10th week of 2014 patent applcation highlights part 86 |
Patent application number | Title | Published |
20140068244 | METHOD AND APPARATUS FOR DELIVERING ENCRYPTED CONTENT TO WEB BROWSERS BASED ON ENTROPY OF THE CONTENT - An approach is provided for enabling a web browser to decrypt and to display encrypted information based on entropy calculations of the information. The decryption manager determines at least one entropy value for at least one element of at least one webpage. The decryption manager causes, at least in part, a decryption of the at least one element to generate at least one decrypted element based, at least in part, on a comparison of the at least one entropy value against one or more entropy threshold values. | 2014-03-06 |
20140068245 | SYSTEMS AND METHODS FOR HANDLING SSL SESSION NOT REUSABLE ACROSS MULTIPLE CORES - The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by the first core is non-resumable. Responsive to the indication, the core may set an indicator at a location in memory accessible by each core of the multi-core system, the indicator indicating that the SSL session is non-resumable. A second core of the multi-core system may receive a request to reuse the SSL session. The request may include a session identifier of the SSL session. In addition, the session identifier may identify the first core as an establisher of the SSL session. The second core can identify from encoding of the session identifier whether the second core is not the establisher of the SSL session. Responsive to the identification, the second core may determine whether to resume the SSL session. | 2014-03-06 |
20140068246 | CIRCUIT FOR SECURE PROVISIONING IN AN UNTRUSTED ENVIRONMENT - Embodiments of electronic circuits enable security of sensitive data in a design and manufacturing process that includes multiple parties. An embodiment of an electronic circuit can include a private key embedded within the electronic circuit that is derived from a plurality of components including at least one component known only to the electronic circuit and at least one immutable value cryptographically bound into messages and residing on the electronic circuit, public key generation logic that generates a public key to match the private key, and message signing logic that signs messages with the private key. | 2014-03-06 |
20140068247 | SECURITY DEVICE ACCESS - Technology is described to control a security device providing access to a restricted resource. The method can include generating a plurality of security access codes at a security locking device using at least one pre-configured symmetric key. The access codes may each be valid from predefined start times for varying time intervals. In a further operation, a candidate access code can be generated at a control server, using the same pre-configured symmetric key. The candidate access code from the control server can be provided to the security locking device. The security locking device can unlock when the candidate access code corresponds to at least one of a valid security access codes on the security locking device. | 2014-03-06 |
20140068248 | Learning a New Peripheral Using a Security Provisioning Manifest - A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to learn about a new peripheral not authorized to be attached to the computer and possibly gain authorization for the peripheral. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to authenticate and establish a secure encrypted session for communicating with each peripheral authorized to be attached to the computer. When an unauthorized peripheral is found, identifying information for the peripheral is transmitted to an enterprise provisioning server with a request to authorize the peripheral. | 2014-03-06 |
20140068249 | TRUST MANAGEMENT SYSTEMS AND METHODS - The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals. | 2014-03-06 |
20140068250 | SYSTEM AND METHOD FOR SECURE PROVISIONING OF AN INFORMATION HANDLING SYSTEM - Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor. The access controller may store an enterprise public key associated with an enterprise private key and a platform private key associated with the system. The access controller may be configured to: (i) authenticate communications received from a provisioning server communicatively coupled to the access controller based at least on an enterprise public certificate associated with the provisioning server and (ii) establish an asymmetrically cryptographic communications channel between the access controller and the provisioning server based at least on a platform public key associated with the platform private key, the platform private key, the enterprise public key, and the enterprise private key. | 2014-03-06 |
20140068251 | METHOD AND DEVICE FOR DYNAMICALLY UPDATING AND MAINTAINING CERTIFICATE PATH DATA ACROSS REMOTE TRUST DOMAINS - A method and device is provided for dynamically maintaining and updating public key infrastructure (PKI) certificate path data across remote trusted domains to enable relying parties to efficiently authenticate other nodes in an autonomous ad-hoc network. A certificate path management unit (CPMU) monitors a list of sources for an occurrence of a life cycle event capable of altering an existing PKI certificate path data. Upon determining that the life cycle event has occurred, the CPMU calculates a new PKI certificate path data to account for the occurrence of the life cycle event and provides the new PKI certificate path data to at least one of a relying party in a local domain or a remote CPMU in a remote domain. | 2014-03-06 |
20140068252 | PUBLIC KEY GENERATION UTILIZING MEDIA ACCESS CONTROL ADDRESS - In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted. | 2014-03-06 |
20140068253 | METHOD FOR REPRODUCING CONTENT DATA AND METHOD FOR GENERATING THUMBNAIL IMAGE - A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information; sending the reproduction management information to a user space; storing the decrypted content data in a secret buffer; obtaining the decrypted content data as reproduction target data from the secret buffer and transmitting the reproduction target data to a decoder; and decoding the reproduction target data by the decoder. | 2014-03-06 |
20140068254 | UPLOAD AND DOWNLOAD STREAMING ENCRYPTION TO/FROM A CLOUD-BASED PLATFORM - Embodiments of the present disclosure include systems and methods for upload and/or download streaming encryption to/from an online service, or cloud-based platform or environment. The encryption process includes the following parts: Upload encryption, download decryption, and a central piece of infrastructure called the Interval Key Server (IKS). During both upload and download, the encryption and decryption processes are performed while the files are being uploaded/downloaded, (e.g., the files are being encrypted/decrypted as they are being streamed). | 2014-03-06 |
20140068255 | METHOD OF MANAGING MEDICAL INFORMATION IN OPERATING SYSTEM FOR MEDICAL INFORMATION DATABASE - Provided is a method of managing medical information in an operating system for a medical information database, the method including encrypting, by a first user, medical information having patient treatment information by using a group key, and second medical information having patient private key by using a private key, generating, by the first user, an index corresponding to the encrypted first medical information, storing the encrypted first and second medical information and the index to the medical information database, searching, by a second user, the medical information database for the encrypted first medical information by using the index; and decrypting the searched encrypted first medical information by using the group key. | 2014-03-06 |
20140068256 | METHODS AND APPARATUS FOR SECURE MOBILE DATA STORAGE - A computer-implemented method for securing data to be stored in a computing device programmed to perform the method includes determining in the computing device, a save request from an application running upon the computing device to an operating system of the computing device to save a file in a memory of the computing device, determining in the computing device, whether a first key is available, and when the first key is available, the method includes automatically encrypting in the computing device, the file using the first key to form an encrypted file, in response to the save request, and automatically requesting with the computing device, the operating system of the computing device to store the encrypted file in the memory. | 2014-03-06 |
20140068257 | METHOD FOR HANDLING PRIVACY DATA - The present invention aims to improve data protection against illegal access by a strong differentiation of the security level specific on a type of data so that when the protection on a part of the data is violated, the remaining data are still inaccessible. A method for controlling access, via an open communication network, to user private data, comprising steps of: dividing the user private data into a plurality of categories, each category defining a privacy level of the data, encrypting the user private data of each category with a category key pertaining to the category of the data, attributing to a stakeholder an entity configured for accessing to at least one category of user private data, and authorizing the access to the at least one category of user private data for the entity of the stakeholder, by providing the stakeholder with the category keys required for decrypting the user private data of the corresponding category. | 2014-03-06 |
20140068258 | Backup and restore in a secure appliance with integrity and confidentiality - A cloud deployment appliance includes a key stored internally and that is used during restore to decrypt encrypted backup images. That key is not available to an administrator of the appliance; instead, the administrator receives a “value” that has been generated externally to the appliance and, in particular, by applying a public key of a public key pair to the key. The value is possessed by the administrator, but it does not expose the key. Upon a given occurrence, such as a disk failure in the appliance, the administrator uses the value to obtain” the key, which is then used to restore an encrypted backup image. The key is obtained by having the administrator provide the value to an entity, e.g., the appliance manufacturer, who then recovers the key for the administrator (by applying the private key of the public key pair). | 2014-03-06 |
20140068259 | SECURE DATA ACCESS IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module receiving an access request regarding a data object, where the access request includes a data object identifier, requestor information, and addressing information. The method continues with the DS processing module determining a base key identifier based on the access request and determining content specific information based on the access request. The method continues with the DS processing module retrieving a set of base key slices utilizing the base key identifier and decoding the set of base key slices in accordance with an error encoding function to recover a base key. The method continues with the DS processing module generating an access specific key based on the recovered base key and the content specific information and executing the access request regarding the data object utilizing the access specific key. | 2014-03-06 |
20140068260 | ENCRYPTED CONTENT STREAMING - Encrypted content streaming is provided by a method comprising holding an encrypted content stream that is cryptographically encrypted from a content stream with a content key, and holding an encrypted content key that is cryptographically encrypted from the content key with one or more blackout encryption keys. Each blackout encryption key is paired to a blackout decryption key corresponding to a specific audience, and each blackout decryption key is obtainable by audiences other than the specific audience corresponding to the blackout decryption key. The method further comprises serving the encrypted content stream to the plurality of different audiences. The encrypted content stream is embedded with a leaf license comprising the encrypted content key, and the encrypted content key is cryptographically decryptable by audiences having the one or more blackout decryption keys paired to the one or more blackout encryption keys. | 2014-03-06 |
20140068261 | Methods And Apparatus For Use In Sharing Credentials Amongst A Plurality Of Mobile Communication Devices - Techniques for use in sharing a plurality of credential objects of a user account amongst a plurality of mobile devices operative in a wireless network are described. In one illustrative example, a network infrastructure (e.g. a cloud) stores a plurality of encrypted credential objects in association with the user account. Each encrypted credential object is encrypted with a credential key. The network infrastructure also stores a plurality of encrypted forms of the credential key in association with the user account. Each encrypted form of the credential key is encrypted with a respective one of a plurality of device keys. Each device key is stored at respective one of the mobile devices. The network infrastructure provides, to the mobile devices, access to the encrypted credential key and the encrypted credential objects. | 2014-03-06 |
20140068262 | Secure Message Forwarding With Sender Controlled Decryption - Methods, apparatuses, and computer program products are provided for facilitating the secure transmission and storage of data. In this regard, a method is provided that comprises causing data encrypted by a sender system to be received at a service provider system; causing the data as encrypted by the sender system to be stored at the service provider system; receiving a request for the data from a recipient system; determining the recipient system is authorized to receive the data; and causing the data as encrypted to be transmitted to the sender system. | 2014-03-06 |
20140068263 | SUBSYSTEM AUTHENTICITY AND INTEGRITY VERIFICATION (SAIV) - Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security. | 2014-03-06 |
20140068264 | SYSTEM AND METHOD FOR PROTECTING DIGITAL CONTENTS WITH DIGITAL RIGHTS MANAGEMENT (DRM) - An approach for protecting digital contents includes a content delivery phase wherein a client stores digital contents or retrieves them in streaming, transmits to a user device the digital content in a protected format along with an enabling code for enabling the user device to access or read the protected digital content. The approach includes a key generation phase in a DRM (Digital Right Management) server which derives at least one key for encrypting the digital contents. A key transmission phase involves the derived key being transmitted from the DRM server to the client. For decrypting the digital content, the user device requests the key from the DRM server, with the request including a key identification defined by the enabling code transmitted by the client to the user device which is used by the DRM server to derive the key for the user device. | 2014-03-06 |
20140068265 | METHOD AND SYSTEM FOR TRANSMITTING DATA WITHIN A SECURE COMPUTER SYSTEM - Methods and systems related to the secure transmission of information within a vehicle's computing systems are presented. Transmitting a message within the secure computer system includes receiving a message that includes a remote encryption key from a module, validating the module, loading security metadata, then validating the security metadata using the remote encryption key. Thereafter, the valid destination modules are determined and the message is sent to them. Metadata labels may be securely attached to data using a local encryption key, in order to maintain the integrity of the data. | 2014-03-06 |
20140068266 | MULTIPLE PROFILE AUTHENTICATION - A system and method includes a service provider registering a plurality of profile IDs with a central authority and providing the profile IDs to an institution where the profile IDs are utilized by the institution for authentication of individual users, authorized to act on behalf of the institution. Each profile ID corresponds to an authentication template for the respective user, and the authentication templates are stored by the central authority. A first user transmits an electronic communication, first authentication information, and an indication of a first profile ID, which is received by the service provider. The service provider then receives the first authentication template from the central authority, which may be requested. The first authentication information is then matched to the first authentication template, and additional actions can be taken with respect to the communication after successful matching. | 2014-03-06 |
20140068267 | UNIVERSAL SECURE MESSAGING FOR CRYPTOGRAPHIC MODULES - An anonymous secure messaging method and system for securely exchanging information between a host computer system and a functionally connected cryptographic module. The invention comprises a Host Security Manager application in processing communications with a security executive program installed inside the cryptographic module. An SSL-like communications pathway is established between the host computer system and the cryptographic module. The initial session keys are generated by the host and securely exchanged using a PKI key pair associated with the cryptographic module. The secure communications pathway allows presentation of critical security parameter (CSP) without clear text disclosure of the CSP and further allows use of the generated session keys as temporary substitutes of the CSP for the session in which the session keys were created. | 2014-03-06 |
20140068268 | INFORMATION PROCESSING APPARATUS AND METHOD - To limit use of content, when a source receives a request for transmitting content from a sink, the source performs an authentication process. When the authentication is successful, the source transmits to the sink key information necessary for decrypting the encryption applied to the content. The sink can receive the content by receiving the key information and by decrypting the encryption applied to the content by using the key information. | 2014-03-06 |
20140068269 | METHOD, APPARATUS, AND SYSTEM FOR INTERACTION BETWEEN WEB CLIENT AND SERVER - A method, an apparatus, and a system for interaction between a Web client and a server are provided. The method includes: sending a web page download request to the server; receiving a returned web page download response; parsing the web page download response, and extracting a scripting language program code from web page contents included in the web page download response; determining, when the scripting language program code is loaded in a script engine of the Web client, whether the loaded scripting language program code is a scripting language program code in ciphertext format, and if it is in ciphertext format, calling a decryption module first to perform decryption on the scripting language program code in ciphertext format, to obtain a scripting language program code in plaintext format, and then executing, by the script engine, the scripting language program code in plaintext format loaded in the script engine. | 2014-03-06 |
20140068270 | Systems And Methods For Device Based Secure Access Control Using Encryption - The present invention in a preferred embodiment provides for systems and methods for ensuring and enabling secure access to one or more virtual locations or virtual data, by a user, wherein the said systems comprise of
| 2014-03-06 |
20140068271 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 2014-03-06 |
20140068272 | STRONG AUTHENTICATION TOKEN WITH ACOUSTIC DATA INPUT OVER MULTIPLE CARRIER FREQUENCIES - Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed. The tokens may also include an optical interface for receiving input data and may have a selection mechanism to select either the acoustical or the optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device. The acoustic signal received by the token may comprise a plurality of modulated carrier frequencies whereby each carrier frequency has been modulated with a data signal representing the full input data such that the input data are redundantly emitted over more than one modulated carrier frequency. | 2014-03-06 |
20140068273 | Secure App Ecosystem with Key and Data Exchange According to Enterprise Information Control Policy - Multiple apps of an ecosystem on a computer securely exchange encrypted data according to an information control policy of an enterprise, without allowing unauthorized access from outside of the ecosystem. An ecosystem agent creates an ecosystem directory, which contains policy information and identification information concerning each specific app in the ecosystem, including the ecosystem agent. Each ecosystem app generates an asymmetric key pair, the public key of which it shares only with apps in the ecosystem through the directory. The ecosystem agent's private key is used to encrypt the directory. Data is securely communicated between apps in the ecosystem, by encrypting and decrypting messages and data objects with the appropriate ecosystem app keys. Each specific app in the ecosystem complies with enterprise information control policy. Ecosystem apps can read a policy from the directory, and receive policy updates from the enterprise. | 2014-03-06 |
20140068274 | MECHANISM FOR FACILITATING ENCRYPTION-FREE INTEGRITY PROTECTION OF STORAGE DATA AT COMPUTING SYSTEMS - A mechanism is described for facilitating encryption-free integrity protection of storage data at computing systems according to one embodiment. A method of embodiments of the invention includes receiving a read request, from a software application at a computing device, to perform a read task relating to a first data block of data stored at a storage device coupled to the computing device. The read task may include reading the first data block. The method may further include accessing a first reference cryptographic code at a first metadata cache associated with the first data block, calculating a first new cryptographic code relating to the first data block, comparing the first new cryptographic code with the first reference cryptographic code, and accepting the read request if the first new cryptographic code matches the first reference cryptographic code. The accepting may further include facilitating the read task | 2014-03-06 |
20140068275 | Measuring Platform Components With A Single Trusted Platform Module - In accordance with some embodiments, a single trusted platform module per platform may be used to handle conventional trusted platform tasks as well as those that would arise prior to the existence of a primary trusted platform module in conventional systems. Thus one single trusted platform module may handle measurements of all aspects of the platform including the baseboard management controller. In some embodiments, a management engine image is validated using a read only memory embedded in a chipset such as a platform controller hub, as the root of trust. Before the baseboard management controller (BMC) is allowed to boot, it must validate the integrity of its flash memory. But the BMC image may be stored in a memory coupled to a platform controller hub (PCH) in a way that it can be validated by the PCH. | 2014-03-06 |
20140068276 | INFORMATION PROCESSING APPARATUS - A hardware TPM has a plurality of registers, and performs data protection by encryption of data associated with the value of one of the plurality of registers. A register number manager manages, for each application, a register number used for the data protection. During execution of an application, an application executor issues a data protection request that designates a register number preset in the application. A software TPM transfers, to the hardware TPM, the data protection request in which the register number designated in the data protection request has been replaced with the register number managed by the register number manager. | 2014-03-06 |
20140068277 | Secure Deletion of Data Stored in a Memory - In accordance with some embodiments, a granularity of memory such as block, may be deleted in a way to make it very difficult for an interloper to ever gain access to that block. Moreover the deletion may be done in a sufficiently efficient way and in a way that does not overly burden the user. In some embodiments, the encryption of the granularity of memory (such as a block) may be handled entirely within the memory. Then the encryption process cannot be accessed from the outside and the user need not be burdened with the sequence of encryption sequence since it is done automatically within the storage device. | 2014-03-06 |
20140068278 | MANUFACTURING METHOD - According to one embodiment, a manufacturing method of a device to be authenticated, wherein the device includes a first memory area which is prohibited from data-reading and data-writing after shipping from a memory vendor; a second memory area which is allowed to data-read from outside after shipping from the memory vendor; and a third memory area which is allowed to data-read and data-write from outside after sipping from the memory vendor. | 2014-03-06 |
20140068279 | SYSTEMS, METHODS, AND MEDIUMS FOR SECURE INFORMATION ACCESS - Systems, methods, and tangible computer-readable storage mediums for secure access to information are presented. More particularly, embodiments relate to encrypting at least part of the information using an information-specific key or a key symmetric to the information-specific key; encrypting the information-specific key using a first public key; encrypting a first private key; and storing in memory the encrypted information, encrypted first private key, and the encrypted information-specific key. Some further embodiments include: decrypting the first private key; decrypting the information-specific key using the first private key; and decrypting at least part of the information using the information-specific key. | 2014-03-06 |
20140068280 | SECURITY CHIP, PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM - There is provided a security chip having a tamper-resistant feature, including an acquisition part configured to acquire specific information transmitted by a device performing challenge-response authentication, the specific information being specific to the device, a storage configured to store second key information that enables generation of first key information from the specific information, the first key information being used by the device for challenge-response authentication, and a generation part configured to generate, using the second key information, the first key information from the specific information. A response to be transmitted to the device is generated, using the first key information, from a challenge transmitted by the device. In the device, the first key information is not stored in a tamper-resistant security chip. | 2014-03-06 |
20140068281 | MECHANISM FOR FACILITATING EFFICENT OPERATIONS PATHS FOR STORAGE DEVICES IN COMPUTING SYSTEMS - A mechanism is described for facilitating efficient operations paths for storage devices in computing systems according to one embodiment of the invention. A method of embodiments of the invention includes identifying a request for power mode change at a storage device at a computing system. The request for power mode change indicates potential reduced power state of the storage device. The method may further include transferring context information at the storage device to a host memory at the computing system, in response to the first command, and saving the context information at the host memory, wherein the storage device is at reduced power state. | 2014-03-06 |
20140068282 | INFORMATION HANDLING SYSTEM CONFIGURATION FOR POWER SYSTEM OUTPUT CAPABILITY - An IHS configuration system includes a plurality of IHS components including a processor system having a first maximum load current. A power system controller is coupled to the plurality of IHS components and operable to couple to a power supply. The power system controller is operable to retrieve a power output limit of the power system and determine a first system power budget for the plurality of IHS components using the first maximum load current of the processor system. The power system controller then determines whether the first system power budget exceeds the power output limit and, in response to the first system power budget exceeding the power output limit, the power system controller provides a second maximum load current for the processor system to create a second system power budget that does not exceed the power output limit. | 2014-03-06 |
20140068283 | SYSTEMS AND METHODS FOR SYSTEM POWER ESTIMATION - Methods and systems for system power estimation are provided. A method implemented in a computer infrastructure includes separating products into different segments. The method also includes calculating a power estimation for each segment based on operating conditions of each respective segment. The method further includes calculating an average system power estimation. At least one of the separating, calculating the power estimation, and calculating the average system power estimation is performed using a processor. | 2014-03-06 |
20140068284 | Configuring Power Management Functionality In A Processor - In one embodiment, a multicore processor includes cores that can independently execute instructions, each at an independent voltage and frequency. The processor may include a power controller having logic to provide for configurability of power management features of the processor. One such feature enables at least one core to operate at an independent performance state based on a state of a single power domain indicator present in a control register. Other embodiments are described and claimed. | 2014-03-06 |
20140068285 | DYNAMIC VOLTAGE FREQUENCY SCALING METHOD AND APPARATUS - System-on-a-chip (SOC) includes a dynamic voltage frequency scaling (DVFS) control unit; and a central processing unit (CPU) to operate the DVFS control unit. By using the DVFS control unit, a DVFS table may be selectively used according to any of various scenarios or modes of operation, thereby performing DVFS control. | 2014-03-06 |
20140068286 | ADAPTIVE COMPUTING SYSTEM WITH MODULAR CONTROL, SWITCHING, AND POWER SUPPLY ARCHITECTURE - The adaptive computing system described herein may generally include a modular control, switching, and power supply architecture. In particular, the adaptive computing system may provide a platform supporting multiple independent desktop computer modules that occupy less physical space than a standalone commercial computer, provide performance density comparable to current server solutions, and address concerns relating to stability, safety, productivity, performance, assembly, service, and other factors important to diverse desktop computer user communities. Moreover, mechanical, electrical, and functional components associated with the adaptive computing system may have various certifications or otherwise be relied upon to demonstrate compliance with criteria in regulatory, environmental, consumer safety, and other contexts. | 2014-03-06 |
20140068287 | POWER GATED COMMUNICATION CONTROLLER - A method includes detecting a communication event over a communication bus | 2014-03-06 |
20140068288 | METHOD AND DEVICE WITH ENHANCED BATTERY CAPACITY SAVINGS - An enhanced battery saving capacity device ( | 2014-03-06 |
20140068289 | MECHANISM FOR REDUCING INTERRUPT LATENCY AND POWER CONSUMPTION USING HETEROGENEOUS CORES - A technique for operating a processor includes detecting an interrupt having a first core of the processor as a destination core. The technique includes handling the interrupt by a second core of the processor in response to the first core being in a low-power state. The first core may be capable of executing a greater number of instructions-per-cycle than the second core and the second core may consume less power than the first core. The first core may be coupled to a first voltage plane and the second core may be coupled to a second voltage plane having lower power than the first voltage plane. | 2014-03-06 |
20140068290 | Configuring Power Management Functionality In A Processor - In one embodiment, a multicore processor includes cores that can independently execute instructions, each at an independent voltage and frequency. The processor may include a power controller having logic to provide for configurability of power management features of the processor. One such feature enables at least one core to operate at an independent performance state based on a state of a single power domain indicator present in a control register. Other embodiments are described and claimed. | 2014-03-06 |
20140068291 | Performing Cross-Domain Thermal Control In A Processor - In an embodiment, a processor includes a first domain with at least one core to execute instructions and a second domain coupled to the first domain and including at least one non-core circuit. These domains can operate at independent frequencies, and a power control unit coupled to the domains may include a thermal logic to cause a reduction in a frequency of the first domain responsive to occurrence of a thermal event in the second domain. Other embodiments are described and claimed. | 2014-03-06 |
20140068292 | Power switch system and method thereof - A power switch system for a computer system includes a power supply module for generating a system operational power source and a power transistor driving source according to an external power source, a control module for generating a control signal according to a feedback signal, and a power switch module coupled to the power supply module and a control module for adjustably outputting the system operational power source and the power transistor driving source to a power source module, wherein the feedback signal is utilized to determine an operational mode of the computer system to be a high performance operational mode or a power saving operational mode. | 2014-03-06 |
20140068293 | Performing Cross-Domain Thermal Control In A Processor - In an embodiment, a processor includes a first domain with at least one core to execute instructions and a second domain coupled to the first domain and including at least one non-core circuit. These domains can operate at independent frequencies, and a power control unit coupled to the domains may include a thermal logic to cause a reduction in a frequency of the first domain responsive to occurrence of a thermal event in the second domain. Other embodiments are described and claimed. | 2014-03-06 |
20140068294 | POWER USAGE MANAGEMENT - The invention relates to a method of influencing power consumption of a process being executed on a computer system, comprising calculating an estimate of usage of at least one system resource by the process, converting the estimate of usage into a power consumption estimate, monitoring a time period during which the process is in an idle state and influencing at least one aspect of the computer system if the power consumption estimate exceeds a predefined limit while the process is in an idle state. Preferably this influencing comprises automatic termination of the process if the power consumption estimate exceeds the predefined limit. The at least one system resource may be selected from the group of: a central processing unit (CPU), a storage medium such as a hard disk, a monitor, a graphics card and a communications bus. | 2014-03-06 |
20140068295 | METHODS AND SYSTEMS FOR MANAGING DATA - Systems and methods for managing data, such as metadata or indexes for index databases. In one exemplary method, different processing priorities are assigned to different indexing tasks based upon the origin of the task. In another exemplary method, indexing tasks are processed in a first mode when a data processing system is in a first power state and indexing tasks are processed in a second mode when the data processing system is in a second power state. | 2014-03-06 |
20140068296 | METHODS AND SYSTEMS FOR DYNAMICALLY CONTROLLING OPERATIONS IN A NON-VOLATILE MEMORY TO LIMIT POWER CONSUMPTION - Systems and methods are disclosed for limiting power consumption of a non-volatile memory (NVM) using a power limiting scheme that distributes a number of concurrent NVM operations over time. This provides a “current consumption cap” that fixes an upper limit of current consumption for the NVM, thereby eliminating peak power events. In one embodiment, power consumption of a NVM can be limited by receiving data suitable for use as a factor in adjusting a current threshold from at least one of a plurality of system sources. The current threshold can be less than a peak current capable of being consumed by the NVM and can be adjusted based on the received data. A power limiting scheme can be used that limits the number of concurrent NVM operations performed so that a cumulative current consumption of the NVM does not exceed the adjusted current threshold. | 2014-03-06 |
20140068297 | STATE CONTROL METHOD AND APPARATUS AND PORTABLE TERMINAL - The embodiments of the present application provide a method and a state control apparatus as well as a portable terminal. The method is applied in a first system connected to a second system and includes: detecting, by the first system, a first event; determining a first state of the first system and a second state of the second system when the first event is a first predetermined event; obtaining a predetermined policy including a first control command and a second control command based on the first state of the first system, the second state of the second system and the first predetermined event; and controlling, by the first system, its own state based on the first control command and transmitting the second control command to the second system such that the second system is switched from the second state to a fourth state. The second system has different power consumptions in the second state and the fourth state. With the embodiments of the present application, in a portable terminal of hybrid system architecture, the system states of the first and second systems can be controlled in a coordinated manner, such that the power consumption can be reduced when both systems are operating cooperatively. | 2014-03-06 |
20140068298 | SYSTEM AND PROCESS FOR ACCOUNTING FOR AGING EFFECTS IN A COMPUTING DEVICE - Embodiments of the claimed subject matter are directed to methods and systems that allow tracking and accounting of wear and other aging effects in integrated circuits and products which include integrated circuits over time, and the dynamic adjustment of operating conditions to increase or decrease wear in response to the accumulated wear relative to the expected wear during the lifetime of the circuit and/or product. | 2014-03-06 |
20140068299 | PROCESSOR, INFORMATION PROCESSING APPARATUS, AND POWER CONSUMPTION MANAGEMENT METHOD - When a result of detection by a current sensor | 2014-03-06 |
20140068300 | MICROCONTROLLER - To provide a microcontroller that can operate in a low power consumption mode. The microcontroller includes a CPU, a memory, and a peripheral circuit such as a timer circuit. A register of the peripheral circuit is formed at an interface with a bus line. A power gate is provided for control of power supply, and the microcontroller can operate in the low power consumption mode where some circuits alone are active, in addition to in a normal operation mode where all circuits are active. A register with no power supply in the low power consumption mode, such as a register of the CPU, includes a volatile memory and a nonvolatile memory. | 2014-03-06 |
20140068301 | Semiconductor Device and Electronic Device - To reduce a variation in the electrical characteristics of a transistor. A potential generated by a voltage converter circuit is applied to a back gate of a transistor included in a voltage conversion block. Since the back gate of the transistor is not in a floating state, a current flowing through the back channel can be controlled so as to reduce a variation in the electrical characteristics of the transistor. Further, a transistor with low off-state current is used as the transistor included in the voltage conversion block, whereby storage of the output potential is controlled. | 2014-03-06 |
20140068302 | MECHANISM FOR FACILITATING FASTER SUSPEND/RESUME OPERATIONS IN COMPUTING SYSTEMS - A mechanism is described for facilitating faster suspend/resume operations in computing systems according to one embodiment of the invention. A method of embodiments of the invention includes initiating an entrance process into a first sleep state in response to a sleep call at a computing system, transforming from the first sleep state to a second sleep state. The transforming may include preserving at least a portion of processor context at a local memory associated with one or more processor cores of a processor at the computing system. The method may further include entering the second sleep state. | 2014-03-06 |
20140068303 | CIRCUIT ARRANGEMENT AND METHOD FOR LOW POWER MODE MANAGEMENT - For example, a circuit arrangement is provided comprising a clock generator configured to generate a clock signal, a circuit having a low power mode, and a controller, configured to receive, when the circuit is in the low power mode, a request specifying that the circuit should return from the low power mode and trigger the circuit to return from the low power mode when the number of clock cycles of the clock signal since the reception of the request has reached a threshold value. | 2014-03-06 |
20140068304 | METHOD AND APPARATUS FOR POWER REDUCTION DURING LANE DIVERGENCE - A method and device for reducing power during an instruction lane divergence includes idling an inactive execution lane during the lane divergence. | 2014-03-06 |
20140068305 | CIRCUIT SYSTEM AND SEMICONDUCTOR DEVICE - A circuit system includes: a plurality of memory blocks; a power supply circuit configured to supply operating power and substrate power to the plurality of memory blocks; a plurality of first power supply switches configured to control whether or not the operating power is supplied from the power supply circuit to the plurality of memory blocks; and a control circuit configured to control the power supply circuit and the plurality of first power supply switches, wherein the control circuit changes a voltage of the operating power to be supplied by the power supply circuit and a voltage of the substrate power to be supplied by the power supply circuit, based on a state of whether the first power supply switches are in a supplying state or a blocking state. | 2014-03-06 |
20140068306 | LOW POWER DETECTION APPARATUS AND METHOD FOR DISPLAYING INFORMATION - A low power detection apparatus and a method for displaying information are provided. When a low power manager drives a proximity detection sensor to generate a proximity interrupt in a state within which the portable terminal is in an idle state, the low power manager drives a motion detection sensor and determines a motion of the portable terminal for a preset time. When there is no motion of the portable terminal for the preset time, the low power manager generates proximity data for displaying screen information and then transmits the generated proximity data to an application processor so as to display screen information which the user desires with low power. | 2014-03-06 |
20140068307 | ENHANCED POWER SAVING OPTIMIZED CONFIGURATION HANDLING - Methods and apparatus, including computer program products, are provided for power savings. In one aspect there is provided a method. The method may include sending, by a user equipment, an indication to a network, wherein the indication represents whether there is a preference for power savings at the user equipment; and performing, at the user equipment when the indication is sent, one or more actions to implement power savings at the user equipment. Related apparatus, systems, methods, and articles are also described. | 2014-03-06 |
20140068308 | PORTABLE TERMINAL, METHOD AND PROGRAM FOR EXECUTING TRANSMISSION AND RECEPTION OF DATA - To provide a portable terminal, method or/and program that can reduce the energy consumption by automatically transmitting and receiving data based on the signal strength, rather than the user manually transitioning from sleep mode to active mode. The terminal processing means | 2014-03-06 |
20140068309 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING STARTUP CURRENT OF STORAGE SERVER - In a method for controlling a startup current of a storage server, a current of each storage nodes of the storage server is detected by a current sensor when the storage server is turned on. The method calculates a power of each storage node, and a total power of the storage server. When the total power of the storage server is greater than a threshold value, one or more storage nodes are turned off, and the storage nodes are grouped according to the calculated powers. The method further determines a startup sequence of groups of the storage nodes, and controls the groups of the storage nodes to start up according to the startup sequence, to avoid inrush current when a power supply provides power to all of the storage nodes simultaneously. | 2014-03-06 |
20140068310 | SYSTEMS AND METHODS FOR IMPLEMENTING PERSISTENT BATTERY SHUTDOWN FOR INFORMATION HANDLING SYSTEMS - Systems and methods are provided for implementing a persistent battery system shutdown condition when a battery pack voltage level drops below a predetermined minimum acceptable operating voltage threshold that is above a pre-determined permanent failure operating voltage threshold at which the battery pack is permanently disabled. The disclosed systems and methods may be implemented such that shutdown portion of the power-consuming components of the information handling system are not allowed to be restarted until external power has been first provided and applied to at least partially recharge the battery cells of the battery pack to a battery voltage level that is above the minimum acceptable operating voltage threshold and/or when sufficient external power is applied to power the information handling system and at the same time charge the battery cells of the battery pack. | 2014-03-06 |
20140068311 | POWER EXCURSION WARNING SYSTEM - A power excursion warning system includes a power system having a first slew rate. A powered component is coupled to the power system. The powered component voltage regulator has a second slew rate that is greater than the first slew rate. A powered component voltage regulator is coupled to the powered component and operable to convert a first voltage received from the power system to a second voltage that is supplied to the powered component. A power excursion warning device is coupled to the powered component voltage regulator and operable to receive a signal from the powered component voltage regulator that is associated with the second slew rate, determine that the signal indicates a power excursion that will result in the power system operating outside a predetermined range, and produce a warning signal indicative of the power excursion. | 2014-03-06 |
20140068312 | SEQUENCE POWER CONTROL - The present disclosure includes apparatuses and methods for sequence power control. A number of embodiments include executing a number of sequences associated with a number of commands, wherein a number of logical unit (LUN) controllers execute the number of sequences by locating power consumption information and a starting address of the number of sequences stored in a data structure on the number of LUN controllers. | 2014-03-06 |
20140068313 | STORAGE DEVICE - A storage device of an embodiment includes a voltage measurement unit that measures a voltage of power supplied from a host, a volatile memory, a non-volatile memory including a saving area and a normal area, a data compression and decompression unit, and a controller. The controller includes a power-supply voltage determining unit which compares the voltage measured by the voltage measurement unit to a predetermined threshold value, a data saving unit which writes compression user data obtained by compressing user data by the data compression and decompression unit in the saving area when the voltage is less than the predetermined threshold value and the user data is included in the volatile memory, and a data rewriting unit which writes the compression user data that is decompressed in the normal area when the compression user data is included in the saving area at the time of supplying the power. | 2014-03-06 |
20140068314 | PORTABLE ELECTRONIC DEVICE AND METHOD FOR MANAGING BATTERY POWER CONSUMPTION - Terminals, apparatuses and methods for managing battery power consumption in a device, including: one or more battery consumption elements; a battery consumption management device to determine a real time power consumption of the one or more battery consumption elements and to determine a power consumption status of the one or more battery consumption elements based on the determined real time power consumption; and a controller to control operations of the one or more battery consumption elements and the battery consumption management device and to provide real-time battery consumption information corresponding to the determined power consumption status. Accordingly, by providing the real-time battery consumption information, operation of the one or more battery consumption elements of the device may selectively stopped or continued based on the provided real-time battery consumption information and, therefore, battery power consumption may be more efficient. | 2014-03-06 |
20140068315 | METHOD AND SYSTEM FOR CLOCK OFFSET AND SKEW ESTIMATION - This invention relates to methods and devices for clock offset and skew estimation. The invention has particular application in the alignment of slave clocks to a master clock. In embodiments of the invention, the slave clock employs an independent free running clock and a recursive estimation technique to estimate the clock offset and clock skew between the slave and master clocks. The slave can then use the offset and skew to correct the free running clock to reflect an accurate image of the master clock. | 2014-03-06 |
20140068316 | DETERMINATION SUPPORT APPARATUS, DETERMINING APPARATUS, MEMORY CONTROLLER, SYSTEM, AND DETERMINATION METHOD - A determination support apparatus includes a detecting unit that detects a phase difference between a first clock signal and a second clock signal that is identical in frequency to the first clock signal; a control unit that controls delay of at least one among the first clock signal and the second clock signal such that the detected phase difference becomes less than a given amount; and an acquiring unit that acquires values of a given clock signal among the first clock signal and the second clock signal, among which at least one has been subject to delay control by the control unit, wherein the acquiring unit acquires the values of the given clock signal at a timing that is based on a clock signal that is other than the given clock signal and among the first clock signal and the second clock signal. | 2014-03-06 |
20140068317 | PERIPHERAL DEVICE SHARING IN MULTI HOST COMPUTING SYSTEMS - The present subject matter discloses methods and systems of sharing of peripheral devices in multi host computing systems ( | 2014-03-06 |
20140068318 | MEMORY SYSTEM AND CONTROL METHOD - According to one embodiment, a memory system includes a first memory, a second memory, and a control unit. The first memory includes a volatile first register retaining a first operation parameter. The control unit performs a first operation of retaining the first operation parameter in the second memory. Then, the control unit turns OFF the first memory while retaining the first operation parameter in the second memory when an operation mode is switched from a first mode to a power saving second mode. Then, the control unit performs a second operation of turning on the first memory, and transferring the first operation parameter retained in the second memory to the first register when the operation mode is switched from the second mode to the first mode. | 2014-03-06 |
20140068319 | Error Detection And Correction In A Memory System - An apparatus including at least one memory controller; and a plurality of random access memories, where the at least one memory controller is configured to allocate the plurality of random access memories among at least a first portion, a second portion and a third portion. The first portion is configured to store protected data. The second portion is configured to store parity information for the stored protected data. The third portion is configured to store unprotected data. | 2014-03-06 |
20140068320 | ADJUSTING DISPERSED STORAGE ERROR ENCODING PARAMETERS - A method begins by a processing module receiving a large data file for storage in a dispersed storage network (DSN) and determining initial dispersed storage error encoding parameters. The method continues with the processing module encoding, during a first time interval of receiving the large data file, first data segments of the large data file using the initial dispersed storage error encoding parameters to produce a first plurality of sets of encoded data slices. The method continues with the processing module writing the first plurality of sets of encoded data slices to the DSN and monitoring processing of the writing to produce first write processing performance information. When the first write processing performance information compares unfavorably to a desired write performance range, the method continues with the processing module adjusting, for a second time interval, the initial dispersed storage error encoding parameters to produce adjusted dispersed storage error encoding parameters. | 2014-03-06 |
20140068321 | MEMORY DEVICE AND INTEGRATED CIRCUIT - A memory device includes a nonvolatile memory, operated by using a plurality of voltages and configured to output stored repair information in response to a boot-up signal, a plurality of registers configured to store the repair information output from the nonvolatile memory, a plurality of memory banks configured to replace a normal cell with a redundancy cell using the repair information stored in registers corresponding to the plurality of memory banks among the plurality of registers, and a boot-up control circuit configured to activate the boot-up signal at a time of stabilization of the plurality of voltages. | 2014-03-06 |
20140068322 | IIMPLEMENTING DRAM COMMAND TIMING ADJUSTMENTS TO ALLEVIATE DRAM FAILURES - A method, system and computer program product are provided for implementing command timing adjustments to alleviate Dynamic Random Access Memory (DRAM) failures in a computer system. A predefined DRAM failure is detected. Responsive to the detected failure, a set of timers is adjusted for controlling predetermined timings used to access the DRAM. Responsive to the failure being resolved by the adjusted set of timers, checking for a predetermined level of performance is performed. | 2014-03-06 |
20140068323 | REMAPPING DISK DRIVE I/O IN RESPONSE TO MEDIA ERRORS - A method for handling media errors during a read operation on a data storage device. The method comprises detecting that a first file and a second file are duplicates, wherein the first file is stored on a first storage device. Metadata is written to the first storage device in association with the first file, wherein the metadata identifies the location of the second file that is a duplicate of the first file. Later, an application program requests a first read operation to read the first file. In response to a media error that results from the first read operation, the method reads the metadata associated with the first file to identify the location of the second file, performs a second read operation to read the second file instead of the first file, and provides the second file to the application program in satisfaction of the requested first read operation. | 2014-03-06 |
20140068324 | ASYNCHRONOUS RAID STRIPE WRITESTO ENABLE RESPONSE TO MEDIA ERRORS - A method includes detecting that a first file and a second file are duplicates, and storing the first file and the second file to a target storage device. Metadata is written to the target storage device in association with the first file, wherein the metadata identifies the location of the second file that is a duplicate of the first file. Later, an application program requests a first read operation to read the first file. In response to a media error that results from the first read operation, the target storage device reads the metadata associated with the first file to identify the location of the second file, performs a second read operation to read the second file instead of the first file, and provides the second file to the application program in satisfaction of the requested first read operation. | 2014-03-06 |
20140068325 | TEST CASE RESULT PROCESSING - A computer-implemented method for test case result processing includes receiving, by a test case result processing logic in a processor of a computer, a test result from a test case that executes on the computer; determining, by the test case result processing logic based on a result description file, whether a result description corresponding to the received result exists in the result description file; based on the result description corresponding to the received result existing in the result description file, determining an action description associated with the result description based on an action definition file; and executing an action corresponding to the determined action description. | 2014-03-06 |
20140068326 | Systems and Methods for Automated Memory and Thread Execution Anomaly Detection in a Computer Network - Systems and methods are provided for detecting an anomaly in a computer that is part of a population of networked computers. Snapshots are received from a plurality of computers within the population of computers, where individual snapshots include a state of assets and runtime processes of a respective computer. An asset normalization model is generated from the snapshots and serves as a baseline model for detecting an anomaly in the state of assets and runtime processes of a respective computer. A snapshot from at least one of the computers is compared to the asset normalization model in order to determine whether an anomaly is present in a state of static assets and runtime processes of the at least one of the computers. | 2014-03-06 |
20140068327 | APPARATUS AND METHOD FOR MANAGING A HANG STATE OF A MOBILE TERMINAL - An apparatus and a method for managing a hang state of a mobile terminal are provided. The apparatus and method receives an input signal from a through an input device, such as a chip, independent of an Application Processor (AP) and detects and resolves the hang state. The apparatus includes an AP; an input device configured to receive an input and transmitting an input signal; an input processor configured to receive the input signal and transmit a notification signal to the AP; and a hang-state processor configured to determine that the AP is in a hang-state as the AP is not processing the input signal and the hang-state processor is further configured to remedy the hang-state of the AP, wherein upon receiving the notification signal the AP requests the input signal from the input processor. | 2014-03-06 |
20140068328 | SYSTEM AND METHOD FOR SYNCHORNISATION OF DATA AND RECOVERY OF FAILURES DURING SYNCHRONIZATION BETWEEN TWO SYSTEMS - The embodiments herein provide a system and method for synchronization of data and recovery of failures during synchronization between two systems. The system for executing synchronization between the source and target systems comprises a connector framework, a process framework, a mapping manager, a recovery manager, a conflict manager and a failure manager. A method for bidirectional data synchronizing and integrating involves keeping information about integration user in integration database for each entity and update along with update time and audit id, only when the system does not keep information about the created and updated entity. A method of synchronizing only the entities qualifying a criterion, a method for failure recovery from a correct point during integration process, a method for handling recovery for changes coming from multiple end points and a method for recovery during server shutdown are also provided. | 2014-03-06 |
20140068329 | Identifying Unreliable Parts in an IT Infrastructure - A method receiving a first alert indicating a fault associated with a first node of a plurality of nodes. The method further includes determining a first value indicating a measure of reliability for the first node based on an amount of first node downtime associated with the first alert and a severity of the first alert. | 2014-03-06 |
20140068330 | PREDICTING SYMPTOMS OF RUN-TIME PROBLEMS BASED ON ANALYSIS OF EXPERT DECISION MAKING - Systems, methods, and non-transitory computer-readable storage media for receiving historical data describing behavior of human subject-matter experts, wherein the historical data links customer problems with solutions, receiving a plurality of human-generated algorithms describing patterns for linking customer problems with solutions based on problem-specific diagnostic data, comparing each algorithm of the plurality of algorithms with the historical data to determine respective predictive scores for linking a customer problem type with a particular solution, and ranking at least part of the plurality of algorithms based on the respective similarity scores. | 2014-03-06 |
20140068331 | TARGET DEVICE PROVIDING DEBUGGING FUNCTION AND TEST SYSTEM COMPRISING THE SAME - A test system for debugging a target device includes a switch unit configured to transfer a test signal to the target device, the target device including a first intellectual property (IP) block supporting a debugging operation at a normal mode and a second IP block supporting a debugging operation at a power saving mode. The switch unit is configured to form a first signal transfer path for transferring the test signal to the first IP block at the normal mode and to form a second signal transfer path for transferring the test signal to the second IP block at the power saving mode. | 2014-03-06 |
20140068332 | ELECTRONIC DEVICE HAVING SELF DIAGNOSIS FUNCTION AND SELF DIAGNOSIS METHOD USING THE SAME - An electronic device which has a self diagnosis function and a self diagnosis method using the same are provided. The electronic device includes: an interface which receives a user's selection signal for a hardware of an object to be diagnosed; and a controller which provides a plurality of lines connected to the hardware of the object to be diagnosed with a signal for diagnosis according to the selection signal which is received through the interface and calculates a diagnosis result for the hardware of diagnosis object according to a comparison result of the signal for diagnosis with a return signal which is returned from the hardware of the object to be diagnosed by a loop-back. | 2014-03-06 |
20140068333 | BUILT-IN-SELF-TEST USING EMBEDDED MEMORY AND PROCESSOR IN AN APPLICATION SPECIFIC INTERGRATED CIRCUIT - A test method for an ASIC uses an embedded processor in the ASIC to execute test routines from an embedded memory or an external memory. During ASIC production, the test routines can comprehensively test of the blocks of the ASIC without a complicated test pattern from test equipment. The test routines can also perform power-up tests in systems or end products containing the ASIC. Test selection, activation, and result output can be implemented using a few terminals of the ASIC. | 2014-03-06 |
20140068334 | RELIABLE UNIT TESTING THROUGH CACHED MOCKING - During execution of a unit test, receiving from the unit test a first request referencing a mock object. An instance of the mock object and initial cached mock object data is returned to the test unit, wherein the initial cached mock object data includes first data for a real object represented by the mock object. Second data for the real object represented by the mock object is collected. The second data for the real object is compared to the initial cached mock object data. Responsive to determining that at least one aspect of the second data for the real object does not correspond to the initial cached mock object data, the cached mock object data is updated with the second data for the real object. An indication can be provided to the unit test that the initial cached mock object data returned to the unit test is unreliable. | 2014-03-06 |
20140068335 | DYNAMIC LOAD CALCULATION AND PREDICTIVE SCALING - A system, apparatus, method, and computer program product for dynamically loading IT products and scaling those loads in a predictive manner are disclosed. Dynamic loading and scaling is performed by generating a load on a computing product with one or more first load generators, increasing the load over time until the first load generators reach their capacity for generating load, monitoring the capacity of the first load generators as the load is increased, provisioning one or more second load generators to generate additional load as any of the first load generators approaches its capacity, increasing the load generated by the second load generators over time until the one or more second load generators reach their capacity for generating load or the computing product reaches a performance goal, and continuing to provision second load generators until the computing product reaches the performance goal. | 2014-03-06 |
20140068336 | TESTING DEVELOPMENT USING REAL-TIME TRAFFIC - Testing a test component is disclosed. A real-time input communication that has been forked from an input communication intended for a deployed component is received at the test component. At least a portion of the received real-time input communication is processed. A result of the processing is used to at least in part determine a test result of the test component. | 2014-03-06 |
20140068337 | SYSTEM AND METHOD FOR CONSTRUCTION, FAULT ISOLATION, AND RECOVERY OF CABLING TOPOLOGY IN A STORAGE AREA NETWORK - System and method for construction, fault isolation, and recovery of cabling topology in a storage area network (SAN) is disclosed. In one embodiment, in a method for construction, fault isolation, and recovery of cabling topology in a SAN, subsystem information associated with each subsystem in the SAN is obtained. Then, an IP port and zoning information associated with connections of each subsystem is obtained. Component information associated with each component is also obtained. Any other relevant information associated with each subsystem and each component is obtained from users. The obtained subsystem information, IP port and zoning information, component information, and any other relevant information are compiled. Test packets are then sent from end-to-end in SAN using compiled information. The sent test packets are tracked via each component in each subsystem in the SAN. The cabling topology of the SAN is then outputted based on the outcome of the tracking. | 2014-03-06 |
20140068338 | DIAGNOSTIC SYSTEMS FOR DISTRIBUTED NETWORK - A diagnostic system provides identification of symptoms in a distributed network and an engine for providing recommended rectification of error sources that correspond to the symptoms. The distributed network may be accessed for current statistics. Symptoms may be identified that correspond to the current statistics. A recommended course of action for the distributed network may be provided based on a predetermined list of courses of actions that correspond to rectifying the performance in the error sources. | 2014-03-06 |
20140068339 | Systems and Methods for State Based Test Case Generation for Software Validation - Systems and methods for state based test case generation for software validation are disclosed. One embodiment includes determining a first input and a first input type for a program block of vehicle software for creating a test case, wherein the first input type includes a state based input, determining permutations of values for the first input, based on the first input type, and running the test case with the state based input, wherein running the test case comprises applying the permutations of values for the first input to the program block. Some embodiments include determining, by a test computing device, whether the test case meets a predetermined level of modified condition/decision coverage (MC/DC) and providing an indication of whether the test case meets the predetermined level of MC/DC. | 2014-03-06 |
20140068340 | Method and System for Compliance Testing in a Cloud Storage Environment - The invention provides automated test suite for compliance testing of cloud storage server to a Cloud Data Management Interface (CDMI) by performing functional testing of CRUD (Create, Read, Update, and Delete) operations. It offers a solution containing test scripts for validating the response from CRUD operations performed on CDMI objects and checks for the cloud storage to be CDMI compliant. | 2014-03-06 |
20140068341 | INTROSPECTION OF SOFTWARE PROGRAM COMPONENTS AND CONDITIONAL GENERATION OF MEMORY DUMP - An approach for introspection of a software component and generation of a conditional memory dump, a computing device executing an introspection program with respect to the software component is provided. An introspection system comprises one or more conditions for generating the conditional memory dump based on operations of the software component. In one aspect, a computing device detects, through an introspection program, whether the one or more conditions are satisfied by the software component based on information in an introspection analyzer of the introspection program. In addition, the computing device indicates, through the introspection program, if the one or more conditions are satisfied by the software component. In another aspect, responsive to the indication, the computing device generates the conditional memory dump through the introspection program. | 2014-03-06 |
20140068342 | Wireless Debugging and Updating of Firmware - A debug control system and method thereof which includes a debug device and a wireless communication module. The debug device is configured to communicate electrical data with a target device via a first signal transmission interface. The wireless communication module is configured to communicate electrical data with the debug device via a second communication interface, and is configured to communicate electrical data with a host device. Electrical data exchanged between the debug control system and the target device is configured to debug or update firmware residing on the target device. | 2014-03-06 |
20140068343 | MANAGEMENT SYSTEM FOR MANAGING COMPUTER SYSTEM COMPRISING MULTIPLE MONITORING-TARGET DEVICES - A management system manages a computer system including multiple monitoring-target devices. A storage device of the management system stores a general rule, general plan information, unresolved information, and configuration information. A control device of the management system creates multiple expanded rules based on the general rule and the configuration information, and if an event related to any of the multiple monitoring-target devices has occurred, identifies, based on the multiple expanded rules, a first conclusion event constituting a candidate for the cause of the occurred event, creates, based on the general plan information, one or more expanded plans, which are recovery plans that can be implemented if the first conclusion event is a cause, identifies an unresolved event based on the unresolved information, identifies a risk site based on the identified unresolved event, and displays data showing the first conclusion event, expanded plan, and risk site. | 2014-03-06 |