15th week of 2012 patent applcation highlights part 50 |
Patent application number | Title | Published |
20120089807 | METHOD AND APPARATUS FOR FLOATING POINT REGISTER CACHING - The present invention provides a method and apparatus for floating-point register caching. One embodiment of the method includes mapping a first set of architected registers defined by a first instruction set to a memory outside of a plurality of physical registers. The plurality of physical registers are configured to map to the first set, a second set of architected registers defined by a second construction set, and a set of rename registers. This embodiment of the method also includes adding the physical registers corresponding to the first set of architected registers to the set of rename registers. | 2012-04-12 |
20120089808 | MULTIPROCESSOR USING A SHARED VIRTUAL MEMORY AND METHOD OF GENERATING A TRANSLATION TABLE - A multiprocessor using a shared virtual memory (SVM) is provided. The multiprocessor includes a plurality of processing cores and a memory manager configured to transform a virtual address into a physical address to allow a processing core to access a memory region corresponding to the physical address. | 2012-04-12 |
20120089809 | ACCESSING AN ENCODED DATA SLICE UTILIZING A MEMORY BIN - A method begins by a processing module receiving an encoded data slice to store and determining a slice length of the encoded data slice. The method continues with the processing module comparing the slice length to a plurality of bin widths, wherein each of the plurality of bin widths represents a fixed storage width of a plurality of memory bins within each of a plurality of memory containers, wherein a storage unit includes the plurality of memory containers. The method continues with the processing module selecting one of the plurality of memory containers based on the comparing to produce a selected memory container, identifying an available bin of the plurality of bins of the selected memory container, and storing the encoded data slice in the available bin. | 2012-04-12 |
20120089810 | Apparatus and Method for Formatting and Preselecting Trace Data - The invention relates to a method and apparatus for formatting and preselecting trace data, and includes a trace message generator, an address checker, and a memory connected to the trace message generator and address checker. The trace message generator is configured to receive an address and associated data and generate a trace message with the associated data for the received address. The address checker is configured to receive the address, check the received address with the aid of the memory, and generate an output signal that indicates whether or not the trace message generated for the address is intended to be stored. The memory is configured to receive the trace message generated by the trace message generator, receive the output signal generated by the address checker, and store the received trace message if the output signal indicates that the trace message is intended to be stored. | 2012-04-12 |
20120089811 | ADDRESS CONVERSION APPARATUS - An address conversion apparatus includes a TLB, and an address conversion control section configured to count a consecutive address number indicating the number of consecutive addresses from a pair of a logical address and a physical address stored in the TLB with reference to an address conversion table, store the consecutive address number in association with the pair of the logical address and the physical address, determine whether a conversion target address is included in a range of the consecutive address number from the logical address stored in the TLB or not, and add, if the conversion target address is included in the range, a difference between the logical address and the conversion target address to the physical address which forms a pair with the logical address to calculate a converted physical address. | 2012-04-12 |
20120089812 | SHARED RESOURCE MULTI-THREAD PROCESSOR ARRAY - A shared resource multi-thread processor array wherein an array of heterogeneous function blocks are interconnected via a self-routing switch fabric, in which the individual function blocks have an associated switch port address. Each switch output port comprises a FIFO style memory that implements a plurality of separate queues. Thread queue empty flags are grouped using programmable circuit means to form self-synchronised threads. Data from different threads are passed to the various addressable function blocks in a predefined sequence in order to implement the desired function. The separate port queues allows data from different threads to share the same hardware resources and the reconfiguration of switch fabric addresses further enables the formation of different data-paths allowing the array to be configured for use in various applications. | 2012-04-12 |
20120089813 | COMPUTING APPARATUS BASED ON RECONFIGURABLE ARCHITECTURE AND MEMORY DEPENDENCE CORRECTION METHOD THEREOF - Provided are a computing apparatus based on a reconfigurable architecture and a memory dependence correction method thereof. In one general aspect, a computing apparatus has a reconfigurable architecture. The computing apparatus may include: a reconfiguration unit having processing elements configured to reconfigure data paths between one or more of the processing elements; a compiler configured to analyze instructions to generate reconfiguration information for reconfiguring one or more of the reconfigurable data paths; a configuration memory configured to store the reconfiguration information; and a processor configured to execute the instructions through the reconfiguration unit, and to correct at least one memory dependency among the processing elements. | 2012-04-12 |
20120089814 | Inter-Processor Protocol in a Multi-Processor System - In a multiprocessor system, a primary processor may store an executable image for a secondary processor. A communication protocol assists the transfer of an image header and data segment(s) of the executable image from the primary processor to the secondary processor. Messages between the primary processor and secondary processor indicate successful receipt of transferred data, termination of a transfer process, and acknowledgement of same. | 2012-04-12 |
20120089815 | DETERMINING PROCESSOR OFFSETS TO SYNCHRONIZE PROCESSOR TIME VALUES - Provided are a computer program product, system, and method for determining processor offsets to synchronize processor time values. A determination is made of a master processor offset from one of a plurality of time values of the master processor and a time value of one of the slave processors. A determination is made of slave processor offsets, wherein each slave processor offset is determined from the master processor offset, one of the time values of the master processor, and a time value of the slave processor. A current time value of the master processor is adjusted by the master processor offset. A current time value of each of the slave processors is adjusted by the slave processor offset for the slave processor whose time value is being adjusted. | 2012-04-12 |
20120089816 | QUERY SAMPLING INFORMATION INSTRUCTION - A measurement sampling facility takes snapshots of the central processing unit (CPU) on which it is executing at specified sampling intervals to collect data relating to tasks executing on the CPU. The collected data is stored in a buffer, and at selected times, an interrupt is provided to remove data from the buffer to enable reuse thereof. The interrupt is not taken after each sample, but in sufficient time to remove the data and minimize data loss. | 2012-04-12 |
20120089817 | Conditional selection of data elements - A data processing apparatus, method and computer program that perform an operation on one data element such as a register and then conditionally select either that register or a further register on which no operation has been performed. The apparatus comprises an instruction decoder configured to decode at least one conditional select instruction, said at least one conditional select instruction specifying a primary source register, a secondary source register, a destination register, a condition, and an operation to be performed on a data element from the secondary source register; a data processor configured to perform data processing operations controlled by the instruction decoder wherein: the data processor is responsive to the decoded at least one conditional select instruction and the condition having a predetermined outcome to perform the operation on the data element from the secondary source register to form a resultant data element and to store the resultant data element in the destination register; and the data processor is responsive to the decoded at least one conditional select instruction and the condition not having the predetermined outcome to form the resultant data element from the data element from the primary register and to store the resultant data element in the destination register. | 2012-04-12 |
20120089818 | Decoding instructions from multiple instructions sets - A data processing apparatus, method and computer program are described that are capable of decoding instructions from different instruction sets. The method comprising: receiving an instruction; if an operation code of said instruction is an operation code of an instruction from a base set of instructions decoding said instruction according to decode rules for said base set of instructions; and if said operation code of said instruction is an operation code of an instruction from at least one further set of instructions decoding said instruction according to a set of decode rules determined by an indicator value indicating which of said at least one further set of instructions is currently to be decoded. | 2012-04-12 |
20120089819 | ISSUING INSTRUCTIONS WITH UNRESOLVED DATA DEPENDENCIES - The described embodiments include a processor that determines instructions that can be issued based on unresolved data dependencies. In an issue unit in the processor, the processor keeps a record of each instruction that is directly or indirectly dependent on a base instruction. Upon determining that the base instruction has been deferred, the processor monitors instructions that are being issued from an issue queue to an execution unit for execution. Upon determining that an instruction from the record has reached a head of the issue queue, the processor immediately issues the instruction from the issue queue. | 2012-04-12 |
20120089820 | HYBRID MECHANISM FOR MORE EFFICIENT EMULATION AND METHOD THEREFOR - In a host system, a method for using instruction scheduling to efficiently emulate the operation of a target computing syste includes preparing, on the host system, an instruction sequence to interpret an instruction written for execution on the target computing system. An instruction scheduling on the instruction sequence is performed, to achieve an efficient instruction level parallelism, for the host system. A separate and independent instruction sequence is inserted, which, when executed simultaneously with the instruction sequence, performs to copy to a separate location a minimum instruction sequence necessary to execute an intent of an interpreted target instruction, the interpreted target instruction being a translation; and modifies the interpreter code such that a next interpretation of the target instruction results in execution of the translated version, thereby removing execution of interpreter overhead. | 2012-04-12 |
20120089821 | DEBUGGING APPARATUS AND METHOD - A debugging apparatus and method are provided. The debugging apparatus may include a breakpoint setting unit configured to store a first instruction corresponding to a breakpoint in a table, stop a program currently being executed, and insert a breakpoint instruction including current location information of the first instruction into the breakpoint; and an instruction execution unit configured to selectively execute one of the breakpoint instruction and the first instruction according to a value of a status bit. | 2012-04-12 |
20120089822 | INFORMATION PROCESSING DEVICE AND EMULATION PROCESSING PROGRAM AND METHOD - An emulation processing method causing a computer including a first and a second processor to execute emulation processing, the emulation processing method includes: calculate a next instruction address next to a received instruction address, and transmit, to the second processor, the calculated instruction address and instruction information read out on the basis of the calculated instruction address, transmit, to the first processor, a first instruction address that is an instruction address included in an execution result of executed processing, and execute processing based on the instruction information received from the first processor, when a second instruction address that is the instruction address received from the first processor is identical to the first instruction address, and read out instruction information on the basis of the first instruction address and execute processing based on the instruction information read out, when the second instruction address is not identical to the first instruction address. | 2012-04-12 |
20120089823 | PROCESSING APPARATUS, COMPILING APPARATUS, AND DYNAMIC CONDITIONAL BRANCH PROCESSING METHOD - A technology for reducing pipeline a control hazard is provided. A conditional branch is processed through a conditional branch prediction, and a predetermined conditional branch prediction, which is determined as incorrect, may be modified through a following test for the conditional branch prediction, thereby reducing the pipeline control hazard quickly without additional hardware. | 2012-04-12 |
20120089824 | PROCESSOR AND VECTOR LOAD INSTRUCTION EXECUTION METHOD - Provided is a processor including an instruction issue unit that issues a vector load instruction read from a main memory based on branch target prediction of a branch target in a branch instruction, a data acquisition unit that starts issue of a plurality of acquisition requests for acquiring a plurality of vector data based on the issued vector load instruction from the main memory, a determination unit that determines a success or a failure of the branch target prediction after the branch target is determined, and a vector load management unit that, when the branch target prediction is determined to be a success, acquires all vector data based on the plurality of acquisition requests and then transfers all the vector data to a vector register, and, when the branch target prediction is determined to be a failure, discards the vector data acquired by the issued acquisition requests. | 2012-04-12 |
20120089825 | APPARATUS AND METHOD FOR GENERATING A BOOT IMAGE THAT IS ADJUSTABLE IN SIZE - A technique for reducing a size of a snapshot boot image by adjusting a structure of the snapshot boot image based on an analysis of a computing system. In addition, according to the technique, the overriding portions of a snapshot based boot image may be loaded first in consideration of a time of use of the system, and therefore a boot time can be reduced. | 2012-04-12 |
20120089826 | METHODS OF OPERATING MEMORY DEVICES AND ELECTRONIC SYSTEMS HAVING MEMORY DEVICES - Methods of operating memory devices and electronic systems having memory devices include initiating a boot mode of operation of the memory device in response to receiving a first command, wherein the first command comprises a pattern of two or more command signals, and terminating the boot mode of operation in response to receiving a second command, wherein the second command comprises a pattern of two or more command signals. | 2012-04-12 |
20120089827 | COMPUTING DEVICE AND METHOD TO REDUCE THE TIME NEEDED FOR THE DEVICE TO START - One example of the invention operates during the device shut-down procedure, to generate a merged command list containing the components from the various individual static command lists. The generated merged command list is then stored in non-volatile memory, and subsequently accessed on the next device start-up to control the launching of required software components. In this way, only one command list, being the merged command list, need be processed on device start-up, and hence device start-up time is reduced. | 2012-04-12 |
20120089828 | SECURE TUNNEL OVER HTTPS CONNECTION - Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them for use between a corporate or agency network and outside, public networks. A secure socket tunnel protocol (SSTP) adds drivers in both the kernel and user mode to route standard protocol traffic, such as PPP, over a common HTTPS port. In the event of network interruptions, an exchange of a session cookie allows fast reconnection of the underlying HTTPS connection without affecting higher level applications. | 2012-04-12 |
20120089829 | Accelerating stream cipher operations using single and grid systems - Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computer-implemented method receives data. The method separates the data into multiple file chunks for compression. A respective compression-encryption instructions header is provided for each compressed file chunk. Each compressed file chunk then is encrypted according to corresponding encryption instructions in the file-chunk's compression-encryption instructions. In one implementation, the compressed file chunks are encrypted by respective worker nodes in a peer-to-peer computing environment. The compressed and encrypted file chunks are merged into a single encrypted-compressed-merged file. | 2012-04-12 |
20120089830 | METHOD AND DEVICE FOR DIGITALLY ATTESTING THE AUTHENTICITY OF BINDING INTERACTIONS - Method for digitally attesting the authenticity of an interaction, comprising the steps of establishing a secure digital communication channel between a Universal Signature Assistant and a remote Attestation Appliance, sending an interaction request to a remote site, digitally receiving from the remote Attestation Appliance on the Universal Signature Assistant an attestation request for the authenticity of said interaction request, confirming or denying the authenticity of the interaction request by respectively accepting or rejecting the attestation request on said Universal Signature Assistant. Device for digitally attesting the authenticity of an interaction, comprising a Universal Signature Assistant comprising a CPU, a memory, a storage, a system bus, said CPU, the memory and the storage being connected to the system bus for communicating with each other, a display connected to the system bus for displaying information to a user, a user input device connected to the system bus for allowing the user entering information to the Universal Signature Assistant, a communication interface connected to the system bus for communicating with external devices, a reader for reading user identity information contained on an identity token and a software program stored in the storage for performing the method of the invention with the Universal Signature Assistant when the software program is run by the CPU. | 2012-04-12 |
20120089831 | Associating A Multi-Context Trusted Platform Module With Distributed Platforms - In one embodiment, the present invention includes a method for creating an instance of a virtual trusted platform module (TPM) in a central platform and associating the instance with a managed platform coupled to the central platform. Multiple such vTPM's may be instantiated, each associated with a different managed platform coupled to the central platform. The instances may all be maintained on the central platform, improving security. Other embodiments are described and claimed. | 2012-04-12 |
20120089832 | METHODS OF ISSUING A CREDIT FOR A CERTIFICATE FOR A DOMAIN NAME - The invention provides methods for efficiently registering a domain name and issuing a certificate without a Subscriber submitting a separate request for the certificate. A notice may be provided to the Subscriber after requesting to register the domain name that a credit for a certificate may be issued for the domain name. In other embodiments a credit may be given to the Subscriber for the certificate without receiving a separate request for the credit or certificate. The credit may be saved in a Subscriber's account to enable the Subscriber to use a certificate at a later time. In yet other embodiments, a single vetting process may be used to facilitate one or more of: creating a Subscriber's account; registering a domain name; and issuing a certificate. | 2012-04-12 |
20120089833 | SECURE DEPLOYMENT OF PROVABLE IDENTITY FOR DYNAMIC APPLICATION ENVIRONMENTS - An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret, such as the private key of a public/private key pair) to the security token service along with an instruction to make an account for the VM. The VM presents proof that it possesses the secret to the security token service and in return receives a full token. When a client connects to the deployment, it receives the public key from the security token service, which it trusts, and the full token from the VM. It validates the full token with the public key to determine that the VM has the identity that it purports to have. | 2012-04-12 |
20120089834 | ESTABLISHMENT METHOD AND DEVICE FOR LINK BETWEEN ACCESS POINT AND REPEATER IN WIRELESS DISTRIBUTION SYSTEM - The present invention provides an establishment method and device for a link between an access point and a repeater in a wireless distribution system. The method comprises: starting the access point and the repeater in the wireless distribution system; the access point and the repeater transmitting an interactive message to each other, and obtaining channel information, channel encryption mode, cipher key information, and address information of an opposite end about the link between the access point and the repeater from the interactive message; the access point and the repeater establishing the link between the access point and the repeater according to the channel information, the channel encryption mode, the cipher key information, and the address information of the opposite end. The device comprises: a starting module, an interactive module, and an establishment module. The present invention overcomes the problem of the establishment method for a link between the access point and the repeater in a wireless distribution system, that is, it needs a user's manual input to determine the channel of the WDS link establishment, which causes the procedure of the link establishment is relatively troublesome. Furthermore, the present invention achieves the automatic optimal configurations on the channel of the WDS link, such that the operation of the user is more convenient and quicker, and the quality and the rate of the link are increased | 2012-04-12 |
20120089835 | System and Method for Automatic Authentication of an Item - A system, apparatus and method automatically authenticating an item. The media device includes a housing, a processor disposed within the housing, the item disposed within or attached to the housing, and a memory disposed within the housing. The memory stores computer readable instructions that when executed by the processor causes the processor to perform the steps: (a) obtaining the one or more identifiers from the item wherein the one or more identifiers includes a serial number or code; (b) transmitting the obtained identifier(s) to a server device for authentication; (c) receiving an authentication message from the server device; (d) continuing operation of the media device whenever the authentication message from the server device indicates that the item is authentic; and (e) performing one or more actions based on the authentication message whenever the authentication message from the server device indicates that the item is not authentic or cannot be verified. | 2012-04-12 |
20120089836 | OBJECT DELIVERY AUTHENTICATION - A method and system for authenticating delivery including the steps of receiving by a receiver a delivery information package from a deliverer over a network during a communication between the receiver and the deliverer, wherein the delivery package includes deliverer identity information, sending an authentication request of the received delivery package from the receiver to an authentication module having a hardware processor, over at least one of a call network and an additional network, and authenticating the received delivery package using the deliverer identity information. | 2012-04-12 |
20120089837 | KEYLESS CHALLENGE AND RESPONSE SYSTEM - A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined. | 2012-04-12 |
20120089838 | METHOD AND DEVICE FOR SECURELY CONFIGURING A TERMINAL - A method of configuring a terminal including initializing the terminal, and which automatically triggers at least: detecting presence of a memory by a basic input/ouput system of the terminal, accessing the memory by the basic input/ouput system, starting up an operating system stored in the memory, and starting up a driver of a telecommunication network access module, the driver of the access module being stored in the memory and configured to drive the access module through a communication link between the terminal and a telecommunication device including the access module. | 2012-04-12 |
20120089839 | ONLINE SECURE DEVICE PROVISIONING WITH ONLINE DEVICE BINDING USING WHITELISTS - One or more servers are provided including a session manager, authentication module, authorization module, encryption module, database, and protocol handler. The session manager is configured to receive requests for new identity data from network-enabled devices. Each request is authenticated first by the update server via its authentication module by validating the signature of the request message as well as the certificate chain trusted by the update server. The authorization module is configured to determine if the network-enabled devices specified on a whitelist are authorized to be provisioned with new identity data. The database is configured to receive new identity records generated by an identity data generation system. Each of the new identity records includes a new identifier. The new identifier is not associated or linked to any previously assigned/used identifiers and identity data, thus all the new identity records are generated independently and then loaded to the update server. | 2012-04-12 |
20120089840 | SYSTEM AND METHOD FOR CONTROLLING DATA COMMUNICATIONS BETWEEN A SERVER AND A CLIENT DEVICE - A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to the client device. This stop data can be transmitted (e.g. by the client device) to the server. When processed by the server, the stop data indicates to the server that at least some of the encrypted data received by the client device from the server was not decrypted using the second key (e.g. as may be the case when the second key has been deleted). Upon receiving the stop data, the server may, for example, withhold the transmission of data encrypted with the first key to the client device until the second key is restored on the client device. In one embodiment, the stop data is provided to the client device in an encoded (e.g. encrypted) form. | 2012-04-12 |
20120089841 | DIGITAL SIGNATURES OF COMPOSITE RESOURCE DOCUMENTS - An embodiment of the disclosure can receive a composite resource document containing at least one resource. An updated manifest resource can be obtained. The updated manifest resource can list all resources in the composite resource document. A set of zero or more (0 . . . N) resources can be indicated. Each indicated resource is one that is to be subtracted from the list of resources in the updated manifest resource in order to create a generated signature reference list of identified resources to be signed. A hash token can be generated using the resources identified in the generated signature reference list to form a signature hash token. The signature hash token can be encrypted with a secret key. | 2012-04-12 |
20120089842 | COMMUNICATION SYSTEM FOR AUTHENTICATING MESSAGES WITH UNIQUELY SPECIFIED GENUINE INFORMATION - In a sensor network system, a transmitter device uses a message authentication key generated by a message generator to transmit a message with authenticator to plural receiver devices, which in reply produce a certification by a certification generator from a message with authenticator held by a message holder to transmit the certification to the transmitter device. An information generator of the transmitter device uses an identification from a reception checker and the message authentication key thus generated to generate an authentication key notification, which will be transmitted to receiver devices having transmitted the certification. In the receiver devices, the message holder holds the authentication key notification, from which an authentication key acquirer acquires the message authentication key, which a message authenticator uses to compare the message with authenticator generated with the message with authenticator held in the message holder to confirm the received message. | 2012-04-12 |
20120089843 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes: a data processor which creates content to be distributed to a client, wherein the data processor executes processing of creating content provided to a client by selecting data in units of segments, which are division data of content, from a plurality of additional information recorded content items obtained by recording different additional information items on original content, selects different segment columns in units of content distribution clients in the processing of creating content provided to a client, and creates management information in which client information for identifying a client of a content distribution destination and segment column information indicating a segment selection state of the content provided to a client, which is provided to a corresponding client, are matched with each other and records the management information in a storage unit. | 2012-04-12 |
20120089844 | ONE WAY AUTHENTICATION - A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted. | 2012-04-12 |
20120089845 | VERIFIABLE DEVICE ASSISTED SERVICE USAGE BILLING WITH INTEGRATED ACCOUNTING, MEDIATION ACCOUNTING, AND MULTI-ACCOUNT - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service policy for assisting billing for the communications device use of a service on a network; and monitors use of the service based on the service policy, in which a local service usage is synchronized with a network based service usage. | 2012-04-12 |
20120089846 | METHOD AND ARRANGEMENT FOR SENDING AND RECEIVING CONFIDENTIAL ELECTRONIC MESSAGES IN A LEGALLY BINDING MANNER - In a method and arrangement for the secure transmission of at least one electronic message from a first terminal of a first user to at least one second terminal of a second user, the electronic message is generated by the first terminal. The electronic message is received by the second terminal. The electronic message is transmitted by an infrastructure for legally binding transmission of electronic messages from the first terminal to the second terminal. A first security module connected to the first terminal encrypts and/or signs the electronic message before the electronic message is transmitted by the infrastructure from the first terminal to the second terminal. A second security module, connected to the second terminal, decrypts the transmitted electronic message and/or verifies the signed electronic message. | 2012-04-12 |
20120089847 | METHOD OF OBTAINING AUTHORIZATION FOR ACCESSING A SERVICE - Methods and devices for obtaining authorization for a requestor to access a service are provided. In accordance with one embodiment, there is provided a method comprising receiving a requestor request for access to a service; sending an authorization request to one or more mobile devices associated with one or more authorizers on a first approval list; receiving an authorization response from the one or more mobile devices associated with the one or more authorizers on the first approval list; determining whether a predetermined level of authorization is received; and when the predetermined level of authorization is received, authorizing access to the service. | 2012-04-12 |
20120089848 | Apparatus and Method for Securing Data on a Portable Storage Device - A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device under a user password, the microprocessor also operable to exclude access to the secure user data area unless the user password is provided. | 2012-04-12 |
20120089849 | COOKIE MANAGEMENT SYSTEM AND METHOD - A system for managing cookies in a client device on a network includes a communication module, a cookie parser, an encryption module, and a storing module. The communication module sends an HTTP request to a web server on the network, and the cookie parser extracts any cookie data from the HTTP response by the web server. The encryption module encrypts the cookie data and the storing module stores the encrypted data in a memory area of the client device. | 2012-04-12 |
20120089850 | Optimizing Power Usage By Factoring Processor Architectural Events To PMU - A method and apparatus to monitor architecture events is disclosed. The architecture events are linked together via a push bus mechanism with each architectural event having a designated time slot. There is at least one branch of the push bus in each core. Each branch of the push bus may monitor one core with all the architectural events. All the data collected from the events by the push bus is then sent to a power control unit. | 2012-04-12 |
20120089851 | POWER MANAGEMENT METHOD FOR CONTROLLING COMMUNICATION INTERFACE TO ENTER/LEAVE POWER-SAVING MODE AND RELATED DEVICE THEREOF - One power management method of a communication interface includes: when receiving a command transmitted via the communication interface, checking if a predetermined criterion is met; and when the predetermined criterion is met, controlling the communication interface to enter a power-saving mode before an end of the received command. Another power management method of a communication interface includes: when the communication interface is operated under a power-saving mode, checking if a predetermined criterion of an executed command is met; and when the predetermined criterion is met, controlling the communication interface to leave the power-saving mode. | 2012-04-12 |
20120089852 | ENERGY OPTIMIZATION TECHNIQUES IN A COMPUTING SYSTEM - A computing platform may include components to determine performance loss values and energy savings values for each of the plurality of regions and/or the memory boundedness value of each of a plurality of regions within an application. The computing platform may provide a user interface for a user to provide a user input, which provides an indication of an acceptable performance loss. For the provided performance loss value, the frequency values may be determined and the processing element may be operated at the frequency values while processing each of the plurality of regions. | 2012-04-12 |
20120089853 | HIGH SPEED NETWORK INTERFACE WITH AUTOMATIC POWER MANAGEMENT WITH AUTO-NEGOTIATION - A power management circuit for managing power of a network interface is provided. The network interface includes a medium interface unit coupled to a network media supporting at least a high speed protocol and a lower speed protocol. The power management logic includes logic to determine that an event signalling entry of the medium interface unit into the lower speed protocol has occurred; and logic to force the medium interface unit into the lower speed protocol in response to a determination that the event has occurred. | 2012-04-12 |
20120089854 | SYSTEMS AND METHODS FOR OPTIMIZING DATA STORAGE AMONG A PLURALITY OF SOLID STATE MEMORY SUBSYSTEMS - A solid state storage device includes an interface system configured to communicate with an external host system over an aggregated multi-channel interface to receive data for storage by the solid state storage device. The solid state storage device also includes a storage processing system configured to communicate with the interface system to receive the data, process the data against storage allocation information to parallelize the data among a plurality of solid state memory subsystems, and transfer the parallelized data. The interface system is configured to receive the parallelized data, apportion the parallelized data among the plurality of solid state memory subsystems, and transfer the parallelized data for storage in the plurality of solid state memory subsystems, where each of the plurality of solid state memory subsystems is configured to receive the associated portion of the parallelized data and store the associated portion on a solid state storage medium. | 2012-04-12 |
20120089855 | CIRCUIT AND METHOD FOR AN UNINTERRUPTIBLE POWER SUPPLY OF ELECTRONIC MODULES - A circuit for uninterruptible power supply, wherein the circuit can be connected to an energy supply and a load and includes a capacitive energy store, a changeover switch, a charging device, a charging control device, a voltage monitoring device, and a discharge device. | 2012-04-12 |
20120089856 | METHOD AND APPARATUS FOR ON-DEMAND POWER MANAGEMENT - A power management apparatus and method are described. The method including monitoring, using a controller, a system bus for a processing demand in a processing system, the processing system comprising the system bus and a system processor, wherein the processing system operates at a first one or more voltages and a first one or more clock frequencies phase-locked to a reference frequency, wherein the controller is a different component than the system processor. The method further including generating a second one or more clock frequencies in response to the processing demand, the second one or more clock frequencies phase-locked to the reference frequency and phase-matched to the first one or more clock frequencies; and switching from the first one or more clock frequencies to the second one or more clock frequencies without halting the processing system. | 2012-04-12 |
20120089857 | METHOD FOR COMPENSATING FOR VARIATIONS IN DATA TIMING - A method for compensating for variations in timing of data sent to a processor on data bit lines relative to a strobe clock sent to the processor on a strobe clock line that can be used in a dual data rate (DDR) memory identifies discrete minimum and maximum time offset values for test data in selected data bit patterns for the data bit lines. The discrete minimum time offset value is the minimum timing adjustment required to allow the processor to receive the data in a steady-state condition during a data valid window of the strobe clock and the discrete maximum time offset value is a maximum timing adjustment required to allow the processor to receive the data in a steady-state condition during a data valid window of the strobe clock. The discrete minimum and maximum time offset values identify a valid range when the data bit lines supply data in a steady-state condition for latching into the processor by the strobe clock. | 2012-04-12 |
20120089858 | CONTENT PROCESSING APPARATUS - A content processing apparatus includes a plurality of takers. Each of a plurality of takers runs with reference to any one of N (N: an integer of two or more) of clocks, and the plurality of takers respectively take a plurality of contents. A mixer mixes the plurality of contents respectively taken by the plurality of takers so as to create equal to or less than N of output contents. A changer changes the clock referred to by each of the plurality of takers corresponding to a mode switching. An adjuster adjusts a mixing manner of the mixer in association with a change process of the changer so that a mixing process is executed for every contents corresponding to a common clock. | 2012-04-12 |
20120089859 | Method and Device for Exception Handling in Embedded System - A method and a device for handling exceptions in an embedded system are disclosed. The method comprises: establishing an exception callback linked list for an application program when the application program is running; registering an exception handling function and the corresponding relation between the exception handling function and the exception information into the exception callback linked list by the application program; when the exception is captured, searching the corresponding relation between the exception handling function and the exception information to locate an exception handling function matching the captured exception, according to the exception information of the captured exception; after a matched exception handling function is located, calling and executing the matched exception handling function to perform the exception handling. By adopting the method and the device, the direct operation of the exception handling function to the bottom layer hardware is avoided, and the portability and robustness of the software are improved. | 2012-04-12 |
20120089860 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ANALYZING AN OCCURRENCE OF AN ERROR IN A COMPUTER PROGRAM BY RESTRICTING ACCESS TO DATA IDENTIFIED AS BEING SENSITIVE INFORMATION - A method of analyzing an occurrence of an error in a computer program executing on a data processing system includes receiving data that are associated with an execution leg of the computer program at the time of the error and restricting access to at least a portion of the data associated with the execution leg of the computer program based on an identification of the portion of the data associated with the execution leg of the computer program as being sensitive information. | 2012-04-12 |
20120089861 | INTER-PROCESSOR FAILURE DETECTION AND RECOVERY - An approach to detecting processor failure in a multi-processor environment is disclosed. The approach may include having each CPU in the system responsible for monitoring another CPU in the system. A CPU | 2012-04-12 |
20120089862 | DETERMINING RECOVERY TIME FOR INTERDEPENDENT RESOURCES IN HETEROGENEOUS COMPUTING ENVIRONMENT - Provided are techniques for determining a recovery time for a resource in a heterogeneous computing environment comprising interdependent resources. A graph for the resource representing all sequence dependencies and all group relations are created. The recovery time may be a cumulative startup time or a cumulative shutdown time of the resource considering interdependencies of the resource to other resources. The recovery time for all support resources having sequence dependencies with the resource is calculated and each node representing the support resources are removed from the graph. Then the recovery time for all member resources left in the graph that have group relations with the resource is calculated per a group type of the resource. The recovery time for the resource is a sum of the recovery time of all support resources, the recovery time of all member resources, and a unit recovery time of the resource. | 2012-04-12 |
20120089863 | FAILOVER SYSTEM, STORAGE PROCESSING DEVICE AND FAILOVER CONTROL METHOD - A NAS as a main machine transmits a search packet for searching for a NAS as a new backup machine when a response from a NAS as a backup machine is not received. Each of NAS receiving the search packet transmits a device information packet to the NAS as the main machine. The device information packet includes a version number of failover function and storage capacity information. The NAS as the main machine selects a NAS as the new backup machine based on the version number and the storage capacity information included in the device information packet. | 2012-04-12 |
20120089864 | STORAGE DEVICE, AND DATA PATH FAILOVER METHOD OF INTERNAL NETWORK OF STORAGE CONTROLLER - A storage device in which the MR-IOV is applied to an internal network of a storage controller. Data path failover can be executed in the storage device. The internal network of the storage controller is configured to enable the access of a virtual function (VF) “VF 0:0, 1” of each endpoint device (ED | 2012-04-12 |
20120089865 | CORRECTING AN ERRANT ENCODED DATA SLICE - A method begins by a processing module decoding a set of encoded data slices to produce a decoded data segment and determining whether the decoded data segment includes an error. When the decoded data segments includes the error, the processing module identifies one or more errant encoded data slices by decoding another set of encoded data slices to produce another decoded data segment. The method continues with the processing module determining whether the other decoded data segment includes the error. When the other decoded data segment does not include the error, the processing module identifies the one or more errant encoded data slices and corrects the one or more errant encoded data slices. When the other decoded data segment includes the error, the processing module repeats, for yet another set of encoded data slices, the decoding step, the determining step, and the identifying and correcting step or the repeating steps. | 2012-04-12 |
20120089866 | DISASTER RECOVERY PRODUCTION TAKEOVER - Various embodiments for disaster recovery (DR) production takeover in a computing environment by a processor device are provided. If, for a designated storage system operable in the computing environment, a takeover operation may be executed, and a DR storage system has validly replaced the designated storage system using a replacement process, a withdrawal of a DR mode of operation is performed, and ownership of at least one storage device operable in the computing environment is transferred to the DR storage system. The replacement process authorizes the DR storage system to transfer the ownership while withdrawn from the DR mode of operation. | 2012-04-12 |
20120089867 | REDUNDANT ARRAY OF INDEPENDENT DISK (RAID) STORAGE RECOVERY - In one embodiment, a system includes a storage subsystem having an array of storage devices; a receiving component for receiving an error message; a determining component for determining that the error message indicates that a storage device has failed; a collecting component for collecting an array record having storage device characteristics of the failed storage device; a collating component for collating a candidate record having a plurality of candidate entries; a comparing component for comparing storage device characteristics of the failed storage device of the array record with the storage device characteristics of each of the candidate entries; and an identifying component for identifying a first candidate storage device having storage device characteristics that match the storage device characteristics of the failed storage device or a second candidate storage device having storage device characteristics most similar to the storage device characteristics of the failed storage device. | 2012-04-12 |
20120089868 | FUZZ TESTING OF ASYNCHRONOUS PROGRAM CODE - A fuzz testing system is described herein that represents event sources, channels, processors, and consumers as first-class entities in an application. Abstracting event-related entities allows fuzzing through injecting, dropping, reordering, and delaying events from within the application. This translates into the ability to localize the areas under test and perform fuzzing in a systematic manner. In some embodiments, the fuzz testing system tests concurrent asynchronous and event-based code, and can generate event streams based on a given statistical distribution. Representing events, event sources, processors, and sinks as first-class objects provides easy access to the event handlers and facilitates implementing fuzzing by introducing event processors between the source and the sink. Thus, the fuzz testing system improves the testability of applications and APIs with asynchronous behavior and provides a uniform framework for introducing fuzz testing into such applications. | 2012-04-12 |
20120089869 | Pessimistic Model-Based Testing - Model-based testing is performed by repeatedly constructing a test strategy in which each test stimulus will lead to increased test coverage regardless of the nondeterministic choices made by the system under test, and following said strategy until coverage is increased. As soon as no such strategy exists, testing stops. | 2012-04-12 |
20120089870 | BIOS REFRESH DEVICE AND METHOD USING THE SAME - A BIOS refresh device includes a first socket, a second socket, and a jumper. The first socket includes a first elastic contact, a first voltage contact, and a first ground contact. The second socket includes a second elastic contact, a second voltage contact, and a second ground contact. The jumper includes a first pin, a second pin, a third pin, and a fourth pin. The first pin is electronically connected with the second elastic contact. The second pin is electronically connected with the first voltage contact or the second voltage contact. The third pin is electronically connected with the first elastic contact. The fourth pin is electronically connected with the second ground contact or the second ground contact. | 2012-04-12 |
20120089871 | TEST SYSTEM - A test system includes at least one tested end and a testing end. The testing end establishes a connection with the tested end. A plurality of predetermined hardware model numbers and a plurality of predetermined hardware configuration files corresponding to the predetermined hardware model numbers are stored at the testing end. The testing end determines if a tested hardware model number of the tested end is one of the predetermined hardware model numbers. When the tested hardware model number is one of the predetermined hardware model numbers, a tested hardware configuration file corresponding to the tested hardware model number is obtained from the predetermined hardware configuration files. The testing end generates at least one test item for the tested end in accordance with the tested hardware configuration file. The testing end performs the at least one test item on the tested end. | 2012-04-12 |
20120089872 | METHOD AND SYSTEM FOR SUBNET DEFECT DIAGNOSTICS THROUGH FAULT COMPOSITING - A method and system for subnet defect diagnostics through fault compositing is disclosed. Each fault contained in callout data comprises explain failure data and conflict counts. A first fault on a fan-out sink of a fan-out net that explains a first failure is selected from the callout data. A second fault on a different sink of the same fan-out net that explains a second failure that the first fault does not explain is selected. The first fault and the second fault are composited to yield a composite fault. The composite fault unions the failures explained by the first fault with the failures explained by the second fault. A composite conflict count is generated by combining the conflict count of the first fault and the conflict count of the second fault, and a score is assigned to the composite fault. A best candidate composite fault is determined based on the score. | 2012-04-12 |
20120089873 | SYSTEMS AND METHODS FOR AUTOMATED SYSTEMATIC CONCURRENCY TESTING - Systems and method provide a coverage-guided systematic testing framework by dynamically learning HaPSet ordering constraints over shared object accesses; and applying the learned HaPSet ordering constraints to select high-risk interleavings for future test execution. | 2012-04-12 |
20120089874 | DIAGNOSING ENTITIES ASSOCIATED WITH SOFTWARE COMPONENTS - In one embodiment, a system includes a recording module adapted for recording event history information for one or more events associated with an entity, an evaluating module adapted for evaluating the event history information for each of the one or more events associated with the entity against a symptom rule, wherein the symptom rule defines a validity state of a diagnosis, an issuing module adapted for issuing a subscription to one or more subscribers, wherein the subscription enables the one or more subscribers to receive diagnosis information, and an indicating module adapted for indicating the validity state of the diagnosis to the subscriber, wherein the recording module and the evaluating module are independent such that the issuing module and the event history information are substantially decoupled. Other systems, methods, and computer program products are also described, according to various embodiments. | 2012-04-12 |
20120089875 | MULTI-USER TEST FRAMEWORK - Two user sessions can run concurrently on the same computer. A module executed by a first user instantiates a session manager in a first user session. The session manager receives input identifying a second user and providing credentials for the second user. A backup is made of auto-run and logon registry keys. A control file is created that directs actions in the second user session. The second user's credentials are registered in the registry file. The first session continues to execute while the second user is automatically logged on based on the registry auto login keys. The session manager is notified that login of the second user is complete. The session manager rewrites the auto login keys to the first user keys stored in the backup. The second user is logged off. The first user is automatically reconnected based on the rewritten registry keys. | 2012-04-12 |
20120089876 | METHOD, APPARATUS AND SYSTEM FOR FLEXIBLE USER TRACING IN MOBILE NETWORKS - In existing mobile networks, users may be traced to troubleshoot problematic user connections, monitor generic network performance, and to perform root cause analysis to identify network problems. However, the existing tracing methods provide incomplete trace information. To address this and other issues, early tracing recording is enabled in which an involved trace entity starts recording the trace data when any initial activity related to the user equipment is detected. The trace entity can continue the trace if a trace trigger is later confirmed or may discard the trace data if the trigger is not confirmed. | 2012-04-12 |
20120089877 | CONTROL DEVICE AND DATA STORAGE DEVICE - When write request signal is input from a host device | 2012-04-12 |
20120089878 | DUAL MODE TEST ACCESS PORT METHOD AND APPARATUS - Connection circuitry couples scan test port (STP) circuitry to test access port (TAP) circuitry. The connection circuitry has inputs connected to scan circuitry control output leads from the TAP circuitry, a select input lead, and a clock input lead. The connection circuitry has outputs connected to a scan enable (SE) input lead, a capture select (CS) input lead, and the scan clock (CK) input lead of the STP circuitry. The connection circuitry includes a multiplexer having a control input connected with a clock select lead from the TAP circuitry, an input connected with a functional clock lead, an input connected with the clock input lead, an input connected with a Clock-DR lead from the TAP circuitry, an OFF lead, and an output connected with the scan clock input lead. | 2012-04-12 |
20120089879 | METHOD AND SYSTEM FOR IDENTIFYING POWER DEFECTS USING TEST PATTERN SWITCHING ACTIVITY - A method and system for identifying power defects using test pattern switching activity is disclosed. In one embodiment, a plurality of test patterns is applied to a circuit under test, and failure test patterns are identified from the plurality of test patterns by comparing the test result with the predicted test result. A switching activity count is obtained for each of the plurality of test patterns. Based on the switching activity count, ranks for each of the plurality of test patterns are provided. A correlation analysis is performed between the failure test patterns and the ranks of the switching activities. When there is a high correlation between the failure test pattern and the ranks of the switching activities, it is determined that the circuit likely contains a power defect. A power defect analysis is performed under the presence of the high correlation. | 2012-04-12 |
20120089880 | TERMINAL APPARATUS AND RETRANSMISSION CONTROL METHOD - A terminal apparatus and retransmission control method which can reduce the overhead of the uplink control channel in cases when ARQ is applied in communication that uses an uplink unit band and a plurality of downlink unit bands associated with the uplink unit band. Here, a first condition is set in which downlink assignment control information is transmitted from a base station by a unit band group which comprises a basic unit band, which is the downlink unit band on which a broadcast channel signal including information relating to the uplink unit band is transmitted, and a second downlink unit band other than the basic unit band. A bundling unit ( | 2012-04-12 |
20120089881 | METHOD, APPARATUS AND SYSTEM FOR TRANSMITTING DATA ON DIGITAL SUBSCRIBER LINE - A method includes the following steps: sorting service data into retransmissive service data and non-retransmissive service data; allocating resources to the retransmissive service data and the non-retransmissive service data respectively, and encapsulating the data into DTUs according to the allocated resources; sending, by a sender, the DTU that bears the service data; receiving, by the sender, a retransmission request that is sent according to a result of judging a bit error and a type of the retransmissive service, where the retransmission request carries information about the DTU that needs to be retransmitted; and retransmitting, by the sender, a corresponding DTU that bears the retransmissive service data requested for retransmission. | 2012-04-12 |
20120089882 | PACKET COMBINING DEVICE AND METHOD FOR COMMUNICATION SYSTEM USING HYBRID AUTOMATIC REPEAT REQUEST - A packet combining device for a communication system using hybrid automatic repeat request (HARQ) includes: a HARQ buffer; a combiner configured to combine data which is previously received and stored in the HARQ buffer with newly-received data; and a channel decoder configured to attempt channel decoding by using the combined received data provided from the combiner and provide one or more of log likelihood ratios (LLRs) computed for a systematic bit and a parity bit of the combined received data to the combiner such that the one or more LLRs are combined with the data used for channel decoding. | 2012-04-12 |
20120089883 | Systems and Methods for Error Correction Using Irregular Low Density Parity Check Codes - Various embodiments of the present invention provide systems and methods for generating a code format. One method discussed includes: receiving a first matrix having a row width and a column height that is greater than one; incorporating a circulant into a first column of the first matrix; testing the first column for trapping sets, wherein at least one trapping set is identified; selecting a value to mitigate the identified trapping set; and augmenting the first matrix with a second matrix to yield a composite matrix. The second matrix has the selected value in the first column, and wherein the identified trapping set is mitigated. | 2012-04-12 |
20120089884 | ERROR CORRECTION ENCODING APPARATUS, DECODING APPARATUS, ENCODING METHOD, DECODING METHOD, AND PROGRAMS THEREOF - Provided is an encoding apparatus wherein a transmission data sequence is divided into L short sequences, each of which is then encoded by use of an m-stage pseudo-cyclic low-density parity check encoding system. Each of the L encoded sequences is further divided into shorter sequences, the number of which is identical to the number m of the stages of the pseudo-cyclic codes and each of which has a length m. The shorter sequences are rearranged in order by a replacing module, thereafter encoded, by use of the m-stage pseudo-cyclic low-density parity check encoding system, and outputted. Accordingly, a decoding apparatus with a simple structure where node processing circuits (e.g., minimum-value calculating circuits), the number of which is p that is a submultiple of the number m of the foregoing stages, are provided, can be employed to efficiently decode the codes having a large frame length and a large encoding gain. | 2012-04-12 |
20120089885 | DATA TRANSMISSION UTILIZING ROUTE SELECTION AND DISPERSED STORAGE ERROR ENCODING - A method begins by a processing module obtaining a set of encoded data slices for transmission to a receiving entity via a network, wherein the set of encoded data slices represents data that has been dispersed storage error encoded. The method continues with the processing module dividing the set into a plurality of sub-sets of encoded data slices in accordance with an error coding distributed routing protocol. The method continues with the processing module determining a plurality of routing paths within the network in accordance with the error coding distributed routing protocol. The method continues with the processing module transmitting the plurality of sub-sets of encoded data slices via the plurality of routing paths to the receiving entity in accordance with the error coding distributed routing protocol. | 2012-04-12 |
20120089886 | RELAYING DATA TRANSMITTED AS ENCODED DATA SLICES - A method begins by a first device determining an error coding distributed routing protocol and transmitting a set of encoded data slices, identity of a second device, and the error coding distributed routing protocol to a network, wherein the set of encoded data slices represents data that has been dispersed storage error encoded. The method continues with the network routing a plurality of sub-sets of the set of encoded data slices via an initial plurality of routing paths towards the second, comparing anticipated routing performance with a desired routing performance, and altering the routing path to obtain a favorable comparison. The method continues with the second device receiving at least some of the set of encoded data slices from the network and decoding at least a threshold number of encoded data slices to reproduce the data when at least the threshold number of encoded data slices have been received. | 2012-04-12 |
20120089887 | DATA TRANSMISSION UTILIZING DATA PROCESSING AND DISPERSED STORAGE ERROR ENCODING - A method begins by a processing module dispersed storage error encoding fundamental component data of data in accordance with dispersed storage error coding parameters to produce a plurality of sets of encoded data slices, wherein the data includes the fundamental component data and enhancement component data. The method continues with the processing module transmitting a set of the plurality of sets of encoded data slices and transmitting a corresponding portion of the enhancement component data substantially concurrently with the transmitting of the set of the plurality of sets of encoded data slices. | 2012-04-12 |
20120089888 | Systems and Methods for Multi-Level Quasi-Cyclic Low Density Parity Check Codes - Various embodiments of the present invention provide systems and methods for generating a code format. One method discussed includes: Various embodiments of the present invention provide methods for generating a code format. Such methods include: receiving an indication of a low weight codeword having a trapping set; selecting an initial value for a base matrix; testing the low weight codeword after modification by the initial value to determine an updated weight of the low weight codeword; and testing the low weight codeword after modification by the initial value to determine whether the trapping set remains. | 2012-04-12 |
20120089889 | DATA TRANSMISSION UTILIZING PARTITIONING AND DISPERSED STORAGE ERROR ENCODING - A method begins by a first device obtaining data for transmission to a second device and partitioning the data to produce a plurality of data portions. The method continues with the first device dispersed storage error encoding the plurality of data portions using a plurality of sets of error coding dispersal storage function parameters to produce a plurality of sets of encoded data slices and transmitting the plurality of sets of encoded data slices to the second device via a network. The method continues with a second device receiving at least a decode threshold number of encoded data slices and dispersed storage error decoding the at least a decode threshold number of encoded data slices to produce a decoded data portion for each set of the plurality of sets of encoded data slices. The method continues with the second device recapturing the data from a plurality of decoded data portions. | 2012-04-12 |
20120089890 | FEC CODE AND CODE RATE SELECTION BASED ON PACKET SIZE - Techniques for encoding and decoding data are described. In an aspect, multiple code rates for a forward error correction (FEC) code may be supported, and a suitable code rate may be selected based on packet size. A transmitter may obtain at least one threshold to use for code rate selection, determine a packet size to use for data transmission, and select a code rate from among the multiple code rates based on the packet size and the at least one threshold. In another aspect, multiple FEC codes of different types (e.g., Turbo, LDPC, and convolutional codes) may be supported, and a suitable FEC code may be selected based on packet size. The transmitter may obtain at least one threshold to use for FEC code selection and may select an FEC code from among the multiple FEC codes based on the packet size and the at least one threshold. | 2012-04-12 |
20120089891 | RATE ADJUSTMENT APPARATUS AND A RATE ADJUSTMENT METHOD - A rate adjustment apparatus includes a calculating section to calculate a number of outputs where bits of input data are sequentially output when a number of times of puncturing of the input data to be punctured is smaller than a number of remaining bits after puncturing, and a processing section to sequentially output bits of the input data and puncture the bits of the input data based on the number of outputs calculated by the calculating section. | 2012-04-12 |
20120089892 | METHOD AND APPARATUS FOR DATA MANAGEMENT THROUGH TIMER COMPENSATION IN A WIRELESS COMMUNICATION SYSTEM - A method and an apparatus for data management through timer compensation in a wireless communication system are provided. In the method, when a data loss occurs at a first point, whether a data loss has occurred previously and so whether a timer is being driven are determined. Whether the driven timer stops or expires at a second point is determined. When the timer stops or expires at the second point, a timer value is compensated for with consideration of a time difference between the first point and the second point. A timer for the data loss of the first point is restarted based on the compensated timer value. Therefore, a delay of a retransmission request time for lost data in an RLC (Radio Link Control) layer may be minimized. | 2012-04-12 |
20120089893 | Management Method And System For Implementation, Execution, Data Collection, and Data Analysis Of A Structured Collection Procedure Which Runs On A Collection Device - A collection device for performing a structured collection procedure may include a processor that executes program instructions communicably coupled to at least one memory. The processor can initiate a schedule of events of the structured collection procedure upon one or more entry criterions being met and segregate the at least one memory into a primary data store and a secondary data store. The processor can write structured patient data collected in accordance to the schedule of events to the secondary data store. The processor can transform a relevant portion of the structured patient data into an evaluated data object. The processor can generate a data abstraction based in part upon the evaluated data object. The processor can link the primary data store and the secondary data store with the data abstraction. | 2012-04-12 |
20120089894 | Detection Of Duplicate Packets - A packet is received from a network. The packet includes a field. The content of the field is compared to each element of a list. If the content of the field fails to match any element in the list, the packet is accepted and the content of the field is added to the list as an additional element of the list. | 2012-04-12 |
20120089895 | MOBILE TERMINAL DEVICE AND RECORDING MEDIUM - A mobile terminal device has a control unit and a display unit. The control unit executes a process which includes acquiring data having anchors that are link information that is linked to other data, specifying an anchor that is included in a display range among the acquired anchors, editing data that is to be displayed and includes the specified anchor to which a shortcut is assigned and making the display unit display the edited data. | 2012-04-12 |
20120089896 | EXTRAPOLATING TABULAR STRUCTURE IN A FREEFORM DOCUMENT - Various embodiments of systems and methods for extrapolating tabular structure to facilitate manipulation of elements in the freeform document are described herein. The freeform document includes an unstructured canvas providing users the ability to place one or more elements in the canvas. A primary column is determined by the selection of at least one element in the freeform document. Further, one or more secondary columns in the freeform document corresponding to the primary column are determined. A tabular structure in the freeform document is extrapolated based on the determined primary column and the one or more secondary columns to facilitate manipulation of elements in the freeform document, such as reordering, resizing and deleting the one or more elements, and inserting one or more new elements in the freeform document. | 2012-04-12 |
20120089897 | System and Method for Creating Trade-Related Annotations in an Electronic Trading Environment - A client terminal displays a trading screen interface and an annotation interface in relation to the trading screen interface. The annotation interface allows a trader to enter trade-related annotations in a quick and efficient manner or flag a predetermined time and input annotations to be associated with the flagged time a later time, while the trading screen interface allows the trader to make trades at the most favorable prices and in a speedy manner. The annotation interface may alternatively not be displayed and allow for audio input. | 2012-04-12 |
20120089898 | Identifying Language Translations For Source Documents using Links - Technology is described for identifying language translations for source documents. The method includes finding source documents containing links to target documents and the link anchors of the links have language indicating text. A first tuple set can be generated for paired source documents and target documents with an expected target language for a target document. The first tuple set can be annotated with primary languages for the source documents and target documents to form a second tuple set where primary languages of the source documents and target documents are different. Further, a third tuple set can be generated using the second tuple set using a count of the number of times source documents and target documents occur in the first tuple set. Tuples can be removed from the third tuple set where a count ratio between source document count and target document count is less than a reference ratio. | 2012-04-12 |
20120089899 | METHOD AND SYSTEM FOR REDISPLAYING A WEB PAGE - A method and system for redisplaying a web page is provided. An example method comprises accessing a web page received at a computer system, analyzing the structured text of the web page, and identifying a plurality of content sections. A rendering module renders a web page view comprising the plurality of sections. | 2012-04-12 |
20120089900 | SYSTEM AND METHOD FOR IDENTIFYING LINE BREAKS - Method, system, and computer code for preparing markup language documents containing multi-line text elements for WYSIWYG printing. The document is rendered in a prepress server system by a duplicate of the browser that was used to prepare the document in the client system. User-imposed line breaks are identified by reviewing text elements for break characters. Browser-imposed line breaks are identified by comparing spatial location information from the browser for each sequential pair of characters in a text element. The collective line break information is used to ensure that the line breaks viewed by the user are maintained when the document is converted to a prepress system. | 2012-04-12 |
20120089901 | HIGH PERFORMANCE CROSS PLATFORM DOCUMENT VIEWING - A document viewing system is provided that includes a browser receiving one or more user requests to view a document being stored remotely. The browser issues a first request to a server for metadata associated with the document and based on the received metadata determines a selective number of tiles needed for viewing the document. The browser issues a second request to the server requesting the selective number of tiles for viewing the document. The selective number tiles are only those tiles available for viewing in a viewing area in the browser. The server sends the selective number of tiles in parallelized fashion to the browser. The browser receives the selective number of tiles from the server and displays the document to a user. | 2012-04-12 |
20120089902 | SYSTEMS AND METHODS FOR DASHBOARD IMAGE GENERATION - Systems and methods for generating a dashboard image for viewing on a remote computing device. The system may include a business database storing a plurality of business values; a dashboard generator; an image generator and a web page generator. The dashboard generator may be configured to derive a plurality of key performance indicator values from the database and generate a corresponding dashboard. The image generator may be configured to generate the dashboard image corresponding to the dashboard. The web page generator may be operatively coupled to the image generator and configured to generate a dashboard web page corresponding to the dashboard image. The method may include: receiving a dashboard image request from the remote computing device; deriving a plurality of key performance indicator values from a business database; creating a dashboard image corresponding to the key performance indicator values; generating a dashboard web page corresponding to the dashboard image. | 2012-04-12 |
20120089903 | SELECTIVE CONTENT EXTRACTION - A method for extracting web content includes detecting, within a web page, a hierarchical structure that includes a plurality of nodes. Potential article nodes from the plurality of nodes are identified. The identified potential article node with a highest rank in the hierarchical structure is identified as an article node. Content is extracted from the article node. | 2012-04-12 |
20120089904 | CONVERSION OF DECLARATIVE STATEMENTS INTO A RICH INTERACTIVE NARRATIVE - Technologies pertaining to conversion of declarative statements written in a domain-specific language to data that is playable by a rich interactive narrative (RIN) player are described herein. A web browser can be configured to support a RIN player. Source code of a web page includes an indication that the RIN player is to be invoked, declarative statements written in the domain-specific language, and data that identifies a network-accessible location of a converter. The converter is configured to convert declarative statements in the domain-specific language to RIN data that is playable by the RIN player. Thus, a developer of a web page can utilize declarative statements in the domain-specific language to cause a RIN to be included in a web page. | 2012-04-12 |
20120089905 | TRANSLATABLE ANNOTATED PRESENTATION OF A COMPUTER PROGRAM OPERATION - Embodiments of the disclosure relate to generating a translatable and annotated multimedia or video presentation of a software program operation. An aspect of the disclosure comprises recording user interaction data that includes user interface gestures and text entries from a keyboard and other user devices while the program is operating. Embodiments of the disclosure transform recorded text and visual contents of the program to a selected format or language, annotate contents of interest, and merge recorded user interface gestures, transformed text and visual contents, and transformed annotations into the output presentation. The embodiments of the disclosure optionally generate an accessibility script in a selected format. | 2012-04-12 |
20120089906 | CROSS-ENVIRONMENT APPLICATION COMPATIBILITY - A seamless cross-environment workflow is provided in a multi-operating system computing environment. The multi-operating system computing environment may include a mobile operating system and a desktop operating system running concurrently and independently on a mobile computing device. Two or more application programs, running in independent operating systems, share user interaction state information including user data, user settings, and/or application context information. Interaction state information may be shared for applications that are used primarily to access and edit local user content as well as applications that communicate to a remote server or access and navigate other remote content (e.g., Internet-based application, browser, etc.). The mobile computing device may be a smartphone running the Android mobile operating system and a full desktop Linux distribution on a modified Android kernel. | 2012-04-12 |