16th week of 2011 patent applcation highlights part 45 |
Patent application number | Title | Published |
20110093655 | Connecting A Storage Subsystem And An Electronic Device With A Control Device That Hides Details Of The Storage Subsystem - An apparatus includes an external interface port to connect to an external electronic device, where the external interface port is to communicate over a communications path with the external electronic device according to a serial communication protocol. The apparatus has a control device to hide details of the storage subsystem from the external electronic device. The control device is configured to perform at least one of (1) expanding a storage capacity of at least one logical storage volume of the storage subsystem, and (2) migrating a portion of data stored in the storage subsystem to a new physical storage device. | 2011-04-21 |
20110093656 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR CONFIGURING A REWRITEABLE NON-VOLATILE MEMORY FOR PRESENTATION OF MEDIA BY A SELECTED MEDIA PRESENTATION DEVICE MODEL - Systems, methods, and computer readable media for managing digital media in a memory storage device associated with a mobile smart device are disclosed. According to one aspect, the subject matter described herein includes a method for configuring a rewriteable non-volatile memory for presentation of media by a selected media presentation device model. The method includes providing a rewriteable non-volatile memory configuration interface through which a user can select at least one media file and one of a plurality of media presentation device models. and providing a rewriteable non-volatile memory configuration manager, which, in response to selection of the at least one media file and the one media presentation device model via the configuration interface, accesses a database including entries corresponding to the plurality of media presentation device models and configures a rewriteable non-volatile memory according to information retrieved from the database to allow presentation of the at least one media file when the rewriteable non-volatile memory is present in the selected media presentation device model. | 2011-04-21 |
20110093657 | STORAGE DEVICE AND DATA COMMUNICATION SYSTEM - A storage device includes: an input/output section connected to an electronic apparatus; a memory for storing data; a control section accessing the memory based on an instruction input from the electronic apparatus to the input/output section; and a communication section communicating with an external apparatus separate from the electronic apparatus, wherein the control section accesses a range in the memory specified by the electronic apparatus based on the instruction from the electronic apparatus and causes data associated with the accessed range to be transmitted and received between the communication section and the external apparatus. | 2011-04-21 |
20110093658 | CLASSIFYING AND SEGREGATING BRANCH TARGETS - A system and method for branch prediction in a microprocessor. A branch prediction unit stores an indication of a location of a branch target instruction relative to its corresponding branch instruction. For example, a target instruction may be located within a first region of memory as a branch instruction. Alternatively, the target instruction may be located outside the first region, but within a larger second region. The prediction unit comprises a branch target array corresponding to each region. Each array stores a bit range of a branch target address, wherein the stored bit range is based upon the location of the target instruction relative to the branch instruction. The prediction unit constructs a predicted branch target address by concatenating a bits stored in the branch target arrays. | 2011-04-21 |
20110093659 | DATA STORAGE DEVICE AND DATA STORING METHOD THEREOF - A data storage device and a data storing method thereof, including first main memories coupled to a plurality of channels, second main memories coupled to the plurality of channels in common, a buffer memory temporarily storing data to be programmed to the first and the second main memories; and a controller configured to program data of victim cache lines from the buffer memory to the second main memories while data of a first victim cache line from the buffer memory is being programmed to the first main memories. The storing method includes that a victim cache line is selected based on cost-based page replacement. | 2011-04-21 |
20110093660 | MULTI-CORE PROCESSING SYSTEM - A system has a first plurality of cores in a first coherency group. Each core transfers data in packets. The cores are directly coupled serially to form a serial path. The data packets are transferred along the serial path. The serial path is coupled at one end to a packet switch. The packet switch is coupled to a memory. The first plurality of cores and the packet switch are on an integrated circuit. The memory may or may not be on the integrated circuit. In another aspect a second plurality of cores in a second coherency group is coupled to the packet switch. The cores of the first and second pluralities may be reconfigured to form or become part of coherency groups different from the first and second coherency groups. | 2011-04-21 |
20110093661 | MULTIPROCESSOR SYSTEM WITH MIXED SOFTWARE HARDWARE CONTROLLED CACHE MANAGEMENT - A multiprocessor system has a background memory and a plurality of processing elements ( | 2011-04-21 |
20110093662 | MEMORY HAVING INTERNAL PROCESSORS AND DATA COMMUNICATION METHODS IN MEMORY - Memory having internal processors, and methods of data communication within such a memory are provided. In one embodiment, an internal processor may concurrently access one or more banks on a memory array on a memory device via one or more buffers. The internal processor may be coupled to a buffer capable of accessing more than one bank, or coupled to more than one buffer that may each access a bank, such that data may be retrieved from and stored in different banks concurrently. Further, the memory device may be configured for communication between one or more internal processors through couplings between memory components, such as buffers coupled to each of the internal processors. Therefore, a multi-operation instruction may be performed by different internal processors, and data (such as intermediate results) from one internal processor may be transferred to another internal processor of the memory, enabling parallel execution of an instruction(s). | 2011-04-21 |
20110093663 | ATOMIC COMPARE AND WRITE MEMORY - A microcontroller system may include a microcontroller having a processor and a first memory, a memory bus and a second memory in communication with the microcontroller via the memory bus. The first memory may include instructions for accessing a first data set from a contiguous memory block in the second memory. The first data set may include a first word having a first value and a plurality of first other words. The first memory may include instructions for receiving a write instruction including a second data set to be written to the contiguous memory block. The first memory may include instructions for determining whether the first value equals the second value. If so, the first memory may include instructions for writing the second data set to the contiguous memory block and updating the first value. | 2011-04-21 |
20110093664 | DATA DE-DUPLICATION BY PREDICTING THE LOCATIONS OF SUB-BLOCKS WITHIN THE REPOSITORY - A computer-enabled method of storing an input dataset in a storage medium includes storing a copy for each of a plurality of repeatable blocks of data in an input dataset in a storage medium. The process further includes finding a location in the storage medium of the copy of a block of data in the input dataset. Finding the location includes determining a most likely location in the storage medium of the copy of the block of data from one or more blocks of data preceding the block of data based on statistics of past stored data. Finding the location further includes if the determined most likely location contains a block of data that matches with the actual block of data, retrieving the location in the storage medium of the copy of the block of data. The process also includes storing the location of the copy of the block of data. | 2011-04-21 |
20110093665 | MEMORY HAVING INTERNAL PROCESSORS AND METHODS OF CONTROLLING MEMORY ACCESS - Memories having internal processors and methods of data communication within such memories are provided. One such memory may include a fetch unit configured to substantially control performing commands on a memory array based on the availability of banks to be accessed. The fetch unit may receive instructions including commands indicating whether data is to be read from or written to a bank, and the address of the data to be read from or written to the bank. The fetch unit may perform the commands based on the availability of the bank. In one embodiment, control logic communicates with the fetch unit when an activated bank is available. In another implementation, the fetch unit may wait for a bank to become available based on timers set to when a previous command in the activated bank has been performed. | 2011-04-21 |
20110093666 | NUMERICAL CONTROLLER CAPABLE OF DIVIDING AND COMBINING MEMORY AREAS TO STORE MACHINING PROGRAMS AND BINARY DATA - A memory other than a non-volatile memory in a numerical controller is divided into a plurality of memory areas in response to a command from a computer connected to the numerical controller. Whether a machining program has been stored in each of the divided memory areas is decided before a machining program stored on a hard disk in the computer is transferred to the memory other than the non-volatile memory. The machining program stored on the hard disk is then written to an area for which it is determined that no machining program is stored. | 2011-04-21 |
20110093667 | INFORMATION PROCESSING APPARATUS, METHOD AND COMPUTER PROGRAM - An information processing apparatus for processing input data using multiple items of reference data in succession is provided. The apparatus includes a secondary storage unit configured to store the reference data; a primary storage unit accessible at a speed higher than that of the secondary storage unit; a read-out unit configured to read out the reference data from the secondary storage unit to the primary storage unit; an execution unit configured to execute processing of the input data using the reference data in the primary storage unit; a determination unit configured to determine, based upon at least one of a probability that reference data scheduled for use by the execution unit will change and quantity of the scheduled reference data, whether the scheduled reference data is to be prefetched; and a control unit configured to control prefetch based on the result of determination of the determination unit. | 2011-04-21 |
20110093668 | Thin Film Memory System - An electronic system includes at least one reduced-complexity integrated circuit memory coupled to a memory controller. By reducing the complexity of each integrated circuit memory and concentrating the complexity within the memory controller, overall system costs may be greatly reduced and reliability improved. | 2011-04-21 |
20110093669 | Memory System and Method for Two Step Memory Write Operations - A method of operating a memory component that includes a memory core includes receiving, from external control lines, a write command that specifies a write operation. The write command is stored for a first time period after receiving the write command. After the first time period, the write operation is initiated in response to the write command. During the write operation, unmasked portions of received data are written to the memory core, where the unmasked portions of the data are bits of the data that are identified by received mask information as not being masked. | 2011-04-21 |
20110093670 | System and Method for Enhanced Application Performance with Tiered Storage in an Information Handling System - An information handling system includes a memory controller coupled to a first and a second storage device. The memory controller stores information on the first storage device based upon an access count related to the information, stores other information on the second storage device based upon a another access count related to the other information, and stores access data including the access counts. The information handling system also includes a processing system coupled to the memory controller. The processing system obtains the access data from the memory controller, and determines to perform an operation on the data based upon the access count, and to not perform the operation on the other data based upon the other access count. | 2011-04-21 |
20110093671 | REFRESH ALGORITHM FOR MEMORIES - A method and apparatus for refreshing data in a flash memory device is disclosed. A counter is maintained for each memory block. When a memory block is erased, the counter for that erase block is set to zero while the remaining counters are incremented. When a memory block counter reaches a predetermined threshold value, the associated memory block is refreshed. | 2011-04-21 |
20110093672 | SYSTEMS AND METHODS FOR RECOVERING ELECTRONIC INFORMATION FROM A STORAGE MEDIUM - In one embodiment of the invention, a method is provided for retrieving certain electronic information previously stored on certain storage media after a threshold set in the storage retention criteria has been exceeded in an electronic information storage system that stores electronic information on storage media in accordance with a storage retention criteria is provided. The method includes storing a record in a memory associated with a system manager that assigns the storage retention criteria to the certain electronic data, designating the storage media available for overwrite after the threshold set in the storage retention policy has been exceeded, identifying the certain storage media available for overwrite, and retrieving information from the certain media after the threshold set in the storage retention policy has been exceeded. | 2011-04-21 |
20110093673 | METHOD OF MANAGING A MEMORY OF A TERMINAL - The invention provides a method of managing a memory of a terminal, wherein a substitute file is substituted in the memory of the terminal for at least one predetermined file, which file is previously backed-up in a member other than the terminal, the substitute file having content that is obtained at least in part from the predetermined file. | 2011-04-21 |
20110093674 | Method and Apparatus for Automatic Solid State Drive Performance Recovery - A method and apparatus are disclosed for automatic solid state drive performance recovery. A detection module detects a first SSD exceeding a fragmentation threshold. A plurality of drives comprises the first SSD and stores a data copy of data stored on the first SSD. An erase module erases a mapping table for the first SSD. The mapping table maps Logical Block Addresses LBA to physical addresses for the first SSD. A rebuild module rebuilds the data and the mapping table on the first SSD from the data copy. | 2011-04-21 |
20110093675 | METHOD FOR PROTECTING REDUNDANT DATA - A method for protecting redundant data is provided. In the present invention, when a working data area and a redundant data area are not destroyed, whether global unique identifiers (GUIDs) of both the working data area and the redundant data area are the same is determined when a power on self test (POST) is executed. If the GUIDs are different, the data of the working data area is synchronized to the redundant data area. Next, the working data area and the redundant data area are set to share the same memory address space. One of the working data area and the redundant data area is selected for mapping to the memory address space in case that an operating system is executed. | 2011-04-21 |
20110093676 | SYSTEM MANAGING A PLURALITY OF VIRTUAL VOLUMES AND A VIRTUAL VOLUME MANAGEMENT METHOD FOR THE SYSTEM - This invention provides a control technique of a data processing system, in which functions of a highly-functional high-performance storage system are achieved in an inexpensive storage system so as to effectively use the existing system and reduce the cost of its entire system. This system has a RAID system, an external subsystem, a management server, a management client and the like. The management server includes an information management table for storing mapping information of the RAID system and the external subsystem. When performing copy process, the pair creation in which a logical volume of the RAID system is set as a primary volume of copy source and a logical volume of a mapping object of the RAID system mapped from the logical volume of the external subsystem is set as a secondary volume of copy destination is executed from the management client by using the information management table. | 2011-04-21 |
20110093677 | System and Method for Write Once Read Many (WORM) Storage in an Information Handling System - A Write-Once Read-Many (WORM) memory controller receives data from a processing system that is addressed to a location in a storage device, stores the data and a tag at the location, receives second data from the processing system that is addressed to the location, determines that the location includes the tag, and prevents the second data from being stored at the location based upon the presence of the tag. A WORM memory device sends a reply to a controller in response to an initialization command. The reply includes an address number that corresponds with the storage capacity of the WORM memory device. The WORM memory device sends another reply to another controller in response to another initialization command. The initialization commands are different from each other. The other initialization reply includes an address number of zero. | 2011-04-21 |
20110093678 | ONBOARD SYSTEM - A control unit (main CPU | 2011-04-21 |
20110093679 | Identifying Dynamically Changing Virtual Storage Devices - Mechanisms are provided for detecting changes in virtual storage device configurations. The mechanisms detect an event corresponding to a change in configuration of a virtual storage device. The virtual storage device is comprised of a plurality of portions of a plurality of physical storage devices. The mechanisms further, in response to detecting the event, determine if the change in configuration of the virtual storage device results in a change in the types of physical storage devices that are part of the virtual storage device. Moreover, the mechanisms further transmit a notification, in response to a determination that the change in configuration of the virtual storage device results in a change in the types of physical storage devices that are part of the virtual storage device, of the results of the change in configuration of the virtual storage device to one or more registered recipients registered to receive such notifications. | 2011-04-21 |
20110093680 | FLEXIBLE MEMORY CONTROLLER FOR AUTONOMOUS MAPPING OF MEMORY - A memory controller implements flexible memory mapping for storage of data units in a memory. The memory controller logically partitions the memory into a plurality of blocks or block segments and manages the storage of data units among the plurality of blocks/block segments. The memory controller can operate in one of three modes: a monolithic mode whereby the memory is modeled as a plurality of blocks, whereby each block is treated as a “monolithic” block; a fragmented mode whereby the memory is modeled as a plurality of blocks segments of varying sizes; and a combined mode whereby the memory is initially partitioned into a plurality of equal-sized blocks, and whereby each block can be used as a monolithic block or a fragmented block comprising a plurality of block segments of different sizes, and wherein monolithic blocks can be converted to fragmented blocks and fragmented blocks can be converted back to monolithic blocks. | 2011-04-21 |
20110093681 | REMAINING INSTRUCTION FOR PROCESSING VECTORS - The described embodiments include a processor that executes a vector instruction. The processor starts by receiving an input vector and optionally receiving a predicate vector as inputs. The processor then executes the vector instruction, which causes the processor to determine a key element position in the input vector and generate a result vector. When generating the result vector, if the predicate vector is received, for each element in the result vector for which a corresponding element of the predicate vector is active, otherwise, for each element of the result vector, the processor sets each element of the result vector to the right of the key element to a first predetermined value and sets each element of the result vector at or to the left of the key element to a second predetermined value. The processor then sets one or more processor status flags based on the values in the result vector. | 2011-04-21 |
20110093682 | METHOD AND APPARATUS FOR PACKING DATA - An apparatus includes an instruction decoder, first and second source registers and a circuit coupled to the decoder to receive packed data from the source registers and to pack the packed data responsive to a pack instruction received by the decoder. A first packed data element and a second packed data element are received from the first source register. A third packed data element and a fourth packed data element are received from the second source register. The circuit packs packing a portion of each of the packed data elements into a destination register resulting with the portion from second packed data element adjacent to the portion from the first packed data element, and the portion from the fourth packed data element adjacent to the portion from the third packed data element. | 2011-04-21 |
20110093683 | Program flow control - A data processing apparatus includes a data engine | 2011-04-21 |
20110093684 | TRANSPARENT CONCURRENT ATOMIC EXECUTION - Executing a block of code is disclosed. Executing includes receiving an indication that the block of code is to be executed using a synchronization mechanism and speculatively executing the block of code on a virtual machine. The block of code may include application code. The block of code does not necessarily indicate that the block of code should be speculatively executed. | 2011-04-21 |
20110093685 | DATA PROCESSING CIRCUIT - A data processing circuit is disclosed in the present invention. The data processing circuit includes a decoder and a number of N-stage circuits. The circuits receive input data from at least a memory and separate the input data into N stages. The circuit process and store the N input data simultaneously to decrease the time of data processing in the data processing circuit. | 2011-04-21 |
20110093686 | Register state saving and restoring - In a data processing apparatus | 2011-04-21 |
20110093687 | MANAGING MULTIPLE SPECULATIVE ASSIST THREADS AT DIFFERING CACHE LEVELS - An illustrative embodiment provides a computer-implemented process for managing multiple speculative assist threads for data pre-fetching that sends a command from an assist thread of a first processor to second processor and a memory, wherein parameters of the command specify a processor identifier of the second processor, responsive to receiving the command, reply by the second processor indicating an ability to receive a cache line that is a target of a pre-fetch, responsive to receiving the command replying by the memory indicating a capability to provide the cache line, responsive to receiving replies from the second processor and the memory, sending, by the first processor, a combined response to the second processor and the memory, wherein the combined response indicates an action, and responsive to the action indicating a transaction can continue sending the requested cache line, by the memory, to the second processor into a target cache level on the second processor. | 2011-04-21 |
20110093688 | CONFIGURATION MANAGEMENT APPARATUS, CONFIGURATION MANAGEMENT PROGRAM, AND CONFIGURATION MANAGEMENT METHOD - A configuration management apparatus that manages, on the basis of data having configuration items and attribute information defining the configuration items, information about the resources includes: an operation execution unit that acquires a processing request that at least includes attribute information and processing information; a processing execution unit that determines for which configuration item the processing request is made and links the configuration item and the processing request; and a delay calculation determination unit, a calculation execution unit and a delay calculation plan unit that perform a process of processing information inside the processing request for the configuration item on the basis of the linking by the processing execution unit at a different timing from a timing when the processing request is acquired by the operation execution unit to get attribute information inside the processing request reflected in the configuration item. | 2011-04-21 |
20110093689 | System and Method for Bios and Controller Communication - A system and method for BIOS and controller communication. An information handling system comprises a central processing unit coupled to a memory. The memory further comprises a BIOS. The information handling system further comprises a controller coupled to a nonvolatile memory, and a register coupled to the central processing unit and the controller. The controller is operable to initialize communication with the BIOS, and service commands from the BIOS. The central processing unit is operable to initialize communication with the controller, and send commands to the controller. | 2011-04-21 |
20110093690 | System and Method for a Managed Bios - In accordance with the present disclosure, a system and method for a managed BIOS is disclosed. A software for a BIOS in an information handling system is provided on a computer readable medium. A first code, for execution on a central processing unit (CPU), is operable to initiate a connection to a management controller through a controller, send a message to the management controller through the controller, and receive a message from the management controller through the controller in response to a system management interrupt. The first code is also operable to stall a power-on procedure if it is able to determine a plurality of bootable devices before the connection to the management controller is ready. The first code is further operable to stall the power-on procedure before releasing control to an operating system if the management controller is active. | 2011-04-21 |
20110093691 | MULTI-ENVIRONMENT OPERATING SYSTEM - A device with multiple, co-existing, and independent environments interacting with a common kernel, and related methods of operation, are disclosed herein. Operation is altered or dependent on the device being or entering a docked mode. | 2011-04-21 |
20110093692 | METHOD OF UPDATING IDENTIFICATION DATA OF A COMPUTER SYSTEM AND RELATED COMPUTER SYSTEM - A method of updating an identification datum of a computer system includes starting BIOS when the computer system is powered on, starting a power on self test (POST) program in BIOS, the POST program detecting whether a memory unit stores an identification datum not being input yet, determining whether to input the identification datum into the computer system according to a result of detecting whether the memory unit stores the identification datum by the POST program. | 2011-04-21 |
20110093693 | BINDING A CRYPTOGRAPHIC MODULE TO A PLATFORM - One embodiment is a computer system having firmware that shares a secret with a cryptographic co-processor to determine if the cryptographic co-processor has been tampered with or removed from the computer system. | 2011-04-21 |
20110093694 | Pattern Recognition Using Transition Table Templates - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for using transition table templates. In one aspect, a method includes receiving a transition table for a current state of a finite automaton and determining whether the transition table for the current state is similar to a transition table template in a set of transition table templates. The method further includes generating a condensed representation of the transition table if the transition table is similar to a transition table template and otherwise adding the transition table to the set of transition table templates. In another aspect, a method includes receiving an input element and determining whether a next state corresponding to the input element is in the difference region of a condensed transition table. The method further includes retrieving the next state from the difference region, or a transition table template, based on the determination. | 2011-04-21 |
20110093695 | SECURE OFFLINE RELOCATION OF PORTABLE SOFTWARE LICENSES - A method for the secure offline relocation of portable software licenses. The portable software license has an associated time limit. A license relocation record can be generated including the portable software license and limit information for the time limit for relocation to a second computing device operating in an offline state. The license relocation record is temporarily securely stored on a removable security device attached to a first computing device that is connected to a licensing network. The removable security device can be disconnected from the first computing device and subsequently connected to the second computing device. Provided the time limit is not exceeded, the portable software license can then be installed upon the second computing device. Upon successful installation of the portable software licenses, the license relocation record can be removed from the removable security device. | 2011-04-21 |
20110093696 | DEVICE AND METHOD FOR DIRECTING EXCHANGE FLOWS FOR PUBLIC OR NON SENSITIVE VALUES FOR CREATING COMMON SECRET KEYS BETWEEN AREAS - A method and a system for routing exchange flows of public or non-sensitive values for creating common keys between a number of areas in a system in which the entities communicate with each other by trust group, including: each entity generates a public value and communicates this public value to a router; the router, having a mapping table correlating a virtual network number and the MAC addresses of the associated entities, recovers all the public addresses transmitted by the entities by associating them with their MAC address, and retransmits, to each of the entities, a public value of another entity belonging to the same trust group; each entity recovering the public value of another entity belonging to the same trust group then determines the value of the encryption key common to the entities of one and the same trust group; and uses this key to encrypt the data to be transmitted to another entity. | 2011-04-21 |
20110093697 | SYSTEM AND METHOD FOR UPGRADING THE REMOTE CONTROL FUNCTIONALITY OF A DEVICE - A system and method for upgrading remote control application resident on a device. To this end, a markup language file is created. The markup language file has a representation of information used to setup the remote control application to communicate with an appliance. The markup language file may be executed, on the device or an intermediate client with which the device is synchronized, to upload the representation of the information to a remote server. At the remote server, the uploaded information is used to automatically display user-selectable, downloadable data files relevant to the control of the appliance. Downloaded data files, which may include command codes and/or graphical user interface elements, may be used within the device to upgrade the ability of the remote control application to communicate with the appliance. The information uploaded to the server may also be used to generate demographic data regarding consumer preferences. | 2011-04-21 |
20110093698 | SENDING MEDIA DATA VIA AN INTERMEDIATE NODE - A method and apparatus for sending protected media data from a data source node to a client node via an intermediate node. The data source node establishes a first hop-by-hop key to be shared with the intermediate node and an end-to-end key to be shared with the client node. A single security protocol instance is configured and used to trans-protocol form data from a media stream into transformed data using the keys. The transformed data is then sent to the intermediate node. The intermediate node uses the first hop-by-hop key to apply a security processing to the transformed data, and establishes a second hop-by-hop key with the client node. A second transformation is performed on the transformed data using the second hop-by-hop key to produce further transformed media data, which is then sent to the client node. At the client node a single security protocol instance is configured with the second hop-by-hop key and the end-to-end key, which are used to apply further security processing to the transformed media data. | 2011-04-21 |
20110093699 | COMMUNICATION BETWEEN KEY MANAGER AND STORAGE SUBSYSTEM KERNEL VIA MANAGEMENT CONSOLE - System, computer program product, and method embodiments for communication between a kernel operational on a storage subsystem and a key manager (KM) through a hardware management console (HMC) to provide encryption support are provided. In one embodiment, an event request is initiated by the kernel to the KM to execute an event flow. Pursuant to a communication request by the kernel to the HMC, a socket of the HMC is opened along a communication path between the KM and the kernel according to an event flow type selected by the KM for the event flow. Pursuant to a data request by the kernel to the KM, data including a data payload is sent by the KM to the kernel, the data payload corresponding to the selected event flow type. | 2011-04-21 |
20110093700 | METHOD AND APPARATUS FOR SECURE EXECUTION USING A SECURE MEMORY PARTITION - A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code. | 2011-04-21 |
20110093701 | Software Signature Tracking - A method for preventing unauthorized use of software may be achieved by executing computer-readable code with instructions for recording an indication of at least one selected file of a software application in a memory location accessible to a security component of the software application, in which software application the security component is configured to cause a hash signature of the at least one selected file to be generated in response to a signal arising from use of the software application, hashing the at least one selected file to generate a first file signature, transmitting the first file signature to a secure network-accessible computer memory for storage and subsequent comparison to at least one subsequent file signature generated via operation of the security component on a client device, comparing the first file signature to a second file signature generated by the security component in response to a signal arising from use of the software application on the client device, and disabling the software application on the client device, in response to determining that the first file signature does not match the second file signature. | 2011-04-21 |
20110093702 | IMAGE FORMING APPARATUS - An image forming apparatus includes a main controller unit provided in a main body of the image forming apparatus. The main controller includes a replacement component management memory to store lifespan information of a replacement component is provided in An authentication operation is performed with respect to the replacement component management memory, and the lifespan information of the replacement component is encrypted and stored in the replacement component management memory. Accordingly, the security of the main controller unit may be enhanced and illegal use of the replacement component may be prevented. | 2011-04-21 |
20110093703 | Authentication of Computing and Communications Hardware - A method for authenticating a computing device or hardware component includes computer-implemented process steps for assigning a unique identifier to the hardware component, generating a baseline fingerprint for the hardware component using algorithm-processing characteristic configuration data determined from the hardware component as input, wherein the baseline fingerprint is capable of being regenerated from the hardware component so long as configuration of the hardware component is not changed, transmitting the identifier in association with the baseline fingerprint for storage in a computer-readable data structure, and generating a data signal, in response to a query comprising the assigned identifier, indicating whether the stored baseline fingerprint for the assigned identifier matches a second fingerprint regenerated from the hardware component at a time after the baseline fingerprint is generated. | 2011-04-21 |
20110093704 | METHOD AND APPARATUS FOR PROVIDING SERVICE USING PERSONAL NETWORK - A method and apparatus in which a device capable of near-field communication receives a service from an external network using a communication function of a device capable of accessing the external network. A personal network is formed with devices having different users, and subscriber information for each user is safely acquired and authenticated, making it possible to provide a service received from the external network to the devices included in the personal network more conveniently. | 2011-04-21 |
20110093705 | METHOD, DEVICE, AND SYSTEM FOR REGISTERING USER GENERATED CONTENT - A method, a device, and a system for registering user generated content (UGC) are provided. The method for registering UGC includes the following steps. A content registration request is received, in which the content registration request carries a UGC and a guarantee credential corresponding to the UGC, and the guarantee credential is generated by a third party network entity. The UGC is registered according to the guarantee credential. The device and the system correspond to the method. Therefore, the registration of UGC is realized with a simple, feasible, and diversified registration method. | 2011-04-21 |
20110093706 | ENCRYPTION DEVICE, KEY DISTRIBUTION DEVICE AND KEY DISTRIBUTION SYSTEM - A key distribution system distributes key data for using content to a second encryption device that has been legitimately outsourced processing by a first encryption device. The first encryption device acquires permission information indicating that the first encryption device has permission to use the content, generates certification information by making an irreversible alteration the to permission information, and transmits the permission information and the certification information to the second encryption device. The second encryption device receives the permission information and the certification information, sends them to a key distribution device, and acquires the key data from the key distribution device. The key distribution device receives the permission information and the certification information, judges whether or not the certification information was generated by the by the first encryption device, and if judging in the affirmative, transmits the key data to the second encryption device. | 2011-04-21 |
20110093707 | TECHNIQUES FOR SECURING CONTENT IN AN UNTRUSTED ENVIRONMENT - Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. The first key is used to decrypt the encrypted version of the content encryption/decryption key. The content delivery service is unaware of the content encryption/decryption key and the first key; and the content held by the content delivery service is encrypted with the content encryption/decryption key. Principals securely share, create, manage, and retrieve the encrypted versions of the content encryption/decryption key and the first key from the content delivery service using secure communications. The encrypted content is obtainable via insecure communications from the content delivery service. | 2011-04-21 |
20110093708 | METHOD FOR PERSONALIZING AN AUTHENTICATION TOKEN - An authentication token using a smart card that an organisation would issue to its customer, the smart card having a processor for executing a software application that is responsive to a user input to generate a one-time password as an output. The smart card co-operates with an interface device for inputting the user input and displaying the one-time password. The authentication token may be used in combination with a remote authentication server for validation of the password and hence authentication of the user. | 2011-04-21 |
20110093709 | Providing Social-Network Information to Third-Party Systems - Particular embodiments receive, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determine, by the first computing device, whether the user of the third-party system matches any member of the social-networking system; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then send, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query. | 2011-04-21 |
20110093710 | LOW-LATENCY PEER SESSION ESTABLISHMENT - A source device and a target device may endeavor to form a secure communication session whereby encrypted messages may be transmitted over an untrusted network, such as the internet. However, the exchange of many messages in the establishment of the communication session may involve considerable latency and computational resources, particularly in scenarios featuring many communication sessions (e.g., peer-to-peer communication sessions.) Techniques for initiating a communication session may be devised that enables the initiation of a communication session with only two exchanged messages, or even with a single message transmitted from the source device to the target device. Some embodiments of these techniques may also permit the inclusion of advantageous security features, such as authentication via public certificate to detect man-in-the-middle attacks and the inclusion of nonces to detect replay attacks, without increasing the number of messages involved in the initiation of the communication session. | 2011-04-21 |
20110093711 | METHOD AND SYSTEM FOR ENCRYPTING DATA IN A WIRELESS COMMUNICATION SYSTEM - A method and system for encrypting data in a wireless communication system are provided. The system includes a first node for generating a first encryption key using a plurality of encryption key parameters when performing authentication with a second node, for changing a second parameter among the plurality of encryption key parameters to generate a second encryption key being identical to the first encryption key, if a first parameter among the plurality of encryption key parameters is changed during re-authentication between the first node and the second node, for generating the second encryption key using the changed first parameter and the changed second parameter, and for encrypting data to be transmitted to the second node using the second encryption key. | 2011-04-21 |
20110093712 | COMMUNICATION DEVICE SUPPORTING PAIRING - Provided is a communication device. The communication device may transmit information to an external device using a terminal that makes a physical contact with the external device, and may sense the physical contact. In response to the sensed physical contact, the communication device may generate a link key. | 2011-04-21 |
20110093713 | SIGNATURE METHOD AND DEVICE - A method for signing a document to be transmitted between two correspondents, i.e. a sender and an addressee, including recording the sender and the addressee of the document for the allocation of a digital identity thereto; authorizing by the addressee a correspondence with the sender; ciphering the document; indicating to the addressee that the document is available; detecting an access to the document by the addressee; generating an electronic report indicating the delivery of the document, the document-delivery electronic report including a set of data associated with the transmission of the document to the addressee, the set including identification of elements concerning the addressee authentication, the sealing of the document, the access to the document by the addressee and the time-stamping of the access to the document by the addressee; and electronically signing, by a reliable third-party using the private key thereof, the document-delivery electronic report. | 2011-04-21 |
20110093714 | SYSTEMS AND METHODS FOR ASYMMETRIC CRYPTOGRAPHIC ACCESSORY AUTHENTICATION - Embodiments relate to systems, methods and devices for asymmetric cryptographic authentication. In an embodiment, a system includes an accessory comprising an authentication chip, the authentication chip comprising a public authentication key, a private authentication key and data signed by a private verification key; and a device comprising a public verification key forming a verification key pair with the private verification key, the device configured to read the data and public authentication key from the authentication chip, verify the data and the public authentication key using the public verification key, and authenticate the accessory for use with the device using the public authentication key if verified. | 2011-04-21 |
20110093715 | Management Server, Management Method, Management System for Downloading of Contents, and Mobile Devices - A receiver is configured to receive, from a mobile device of a first type adapted to read a content from a recording medium and run the content, a first device identifier identifying the mobile device of the first type and a recording medium identifier identifying a recording medium loaded in the mobile device of the first type, along with a digital signature generated in the mobile device of the first type using an encryption key secretly stored in the mobile device of the first type. A signature verification unit is configured to verify the authenticity of the digital signature. A voucher issuance unit is configured to issue a voucher to a mobile device of a second type adapted to acquire a content by downloading the content and to run the content accordingly and mapped into the mobile device of the first type, so that the mobile device of the second type is capable of downloading a content. | 2011-04-21 |
20110093716 | METHOD, SYSTEM AND APPARATUS FOR ESTABLISHING COMMUNICATION - A method, a system, and an apparatus for establishing communication are disclosed. The method is invented to establish communication between at least two communication parties including a first communication party and a second communication party. The method includes: sending a Cryptographically Generated Address (CGA) request to the first communication party; receiving CGA parameters and a CGA signature returned by the first communication party; and authenticating the CGA parameters and the CGA signature, and establishing communication with the first communication party if the authentication succeeds. By using the method disclosed herein, in the process of establishing communication, the communication party authenticates the CGA parameters and CGA signature carried in the CGA extension header to determine authenticity of the CGA, thus preventing the IP address spoofing and preventing or mitigating the network security problems caused by the IP address spoofing. | 2011-04-21 |
20110093717 | NODE APPARATUS, METHOD AND STORAGE MEDIUM - A node apparatus changes a first access key unique to itself; changes a shared key same for node apparatuses; encrypts, using the shared key, the first access key and transmits it; receives an access key notification frame; decrypts it using the shared key, thereby obtaining a second access key; attaches, to a first plaintext frame, first signature data obtained by encrypting, using the shared key, data including a first value calculated from the first plaintext frame; encrypts the first plaintext frame using the second access key and transmits thus encrypted frame; receives a second encrypted frame; decrypts it by the first access key to obtain a second plaintext frame; obtains a second value by decrypting, using the shared key, a second signature data attached to the second plaintext frame; calculates a third value from the second plaintext frame; and confirms whether the second and third values are consistent. | 2011-04-21 |
20110093718 | HYBRID SIGNATURE SCHEME - A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion. | 2011-04-21 |
20110093719 | SENSITIVE DATA ALIASING - Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive data elements. In another embodiment, the sensitive data elements are stored in an encrypted form for use from a secure access, while the alias is available for standard access. | 2011-04-21 |
20110093720 | Storage of KeyID in Customer Data Area - A key identifier for an encryption key repository is stored with customer data on a logical device. When the customer data is compressible, the key identifier is stored in space freed by compressing the customer data. When the customer data is not compressible, a portion of the customer data is copied to a key record in the key repository identified by the key identifier, and the key identifier overwrites the copied customer data. | 2011-04-21 |
20110093721 | PARAMETERIZABLE CRYPTOGRAPHY - Some embodiments provide systems and techniques for performing parameterizable cryptography. An encryption key can be determined based at least on a string associated with an authorization policy. The encryption key can then be used to encrypt information. The decryption key can also be determined based at least on the string associated with the authorization policy. Note that the authorization policy must be satisfied to decrypt information. In some embodiments, the systems and techniques for performing parameterizable cryptography are blindable. These blindable embodiments can be used to preserve privacy. | 2011-04-21 |
20110093722 | Apparatuses, Systems, And Methods For Renewability With Digital Content Protection Systems - In one embodiment of the invention, a format for renewability content (e.g., a System Renewability Message (SRM)) corresponding to a content protection protocol (e.g., High-Bandwidth Digital Content Protection (HDCP)) may be interoperable with devices that are compliant with different versions of the standard (e.g., HDCP1.x and 2.x devices) and that include different amounts of storage for the renewability content (e.g., first and second generation devices). | 2011-04-21 |
20110093723 | Display of a verification image to confirm security - A handheld device | 2011-04-21 |
20110093724 | APPARATUS AND METHOD FOR POWER CONTROL OF A CENTRAL PROCESSING UNIT IN A MULTI-CORE SYSTEM - A power control method of a Central Processing Unit (CPU) in a multi-core system. The power control method includes acquiring current usage information of the CPU and system information, estimating a CPU usage of a next time interval based on the acquired current usage information, calibrating the estimated CPU usage of the next time interval based on the acquired system information, and determining a power control mode based on at least one of the acquired system information and the calibrated CPU usage of the next time interval. | 2011-04-21 |
20110093725 | Method and Apparatus for User-Activity-Based Dynamic Power Management and Policy Creation for Mobile Platforms - A method and apparatus for user activity-based dynamic power management and policy creation for mobile platforms are described. In one embodiment, the method includes the monitoring of one or more sensor values of a mobile platform device to gather sensor activity data. Once the sensor activity data is gathered, the user state may be predicted according to the gathered user activity and an updated user state model. In one embodiment, the user state model is updated according to the sensor activity data. In one embodiment, a switch occurs from the present power management policy to a new power management policy if the new user state differs from a present user state by a predetermined amount. In one embodiment, at least one time-out parameter of a selected power management policy may be adjusted to comply with a predicted user state. Other embodiments are described and claimed. | 2011-04-21 |
20110093726 | Memory Object Relocation for Power Savings - A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state where the access times may increase for the memory objects. By operating at least some of the memory regions in a low power state, significant power savings can be realized. The computer system may have several memory regions that may be independently controlled and may move memory objects to various memory regions in order to optimize power consumption. In some embodiments, an operation system level function may manage memory objects based on parameters gathered from usage history, memory topology and performance, and input from applications. | 2011-04-21 |
20110093727 | IMAGE FORMING APPARATUS AND CONTROL METHOD THEREOF - Disclosed is an image forming apparatus includes an imaging forming unit configured to form an image; a main controller configured to control an operation of the imaging forming unit; a USB interface configured to receive and to transmit USB data from and to a host apparatus; a power supply configured to supply power to the image forming unit and the main controller; a switch configured to supply power selectively under the control of the main controller; and a sub controller configured to output a power control signal for turning on the switch if USB data is received from the host apparatus in a sleep mode during which the main controller is turned off. Power consumption is thereby reduced by turning off the power to the main controller in the sleep mode. | 2011-04-21 |
20110093728 | COMPUTER SYSTEM AND CONTROL METHOD THEREOF - A computer system and a control method thereof which activates/inactivates a power management mode depending on a performance of a communication operation by a communication unit to thereby increase a life of a battery and/or retain a high data transmission rate when communicating. The computer system includes a communication unit which receives operating power and performs a network communication with an external device; and a controller which identifies a performance of a communication operation of the communication unit and controls the communication unit to reduce a consumption of the operating power supplied to the communication unit if the communication unit does not perform the communication operation, and controls the communication unit not to reduce the consumption of the operating power supplied thereto if the communication unit performs the communication operation. | 2011-04-21 |
20110093729 | MOTION SENSOR DATA PROCESSING USING VARIOUS POWER MANAGEMENT MODES - Systems and methods for processing motion sensor data using various power management modes of an electronic device are provided. Power may be provided to a motion sensor during a first power mode of the device. In response to the motion sensor detecting a motion event with a magnitude exceeding a threshold, the sensor may transmit a wake up signal to a power management unit of the device. In response to receiving the wake up signal, the power management unit may switch the device to a second power mode. The device may provide power to a processor and load the processor with a motion sensing application when switching to the second power mode. During the second power mode, motion sensor data may be processed to determine that the motion event is not associated with an intentional user input and the device may return to the first power mode. | 2011-04-21 |
20110093730 | Portable Electronic Device and Power Management Method - A power management method is to be implemented by a portable electronic device. The portable electronic device is coupled to an expansion device having at least one expansion unit, and supplies power to the expansion device. The power management method includes: (A) configuring the portable electronic device to detect whether a control command is received thereby; (B) configuring the portable electronic device to transmit a control signal corresponding to the control command to the expansion device in response to the control command; and (C) configuring the expansion device to cease supplying power to the at least one expansion unit in accordance with the control signal, thereby saving power. | 2011-04-21 |
20110093731 | METHOD AND APPARATUS TO MAXIMIZE POWER OF A COMPUTER SYSTEM FOR EFFECTIVE TESTING - Implementations of the present invention may involve methods and systems to improve the combined power consumption and thermal response of individual components of a computer system as the components are stressed concurrently during simulation or testing of the system. A group of operating system-level instruction sets for several individual components of the computer system may be designed to stress the components and executed concurrently while power and thermal measurements are taken. The instruction sets may utilize one or more software threads of the computer system or hardware threads such that minimal interference between components occurs as the system is tested. Further, the system components may be partitioned between separate instruction sets. By minimizing the interference between the components while the system is operating, a more accurate power consumption and thermal effect measurements may be taken on the computer system to better approximate the performance of the system. | 2011-04-21 |
20110093732 | APPARATUS AND METHOD FOR PROVIDING NETWORK COMMUNICATIONS - A system that incorporates teachings of the present disclosure may include, for example, a Power Over Ethernet (PoE) device (PD) having a controller to receive signals over a first cable having twisted pair wires from at least one of a network element and a gateway where the network element is associated with a service provider where the gateway is associated with a premises and where the service provider provides network communications to the premises, adjust the signals, transmit the adjusted signals over a second cable having twisted pair wires to at least one of the network element and the gateway, and receive power from at least one of the network element and the gateway, where the power is received over at least one of the first and second cables, where the power is received according to PoE protocol, and where the PD is positioned between the network element and the gateway. Other embodiments are disclosed. | 2011-04-21 |
20110093733 | Power Channel Monitor For A Multicore Processor - Technologies are generally described for power channel monitoring in multicore processors. A power management system can be configured to monitor the power channels supplying individual cores within a multicore processor. A power channel monitor can provide a direct measurement of power consumption for each core. The power consumption of individual cores can indicate which cores are encountering higher or lower usage. The usage determination can be made without sending any data messages to, or from, the cores being measured. The determined usage load being serviced by each processor core may be used to adjust power and/or clock signals supplied to the cores. | 2011-04-21 |
20110093734 | Power Manager and Method for Managing Power - A power manager ( | 2011-04-21 |
20110093735 | Semiconductor memory device, method of adjusting the same and information processing system including the same - Each of the core chips includes a data output circuit that outputs read data to the interface chip in response to a read command, and an output timing adjustment circuit that equalizes the periods of time required between the reception of the read command and the outputting of the read data from the data output circuit among the core chips. With this arrangement, a sufficient latch margin for read data to be input can be secured on the interface chip side. Furthermore, as the output timing is adjusted on each core chip side, there is no need to prepare the same number of latch timing control circuits as the number of core chips on the interface chip side. | 2011-04-21 |
20110093736 | METHOD AND CIRCUIT FOR TRIMMING AN INTERNAL OSCILLATOR OF A USB DEVICE - A circuit and method for trimming an internal oscillator of a USB device that generates a clock signal as a frequency source of the USB device detect an end of packet from an input data stream to initialize a counter, identify a token packet in the data stream to detect a start of frame token packet for the counter to carry out clock counting on the clock signal to thereby obtain a count value, and compare the count value with a reference value to determine a trimming code for trimming a clock frequency of the internal oscillator. | 2011-04-21 |
20110093737 | Error recovery within processing stages of an integrated circuit - An integrated circuit includes a plurality of processing stages each including processing logic | 2011-04-21 |
20110093738 | ERROR RECOVERY FOR APPLICATION-LEVEL INTERMEDIARIES - Error handling in the intermediation of one-way transacted messages. Rather than receiving an inbound message under a transaction, the intermediary performs a non-destructive exclusive read of the message from the source outside of a transaction. Routing logic is applied against the content of the message to determine a collection of message consumers to which a copy of the inbound message is to be sent. Then, under a transaction, the copy of the message is attempted to be sent to each destination. If a send of the copy fails, the transaction is rolled back, but the failure is recorded such that the same transmission mechanism is not, or is less likely to be, tried again in subsequent attempts. The principles may apply to a single message to be sent under the transaction, or to multiple messages to be sent under a single transaction. | 2011-04-21 |
20110093739 | FAULT MANAGEMENT FOR A COMMUNICATION BUS - A differential communication bus comprising a master module and a plurality of slave modules connected to at least first and second conductors whereby to communicate between the master and slave modules. The master module comprises a driver for applying first and second voltages respectively to the first and second conductors and for sourcing and sinking currents in the first and second conductors. The driver controls a difference between the first and second voltages and a common mode value of the first and second voltages. The driver includes first sourcing and sinking current limiters and second sourcing and sinking current limiters for limiting the currents in the first and second conductors. The master module is selectively responsive to a fault condition triggering simultaneous activation of the first and second sourcing current limiters or of the first and second sinking current limiters to disable the driver. | 2011-04-21 |
20110093740 | Distributed Intelligent Virtual Server - A intelligent distributed virtual server for providing distributed services to a plurality of clients, including one or more servers units, each server units storing data and providing service for accessing by one or more clients; one or more switches and routers for connecting the clients to the server units and to provide a communication link; and a distribution control station connected to the clients and the server units via the switches and routers, wherein the distribution control station receives a request for a service from a client, and selectively establishes a data link between that client and an server unit, which stores the requested data and provides service, such that the server unit provides the data stream to the client via the communication link, independent of other server units. Therefore, it provides distributed computing cross intra-net or Internet and it provides scalability and all intelligent services such as fault handling, security and others. | 2011-04-21 |
20110093741 | METHOD FOR RECOVERING BIOS AND COMPUTER SYSTEM THEREOF - A method for recovering basic input/output system (BIOS) in a computer system is disclosed. The computer system includes a host unit, a control unit, and a first storage device. The control unit is utilized for controlling system power provided for the host unit. The host unit is utilized for accessing a BIOS code stored in the first storage device to perform a boot process. The method includes turning the system power off when the computer system has a recovery requirement, restoring a backup BIOS code into the first storage device, and turning the system power on to make the host unit access the restored BIOS code in the first storage device for performing the boot process. | 2011-04-21 |
20110093742 | STORAGE APPARATUS AND CONTROL METHOD FOR STORAGE APPARATUS - A storage apparatus connected to a storage device includes a storage module, a memory for storing data to be copied to the storage device, buffers for temporarily saving the data, redundantly, the saved data stored in one of the buffers being recoverable by the data stored in the rest of the buffers, and a control module for executing, storing the data of write request to the storage module and the memory, copying the data to the storage device, saving the data to the buffer when an using rate of the memory is greater than a predetermined rate, writing the saved data stored in the buffer to the memory when an using rate of the memory is not greater than the predetermined rate, detecting a failure of the buffers, and rebuilding the saved data stored in the one of the buffers based on an using state of the buffers. | 2011-04-21 |
20110093743 | Method and System of Updating a Plurality of Computers - Updating a plurality of computers is accomplished. A first message is created in an update source, where the first message includes a one or more instructions and an address of a message repository. The first message is transmitted to a first computer using either a Push or a Pull protocol. A second message is transmitted to the first computer using the Push or Pull protocol, the second message comprising data retrieved from the address in the first message. The first computer executes one or more of the instructions in the first message with at least some of the second message. The address in the first message is updated to match the address of the first computer. The updated first message is transmitting to a further one of the computers. Transmission of the second message is repeated to further ones in the plurality of computers until substantially all of a pre-defined number of computers have been updated. | 2011-04-21 |
20110093744 | Distributed Batch Runner - Method and systems for allocating test scripts across a plurality of test machines is described. A set of test scripts may be maintained where the set of test scripts includes a plurality of test scripts for allocation to a plurality of test machines. A first request for a first test script task may be received from a first test machine of a plurality of test machines. A determination may be made as to whether each test script within the set of test scripts has been allocated. If not, a first unallocated test script to allocate to the first test machine may be determined, and a first test script task may be allocated to the first test machine where the first test script task includes the first unallocated test script. The first unallocated test script then may be identified as an allocated test script in the set of test scripts. | 2011-04-21 |
20110093745 | SYSTEMS AND METHODS FOR IMPLEMENTING TEST APPLICATIONS FOR SYSTEMS USING LOCKS - The present invention generally relates to systems and methods for implementing test applications of systems using locks. | 2011-04-21 |
20110093746 | SYSTEM AND MEHTOD FOR DETERMINING DISPLAY FUNCTION OF BIOS ERROR INFORMATION - A system is used to determine whether a display function of a basic input output system (BIOS) of a tested computer is normal. Operators can select an error information option set on an error information interface. A breakpoint address and an amending instruction can be obtained to interrupt the running of the BIOS, and parameters of a corresponding hardware of the tested computer are amended with preset values. Therefore, an error occurs in the BIOS of the tested computer. The tested computer is controlled to display the BIOS error information. Whether the display function of the BIOS of the tested computer is normal can be ascertained via comparing the displayed BIOS error information with standard BIOS error information. | 2011-04-21 |
20110093747 | DEBUGGING CLIENT-SIDE CODE - A method for debugging client-side code includes a client receiving an application file set from a server in response to the client requesting an application. A singleton is generated on the client by executing a script in the application file set. The singleton monitors a data event generated by an application programming interface. The singleton writes a client data record to a cache memory in response to the application programming interface generating the data event. The client data record records an application event. The singleton flushes the contents of the cached memory in response to a flush event, and transfers the contents to the server for persistent storage. | 2011-04-21 |
20110093748 | Software Memory Leak Analysis Using Memory Isolation - A computerized method, program product, and a service that allocates and isolates leaky memory during the execution of an application in a data processing system. A memory controller having several components first identifies a leaky section of memory and delegates to an allocation component to allocate more memory if possible. If, however, the problematic memory section should not be allocated more memory, an isolator component can isolate the memory section and further divide the memory section into subsections and so on. Each section and each subsection may then be tested to determine if more memory can be allocated, tested to determine if memory resources are strained so as to identify the application or its component causing the strain and then binding the memory. Each section and subsection and further divided and isolated until the leaky portion of memory is identified, and as a result, the software component causing the leak can also be identified. The software component associated with the leaky memory section or subsection can also be taken out-of-service. | 2011-04-21 |
20110093749 | APPARATUS AND METHOD FOR TROUBLESHOOTING A COMPUTER SYSTEM - An apparatus for troubleshooting a computer system of a vehicle is disclosed. In one embodiment, an apparatus for accumulating information pertaining to a computer for use in diagnostic evaluation comprises: a computer having an operating system controlling at least one process; a memory coupled to the computer, the memory containing stored program instructions executable by the computer, the instructions comprising: monitoring the at least one process; and obtaining software diagnostic data regarding the at least one process; and a wireless device coupled to the memory and configured to connect to an network, and configured to transmit the software diagnostic data over the network. | 2011-04-21 |
20110093750 | Hardware resource management within a data processing system - A processor | 2011-04-21 |
20110093751 | SYSTEM AND METHOD FOR SINGLE TERMINAL BOUNDARY SCAN - An electronic circuit having a boundary scan test circuit receives, though one pin, an embedded clock encoded test signal having an encoded bit stream having occurrences of a first header followed by at least one encoded boundary scan mode bit and an encoded second header followed by at least one boundary scan test input bit. The bit stream and the clock are extracted and occurrences of the first header and second header are detected. Based on the detected occurrences the boundary scan mode bits and boundary scan input bits are identified and distributed to the electronic circuit, along with the extracted clock, and boundary scan test is performed. | 2011-04-21 |
20110093752 | Method and Apparatus for Synthesis of Augmented Multimode Compactors - Methods and apparatuses for synthesizing and/or implementing an augmented multimode compactor are described. | 2011-04-21 |
20110093753 | PHASE CALIBRATION CIRCUIT, MEMORY CARD CONTROL DEVICE, AND PHASE CALIBRATION METHOD - Provided is a phase calibration circuit to suppress degradation of transfer efficiency when reading data from a memory card. The phase calibration circuit includes a receive clock generator that generates clock signals including a first clock signal (FCS) with a phase shifted with respect to a base clock signal, a second clock signal with a phase advanced with respect to the FCS, and a third clock signal with a phase delayed with respect to the FCS; a determination unit that acquires data blocks, each of which including a data body and detection information for detecting an error, in accordance with the clock signals, determines whether an error occurs by using the detection information of the data blocks, and outputs determination results; and a phase adjustment unit that instructs the receive clock generator to adjust a phase of the FCS depending on the determination results. | 2011-04-21 |
20110093754 | DATA TRANSMISSION METHOD AND DATA RE-TRANSMISSION METHOD - A method which can reduce loss in data transmission is provided. A data block is prepared in a high-level layer and the data block is transmitted in a low-level layer. Status report information associated with reception or non-reception of the data block is received through the low-level layer. When a receiver fails to receive data transmitted from a transmitter, the transmitter can rapidly recognize the reception failure and can retransmit the data. | 2011-04-21 |