09th week of 2013 patent applcation highlights part 47 |
Patent application number | Title | Published |
20130054895 | COOPERATIVE MEMORY RESOURCE MANAGEMENT FOR VIRTUALIZED COMPUTING DEVICES - A computing device employs a cooperative memory management technique to dynamically balance memory resources between host and guest systems running therein. According to this cooperative memory management technique, memory that is allocated to the guest system is dynamically adjusted up and down according to a fairness policy that takes into account various factors including the relative amount of readily freeable memory resources in the host and guest systems and the relative amount of memory allocated to hidden applications in the host and guest systems. | 2013-02-28 |
20130054896 | SYSTEM MEMORY CONTROLLER HAVING A CACHE - A memory controller including a cache can be implemented in a system-on-chip. A cache allocation policy may be determined on the fly by the source of each memory request. The operators on the SoC allowed to allocate in the cache can be maintained under program control. Cache and system memory may be accessed simultaneously. This can result in improved performance and reduced power dissipation. Optionally, memory protection can be implemented, where the source of a memory request can be used to determine the legality of an access. This can simplifies software development when solving bugs involving non protected illegal memory accesses and can improves the system's robustness to the occurrence of errant processes. | 2013-02-28 |
20130054897 | Use of Cache Statistics to Ration Cache Hierarchy Access - A method, system and program are provided for controlling access to a specified cache level in a cache hierarchy in a multiprocessor system by evaluating cache statistics for a specified application at the specified cache level against predefined criteria to prevent the specified application from accessing the specified cache level if the specified application does not meeting the predefined criteria. | 2013-02-28 |
20130054898 | SYSTEM AND METHOD FOR LOCKING DATA IN A CACHE MEMORY - A system and method for locking data in a cache memory. A first processing thread may be operated to run a program requesting data, where at least some of the requested data is loaded from a source memory into a non-empty cache. A second processing thread may be operated independently of the first processing thread to determine whether or not to lock the requested data in the cache. If the requested data is determined to be locked, the requested data may be locked in the cache at the same time as the data is loaded into the cache. | 2013-02-28 |
20130054899 | A 2-D GATHER INSTRUCTION AND A 2-D CACHE - A processor may support a two-dimensional (2-D) gather instruction and a 2-D cache. The processor may perform the 2-D gather instruction to access one or more sub-blocks of data from a two-dimensional (2-D) image stored in a memory coupled to the processor. The two-dimensional (2-D) cache may store the sub-blocks of data in a multiple cache lines. Further, the 2-D cache may support access of more than one cache lines while preserving a two-dimensional structure of the 2-D image. | 2013-02-28 |
20130054900 | Method and apparatus for increasing capacity of cache directory in multi-processor systems - A method and an apparatus for increasing capacity of cache directory in multi-processor systems, the apparatus comprising a plurality of processor nodes and a plurality of cache memory nodes and a plurality of main memory nodes. | 2013-02-28 |
20130054901 | PROPORTIONAL MEMORY OPERATION THROTTLING - A memory controller receives memory operations via an interface which may include multiple ports. Each port is coupled to real-time or non-real-time requestors, and the received memory operations are classified as real-time or non-real-time and stored in queues prior to accessing memory. Within the memory controller, pending memory operations from the queues are scheduled for servicing. Logic throttles the scheduling of non-real-time memory operations in response to detecting a number of outstanding memory operations has exceeded a threshold. The throttling is proportional to the number of outstanding memory operations. | 2013-02-28 |
20130054902 | ACCELERATING BLOCKING MEMORY OPERATIONS - A memory controller, system, and method for accelerating blocking memory operations. A memory controller reorders memory operations so as to maximize efficient use of the memory device bus. When data for a newer memory operation is retrieved from memory and ready to be returned to a source device, the newer memory operation can be held up waiting for an older memory operation to be completed. In response, the memory controller forwards a push request for the older memory operation to a memory channel unit. The memory channel unit then sets a push bit of the older memory operation, which expedites the scheduling of the older memory operation. | 2013-02-28 |
20130054903 | MEMORY DEVICE AND WRITING METHOD THEREOF - A memory device including a data storing unit and a management unit is provided. The data storing unit includes a plurality of blocks each including a plurality of pages. The management unit identifies a page from the pages according to management information and writes a page data to the identified page according to management information. The management information at least comprises a block number and a page number. | 2013-02-28 |
20130054904 | DATA MASK SYSTEM AND DATA MASK METHOD - A data mask system includes a processor providing control signals including a command signal, an address signal, and a data signal, a data mask processor receiving the control signals and providing either write data or masked data in response to the control signals, and generating data mask information and a data mask selection signal from at least one of the control signals, and a data mask register unit receiving the data mask selection signal, storing the data mask information, selecting a subset of the stored data mask information in response to the data mask selection signal, and returning selected data mask information to the data mask processor. The data mask processor receives the selected data mask information from the data mask register unit and provides the masked data as a result of performing a data mask operation on the data signal according to the selected data mask information. | 2013-02-28 |
20130054905 | CONCURRENT MEMORY OPERATIONS - Subject matter disclosed herein relates to performing concurrent memory operations. | 2013-02-28 |
20130054906 | MANAGING DEREFERENCED CHUNKS IN A DEDUPLICATION SYSTEM - A chunk index has information on chunks in a storage space referenced in objects in the storage space. The chunk index includes a reference count for each chunk indicating a number of objects in which the chunk is referenced and a reference measurement representing a level of data object references to the chunk. One chunk is selected to remove from the storage space based on a criteria applied to the reference measurements of chunks having reference counts indicating that the chunks are not referenced in one object in the storage space. | 2013-02-28 |
20130054907 | STORAGE SYSTEM, STORAGE CONTROL APPARATUS, AND STORAGE CONTROL METHOD - A storage system including first storage devices constituting a first logical storage area, second storage devices constituting a second logical storage area; and a storage control apparatus. The storage control apparatus manages the first and second logical storage areas so that the data stored in the first and second logical storage areas have redundancy, and parity data for the data stored in the second logical storage area are stored in parity storage areas arranged in part of the second storage devices. When part of the first storage devices constituting part of the first logical storage area fail, the storage control apparatus generates part of the data stored, before the failure, in the part of the first storage devices, and stores the generated part of the data in at least part of the second parity storage areas in the second logical storage area. | 2013-02-28 |
20130054908 | Persisted Variables - Some embodiments of the invention provide a variable persister that allows an application running on a device to efficiently make a set of variables persistent across termination and relaunch of the application. According to some embodiments of the invention, an application executing on the device can utilize this archiving service by simply having its persisted variables declared in the application's code as variables that are to be persisted. Based on such declarations, the variable persisting service of the device stores the values of the set of persisted variables in a non-volatile storage archive (e.g., disk, flash storage, etc.) when the application terminates, and retrieves these values from the archive when the application restarts such that the values of the persisted variables are restored to a state before the application was last terminated. | 2013-02-28 |
20130054909 | System and Method for Backing Up Data - In accordance with one embodiment of the present disclosure, a method includes receiving second information about second data stored on a second device. The method also includes determining that the second data is associated with first data stored on a first device. The method further includes, based on the determination about the second data, associating the second data with a policy for backing up a particular type of data. The method further includes initiating a transfer of one or more copies of the second data to a second one or more storage medias defined by the policy. | 2013-02-28 |
20130054910 | VIRTUAL MACHINE SNAPSHOTTING IN OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects within logical storage containers. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. A snapshot profile can be separately defined for each of these logical storage volumes, even for those that are within the same storage container. The snapshot profile for a logical storage volume defines whether or not snapshot is enabled for that logical storage volume, the frequency of the snapshot, and the number of snapshots to be retained. | 2013-02-28 |
20130054911 | FAST SNAPSHOTS - Exemplary method, system, and computer program product embodiments for performing a snapshot for monitoring usage of one or more data units are provided. In one embodiment, by way of example only, a fast snapshot is configured to store a state of a computing environment at a point in time. The fast snapshot operation is performed by avoiding reference counts of one or more data units associated with the snapshot from being updated at a creation and a deletion time. Additional system and computer program product embodiments are disclosed and provide related advantages. | 2013-02-28 |
20130054912 | METHODS AND PHYSICAL COMPUTER STORAGE MEDIA FOR TRANSFERRING DE-DUPLICATED DATA ORGANIZED IN VIRTUAL VOLUMES TO A TARGET SET OF PHYSICAL MEDIA - A method include forming an initial bitmap from the de-duplicated data on virtual volumes, sorting discrete blocks according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks, creating a physical volume map from the revised bitmap, reviewing, from the physical volume map, an initial virtual volume of the virtual volumes contained on a corresponding original physical volume, to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map, deleting the initial virtual volume from its corresponding original physical volume and adding the initial virtual volume to the different original physical volume to create a revised physical volume map including revised physical volumes, and writing the revised physical volumes to the target set of physical media using the revised physical volume map. | 2013-02-28 |
20130054913 | STORAGE SYSTEM, AND APPARATUS AND METHOD FOR CONTROLLING STORAGE - A rebuild control unit splits a rebuild process into partial processes and instructs an access processing unit to execute the partial processes. In the rebuild process, data identical to data recorded in a first storage device that constitutes RLU #1 is generated based on data read from, among storage devices constituting RLU #1, storage devices other than the first storage device and written to a spare storage device included in a storage system. Each partial process includes a combination of an operation of reading data from a split range created by splitting a data readout target range into fixed-size intervals and an operation of writing data in another storage device based on the data read from the split range. In response to the instruction from the rebuild control unit to execute the multiple partial processes, the access processing unit executes the instructed partial processes in parallel. | 2013-02-28 |
20130054914 | DATA COPY PROCESSING SYSTEM, STORAGE DEVICE, AND DATA COPY PROCESSING METHOD - A data copy processing system includes a first storage device that is a copy source and includes a first storage drive in which the data is recorded and a first controller that controls the first storage drive, and a second storage device that is a copy destination and includes a second storage drive in which a copy of the data of the first storage device is written and a second controller that controls the second storage drive. The first controller performs control of instructing the first storage drive to read out all data in an order of addresses, in accordance with a read command that is issued from the second controller, and outputting the read-out data to the second storage device, and the second controller performs control of writing the read-out data in the second storage drive in a read-out order of addresses. | 2013-02-28 |
20130054915 | Performing An Atomic Operation Without Quiescing An Interconnect Structure - In one embodiment, the present invention includes a method for receiving a lock message for an address in a processor from a quiesce master of a system. This lock message indicates that a requester agent of the system is to enter a locking phase with respect to the address. Responsive to receipt of this message, logic of the processor can write an entry in a tracking buffer of the processor for the address and thereafter allow a transaction to be sent from the processor via an interconnect if an address of the transaction does not match any address stored in the tracking buffer. Other embodiments are described and claimed. | 2013-02-28 |
20130054916 | BLOCKED BASED END-TO-END DATA PROTECTION FOR EXTENDED COUNT KEY DATA (ECKD) - Exemplary method, system, and computer program product embodiments for block based end-to-end data protection for extended count key data (ECKD) in a computing environment are provided. In one embodiment, by way of example only, information units (IU's) are aligned in a block boundary format. Block protection trailer data is added to each one of the IU's. Additional system and computer program product embodiments are disclosed and provide related advantages. | 2013-02-28 |
20130054917 | EFFICIENT SECURE DATA MARSHALING THROUGH AT LEAST ONE UNTRUSTED INTERMEDIATE PROCESS - Secure marshaling of data via one or more intermediate processes is provided. A source process may create a named shared memory section resulting in a first handle to the shared memory section. The source process may populate the shared memory section with information. An access control list may secure the shared memory section by preventing the one or more intermediate processes from accessing content of the shared memory section, while allowing a target process to access the content. The first handle and a name of the shared memory section may be marshaled to a first intermediate process resulting in a respective new handle to the shared memory section. A last intermediate process may marshal the name to a target process, which may use the name to obtain access to the content of the shared memory section. | 2013-02-28 |
20130054918 | BLOCKED BASED END-TO-END DATA PROTECTION FOR EXTENDED COUNT KEY DATA (ECKD) - For block based end-to-end data protection for extended count key data (ECKD) in a computing environment, information units (IU's) are aligned in a block boundary format. Block protection trailer data is added to each one of the IU's. | 2013-02-28 |
20130054919 | METHODS AND PHYSICAL COMPUTER STORAGE MEDIA FOR TRANSFERRING DE-DUPLICATED DATA ORGANIZED IN VIRTUAL VOLUMES TO A TARGET SET OF PHYSICAL MEDIA - For forming an initial bitmap from deduplicated data on virtual volumes, discrete blocks are sorted according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks. A physical volume map is created from the revised bitmap. An initial virtual volume of the virtual volumes contained on a corresponding original physical volume is reviewed to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map. The initial virtual volume is deleted from its corresponding original physical volume and added to the different original physical volume to create a revised physical volume map including revised physical volumes. The revised physical volume is written to the target set of physical media using the revised physical volume map. | 2013-02-28 |
20130054920 | STORAGE SYSTEM AND METHOD FOR REALLOCATING DATA - The present invention comprises a virtual volume | 2013-02-28 |
20130054921 | Power Aware Memory Allocation - A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement. The policies may allow some processes to operate while consuming less energy, while other processes may be configured to maximize performance | 2013-02-28 |
20130054922 | COOPERATIVE MEMORY RESOURCE MANAGEMENT FOR VIRTUALIZED COMPUTING DEVICES - A computing device employs a cooperative memory management technique to dynamically balance memory resources between host and guest systems running therein. According to this cooperative memory management technique, memory that is allocated to the guest system is dynamically adjusted up and down according to a fairness policy that takes into account various factors including the relative amount of readily freeable memory resources in the host and guest systems and the relative amount of memory allocated to hidden applications in the host and guest systems. | 2013-02-28 |
20130054923 | AUTOMATIC MEMORY LEAK DETECTION - Memory leak detection can be automated by assigning and recording an increasing sequence number to each memory allocation requested by an action. Call stacks associated with the action are also recorded. Several repetitions of the action can be executed. Allocations that occur in each action and that have similar or matching callstacks are defined as leaks. Allocations that do not have matches can be ignored. | 2013-02-28 |
20130054924 | PREEMPTIVELY ALLOCATING EXTENTS TO A DATA SET - Provided are a computer program product, system, and method for preemptively allocating extents to a data set in a storage system. A data set is comprised of a plurality of extents configured in at least one volume in the storage system. A first extent is allocated to the data set in a first volume to extend the data set. A determination is made as to whether a second extent can be allocated to the data set in the first volume in response to the allocating of the first extent. The second extent in a second volume is allocated for the data set in response to determining that the second extent cannot be allocated to the data set in the first volume. | 2013-02-28 |
20130054925 | MEMORY ALLOCATION TRACKING - The subject disclosure relates to tracking and/or auditing memory allocations for one or more computer-implemented processes. In particular, memory allocation commands as well as memory free commands, both native and managed, can be intercepted. As such, a tag can be created that can be associated with a particular memory allocation. This tag can include various information that can more robustly describe the current state of system memory. Moreover, the tag can be deleted as an associated memory free command is received. Thus, as memory is freed and therefore no longer relevant to the current state of system memory, such does not clutter present examination. | 2013-02-28 |
20130054926 | MEMORY ALLOCATION ANALYSIS - The subject disclosure relates to analyzing memory allocations for one or more computer-implemented processes. In particular, in conjunction with employing tags for tracking memory allocation commands, currently allocated memory can be examined for various characteristics of inefficient memory use. For example, as memory is initially allocated, a predetermined bit pattern can be written to the newly allocated memory. Thus, detection of the predetermined bit pattern can be indicative of wasted memory use. Moreover, additional features can be provided to both analyze data and present views associated with that analysis relating to identification of memory fragmentation, over-allocation, sparse memory use, duplication of allocations, multiple module loads, and so forth. | 2013-02-28 |
20130054927 | SYSTEM AND METHOD FOR RETAINING DEDUPLICATION IN A STORAGE OBJECT AFTER A CLONE SPLIT OPERATION - Described herein is a system and method for retaining deduplication of data blocks of a resulting storage object (e.g., a flexible volume) from a split operation of a clone of a base storage object. The clone may comprise data blocks that are shared with at least one data block of the base storage object and at least one data block that is not shared with at least one data block of the base storage object. The data blocks of the clone that are shared with the base storage object may be indicated to receive a write allocation that may comprise assigning a new pointer to a indicated data block. Each data block may comprise a plurality of pointers comprising a virtual address pointer and a physical address pointer. As such, data blocks of the clone comprising the same virtual address pointer may be assigned a single physical address pointer. Thus, a new physical address pointer is assigned or allocated once to a given virtual address pointer of data blocks of a clone. | 2013-02-28 |
20130054928 | META DATA GROUP CONFIGURATION METHOD HAVING IMPROVED RANDOM WRITE PERFORMANCE AND SEMICONDUCTOR STORAGE DEVICE USING THE METHOD - A semiconductor storage device having an improved write performance is disclosed. The semiconductor storage device includes a plurality of memory devices, with each memory device associated with a logical address space comprising contiguous logical addresses. A controller of the semiconductor storage device is configured to allocate a plurality of meta data groups for each memory device, with each meta data group assigned a set of logical addresses of the logical address space. The controller may also configured to assign a first logical address of a logical address space to a first meta data group and a second logical address of the logical address space, contiguous to the first logical address, to a second meta data group, where the second meta data group is different than the first meta data group. | 2013-02-28 |
20130054929 | MOBILE TERMINAL AND OPERATION METHOD FOR THE SAME BASED ON MEMORY STATE CHANGES - A mobile terminal and an operation method for the same based on memory state changes are provided. The operation method includes detecting a transition between memory states of a memory unit; performing operation control by placing and releasing memory usage restrictions on and from at least one of an application program previously loaded in the memory unit and an application program newly loaded in the memory unit based on the detected memory state transition. | 2013-02-28 |
20130054930 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR STORING DOWNLOADABLE CONTENT ON A PLURALITY OF ENTERPRISE STORAGE SYSTEM (ESS) CELLS - The present invention takes advantage of unused storage space within the ESS cells to provide for the efficient and cost effective storage of downloadable content. Specifically, the system of the present invention generally includes a download grid manager that communicates with the ESS cells. Content to be replicated to the ESS cells, and characteristics corresponding thereto, are received on the download grid manager from a content owner (or the like). Based on the characteristics, a storage policy, and storage information previously received from the ESS cells, the download grid manager will replicate the downloadable content to unused storage space within the ESS cells. | 2013-02-28 |
20130054931 | On-Die Logic Analyzer For Semiconductor Die - In one embodiment, the present invention includes a semiconductor die such as a system on a chip (SoC) that includes a logic analyzer with a built-in trace buffer to store information communicated between on-die agents at speed and to provide the information to an off-die agent at a slower speed. Other embodiments are described and claimed. | 2013-02-28 |
20130054932 | OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. Logical storage volumes are created from a logical storage container having an address space that maps to storage locations of the physical data storage units. Each of the logical storage volumes so created has an address space that maps to the address space of the logical storage container. A logical storage container may span more than one storage system and logical storage volumes of different customers can be provisioned from the same logical storage container with appropriate security settings. | 2013-02-28 |
20130054933 | DYNAMIC ADDRESS CHANGE OPTIMIZATIONS - A method of setting an address of a component that includes determining a characterization value associated with a consumable, calculating a number of address change operations based upon the characterization value, and setting a last address generated from the number of address change operations as the new address of the component, wherein the characterization value is determined based upon a usage of the consumable. | 2013-02-28 |
20130054934 | Method and Apparatus for Performing Mapping Within a Data Processing System Having Virtual Machines - In an environment in which a processor operates a hypervisor and multiple guest partitions operating under the hypervisor's control, it is desirable to allow a guest partition access to a physical memory device without decreasing system performance. Accordingly, a conversion instruction for converting a logical address to a real address, i.e., an LTOR instruction, executable from a guest partition, is added to the processor. Upon the guest partition's execution of the conversion instruction with the logical address specified, the processor converts the logical address to an encrypted real address, and returns it to the guest partition. The guest partition is then able to pass the encrypted real address to an accelerator that converts the encrypted real address to a real address in order to access the memory device using the real address. | 2013-02-28 |
20130054935 | SYNCHRONIZING A TRANSLATION LOOKASIDE BUFFER WITH AN EXTENDED PAGING TABLE - A processor including logic to execute an instruction to synchronize a mapping from a physical address of a guest of a virtualization based system (guest physical address) to a physical address of the host of the virtualization based system (host physical address), and stored in a translation lookaside buffer (TLB), with a corresponding mapping stored in an extended paging table (EPT) of the virtualization based system. | 2013-02-28 |
20130054936 | REMAPPING INOPERABLE MEMORY BLOCKS USING POINTERS - Inoperable bits are determined in a memory block. Rather than abandon the block as inoperable, a data structure is generated that includes at least one memory page pointer that identifies the location of the inoperable bits in the memory block. The data structure is stored in one of a group of memory blocks that are reserved for the data structures. A pointer to the data structure is stored in metadata associated with the memory block with the inoperable bits. When a later memory operation is received for the memory block, the pointer is retrieved from the metadata and the memory page pointers are used to avoid the inoperable bits. | 2013-02-28 |
20130054937 | APPARATUSES AND METHODS FOR PROVIDING DATA FROM MULTIPLE MEMORIES - Apparatuses and methods for providing data are disclosed. An example apparatus includes a plurality of memories coupled to a data bus. The memories are configured to provide data to the data bus responsive, at least in part, to a first address. The plurality of memories are further configured to provide at least a portion of the data corresponding to the first address to the data bus during a sense operation for a second address provided to the plurality of memories after the first address. Each of the plurality of memories provides data to the data bus corresponding to the first address at different times. Moreover, a plurality of memories may be configured to provide at least 2N bits of data to the data bus responsive, at least in part, to an address, each of the plurality of memories configured to provide N bits of data to the data bus at different times. | 2013-02-28 |
20130054938 | EFFICIENT PIPELINE PARALLELISM USING FRAME SHARED MEMORY - A systems and methods are disclosed that provide an efficient parallel pipeline for data processing using a multi-core processor. Embodiments allocate a shared memory portion of the memory that is accessible from more than one context of execution and/or process a frame in a plurality of processing stages processed by a context of execution. In some embodiments, each of the plurality of processing stages may be bound to a processing core of the multi-core processor. In other embodiments include one or more processing stages with a point-to-point communication mechanism that operates in shared memory. | 2013-02-28 |
20130054939 | INTEGRATED CIRCUIT HAVING A HARD CORE AND A SOFT CORE - An integrated circuit (IC) is disclosed. The integrated circuit includes a non-reconfigurable multi-threaded processor core that implements a pipeline having n ordered stages, wherein n is an integer greater than 1. The multi-threaded processor core implements a default instruction set. The integrated circuit also includes reconfigurable hardware that implements n discrete pipeline stages of a reconfigurable execution unit. The n discrete pipeline stages of the reconfigurable execution unit are pipeline stages of the pipeline that is implemented by the multi-threaded processor core. | 2013-02-28 |
20130054940 | MECHANISM FOR INSTRUCTION SET BASED THREAD EXECUTION ON A PLURALITY OF INSTRUCTION SEQUENCERS - In an embodiment, a method is provided. The method includes managing user-level threads on a first instruction sequencer in response to executing user-level instructions on a second instruction sequencer that is under control of an application level program. A first user-level thread is run on the second instruction sequencer and contains one or more user level instructions. A first user level instruction has at least 1) a field that makes reference to one or more instruction sequencers or 2) implicitly references with a pointer to code that specifically addresses one or more instruction sequencers when the code is executed. | 2013-02-28 |
20130054941 | CLOCK DATA RECOVERY CIRCUIT AND CLOCK DATA RECOVERY METHOD - A processor includes: an arithmetic unit configured to execute instructions; an instruction decode part configured to decode the instructions executed in the arithmetic unit and to output opcodes; and an interrupt register configured to receive interrupt signals, wherein the instruction decode part includes an instruction code map that stores the opcodes in correspondence to instructions and outputs the opcodes in accordance with the instructions inputted, and the instruction code map stores a plurality of sets of opcodes to be output as switch opcodes corresponding to additional instructions, the additional instructions are a part of the instructions, and switches the sets of the switch opcodes in accordance with the interrupt signal. | 2013-02-28 |
20130054942 | TRACKING A PROGRAMS CALLING CONTEXT USING A HYBRID CODE SIGNATURE - A method for a hybrid code signature including executing, via a processor, an application, the executing comprising executing a root instruction of the application; profiling, via the processor, the executing of the application, the profiling comprising storing a reference signature; determining, via the processor, a working signature of instructions executed subsequent to the executing of the root instruction, the determining comprising implementing a hashing function of the instructions in response to storing the reference signature; tracking the updating of the working signature by storing a value in a counter; and updating continuously, via the processor, the working signature with the hashing function while at least the working signature does not match the reference signature. | 2013-02-28 |
20130054943 | FIRMWARE WITH A PLURALITY OF EMULATED INSTANCES OF PLATFORM-SPECIFIC MANAGEMENT FIRMWARE - In one aspect, a firmware on a management controller operatively connected to a plurality of managed computing platforms is disclosed. In one embodiment, the firmware includes a plurality of emulated instances of platform management firmware. Each emulated firmware instance contains platform-specific configuration data for a corresponding one of the managed computing platforms. The management controller is operative to perform one or more platform management functions for each of the managed computing platforms based at least in part on the configuration data for a corresponding one of the emulated firmware instances. | 2013-02-28 |
20130054944 | Information Handling System Swappable Boot Storage Device - A storage device actuator on an information handling system accepts an end user input to eject a first non-volatile storage device that stores the operating system running on the information handling system. Boot logic running on firmware of the information handling system initiates a shutdown of the operating system at the information handling system in response to an eject actuation and then permits ejection of the first non-volatile storage device. The storage device actuator detects insertion of a second non-volatile storage device into the information handling system and in response to the detection of the insertion initiates a boot by the boot logic of an operating system stored on the second non-volatile storage device. | 2013-02-28 |
20130054945 | ADAPTIVE SENSING FOR EARLY BOOTING OF DEVICES - Automatically performing configuration or activation activities on a device. A method includes collecting at least one of operational or environmental information about a device. The at least one of operational or environmental information about a device is used to determining an anticipated usage of the device. Based on the determined anticipated usage, at least one configuration or activation action is performed putting the device into a normal use state. | 2013-02-28 |
20130054946 | DIGITAL SIGNING AUTHORITY DEPENDENT PLATFORM SECRET - In accordance with one or more aspects, a representation of a configuration of a firmware environment of a device is generated. A secret of the device is obtained, and a platform secret is generated based on both the firmware environment configuration representation and the secret of the device. One or more keys can be generated based on the platform secret. | 2013-02-28 |
20130054947 | REBOOTING INFINIBAND CLUSTERS - Methods, systems, and physical computer-readable storage media are now provided that reduce latency and improve efficiency of a system after reboot of an Infiniband (IB) cluster. A method of rebooting an Infiniband cluster includes preserving routing table configurations of each switch of the Infiniband cluster, rebooting endpoints of the Infiniband cluster, activating physical links at each endpoint, setting local identifier (LID) locally at each endpoint of the IB cluster, and activating logical links locally at each endpoint of the IB cluster. | 2013-02-28 |
20130054948 | Attestation Protocol for Securely Booting a Guest Operating System - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 2013-02-28 |
20130054949 | MEMORY COMPATIBILITY SYSTEM AND METHOD - An apparatus including a first connector configured to fit into a first socket in a processing system, the first connector and first socket conforming to a first standard, a second socket configured to accept a memory module therein, the second socket and the memory module conforming to a second standard, a memory buffer module communicatively coupled to the first connector and the second socket, the memory buffer module configured to receive signals associated with the first standard from the first connector and output signals associated with the second standard to the second socket, and a virtualization module communicatively coupled to the memory buffer module, the first connector, and the second socket, the virtualization module configured to receive first initialization data associated with the second standard from the second socket and output second initialization data associated with the first standard to the processing system. | 2013-02-28 |
20130054950 | USER-CONTROLLABLE BOOT ORDER THROUGH A HYPERVISOR - A method and system for providing a user-controllable boot order via a hypervisor in a virtual machine system. A Basic Input/Output System (BIOS) receives a boot order list associated with a guest from the hypervisor. The boot order list is an ordered list that specifies an order of device names, according to which the BIOS searches for boot software when booting up the guest. In the boot order list, devices of the same device type are identified by different device names. Upon receipt of a command to boot up the guest, the BIOS searches for the boot software following the order of the device names specified by the boot order list. The BIOS then boots up the guest using the boot software located in one of the devices. | 2013-02-28 |
20130054951 | SOFTWARE EXECUTION METHOD AND ELECTRONIC DEVICE USING THE SAME - A software execution method is provided. The software execution method includes the following steps. An operating system kernel is started, which is commonly used by a first operating system and a second operating system. One or more driver modules is loaded into the kernel of the first operating system. Under a root of one of the first and the second operating systems, the one of the first and the second operating systems can start to be performed. A procedure is forked to chroot a root of the other one of the first and second operating systems. Under the root of the other one of the first and the second operating systems, the other one of the first and the second operating systems can start to be performed. An electronic device using the same is also provided. | 2013-02-28 |
20130054952 | OPERATING METHOD FOR DUAL OPERATING SYSTEM, PORTABLE DEVICE AND DOCKING SYSTEM - An operating method of a dual operating system, adapted to switch a first operating system and a second operating system on a docking system composed of a portable electronic device and a docking station, wherein the portable electronic device stores the first operating system and the first part of the second operating system, and the docking station stores the second part of the second operating system, the operating method comprising automatically starting the first part of the second operating system when the portable device operates the first operating system and is in an idle mode of the first operating system. When the portable device is coupled to the docking system and operates the second operating system and is in the idle mode of the second operating system, the portable device automatically loads and executes the first operating system. | 2013-02-28 |
20130054953 | SERVER WITH REMOTE REBOOT AND WAKE-UP FUNCTION - A server includes a number of first and second network cards, a buffer, a restart circuit, an AND gate, and a south bridge. Each of the first network cards includes a first signal pin to transmit a wake-up signal and a restart signal. Each of the second network cards includes a second signal pin to transmit a wake-up signal. The restart circuit is connected to each of the first signal pins through the buffer to receive the restart signal, and reboots the server according to the restart signal. The south bridge is connected to each of the first and second signal pins through the AND gate to receive the wake-up signal, and wakes up the server according to the wake-up signal. | 2013-02-28 |
20130054954 | DISPLAY DEVICE AND BOOTING METHOD THEREOF - A display device and a booting method thereof are provided. The booting method includes during a standby mode, receiving a remote control signal and storing the remote control signal; and in response to a power signal being received within a predefined period of time of the receipt of the remote control signal, booting the display device to display a display screen corresponding to the remote control signal. Therefore, it is possible for a user to readily execute a desired function of the display device when booting the display device. | 2013-02-28 |
20130054955 | OPERATING SYSTEM SWITCHING METHOD IN INFORMATION PROCESSING SYSTEM - An OS switching method for switching an OS within several seconds in an information processing system is provided. In the information processing system which includes a processor, a main memory, a nonvolatile memory, and a plurality of input/output apparatuses, an OS switcher is executed when power is applied to the information processing system. When a first OS acquires an OS switch command that indicates a switch to a second OS while the first OS is activated and running, the first OS stores identification information of the second OS and information indicating an OS switch in the nonvolatile memory, and performs STR. The OS switcher switches an OS from the first OS to the second OS after the STR is completed. Accordingly, in the system, one OS can be quickly switched to another OS within several seconds, and a previous working environment can be maintained. | 2013-02-28 |
20130054956 | SEMICONDUCTOR DEVICE AND DATA PROCESSING SYSTEM - A semiconductor device correctly switches endian modes regardless of the current endian mode of an interface. The semiconductor device includes a switching circuit and a first register. The switching circuit switches an interface tote used in big endian or little endian mode. The first register holds control, data of the switching circuit. The switching circuit sets the interface in little endian mode when first predetermined control information is supplied to the first register, and sets the interface in big endian mode when second predetermined control information is supplied to the first register. The control information can be correctly inputted without being influenced by the endian setting status. | 2013-02-28 |
20130054957 | Two-Way, Secure, Data Communication within Critical Infrastructures - Systems and methods for two-way, secure, data communication within critical infrastructures are usable to protect critical infrastructure information while allowing real-time monitoring and remote access. Such communication systems and methods can be used to protect critical data by, for example, providing a single point of access via unidirectional, serial, non-routable connections. Additionally, data flow may be controlled by a first server that is not accessible outside of the critical infrastructure. | 2013-02-28 |
20130054958 | Systems and Methods for Performing Adaptive Bitrate Streaming Using Automatically Generated Top Level Index Files - Systems and methods for performing adaptive bitrate streaming using top level index files automatically generated based upon the capabilities of a playback device in accordance with embodiments of the invention are disclosed. One embodiment of the method of the invention includes requesting a top level index file from a playback server using a playback device, where the request identifies a piece of content and includes information describing the capabilities of the playback device, receiving a top level index file from the playback server using the playback device, where the top level index file describes a plurality of streams accessible to the playback device and identifies the location of the streams, selecting initial streams using the playback device, and retrieving at least a portion of the initial streams from the locations identified in the top level index file using the playback device. | 2013-02-28 |
20130054959 | Security Control in a Communication System - A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The node is adapted to estimate at least one safety degree relating to the node, to select at least one security algorithm of the one or more security algorithms, depending on the estimated safety degree; and to activate the at least one security algorithm. | 2013-02-28 |
20130054960 | SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION - Systems and methods for application identification in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor and memory configured to store an application, a session manager, an application identifier, and at least one shared library, and the processor is configured by the session manager to communicate the application identifier and the application identifier data to an authentication server and permit the execution of the application in response to authentication of the application by the authentication server. | 2013-02-28 |
20130054961 | AUTHENTICATOR, AUTHENTICATEE AND AUTHENTICATION METHOD - According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (NKey) that is hidden, includes a memory configured to store second key information (HKey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (SKey) by using the second key information (HKey) and the random number information. The authenticator is configured such that the second key information (HKey) is generated from the first key information (NKey) but the first key information (NKey) is not generated from the second key information (HKey). | 2013-02-28 |
20130054962 | POLICY CONFIGURATION FOR MOBILE DEVICE APPLICATIONS - Methods, articles of manufacture, and apparatus to perform policy configuration for mobile device applications are disclosed. A disclosed example method includes determining whether a digital certificate associated with a application executable on a mobile device has been signed by a first trusted certificate authority, the first trusted certificate authority being included in a list of trusted certificate authorities hard-coded in the mobile device, and when the digital certificate is determined to have been signed by the first trusted certificate authority, configuring the application for execution on the mobile device based on an access privilege indicating a physical interface of the mobile device the application is permitted to access, and execution configuration information associated with the application. | 2013-02-28 |
20130054963 | METHOD AND TERMINAL FOR AUTHENTICATING BETWEEN DRM AGENTS FOR MOVING RO - A digital Rights Management (DRM), and particularly an apparatus and method of authentication between DRM agents for moving Rights Object (RO) is provided, whereby RO and contents can be moved between DRM agents after a simple authentication therebetween using specific authentication information received from a Rights Issuer (R | 2013-02-28 |
20130054964 | METHODS AND APPARATUS FOR SOURCE AUTHENTICATION OF MESSAGES THAT ARE SECURED WITH A GROUP KEY - Methods, systems and apparatus are provided for source authentication. In accordance with the disclosed embodiments, a key-management server generates a key-delivery message that includes a key data transport payload secured with a group key, and a source authentication payload. Upon receiving the key-delivery message at a communication device, the communication device may verify whether the source authentication payload of the key-delivery message is valid. When the source authentication payload is determined to be valid, the communication device thereby authenticates that the key-delivery message was transmitted by the key-management server. | 2013-02-28 |
20130054965 | Usage Control of Digital Data Exchanged Between Terminals of a Telecommunications Network - The invention refers to a method of supporting a sending user device ( | 2013-02-28 |
20130054966 | SYSTEMS AND METHODS FOR PROVIDING SECURE MULTICAST INTRA-CLUSTER COMMUNICATION - Systems and methods which facilitate secure multicast communications between any valid node of a cluster using authentication between a node joining the cluster and any single node which is validly part of the cluster are disclosed. In accordance with embodiments, a cluster key is utilized to provide security with respect to intra-cluster communications. The cluster key of embodiments is shared by a node which is already part of the cluster with a node joining the cluster only after these two nodes mutually authenticate one another. The mutual authentication handshake of embodiments implements a protocol in which a session key is calculated by both nodes, thereby providing a secure means by which a cluster key may be shared. Having the cluster key, each node of the cluster is enabled to securely communicate with any other node of the cluster, whether individually (e.g., unicast) or collectively (e.g., multicast), according to embodiments. | 2013-02-28 |
20130054967 | Reoccuring Keying System - A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures. | 2013-02-28 |
20130054968 | METHODS AND SYSTEMS OF DATA SECURITY IN BROWSER STORAGE - Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the OAuth encrypted refresh token in the storage available with current browsers or any other non-secure storage on user system. | 2013-02-28 |
20130054969 | Secured privileged access to an embedded client on a mobile device - Disclosed is an apparatus and method to access privileges of Virtual Mobile Management (VMM) client in mobile device. A disclosed example method contains an assigning embedded stub to raise the access privilege of the tool on a mobile device, the embedded stub is integrated by an operating system of the mobile device with “root” privilege, determining via a secured key exchange algorithm that the VMM client and tools is authorized to be installed on the mobile device then, the VMM client and tools of a mobile device are authorized to access a network interface of the Communication Endpoint Gateway (CEG) server, configuring the embedded stub to install the key exchange procedure for the shared certification between the embedded stub, VMM client and the session mediation server, enabling the embedded stub to communicate through a secure link via VMM client. | 2013-02-28 |
20130054970 | Apparatuses and Methods for Enabling a User to Consume Protected Contents of a Content Provider - The embodiments of the present invention relate to apparatuses, in terms of a client device ( | 2013-02-28 |
20130054971 | TERMINAL DEVICE, VERIFICATION DEVICE, KEY DISTRIBUTION DEVICE, CONTENT PLAYBACK METHOD, KEY DISTRIBUTION METHOD, AND COMPUTER PROGRAM - The terminal device | 2013-02-28 |
20130054972 | SYSTEMS AND METHODS FOR SECURING CONTENT DELIVERED USING A PLAYLIST - Systems and methods in accordance with embodiments of the invention enhance the security of content distribution using individualized playlists. In many embodiments, a playlist is individually composed for a client device so that the selection of content included in the playlist encodes information. One embodiment includes generating a watermark sequence, where each watermark sequence is a unique identifier, selecting between alternative chunks of encoded content based upon the watermark sequence, where each of the alternative chunks of encoded content includes the same perceptual content and differs in the way it is watermarked, and listing the selected chunks in a playlist, where content assembled using the playlist includes a unique watermark sequence. | 2013-02-28 |
20130054973 | APPARATUS AND METHODS FOR SECURE ARCHITECTURES IN WIRELESS NETWORKS - Apparatus, methods, computer readable media and processors may provide a secure architecture within which a client application on a wireless device may, in some aspects, exchange information securely with resident device resources, and in other aspects, with a remote server over a wireless network. | 2013-02-28 |
20130054974 | PACKET SOURCE AUTHENTICATION METHOD USING SINGLE-BUFFERED HASH IN MULTICAST ENVIRONMENT AND APPARATUS FOR THE SAME - A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message transmission side, and includes generating a first hash value to which a first hash function is applied using a message to be included in a next packet and a key value, and generating the transmission packet including the first hash value, wherein the key value is one of at least one key value generated in advance by applying a second hash function. Meanwhile, according to the present invention, effective low-cost multicast authentication may be performed by reducing a variety of loads such as buffer management, key calculation costs, and the like. | 2013-02-28 |
20130054975 | ELECTRONIC PASSWORD LOCK SYSTEM AND METHOD FOR ITS USE - A lock system includes a locker device and a USB key. The locker device includes a first USB connector, a password input unit and a control unit. The USB key includes a second USB connector for connection to the first USB connector, a memory unit, and a decrypting unit. The memory unit is configured for storing a password. The decrypting unit includes a password identification unit configured for determining whether a password inputted into the password input unit matches the password stored in the memory unit and producing a decrypting instruction if the inputted password matches the stored password. The locker device is configured for transmitting the inputted password to the USB key. The USB key is configured for transmitting the decrypted instruction to the locker device through the connected first and second USB connectors to enable the control unit to unlock the locker device. | 2013-02-28 |
20130054976 | LIGHTWEIGHT DOCUMENT ACCESS CONTROL USING ACCESS CONTROL LISTS IN THE CLOUD STORAGE OR ON THE LOCAL FILE SYSTEM - In a method for controlling access to an encrypted document, a computer receives a request to access the encrypted document, the access request comprising a user ID and a user password. The computer performs a one-way hash function on the user password to generate a hash value. The computer searches an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password. The computer decrypts the document password using the user password. The computer decrypts the encrypted document using the decrypted document password. | 2013-02-28 |
20130054977 | ENCRYPTED CHUNK-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector. | 2013-02-28 |
20130054978 | COMPUTING SYSTEM AND METHOD OF OPERATING COMPUTING SYSTEM - A computing system including a memory that is shared by a plurality of components of the computing system in order to exchange data between the plurality of components; and a controller configured to control the plurality of components to encrypt the data and to record the encrypted data in the memory. | 2013-02-28 |
20130054979 | SECTOR MAP-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned. | 2013-02-28 |
20130054980 | Secure Flash-based Memory System with Fast Wipe Feature - A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data pages, including loading each data page into a data shuffling buffer in a sequential order relative to other data pages in the page stripe, and thereafter unloading each data page in a non-sequential order relative to other data pages in the page stripe. The Flash controller is also configured to scramble the data pages of the page stripe by performing a bitwise logical operation on the data pages that are unloaded from the data shuffling buffer. A user key and one or more system keys are used to perform the shuffling and scrambling. The Flash controller is further configured to flush the user key by bypassing the system's backup power supply and performing an emergency system shutdown without backing up system data. | 2013-02-28 |
20130054981 | Branch Circuit Power Measurement and Dynamic Power Distribution - A mechanism is provided for dynamically changing power caps for a set of powered elements. Current being consumed by the set of powered elements P on a branch circuit is measured and available current on the branch circuit is determined. A new total power cap for a current time period t is identified based on a current total power cap and the measured current. A difference in total power caps (ΔTPC) is determined and, for each powered element p in the set of powered elements P at the current time period, a new power cap PC (p,t) is determined based on the previous power cap PC(p,t−1) and the difference of the total power caps to the set of powered elements P. A power cap of each powered element p is then dynamically set to the new power cap PC (p,t). | 2013-02-28 |
20130054982 | METHOD AND APPARATUS FOR CLOSING A PATHWAY OF A POWER SUPPLY CIRCUIT WITH A DOOR LOCK - An appliance including a motor drive, a power supply circuit electrically coupling the motor drive to a power supply, a cabinet having an opening, a door for opening and closing the opening of the cabinet, and a door lock. When the door lock is in a locked position, the door lock is configured to secure the door and close a pathway of the power supply circuit thereby enabling a current to travel from the power supply through a pre-charge circuit to the motor drive. | 2013-02-28 |
20130054983 | Methods of and Apparatus for Controlling Power Drawn by an Appliance through a USB Port - Methods of and apparatus for controlling power drawn by an appliance through a USB port. The method includes limiting any electrical current drawn by an appliance to one of seven levels according to whether the data lines receive a bias from a power line, the data lines are in electrical communication with each other, and the power source includes a host computing device, or according to logic and voltage levels of the data lines when any of the pull-down resistor and the current and voltage sources are connected or not connected to the D+ data line. The apparatus includes a controller programmed to selectively connect a pull-down resistor, a current source, and a voltage source to a D+ data line and to limit any electrical current drawn from a power source to one of the seven levels according to voltage levels on the D+ data line and a D− data line. | 2013-02-28 |
20130054984 | NETWORK DEVICE AND METHOD FOR THE NETWORK DEVICE TO SET OPERATION OF PORT - A network device and a method for the network device to set operation of a port are provided. The network device is connected to a set of power sourcing equipment (PSE) through a port, and the PSE powers the network device through the port. The network device includes an analysis module and a port control module. The analysis module judges whether the port of the network device is connected to the PSE. The port control module provides a port function switch instruction according to a judgment result of the analysis module, so as to enable or disable the port. | 2013-02-28 |
20130054985 | Branch Circuit Power Measurement and Dynamic Power Distribution - A mechanism is provided for dynamically changing power caps for a set of powered elements. Current being consumed by the set of powered elements P on a branch circuit is measured and available current on the branch circuit is determined. A new total power cap for a current time period t is identified based on a current total power cap and the measured current. A difference in total power caps (ΔTPC) is determined and, for each powered element p in the set of powered elements P at the current time period, a new power cap PC (p,t) is determined based on the previous power cap PC(p,t−1.) and the difference of the total power caps to the set of powered elements P. A power cap of each powered element p is then dynamically set to the new power cap PC (p,t). | 2013-02-28 |
20130054986 | METHOD AND APPARATUS FOR BOOTING ELECTRONIC DEVICE BASED ON USE CONTEXT - A method and apparatus for booting an electronic device are provided. The method includes collecting context information regarding the electronic device; determining whether a use of the electronic device is expected based on the collected context information; and when the use of the electronic device is expected, supplying electric power to at least one of predetermined elements of the electronic device. | 2013-02-28 |
20130054987 | SYSTEM AND METHOD FOR FORCING DATA CENTER POWER CONSUMPTION TO SPECIFIC LEVELS BY DYNAMICALLY ADJUSTING EQUIPMENT UTILIZATION - A system and method for forcing data center power consumption to specific levels by dynamically adjusting equipment utilization are provided. | 2013-02-28 |
20130054988 | INTEGRATED CIRCUIT DEVICE, SIGNAL PROCESSING SYSTEM AND METHOD FOR MANAGING POWER RESOURCES OF A SIGNAL PROCESSING SYSTEM - An integrated circuit device comprises a power resource management module for managing at least one power resource of a signal processing system. The power resource management module comprises an input for receiving an indication of an intended state change for the signal processing system. The power resource management module is arranged to calculate at least one power resource load prediction for implementing the indicated system state change in response to receiving the indication of an intended state change. The power resource management module comprises an output connectable to the at least one power resource of the signal processing system for configuring the at least one power resource to fulfill the at least one power resource load prediction. | 2013-02-28 |
20130054989 | Energy-Efficient Polling Loop - Logic is provided for increasing energy-efficiency of a data processing system. First logic continuously checks a plurality of I/O ports for incoming workload. Responsive to the incoming workload being lower than a low workload threshold for a current operating frequency, second logic reduces an operating frequency of the processor. Responsive to the incoming workload being higher than a high workload threshold, the second logic increases the operating frequency of the processor. | 2013-02-28 |
20130054990 | Method and System for Reducing Power Consumption in Wireless Communications - According to one disclosed embodiment, a method for reducing power consumption in wireless communications is described. This method may include transmitting a data transmission from a peripheral device to a primary device during a receiving interval of the primary device, receiving a correction offset by the peripheral device from the primary device after the transmitting of the data transmission, and transmitting a subsequent data transmission from the peripheral device to the primary device using the correction offset to ensure that the subsequent data transmission by the peripheral device occurs within a subsequent receiving interval of the primary device. | 2013-02-28 |
20130054991 | PROCESSOR WITH DIFFERENTIAL POWER ANALYSIS ATTACK PROTECTION - A device including a processor to perform an operation yielding a result, the processor including a register including bit it storage elements and including a first and second section, each element being operative to store a bit value, and a power consumption mask module to determine whether the whole result can be completely written in half or less than half of the register, determine a balancing entry if the result can be completely written in half or less than half of the register, a write module to perform a single write operation to the register including writing the result and the balancing entry to the first and second section, respectively, if the result can be completely written in half or less than half of the register else writing the result of the operation across at least part of the first and second section. Related apparatus and methods are also described. | 2013-02-28 |
20130054992 | DYNAMIC CONTROL OF REDUCED VOLTAGE STATE OF GRAPHICS CONTROLLER COMPONENT OF MEMORY CONTROLLER - A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller component of a memory controller. The reduction in voltage may cause the voltage to be reduced below a voltage level required to maintain context information in the graphics controller component. | 2013-02-28 |
20130054993 | BRANCH CIRCUIT DETERMINATION WITH SYNCHRONOUS CORRELATION - A system, and computer program product for relating a data processing system with a power branch circuit are provided in the illustrative embodiments. A second signal is combined with a power signal to form a combination signal, the power signal including a first power usage by the data processing system and a second power usage by a modulating signal. The second signal is synchronized with the modulating signal in the power signal. A determination is made whether an amplitude of a frequency of the second signal is increasing in the combined signal over a period. Responsive to the determining being affirmative, the data processing system is related with the power branch circuit. | 2013-02-28 |
20130054994 | Digital Signage Mode of Portable Device - A portable device includes a power component to receive power from a power source and a controller to transition the portable device from a power on state to a lower power state with a basic input output system (BIOS) of the portable device if the power component detects a loss of power received from the power source and transition the portable device from the lower power state to a digital signage mode with the BIOS if the power component receives power from the power source. | 2013-02-28 |