05th week of 2010 patent applcation highlights part 70 |
Patent application number | Title | Published |
20100031002 | SIMD MICROPROCESSOR AND OPERATION METHOD - A disclosed SIMD microprocessor includes a processor element unit including multiple processor elements; and a global processor unit configured to interpret a program pre-recorded in a memory and supply a control signal to the processor element unit. Each of the processor elements includes an operational circuit; a first forwarding path for forwarding, to an input side of the operational circuit, an operation result obtained by the operational circuit; second forwarding paths, each of which forwards, to the input side of the operational circuit, an operation result obtained by an operational circuit of a neighboring processor element among the multiple processor elements; and a selection unit configured to select one of the first forwarding path and the second forwarding paths. | 2010-02-04 |
20100031003 | METHOD AND APPARATUS FOR PARTITIONING AND SORTING A DATA SET ON A MULTI-PROCESSOR SYSTEM - The present invention provides a method and apparatus for partitioning, sorting a data set on a multi-processor system. Herein, the multi-processor system has at least one core processor and a plurality of accelerators. The method for partitioning a data set comprises: partitioning iteratively said data set into a plurality of buckets corresponding to different data ranges by using said plurality of accelerators in parallel, wherein each of the plurality of buckets could be stored in local storage of said plurality of accelerators; wherein in each iteration, the method comprises: roughly partitioning said data set into a plurality of large buckets; obtaining parameters of said data set that can indicate the distribution of data values in that data set; determining a plurality of data ranges for said data set based on said parameters; and partitioning said plurality of large buckets into a plurality of small buckets corresponding to the plurality of data ranges respectively by using said plurality of accelerators in parallel, wherein each of said plurality of accelerators, for each element in the large bucket it is partitioning, determines a data range to which that element belongs among the plurality of data ranges by computation. | 2010-02-04 |
20100031004 | ARITHMETIC DEVICE - To reduce the size of a basic block composed of a plurality of arithmetic & logical processing unit blocks, and achieve high-speed operation. | 2010-02-04 |
20100031005 | Instruction Encoding For System Register Bit Set And Clear - An instruction encoding architecture is provided for a microprocessor to allow atomic modification of privileged architecture registers. The instructions include an opcode that designates to the microprocessor that the instructions are to execute in privileged (kernel) state only, and that the instructions are to communicate with privileged control registers, a field for designating which of a plurality of privileged architecture registers is to be modified, a field for designating which bit fields within the designated privileged architecture register is to be modified, and a field to designate whether the whether the designated bit fields are to be set or cleared. The instruction encoding allows a single instruction to atomically set or clear bit fields within privileged architecture registers, without reading the privileged architecture registers into a general purpose register. In addition, the instruction encoding allows a programmer to specify whether the previous content of a privileged architecture register is to be saved to a general purpose register during the atomic modification. | 2010-02-04 |
20100031006 | THREAD COMPLETION RATE CONTROLLED SCHEDULING - A method, processor and processing system provide management of per-thread pipeline resource allocation in a simultaneous multi-threaded (SMT) processor by counting indications of instruction completion for each of the threads. The indication may be the commit phase of the pipeline, which indicates results of the pipeline instruction execution are ready for write-back. The completion counts are used in a relative or absolute form to control the pipeline resource allocation. The decode or fetch rates of instructions for the threads can be controlled from the relative or absolute completion counts, providing control of scheduling instructions among the threads for execution by execution pipeline(s). Alternatively, or in combination, the thread priority registers in any thread priority management scheme can be controlled by comparison and/or scaling of the completion counts. | 2010-02-04 |
20100031007 | METHOD TO ACCELERATE NULL-TERMINATED STRING OPERATIONS - A method reads and compares first and second register values, each with a size of at least two bytes. A third register indicates a match if: (1) a byte in the first register value is equal to (or, alternatively, not equal to) a corresponding byte in the second register value, or (2) if a byte in the first register value is zero. Next, a fourth register value is set to one of the following: (1) a count of the matching byte, if the corresponding bytes in the first and second register values are equal (or, alternatively, are not equal), or (2) a number outside of a range between 0 and n−1, if the corresponding bytes in the first and second register values are not equal (or, alternatively, are equal). The value, n, is an integer equal to the number of bytes in the first and second register values. | 2010-02-04 |
20100031008 | PARALLEL SORTING APPARATUS, METHOD, AND PROGRAM - A parallel sorting apparatus is provided whose sorting processing is speeded up. A reference value calculation section calculates a plurality of reference values serving as boundaries of intervals used for allocating input data depending on the magnitude of a value. An input data aggregation section partitions the input data into a plurality of input data regions, and calculates, by parallel processing, mapping information used for allocating data in each of the partitioned input data regions to the plurality of intervals that have boundaries on the reference values calculated by the reference value calculation section. A data allocation section allocates, by parallel processing, data in each of the input data regions to the plurality of intervals in accordance with the mapping information calculated by the input data aggregation section. An interval sorting section individually sorts, by parallel processing, data in the plurality of intervals allocated by the data allocation section. | 2010-02-04 |
20100031009 | Floating Point Execution Unit for Calculating a One Minus Dot Product Value in a Single Pass - A floating point execution unit calculates a one minus dot product value in a single pass. As such, the dependency that otherwise would be required to perform the calculations is eliminated, resulting in a substantially faster performance of such calculations. The floating point execution unit may be used, for example, to accelerate pixel shading algorithms such as Fresnel and electron microscope effects. | 2010-02-04 |
20100031010 | BRANCH TARGET BUFFER ALLOCATION - A data processing system and method are provided for allocating an entry in a branch target buffer (BTB). The method comprises: receiving a branch instruction to be executed in a data processor; determining that the BTB does not include an entry corresponding to the branch instruction; identifying an entry in the BTB for allocation, the identified entry in the BTB comprising a target identifier and a first prediction value for a previously received branch instruction; determining whether to allocate the branch instruction to the identified entry in the BTB based on a comparison of the first prediction value to a second prediction value, wherein the second prediction value is generated from a branch history table (BHT); and allocating the branch instruction to the identified entry if the second prediction value indicates a more strongly taken prediction than the first prediction value. | 2010-02-04 |
20100031011 | METHOD AND APPARATUS FOR OPTIMIZED METHOD OF BHT BANKING AND MULTIPLE UPDATES - The invention relates to a method and apparatus for controlling the instruction flow in a computer system and more particularly to the predicting of outcome of branch instructions using branch prediction arrays, such as BHTs. In an embodiment, the invention allows concurrent BHT read and write accesses without the need for a multi-ported BHT design, while still providing comparable performance to that of a multi-ported BHT design. | 2010-02-04 |
20100031012 | CORE INITIALIZATION CODE VALIDATION - Files essential to the boot sequence are validated as they are executed. As core boot files are loaded and executed by a computers a hash of the files is created and extended into configuration registers. Core operating system files are verified by the boot loader using a digital signature, and the public key used to verify the digital signature is recorded in a configuration register. Core operating system files verified by the boot loader include a list of hash values, which is used by the operating system to validate the other files as they are executed. User assurance that the system has booted correctly is achieved by comparing the state of configuration registers to previously stored values reflecting the expected state of the registers. Upon the state of the configuration registers matching what is expected, data previously selected by the user is retrieved and recognized by the user. | 2010-02-04 |
20100031013 | INJECTION MOLDING SYSTEM AND PARAMETER SETTING METHOD THEREOF - An injection molding machine system for setting system parameters provides an interface unit displaying a boot interface, a common module interface, a new module setting interface, and a main operating interface. If not all the system parameter values need be modified, the system parameters are loaded on the boot interface and the main operating interface are started. If some of the system parameter values need be modified, the system parameter values are loaded, modified, and saved on the common module interface and the main operating interface are started. If all the system parameter values need be set, the system parameter values are saved on the new module setting interface and the main operating interface are started. If the system parameter values modified need be fine-tuned, the system parameter values are fine-tuned on the main operating interface. | 2010-02-04 |
20100031014 | INFORMATION CONCEALING DEVICE, METHOD, AND PROGRAM - An information concealing device comprises a mask means for prompting the user to specify a secret area in an input image, a secret area specifying means for generating image data describing the image of the specified area in the input image and describing an area other than the specified area in a single color, an encoding means for converting the image data, which describes the image of the specified area in the input image and describes an area other than the specified area in a single color, to image data describing a code, and an embedding means for generating the image data of an image describing the specified area in the input image in a single color and embedding the code into the image. | 2010-02-04 |
20100031015 | IP Network Communication Method Having Security Function, And Communication System - An IP network communication system which applies encryption with a reduced processing delay caused by a CPU load which is increased by the application of IPsec etc., and with reduced degradation of data transmission efficiency in a network, is provided. The IP network communication system having a security function includes an encryption processing part to encrypt a predetermined area range of one packet to be transmitted, and not to encrypt a residual area of the one packet; and a transmission part to transmit the packet encrypted by the encryption processing part through a tunnel for encryption. | 2010-02-04 |
20100031016 | PROGRAM METHOD, AND DEVICE FOR ENCRYPTION COMMUNICATION - An encryption communication method for performing communication that includes a data transfer phase for transmission of content data and a handshake phase for user authentication or agreement on the transmission method for content data, the method comprising: storing one set of a plurality of content data for multiple users in a common transmission communication region provided for the multiple users; transferring the stored one set of the plurality of content data during the data transfer phase when transferring content data of the multiple users to a communication target device; and receiving the stored one set of the plurality of content data using a plurality of transmission-reception communication regions provided for each of the multi users is provided. | 2010-02-04 |
20100031017 | SYSTEM AND METHOD FOR ENCRYPTING SECONDARY COPIES OF DATA - A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information. | 2010-02-04 |
20100031018 | INFORMATION DELIVERY SYSTEM, DELIVERY CENTER DEVICE, USER TERMINAL DEVICE AND INFORMATION DELIVERY METHOD - A user terminal device specifies presence or absence of additional recording in issuing a content request, and in the case of additional recording, the device transmits medium information and encrypted information of pre-recorded contents to a delivery center. When receiving a content additional recording request from the device, the delivery center decrypts once encrypted contents to be additionally recorded with the corresponding-content keys. The encrypted key information is decrypted by the medium information from the device to decrypt content keys of the pre-recorded contents and re-encrypts encrypted contents to be additionally recorded to deliver the re-encrypted contents to the device. When receiving contents for additional recording, the device records the received contents so as to be related to the pre-recorded contents, on a recording medium. | 2010-02-04 |
20100031019 | SECURE APPLICATION ROUTING - Disclosed is a computer implemented method and apparatus to secure a routing path. A local node receives a request for secure route identification from an upstream node. Responsive to receiving a request for secure route identification, the local node transmits a local node security level and an authentication key to the upstream node. The local node determines whether at least one downstream node is authentic and has sufficient security level from a second-level downstream node. The local node may then establish a socket to the upstream node. | 2010-02-04 |
20100031020 | Systems and Methods for the Management and Security of Digital Idea Submissions - A system and method is described for managing and securing electronically submitted ideas to a central repository. Users can submit an idea to a central controller which stores that idea in digital form. The user is able to view and update the idea over time, and determine who may or may not have access to the stored files. Access to the stored information is regulated by a central controller. Such control may be dictated by the preferences of the user storing the information. The user may elect to allow only himself to have access to the information, or to allow access to trusted friends or to anyone who enters the central control or website. There is also a method for securing parental/guardian permission to share ideas generated and electronically stored when the idea is generated by a minor. | 2010-02-04 |
20100031021 | METHOD FOR IMPROVED KEY MANAGEMENT FOR ATMS AND OTHER REMOTE DEVICES - A method, article, and system for providing an effective implementation of a data structure comprising instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines specific key management policies that are permitted when an application program employs the trusted block in application programming interface (API) functions to generate or export symmetric cryptographic keys. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways or with unintended keys. | 2010-02-04 |
20100031022 | SYSTEM AND METHOD FOR VERIFYING NETWORKED SITES - A system and method for indicating to a user that a networked site is authentic includes a verification application configured to send a request to verify the authenticity of the networked site together with identity information about the site to a verification server. The verification application has access to encrypted user-customized information that was previously selected by a user and is encrypted and stored focally on the end-user device. The verification server verifies whether the networked site is authentic and is further configured to enable decryption of the encrypted user-customized information when a networked site is verified as authentic, so that the user-customized information can be presented to the user. | 2010-02-04 |
20100031023 | METHOD AND SYSTEM FOR PROVIDING CENTRALIZED DATA FIELD ENCRYPTION, AND DISTRIBUTED STORAGE AND RETRIEVAL - An approach is provided for securely storing sensitive data values. A primary facility is provided that directly or indirectly receives requests from a requestor to store an actual data value. The primary facility obtains a replacement value associated with the actual value and encrypts the actual value, and the replacement value is transmitted to the requestor. The replacement and encrypted values are stored in a master copy database at the primary facility, and copies thereof are stored in distributed secondary databases. When the requestor needs an actual data value, the requestor transmits the replacement value either to the primary facility for retrieval of data from the master database, or to the secondary facility for retrieval from the respective secondary database. The chosen facility retrieves the encrypted value from its respective database using the replacement value, decrypts the encrypted value, and transmits the actual value back to the requestor. | 2010-02-04 |
20100031024 | METHOD FOR REAL-TIME DATA AUTHENTICATION - A digital signature is applied to digital data in real-time. The digital signature serves as a mark of authenticity assuring a recipient that the digital data did in fact originate from an indicated source. The digital signature may be applied to any digital data, including video signals, audio signals, electronic commerce information, data pertaining to land vehicles, marine vessels, aircraft, or any other data that can be transmitted and received in digital form. | 2010-02-04 |
20100031025 | Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection - A method and system for public key infrastructure key and certificate management provides anonymity to certificate holders and protects the privacy of certificate holders from the compromise of a certificate authority. Functional separation is provided in the authorization of a certificate request and the assignment of certificates and key pairs. The authorizing certificate authority approves or denies each certificate request from a requestor whose identity is not made available to the assigning certificate authority. The assigning certificate authority, upon approval from the authorizing certificate authority, issues one or more certificates and optionally generates and provides the associated key pairs to the requester without disclosing these certificates and key pairs to the authorizing certificate authority. In another aspect, a distributed method is disclosed that allows individual nodes and/or units in a network to select certificates for broadcasting messages to a community of interest with a non-unique key. | 2010-02-04 |
20100031026 | METHOD AND SYSTEM FOR TRANSFERRING INFORMATION TO A DEVICE - A system and method for transferring information to a device include sending a first challenge from an information provider to programming equipment, and responding to the first challenge by the programming equipment. A second challenge is sent from the programming equipment to the information provider, which responds to the second challenge. Information is encrypted by the information provider and sent from the information provider to the programming equipment. | 2010-02-04 |
20100031027 | METHOD AND DEVICE FOR DISTRIBUTING PUBLIC KEY INFRASTRUCTURE (PKI) CERTIFICATE PATH DATA - A method and device for distributing public key infrastructure (PKI) certificate path data enables relying nodes to efficiently authenticate other nodes in an autonomous ad-hoc network. The method includes compiling, at a certificate path management unit (CPMU), the PKI certificate path data (step | 2010-02-04 |
20100031028 | SYSTEMS AND METHODS FOR SELECTING A CERTIFICATE FOR USE WITH SECURE MESSAGES - Systems and methods for selecting a certificate for use in securing a message to be transmitted from a computing device is described herein. A set of certificates is determined and the certificates are ranked based on one or more predetermined ranking criteria. At least the highest ranking certificate is displayed, and a certificate is selected for securing the message. | 2010-02-04 |
20100031029 | TECHNIQUES TO PROVIDE ACCESS POINT AUTHENTICATION FOR WIRELESS NETWORK - According to an example embodiment, an apparatus may include a client device including a processor and memory. The client device may be configured to obtain, via a secure communication, a certificate identifying a publically accessible wireless access point (AP) and a public key for the AP, the AP being publically accessible. The client (or client device) may be configured to generate a challenge, send the challenge to the AP, wherein the AP has a private key securely stored in a hardware security module of the AP. The private key may correspond to the public key for the AP. The client may be configured to receive a response from the AP, the response being generated by the AP based on the challenge and the private key for the AP, and authenticate the AP based on the response. | 2010-02-04 |
20100031030 | METHOD AND SYSTEM FOR MANAGING NETWORK IDENTITY - A method and a system for managing network identity are provided. The method and the system realize a management mechanism of temporary identification (ID) and real ID, which simultaneously achieves functionalities such as anonymity, accounting, and authorization. A short-term certificate and a corresponding public/private key pair are used to protect a temporary ID usable for accounting. This protection prevents the temporary ID from theft. The user generates a digital signature in the reply to a charge schedule statement from the visited network. This procedure is incorporated into an existing authentication framework based on Transport Layer Security (TLS) in order to provide an undeniable payment mechanism. The payment mechanism is applicable in an environment of multiple network operators and reduces the difficulty of integrating network operators. The method and the system do not have to consult a certificate revocation list (CRL) for authentication and thus are able to shorten authentication time. | 2010-02-04 |
20100031031 | SYSTEMS, METHODS AND COMPUTER-ACCESSIBLE MEDIA FOR ACQUIRING AND AUTHENTICATING PUBLIC KEY CERTIFICATE STATUS - Exemplary embodiments of systems, methods and computer-accessible medium can be provided for obtaining and verifying a public key certificate status. In particular, it is possible to construct and send a certificate query request, construct and send a combined certificate query request, construct and send a combined certificate status response, deliver a certificate status response, perform a verification by the general access point, and/or perform a verification by the user equipment. The exemplary embodiments address some of the deficiencies of conventional methods which have a complicated implementation as well as likely inability of such conventional methods to be applied to the network architecture of user equipment, a general access point and a server. The exemplary embodiments of the systems, methods and computer-accessible medium can obtain a user certificate status to provide certificate statuses of the user or the user equipment and the general access point when the user equipment accesses the network via the general access point. Message exchanges can be reduced, bandwidth and calculation resources can be saved, and higher efficiency can be achieved. According to another exemplary embodiment, by way of adding random numbers into the certificate query request and the combined certificate query request, as well as the message m, freshness of the certificate status response can be facilitated and even ensured, and security protection can be enhanced. | 2010-02-04 |
20100031032 | Method, apparatus, and system for network security via network wall plate - A wall plate assembly has a first port adapted to be coupled to a device and a second port adapted to be coupled to a communications network. The wall plate assembly is operable to obtain authentication information from a user and to determine from the obtained authentication information whether the user should be granted or denied access to the network. The assembly is operable when the determination indicates the user should be granted access to provide endpoint location identification information associated with the wall plate assembly and the authentication information to the second port, and is operable responsive to a acknowledgement signal received via the second port to grant access to the network via the first port. The assembly is operable when either no acknowledgment signal is received or the determination indicates the user should be denied access to isolate the first port from the network. | 2010-02-04 |
20100031033 | APPARATUS AND METHOD OF SHARING DRM AGENTS - An apparatus and method of sharing content is provided. An apparatus for sharing content according to an aspect of the invention includes a search module which extracts specific information from encrypted content, and requests a host apparatus for an execution code, and a client DRM agent module which is installed with the execution code received from the host apparatus according to the request and outputs the encrypted content using the execution code. | 2010-02-04 |
20100031034 | METHOD AND APPARATUS FOR PROTECTING FILE IN DIRECT PRINTING - Provided are a method and apparatus for protecting files to be directly printed. The method includes transmitting an encryption key, when an encrypted file is received, receiving a password of the file encrypted using the encryption key, decrypting the password using a decryption key corresponding to the encryption key, and decrypting the encrypted file using the decrypted password. Accordingly, in performing direct printing, the transmitted file can be protected by encryption. Also, since the password of the file is encrypted and decrypted, the password is not required to be directly input to the printing device and other printing devices can be safely used along with the printing device to which the password is input, thereby increasing convenience for user input. | 2010-02-04 |
20100031035 | BLOCK-BASED MEDIA CONTENT AUTHENTICATION - A technique for security and authentication on block-based media includes involves the use of protected keys, providing authentication and encryption primitives. A system according to the technique may include a secure device having a security kernel with protected keys. A disk drive security mechanism may support authentication of data, secrecy, and ticket validation using the security kernel and, for example, a ticket services module (e.g., a shared service that may or may not be used by other storage devices like flash). | 2010-02-04 |
20100031036 | SECURE WIRELESS COMMUNICATIONS SYSTEM AND RELATED METHOD - A wireless communications system may include wireless communications devices with each including a wireless transceiver and a processor coupled thereto for transmitting and receiving communications and using a challenge-response authentication protocol. The wireless communications devices may also include a master wireless communications device and a slave wireless communications device. The master wireless communications device may transmit a polling message including an unencrypted portion and an initial encrypted challenge portion. The slave wireless communications device may transmit a polling reply message including an unencrypted portion and an initial encrypted response portion based upon receiving the polling message from the master wireless communications device. | 2010-02-04 |
20100031037 | SYSTEM AND METHOD FOR EXPORTING INDIVIDUAL DOCUMENT PROCESSING DEVICE TRUST RELATIONSHIPS - The subject application is directed to a system and method for exporting individual document processing device trust relationships. User data tokens are first stored in memory associated with a primary document processing device, with each token corresponding to access settings of a document processing device configured for the user associated with the token. Each of the tokens also includes user identification data, user role data, and user permission data. Selection data of one or more user data tokens is then received. An encrypted user data token is then generated, and device selection data corresponding to the identity of a second document processing device is received. Each of the encrypted user data tokens is then output to the second document processing device based upon the received device selection data. | 2010-02-04 |
20100031038 | METHOD TO ALLOW SECURE COMMUNICATIONS AMONG COMMUNICATION UNITS - A first communication unit receives an encrypted transmission from a second communication unit. The encrypted transmission was encrypted by the second communication unit using a first encryption key. The first communication unit compares the first encryption key to an encryption key associated with the first communication unit. If the first encryption key matches the encryption key associated with the first communication unit, the first communication unit processes the encrypted transmission further. If the first encryption key does not match the encryption key associated with the first communication unit, the first communication unit compares the first encryption key to an encryption key associated with the second communication unit. If the first encryption key matches the encryption key associated with the second communication unit, the first communication unit processes the encrypted transmission further; otherwise, the first communication unit does not process the encrypted transmission further. | 2010-02-04 |
20100031039 | METHOD AND APPARATUS FOR DATA PROTECTION SYSTEM USING GEOMETRY OF FRACTALS OR OTHER CHAOTIC SYSTEMS - In computer based data security systems which involve entity authenticating or document time stamping or other cases where data is to be derived from a previous state, the necessary linking values are calculated using recursive chaos based equations such as the type used in fractal theory (the Mandelbrot set) or the Lorentz attractor or other similar approaches. In each case a value in each step is calculated using these equations so that each authentication or timestamp or other data derivation is linked to the previous one in a chaotic way. This makes it impossible to calculate any one value in the link series without having the previous value, due to the chaos aspect thereby enhancing security. | 2010-02-04 |
20100031040 | Information Communication System - An information communication system comprises: a one-way channel ( | 2010-02-04 |
20100031041 | Method and system for securing internet communication from hacking attacks - The present invention is directed to a method of authenticating internet communication using at least one reference URL along with associated, approved digital certificates. The method includes the use of a URL verification module for verifying communication from a source URL. Communications from the source URL are intercepted and comparison made with approved digital certificates to determine if communication is authorized. | 2010-02-04 |
20100031042 | Method and System for Secure Session Establishment Using Identity-Based Encryption (VDTLS) - The inventive system for providing strong security for UDP communications in networks comprises a server, a client, and a secure communication protocol wherein authentication of client and server, either unilaterally or mutually, is performed using identity based encryption, the secure communication protocol preserves privacy of the client, achieves significant bandwidth savings, and eliminates overheads associated with certificate management. VDTLS also enables session mobility across multiple IP domains through its session resumption capability. | 2010-02-04 |
20100031043 | PORTABLE ELECTRONIC AUTHORIZATION SYSTEM AND METHOD - A method is disclosed for enabling a user interface on a computer operated by a user to cause memory content of an electronic device distinct from the computer to be modified. A communication link may be established between the user interface and the electronic device by establishing a first connection between the user interface and a server distinct from each of the computer and the electronic device, and establishing a second connection between the electronic device and the server. The user interface may be used to communicate with the server via the first connection so as to cause the server to communicate with the electronic device via the second connection and thereby cause new information to be added to the memory of the electronic device via the second connection. | 2010-02-04 |
20100031044 | PREFIX REACHABILITY DETECTION IN A COMMUNICATION - There is disclosed a method, and a communication system, and a communication node for implementing the claimed method, for attempting to enhance legitimacy assessment and thwart a man-in-the middle or similar false-location attack by evaluating the topology of a communication-session requesting node relative to the proposed communication path through a network between the requesting node and the requested node. Upon receiving the request, a PRD (Prefix Reachability Detection) protocol is initiated, either after or during a secure key exchange, if any, which if performed preferably includes an ART (address reachability text). The PRD is executed by sending a message to the communication node challenging the location-authenticity of the requesting device. The communication node, which may be for example an access router through which the requesting node accesses the network, determines if the requesting node is positioned behind the communication node topologically, and reports the result to the requested node. The requested node may then make a decision on whether to permit the communication. If so, the PRD may be repeated one or more times while the communication session is in progress. | 2010-02-04 |
20100031045 | METHODS AND SYSTEM AND COMPUTER MEDIUM FOR LOADING A SET OF KEYS - The present technique relates to a method for authenticating a user of at least one electronic terminal. The method includes receiving a first unique value for loading into the at least one electronic terminal via an input module. The method includes storing internally the first unique value for authorizing the user of the at least one electronic terminal using a memory module. The method generates a second unique value for saving internally into the memory module using a random process module. The method generates an encrypted third unique value and sending to a host by encrypting the second unique value using the first unique value. | 2010-02-04 |
20100031046 | Method for Authorizing Access to at Least One Automation Component of a Technical System - A method for authorizing access of different types to an automation component of a technical system and, if needed, logging and digitally signing them, is provided. An authorization unit, for example a smart card, holds a digital signature function and information of a user and allocated access rights. Optionally, the authorization unit also comprises a budget account for services for e.g. billing software services. | 2010-02-04 |
20100031047 | ATTESTATION ARCHITECTURE AND SYSTEM - An architecture and system are provided for flexible, composable attestation systems. Systems built according to this attestation architecture can be composed to accomplish complex attestation scenarios. The system is designed around composable components to permit flexible recombination. A system, method, and computer program product are provided for proving attestations to an appraiser regarding a target system. In an embodiment, an attestation request is sent from an appraiser to a target system, wherein the attestation request includes queries regarding properties of the target system needed by the appraiser to make trust decisions regarding the target system. The attestation request is forwarded from the target system to an attester which collects the requested data. The attester sends an attestation response to the appraiser, wherein the response includes at least information regarding properties of the target system requested by the appraiser in order to make a trust decision regarding the target system. | 2010-02-04 |
20100031048 | DATA AUTHENTICATOR - A user encoded result is operable to be used to authenticate target data. The user encoded result is determined from a signature for the target data. The signature is formatted and encoded to create the user encoded result. The user encoded result is stored and is operable to be retrieved to authenticate the target data in response to the target data being accessed. | 2010-02-04 |
20100031049 | TIME INFORMATION DISTRIBUTION SYSTEM, TIME DISTRIBUTING STATION, TERMINAL, TIME INFORMATION DISTRIBUTION METHOD, AND PROGRAM - In a time information distribution system for distributing time information from a time distributing station to terminals, the time distributing station gives the electronic signature of the time distributing station to time information to be distributed and distributes the time information to which the electronic signature has been appended to the terminals. The terminals verify the electronic signature given to the time information distributed from the time distributing station and, if a determination has been made that the electronic signature has already been given by the time distributing station, store the time information to which the electronic signature is given in a hardware security module installed in the terminals. | 2010-02-04 |
20100031050 | PERMANENT DISPLAY AND AUTHENTICATION OF STATUS INFORMATION OF A TECHNICAL DEVICE - The invention relates to an arrangement and a method for the acquisition and verification of at least one aspect of status information of a technical device, in particular for checking the software version. In order to make it possible to simply and reliably check the current software version the technical device comprises a storage device, a processing unit and a display, wherein the storage device comprises at least one software required for operating the technical device, a software version number and security data for calculating an identification characteristic to be graphically displayed. The security data is deposited in an encrypted region of the storage device. With the use of the processing unit the identification characteristic can be calculated on behalf of the software version number and the security data. The display displays information even in a current-free state without the use of an external energy source. | 2010-02-04 |
20100031051 | Protocol And Method For Client-Server Mutual Authentication Using Event-Based OTP - The invention comprises a method of authenticating and encrypting a client-server communication, comprising the steps of: a) generating a first one-time password (OTP | 2010-02-04 |
20100031052 | LOW POWER HMAC ENCRYPTION APPARATUS - There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile trusted computing environment and a low power keyed-hash message authentication code (HMAC) encryption apparatus using the low power SHA-1 hash algorithm apparatus, the HMAC encryption apparatus including: a key padder padding key data for HMAC algorithm; an XOR operator XOR operating the padded key data and a padding constant; a data connector connecting a text to be encrypted, to data obtained by the XOR operating; a data padder padding the connected data; an SHA-1 hash algorithm part performing an SHA-1 hash algorithm on the padded data; a data selector selecting and applying one of a result of the SHA-1 hash algorithm and the text to be encrypted, to the data connector; and a controller controlling operations of the key padder, data connector, and data padder, a sequence of performing a hash algorithm of the SHA-1 hash algorithm part, and storing an operation result to read data required for performing an encryption operation and store data with memory. | 2010-02-04 |
20100031053 | BIOMETRIC DATA TRANSMISSION DEVICE AND METHOD - A data transmission device for secure biometric transmission includes first and second input-output units, and a biometric identification apparatus. The input-output units electrically connect to one of the two electronic devices, respectively. The biometric identification unit is configured for electrically interconnecting the first and second input-output units, receiving a biometric input, outputting biometric data in response to the biometric input, and encrypting the biometric data to be transmitted to one of the electronic device having a storage unit. | 2010-02-04 |
20100031054 | ENCRYPTION MONIKER IN MEDIUM AUXILIARY MEMORY - A tape cartridge is described including tape storage medium maintaining stored encrypted data that can be unencrypted via an encryption key. The tape cartridge also contains a medium auxiliary memory possessing a moniker wherein the moniker identifies the encryption key. The tape cartridge further includes a threshold parameter stored in the medium auxiliary memory wherein the threshold parameter influences a moniker state control, the moniker state control comprises an on state and an off state wherein the off state disables the moniker from identifying the encryption key. | 2010-02-04 |
20100031055 | EMBEDDED DEVICE HAVING COUNTERMEASURE FUNCTION AGAINST FAULT ATTACK - A cryptographic processing device, comprising: a storage unit; initial setting unit for setting a value to be stored in the storage unit; Montgomery modular multiplication operation unit for performing a Montgomery modular multiplication operation plural times for a value set by the initial setting unit; and fault attack detection unit for determining whether or not a fault attack occurred for each of at least some parts of the Montgomery modular multiplication operations performed plural times. | 2010-02-04 |
20100031056 | STORAGE SYSTEM TO WHICH REMOVABLE ENCRYPTION/DECRYPTION MODULE IS CONNECTED - A storage system comprises a connector to which a removable module is connected. The removable module comprises a storage section for storing encryption/decryption information related to encryption and decryption of data, and/or an encryption/decryption engine for encrypting/decryption data by a predetermined encryption/decryption scheme. A control section and/or a module of the storage system encrypts data using the encryption/decryption information, or decrypts encrypted data using the encryption/decryption information. Alternatively the encryption/decryption engine encrypts data or decrypts encrypted data. | 2010-02-04 |
20100031057 | Traffic analysis resistant storage encryption using implicit and explicit data - An encryption scheme for mass storage devices employing a tweakable encryption scheme to add variability to the encrypted data to resist attacks by traffic analysis. Explicit tweak and implicit tweak may be used to add variability to plaintext prior to encryption and eventual storage. The tweak information is either stored on the storage device along with the encrypted data as in the case of an explicit tweak, or it is derived from another source when needed as in the case of an implicit tweak. The ciphertext is decrypted using either the stored explicit tweak value or derive the implicit tweak value to “de-tweak” the decrypted data prior to usage. The data may be deleted by destroying the cipher key(s) to render the ciphertext useless. The tweak information alone is useless for decryption, as the ciphertext needs to be decrypted with the cipher key(s). | 2010-02-04 |
20100031058 | Computer System, Storage System and Management Computer for Backing Up and Restore Encryption Key for Storage System Incorporating Therein a Stored Data Encryption Function - To protect data from corruption due to restoration of an encryption key to a wrong storage system, there is provided a computer system including a first storage system and a second storage system, wherein: the first storage system, upon receiving a request to write first data to a first area in the first storage system, encrypts the first data by using a first key and writes the first data in the first area, and, upon receiving a request to write second data to a third area, encrypts the second data by using a second key and transmits a request to write the encrypted second data in a second area in the second storage system; and the computer system holds the first key, an identifier of the first storage system associated with the first key, the second key, and an identifier of the second storage system associated with the second key. | 2010-02-04 |
20100031059 | SECURITY DEVICE, SECURE MEMORY SYSTEM AND METHOD USING A SECURITY DEVICE - A security device including a first external interface; a second external interface; and a security controller connected to said first external interface and said second external interface, said security controller being adapted to validate an access right based on a codeword received via said first interface to perform an encrypted memory access via said second external interface to an external memory coupleable to said second external interface, and to prevent that encrypted memory access via said first external interface or prevent any output of data via said first external interface depending on data received via said second external interface in case of a negative validation. | 2010-02-04 |
20100031060 | SECURITY FOR RAID SYSTEMS - Methods and apparatus for accessing a redundant array of independent drives (RAID) storage device are disclosed. In some embodiments file data is broken into multiple segments. A cryptographic operation is performed on one or more segments to generate encrypted segment(s). One or more parity syndrome is computed from the encrypted segment(s) and the unencrypted segment(s). The encrypted segment(s), the unencrypted segment(s) and the parity syndrome(s) are striped onto different individual drives. Since the cryptographic operation is not performed on all the segments, it may also be performed concurrently with computing of parity syndrome(s) from other unencrypted segments. | 2010-02-04 |
20100031061 | Data storage device and management method of cryptographic key thereof - Embodiments of the present invention help to securely manage a data cryptographic key in a data storage device. In an embodiment of the present invention, a cryptographic processor for encrypting and decrypting data is located between a host interface and a memory manager. In parts of the hard disk drive (HDD), except for the host interface, the HDD handles user data in an encrypted state. A data cryptographic key which the cryptographic processor uses to encrypt and decrypt the user data is encrypted and stored in a magnetic disk. A multiprocessing unit (MPU) decrypts the data cryptographic key using a password and a random number to supply it to the cryptographic processor. Using the password and the random number, the HDD can manage the data cryptographic key with more security. | 2010-02-04 |
20100031062 | Storage Device and Data Processing Method of Storage Device - The present invention provides a storage device and a data processing method of the storage device which can prevent leaking of data attributed to stealing or taking out of a disk device. A storage device includes: a plurality of disk adapters each of which is connected to HDDs which constitutes at least one RAID group; and a management part which manages a storage area provided by the plurality of HDD in a state that the storage area is divided into a plurality of logical storage areas, and manages the plurality of RAID groups. The management part sets an encryption state indicative of whether or not the data is to be encrypted with respect to the RAID group when all of the disk adapters connected to the HDD which belong to the RAID group are the encryption adapters the data, and the encryption adapter encrypts, based on the encryption state set with respect to the RAID group, and stores the encrypted data in the HDD. | 2010-02-04 |
20100031063 | System for and Method of Remote Secure Backup - Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided. | 2010-02-04 |
20100031064 | Tamper Detection Line Circuitry For An Authentication Integrated Circuit - The invention provides for tamper detection line circuitry for an authentication integrated circuit for use in authenticating an integrated circuit. The tamper detection line circuitry includes a source of pseudo-random bits, and an XOR gate with two inputs and an output in signal communication with flash memory erase and reset circuits, where a complete erasure is triggered by a 0 from the XOR gate. The circuitry also includes first and second paths arranging the source and XOR gate in signal communication with each other, the first path connected to one input of the XOR gate and the second path having an inverter and connected to a second input of the XOR gate. Also included are a number of triggers connected to the respective paths, each trigger configured to detect a physical attack on the authentication integrated circuit. | 2010-02-04 |
20100031065 | INFORMATION SECURITY APPARATUS - Provided is an information security apparatus ( | 2010-02-04 |
20100031066 | Method and System for Determining Power Over Ethernet Class Capabilities - The present invention relates generally to methods and systems for determining a class of power delivered via power sourcing equipment (“PSE”) utilizing power over Ethernet (“POE”) technology. Described is a method including operating an network device at a first power setting, increasing a power requirement of the network device, detecting a second power setting based on an amount of power available from a power source, the second power setting being greater than the first power setting, determining whether one or more resources of the network device is operable at the second power setting, operating the network device at the second power setting if the one or more resources is operable, and activating an alert if the one or more resources is not operable. Further described is a system including a network device operating at a first power setting, the network device increases a power requirement, a power source providing an amount of power to the network device at a second power setting, the second power setting being greater than the first power setting, and a server determining whether one or more resources of the network device is operable at the second power setting, wherein the network device operates the at the second power setting if the one or more resources is operable, and the network device activates an alert if the one or more resources is not operable. | 2010-02-04 |
20100031067 | Adaptive Noise Suppression Using a Noise Look-up Table - A proactive noise suppression system and method for a power supply network of an integrated circuit. The system and method include receiving an IC event sequence to a memory element, correlating the IC event sequence to a storage location in a second memory element, the storage location including an anti-noise response signature, and utilizing the anti-noise response signature to proactively generate an anti-noise response in a power supply network in at least a portion of the integrated circuit at about the time of execution of the first IC event sequence. Anti-noise response signatures may be adaptively updated and/or created based on noise measurements made corresponding to execution of an IC event sequence by the integrated circuit. | 2010-02-04 |
20100031068 | POWER SUPPLY CONSUMING LOW ENERGY IN STANDBY CONDITIONS - A power supply consuming low energy in standby conditions includes a primary power system activated by standby power, a standby power system, a remote start/stop signal source and a start triggering circuit. The remote start/stop signal source is triggered by users to generate a remote start/stop signal sent to the start triggering circuit to generate a start signal. The standby power system is connected to a control unit and generates the standby power according to an electric signal provided by the control unit. The control unit also determines time series of sending the electric signal to the standby power system according to time series of the start signal being generated. Thus a mechanism to start and stop the standby power system is formed. | 2010-02-04 |
20100031069 | Method for Managing the Power Transmitted from a Central Network Component to a Decentralized Network Component via a Line - Disclosed is a method for managing the power transmitted from a central network component to a decentralized network component via a line, said method determining the ultimately available power in a simple manner. In said method, a respective decentralized network component that is assigned to a predefined power class and can adjust different functionalities, each network component, successively simulates decentralized network components belonging to different power classes, verification is made as to whether the central network component responsible for transmitting power supports a decentralized network component of the simulated type, and the respective decentralized network component decides which functionalities implemented therein are activated after the respective decentralized network component has determined the power classes supported by the central network component. | 2010-02-04 |
20100031070 | POWER SUPPLY SYSTEM, SERVER, POWER SUPPLY METHOD, PROGRAM, AND STORAGE MEDIUM - Provided are a power supply system, a server, a power supply method a program, and a storage medium which enable wasteless and efficient PoE power supply to a device that is powered through a LAN. The power supply system comprises a LAN switch connected to the LAN to perform the PoE power supply to the device through the LAN and a server for determining whether or not the PoE power supply is to be performed. | 2010-02-04 |
20100031071 | Platform-Based Idle-Time Processing - A system and method for transitions a computing system between operating modes that have different power consumption characteristics. When a system management unit (SMU) determines that the computing system is in a low activity state, the SMU transitions the central processing unit (CPU) into a low power operating mode after the CPU stores critical operating state of the CPU in a memory. The SMU then intercepts and processes interrupts intended for the CPU, modifying a copy of the critical operating state. This effectively extends the time during which the CPU stays in lower power mode. When the SMU determines that the computing system exits a low activity state, the copy of the critical operating state is stored in the memory and the SMU transitions the CPU into a high power operating mode using the modified critical operating state. | 2010-02-04 |
20100031072 | SYSTEM FOR POWER MANAGEMENT AND SAFETY PROTECTION AND METHOD THEREOF - A system for power management and safety protection and a method thereof are presented. The system and method are applicable to a computer device having a sensor. The sensor detects position information of a user relative to the computer device so as to determine whether to enter a sleep mode or a recognition mode. The sensor also detects motion information of a particular motion of the user so as to return to an operating mode. | 2010-02-04 |
20100031073 | SYSTEMS AND METHODS FOR POWER MANAGEMENT IN ELECTRONIC DEVICES - Systems and methods are disclosed for managing power consumption in electronic devices. In certain embodiments, an integrated circuit for managing power consumption in an electronic device includes an input/output (I/O) interface, a first circuit block coupled to the I/O interface, and an interface circuit coupled between the I/O interface and the first circuit block, the interface circuit configured to provide a defined logic state to the first circuit block or a second circuit block external to the integrated circuit if one of the first circuit block or the second circuit block is powered down. By providing a defined logic state to the first circuit block or the second circuit block when one of the first circuit block or the second circuit block is powered down, power consumption of the electronic device may be reduced. | 2010-02-04 |
20100031074 | Storage device and control method for the same - In a storage device, any one of management sections respectively provided to a plurality of control modules is set to be in charge of collectively managing the modules, and a management user is allowed to collectively manage the modules via this management section through access thereto. Such a storage device is thus enabled, even if a control module is designed to be provided sequentially to a storage system, to manage the control modules as collective control resources with respect to a host device, and a method for controlling such a storage device is also provided. | 2010-02-04 |
20100031075 | Memory Power Profiling - In an embodiment, an apparatus comprises one or more registers and a control unit coupled to the one or more registers. The control unit is configured to monitor a power state in one or more memory modules during execution of an application, and to store data generated during the monitoring in the one or more registers. In an embodiment, a system comprises a memory controller and a plurality of memory module interface units (MMIUs) coupled to the memory controller. Each of the plurality of MMIUs: is coupled to a respective plurality of memory modules; comprises one or more registers; is configured to monitor a power state in the respective plurality of memory modules during execution of an application; and is configured to store data generated during the monitoring in the one or more registers. | 2010-02-04 |
20100031076 | Configuration Management System for power monitoring and protection system devices - A method of analyzing configuration parameters of IEDs across one or more networks in an electrical system and automatically determines whether any anomalies exist in the configuration parameters for a selected group of IEDs. A list of all IEDs in the electrical system along with configuration templates including firmware and program versions maintained in a master list are stored in central database on a server communicatively coupled to the IEDs through the networks. Configuration parameter values from the IEDs and from any newly added IEDs are scanned and compared against the configuration templates. Anomalies in the parameter values are identified and highlighted to the user, who may decide to accept the anomaly as expected or change the anomalous parameter value for one IED or a group of IEDs. The master list is updated with any user-approved changes to parameter values. Periodic polling of configuration parameters is also supported. | 2010-02-04 |
20100031077 | Alternate Signaling Mechanism Using Clock and Data - Control events may be signaled to a target system having a plurality of components coupled to a scan path by using the clock and data signals of the scan path. While the clock signal is held a high logic level, two or more edge transitions are detected on the data signal. The number of edge transitions on the data signal is counted while the clock signal is held at the high logic state. A control event is determined based on the counted number of edge transitions on the data signal after the clock signal transitions to the low logic state. | 2010-02-04 |
20100031078 | System and Method For Redirecting A Website Upon The Occurrence Of A Disaster Or Emergency Event - A system and method to deflect DNS inquires to a new IP address for a website prior to or after the occurrence of a natural disaster that damages the computer infrastructure of an organization, thereby interrupting the organization's ability to continue to offer its website information. An automated process is included that alters a zone file on a controlling DNS server in a manner that provides a minimum of disruption to resolver programs attempting to resolve names of deflected computers via Internet DNS. An intelligent monitor program continually, but periodically, surveys the organization's web server to confirm its operations status and intervenes in the DNS resolution structure for that web server in the event that a sustained disruption occurs. | 2010-02-04 |
20100031079 | Restoration of a remotely located server - Methods and apparatus restore data on servers in remote or branch offices utilizing virtual distribution components, such as virtual machines. A failed remotely located server is restored to its previous running state using any server with hardware compatible with the hardware of the failed server, rather than requiring a server with an exact copy of the hardware of the failed server. Virtual distribution components are configured without requiring a reimaging of the entire boot partition and physical distribution partition of a physical server. Application environment state information is restored without requiring a restoration of a full operating system state environment. Constantly supported interfaces of physical distribution components are utilized and a quick restoration of virtual distribution components results. Full system functionality is achieved more quickly than when a full physical system image restoration is required. | 2010-02-04 |
20100031080 | VIRTUAL TAPE LIBRARY BACKUP SYSTEMS, AND A METHOD OF HARD DISK DRIVE POWER CONTROL - The present invention discloses a virtual tape library (VTL) backup system, and a method of hard disk drive (HDD) power control in VTL devices. In the VTL backup system, a disk control module (DCM) is added to the VTL device and an agent module is added to the backup server. When a backup or disaster recovery (DR) operation is triggered, the agent module in the backup server can inform the disk control module (DCM) in the VTL device to trigger the VTL device to power on all the HDDs before the operation starts, and to power off all the HDDs after the operation ends. Power saving in the VTL device is achieved through power control over the HDDs. | 2010-02-04 |
20100031081 | Data Storage System and Control Method Thereof - Hard discs constituting a disc array system are arranged at locations far from one another so as to eliminate their simultaneous damage due to a local disaster and concentration of the processing load thereby suppressing the recovery time upon hard disc failure. It is possible to realize continuous operation without system down even when the other disasters have occurred. | 2010-02-04 |
20100031082 | Prioritized Rebuilding of a Storage Device - Rebuilding a storage device after failure of a storage device is disclosed. The method is particularly useful for RAID groups of hard disks. The method may also apply to other storage media arranged as a group. The method includes rebuilding a hard disk in a non-linear fashion according to a heuristic analysis of logical units of the failed hard disk. The method may be implemented in hardware, firmware, software, or a combination thereof. | 2010-02-04 |
20100031083 | INFORMATION PROCESSOR - In the event of occurrence of an error in a memory in an information processor, a first processor that is one of a number of processors executes an error handler program stored in a first memory that is one of a number of memories. If the first processor fails in correctly operating the error handler program, a second processor different from the first processor executes an error handler program stored in a second memory different from the first memory. | 2010-02-04 |
20100031084 | CHECKPOINTING IN A PROCESSOR THAT SUPPORTS SIMULTANEOUS SPECULATIVE THREADING - Embodiments of the present invention provide a system for executing program code on a processor. In these embodiments, the processor is configured to start by using a primary strand to execute program code. Upon detecting a predetermined condition, the processor is configured to instantaneously checkpoint an architectural state of the primary strand and then use the subordinate strand to copy the checkpointed state to memory while using the primary strand to continue executing the program code without interruption. | 2010-02-04 |
20100031085 | METHOD FOR REDUCING HOST DEVICE TO ELECTRONIC DEVICE COMMUNICATION ERRORS - This invention is directed to allowing an electronic device with a failed file system to dynamically direct a host device to reformat it, by making the storage component appear to be in its unformatted state. Upon detection of file system failure, the device writes changes to its disk to make it appear as factory-new to a host device. The host device treats the electronic device as if it is a brand new device that has never been connected to a host device before, and reformats it. By reformatting the device's storage component, the host device thereby provides a way to maintain communication between the host device and electronic device, allowing a more sophisticated application to then diagnose and recover the contents of the storage component, without the involvement of the user or a specialist. This avoids returns of devices with failed file systems, thereby improving the overall user experience. | 2010-02-04 |
20100031086 | REPAIR OF A CORRUPT DATA SEGMENT USED BY A DE-DUPLICATION ENGINE - In a method for repairing a corrupt data segment used by a de-duplication engine, a data segment indexed by a de-duplication index is identified as being as a corrupt data segment. A search is made to find a duplicate data segment with which to replace the corrupt data segment, where the duplicate data segment comprises an uncorrupted version of the data segment. The corrupt data segment is replaced with the duplicate data segment. | 2010-02-04 |
20100031087 | METHOD OF CONTROL IN A SYSTEM HAVING A MEDIA READER - A method of control in a system, which includes a media reader and a host unit, includes configuring the host unit to detect whether the media reader is responding, and configuring the host unit to reset the media reader when it is detected that the media reader stops responding. A system that includes the media reader and the host unit is also disclosed. | 2010-02-04 |
20100031088 | METHOD AND SYSTEM FOR PROCESSING INFORMATION - A method and system for processing information. An apparatus divides target information into N pieces of divided data using a secret sharing scheme in which a predetermined number (K) of pieces of the N pieces of divided data is required to restore the target information, wherein N>K. The apparatus is an information processing device or an external storage device. The apparatus selects M pieces from the N pieces, wherein K≦MM−K. | 2010-02-04 |
20100031089 | Dynamic Broadcast of Configuration Loads Supporting Multiple Transfer Formats - A method for dynamically broadcasting configuration information to controllers connected in a scan topology in a target system is provided in which a selection event followed by the configuration information is received from a signal line at each of the controllers, wherein the plurality of controllers are connected in parallel to the signal line and the configuration information is stored within each controller that matches a selection criteria following the selection event when the selection event initiates a selection sequence. | 2010-02-04 |
20100031090 | SELF-HEALING FACTORY PROCESSES IN A SOFTWARE FACTORY - A method, system, and computer-readable medium for self-healing a software factory are presented. Factory metrics that describe resources and operations within the software factory are collected and analyzed. If the analysis reveals a significant problem within the software factory, then corrective measures are taken and stored, thus enabling the software factory to evolve and improve over time. | 2010-02-04 |
20100031091 | HARDWARE DIAGNOSTICS DETERMINATION DURING INITIAL PROGRAM LOADING - Disclosed are a method, system and computer program product for determining hardware diagnostics during initial program loading (IPL). A space is allocated for a diagnostics hardware table storing hardware identifications corresponding to hardware to be tested. A hardware monitor function detects new and/or defective hardware. Hardware can be manually selected. A runtime diagnostics detects defective hardware. The hardware identifications corresponding to the new, failing, and/or selected hardware are added to the diagnostics hardware table. The hardware identification to be tested is acquired during the building of a system Hardware Objects Model (HOM). A diagnostics flag is set within HOM according to the diagnostics hardware table. Diagnostics are performed per HOM diagnostics flag indication. The diagnostics table is cleared, and the operating system is run. At system runtime, diagnostics code monitors for runtime error. If an error is detected but cannot be isolated to defective hardware, the suspected hardware identification will be added to diagnostics hardware table so that it can be verified on the next system IPL. | 2010-02-04 |
20100031092 | METHOD FOR OPERATING A SECURE SEMICONDUCTOR IP SERVER TO SUPPORT FAILURE ANALYSIS - A method for operating a secure semiconductor IP access server to support failure analysis. A client presents a test failure and failure type to an automated server which traverses an electronic product design, definition, and test database to report specifically those components and interconnect likely to cause the failure with geometrical information which may be displayed on the client. Other aspects of semiconductor IP are protected by the server by limiting the trace mechanism and renaming components. | 2010-02-04 |
20100031093 | Internal tracing method for network attack detection - An internal tracing method for network attack detection is used to trace whole life cycle of an attack data packet for test in different phases such as an attacking phase, a defending phase, and an attacked phase through configuring and uniting three parties including an attack end point (AEP), a detect end point (DEP), and a target end point (TEP) and setting a corresponding internal check point in each part when testing a network intrusion detection system (IDS). In other words, when testing the network IDS, in a whole period that the attack data packet for test is attacking, filtered, detected, and finally transmitted to a target host, a tester may clearly know the statuses and information of the data packet in each important phase, thereby generating a test report conveniently, quickly, and accurately. | 2010-02-04 |
20100031094 | DISK DEVICE, CIRCUIT BOARD, AND ERROR LOG INFORMATION RECORDING METHOD - The disk device includes a disk medium that records data, a non-volatile memory having a first program code region that records a first program code for initial startup, a second program code region that records a second program code, a log information region that records log information, and an error log information record start address that is set in the second program code region; and a processor that operates in accordance with the first and second program codes, collects error log information, and records the collected error log information by overwriting data from the error log information record start address of the non-volatile memory, if the collected error log information cannot be recorded on the disk medium and cannot be expressed with a recordable size in the log information region of the non-volatile memory. | 2010-02-04 |
20100031095 | METHOD AND APPARATUS FOR ENHANCING TICKETING SYSTEM IN A SERVICE MANAGEMENT PROCESS FOR EFFICIENT PROBLEM RESOLULTION - Problem ticket usage is improved by adding dynamic information to the ticket or using dynamic information to prompt the user or customer for additional information. Two categories of dynamic information are used. In the case where an initial problem ticket involves identification of a problem component the dynamic information is derived from abnormal status of related components, such as components which support the problem component. In the case where an initial problem ticket involves problem symptom information, data is derived from resolved problem tickets by identifying important words or concepts which are stored in connection with the particular symptom. When later problem tickets having the same symptom are identified the related important words or concepts are either added to the problem ticket or are used to prompt customers or users for additional information. A system implementing an embodiment of the invention is also described. | 2010-02-04 |
20100031096 | INTERNAL FAIL BIT OR BYTE COUNTER - Briefly, in accordance with one or more embodiments, an internal fail byte counter is disclosed. | 2010-02-04 |
20100031097 | DETECTION APPARATUS - A detection apparatus detecting an error component contained in two signals (A, B) approximated by a cosine and sine functions representing an object position, the detection apparatus including an arithmetic portion ( | 2010-02-04 |
20100031098 | METHOD OF REAL TIME OPTIMIZING MULTIMEDIA PACKET TRANSMISSION RATE - A method and apparatus of optimizing transmission (both real time and continuous) of a number of multimedia data packets between a multimedia source device and a multimedia display device is disclosed. In the described embodiment, the multimedia source device and the display device are coupled by way of a unidirectional main link arranged to carry the multimedia data packets from the multimedia source device and the multimedia display device and a bi-directional auxiliary channel arranged to transfer information between the multimedia source device and the multimedia display device. The method can be carried out by following at least the following operations. Providing a test pattern by the multimedia source device on the main link, determining a transmission quality factor of the main link based upon the test pattern, and optimizing the transmission of the multimedia data packets based upon the transmission quality factor. | 2010-02-04 |
20100031099 | Scan Topology Discovery in Target Systems - Topology discovery of a target system having a plurality of components coupled with a scan topology may be performed by driving a low logic value on the data input signal and a data output signal of the scan topology. An input data value and an output data value for each of the plurality of components is sampled and recorded. A low logic value is then scanned through the scan path and recorded at each component. The scan topology may be determined based on the recorded data values and the recorded scan values. | 2010-02-04 |
20100031100 | Series Equivalent Scans Across Multiple Scan Topologies - Performing series equivalent scans spanning a plurality of scan technologies in a complex scan topology may be performed by performing shift operations in the complex scan topology while only one branch of the complex scan topology connectivity is enabled, and performing capture and update operations in parallel while scan topology connectivity of two or more of the plurality of scan technologies is enabled. | 2010-02-04 |
20100031101 | Dynamically Reconfigurable Shared Scan-In Test Architecture - A low overhead dynamically reconfigurable shared scan-in test architecture is provided. This test architecture advantageously allows for changing scan inputs during the scan operation on a per shift basis. The flexibility of reconfiguring the scan input to scan chain mapping every shift cycle can advantageously reduce both test data volume and test application time. | 2010-02-04 |