22nd week of 2010 patent applcation highlights part 66 |
Patent application number | Title | Published |
20100138588 | MEMORY CONTROLLER AND A METHOD OF OPERATING AN ELECTRICALLY ALTERABLE NON-VOLATILE MEMORY DEVICE - A controller operates a NAND non-volatile memory device which has an array of non-volatile memory cells. The array of non-volatile memory cells is susceptible to suffering loss of data stored in one or more memory cells of the array. The controller interfaces with a host device and receives from the host device a time-stamp signal. The controller comprises a processor, and a memory having program code stored therein for execution by the processor. The program code is configured to receive by the controller the time stamp signal from the host device; to compare the received time stamp signal with a stored signal wherein the stored signal is a time stamp signal received earlier in time by the controller from the host device; and to determine when to perform a data retention and refresh operation for data stored in the memory array based upon the comparing step. | 2010-06-03 |
20100138589 | STORAGE OPTIMIZATIONS BY DIRECTORY COMPACTION IN A FAT FILE SYSTEM - Storage optimizations by directory compaction in a file allocation table (FAT) file system. The method comprises determining if a cluster comprises a deleted content, indicating that the deleted content is deleted, and updating an entry of a FAT associated with the cluster to indicate that the cluster is free. The method may also comprise indicating that the deleted content is deleted and modifying a metadata of at least one of a file of the cluster and a directory of the cluster according to a specified protocol. | 2010-06-03 |
20100138590 | CONTROL APPARATUS FOR CONTROLLING PERIPHERAL DEVICE, NON-VOLATILE STORAGE ELEMENT, AND METHOD THEREOF - A control apparatus for controlling at least one peripheral device includes a non-volatile storage element and a controller. The non-volatile storage element is used for storing at least one control information set. The controller is externally coupled to the non-volatile storage element and includes a read-only storage element which stores a segment of program code. The controller loads the segment of program code to execute the segment of program code for reading at least one portion of the control information set from the non-volatile storage element to control the operation of the peripheral device. | 2010-06-03 |
20100138591 | MEMORY SYSTEM - A memory system includes a volatile first storing unit, a nonvolatile second storing unit, and a controller. The controller stores management information of data stored in the second storing unit during a startup operation into the first storing unit and performs data management while updating the management information. The management information in a latest state stored into the first storing unit is also stored in the second storing unit. The management information includes a pre-log before and after change generated before a change occurs in the management information and a post-log, which is generated after the change occurs in the management information, concerning the change in the management information. The pre-log and the post-log are stored in the same areas of different blocks. | 2010-06-03 |
20100138592 | Memory device, memory system and mapping information recovering method - Disclosed is a memory device which comprises a data storing part having plural physical storage spaces; and a control part for storing data in the data storing part, wherein each of the physical storage spaces comprises a main area for storing user data at a write operation and a spare area for storing additional data other than the user data, the additional data including a logical address corresponding to a physical storage space and a link value indicating a physical storage space to be accessed next. | 2010-06-03 |
20100138593 | MEMORY CONTROLLER, SEMICONDUCTOR RECORDING DEVICE, AND METHOD FOR NOTIFYING THE NUMBER OF TIMES OF REWRITING - User data transferred from a host apparatus and a first information table | 2010-06-03 |
20100138594 | FLASH MEMORY DATA READ/WRITE PROCESSING METHOD - A flash memory data read/write processing method is provided. The method includes the following steps. An encoding process is performed on the data to be written so that a number of a specific value in the encoded data is reduced compared with that in the original data, and the encoded data is written into a flash memory chip. The encoded data in the flash memory chip is read out, then a decoding process corresponding to the encoding process in Step 1 is performed on the read data, and finally, the decoded data is output. This method may reduce the consumption of a flash memory chip due to writing and erasing operations, thereby prolonging the operating life span of the flash memory chip. This method may also increase the efficiency of writing and erasing operations, reduce the operating time, as well as reduce the power consumption of flash memory operations. | 2010-06-03 |
20100138595 | SEMICONDUCTOR DEVICE COMPRISING FLASH MEMORY AND ADDRESS MAPPING METHOD - A semiconductor device with flash memory includes; a log type determining unit configured to select log type from among a plurality of log types with respect to a log block storing program data requested to be programmed in the flash memory and generate a control signal indicating information indicating the selected log type, and a plurality of log units configured to store program data in the log block having a corresponding log type in response to the control signal, wherein the log type determining unit converts a first type log block formed by a first log type and included in a first type log unit from among the plurality of log units into second type log block formed by a second log type and converts the log block included in a second type log unit from among the plurality of log units into the first type log blocks, the first loge type being different from the second log type. | 2010-06-03 |
20100138596 | INFORMATION PROCESSOR AND INFORMATION PROCESSING METHOD - According to one embodiment, an information processor includes a connector, a determination module, a recognition module, and a cache control module. The connector connects a storage device to the information processor. The storage device is used as a cache by an operating system which controls the information processor. The determination module determines whether to use the storage device connected to the information processor as a data readable and writable storage area. The recognition module causes the operating system to recognize the storage device as a storage area when the determination module determines to use the storage device as a storage area. The cache controller controls the operating system to use the storage device as a cache when the determination module determines not to use the storage device as a storage area. | 2010-06-03 |
20100138597 | Information Processing System, System Controller, and Memory Control Method - According to one embodiment, an extreme data rate DRAM is a DRAM resetting data thereof in response to a reset signal. When power is initially supplied to a system, a system controller outputs the reset signal to the extreme data rate DRAM in response to a reset signal input from a memory controller through a level shifter. When shutting down power of a system while suspending data stored in the extreme data rate DRAM, the system controller shuts down power of the memory controller while maintaining supply of power to the extreme data rate DRAM in response to the reset signal input from the memory controller through the level shifter. | 2010-06-03 |
20100138598 | MEMORY DEVICES WITH BUFFERED COMMAND ADDRESS BUS - Circuits and methods are provided that alleviate overloading of the command address bus and limit decreases in command address bus bandwidth to allow increased numbers of memory modules to be included in a computer system. A plurality of switches is coupled between the command address bus (which is coupled to the memory controller) and a respective plurality of memory modules. Each switch provides command address bus data only to its respective memory module. Preferably, only one switch does so at a time, limiting the loading seen by the memory controller. | 2010-06-03 |
20100138599 | SYSTEM AND METHOD FOR MATCHING PATTERNS - A pattern matching system detects strings contained in a target pattern to be detected within a data stream input by 1-byte data, and detects a regular expression representing the target pattern among regular expressions constructed by the detected strings. | 2010-06-03 |
20100138600 | REDUCING CONTENT ADDRESSABLE MEMORY (CAM) POWER CONSUMPTION COUNTERS - A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry. | 2010-06-03 |
20100138601 | VIRTUAL VOLUME CONTROL METHOD INVOLVING DEVICE STOP - Provided is a storage system capable of starting/stopping a disk drive. At the time of allocating a logical device, it is judged, based on attributes including a purpose of the logical device, whether or not control can be performed in terms of start/stop of an allocation target disk drive to determine an allocation destination disk drive. Further, in the case where access to a specific logical device is stopped due to release of a path definition or other such cause, it is judged whether or not a disk drive corresponding to the logical device can be stopped. When it is judged that the disk drive can be stopped, the disk drive is stopped. When it is judged that the disk drive cannot be stopped, the logical device is migrated to another disk drive that can be stopped, a migration destination disk drive is stopped. | 2010-06-03 |
20100138602 | DISK SYSTEM ADAPTED TO BE DIRECTLY ATTACHED TO NETWORK - A network-attached disk (NAD) system is disclosed that includes an NAD device for receiving a disk access command from a host through a network, and a device driver at the host for controlling the NAD device through the network, where the device driver creates a virtual host bus adapter so that the host recognizes the NAD device as if it is a local device to the host. The host may run the UNIX or Windows family of operating systems. The NAD device includes a disk for storing data, a disk controller for controlling the disk, and a network adapter for receiving a disk access command from the host through a network port. | 2010-06-03 |
20100138603 | System and method for preventing data corruption after power failure - A system and method for preventing data corruption after power failure is described. The system may include a host server, a disk array, a journaling disk, and/or a RAID controller. A method for preventing data corruption after power failure may include receiving at least one of a read command or a write command, storing information on an array of disk drives at least partially based on receiving the at least one of a read command or a write command, and storing persistent information on a journaling drive. | 2010-06-03 |
20100138604 | RECORDING MEDIUM STORING CONTROL PROGRAM FOR DECENTRALIZED DATA, STORAGE MANAGEMENT PROGRAM, CONTROL NODE, AND DISK NODE - A number-of-slices collector collects number-of-slices information indicating the number of free slices, which are not assigned to a storage areas of a logical disk, from each of a plural disk nodes, divides the storage area of the corresponding storage device in units of slice, and stores an assignment relation of the slices with respect to the storage areas of the logical disk. A disk node selector selects a source disk node from among the disk nodes having the free slices, and requests a slice identifier to identify the free slice for the selected source disk node. The source disk node serves as a source providing the slice to be assigned. A slice assigner receives the slice identifier from the source disk node, and determines an assignment relation of the free slice, which is denoted by the received slice identifier, with respect to the storage areas of the logical disk. | 2010-06-03 |
20100138605 | SYSTEM AND METHOD FOR MULTI-TIERED META-DATA CACHING AND DISTRIBUTION IN A CLUSTERED COMPUTER ENVIRONMENT - A system and method caches and distributes meta-data for one or more data containers stored on a plurality of volumes configured as a striped volume set (SVS) and served by a plurality of nodes interconnected as a cluster. The SVS comprises one meta-data volume (MDV) configured to store a canonical copy of certain meta-data, including access control lists and directories, associated with all data containers stored on the SVS, and one or more data volumes (DV) configured to store, at least, data content of those containers. In addition, for each data container stored on the SVS, one volume is designated a container attribute volume (CAV) and, as such, is configured to store (“cache”) a canonical copy of certain, rapidly-changing attribute meta-data, including time stamps and container length, associated with that container. | 2010-06-03 |
20100138606 | Method for Controlling Non-Volatile Semiconductor Memory System - In a memory system using a storage medium, which is inserted into an electronic apparatus via a connector to add a memory function thereto, the storage medium has a GROUND terminal, a power supply terminal, a control terminal and a data input/output terminal, and the connector has a function of being sequentially connected to each of the terminals. When the storage medium is inserted into the connector, the GROUND terminal and control terminal of the storage medium are connected to corresponding terminals of the connector before the power supply terminal and data input/output terminal of the storage medium are connected to corresponding terminals of the connector. Thus, it is possible to improve the stability when a memory card is inserted into or ejected from the memory system. | 2010-06-03 |
20100138607 | Increasing concurrency and controlling replication in a multi-core cache hierarchy - In one embodiment, the present invention includes a directory of a private cache hierarchy to maintain coherency between data stored in the cache hierarchy, where the directory is to enable concurrent cache-to-cache transfer of data to two private caches. Other embodiments are described and claimed. | 2010-06-03 |
20100138608 | Method and apparatus for pipeline inclusion and instruction restarts in a micro-op cache of a processor - Methods and apparatus for instruction restarts and inclusion in processor micro-op caches are disclosed. Embodiments of micro-op caches have way storage fields to record the instruction-cache ways storing corresponding macroinstructions. Instruction-cache in-use indications associated with the instruction-cache lines storing the instructions are updated upon micro-op cache hits. In-use indications can be located using the recorded instruction-cache ways in micro-op cache lines. Victim-cache deallocation micro-ops are enqueued in a micro-op queue after micro-op cache miss synchronizations, responsive to evictions from the instruction-cache into a victim-cache. Inclusion logic also locates and evicts micro-op cache lines corresponding to the recorded instruction-cache ways, responsive to evictions from the instruction-cache. | 2010-06-03 |
20100138609 | Technique for controlling computing resources - A technique to enable resource allocation optimization within a computer system. In one embodiment, a gradient partition algorithm (GPA) module is used to continually measure performance and adjust allocation to shared resources among a plurality of data classes in order to achieve optimal performance. | 2010-06-03 |
20100138610 | METHOD AND APPARATUS FOR INCLUSION OF TLB ENTRIES IN A MICRO-OP CACHE OF A PROCESSOR - Methods and apparatus for inclusion of TLB (translation look-aside buffer) in processor micro-op caches are disclosed. Some embodiments for inclusion of TLB entries have micro-op cache inclusion fields, which are set responsive to accessing the TLB entry. Inclusion logic may the flush the micro-op cache or portions of the micro-op cache and clear corresponding inclusion fields responsive to a replacement or invalidation of a TLB entry whenever its associated inclusion field had been set. Front-end processor state may also be cleared and instructions refetched when replacement resulted from a TLB miss. | 2010-06-03 |
20100138611 | METHOD AND APPARATUS FOR PIPELINE INCLUSION AND INSTRUCTION RESTARTS IN A MICRO-OP CACHE OF A PROCESSOR - Methods and apparatus for instruction restarts and inclusion in processor micro-op caches are disclosed. Embodiments of micro-op caches have way storage fields to record the instruction-cache ways storing corresponding macroinstructions. Instruction-cache in-use indications associated with the instruction-cache lines storing the instructions are updated upon micro-op cache hits. In-use indications can be located using the recorded instruction-cache ways in micro-op cache lines. Victim-cache deallocation micro-ops are enqueued in a micro-op queue after micro-op cache miss synchronizations, responsive to evictions from the instruction-cache into a victim-cache. Inclusion logic also locates and evicts micro-op cache lines corresponding to the recorded instruction-cache ways, responsive to evictions from the instruction-cache. | 2010-06-03 |
20100138612 | SYSTEM AND METHOD FOR IMPLEMENTING CACHE SHARING - A system for implementing cache sharing includes a main control unit and a plurality of service processing units, and further includes a shared cache unit respectively connected with the main control unit and the service processing units for implementing high-speed data interaction among the service processing units. A method for cache sharing is also provided. In embodiments of the present invention, based on a reliable high-speed bus, a high-speed shared cache is provided. A mutual exclusion scheme is provided in the shared cache to ensure data consistency, which not only implements high-speed data sharing but also dramatically improves system performance. | 2010-06-03 |
20100138613 | Data Caching - The invention relates to a method for improving caching efficiency in a computing device. It utilises metadata, that describes attributes of the data to which it relates, to determine an appropriate caching strategy for the data. The caching strategy may be based on the type of the data, and/or on the expected access of the data. | 2010-06-03 |
20100138614 | Compression Status Bit Cache And Backing Store - One embodiment of the present invention sets forth a technique for increasing available storage space within compressed blocks of memory attached to data processing chips, without requiring a proportional increase in on-chip compression status bits. A compression status bit cache provides on-chip availability of compression status bits used to determine how many bits are needed to access a potentially compressed block of memory. A backing store residing in a reserved region of attached memory provides storage for a complete set of compression status bits used to represent compression status of an arbitrarily large number of blocks residing in attached memory. Physical address remapping (“swizzling”) used to distribute memory access patterns over a plurality of physical memory devices is partially replicated by the compression status bit cache to efficiently integrate allocation and access of the backing store data with other user data. | 2010-06-03 |
20100138615 | HANDLING DIRECT MEMORY ACCESSES - Methods and systems for efficiently processing direct memory access requests coherently. An external agent requests data from the memory system of a computer system at a target address. A snoop cache determines if the target address is within an address range known to be safe for external access. If the snoop cache determines that the target address is safe, the external agent proceeds with the direct memory access. If the snoop cache does not determine if the target address is safe, then the snoop cache forwards the request on to the processor. After the processor resolves any coherency problems between itself and the memory system, the processor signals the external agent to proceed with the direct memory access. The snoop cache can determine safe address ranges from such processor activity. The snoop cache invalidates its safe address ranges by observing traffic between the processor and the memory system. | 2010-06-03 |
20100138616 | Input-output virtualization technique - Methods, systems, apparatuses and program products are disclosed for managing device virtualization in hypervisor and hypervisor-related environment which include both pass-thru I/O and emulated I/O. | 2010-06-03 |
20100138617 | METHOD FOR INITIALIZING A MEMORY - A method for initializing a control device of a memory, the control device executing commands for accessing the memory transmitted to the memory by a control signal, the method comprising steps of detecting the switching on of the memory and of at least partially initializing the control device following the switching on of the memory. According to one embodiment of the present invention, the method comprises steps of detecting a specific event in the control signal, and of at least partially initializing the control device following the detection of the specific event. | 2010-06-03 |
20100138618 | Priority Encoders - A priority encoder and a processing device having the priority encoder. The priority encoder includes a port selector for generating a plurality of prioritized read requests based on a plurality of write requests from a plurality of processing devices and a predetermined priority assigned to each of the plurality of processing devices, one of the plurality of processing devices being selected based on the plurality of prioritized read requests; and a port latch for holding the values of the prioritized read requests to enable one of a plurality of communication ports unless the prioritized read requests are changed, each communication port for communicating with one of the processing devices to read data from the processing device. | 2010-06-03 |
20100138619 | Secure Erasure of Digital Files - One or more target files are securely erased from a host storage medium such as a disk by overwriting the target files not just with “O's,” “1's” and/or random data, but also (or instead) by overwriting them with portions of other, selected, innocuous files found on the same medium. By booting the host using a secondary, preferably external mechanism, before the host operating system is allowed to load, logging of file accesses and process execution by the host OS is circumvented. Post-replacement fragmentation and defragmentation may also be used to further reduce the detectability of the erasure, and the success of the process may be evaluated using statistical analysis. | 2010-06-03 |
20100138620 | Capturing and naming dynamic storage tiering configurations to support data pre-staging - A method for pre-staging data includes obtaining a DST configuration of a virtual volume at a first point in time. The method also includes creating a Point-in-Time copy (PiT) in a destination storage pool when the virtual volume includes at least one PiT, or reconfiguring at least one virtual volume segment to contain a hot-spot. The virtual volume may or may not have PiTs. The method further includes recording the DST configuration, specifying the DST configuration be applied to the storage array at a second point in time, and applying the DST configuration to the storage array at the second point in time. | 2010-06-03 |
20100138621 | INFORMATION PROCESSING SYSTEM, CONTROLLING METHOD IN INFORMATION PROCESSING SYSTEM, AND MANAGING APPARATUS - A problem is to support to realize the efficient power saving according to the status of a remote copy in an information processing system provided with a storage apparatus. When newly using any one of volumes of a first storage apparatus and a second storage apparatus, a management apparatus of the present invention extracts a candidate volume to screen-display the extracted volume so that the volumes, whose power control characteristics are the same or similar, are collected in the same array group. | 2010-06-03 |
20100138622 | BACKUP APPARATUS, BACKUP METHOD AND BACKUP PROGRAM - A backup apparatus has an address conversion table for storing, in correspondence with each other, a logical address and a physical address. The backup apparatus has a sequential data count setting unit, a sequential data information acquisition unit, and a reading unit. The sequential data count setting unit sets sequential data count information indicating the number of data blocks in a sequence in the physical address in the address conversion table. The sequential data information acquisition unit, upon receiving a read request, reads the data block in the address conversion table corresponding to the leading logical address among the logical addresses requested to be read and acquires the sequential data count information set in the address conversion table. The reading unit reads a physical volume corresponding to physical addresses in a sequence in accordance with the sequential data count information acquired by the sequential data information acquisition unit. | 2010-06-03 |
20100138623 | Memory Area Protection System and Methods - In one embodiment, a non-volatile memory device includes a plurality of protection bits denoting that an area of memory in the device must be protected from being erased or programmed. The memory device further includes a majority logic circuit for determining the logic state of the majority of the plurality of protection bits. Another embodiment includes a pattern generator for generating the logic levels to be stored in the plurality of protection bits. | 2010-06-03 |
20100138624 | Storage Controller And Storage Control Method - A storage control technique with which, even if not data, but only its management information is deleted, a host system can recognize storage areas storing unnecessary data and so use them effectively. When a file system in the host system deletes the management information for data stored in a page in a pool volume, a control circuit writes ‘0’ in all the areas in the deletion target page in response to a command from the host system. The control circuit then detects the page where ‘0’ is written in all of its areas and releases it from allocation to the corresponding virtual volume. | 2010-06-03 |
20100138625 | RECORDING MEDIUM STORING UPDATE PROCESSING PROGRAM FOR STORAGE SYSTEM, UPDATE PROCESSING METHOD, AND STORAGE SYSTEM - A reading and writing control unit has a synchronous mode for directly writing write data in storage devices and an asynchronous mode for accumulating the write data in a cache memory and writing the accumulated write data in the storage devices. A synchronization and asynchronization instructing unit instructs whether the data writing is to be performed in the synchronous mode and the asynchronous mode. A process control unit switches the reading and writing control unit, which is set in the asynchronous mode, to the synchronous mode. The process control unit issues an end instruction to cause the process to end service processing in a state in which the write data output by the process is directly written in the storage device. The process control unit starts service processing of the new process after the process ends the service processing and notifies an end result when the processing ends. | 2010-06-03 |
20100138626 | Use of reservation concepts in managing maintenance actions in a storage control system - A computationally implemented method, system, and product for managing maintenance activities in a storage control system are disclosed. A disk drive has a reservation status that is monitored. A reservation ID is assigned to a successful reservation request. The reservation ID of a drive request is compared to the reservation ID of a disk drive. | 2010-06-03 |
20100138627 | EFFICIENT ALERT MECHANISM FOR OVERUTILIZATION OF STORAGE RESOURCES - Disclosed is a method of issuing volume level alerts to provide a warning that indicates overutilization of storage resources in a computer system. Volume level checking is performed without the necessity of checking all the volumes, but only upon the occurrence of certain changes so that the only the most problematic volumes are checked. Hence, only a small number of volumes must be checked and only in response to certain identified changes. The method is applicable to any criterion for overutilization of storage resources which satisfies basic persistency rules. The method is also applicable to assessing risk for the use of other resources, such as communication bandwidth, that are supplied by resource providers, or pools of providers, to users of bandwidth. The principles disclosed can be utilized to check resources on an asset by asset basis, using the free space ratio definition provided to assess risk of overutilization of resources. | 2010-06-03 |
20100138628 | SYSTEM AND METHOD FOR DYNAMIC MEMORY ALLOCATION - A method for managing the allocation of memory to one or more applications. The method includes allocating a variety of fixed size memory blocks to a requesting application, each of the fixed size memory blocks being free of header information to maximize memory usage. Free, or unused blocks of data of the same fixed size are maintained in a freelist having a number of block roots corresponding to the number of differently fixed size memory blocks. Each block root stores a root pointer to an unused memory block previously allocated to the application. To conserve memory, each unused memory block will store branch pointers to other identically sized unused memory blocks, thereby forming a sequential chain of unused memory blocks with the block root. Therefore, applications requesting the same sized memory block can re-use previously allocated fixed size memory blocks. | 2010-06-03 |
20100138629 | STORAGE APPARATUS AND STORAGE AREA ALLOCATION METHOD - A storage apparatus is provided with a storage area for storing data sent from a host computer, and a virtual/logical volume to which a dynamically variable storage area is allocated from within the storage area, the volume being provided to the host computer, and this storage apparatus is configured to include: a pool area generation unit for generating a plurality of pool areas composed from the storage area; a setting unit for setting, for each of the plurality of pool areas generated by the pool area generation unit, an allocation unit size for allocating a storage area from within the storage area provided by the pool area to the virtual/logical volume; a selecting unit for selecting, when data to be stored in the storage area is sent from the host computer, a pool area from among the plurality of pool areas having the allocation unit size set by the setting unit, in accordance with the size of the sent data; and an allocation unit for allocating a storage area from within the storage area provided by the pool area selected by the selecting unit to the virtual/logical volume. | 2010-06-03 |
20100138630 | Data-Processing Unit - A data-processing unit comprises a register unit ( | 2010-06-03 |
20100138631 | Process for QR Transformation using a CORDIC Processor - A CORDIC processor has a plurality of stages, each of the stages having a X input, Y input, a sign input, a sign output, an X output, a Y output, a mode control input having a ROTATE or VECTOR value, and a stage number k input, each CORDIC stage having a first shift generating an output by shifting the Y input k times, a second shift generating an output by shifting X input k times, a multiplexer having an output coupled to the sign input when the mode control input is ROTATE and to the sign of the Y input when the mode input is VECTOR, a first multiplier forming the product of the first shift output and the multiplexer output, a second multiplier forming the product of the second shift output and an inverted the multiplexer output, a first adder forming the X output from the sum of the first multiplier output and the X input, and a second adder forming the Y output from the sum of the second multiplier output and the Y input. | 2010-06-03 |
20100138632 | Programmable CORDIC Processor with Stage Re-Use - A CORDIC processor has a plurality of stages, each of the stages having a X input, Y input, a sign input, a sign output, an X output, a Y output, a mode control input having a ROTATE or VECTOR value, and a stage number k input, each CORDIC stage having a first shift generating an output by shifting the Y input k times, a second shift generating an output by shifting X input k times, a multiplexer having an output coupled to the sign input when the mode control input is ROTATE and to the sign of the Y input when the mode input is VECTOR, a first multiplier forming the product of the first shift output and the multiplexer output, a second multiplier forming the product of the second shift output and an inverted the multiplexer output, a first adder forming the X output from the sum of the first multiplier output and the X input, and a second adder forming the Y output from the sum of the second multiplier output and the Y input. | 2010-06-03 |
20100138633 | Variable clocked heterogeneous serial array processor - A serial array processor may have an execution unit, which is comprised of a multiplicity of single bit arithmetic logic units (ALUs), and which may perform parallel operations on a subset of all the words in memory by serially accessing and processing them, one bit at a time, while an instruction unit of the processor is pre-fetching the next instruction, a word at a time, in a manner orthogonal to the execution unit. | 2010-06-03 |
20100138634 | DEVICES, SYSTEMS, AND METHODS TO SYNCHRONIZE PARALLEL PROCESSING OF A SINGLE DATA STREAM - Disclosed are methods and devices, among which is a system that includes one or more pattern-recognition processors, such as in a pattern-recognition cluster. The pattern-recognition processors may be activated to perform a search of a data stream individually using a chip select or in parallel using a universal select signal. In this manner, the plurality of pattern-recognition processors may be enabled concurrently for synchronized processing of the data stream. | 2010-06-03 |
20100138635 | Systems and Methods for Managing Endian Mode of a Device - Systems, methods, and devices for managing endian-ness are disclosed. In one embodiment, a device is configured to selectively operate in one of a big-endian operating mode or a little-endian operating mode. The device may include a register in which the current endian mode of the device is indicated in at least two different bit positions within the register. The at least two different bit positions may be chosen such that a data bit in one of the bit positions would be read by a system if the device and system operate in the same endian mode, while a data bit in another of the chosen bit positions would be read by the system if the device and system are operating in different endian modes from one another. In some embodiments, the endian mode of the device may be controlled by a hardware input or a software input. | 2010-06-03 |
20100138636 | Method of sending an executable code to a reception device and method of executing this code - One embodiment of the present invention discloses a process for sending an executable code to a security module locally connected to a receiving device. This security module comprises a microcontroller and a memory, the memory including at least one executable area provided to contain instructions suitable to be executed by the microcontroller, and at least one non-executable area, wherein the microcontroller cannot execute the instructions, further comprising the steps of dividing the executable code into blocks; adding at least one block management code to the blocks in order to create an extended block; introducing the content of an extended block into a message to be processed in the receiving device, in such a way that the whole executable code is contained in a plurality of messages; sending a message to the receiving device, this message containing one of the extended blocks different from the first extended block; processing the message in order to extract its extended block; storing the executable code and the at least one management code of the block received in the executable area of the memory; executing at least one management code of the extended block, this management code includes the effect of transferring the content of the block to a non-executable area of the memory; repeating the previous steps until all the extended blocks are stored in the memory, except for the first block; sending a message containing the first extended block to the receiving device; processing the message in order to extract the extended block and storing the executable code of the block received in the executable area of the memory. One embodiment of the invention also concerns a process for the execution of this code. | 2010-06-03 |
20100138637 | DATA PROCESSING METHOD - A data processing method for sampling data from data each varying over time, each of the data being associated with each of grid points arranged in an area, the method includes: dividing the area into blocks; calculating a variation rate of each of the data associated with each of the grid points included in each of the blocks; dividing the blocks into sub-blocks in accordance with the variation rate of the blocks; calculating a variation rate of each set of the data associated with each of the grid points included in each of the sub-blocks; and determining a frequency of sampling data associated with each of the grid points for the sub-blocks of the blocks and for the rest of the blocks in accordance with the variation rate of the sub-blocks and the rest of the blocks. | 2010-06-03 |
20100138638 | SYSTEM AND METHOD OF INSTRUCTION MODIFICATION - A method and system of instruction modification. A first machine language instruction, which may comprise a plurality of discrete instructions, is fetched. Responsive to a trigger pattern in the first machine language instruction, a segment of the first machine language instruction is modified. Information can be substituted into the segment based on specifics outlined in the trigger pattern. Alternatively, information can be combined with the segment via logical and/or arithmetic operations. Modification of the segment produces a second machine language instruction that is executed by units of the processor. In one embodiment, information may be taken from a queue and used to replace data from the segment. How information is taken from the queue and how the information so taken is used to replace fields of the segment are defined by the trigger pattern. | 2010-06-03 |
20100138639 | SANDBOXED EXECUTION OF PLUG-INS - A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP. Moreover, the architecture is highly scalable, stateless, and low administration architecture for the execution of the plug-ins, which can be scaled by adding/removing additional sandbox servers on-the-fly without prior configuration. | 2010-06-03 |
20100138640 | Reset synchronisation - Reset control circuitry is disclosed, for controlling a first reset signal for resetting at least a first portion of a circuit and a further reset signal for resetting at least a second portion of said circuit, said reset control circuitry comprising: an input for receiving an input first reset signal; an input for receiving an input further reset signal; an output for outputting an output first reset signal; and an output for outputting an output further reset signal; said reset control circuitry being responsive to detecting deassertion of said input first reset signal when said input further reset signal is asserted to delay deassertion of said output first reset signal so that said output first reset signal is deasserted at a same time or later than said input further reset signal. | 2010-06-03 |
20100138641 | Mechanism for enabling a program to be executed while the execution of an operating system is suspended - A mechanism is provided for enabling an auxiliary program to be executed in a computer system, after an operating system has been loaded and executed, without rebooting the computer system. This may be achieved by suspending execution of the operating system, executing the auxiliary program while execution of the operating system is suspended, and then resuming execution of the operating system. In suspending execution of the operating system, state information defining a current state of the computer system is saved. In resuming execution of the operating system, the saved state information is used to restore the computer system to the current state. No state information or data should be lost as a result of suspending and resuming execution of the operating system. From the viewpoint of the operating system and the applications (if any) executing within the environment provided by the operating system, execution of the auxiliary program is transparent. | 2010-06-03 |
20100138642 | INFORMATION HANDLING SYSTEMS INCLUDING NETWORK ADAPTERS AND METHODS OF BOOTING THE INFORMATION HANDLING SYSTEMS USING BOOT CONFIGURATION INFORMATION FROM REMOTE SOURCES - A system can be operable to receive boot configuration information from a remote source independent of the type of initiator (e.g., software or hardware) used by an information handling system. The information handling system having the initiator can be coupled to the remote source, which includes the boot configuration information, and a storage array that includes a boot image. While operating within a pre-operating system (pre-OS) environment, the information handling system can create a boot configuration table and populate the boot configuration table with the boot configuration information. The boot configuration information can include an address for the boot image and information for configuring an OS initiator to be used when loading the OS. | 2010-06-03 |
20100138643 | Media controller - A media controller is disclosed, which is a memory storing device, made up of an operating system and a piece of multimedia software, where the operating system is made merely for the multimedia software and available for the booting. And the multimedia software is an application program running on the operating system and is able to fetch the songs stored in the computer for overdubbing and sound effects processing. The selection of the memory storing device is the first priority to read during the booting. Once the new setting is saved, the computer is then ready to reboot. The memory storing device then takes charge of the execution of the operating system in the memory storing device. A user is then ready to run the multimedia software on the operating system, and further to operate the input device to fetch the songs stored in the computer for overdubbing and sound effects processing, to greatly achieve the stable playing of sound effects by making use of the existing computer equipment. | 2010-06-03 |
20100138644 | SYSTEM AND METHOD FOR DYNAMIC DATA MINING AND DISTRIBUTION OF MARITIME DATA - A system for dynamically collecting and distributing maritime data includes a vessel configured to transmit at a predetermined time, or upon electronic inquiry, a signal representative of a current location of the vessel or an expected location of the vessel; a computer network including one or more databases, each of which includes one or more zone of concern data, wherein the zone of concern data corresponds to a zone of concern; and a service provider configured to receive the signal, retrieve the one or more zone of concern data from the computer network based upon the signal and transmit the one or more zone of concern data to the vessel. The zone of concern data, which may he continually changing, may be sent from the service provider to the vessel on a continuous basis with respect to the changing location and heading of the vessel. | 2010-06-03 |
20100138645 | METHOD FOR MOVING RIGHTS OBJECTS INTO OTHER DEVICE IN DIGITAL RIGHTS MANAGEMENT - A method, device and system for moving a rights object. The method includes receiving a first move request message including a reqID element indicating a first device ID and a nonce element indicating a random value generated by the first device; receiving a second move request message including a reqID element indicating a first device ID and a nonce element indicating a random value generated by the first device; comparing the reqID element and nonce element of the first move request message with the reqID element and nonce element of the second move request message; and determining whether or not a rights object is moved from the first device to a second device based upon the comparison. | 2010-06-03 |
20100138646 | EDGE OPTIMIZED TRANSRATING SYSTEM - A system and method for bandwidth management by controlling the bit rate of a signal stream in real time according to available link bandwidth. Applications include multiple-channel video data streams over a limited-bandwidth link such as a Digital Subscriber Line. A video signal is transrated at the head end to multiple streams having different bit rates, by a multirating device which sends the multiple streams over a network, along with metadata containing information about the data structure and parameters of the streams. At the network access edge, a demultirating device uses the metadata to select the stream with the highest video quality whose bit rate does not exceed the available bandwidth of the end-user's access link. This scheme provides multiple unicast signals to different end-users in place of a single multicast signal, supports multiple high-definition channels over a limited bandwidth link, and is compatible with standard encryption methods. | 2010-06-03 |
20100138647 | ENCRYPTION SCHEME FOR STREAMED MULTIMEDIA CONTENT PROTECTED BY RIGHTS MANAGEMENT SYSTEM - A stream of content has multiple sub-streams, where each sub-stream comprises a part of the content and is divisible into logical blocks bounded by intrinsic partitions. For each sub-stream, a specification of the logical blocks bounded by the intrinsic partitions is defined and the sub-stream is divided into the logical blocks bounded by the intrinsic partitions. Each divided logical block is encrypted and then divided into one or more portions to produce corresponding pieces of data, and each piece of data is placed into a data packet as a payload thereof. Each data packet is transmitted to a recipient thereof, and the recipient can retrieve the pieces of data from the payloads of the packets, reconstruct the encrypted logical blocks, and manipulate the sub-stream on a per-logical block basis without necessarily decrypting each encrypted logical block. | 2010-06-03 |
20100138648 | INFORMATION PROCESSING APPARATUS - To efficiently perform encryption/decryption and message authentication processing for a plurality of messages in parallel, an information processing apparatus includes a plurality of encryption/decryption and message authentication units which can perform encryption/decryption processing and message authentication processing by switching between them in a predetermined block unit, and are configured to be operable in parallel, and a data transfer control unit which distributes processing target data associated with an encryption/decryption and message authentication processing request to the plurality of encryption/decryption and message authentication units. The data transfer control unit distributes the processing target data so that each of the plurality of encryption/decryption and message authentication units alternately performs the encryption/decryption processing and the message authentication processing in the predetermined block unit for each processing request included in a plurality of processing requests. | 2010-06-03 |
20100138649 | TRANSMISSION OF PACKET DATA OVER A NETWORK WITH SECURITY PROTOCOL - A method, device, system and computer program for providing a transport distribution scheme for a security protocol are disclosed. A first packet data connection is established to a remote node for transmitting packet data over a network with a security protocol. An authentication procedure is performed with the remote node via the first packet data connection for establishing a security protocol session with the remote node. At least one security parameter is negotiated with the remote node for transmitting packets through the first packet data connection. A second packet data connection is established to the remote node, and at least one security parameter is negotiated with the remote node for use with the second packet data connection. The first and second packet data connections are handled as packet data subconnections associated with the security protocol session. | 2010-06-03 |
20100138650 | SECURE COMMUNICATION SYSTEM, GATEWAY APPARATUS AND ITS OPERATING METHOD - A secure communication system includes: an external peer terminal for generating a security group and participating in the security group by connecting to a peer-to-peer (P2P) network; and a legacy terminal connected to a local area network. The system further includes a gateway apparatus, connected to both of the P2P network and the local area network, for enabling the legacy terminal to participate in the security group. | 2010-06-03 |
20100138651 | APPARATUS AND METHOD FOR SELECTING IP SERVICES - An apparatus and method for determining an authorized IP service for an access terminal during an establishment of a PPP connection. In an aspect of the disclosure, a data link is established with the access terminal, and a request to authenticate the access terminal is provided to an authentication/authorization server. During authentication, an IP Service Authorized Parameter is provided by the authentication/authorization server, the IP Service Authorized Parameter for indicating the authorized IP service for the access terminal. Thereby, a network layer protocol and a mobility protocol are each configured according to the authorized IP service that corresponds to the IP Service Authorized Parameter. | 2010-06-03 |
20100138652 | CONTENT CONTROL METHOD USING CERTIFICATE REVOCATION LISTS - Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the memory device. The certificate revocation lists for authenticating host devices to memory devices may be stored in an unsecured area of the memory device for convenience of users. | 2010-06-03 |
20100138653 | METHOD AND SYSTEM FOR SEARCHING FOR, AND COLLECTING, ELECTRONICALLY-STORED INFORMATION - A method and system for searching and collecting electronically stored information are described. Consistent with an embodiment of the invention, configuration and execution of a search are separated in time and location. For example, a search configuration application executing at a first computer system is utilized to generate a search configuration file, which controls the operation of a search agent when the search agent is executing at a target computer system and performing a search of storage devices act of the target computer system. Encryption is utilized to prevent unauthorized access to the search configuration file as well as the search results file generated by the search agent. | 2010-06-03 |
20100138654 | SYSTEM AND METHOD FOR AUTHENTICATION BASED ON PARTICLE GUN EMISSIONS - A system, method and computer readable medium are disclosed for authentication. The method includes generating a challenge on a sender based on physical emission properties of a particle gun; transmitting the challenge from the sender to a receiver; receiving the challenge on the receiver; and verifying the authenticity of an entity, such as data, an object or a person, at the receiver by comparing the challenge with a value generated at the receiver. The process of generating the challenge and value is such that it is difficult to retrieve details of the input data based on the output data. | 2010-06-03 |
20100138655 | TERMINAL APPARATUS AND OPERATION INFORMATION COLLECTING SYSTEM - A terminal apparatus includes a receiving unit for receiving content data having definition information containing information regarding collection of operation information and information limiting a destination of the operation information; a playback processing unit for playing back the content data; a separating unit for separating the definition information from the content data, an operation-log collecting unit for collecting an operation log based on the information regarding the collection of the operation information; an operation-information generating unit for generating operation information from the operation log; a transmission enabling/disabling determining unit for determining whether or not transmission of the operation information is enabled, and a transmitting unit for transmitting the operation information to an information collecting server in response to a user operation that causes data communication, when the transmission enabling/disabling determining unit determines that transmission of the operation information is enabled. | 2010-06-03 |
20100138656 | Shielding a Sensitive File - Embodiments of the invention provide for shielding a sensitive file on a computer that can connect to a server computer via a network. The computer may determine whether it complies with security compliance requirements sent from another computer or not in response to a read instruction or a write instruction of the sensitive file by application software, and encrypt the sensitive file with an encryption key. | 2010-06-03 |
20100138657 | System and method for authenticating an end user - A method for authenticating an end user. The method starts by generating a first pattern in response to receiving an authentication request from the end user. Next, the method continues by generating a second pattern in response to receiving confirmation that the end user received the first pattern; the second pattern comprising multiple colored nodes. Then the method determines the authenticity status of the end user by comparing data sent by the end user with the second pattern. The end user having generated the data by overlaying a transparent credit card on top of the second pattern and selecting at least one node which displays a color other than black. Finally, the method sends the determined authenticity status to the end user via an output device. | 2010-06-03 |
20100138658 | Electronic Message System with Federation of Trusted Senders - Systems and methods for allowing challenge messages to be sent directly to a recipient's inbox where normally the challenge message would be sent to a pending folder or deleted. Challenge messages sent between federated messaging services contain a federated token which can be identified, authenticated and validated to determine whether the challenge message should be sent to a recipient's inbox. The federated token can include an authentication portion and a validation portion. Authentication methods for the authentication portion can include, for example, checksums, salts, hashes and digital signatures. Once a federated token is authenticated by decrypting the authentication portion according to one or more of these authentication methods, the federated token is validated by determining the defined use-base and determining whether the receipt of the federated token satisfies the defined use. | 2010-06-03 |
20100138659 | ELECTRONIC NOTARY - A process is disclosed for notarizing document, by a client in the presence of a notary, comprising the steps of registering the notary, the client and the document, from a local workstation coupled to a central office, to provide for assigning at least one respective encryption key for identifying each of the notary, the client and the document to be notarized; associating in the central office, the respective encryption keys of the client with the notary and with the document; generating a transaction code, based on the step of associating the respective encryption keys, for authorizing execution of the document to provide the notarizing; executing the document; and embedding selected ones of the respective encryption keys together with a notary seal in the document. | 2010-06-03 |
20100138660 | SECURE COMMUNICATION SESSION SETUP - A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device. | 2010-06-03 |
20100138661 | MOBILE STATION, ACCESS POINT, GATEWAY APPARATUS, BASE STATION, AND HANDSHAKE METHOD THEREOF FOR USE IN A WIRELESS NETWORK FRAMEWORK - A mobile station, an access point, a gateway apparatus, a base station, and a handshake method thereof for use in a wireless network framework are provided. The wireless network framework comprises a first wireless network comprising the access point, and a second wireless network comprising the gateway apparatus and base station. There is an IP security tunnel between the access point and the gateway apparatus. When the mobile station handovers from the first wireless network to the second wireless network, it transmits a master session key to the gateway apparatus via the access point and the IP security tunnel. Additionally, when the mobile station handovers from the second wireless network to the first wireless network, it transmits a master session key to the access point. As a result, the authentication time, which is needed in handover procedure between the first wireless network and the second wireless network, is reduced effectively. | 2010-06-03 |
20100138662 | DIGITAL SIGNATURE ASSURANCE SYSTEM, METHOD, PROGRAM AND APPARATUS - According to respective embodiments of the present invention, it is possible to verify a security environment of an digital signature and assure validity of the digital signature. For example, in the case of generating the digital signature, the assertion for asserting a key management system and a user authentication system is generated, the conversion processing is applied to both of the digital signature and the assertion, and the acquired digital signature, assertion, and conversion value are outputted. Therefore, it is possible to verify validity of the assertion on the basis of the conversion value and verify the security environment of the digital signature on the basis of the key management system and the user authentication system included in the assertion. Accordingly, the validity of the digital signature can be assured. | 2010-06-03 |
20100138663 | Method Of Providing Security Document - A method of providing a security document is provided in which a computer system generates a digital signature of at least part of an identity associated with the security document, generates a plurality of coded data tags to each encode data on the identity and a respective part of the digital signature, and prints, with a printer networked therewith, the security document with the tags tiled thereacross. The tags are generated and printed so that interaction with only one of the tags to detect the identity and respective signature part encoded thereby allows authentication of the entire digital signature. | 2010-06-03 |
20100138664 | SYSTEMS AND METHODS FOR DISTRIBUTING PRIVATE PLACEMENT DOCUMENTS - Methods of providing a private placement document to a potential investor in a private placement. The methods may comprise the step of generating the private placement document in an encrypted electronic format. The private placement document may include a unique identifier. The methods may also comprise the steps of providing the private placement document to the potential investor, and recording the unique identifier. | 2010-06-03 |
20100138665 | AUTHENTICATED PROGRAM EXECUTION METHOD - According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time. | 2010-06-03 |
20100138666 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 2010-06-03 |
20100138667 | AUTHENTICATION USING STORED BIOMETRIC DATA - A method is provided for storing a biometric template extracted a smart card for use on a user computing device. The biometric template is extracted from the smart card using a smart card reader. The biometric template is encrypted using a content protection key. The content protection key is encrypted using at least one of a device password or a smart card password. The password may be hashed. The encrypted biometric template, the encrypted content protection key and the hashed password may then be stored in a cache. A method for using the stored biometric template to access the user computer device is also provided. | 2010-06-03 |
20100138668 | CONTENT DELIVERY SYSTEM - An information delivery device interacting with a user's eye, the device comprising an eye characteristic reader for reading at least one characteristic of the user's eye, a retinal projector for projecting information onto the retina, and an eye characteristic processor operative to receive at least one characteristic of the eye and to select the information based at least partly thereupon. A content protection system may comprise a multiplicity of such eye characteristic readers and a content protector receiving said at least one characteristic from such readers and controlling the user population's use of content to be protected based on that at least one characteristic. Related apparatus and methods are also provided. | 2010-06-03 |
20100138669 | ENCRYPTION AND DECRYPTION OF A DATASET IN AT LEAST TWO DIMENSIONS - It is described a method for encrypting and a method for decrypting at least a portion ( | 2010-06-03 |
20100138670 | STORAGE APPARATUS AND DATA WRITING METHOD - According to one embodiment, a storage apparatus includes: a controller encrypting user data with a key, and writing the encrypted user data in a storage medium; and a key changing module changing the key. The storage medium includes a user data region and a key changing region. When the key is changed, the controller divides the user data written in the storage medium into a plurality of pieces, encrypts a piece of the user data adjacent to the key changing region with the changed key, writes the encrypted piece into the key changing region, sequentially shifts each of the pieces other than the piece of the user data adjacent to the key changing region by one logical block size in a direction toward the key changing region, and writes the shifted pieces. | 2010-06-03 |
20100138671 | METHODS AND APPARATUSES FOR PROVIDING DRM INTEROPERABILITY - Methods and apparatuses for providing DRM interoperability are provided. Proxy re-encryption technique using bilinear map is used, and the same content can be used in different devices. According to the method of providing DRM interoperability includes in proxy agent with respect to digital rights management (DRM) service providers and device which supports predetermined DRM, first DRM service provider, second DRM service provider, the proxy agent, and the device identify each other, and proxy re-encrypt an interoperable content (IC) and provide the IC to the device. The IC is second-level encrypted by using a key of the first DRM service provider, and the proxy re-encryption is performed by using a proxy key generated from proxy key information provided from the first DRM service provider and the second DRM service provider. Therefore, a problem in which interoperability cannot be guaranteed since a DRM technique depends on a service provider is resolved. | 2010-06-03 |
20100138672 | RAID CONTROLLER, STORAGE CONTROL DEVICE, AND STORAGE CONTROL METHOD - A RAID controller selecting a plurality of storages forming RAID includes a data input part having a plurality of data input terminals; a control signal input part having a control signal input terminal to which a control signal related to path setting is inputted; a data output part having a plurality of data output terminals; and a path selection part connecting a data input terminal selected from among the plurality of data input terminals with a data output terminal selected from among the plurality of data output terminals based on the control signal when the control signal is inputted to the control signal input terminal. | 2010-06-03 |
20100138673 | Method for Secure Storage and Delivery of Media Content - The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g. abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content) may be generated and loaded in a secure and efficient manner. | 2010-06-03 |
20100138674 | COMPUTER NETWORK - A distributed computer system is disclosed in which computers co-operate with one another by sending messages over a network such as the Internet in order to perform a distributed application. In order to improve the security of such system, each web service involved in the distributed application runs in a separate virtual machine. Furthermore, the virtual machines on a web server dedicated to respective web service instances utilise the same policy enforcement point—running in another virtual machine on the web-server—in order to handle messages for or from the web server. To increase security still further, each virtual machine provides virtual cryptoprocessor functionality which is used in the processing of messages sent in the performance of the distributed application. | 2010-06-03 |
20100138675 | Methods and Systems for Managing Power to Multiple Processors - A system for controlling power to multiple processing cores operating in separate domains in an information handling system (IHS) is provided. The system includes a power regulator that is programmable to output voltage depending on a processor domain and a corresponding performance state. In some instances, one processor may be an integrated graphics processing unit, and another processor may be a discrete graphics processing unit. | 2010-06-03 |
20100138676 | Microprocessors with improved power efficiency - A microprocessor is arranged to process instructions at least some of which contain at least one immediate value which forms an operand of the function, wherein said immediate value is represented in a format which achieves a greater power efficiency than two's complement when said instructions are processed. | 2010-06-03 |
20100138677 | OPTIMIZATION OF DATA DISTRIBUTION AND POWER CONSUMPTION IN A DATA CENTER - The distribution of data among a plurality of data storage devices may be optimized, in one embodiment, by redistributing the data to move less-active data to lesser performing data storage devices and to move more-active data to higher performing data storage devices. Power consumption in the datacenter may be optimized by selectively reducing power to data storage devices to which less-active data, such as persistent data, has been moved. | 2010-06-03 |
20100138678 | POWER-SAVING DEVICE FOR POWER OVER ETHERNET AND CONTROL METHOD THEREFOR - A power-saving device for use with a Power-over-Ethernet technology includes a plurality of connecting ports, a time generator, a storage medium, a power control unit, and a micro controller. The connecting ports are electrically connected with respective powered devices for transmitting electrical power and data to respective powered devices. The time generator is used for generating time information. The storage medium is used for storing a power schedule table. The power control unit is electrically connected with the connecting ports for transmitting electrical power to the connecting ports. The micro controller is connected with the time generator, the storage medium and the power control unit. According to the power schedule table read out from the storage medium by the micro controller and the time information generated by the time generator, a power-outputting status of the power control unit is controlled by the micro controller. | 2010-06-03 |
20100138679 | RECORDING-MEDIUM STORING POWER CONSUMPTION REDUCTION SUPPORT PROGRAM, INFORMATION PROCESSING DEVICE, AND POWER CONSUMPTION REDUCTION SUPPORT METHOD - An information processing device capable of communicating with a plurality of servers installed within a facility and method are provided. A storage unit stores server information including an installation position and a temperature of each of said servers within said facility. A detection unit detects a group of not-yet-powered-on servers from said plurality of servers. A calculation unit calculates an index value indicating a correlation of heat generation amounts between said not-yet-powered-on server and powered-on servers, based on the server information stored in said storage unit for each detected not-yet-powered-on server. A decision unit decides a server which becomes a power-on target, from said group of the not-yet-powered-on servers, based on the calculated index value of each not-yet-powered-on server. An output unit outputs a decision result which has been decided. | 2010-06-03 |
20100138680 | AUTOMATIC DISPLAY AND VOICE COMMAND ACTIVATION WITH HAND EDGE SENSING - Systems and methodologies for adapting input/output operation of an electronic device for in-hand and out-of-hand scenarios are provided herein. As described herein, sensors (e.g., capacitive, resistive, touch-sensitive, etc.) are applied to respective outer edges of a device to determine whether the device is in a user's hand. Subsequently, the determination can be utilized to automatically select an input/output mode for the device and to selectively activate one or more input/output mechanisms associated with the device. For example, if a device is determined to be in-hand, mechanical input/output mechanisms, such as a touch-screen or keypad, can be enabled. Alternatively, if a device is determined to be out-of-hand, a touch-screen at the device can be disabled to conserve power and alternative input/output mode, such as voice input/output, can be enabled. As further described herein, in- and/or out-of-hand behavior for a device can be specified on a per-application or per-application type basis. | 2010-06-03 |
20100138681 | SEMICONDUCTOR DEVICE - A semiconductor device capable of stabilizing power supply by suppressing power consumption as much as possible. The semiconductor device of the invention includes a central processing unit having a plurality of units and a control circuit, and an antenna. The control circuit includes a means for outputting, based on a power supply signal including data on power supply from an antenna (through an antenna) or a load signal obtained by an event signal supplied from each of the units, one or more of a first control signal for stopping power supply to one or more of the units, a second control signal for varying a power supply potential supplied to one or more of the units, and a third control signal for stopping supplying a clock signal to one or more of the units. | 2010-06-03 |
20100138682 | STORAGE MANAGEMENT SERVER AND STORAGE CONFIGURATION RELOCATING METHOD - A storage management server collects, stores and displays positions, temperatures and temperature threshold values of physical storage devices from a storage apparatus. It collects, stores and displays positions and power consumptions of variable factor generation sources which are factors that cause the physical storage devices to vary in operation environments, and also calculates the influenceability by variable factor generation sources against the physical storage devices and affected temperatures thereof. It compares the temperature of a given physical storage device to a temperature threshold value of this physical storage device or compares it to an affected temperature thereof due to the variable factor generation sources, thereby moving, for data transfer, an operation position of physical storage device based on a comparison result at such time. | 2010-06-03 |
20100138683 | POWER CONTROL UNIT WITH DIGITALLY SUPPLIED SYSTEM PARAMETERS - Methods and apparatuses provide voltage regulation for a processor. Control or configuration parameters for a voltage regulator (VR) are provided digitally over a configuration bus to a VR controller. The parameters may be provided directly from a storage element, or via a processing element or processor core. Based in whole or in part on the parameters, the VR controller provides an output control signal to affect a power output from a power converter to the processing element. In one embodiment, the VR controller is integrated onto the same IC as the processing element. | 2010-06-03 |
20100138684 | MEMORY SYSTEM WITH DYNAMIC SUPPLY VOLTAGE SCALING - A memory controller, memory device, and method for dynamic supply voltage scaling in a memory system are provided. The method includes receiving a request for a supply voltage change at the memory controller in the memory system, the supply voltage powering the memory device. The method further includes waiting for any current access of the memory device to complete, and disabling a clock between the memory controller and the memory device. The method also includes changing the supply voltage responsive to the request, and enabling the clock. | 2010-06-03 |
20100138685 | Real-Time Signal Handling In Guest And Host Operating Systems - The present invention relates to signal handling in a host operating system process executing code portions of a single- or multi-threaded application and of the embedded guest operating system. When a signal is sent from the host operating system to the operating system process, the signal handler of the guest operating system will be invoked in a deterministic time, independent of the operating system process executing code portions of the application or of the guest operating system or executing system calls of the host operating system in a masked or non-masked operation. | 2010-06-03 |
20100138686 | FAILURE RECOVERY METHOD, FAILURE RECOVERY PROGRAM AND MANAGEMENT SERVER - In a computer system, including server apparatuses such as an active server and a standby server connected to a storage apparatus, when the active server fails, a management server changes over connection to the storage apparatus from the active server to standby server to thereby hand over operation to the standby server. The management server refers to a fail-over strategy table in which apparatus information of the server apparatuses is associated with fail-over methods to select fail-over strategy in consideration of apparatus information of the active and standby servers. | 2010-06-03 |
20100138687 | RECORDING MEDIUM STORING FAILURE ISOLATION PROCESSING PROGRAM, FAILURE NODE ISOLATION METHOD, AND STORAGE SYSTEM - Slices obtained by dividing the real data storage area of the storage device by segments are assigned to each of a plurality of segments obtained by dividing a virtual logical volume as a primary slice storing data of the segment as a destination of access made by an access node and/or a secondary slice that mirrors and stores data of the primary slice. Management information associates the segment with the primary slice and the secondary slice. A survival signal transmitted at predetermined intervals while a computer is normally operating is monitored. The computer from which the survival signal is not detected over a predetermined time period is detected as a failure node. The failure node is checked against the management information, the managed slice is set as a single primary slice that is an access destination of the access node for which the mirroring is stopped. The failure node is isolated. | 2010-06-03 |