writing the codeword to the electronic memory. | 2012-01-19 |
20120017137 | DISC RECORDING MEDIUM, DISK DRIVE APPARATUS, REPRODUCTION METHOD, AND DISK MANUFACTURING METHOD - A recording and reproducing area and a reproduction-only area are formed by wobbling a groove formed in a spiral fashion to form a track to be tracked on a disk. The recording and reproducing area has address information recorded by wobbling of the groove and information recorded and reproduced by phase change marks on the track formed by the groove where the address information is recorded. The reproduction-only area has prerecorded information recorded by wobbling of the groove. | 2012-01-19 |