25th week of 2010 patent applcation highlights part 79 |
Patent application number | Title | Published |
20100161899 | DISK DRIVE ARRAY SYNCHRONIZATION VIA SHORT-RANGE RF SIGNALING - A plurality of disk drives in a disk drive array are synchronized. A synchronization signal is generated at a master disk drive. The synchronization signal is encoded as a radio frequency signal for transmission over a radio frequency network in communication with the plurality of disk drives. The transmitted radio frequency signal is received at a slave disk drive and decoded to recover the synchronization signal. Rotation of a disk in the slave disk drive is synchronized with rotation of a disk in the master disk drive based on the recovered synchronization signal. | 2010-06-24 |
20100161900 | DATA REPLICATION IN A STORAGE SYSTEM - For a storage system having plural control units to which plural disk devices are connected, in the method for creating replication in a volume of the disk devices connected to different control units, when receiving update I/O of a replication source during an initial copy for replication, the reflection of update to the replication destination is performed on an extension of the same I/O. When a pair is divided after the completion of copying, the update position is retained on the differential bitmap disposed in the individual control units, and the differential bitmap is merged to one of the control units at a time of resynchronization to perform copy processing. | 2010-06-24 |
20100161901 | Correction of incorrect cache accesses - The application describes a data processor operable to process data, and comprising: a cache in which a storage location of a data item within said cache is identified by an address, said cache comprising a plurality of storage locations and said data processor comprising a cache directory operable to store a physical address indicator for each storage location comprising stored data; a hash value generator operable to generate a generated hash value from at least some of said bits of said address said generated hash value having fewer bits than said address; a buffer operable to store a plurality of hash values relating to said plurality of storage locations within said cache; wherein in response to a request to access said data item said data processor is operable to compare said generated hash value with at least some of said plurality of hash values stored within said buffer and in response to a match to indicate a indicated storage location of said data item; and said data processor is operable to access one of said physical address indicators stored within said cache directory corresponding to said indicated storage location and in response to said accessed physical address indicator not indicating said address said data processor is operable to invalidate said indicated storage location within said cache. | 2010-06-24 |
20100161902 | METHOD, SYSTEM, AND PROGRAM FOR AN ADAPTOR TO READ AND WRITE TO SYSTEM MEMORY - Provided are a method, system, and program for an adaptor to read and write to system memory. A plurality of blocks of data to write to storage are received at an adaptor. The blocks of data are added to a buffer in the adaptor. A determination is made of pages in a memory device and I/O requests are generated to write the blocks in the buffer to the determined pages, wherein two I/O requests are generated to write to one block split between two pages in the memory device. The adaptor executes the generated I/O requests to write the blocks in the buffer to the determined pages in the memory device. | 2010-06-24 |
20100161903 | APPARATUS, METHOD, COMPUTER PROGRAM AND MOBILE TERMINAL FOR PROCESSING INFORMATION - An apparatus for processing information, includes a memory storing a plurality of content items different in type and metadata containing time information of the content items, a cache processor for fetching from the memory the content item and the metadata of the content item to be displayed on a display and storing the fetched content item and the metadata thereof on a cache memory, a display controller for displaying on the display the metadata of the content items from the cache memory arranged in accordance with the time information and a selection operator selecting metadata corresponding to a content item desired to be processed, out of the metadata displayed, and a content processor for fetching from the cache memory a content item corresponding to the metadata selected by the selection operator by referencing the cache memory in response to the selected metadata, and for performing a process responsive to the fetched content item. | 2010-06-24 |
20100161904 | CACHE HIERARCHY WITH BOUNDS ON LEVELS ACCESSED - The present invention is directed to a system managing data in a multilevel cache memory system. Certain cache data is designated and stored only in particular levels of the multilevel cache, bypassing other levels of the multilevel cache. In a multiprocessor environment, the present invention includes cache coherency operations or messages that pertain to data stored only in certain levels of a multilevel cache. | 2010-06-24 |
20100161905 | Latency Reduction for Cache Coherent Bus-Based Cache - In one embodiment, a system comprises a plurality of agents coupled to an interconnect and a cache coupled to the interconnect. The plurality of agents are configured to cache data. A first agent of the plurality of agents is configured to initiate a transaction on the interconnect by transmitting a memory request, and other agents of the plurality of agents are configured to snoop the memory request from the interconnect. The other agents provide a response in a response phase of the transaction on the interconnect. The cache is configured to detect a hit for the memory request and to provide data for the transaction to the first agent prior to the response phase and independent of the response. | 2010-06-24 |
20100161906 | PRE-FETCHING VIRTUAL ENVIRONMENT IN A VIRTUAL UNIVERSE BASED ON PREVIOUS TRAVERSALS - An approach is provided for pre-fetching of virtual content in a virtual universe based on previous traversals. In one embodiment, there is a pre-fetching tool, including a ranking component configured to rank each of a plurality of parcels of locations previously visited by an avatar according to predefined ranking criteria. The pre-fetching tool further includes a pre-fetching component configured to pre-fetch a virtual content of said parcels of locations based on the ranking. | 2010-06-24 |
20100161907 | POSTING WEAKLY ORDERED TRANSACTIONS - A processor may comprise a core area, a control unit, an uncore area. The core area may comprise multiple processing cores and line-fill buffers. A first processing core of the core area may store a first weakly ordered transaction in a first line-fill buffer. The firs processing core may offload the first weakly ordered transaction to the extended buffer space provisioned in the uncore area after receiving a request from the uncore area. The first processing core may then de-allocate the first line-fill buffer after the first weakly ordered transaction is offloaded to the extended buffer space. The uncore may then post the first weakly ordered transaction to a memory or a memory system. The control unit may track the first weakly ordered transaction to ensure that the first weakly ordered transaction is posted to the memory or the system. | 2010-06-24 |
20100161908 | Efficient Memory Allocation Across Multiple Accessing Systems - Various embodiments of the present invention provide systems and methods for reducing memory usage across multiple virtual machines. For example, various embodiments of the present invention provide methods for reducing resource duplication across multiple virtual machines. Such methods include allocating a shared memory resource between a first virtual machine and a second virtual machine. A data set common to both the first virtual machine and the second virtual machine is identified. A first set of configuration information directing access to the data set by the first virtual machine to a first physical memory space is provided, and a second set of configuration information directing access to the data set by the second virtual machine to a second physical memory space is provided. The first physical memory space at least partially overlaps the second physical memory space. | 2010-06-24 |
20100161909 | Systems and Methods for Quota Management in a Memory Appliance - Various embodiments of the present invention provide systems and methods for using providing memory access across multiple virtual machines. For example, various embodiments of the present invention provide thinly provisioned computing systems. Such thinly provisioned computing systems include a network switch, at least two or more processors each communicably coupled to the network switch, and a memory appliance communicably coupled to the at least two or more processors via the network switch. The memory appliance includes a bank of memory of a memory size, and the memory size is less than the aggregate memory quota. In some instances of the aforementioned embodiments, the memory appliance further includes a memory controller that is operable to receive requests to allocate and de-allocate portions of the bank of memory. | 2010-06-24 |
20100161910 | STORED VALUE ACCESSORS IN SHARED MEMORY REGIONS - Instruction sets in computing environments may execute within one of several domains, such as a natively executing domain, an interpretively executing domain, and a debugging executing domain. These domains may store values in a shared region of memory in different ways. It may be difficult to perform operations on such values, particularly if a domain that generated a particular value cannot be identified or no longer exist, which may obstruct shared accessing of values and evaluative tasks such as stack walks. Instead, accessors may be associated with a stored value that perform various operations (such as low-level assembly instructions like Load, Store, and Compare) according to the standards of the value-generating domain, and domains may be configured to operate on the value through the accessors. This configuration may promote consistent accessing of values without having to identify or consult the value-generating domain or reconfiguring the instruction sets. | 2010-06-24 |
20100161911 | METHOD AND APPARATUS FOR MPI PROGRAM OPTIMIZATION - Machine readable media, methods, apparatus and system for MPI program optimization. In some embodiments, shared data may be retrieved from a message passing interface (MPI) program, wherein the shared data is sharable by a plurality of processes. Then, the shared data may be allocated to a shared memory, wherein the shared memory is accessible by the plurality of processes. A single copy of the shared data may be maintained in the shared data in a global buffer of the processes of the plurality of processes can read or write the single copy of the shared data from or to the shared memory. | 2010-06-24 |
20100161912 | Memory space management and mapping for memory area network - A mechanism for simultaneous multiple host access to shared centralized memory space via a virtualization protocol utilizing a network transport. The invention combines local memory interfacing with the handling of multiple hosts implementing virtualized memory-mapped I/O systems, such that the memory becomes a global resource. The end result is a widely distributed memory-mapped computer cluster, sharing a 2̂64 byte memory space. | 2010-06-24 |
20100161913 | PORTABLE ELECTRONIC DEVICE - In an IC card, an operating system manages the access order of each channel for each file using a channel management table. An application controls access to each file based on the access order managed in the channel management table. The channel management table stores, as an access order, an order that each logical channel has set a file in a current state. If current setting by a specific logical channel is canceled, a table updating function deletes the logical channel from the channel management table and moves up the access order of each logical channel next to the deleted logical channel. | 2010-06-24 |
20100161914 | AUTONOMOUS MEMORY SUBSYSTEMS IN COMPUTING PLATFORMS - Embodiments of the invention are generally directed to systems, methods, and apparatuses for autonomous memory subsystems in computing platforms. In some embodiments, the autonomous memory mechanism includes one or more autonomous memory logic instances (AMLs) and a transaction protocol to control the AMLs. The autonomous memory mechanism can be employed to accelerate bulk memory operations. Other embodiments are described and claimed. | 2010-06-24 |
20100161915 | METHOD AND SYSTEM CONTROLLING PAGE OPEN TIME FOR MEMORY DEVICE - A method and apparatus adaptively controlling a page open time for a memory device are disclosed. The method includes determining a page open maintenance time of an access-requested page based on system information and intellectual property (IP) request information; and controlling closing of an open page based on the determined page open maintenance time. | 2010-06-24 |
20100161916 | METHOD AND APPARATUS FOR REBUILDING DATA IN A DISPERSED DATA STORAGE NETWORK - A method begins by identifying a data slice requiring rebuilding to produce an identified data slice, wherein the identified data slice is one of a plurality of data slices that constitute a data segment and wherein each of the plurality of data slices is assigned for storage by a corresponding one of a plurality of data slice servers. The method continues by retrieving at least m number of data slices from at least m number of the plurality of data slice servers, wherein m data slices of the plurality of data slices enable reconstruction of the data segment, and wherein the at least m number of data slices does not include the identified data slice. The method continues by reconstructing the identified data slice from the at least m number of data slices to produce a rebuilt data slice. The method continues by writing the rebuilt data slice to the corresponding one of the plurality of data slice servers or to a new slice server. | 2010-06-24 |
20100161917 | Automatic Track Description Generator - A method includes generating a track description in real-time describing at least a portion of a track of a storage medium. An apparatus includes a dynamic track description generator configured to dynamically generate a track description describing a data wedge of a track on a storage medium, wherein the track description is generated at a time prior to synchronization with the data wedge. | 2010-06-24 |
20100161918 | Third dimensional memory with compress engine - An integrated circuit and method for modifying data by compressing the data in third dimensional memory technology is disclosed. In a specific embodiment, an integrated circuit is configured to perform compression of data disposed in third dimensional memory. For example, the integrated circuit can include a third dimensional memory array configured to store an input independent of storing a compressed copy of the input, a processor configured to compress the input to form the compressed copy of the input, and a controller configured to control access between the processor and the third dimensional memory array. The third dimension memory array can include one or more layers of non-volatile re-writeable two-terminal cross-point memory arrays fabricated back-end-of-the-line (BEOL) over a logic layer fabricated front-end-of-the-line (FEOL). The logic layer includes active circuitry for data operations (e.g., read and write operations) and data compression operations on the third dimension memory array. | 2010-06-24 |
20100161919 | BLOCK-LEVEL DATA STORAGE USING AN OUTSTANDING WRITE LIST - A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary blocks of data by performing splitting and encrypting operations on a block of data received from the client for storage on the virtual disk and reconstitute the block of data from at least a portion of the plurality of secondary blocks of data stored in shares on corresponding physical storage devices in response to a request from the client. | 2010-06-24 |
20100161920 | DATA MANAGEMENT APPARATUS, DATA MANAGEMENT SYSTEM, AND DATA MANAGEMENT METHOD - A data management apparatus, system and method are provided. The data management apparatus performing storage processing and readout processing of data for a plurality of storage devices includes a division unit that divides the data into two or more pieces of divided data, a storage destination selection unit that selects, as storage destinations for the pieces of divided data, two or more different storage devices mounted on the data management apparatus, and a distributed storage control unit that stores the pieces of divided data divided by the division unit in the storage destinations selected by the storage destination selection unit in a distributed manner. | 2010-06-24 |
20100161921 | FLASH ROM PROGRAMMING - A method comprises providing a golden ROM unit comprising known good ROM code. The golden ROM is coupled to a ROM socket of a target system. The target system is booted, wherein booting comprises providing power to the target system and independently providing power to the ROM socket. The known good ROM code is loaded from the golden ROM to a system memory of the target system. Power is removed from the ROM socket and the golden ROM is decoupled from the ROM socket. A first subject ROM is coupled to the ROM socket. Power is provided to the ROM socket and the first subject ROM is programmed with the known good ROM code. | 2010-06-24 |
20100161922 | SYSTEMS AND METHODS FOR FACILITATING MIGRATION OF VIRTUAL MACHINES AMONG A PLURALITY OF PHYSICAL MACHINES - A method for facilitating migration of virtual machines among a plurality of physical machines includes associating a virtual machine with at least one physical resource inaccessible by a first subset of the plurality of physical machines and available to a second subset of the plurality of physical machines, the virtual machine executing on a first physical machine in the second subset of the plurality of physical machines. The method includes receiving a request to migrate the virtual machine to a second physical machine in the plurality of physical machines. The method includes identifying a second physical machine in the second subset of the plurality of physical machines. The method includes migrating the virtual machine to the second physical machine. | 2010-06-24 |
20100161923 | METHOD AND APPARATUS FOR REALLOCATING MEMORY CONTENT - Coherent memory copy logic is operative to copy data from a source memory location to a destination memory location and duplicate a write request to a source memory region to produce a duplicated write request. Coherent memory copy logic is also operative to execute the duplicated write request to copy content from the external memory region to the destination memory region. Power to the source memory can then be reduced to save power while the internal memory is being used. Accordingly, a type of “hardware memory mover” does not require the use of any complex software synchronization and does not result in any service interruption during a memory move. The coherent memory copy logic reallocates the application memory space from, for example, external memory to internal memory within a chip in a manner that is transparent to the application software and the user. Corresponding methods are also set forth. | 2010-06-24 |
20100161924 | STORAGE SWITCH, STORAGE SYSTEM, AND DATA COPYING METHOD - A storage switch includes a first bitmap generator for generating a first bitmap, a controller for controlling copying of data, a first modifier, a second bitmap generator for generating a second bitmap, a second modifier, a merging controller for controlling to generate a third bitmap. When the writing of data is performed during the copying of data, the merging controller modifies a part of the index bits in the third bitmap corresponding to a part of the index bits of the first bitmap modified by the first modifier on account of the copying of data performed before the writing of data, and merges the second bitmap modified by the second modifier and the third bitmap modified by the merging controller. The controller resumes copying of data of any sub-regions on the basis of the merged bitmap. | 2010-06-24 |
20100161925 | Information processing apparatus, information processing method, and computer-readable recording medium having an information processing program - An information processing apparatus includes a first storage unit; a second storage unit connected to the first storage unit via a data transfer channel; a HDD total capacity determination unit acquiring information about a total storage capacity of the first storage unit; a HDD partition capacity determination unit acquiring information about a storage capacity in use of the second storage unit; a comparison unit comparing the total storage capacity of the second storage unit with the storage capacity in use of the second storage unit; a copy determination unit determining whether data stored in the second storage unit can be transferred to the first storage unit based on a result of comparison by the comparison unit; and a copy processing unit transferring the data stored in the second storage unit to the first storage unit when it is determined by the copy determination unit that the transfer is possible. | 2010-06-24 |
20100161926 | Data protection by segmented storage - A device, method, and system are disclosed. In one embodiment the device includes logic to handle and protect data. Specifically, the device includes logic to segment data that can receive a data object that needs to be stored. The logic within the device can segment the data object into a plurality of data segments. A segmented portion of the data object is an incomprehensible portion the data object when viewed in the segmented format. The device can then send each of the data segments to a several different storage locations. | 2010-06-24 |
20100161927 | Method for Using a CAPTCHA Challenge to Protect a Removable Mobile Flash Memory Storage Device - The embodiments described herein generally use a challenge to protect a removable mobile flash memory storage device, where the challenge may be in the form of a “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (“CAPTCHA”). In one embodiment, a method is provided in which a removable mobile flash memory storage device receives a command from a host device, generates a CAPTCHA challenge, provides the CAPTCHA challenge to the host device, receives a response to the CAPTCHA challenge from the host device, determines if the response satisfies the CAPTCHA challenge, and performs the command only if the response satisfies the CAPTCHA challenge. In another embodiment, a removable mobile flash memory storage device is provided for performing these acts. | 2010-06-24 |
20100161928 | MANAGING ACCESS TO AN ADDRESS RANGE IN A STORAGE DEVICE - Enhanced configuration of security and access control for data in a storage device is disclosed. A request is received to access an addressable memory location in a storage media within the storage device. A set of addressable memory locations with contiguous addresses identified by an address range is associated with first and second characteristics. The first characteristic is applied if the addressable memory location is within the set of addressable memory locations, and an entity is currently authenticated to and authorized to access the set of addressable memory locations. The second characteristic is applied if the addressable memory location is within the set of addressable memory locations, and no entity is currently authenticated to and authorized to access the set of addressable memory locations. The set of addressable memory locations can also be a logical partition, where the first and second characteristics are stored in a logical partition table. | 2010-06-24 |
20100161929 | Flexible Memory Appliance and Methods for Using Such - Various embodiments of the present invention provide systems and methods for using providing memory access across multiple virtual machines. For example, various embodiments of the present invention provide methods for configuring a shared main memory region. The methods include providing a memory appliance that includes a randomly accessible bank of memory and a memory controller that is operable to maintain information in relation to a first virtual machine and a second virtual machine. The methods further include receiving a request to allocate a first portion of the bank of memory to the first virtual machine, and receiving a request to allocate a second portion of the bank of memory to the second virtual machine. The first portion of the bank of memory is identified as accessible to the first virtual machine, and the second portion of the bank of memory is identified as accessible to the second virtual machine. | 2010-06-24 |
20100161930 | STATISTICS COLLECTION USING PATH-VALUE PAIRS FOR RELATIONAL DATABASES - A method, system, and computer readable medium for collecting statistics associated with data in a database are disclosed. The method comprises determining an amount of memory needed to collect statistics for data associated with a defined data type in a relational database. The defined data type is based upon a mark-up language using a tree structure with one or more root-to-node paths therein. The amount of memory is allocated as determined for collecting the statistics for the data of the defined data type. A statistics collection is performed for the data of the defined data type in a single pass through the database and within the amount of memory which has been allocated. The performing includes at least determining a total number of instances of at least one path-identifier associated with a given value within a given set of documents. | 2010-06-24 |
20100161931 | METHOD OF MANAGING SECTORS OF A NON-VOLATILE MEMORY - Machine-readable media, methods, apparatus and system for managing sectors of a non-volatile memory are described. In some embodiments, a plurality of file segments may be written to a plurality of memory sectors ( | 2010-06-24 |
20100161932 | METHODS FOR WRITING DATA FROM A SOURCE LOCATION TO A DESTINATION LOCATION IN A MEMORY DEVICE - Methods for writing data from a source location to a destination location in a memory device are provided. In one embodiment, a memory device receives a command from a host device, wherein the command specifies a logical address of a source location in the memory and a logical address of a destination location in the memory. The memory device translates the logical addresses of the source and destination locations to physical addresses of the memory, reads data from the source location, and writes the data to the destination location. In this embodiment, the data is read from the source location and written to the destination location without a need of further involvement of the host device after the host device sends the command to the memory device. Other embodiments are provided. | 2010-06-24 |
20100161933 | Storage device with manual learning - In a particular embodiment, a system is disclosed that includes a controller to read data from and write data to a first storage medium. The controller is adapted to monitor logical block addresses (LBAs) of each read operation from the first storage medium and to selectively store files associated with the monitored LBAs that are less than a predetermined length at a second storage medium to enhance performance of applications associated with the LBAs. | 2010-06-24 |
20100161934 | PRESELECT LIST USING HIDDEN PAGES - Disclosed is a computer implemented method, computer program product, and apparatus for maintaining a preselect list. The method comprises software components detecting a page fault of a memory page. In response to detecting a page fault, the software components determine whether the memory page is referenced in the preselect list and unhide the memory page. Upon determining whether the memory page is referenced in the preselect list, the software components remove an entry of the preselect list corresponding to the memory page to form at least one removed candidate page and skip paging-out of the at least one removed candidate page. | 2010-06-24 |
20100161935 | RAPID MEMORY BUFFER WRITE STORAGE SYSTEM AND METHOD - Efficient and convenient storage systems and methods are presented. In one embodiment a storage system includes a host for processing information, a memory controller and a memory. The memory controller controls communication of the information between the host and the memory, wherein the memory controller routes data rapidly to a buffer of the memory without buffering in the memory controller. The memory stores the information. The memory includes a buffer for temporarily storing the data while corresponding address information is determined. | 2010-06-24 |
20100161936 | METHOD AND SYSTEM FOR QUEUING TRANSFERS OF MULTIPLE NON-CONTIGUOUS ADDRESS RANGES WITH A SINGLE COMMAND - Methods and systems for queuing transfers of multiple non-contiguous address ranges within a single command are disclosed. Embodiments of systems include system processors, memory to store data and executable software, and storage devices to receive transfer commands stored in system memory. A host controller interface driver is executed by one or more system processors and collects multiple non-continuous address ranges from storage-device transfer requests and records starting addresses and quantities of data to transfer for each non-continuous range in a tagged command list. It records the number of address ranges in the tagged command list, and a tagged-transfer opcode in a command, and stores the command and the tagged command list in a command table for the storage device. It records a base address for the command table in memory and an offset for the tagged command list into a command header, which is stored in a command queue. | 2010-06-24 |
20100161937 | MEMORY SYSTEM AND COMPUTER SYSTEM - A memory system of the present invention comprises a plurality of first blocks provided for storing user information therein, to which first physical addresses which are not duplicate are assigned, respectively, a plurality of second blocks provided for individually storing therein the first physical addresses of initial defective blocks out of the plurality of first blocks, and a plurality of third blocks provided for individually storing therein the first physical addresses of late defective blocks out of the plurality of first blocks. The memory system further comprises a computing device for obtaining the first physical address corresponding to a logical address on the basis of the logical address, information stored in the second blocks, and information stored in the third blocks. | 2010-06-24 |
20100161938 | System-On-A-Chip Supporting A Networked Array Of Configurable Symmetric Multiprocessing Nodes - An integrated circuit having an array of programmable processing elements linked by an on-chip communication network. Each processing element includes a plurality of processing cores, a local memory, and thread scheduling means for scheduling execution of threads on the processing cores of the given processing element. The thread scheduling means assigns threads to the processing cores of the given processing element in a configurable manner. The configuration of the thread scheduling means defines one or more logical symmetric multiprocessors for executing threads on the given processing element. A logical symmetric multiprocessor is realized by a defined set of processing cores assigned to a group of threads executing on the given processing element. | 2010-06-24 |
20100161939 | PARALLEL PROCESSING METHOD AND SYSTEM, FOR INSTANCE FOR SUPPORTING EMBEDDED CLUSTER PLATFORMS, COMPUTER PROGRAM PRODUCT THEREFOR - A multi-processing system-on-chip including a cluster of processors having respective CPUs is operated by: defining a master CPU within the respective CPUs to coordinate operation of said multi-processing system, running on the CPU a cluster manager agent. The cluster manager agent is adapted to dynamically migrate software processes between the CPUs of said plurality and change power settings therein. | 2010-06-24 |
20100161940 | ADAPTIVE INTEGRATED CIRCUITRY WITH HETEROGENEOUS AND RECONFIGURABLE MATRICES OF DIVERSE AND ADAPTIVE COMPUTATIONAL UNITS HAVING FIXED, APPLICATION SPECIFIC COMPUTATIONAL ELEMENTS - The present invention concerns a new category of integrated circuitry and a new methodology for adaptive or reconfigurable computing. The preferred IC embodiment includes a plurality of heterogeneous computational elements coupled to an interconnection network. The plurality of heterogeneous computational elements include corresponding computational elements having fixed and differing architectures, such as fixed architectures for different functions such as memory, addition, multiplication, complex multiplication, subtraction, configuration, reconfiguration, control, input, output, and field programmability. In response to configuration information, the interconnection network is operative in real-time to configure and reconfigure the plurality of heterogeneous computational elements for a plurality of different functional modes, including linear algorithmic operations, non-linear algorithmic operations, finite state machine operations, memory operations, and bit-level manipulations. The various fixed architectures are selected to comparatively minimize power consumption and increase performance of the adaptive computing integrated circuit, particularly suitable for mobile, hand-held or other battery-powered computing applications. | 2010-06-24 |
20100161941 | METHOD AND SYSTEM FOR IMPROVED FLASH CONTROLLER COMMANDS SELECTION - A system for selecting a subset of issued flash storage commands to improve processing time for command execution. A plurality of ports stores a first plurality of command identifiers and are associated with the plurality of ports. Each of the first plurality of arbiters selects an oldest command identifier among command identifiers within each corresponding port resulting in a second plurality of command identifiers. A second arbiter makes a plurality of selections from the second plurality of command identifiers based on command identifier age and the priority of the port. A session identifier queue stores commands associated with the plurality of selections among other commands forming a third plurality of commands. A microcontroller selects an executable command from the third plurality of commands for execution based on an execution optimization heuristic. After execution of the command, the command identifier in the port is cleared. | 2010-06-24 |
20100161942 | INFORMATION HANDLING SYSTEM INCLUDING A PROCESSOR WITH A BIFURCATED ISSUE QUEUE - An information handling system includes a processor with a bifurcated unified issue queue that may perform unified issue queue VSU store instruction dependency operations. The bifurcated unified issue queue BUIQ maintains VSU store instructions in the form of internal operations data. The BUIQ includes a unified issue queue UIQ | 2010-06-24 |
20100161943 | PROCESSOR CAPABLE OF POWER CONSUMPTION SCALING - The present invention relates to a processor capable of power consumption scaling, and more particularly, to a technique that variably controls the energy consumption of a processor according to the energy capacity being supplied by providing a pipeline register with a bypass function so as to control the operating frequency of the processor. | 2010-06-24 |
20100161944 | Processor and instruction control method - An original first instruction word (I | 2010-06-24 |
20100161945 | INFORMATION HANDLING SYSTEM WITH REAL AND VIRTUAL LOAD/STORE INSTRUCTION ISSUE QUEUE - An information handling system includes a processor that may perform issue queue virtual load/store instruction operations. The issue queue maintains load and store instructions with a real/virtual dependency flag. The issue queue provides storage resources for real and virtual load/store instructions. Real load/store instructions execute in a load store unit LSU. Virtual load/store instructions are pending execution in the LSU. The LSU may keep track of each virtual load/store instruction within the issue queue by thread, type, and pointer data. Provided that all dependencies are clear for a pending virtual load/store instruction, the LSU marks the pending virtual load/store instruction as real. The pending virtual load/store instruction may then issue to the LSU as a real load/store instruction. | 2010-06-24 |
20100161946 | CONTROLLING JITTERING EFFECTS - Methods and related systems for controlling jitter effects are disclosed. | 2010-06-24 |
20100161947 | PACK UNICODE ZSERIES INSTRUCTIONS - Emulation methods are provided for two PACK instructions, one for Unicode data and the other for ASCII coded data in which processing is carried out in a block-by-block fashion as opposed to a byte-by-byte fashion as a way to provide superior performance in the face of the usual challenges facing the execution of emulated data processing machine instructions as opposed to native instructions. | 2010-06-24 |
20100161948 | Apparatus and Method for Processing Complex Instruction Formats in a Multi-Threaded Architecture Supporting Various Context Switch Modes and Virtualization Schemes - A unified architecture for dynamic generation, execution, synchronization and parallelization of complex instructions formats includes a virtual register file, register cache and register file hierarchy. A self-generating and synchronizing dynamic and static threading architecture provides efficient context switching. | 2010-06-24 |
20100161949 | SYSTEM AND METHOD FOR FAST BRANCHING USING A PROGRAMMABLE BRANCH TABLE - Methods and systems consistent with the present invention provide a programmable table which allows software to define a plurality of branching functions, each of which maps a vector of condition codes to a branch offset. This technique allows for a flexible multi-way branching functionality, using a conditional branch outcome table that can be specified by a programmer. Any instruction can specify the evaluation of arbitrary conditional expressions to compute the values for the condition codes, and can choose a particular branching function. When the processor executes the instruction, the processor's arithmetic/logical functional units evaluate the conditional expressions and then the processor performs the branch operation, according to the specified branching function. | 2010-06-24 |
20100161950 | SEMI-ABSOLUTE BRANCH INSTRUCTIONS FOR EFFICIENT COMPUTERS - Apparatus and methods are disclosed for a computation processor that can execute a semi-absolute branch instruction, as well as methods of operation and of generating the semi-absolute branch instruction. | 2010-06-24 |
20100161951 | PROCESSOR AND METHOD FOR RECOVERING GLOBAL HISTORY SHIFT REGISTER AND RETURN ADDRESS STACK THEREOF - A method for recovering global history shift register (GHSR) and return address stack (RAS) is provided, which is applicable to an instruction pipeline of a processor and includes the following steps. First, provide a branch recovery table (BRT) and a backup stack. Whenever a branch instruction enters a predetermined stage of the instruction pipeline, add a record in the BRT according to the branch instruction. Whenever a return address is popped from the RAS of the instruction pipeline, push the return address into the backup stack. When flushing the instruction pipeline, determine a removal range of the BRT according to the condition which triggers the pipeline flush. Recover the RAS according to the records in the removal range and the backup stack. Remove all records in the removal range. Recover the GHSR of the instruction pipeline according to the removed records. | 2010-06-24 |
20100161952 | PERFORMANCE OPTIMIZATIONS BY DYNAMIC REDUCTION OF FILE ALLOCATION TABLES - Performance optimizations by dynamic reduction of file allocation tables (FAT). A method of a file system includes reading a boot sector to determine a count of FAT instances. The method may set a count of FAT instances referred to in a boot sector to one if the count is greater than one. The method may modify the boot sector to refer to a data sector including a FAT instance as a reserved data sector. In addition, the method may include setting the count of FAT instances to one during at least one of a periodic operation of a dedicated application program interface and a file system mounting. | 2010-06-24 |
20100161953 | HANDLING SENSORS IN A CONTEXT AWARE PLATFORM - The context engine of a context aware platform may comprise a provider manager coupled to context providers and the provider manager may communicate with the context providers using application programming interfaces (API). To optimize the use of system resources, the provider manager may load/unload the context providers based on value of a load field of a hint signal or on prediction values. The context providers is to activate a first set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to activate state in the hint signal. The context providers is to deactivate a second set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to deactivate state in the hint signal. | 2010-06-24 |
20100161954 | COMPUTER START-UP SYSTEM, COMPUTER START-UP METHOD, AND COMPUTER START-UP PROGRAM - To start-up a computer system promptly at the time of power-on. The system includes an expansion card having an initialization command set in advance and a main body unit on which the expansion card is mounted. The main body unit includes a central processing section for executing initialization of the expansion card at the time of power-on based on the initialization command, a history holding section for storing the initialized expansion card, and a dictionary section for storing a common command which is the initialization command common to different expansion cards. The central processing section executes the common command, and also executes the initialization command set in the expansion card other than the expansion card stored in the history holding section and not included in the common command. | 2010-06-24 |
20100161955 | METHOD AND DEVICE FOR PROGRAMMING A CORDLESS HANDPIECE FOR ROOT CANAL TREATMENT - A method and device for programming a cordless handpiece used for root canal treatment and having a first memory and a tool holder for a treatment tool are described. The method includes providing a first data volume having a plurality of data sets in a second memory separate from the first memory, each of the data sets comprising at least one parameter assigned to the cordless handpiece and/or to the operable tool, selecting at least some of the data sets from the first data volume in the second memory, transmitting the selected data sets from the second memory to the first memory of the handpiece, and selecting a data set from the updated first memory for operation of the handpiece. | 2010-06-24 |
20100161956 | Method and Apparatus for Protected Code Execution on Clients - In one embodiment of the invention, a server may send encrypted material to a client. The client processor may decrypt and process the material, encrypt the results, and send the results back to the server. This sequence of events may occur while the execution or processing of the material is restricted to the client processor. Any material outside the client processor, such as material located in system memory, will be encrypted. | 2010-06-24 |
20100161957 | METHODS OF STORING AND RETRIEVING DATA IN/FROM EXTERNAL SERVER - Provided are methods of storing and searching for data in encrypted form. The method of storing data in encrypted form includes: encrypting desired data from among data stored in a database; dividing an entire region of the stored data into a plurality of bucket regions and allocating an index to each of the bucket regions; identifying order information in a bucket region to which the encrypted data belongs; and storing the encrypted data, index information of the bucket region to which the encrypted data belongs, and the identified order information in an external server. When a database containing important data of at least one user is stored in an external server using the above storing method, the security and efficiency of the database can be increased. | 2010-06-24 |
20100161958 | Device for Realizing Security Function in Mac of Portable Internet System and Authentication Method Using the Device - The present invention relates to a device for performing a security function in a medium access control (MAC) layer in a wireless portable Internet system and an authentication method thereof. In the wireless portable Internet system including a physical layer and the MAC layer, a security sublayer (i.e., the device for performing the security function in the MAC layer) is provided on an MAC common part sublayer. The security sublayer includes a privacy key management (PKM) control management module, a traffic data encryption/authentication module, a control message processing module, a message authentication module, a Rivest Shamir Adleman (RSA)-based authentication module, an authentication control/security association (SA) control module, and an extensible authentication protocol (EAP) encapsulation/decapsulation module. | 2010-06-24 |
20100161959 | METHOD AND APPARATUS FOR EXTENDING TRANSPORT LAYER SECURITY PROTOCOL FOR POWER-EFFICIENT WIRELESS SECURITY PROCESSING - Embodiments of the invention relate to apparatus, system and method for security extensions to the IETF Transport Layer Protocol (TLS) and IPsec standards that enable wireless devices to perform power-efficient and streamlined security packet processing. Embodiments of the invention enable a processor to use its existing cryptographic processing engines (e.g., AES-CCM) to perform TLS and IPsec security processing. Packets processed for WLAN and TLS security are processed pipelined, eliminating the multi-loop processing that currently exists, and decreases power consumed to process each packet. In addition, the host/chipset complex is woken up after all security processing has been done in the WNIC. | 2010-06-24 |
20100161960 | Secure Remote Access Public Communication Environment - A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is accessed from a user device such that it sends and receives data packets through the VPN client. For this, a request to send packets, originating from the user application, is intercepted by a VPN agent associated with the user application. In turn, the VPN agent associates an address of a loop-back interface with the user application. Thereafter, packets sent by the user application, are re-directed to the VPN client through the loop-back interface. Similarly, packets received by the VPN client from the enterprise network are routed through the loop-back interface to the user application. | 2010-06-24 |
20100161961 | Systems and Methods for Securely Providing Email - Systems and methods for securely providing email messages are provided. A workstation computer is provided that includes a memory for storing computer executable instructions and a processor for accessing the memory and for executing the computer executable instructions. The computer executable instructions includes an email client configured to process email messages, at least one email message having an executable decryption attachment that includes encrypted embedded content that can only be decrypted with a unique cryptography key. The executable decryption attachment, when executed, is configured to establish a secure connection with an encryption server, receive the unique cryptography key from the encryption server and decrypt the embedded content. | 2010-06-24 |
20100161962 | SYSTEM AND METHOD OF TRANSMITTING/RECEIVING SECURITY DATA - There are provided a security server for intermediating transmission/reception of security data between a service providing server and a user terminal, a security data transmission/reception system and a method. In order to intermediate the transmission/reception of security data between the service providing server and the user terminal, the security server may generate a session key corresponding to a secret key provided from a user terminal, receive security data together with the session key from a security data transmitter, encode the security data with the secret key corresponding to the session key, store the encoded security data, provide a data encryption key to the security data transmitter, decode the encoded security data with the secret key corresponding to the session key when the session key is received together with a security data request key from a security data receiver, and provide the decoded security data to the security data receiver. | 2010-06-24 |
20100161963 | TRUSTED AND SECURE TECHNIQUES FOR ITEM DELIVERY AND EXECUTION - Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI). | 2010-06-24 |
20100161964 | STORAGE COMMUNITIES OF INTEREST USING CRYPTOGRAPHIC SPLITTING - Methods and systems of presenting data in a secure data storage network are disclosed. One method includes defining a plurality of communities of interest, each community of interest capable of accessing data stored in a secure data storage network and including a plurality of users desiring access to a common set of data, wherein each of the plurality of communities of interest has a set of security rights. The method also includes associating each of the plurality of communities of interest with a different workgroup key. The method further includes, upon identification of a client device as associated with a user from among the plurality of users in a community of interest, presenting a virtual disk to the client device in accordance with the security rights, the virtual disk associated with the workgroup key associated with the community of interest and a volume containing the common set of data to the community of interest, the volume including a plurality of shares stored on a plurality of physical storage devices. | 2010-06-24 |
20100161965 | Secure Credential Store - A credential store provides for secure storage of credentials. A credential stored in the credential store is encrypted with the public key of a user owning the credential. A first user may provide a credential owned by the first user to a second user. The first user may add credentials owned by the first user to the credential store. An administrator may manage users of the credential store without having the ability to provide credentials to those users. | 2010-06-24 |
20100161966 | MUTUAL AUTHENTICATION APPARATUS AND METHOD IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - A mutual authentication method in a Downloadable Conditional Access System (DCAS) is provided. The mutual authentication method may receive authentication-related information about authentication between an authentication unit and a security module (SM) from a Trusted Authority (TA), generate an authentication session key using the authentication-related information, transmit the authentication session key by the authentication unit to the SM through a Cable Modem Termination System (CMTS), and control a Conditional Access System (CAS) software to be downloaded to the SM from the authentication unit, when the authentication is completed by the authentication session key. | 2010-06-24 |
20100161967 | Method and system for dynamically implementing an enterprise resource policy - A rules evaluation engine that controls user's security access to enterprise resources that have policies created for them. This engine allows real time authorization process to be performed with dynamic enrichment of the rules if necessary. Logging, alarm and administrative processes for granting or denying access to the user are also realized. The access encompasses computer and physical access to information and enterprise spaces. | 2010-06-24 |
20100161968 | Delivering content in digital postal envelope - Methods and apparatus, including computer program products, for generating and processing a digital document. The digital document includes private content that is accessible only upon a request for the private content, and presentation data that is accessible without the request for the private content. The presentation data defines a graphical representation of an addressed postal envelope that has a stamp side on which one or more intended recipients of the private content are represented as addressees. | 2010-06-24 |
20100161969 | NETWORK DEVICE AUTHENTICATION - The present invention relates to using digital certificates to allow network devices to authenticate themselves upon being accepted into and forming part of a communication network. | 2010-06-24 |
20100161970 | USER TERMINAL AND METHOD OF MANAGING USER INFORMATION - A user terminal and a method of managing user information are provided. The method includes issuing a request for issuance of a certificate for a user to a certification authority; generating a document including at least part of user information using a certificate issued by the certification authority; and issuing a subscription request to a desired web service provider by providing the document including the at least part of the user information to the desired web service provider. Therefore, it is possible to strengthen the user's right to self-determination and control over the exposure and use of his or her personal information. In addition, it is possible to improve the reliability of user information provided to each website by the user. | 2010-06-24 |
20100161971 | AUTOMATED PROCESS FOR A WEB SITE TO RECEIVE A SECURE SOCKET LAYER CERTIFICATE - The present invention provides systems and methods for enabling encrypted communication capabilities for a Subscriber's Web Site, thereby allowing Customers to access the Subscriber's Web Site in a secure manner. A Hosting Provider, that hosts the Subscriber's Web Site, and a Certificate Authority (CA), that verifies the identity of the Subscriber, provide the Subscriber's Web Site with Secure Sockets Layer (SSL) encrypted communications capability. The Hosting Provider and CA communicate directly with each other as needed, typically via the Internet, without using the Subscriber as an intermediary in their communications. | 2010-06-24 |
20100161972 | DEVICE AND METHOD FOR KEY BLOCK BASED AUTHENTICATION - The invention relates to a device ( | 2010-06-24 |
20100161973 | REQUEST AUTHENTICATION TOKEN - An authentication mechanism for use in network-based services generates an authentication token. The authentication token is provided to a client device as part of the code comprising a content page. The content page code is received and loaded by a browser application at the client device. When the content page code is received and loaded by the browser application, the authentication token is loaded by the browser as well. Upon receiving subsequent input, the browser application may send a content request to the server. The content request includes the authentication token maintained by the browser application in the content page. A server may validate the authentication token provided in the request using version information and one or more master authentication tokens. | 2010-06-24 |
20100161974 | MASTER TERMINAL CAPABLE OF REGISTERING AND MANAGING TERMINALS OF PERSONAL USE SCOPE, AND METHOD AND SYSTEM USING THE SAME - Disclosed are a master terminal capable of registering and managing terminals that belong to a personal use scope, which will be referred to as personally used terminals or personal use terminals, hereafter, and a method and system for managing personal use terminals by using the master terminal. The method for managing a personal use group using a first master terminal to register and manage terminals belonging to a personal use scope includes: requesting a second master terminal that belongs to the personal use scope for personal use group information; receiving the personal use group information from the second master terminal; and registering a terminal that belongs to the personal use scope as the personal use group based on the received personal use group information. | 2010-06-24 |
20100161975 | PROCESSING SYSTEM WITH APPLICATION SECURITY AND METHODS FOR USE THEREWITH - A processing system includes an interface for receiving application data at the processing system corresponding to an application, the application data including authentication data. A one-time programmable memory stores at least one application key. A processing module executes an operating system that includes a security routine to authenticate the application data based on the authentication data and the at least one application key. The security routine permits the execution of the application by the processing module when the authentication data is authenticated, and prevents the execution of the application by the processing system when the authentication data is not authenticated. | 2010-06-24 |
20100161976 | SYSTEM AND METHOD FOR HANDLING CROSS-PLATFORM SYSTEM CALL WITH SHARED PAGE CACHE IN HYBRID SYSTEM - A system and associated method for handling a cross-platform system call with a shared page cache in a hybrid system. The hybrid system comprises a first computer system and a second computer system. Each computer system has a respective copy of the shared page cache, and validates an entry in the respective copy of the shared page cache for pages available in the respective computer system. The cross-platform system call is invoked by a first kernel to provide a kernel service to a user application in the first computer system. The cross-platform system call has a parameter referring to raw data in the first computer system. The cross-platform system call is converted to be executed in the second computer system and the raw data is copied to the second computer system only when a page fault for the raw data occurs while executing the cross-platform system call. | 2010-06-24 |
20100161977 | ELECTRONIC FILE ACCESS CONTROL SYSTEM AND METHOD - A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless a removable physical key that can be associated with the receiving computer includes identification data which matches the identification data stored in the file header. The digital content encrypted in the file may be compressed, and the header may also be encrypted. When the header is encrypted, the receiving computer may decrypt only the header unless the identification data of the header matches the identification data for a removable physical key. Improved security and reduction of pirating of the digital content are therefore provided. | 2010-06-24 |
20100161978 | SYSTEM AND METHOD FOR HANDLING CROSS-PLATFORM SYSTEM CALL IN A HYBRID SYSTEM - A system and associated method for handling a system call in a hybrid system. The hybrid system comprises a first computer system and a second computer system coupled to the first computer system at a respective kernel of the respective computer system. A user application of the first computer system requests a kernel service by invoking a system call to a first kernel. The first kernel determines that the system call is remotely executed by a second kernel of the second computer system. The system call and associated parameters are converted to be executable in the second computer system and transferred to the second computer system. The second computer system executes the system call and a result is returned to the first computer system. The result is reversely converted for the first computer system and the user application receives the result. | 2010-06-24 |
20100161979 | PORTABLE ELECTRONIC ENTITY FOR SETTING UP SECURED VOICE OVER IP COMMUNICATION - A portable electronic entity includes an interface ( | 2010-06-24 |
20100161980 | APPARATUS AND METHOD OF SECURITY IDENTITY CHECKER - A method and apparatus that establish secure communications between two stations. The apparatus includes a low power communication processor and a host processor in a sleep mode. The low power communication processor receives a protocol message to initiate a communication. The protocol message includes an encrypted cryptographic identity token and triggers a wake-up event in order to wake up the host processor according to a result of identity a freshness checks performed by the low power communication processor. | 2010-06-24 |
20100161981 | STORAGE COMMUNITIES OF INTEREST USING CRYPTOGRAPHIC SPLITTING - Methods and systems of managing access to data in a secure data storage network are disclosed. One such method includes associating a storage resource with a community of interest, the community of interest associated with a workgroup key providing access to a virtual disk, the virtual disk allowing access to a volume comprising a plurality of shares stored on a plurality of physical storage devices. The method also includes, upon determining a user of a client device is a member of the community of interest, providing access to the storage resource to the user, whereby the storage resource is associated with the workgroup key. | 2010-06-24 |
20100161982 | HOME NETWORK SYSTEM - A home network system includes: a plurality of wireless devices cooperated with a home network, each device having a tag attached thereto to identify it; a tag reader for reading tag information from the tag of each wireless device; and a network manager for storing a shared key and identifying each wireless device connected to the home network using the tag information and supporting information exchange between the wireless devices by using the shared key. | 2010-06-24 |
20100161983 | DIGITAL CONTENTS REPRODUCING TERMINAL AND DIGITAL CONTENTS TRANSMISSION/RECEPTION METHOD THEREOF - A terminal for reproducing a digital content in support of transmitting/receiving the digital content to/from another terminal includes: an encryption unit configured to encrypt the digital content to produce encrypted digital content; a use scope determining unit configured to determine a use scope of a target terminal to which the digital content is to be transmitted; a personal-use authentication information generation unit configured to transform encryption information of the digital content according to a determination result of the use scope determining unit and generate personal-use authentication information; and a communication unit configured to transmit the encrypted digital content and the personal-use authentication information to the target terminal. | 2010-06-24 |
20100161984 | SECURE MESSAGE SYSTEM WITH REMOTE DECRYPTION SERVICE - Systems and methods for secure messaging are provided. A sender may encrypt content and send the encrypted content to a recipient over a communications network. The encrypted content may be decrypted for the recipient using a remote decryption service. Encrypted message content may be placed into a markup language form. Encrypted content may be incorporated into the form as a hidden form element. Form elements for collecting recipient credential information such as username and password information may also be incorporated into the form. At the recipient, the recipient may use the form to provide recipient credential information to the remote decryption service. The recipient may also use the form to upload the encrypted content from the form to the decryption service. The decryption service may provide the recipient with access to a decrypted version of the uploaded content over the communications network. | 2010-06-24 |
20100161985 | Methods and Systems for Protecting Media Content - Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel and, in some embodiments, a secure data channel, between a device such as a computing device running a protected content playback application, and a downstream component such as an associated driver, such as a graphics driver, of an associated display device such as a monitor, flat panel LCD, television and the like. | 2010-06-24 |
20100161986 | Method for Verifying the Authenticity of Messages Exchanged According to a Mobile Internet Protocol - Messages exchanged between a mobile node and a home agent according to a mobile Internet protocol are authenticated using cryptographic methods applied to the messages and which have been agreed on between the mobile node and the home agent. | 2010-06-24 |
20100161987 | DOWNLOADABLE CONDITIONAL ACCESS SYSTEM SERVICE PROVIDING APPARATUS AND METHOD - Provided is a Downloadable Conditional Access System (DCAS) service providing method where a mutual authentication with respect to a DCAS host and an Authentication Proxy (AP) server is performed, operating environment information and host identification information, which are extracted by the AP server, are transmitted by the AP server to a Personalization Server (PS), image information is selected by referring to the host identification information, the operating environment information, and policy information agreed to by a Conditional Access System (CAS) server and the PS, the image information being transmitted by the PS to a code download server, and the image information is transmitted to the DCAS host, when access information of the image information is transmitted to the DCAS host through the PS and the AP server. | 2010-06-24 |
20100161988 | METHOD OF AUTHENTICATING AN ENTITY BY A VERIFICATION ENTITY - A method of authenticating an entity by a verification entity, said entities sharing a pair of secret keys X and Y. According to the invention said secret keys X and Y are n×m (n, m>1) binary matrices, said method comprising steps repeated r times (r≧1) of:
| 2010-06-24 |
20100161989 | COMMUNICATION APPARATUS, DATA COMMUNICATION METHOD, AND NETWORK SYSTEM - A communication apparatus includes a storage part configured to store a first key generated according to authentication with a transmission source, identification information of the transmission source, and first information remaining unchanged regardless of the initialization of a coupling status and corresponding to the transmission source, with the first key, the identification information and the first information mapped to each other, an acquisition part configured to acquire a public key from the transmission source holding the identification information responsive to the first information stored on the storage part if the identification information of the transmission source has changed in response to the initialization of the coupling status, and a calculation part configured to generate an encryption key for use in encryption and decryption of data transmitted by the transmission source, based on the first key responsive to the first information, and the public key. | 2010-06-24 |
20100161990 | IVR CALL ROUTING USING ENCRYPTED DATA - A token representing encrypted data is used to initiate a call routing strategy based on receipt of the token. The call routing strategy is configured to initiate a query. Decrypted data associated with the encrypted data may be accessed to determine a data relationship based on the query. | 2010-06-24 |
20100161991 | APPARATUS AND METHOD FOR CONTROLLING USE OF BROADCASTING PROGRAM USING SIGNATURE IN PROGRAM INFORMATION - Disclosed is a broadcasting signal receiving apparatus for controlling use of a broadcasting program using a signature in program information and a method thereof. The broadcasting signal receiving apparatus includes a communicating unit for receiving a broadcasting signal, an extracting unit for extracting a broadcasting program and program information from the received broadcasting signal, and a determining unit configured to generate a temporal signature for confirmation (confirmation signature) which determines whether the program information is changed or not from the original program information and determine validity of the program information by comparing a signature included in the extracted program information with the confirmation signature. | 2010-06-24 |
20100161992 | Device and method for protecting data, computer program, computer program product - A device and method for protecting data in which preset data (m) are stored in a first memory in a control unit; the data (m) are signed with a signature (σ_i) by a subscriber (i) belonging to a group of subscribers ( | 2010-06-24 |
20100161993 | NOTARY DOCUMENT PROCESSING AND STORAGE SYSTEM AND METHODS - A notary document processing system and related methods are described. The system receives files uploaded by users, processes them by applying a document ID, time stamp, etc. to pages of the document, and converts them to a read only format for storage. Once the documents are processed and stored in the system, they cannot be changed by any user including the owner of the document. The system makes stored documents available to the owner or other users upon the owner's request or permission. The system also processes files generated from short messages inputted by users and annotated versions of existing documents. The system provides a way of preserving original versions of documents to be used later for purposes of evidencing the dates and contents of documents, evidencing agreement between parties as to the contents of documents, etc. Electronic notary, electronic signature, tamper watermarking, etc. functions are also provided. | 2010-06-24 |
20100161994 | METHOD AND APPARATUS FOR AUTHENTICATING STATIC DATA CARRIERS - Method of authenticating optical discs ( | 2010-06-24 |
20100161995 | SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR CRYPTOGRAPHIC KEY ROTATION IN A DATABASE SYSTEM - A system, method, and computer-readable medium that facilitate key rotation without disrupting database access are provided. Generation identifiers that specify a particular encryption key are stored in association with cipher text of encrypted columns in database tables. When data is to be read from an encrypted column, the cipher text is read along with the associated generation identifier. An encryption key corresponding to the generation identifier is then read to decrypt the cipher text. When data is to be written to the encrypted column, a most recent encryption key is retrieved from the key repository to encrypt the data. The cipher text is then written to the encrypted column in association with the generation identifier of the key used to encrypt the data. Advantageously, the key rotation may be performed without requiring that the table or database to be taken offline or otherwise unavailable during key rotation. | 2010-06-24 |
20100161996 | System and Method for Developing Computer Chips Containing Sensitive Information - A system and method for developing a software program containing sensitive information requires the use of a developer key (a unique public/private key pair) to download the software onto a uniquely identified developer chip. The software program can then be developed and debugged on the developer chip. After being developed and debugged, the software program is transferred to a uniquely identified release chip for subsequent use. Specifically, transfer of the software program requires use of a release key (also a public/private key pair) that is different from the developer key. The private key part of the developer key, as well as all developer chips (albeit a limited number) are protected by strict security procedures. | 2010-06-24 |
20100161997 | APPARATUS AND METHOD FOR AUTHENTICATING PERSONAL USE OF CONTENTS BY USING PORTABLE STORAGE - A system for authenticating personal use of contents by using a portable storage medium includes: a portable personal use authentication device configured to store domain authentication information; and a contents personal use authentication apparatus configured to extract playback information for playing a provided content based on the domain authentication information and provide the extracted playback information to a player | 2010-06-24 |
20100161998 | Associating a Signing key with a Software Component of a Computing Platform - A method and system is provided for operatively associating a signing key with a software component of a computing platform. The computing platform includes a trusted device and on start-up first loads a set of software components with each component being measured prior to loading and a corresponding integrity metric recorded in registers of the trusted device. The system stores a key-related item in secure persistent storage, the key-related item being either the signing key or authorisation data for its use. The trusted device is arranged to enable a component of the software-component set to obtain the key-related item, this enabling only occurring when the current register values correspond to values only present prior to loading of components additional to those of the software-component set. Certificate evidence is provided indicating that the signing key is operatively associated with a component of the software-component set. | 2010-06-24 |