21st week of 2010 patent applcation highlights part 59 |
Patent application number | Title | Published |
20100131736 | MEMORY DEVICE AND METHOD OF OPERATION - A memory device includes a data block storing first data, and a log block storing second data that is an updated value of the first data. A spare area of the log block stores a first mapping table including mapping information between the first data and the second data. | 2010-05-27 |
20100131737 | Method for Manipulating Data in a Group of Processing Elements To Perform a Reflection of the Data - A method for generating a reflection of data in a plurality of processing elements comprises shifting the data along, for example, each row in the array until each processing element in the row has received all the data held by every other processing element in that row. Each processing element stores and outputs final data as a function of its position in the row. A similar reflection along a horizontal line can be achieved by shifting data along columns instead of rows. Also disclosed is a method for reflecting data in a matrix of processing elements about a vertical line comprising shifting data between processing elements arranged in rows. An initial count is set in each processing element according to the expression (2×Col_Index)MOD(array size). In one embodiment, a counter counts down from the initial count in each processing element as a function of the number of shifts that have peen performed. Output is selected as a function of the current count. A similar reflection about a horizontal line can be achieved by shifting data between processing elements arranged in columns and setting the initial count according to the expression (2×Row_Index)MOD(array size). The present invention represents an efficient method for obtaining the reflection of data. | 2010-05-27 |
20100131738 | ARRAY PROCESSOR TYPE DATA PROCESSING APPARATUS - In an array processing section, using data strings entered from input ports, a plurality of data processor elements execute predetermined operations while transferring data to each other, and output data strings of results of the operations from a plurality of output ports. A first data string converter converts data strings stored in a plurality of data storages of a data storage group into a placement suitable for the operations in the array processing section, and enters the converted data strings into the input ports of the array processing section. A second data string converter converts the data strings output from output ports of the array processing section into a placement to be stored in the plurality of data storages of the data storage group. | 2010-05-27 |
20100131739 | INTEGRATED CIRCUIT HAVING DATA PROCESSING STAGES AND ELECTRONIC DEVICE INCLUDING THE INTEGRATED CIRCUIT - An integrated circuit ( | 2010-05-27 |
20100131740 | DATA PROCESSING SYSTEM AND DATA PROCESSING METHOD - The workload is heavy in the development of an application program that controls the task distribution in consideration of the variety of the execution environment. In a system where the processing is distributed to SPUs serving as plural processing entities so as to execute the computer program, the data processing is broken into plural units of processing by referring to the script code in which the content of the data processing is written, and the units of processing are assigned to the plural SPUs. Then, the whole computer program is executed when the SPUs execute the assigned process. | 2010-05-27 |
20100131741 | MULTI-CORE MICROCONTROLLER HAVING COMPARATOR FOR CHECKING PROCESSING RESULT - A microcontroller capable of improving processing performance as a whole by executing different programs by a plurality of CPUs and capable of detecting abnormality for safety-required processing by evaluating results of the same processing executed by the plurality of CPUs. A plurality of processing systems including CPUs and memories are provided, data output from the CPUs in each of the processing systems is separately compressed and stored by compressors for each of the CPUs, respectively. The compressed storage data is mutually compared by a comparator, and abnormality of processing can be detected when the comparison result indicates a mismatch. Even when the timings by which the same processing results are obtained are different when the plurality of CPUs asynchronously execute the same processing, the processing results of both of them can be easily compared with each other since compression is carried out by the compressors. Moreover, since the comparison of the comparator is enabled when comparison enable is given from all the CPUs, the comparison operation result can be obtained based on the timing at which the results of compression by the plurality of compressors are determined. | 2010-05-27 |
20100131742 | OUT-OF-ORDER EXECUTION MICROPROCESSOR THAT SELECTIVELY INITIATES INSTRUCTION RETIREMENT EARLY - A microprocessor for improving out-of-order superscalar execution unit utilization with a relatively small in-order instruction retirement buffer. A plurality of execution units each calculate an instruction result. The instruction is either an excepting type instruction or a non-excepting type instruction. The excepting type instruction is capable of causing the microprocessor to take an exception after being issued to the execution unit, wherein the non-excepting type instruction is incapable of causing the microprocessor to take an exception after being issued. A retire unit makes a determination that an instruction is the oldest instruction in the microprocessor and that the instruction is ready to update the architectural state of the microprocessor with its result. The retire unit makes the determination before the execution unit outputs the result of the non-excepting type instruction, wherein the retire unit makes the determination after the execution unit outputs the result of the excepting type instruction. | 2010-05-27 |
20100131743 | LAZY AND STATELESS EVENTS - Event-based processing is employed in conjunction with lazy and stateless events. Addition of any handlers is deferred until a user-specified handler is identified. Furthermore, event handlers can be composed at this time including the same properties as underlying events. More specifically, handlers specified on composite events can be composed and propagated up to a one or more related source events. As a result, handlers are not accumulated on composite events thereby making them stateless while allowing equivalent functionality upon invocation of the composed top-level handler. | 2010-05-27 |
20100131744 | METHOD AND SYSTEM OF A PROCESSOR-AGNOSTIC ENCODED DEBUG-ARCHITECTURE IN A PIPELINED ENVIRONMENT - A method and/or a system of a processor-agnostic encoded debug architecture in a pipelined environment is disclosed. In one embodiment, a method of a processor includes processing an event specified by a data processing system coupled to the processor to determine a boundary of the event, generating a matrix having combinations of the event and other events occurring simultaneously in the processor, capturing an output data of observed ones of the event and other events, and applying the matrix to generate an encoded debug data of the output data. The method may also include determining which of the combinations are valid based on an architecture of the processor. The event may be a trace-worthy event whose output value cannot be reliably predicted in an executable file in the data processing system and/or a sync event that is specified by a user of the data processing system. | 2010-05-27 |
20100131745 | EXCEPTIONAL EVENTS - An event-driven system enables handlers to be specified for success and failure, among other things. In other words, events can be explicitly encoded with an option of returning either a success or a failure result. In this manner, asynchronous programming and events can be unified. Multiple event streams can be employed to represent success and/or exceptional values. Alternatively, a disjoint union of regular and exceptional values can be employed with respect to a single event stream. | 2010-05-27 |
20100131746 | Method and apparatus to support separate operating systems in partitions of a processing system - A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a preboot manager in the processing system may copy software to a sequestered area of memory in the processing system. The preboot manager may also configure the processing system to hide the sequestered area of memory from a first partition of the processing system. Also, the preboot manager may use a first processing unit in the processing system to boot an OS on the first partition, and the preboot manager may transmit a boot trigger from the first processing unit to a second processing unit in the processing system. The boot trigger may cause the second processing unit to use the software in the sequestered area of memory to boot a second partition of the processing system. Other embodiments are described and claimed. | 2010-05-27 |
20100131747 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing system includes a first information processing apparatus and a second information processing apparatus being compatible therewith. A second semiconductor memory is configured to include a first semiconductor memory, and both of the first semiconductor memory and the second semiconductor memory are able to be detached to and attached from the first information processing apparatus and the second information processing apparatus. Each of the first semiconductor memory and the second semiconductor memory receives an encrypted command from the attached information processing apparatus in a secure mode, and transmits encrypted data according to the decrypted command. Furthermore, an area only provided to the second semiconductor memory is made accessible by the second information processing apparatus. | 2010-05-27 |
20100131748 | COMPUTER SYSTEM WITH REDUCED STORAGE DEVICE AND ASSOCIATED BOOTING METHOD - A computer system with integrated storage device for storing both a basic input/output system (BIOS) code and an operating system (OS) code and an associated booting method are provided. The computer system includes a central processing unit, a storage device controller and the storage device. The BIOS code and the OS code are stored in an invisible are and a visible area of the storage device, respectively. At first, the storage device controller is activated to read data from an architecture information area of the storage device to perform initialization. Then, the initialized storage device controller converts a read-only memory access command issued from the central processing unit into a suitable format to control loading of the BIOS code from the invisible area. At last, the storage device controller controls loading of the OS code from the visible area to finish the booting of the computer system. | 2010-05-27 |
20100131749 | APPARATUS AND METHOD FOR CONTROLLING OPERATING MODE OF MOBILE TERMINAL - An operating mode control apparatus and method for a mobile terminal are disclosed. The apparatus and method enable the user to control the operation of a mobile terminal on the basis of the proximity of the user to the mobile terminal, the movement of the mobile terminal, and the housing orientation thereof. Hence, the user may enjoy a visuo-spatial user interface. | 2010-05-27 |
20100131750 | METHOD TO CONSTRUCT A HIGH-ASSURANCE IPSEC GATEWAY USING AN UNMODIFIED COMMERCIAL IMPLEMENTATION - A system and method of providing secure communications is provided. Messages are encrypted or decrypted in protected memory of a processor. Outbound messages from a secure network are prepared for encryption by adding a header outside of the protected memory and then encrypted in the protected memory. The encryption is performed by retrieving a key from a key cache as designated by rules in the header. The encrypted message is sent to the unsecure network. An inbound message from an unsecure network that is received in unprotected memory is sent to a decryption module in protected memory. The inbound message is decrypted using a key designated in its header and retrieved from the key cache. The decrypted message is returned to the unprotected memory, where it is stripped of the encryption header and then sent to its destination within the secure network. | 2010-05-27 |
20100131751 | SUPPORT OF PHYSICAL LAYER SECURITY IN WIRELESS LOCAL AREA NETWORKS - A method and an apparatus for performing physical layer security operation are disclosed. A physical layer performs measurements continuously, and reports the measurements to a medium access control (MAC) layer. The MAC layer processes the measurements, and sends a security alert to a security manager upon detection of an abnormal condition based on the measurements. The security manager implements a counter-measure upon receipt of the security alert. The measurements include channel impulse response (CIR), physical medium power measurement, automatic gain control (AGC) value and status, automatic frequency control (AFC) gain and status, analog-to-digital converter (ADC) gain, Doppler spread estimate, and/or short preamble matched filter output. The security manager may switch a channel, switch a channel hopping policy, change a back-off protocol, or change a beamforming vector upon reception of the security alert. | 2010-05-27 |
20100131752 | METHOD AND SYSTEM FOR INVALIDATION OF CRYPTOGRAPHIC SHARES IN COMPUTER SYSTEMS - A system and method to encrypt events using a secret to serve as a key according to a secret sharing algorithm is described. In one embodiment, the key is split into shares that are distributed to an event recipient. In one embodiment, one or more shares of the key are invalidated to protect data in the encrypted event. | 2010-05-27 |
20100131753 | IMAGE FORMING APPARATUS, HOST APPARATUS AND ENCRYPTION METHOD OF JOB OBJECT DOCUMENT THEREOF - An image forming apparatus, a host apparatus, and an encryption method for print data, the method of encrypting the print data of the host apparatus connected to the image forming apparatus including: displaying an encryption setting screen for the print data; selecting an encryption logic to encrypt the print data through the encryption setting screen; converting the print data according to the selected encryption logic; and transmitting the converted print data to the image forming apparatus. Accordingly, the print data is encrypted and decrypted on the basis of the selected encryption logic and corresponding decryption logic set up according to users, thereby increasing security. | 2010-05-27 |
20100131754 | Apparatus, and an Associated Method, for Providing and Using Opaque Presence Indications in a Presence Service - An apparatus, and an associated method, enables presence information of a presentity to be retrieved by a watcher. Elements, or portions, of the presence information may be made selectively opaque (unreadable) to any but authorized watchers or other consumers of the presentity information. | 2010-05-27 |
20100131755 | DISTRIBUTED SINGLE SIGN ON TECHNOLOGIES INCLUDING PRIVACY PROTECTION AND PROACTIVE UPDATING - Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sign-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs. | 2010-05-27 |
20100131756 | USERNAME BASED AUTHENTICATION AND KEY GENERATION - An apparatus and a method for an authentication protocol. A client generates a server unique identifier of a server prior to communicating with the server. An encrypted password generator module of the client calculates an encrypted password based on the server unique identifier, a username, and an unencrypted password. A communication request generator module of the client generates and sends a communication request to the server. The communication request includes a username, a client random string, a client timestamp, and a client MAC value. The client MAC value is computed over the username, the client random string, and the client timestamp, using the encrypted password as an encryption key. | 2010-05-27 |
20100131757 | DIGITAL INFORMATION SERVICE - A system comprising a server which is arranged to store encrypted addresses and encryption information associated with the addresses. The server sending the addresses and encryption information to user equipment which is able to decrypt the encrypted addresses using the encryption information; and is able to access a locations associated with the addresses. | 2010-05-27 |
20100131758 | Nondesctructive interception of secure data in transit - In a data level security environment, the data level security mechanism operates on plaintext data. Data level security operations identify a point in the information stream where plaintext data is available for interception. Typically this is a point in the processing stream just after the native DBMS decryption functionality has been invoked. A database monitor intercepts and scrutinizes data in transit between an application and a database by identifying a transition point between the encrypted and plaintext data where the cryptographic operations are invoked, and transfers control of the data in transit to a database monitor application subsequent to the availability of the data in plaintext form. | 2010-05-27 |
20100131759 | METHOD AND SYSTEM FOR AUTHENTICATING SENDERS AND RECIPIENTS IN A CARRIER SYSTEM AND PROVIDING RECEIPT OF SPECIFIED CONTENT BY A RECIPIENT - Methods and systems for authenticating senders and recipients in a carrier system and providing receipt of specified content by a recipient are provided. A one-time recipient identification code is generated that can be entered into the delivery agent's portable terminal. Data is protected against eavesdropping by encryption and by splitting cipher text and an encryption key into two parts that are not accessible to any single party except at the moment of the mail unit delivery. | 2010-05-27 |
20100131760 | CONTENT USING SYSTEM AND CONTENT USING METHOD - For an audio-visual terminal that reproduces content, anonymity of a user is ensured while enabling reproduction of the content. A content using system of the present invention includes a communication terminal, an audio-visual terminal and a license server. The communication terminal generates an electronic ticket by providing a group sign to license information obtained from the license server. The audio-visual terminal, after verifying the group sign of the electronic ticket obtained from the communication terminal, transmits the electronic ticket to the license server. The license server judges whether or not the electronic ticket is usable, which is transmitted from the audio-visual terminal and assigns a license of the content to the audio-visual terminal when the electronic ticket is judged to be usable. The audio-visual terminal decrypts the content which is encrypted, by using a decryption key obtained based on the license, and reproduces the content. | 2010-05-27 |
20100131761 | DOWNLOADABLE CONDITIONAL ACCESS SYSTEM AND METHOD OF SESSION CONTROL FOR SECURED 2-WAY COMMUNICATION BETWEEN AUTHENTICATION SERVER AND HOST DEVICE IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - Disclosed is a downloadable conditional access system (DCAS) including a key request unit to transmit a key request message to an authentication server, an authentication request unit to request authentication from the authentication server based on a key response message received from the authentication server in response to the key request message, and a session establishment unit to establish a session with the authentication server, based on an authentication response message received in response to the authentication request. | 2010-05-27 |
20100131762 | SECURED COMMUNICATION METHOD FOR WIRELESS MESH NETWORK - A secured communication method for Wireless Mesh Network (WMN) in the field of network technology includes initial authentication request, authentication negotiation process of the authentication server and encrypted data communication via pre-shared key and other valid Mesh Point (MP) in the WMN in order to implement the functions of the WMN. The present invention not only meets the new needs of the WMN dynamic self-organization, but also provides the security performance almost the same as the IEEE 802.11 standard requirements. The present invention is easily applied into WMN upon IEEE 802.11 links, and furthermore, the architecture disclosed in the present invention is quite simple and easy to implement with full compatibility and flexibility. | 2010-05-27 |
20100131763 | MOBILE SYSTEM, SERVICE SYSTEM, AND KEY AUTHENTICATION METHOD TO MANAGE KEY IN LOCAL WIRELESS COMMUNICATION - A mobile system, a service system, and a key authentication method to manage a key in a local wireless communication are provided. The mobile system and the service system may generate a hash value with respect to a public key of the service system using an identical hash function, and output a result corresponding to the hash value. | 2010-05-27 |
20100131764 | SYSTEM AND METHOD FOR SECURED DATA TRANSFER OVER A NETWORK FROM A MOBILE DEVICE - A secured data transfer system ( | 2010-05-27 |
20100131765 | ANONYMOUS VERIFIABLE PUBLIC KEY CERTIFICATES - The anonymity of a user at a client computer may be preserved when authenticating with an on-line service or content provider through the use of an anonymous and verifiable (i.e., “blind”) certificate set that is created by a certificate authority from a fixed-size set of PKI key pairs. The certificate authority randomly selects a subset of PKI key pairs to generate the blind certificate set where each certificate in the set includes a respective public key from the PKI key pair subset. The certificate authority also sends the private keys from the PKI key pair subset to the user. During authentication, the client computer is configured to randomly select a subset of one or more certificates from the set to present to the provider. The provider will encrypt content using the public keys in the subset of certificates and the client will decrypt the content with the corresponding private keys. | 2010-05-27 |
20100131766 | NOTIFYING USERS OF SERVER CHANGES VIA SSL - An apparatus and a method for authenticating a secure communication is described. A server receives a request from a client for an original SSL certificate. The server embeds a message in a common name (CN) of a new SSL certificate directing the client to another server. The client is transparently reconfigured and establishes a secure communication with the other server using the new SSL certificate. | 2010-05-27 |
20100131767 | Methods for Audio Watermarking and Decoding - The presently claimed invention relates generally to encoding and decoding audio signals to include auxiliary information. One example encoding technique includes steganography. One method recites: using a microphone, obtaining an audio signal carried by sound waves; utilizing an analog-to-digital converter to convert the audio signal into a digital audio signal; utilizing a programmed electronic processor, extracting auxiliary data from a series of segments of the digital audio signal, the segments conveying the same auxiliary data, yet the segments represent the auxiliary data differently as code signals carrying the same auxiliary data change over the blocks, the auxiliary data being steganographically hidden in the digital audio signal; and utilizing a programmed electronic processor, utilizing the auxiliary data from the series of segments to increase confidence of accurate extraction of the auxiliary data, the auxiliary data being separately decoded from the segments and combined to increase the confidence of extraction of the auxiliary data. Of course, other combination and claims are provided as well. | 2010-05-27 |
20100131768 | Method and apparatus for digital watermarking - A method for embedding digital watermark data in digital data contents includes the steps of obtaining a frequency coefficient of block data of digital data contents, obtaining a complexity of the block data, obtaining an amount of transformation of the frequency coefficient from the complexity and the digital watermark data, and embedding the digital watermark data by transforming the frequency coefficient. In addition, a method for reading digital watermark data includes the steps of calculating a probability of reading ‘1’ or ‘0’ in a read bit sequence by using a test method on the basis of binary distribution, determining the presence or absence of digital watermark data according to the probability, and reconstituting digital watermark data. Another method includes the steps of performing soft decision in code theory by assigning weights to the digital watermark sequence with a weighting function, and reconstituting digital watermark data. | 2010-05-27 |
20100131769 | DELIVERY CONFIRMATION SYSTEM, PORTABLE TERMINAL, AND COMPUTER PROGRAM PRODUCT - A portable terminal, which is connected to a server, includes: a communication section to send and receive data to and from the server; a time obtaining section to obtain current time; a location obtaining section to obtain a current location of the portable terminal; an input section to input receipt confirmation information indicating that a recipient of a shipment has received the shipment; and a control section to cause a digital signature to be attached to electronic form data, and to cause the communication section to send the electronic form data with the digital signature to the server. The electronic form data includes the receipt confirmation information input through the input section when the shipment is received; the current time obtained by the time obtaining section when the shipment is received; and the current location obtained by the location obtaining section when the shipment is received. | 2010-05-27 |
20100131770 | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR EMBEDDING AND AUTHENTICATING ANCILLARY INFORMATION IN DIGITALLY SIGNED CONTENT - A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed. The method and system include loading digital content containing a digitally signed executable into memory for execution, while checking for the integrity of a digital signature and the contents of the executable; and erasing any non-authenticated regions of the digital content by zeroing out or value-filling memory locations corresponding to the non-authenticated regions. | 2010-05-27 |
20100131771 | METHOD TO RESTORE A FAILED HDD OF A PVR - The invention relates to recovering files stored on a HDD of a Personal Video Recorder (PVR) in the case of a crash of the HDD. Every time a file is stored on an external medium special information of the file system of the HDD is stored —optionally in encrypted form—on the medium as far as enough storage capacities available there. According to the invention the stored information is overwritten if a rewritable medium is used. By that the medium can be optimally used. If the HDD fails the stored information can be used to copy the files to external media. | 2010-05-27 |
20100131772 | MODULE VALIDATION - A module validation system and methods are disclosed for use with graphical user interfaces provided by a workstation that, among other things, remotely monitor and/or control game and/or gaming devices and/or systems. Validation of modules used in shells that provide graphical user interfaces enables the module validation system to provide users with varying levels of access to a gaming system. | 2010-05-27 |
20100131773 | System and Method for Providing Data Integrity - Systems and methods for providing data integrity for stored data are disclosed. A method may include, in connection with the receipt of a read command at a storage resource, reading a data block from the storage resource, the data block including a data field, a data integrity field indicating the integrity the data field, and an encryption indicator field indicating whether the data block is encrypted with a current cryptographic key for the storage resource. The method may further include determining whether the data field is encrypted with the current cryptographic key based at least on the encryption indicator field. The method may additionally include returning at least a portion of the data block in reply to the read command in response to determining that the data field is encrypted with a cryptographic key other than the current cryptographic key. | 2010-05-27 |
20100131774 | Method for Secure Storage and Delivery of Media Content - The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g. abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content) may be generated and loaded in a secure and efficient manner. | 2010-05-27 |
20100131775 | Method for Secure Storage and Delivery of Media Content - The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g. abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content) may be generated and loaded in a secure and efficient manner. | 2010-05-27 |
20100131776 | SCALABLE AND EXTENSIBLE SECURE RENDERING OF DIGITAL CONTENT - A number of digital content rendering modules are equipped such that selective subsets of the modules may be employed to render digital content of different media, and of different format types. The modules are organized into a hierarchy, with a selected one occupying a root position of the hierarchy, to exclusively receive the digital contents to be rendered, and that each module is further responsible for verifying the integrity of its immediate downstream modules, to collectively protect the digital contents being rendered. Additionally, in accordance with another aspect, a tamper resistant module is employed to recover digital contents provided in a protected state, obfuscating the recovery. Further, the modules may be of different application domains. | 2010-05-27 |
20100131777 | POWER MANAGEMENT IMPROVEMENTS - A data processing system refreshes a display at a first frequency when operating in a first power mode. The data processing system refreshes the display at a second frequency when operating in a second mode. The first frequency is higher than the second frequency, and the second power mode is configured to consume less power than the first power mode. | 2010-05-27 |
20100131778 | COMPUTER SYSTEM - A computer system including a power supply and N main boards is provided, herein N is an integer greater than 1. The power supply generates a main power and a standby power. The N main boards respectively correspond to one standby voltage. The 1 | 2010-05-27 |
20100131779 | COMPUTER SYSTEM - A computer system including a first and second main boards, a judgment unit, a power supply, a first switch and second switch is provided. The judgment unit receives a first and second power start signals from the first and second main boards, and outputs a total power start signal. The power supply outputs a power reply signal according to the total power start signal. The first and second switches determine whether to output a power good signal individually according to the first and second power start signals. When one of the first and second power start signals is available, the total power start signal and the power reply signal are available, and the power supply outputs an operating voltage. When the first and second power start signals are unavailable, the total power start signal and the power reply signal are unavailable, and the power supply stops outputting the operating voltage. | 2010-05-27 |
20100131780 | Selective mode PHY device for managing power utilization - There is provided a method of managing power utilization for use by a first communication system having a first communication mode and a second communication mode, for communication over a PHY connection through a cable connecting the two systems. The method comprises establishing the PHY connection with the second communication system, detecting interoperability of the two systems in the first communication mode, determining a length of the cable connecting the first communication system to the second communication system, selecting a mode based on the length of the cable, if the detecting detects interoperability of the first communication system and the second communication system in the first communication mode, selecting the second communication mode as the mode, if the detecting does not detect interoperability of the first communication system and the second communication system in the first communication mode, communicating data using the PHY connection through the cable in the mode. | 2010-05-27 |
20100131781 | Reducing network latency during low power operation - In one embodiment, the present invention includes a method for receiving an incoming packet in a packet buffer and associating it with a flow identifier. Based on the flow identifier, a core to which the incoming packet is to be directed may be determined, and a power management hint can be transmitted to cause the core to be powered up. Other embodiments are described and claimed. | 2010-05-27 |
20100131782 | INFORMATION PROCESSING APPARATUS, METHOD, AND PROGRAM - An information processing apparatus including a baseband signal manager, a determining unit, and a power supply controller is connected to one or more apparatus via an interface. The interface includes a signal channel for transmitting baseband signals and a control channel for bidirectionally transmitting control signals. The baseband signal manager transmits a baseband signal sent from a first apparatus to a second apparatus as-is when the information processing apparatus is in a standby power state. The determining unit determines the power state of the second apparatus on the basis of a control signal sent from the second apparatus. When it is determined by the determining unit that the second apparatus is not powered on, the power supply controller suspends power supply to the baseband signal manager. | 2010-05-27 |
20100131783 | System and Method of Dynamically Switching Queue Threshold - A system and method of dynamically switching the threshold of a data queue, such as FIFO, is disclosed. The data queue has a first threshold and a second threshold, wherein the first threshold is greater than the second threshold. The data queue is dynamically switched between the first threshold and the second threshold according to different power state of a central processing unit (CPU). A system memory is requested to fill the data queue with data whenever amount of the data queue is less than the switched first/second threshold. | 2010-05-27 |
20100131784 | POWER SAVINGS FOR MULTI-THREADED PROCESSORS - Methods and apparatuses are presented that allow power savings on a processor executing a plurality of threads on a plurality of cores. The method may include providing a first timing signal to a processor, determining the power requirements of the processor, loading a symbol into a shift register, where the symbol may be associated with the power requirements of the processor, providing a second timing signal to the processor, where the second timing signal may include a gated representation of the first timing signal and the symbol. | 2010-05-27 |
20100131785 | POWER MANAGEMENT OF COMPUTERS - A method of controlling power consumption in a computer uses a power management program installed on the computer to detect the identities of processes running on the computer which maintain the computer in a high power state in the absence of input activity. The program compares the identity of the or each process running on the computer with a set of identities of previously identified processes and causes the computer to adopt a low power state if the detected identity of a process, or the detected identities of all the processes, running on the computer is/are in the set of previously identified processes. | 2010-05-27 |
20100131786 | Single Chip 3D and 2D Graphics Processor with Embedded Memory and Multiple Levels of Power Controls - An apparatus and method is provided for data processing where power is automatically controlled with a feed back loop with the host processor based on the internal work load characterized by performance counters. The host automatically adjusts internal frequencies or voltage level to match the work load. The feedback loop allows tuning of frequency or voltage controlling power dissipation. | 2010-05-27 |
20100131787 | Adaptive Power Consumption Techniques - A method for adapting power consumption of a processor based upon an application demand is provided. The method initiates with determining an application demand based upon a current processing operation. Then, a time interval associated with the application demand is determined. Next, unnecessary power consuming functions for the application demand are determined. Then, a clock frequency for the unnecessary power consuming functions is reduced for the time interval. In one embodiment, the power is terminated to the unnecessary power consuming functions. In another embodiment, the clock frequency of the processor is adjusted for at least a portion of the time interval. A program interface for adapting power consumption of a computer system, processor instructions for adapting power consumption of a computer system and a processor are included. | 2010-05-27 |
20100131788 | Motion Sensor Assisted Auto-Shutdown Mechanism in Portable Audio Systems - A mechanism for automatically controlling the power condition of a portable audio system. The mechanism of the illustrative embodiments determines whether a user is interacting with the portable audio player. If no user interaction with the portable audio player is detected, the mechanism of the illustrative embodiments determines whether the portable audio player is moving. If the portable audio player is not moving, an inactivity duration counter in the portable audio player is incremented to an incremented value. Responsive to a determination that the incremented value of the inactivity duration counter meets or exceeds a time duration threshold value, the mechanism of the illustrative embodiments change the power condition of the portable audio player by turning the portable audio player off. | 2010-05-27 |
20100131789 | INFORMATION PROCESSING APPARATUS AND POWER SUPPLY CONTROL METHOD - In standby mode, memory contents are saved to a hard disk. After AC power has been removed by disconnecting the AC plug, when the AC power is restored the data saved on the hard disk is automatically restored into memory to set the power-saving mode back to the standby mode. When the power is turned on next, quick resumption from standby mode can be accomplished. | 2010-05-27 |
20100131790 | INTELLIGENT AND ADAPTIVE METHOD TO MANAGE MOBILE DEVICE POWER - The invention relates to systems and or methodologies for intelligent and adaptive power management in mobile devices. A peripheral power management component can set peripheral devices to active or inactive based on one or more schemas. The schemas can be predetermined or generated by the peripheral power management component. In addition, an adaptive component can modify the schemas to reflect actual usage or changing trends for each peripheral device. | 2010-05-27 |
20100131791 | SIGNAL PROCESSING APPARATUS AND SIGNAL PROCESSING SYSTEM - A signal processing apparatus includes a signal processor a processing amount predictor for predicting a processing amount in the signal processor based on the signal data and outputting a processing amount prediction value, a processing amount observer for observing a processing amount of the signal processing executed by the signal processor and outputting a process completion value, and a control value decision section for deciding a voltage of the power and a frequency of the clock, which are supplied to the signal processor, based on the processing amount prediction value, the process completion value, and elapsed information indicating an elapsed time from a start of the signal processing. The power supplier supplies the power whose voltage is decided by the control value decision section to the signal processor, and the clock supplier supplies the clock whose frequency is decided by the control value decision section to the signal processor. | 2010-05-27 |
20100131792 | ANALYSIS LEADING TO AUTOMATIC ACTION - A system and methods for detecting an operational problem on a mobile device and automatically resolving the problem with a coordinated execution of repair tasks on the mobile device and on the plurality of servers communicatively connected to the mobile device providing for a complex solution to an operational problem. The system can archive a history of corrective actions and their outcome for later analysis and reporting. | 2010-05-27 |
20100131793 | SMALL STORE SYSTEM - System and methods of use are discloses that default routing of an ID read by an ID reader as part of a purchase transaction in a retail store, to a first computer system (MCS) instead of the POS computer system for the retail store, the first computer system processes the ID, and the POS computer system receives the results of the processing in the form of a IDs recognizable by the POS computer system and for which the POS computer system has associated costs. | 2010-05-27 |
20100131794 | SYSTEM FOR DISASTER RECOVERY BACKUP AND A METHOD THEREOF - Embodiments disclosed herein related to a system used for disaster recovery backup. The system converts the operating system in the system preparing for disaster recovery into a virtualized system which will be disaster-recovery-ready. The system includes: a device to be converted on which a physical operating system is installed; a USB converting device which is coupled to the device to be converted, which includes a USB disc operating system, a converting unit and a virtual system, and which is used to convert the physical operating system in the device to be converted into a virtual system for making backup of the virtual system. Embodiments disclosed herein are further related to a method for disaster recovery backup and a method for installing the disaster recovery system. The disaster recovery system based on the virtualization technology may be deployed rapidly without making any changes to the physical operating system itself. After conversion, applications in the physical operating system are not influenced by the process of disaster recovery. In addition, because the running environment of virtual system after conversion and that of original physical operating system share the same physical machine, there is no unwanted influence on the virtual system after conversion caused by the difference of properties. | 2010-05-27 |
20100131795 | DATA PROCESSING SYSTEM - A data processing system has a plurality of storage systems. In this system, data replication is performed at high speed and efficiency while maintaining data integrity. In addition, when failure has occurred in a configuration element, the time necessary to resume the data replication is reduced. In accordance with an instruction from first host computer, updating of replication-target data and creation of a journal are performed in a storage system A; and updating of replication data and creation of a journal are performed in a storage system B. A storage system C retrieves a journal from the storage system B in asynchronization with the updating, and performs updating of replication data. When failure has occurred in the storage system B, a journal-retrieving end is altered to the storage system, and the replication data is updated in accordance with the retrieved journal. | 2010-05-27 |
20100131796 | System and Method for Detecting and Recovering from Errors in an Instruction Stream of an Electronic Data Processing System - A system and method are provided for detecting and recovering from errors in an Instruction Cache RAM and/or Operand Cache RAM of an electronic data processing system. In some cases, errors in the Instruction Cache RAM and/or Operand Cache RAM are detected and recovered from without any required interaction of an operating system of the data processing system. Thus, and in many cases, errors in the Instruction Cache RAM and/or Operand Cache RAM can be handled seamlessly and efficiently, without requiring a specialized operating system routine, or in some cases, a maintenance technician, to help diagnose and/or fix the error. | 2010-05-27 |
20100131797 | METHOD AND SYSTEM FOR ASSESSING AND REMEDYING ACCESSIBILITY OF WEBSITES - A system and method for assessing and remedying accessibility of websites is provided. The method includes receiving a website address for assessment, an accessibility guideline and level of assessment to be performed from the user. The method further includes crawling the website for extracting information. The information comprises HTML tags used in designing a webpage. Thereafter, the website is scanned for checking conformance to one or more accessibility parameters. Finally, one or more assessment reports are provided to the user. | 2010-05-27 |
20100131798 | Self-Adaptive Solution for Determining the Waiting Time on Page Loading - The present invention relates to page automation testing method and apparatus. According to one aspect of the invention, there is provided a method for automatically testing a page, comprising: determining based on a predetermined policy a setting value of wait time regarding whether the page is opened successfully; and conducting the page testing based on the setting value of wait time as determined. | 2010-05-27 |
20100131799 | Trouble emulator for a rules-based diagnostic system - Embodiments of the present invention are directed to validating a rules-based diagnostic system for a network. Emulated data for use by the rules-based diagnostic system can be generated that includes a trouble ticket to emulate a problem associated at least one of Layer 1 and Layer 2 network services and includes network information associated with the problem. Responses from the rules-based diagnostic system can be received in response to the emulated data being processed by the rules-based diagnostic system. A log generated by the rules-based diagnostic system can be analyzed to determine rules implemented by the rules-based diagnostic system in response to the emulated data, thereby validating operation of the rules-based diagnostic system. | 2010-05-27 |
20100131800 | DIAGNOSTIC DEVICE - A diagnostic device which detects a fault and estimates its cause on the basis of the degree of variation of each attribute of data containing a plurality of attributes obtained by measuring a diagnosis subject. A diagnosis subject variation degree pattern generation means ( | 2010-05-27 |
20100131801 | ELECTRONIC SYSTEM FOR DETECTING A FAULT - An electronic adapter device and an electronic system that comprises the electronic adapter device are described. The electronic adapter device comprises a device and a redundant device able to receive data from a first plurality of electronic devices and redundant data from a second plurality of electronic devices, and able to select therefrom first data and first redundant data respectively. The electronic adapter device also comprises a controller able to receive the selected first data and the selected first redundant data and is able to generate therefrom an error signal indicating a fault in an electronic device of the first plurality or a fault in the device. | 2010-05-27 |
20100131802 | METHOD AND SYSTEM FOR UNIT TESTING WEB FRAMEWORK APPLICATIONS - The lifetime of a data structure containing information for processing a client request is manipulated so that the information remains available to a review and/or testing process. After examination, the information may be discarded. | 2010-05-27 |
20100131803 | COMPUTATION OF STACK USAGE IN EMBEDDED COMPUTING SYSTEMS - A method to facilitate memory allocation includes examining an executable program file configured to be executed by a processor to identify a group of functions present within the executable program file, and calculating memory requirements for each function of the group of functions. Further operations include identifying a plurality of root functions as functions which are not referred to by other functions, creating a function call tree for each of the plurality of root functions, such that each of the function call trees comprise functions which are directly or indirectly referred to by an associated one of the plurality of root functions, and calculating memory requirements for one or more function call paths of each of the function call trees based upon the calculated memory requirements of the functions included within the one or more function call paths. | 2010-05-27 |
20100131804 | METHOD AND APPARATUS FOR SYMMETRY REDUCTION IN DISTRIBUTED MODEL CHECKING - A method for a model checking algorithm is provided. The method includes determining whether a class representative for a state has been processed, and generating a successor state for the state when the class representative for the state has not been processed. The method also includes determining which of a plurality of nodes is assigned to process the successor state, and processing the successor state at a node of the plurality of nodes that is assigned to process the successor state. | 2010-05-27 |
20100131805 | STORAGE CONTROLLER AND METHOD FOR CONTROLLING THE SAME - A storage controller of the present invention detects error with relative ease when reading out data from a storage apparatus. An address data appending device appends address data to each of logical blocks with respect to the data received from a host. A device communication control device determines a divisional position in every data with a size of a predetermined number of blocks, counterchanges the data in anterior and posterior parts around the divisional position, and stores the data in the storage apparatus. When reading the data from the storage apparatus, an address data checking device determines whether or not the value of the address data appended to the block read out and an expected value of the address data calculated based on the divisional position match with each other. If the both values match with each other, the data is sent to the cache memory. If the both values fail to match each other, an error is detected. | 2010-05-27 |
20100131806 | APPARATUS FOR CODING AT A PLURALITY OF RATES IN MULTI-LEVEL FLASH MEMORY SYSTEMS, AND METHODS USEFUL IN CONJUNCTION THEREWITH - A method and system for writing in flash memory, the system operative for, and the method comprising, writing data onto a plurality of logical pages characterized by a plurality of different probabilities of error respectively, the writing including encoding data intended for each of the plurality of physical pages using a redundancy code with a different code rate for each individual physical page, the code rate corresponding to the probability of error in the individual logical page. | 2010-05-27 |
20100131807 | DECODING ALGORITHM FOR QUADRATIC RESIDUE CODES - A decoding algorithm for quadratic residue codes applicable to the decoding of all quadratic residue codes is provided. The decoding algorithm employs digital signals to obtain a plurality of known syndromes. These known syndromes are used to calculate a plurality of unknown syndromes. The inverse-free Berlekamp-Massey algorithm is then used to calculate the error polynomial, after which the Chien search algorithm is used to determine the error locations. Adjustments can then be made to the digital signal bits corresponding to the error locations to obtain the correct code. | 2010-05-27 |
20100131808 | Method For Testing Memory - A memory testing method is provided, by using the computation capability of a controller to receive the testing command the program code of a testing PC to generate random data or use an algorithm to generate testing data of specific format. Then, the method writes the data directly to the flash memory and read the data from the memory again to compare with the original data. The comparison result is transmitted back to the testing PC. The method greatly reduces the memory access frequency and I/O load of the testing PC so as to improve the testing efficiency. | 2010-05-27 |
20100131809 | APPARATUS AND METHODS FOR GENERATING ROW-SPECIFIC READING THRESHOLDS IN FLASH MEMORY - A method for generating a set of at least one row-specific reading threshold for reading at least portions of pages of data within an erase sector of a flash memory device, the method comprising predetermining at least one initial reading threshold; performing the following steps for at least one current logical page: generating bit error characterizing information regarding at least one corresponding bit error within at least one cell representing at least a logical portion of at least one successfully reconstructed previous logical page; and computing at least one row-specific reading threshold based on said bit error characterizing information and on a previous threshold initially comprising said initial threshold and subsequently comprising a row-specific reading threshold computed for a successfully reconstructed previous logical page; and reading at least a portion of said current logical page using said at least one row-specific reading threshold. | 2010-05-27 |
20100131810 | SYSTEM AND METHOD FOR IMPLEMENTING A STRIDE VALUE FOR MEMORY TESTING - Systems and methods for implementing a stride value for memory are provided. One embodiment relates to a system that includes a plurality of memory modules configured to store interleaved data in a plurality of memory storage units according to a predetermined interleave. A memory test device is configured to perform a memory test that accesses a portion of the plurality of memory storage units in a sequence according to a programmable stride value. The memory test device performs the memory test by writing test data to each of the memory storage units in the portion of the plurality of memory storage units and reading the test data from each of the memory storage units in the portion of the plurality of memory storage units. | 2010-05-27 |
20100131811 | Semiconductor device and verify method for semiconductor device - A semiconductor device includes a memory module provided with a plurality of memory cells, a verify determination unit that performs quality determination of read data that have been read from the memory cells on the basis of the read data and an expected value prepared in advance, and a power source monitoring circuit that detects fluctuations equal to or greater than a predetermined variation rate in a power source voltage supplied to the memory module and outputs a power source abnormality detection signal. Furthermore, the verify determination unit invalidates a result of the quality determination when the power source abnormality detection signal indicates an abnormal state of the power source voltage. | 2010-05-27 |
20100131812 | Resizable Cache Memory - A resizable cache memory is disclosed. In a particular embodiment, a system is disclosed and includes a Built-In Self Test (BIST) circuit configured to test a cache memory. The system further includes a non-volatile storage device including an E-fuse array to store one or more indicators. Each indicator identifies a corresponding memory address of a failed location of the cache memory that has been detected by the BIST circuit. | 2010-05-27 |
20100131813 | METHOD FOR SELECTING PMI FOR NON-ADAPTIVE HARQ OPERATION IN A MIMO WIRELESS COMMUNICATION SYSTEM - A method for efficiently acquiring precoding information and transmitting an uplink signal using the precoding information in a User Equipment (UE) in a Multiple Input Multiple Output (MIMO) scheme is disclosed. The UE receives from a Base Station (BS) a scheduling grant signal including precoding matrix information to be used for an uplink signal transmission from the UE, precodes an uplink signal using the precoding matrix information included in the received scheduling grant signal, and transmits the precoded uplink signal initially to the BS. When retransmitting the uplink signal, if a scheduling grant signal is not received for the retransmission from the BS, the uplink signal is precoded and retransmitted using precoding matrix information included in a latest scheduling grant signal received for transmission of an uplink signal having a Hybrid Automatic Repeat reQuest (HARQ) process number equal to an HARQ process number of the uplink signal to be retransmitted. | 2010-05-27 |
20100131814 | Method for operation of synchronous HARQ in a wireless communication system - A method for operating synchronous HARQ between a transmitting station and a receiving station in a TDD communication system, includes configuring a plurality of HARQ processes at the transmitting station, and transmitting a data burst in a first subframe to the receiving station via one of the plurality of HARQ processes and using a frame structure including a plurality of regions of subframes. The method also includes receiving a second subframe transmitted from the receiving station and containing a HARQ feedback indicative of whether the data burst was correctly received at the receiving station. Further, the method includes determining whether the HARQ feedback is an acknowledgement (ACK) or a negative acknowledgement (NACK), and retransmitting, via the one of the plurality of HARQ processes, the data burst in a third subframe to the receiving station if it is determined that the HARQ feedback is a NACK. A total number of plurality of HARQ processes is determined based on a total number of uplink subframes between the first subframe and the third subframe. | 2010-05-27 |
20100131815 | METHOD AND APPARATUS PERFORMING EXPRESS RETRANSMISSION OF FRAMES - A method, apparatus and computer program product for the express forwarding are presented. A node attempts to transmit a frame designated as a Time Sensitive Quality of Service (TSQ) frame to be express forwarded from a first node to a second node of a plurality of nodes. A collision is detected involving the TSQ frame while attempting to transmit the TSQ frame. A retransmission of the TSQ frame is attempted without waiting a predetermined back off period. | 2010-05-27 |
20100131816 | COMMUNICATION SYSTEM ADAPTING FOR CAR, COMMUNICATION APPARATUS ADAPTING FOR CAR, AND COMMUNICATION METHOD ADAPTING FOR CAR - It is provided about a communication system adapting for car, communication apparatus adapting for car and a communication method adapting for car that can perform data transmission under extensive range from a low speed communication to high speed communication, without generating data delay, data dropout and the like, caused by the data sending collision. | 2010-05-27 |
20100131817 | METHOD OF AUTOMATIC REPEAT REQUEST (ARQ) IN COMMUNICATION SYSTEM - An automatic repeat request (ARQ) method for use in a communication system is disclosed. The ARQ method constructs a first data block set including a plurality of data blocks using data received from an upper layer, and transmits the data blocks contained in the first data block set to a reception end. If a predetermined time elapses without receiving any acknowledgement (ACK) signal after transmitting a last data block among the plurality of data blocks, the ARQ method transmits at least one data block reconstructed by the data received from the upper layer to the reception end until receiving the acknowledgment (ACK) signal from the reception end. | 2010-05-27 |
20100131818 | RETRANSMISSION METHOD AND DEVICE BASED ON LOW DENSITY PARITY CHECK CODES - A retransmission method based on Low Density Parity Check (LDPC) and devices thereof are provided in embodiment of this present invention, so as to increase the system throughput. In the present invention, when retransmission is needed, the partial bits in the information sequence to be retransmitted are replaced by the prior information that the transmitter and the receiver both have know, with the replaced information sequence is LDPC coded, LDPC check sequence is obtained and is sent to the receiver. After receiving the LDPC check sequence, the receiver decodes the information sequence including the prior information with the LDPC check sequence. If the decoding is successful, after removing the prior information from the decoded information sequence, the receiver refills the decoded bits in a previous received information sequence, and performs decoding again with an LDPC check sequence corresponding to the previous received information sequence and obtains a complete information sequence. | 2010-05-27 |
20100131819 | LDPC DECODER VARIABLE NODE UNITS HAVING FEWER ADDER STAGES - In one embodiment, the present invention is a variable node unit (VNU) of a low-density parity-check (LDPC) decoder. The VNU receives a soft-input value and w | 2010-05-27 |
20100131820 | DIGITAL BROADCASTING SYSTEM AND METHOD OF PROCESSING DATA THEREOF - A digital broadcasting system and data processing method are disclosed, which are highly resistant to channel changes and noise. The present invention includes receiving a broadcast signal having mobile service data and main service data multiplexed with each other from at least one parade, demodulating the broadcast signal, acquiring program table information describing at least one service included in at least one ensemble from the demodulated broadcast signal and decoding the mobile service data associated with a first service using a program table information transport unit in the acquired program table information. | 2010-05-27 |
20100131821 | DATA RECORDING METHOD, RECORDING MEDIUM AND REPRODUCTION APPARATUS - A recording medium for storing a data stream is comprised of first error correcting codes obtained by encoding first information, second error correcting codes obtained by encoding second information, and synchronization signals. In the data stream, the second error correcting codes and the synchronization signals alternatively interleave the first error correcting codes. The second error correcting codes have the same number of corrections as the first error correcting codes. A code length of the second error correcting codes is shorter than a code length of the first error correcting codes. | 2010-05-27 |
20100131822 | INTEGRATED CIRCUIT COMPRISING ERROR CORRECTION LOGIC, AND A METHOD OF ERROR CORRECTION - An integrated circuit comprises forward error correction (FEC) decoder logic being coupled to memory and arranged to receive data, comprising application data, from a host application process. The FEC decoder logic performs error detection upon the received data. Logic is further arranged to transmit error free application data back to the host application process prior to performing error correction; and store in memory only application data in which errors are detected. | 2010-05-27 |
20100131823 | DIGITAL BROADCAST SYSTEM FOR TRANSMITTING/RECEIVING DIGITAL BROADCAST DATA, AND DATA PROCESSING METHOD FOR USE IN THE SAME - A digital broadcast system having storing resistance to errors generated during the transmission of mobile service data, and a data processing method are disclosed. The digital broadcast system additionally encodes mobile service data. As a result, the mobile service data has strong resistance to a channel variation and noise, and at the same time the system can quickly cope with the channel variation. | 2010-05-27 |
20100131824 | Handling burst error events with interleaved Reed-Solomon (RS) codes - Handling burst error events with interleaved Reed-Solomon (RS) codes. A received signal, that has undergone convolutional interleaving sometime before, is received from a burst noise affected communication channel. The signal undergoes convolutional deinterleaving and the codewords generated there from undergo appropriate successive cyclic shifting to arrange burst noise affected symbols of various codewords into at least some common symbol locations. For example, at least two codewords have burst noise affected symbols in common symbol locations. An ensemble decoder jointly decodes multiple codewords during a same time period (i.e., processes multiple codewords simultaneously). By processing multiple codewords simultaneously, the ensemble decoder has greater error correction capability than a decoder that processes a single codeword at a time. | 2010-05-27 |
20100131825 | Memory Device with Error Correction Capability and Efficient Partial Word Write Operation - A memory device comprises a memory array and error correction circuitry coupled to the memory array. The memory device is configured to perform at least a partial word write operation and a read operation, with the partial word write operation comprising a read phase and a write phase. The write phase of the partial word write operation occurs in the same clock cycle of the memory device as the read operation by, for example, time multiplexing bitlines of the memory array within the clock cycle between the write phase of the partial word write operation and the read operation. Thus, the partial word write operation appears to a higher-level system incorporating or otherwise utilizing the memory device as if that operation requires only a single clock cycle of the memory device. | 2010-05-27 |
20100131826 | ESTIMATION OF NON-LINEAR DISTORTION IN MEMORY DEVICES - A method for operating a memory ( | 2010-05-27 |
20100131827 | MEMORY DEVICE WITH INTERNAL SIGNAP PROCESSING UNIT - A method for operating a memory ( | 2010-05-27 |
20100131828 | SYSTEM-ON-A-CHIP STORING CHIP DATA AND/OR SECURITY DATA AND METHOD OF PROCESSING CHIP DATA AND/OR SECURITY DATA FOR A DEVICE - A system-on-a-chip (SOC) includes a memory system, a data processor and a read only memory (ROM). The memory system includes random access memory and a memory controller. The data processor includes at least one functional block that communicates data with the memory system via the memory controller. The ROM stores data and one or more parity bits for detecting and correcting errors in the data. The data includes chip information and/or security information for the SOC. A method of using the SOC includes storing data in the ROM that includes chip information and/or security information for the SOC; storing in the ROM the one or more parity bits for the data; reading the data and the one or more parity bits from the ROM; detecting and correcting errors in the data using the one or more parity bits; and outputting the corrected data. | 2010-05-27 |
20100131829 | SCHEDULING DATA WITH TIME DIVERSITY IN FLOW SYSTEMS - Methods and systems are described for scheduling data in an FLO system. The method may include turbo encoding the data, and dividing a packet of the turbo-coded data into a plurality of subpackets. The method may include scheduling the turbo-coded packet of data so as to distribute the data across multiple frames of a superframe, by transmitting each one of the subpackets during a different frame of the superframe to increase time diversity. The turbo-coded packet of data may comprise systematic bits and parity bits. The method may include separately scheduling the systematic bits and the parity bits during different frames of the superframe. | 2010-05-27 |
20100131830 | Transparent In-Band Forward Error Correction for Signal Conditioning-Encoded Signals - A system and method are provided for framing messages in a forward error correction (FEC) structure for data streams encoded with redundant signal conditioning information. The method accepts signal conditioning-encoded words at a first bit rate, and eliminates redundant information in the signal conditioning-encoded words, creating N reduced-bit words of k bits. The k-bit words are mapped into a payload field of N*(k/p) p-bit words. Overhead (OH) and FEC parity fields are generated, and a frame is created including the OH field, payload field, and FEC parity field. The bit values in the frame are then pseudorandomly scrambled and the scrambled frame is transmitted at the first bit rate. A system and method are also presented for recovering the signal conditioning-encoded words from an FEC frame. | 2010-05-27 |
20100131831 | LOW POWER CHIEN-SEARCH BASED BCH/RS DECODING SYSTEM FOR FLASH MEMORY, MOBILE COMMUNICATIONS DEVICES AND OTHER APPLICATIONS - A low power Chien searching method employing Chien search circuitry comprising at least two hardware components that compute at least two corresponding bits comprising a Chien search output, the method comprising activating only a subset of the hardware components thereby to compute only a subset of the bits of the Chien search output; and activating hardware components other than those in the subset of hardware components, to compute additional bits of the Chien search output other than the bits in the subset of bits, only if a criterion on the subset of the bits of the Chien search output is satisfied. | 2010-05-27 |
20100131832 | Mechanism for Interleaved Parallel Cyclic Redundancy Check Calculation for Memory Devices - In one embodiment, a mechanism for interleaved parallel cyclic redundancy check calculation for memory devices is disclosed. In one embodiment, a method includes generating an index value as part of a cyclic redundancy check (CRC) operation, the index value being a result of a first exclusive-or operation applied to both of input data directly as-is from a data bus and to data in a 64-bit accumulator utilized to store results of the CRC operation. The method also includes indexing an interleaved parallel CRC table with the index value to retrieve a 64-bit polynomial entry from the CRC table, performing a second exclusive-or operation on the retrieved polynomial entry and data in the 64-bit accumulator, storing the results of the second exclusive-or operation in the 64-bit accumulator, and transmitting contents of the 64-bit accumulator directly as-is to the data bus. | 2010-05-27 |
20100131833 | Automated Creation of Media Asset Illustrations - The invention pertains to techniques for creating media asset illustrations for media assets are disclosed. The created media asset illustrations are useful for media assets that lack associated media asset illustrations. The techniques can analyze media asset data or media asset metadata when creating the create media asset illustrations. The created media asset illustrations can, for example, be used while playing, browsing or displaying associated media assets. | 2010-05-27 |
20100131834 | Enhanced Visual Representations Of Company Related Data - Data characterizing contact information for an individual is obtained. Thereafter, the contact information is associated with a company identifier for a company. A remote data source is then polled to obtain at least one graphical image characterizing a logo for the company so that a virtual business card containing the at least one graphical image and the contact information can be generated and displayed. In some implementations, other information from a remote data source can be used to generate a background portion of a virtual business card. Related apparatus, systems, techniques and articles are also described. | 2010-05-27 |
20100131835 | SYSTEM AND METHODS FOR INFERRING INTENT OF WEBSITE VISITORS AND GENERATING AND PACKAGING VISITOR INFORMATION FOR DISTRIBUTION AS SALES LEADS OR MARKET INTELLIGENCE - A system for inferring intent of visitors to a Website has a visitor-tracking application executing from a digital medium coupled to a server hosting the Website, the server connected to a repository adapted to store data about visitor behavior, and an inference engine for processing the data to infer the intent of visitors. Visitor behavior relative to links is tracked, and intent of a visitor is inferred from one or both, or a combination of analysis of the behavior and deducing meaning for anchor text of links selected. | 2010-05-27 |