26th week of 2011 patent applcation highlights part 70 |
Patent application number | Title | Published |
20110161461 | CONTENT DISTRIBUTION NETWORK - A partitioned network has several subdomains ( | 2011-06-30 |
20110161462 | OFFLINE ADVERTISING SERVICES - Methods and apparatus for provision of offline advertising services are described. In one embodiment, content data is stored in a local memory of a computing device prior to going offline. Once offline, the stored content is provided from the local memory, while the metrics regarding the provided content is collected and later transmitted to a remote server. Other embodiments are also described. | 2011-06-30 |
20110161463 | Electronic Citation Recording, Processing and Storing - A method is disclosed for tracking citations data using a server. Specifically, a citation record is received by a server from a mobile citation device, a citation history is transmitted from the server to a computer, a citation disposition record related to the citation record by is received the server, and the citation record and the citation disposition record is stored in a storage device. | 2011-06-30 |
20110161464 | COORDINATING MULTIPLE ASYNCHRONOUS POSTBACKS - Techniques are described herein for coordinating multiple asynchronous postbacks. Each postback specifies a requestor that initiates the postback. A requestor is a request to update a corresponding region of a Web page. Each time a server receives a postback from a client, the server provides a response to the client that includes an update regarding a region of the Web page that corresponds to a requestor that initiates the postback. The response further includes a requestor for each region of the Web page that is to be updated once the response is processed by the client. Upon receipt of each response from the server, the client provides a postback to the server. The client and server may continue to communicate in this manner until all regions of the Web page that are to be updated have been updated. | 2011-06-30 |
20110161465 | Method and System to Automatically Adapt Web Services from One Protocol/Idiom to Another Protocol/Idiom - Disclosed are embodiments of a method and system to convert an existing web services request from a first web services implementation type to a second web services implementation type. Example implementation types include SOAP-based and Representational State Transfer (RESTful). Conversion may be achieved through use of a generic web services adaptor. The generic web services adaptor can provide a plurality of interface types and convert requests to a request type supported by an existing web service provider endpoint. In some embodiments, requests not requiring a conversion may be forwarded directly to an existing web service provider endpoint. | 2011-06-30 |
20110161466 | REPRODUCING APPARATUS, REPRODUCING CONTROL METHOD, AND PROGRAM - There is provided a reproducing apparatus including a server, a communication unit for communicating with a control apparatus that transmits a request for setting content, a request for reproducing and a request for stopping, a reproducing processing unit for a processing upon the received request regarding reproducing, and a reproducing control nit for controlling a state of processing execution in the reproducing processing unit, wherein the reproducing control unit sets a primary standby time and maintains a state of reproducing if received the request for stopping in the state of reproducing, or if ended the reproduction of the content data, and further sets a secondary standby time after the primary standby time has elapsed if received the request for setting content before the primary standby time has elapsed, and makes content data being newly set reproduced if received the request for reproducing before the secondary standby time has elapsed. | 2011-06-30 |
20110161467 | METHOD AND SYSTEM FOR COMMUNICATING DATA BETWEEN ELECTRONIC BOOK DEVICES - The present invention provides a method and a system for communicating data between E-book devices. The system includes a first E-book device, a second E-book device and a server. The server includes a file receiving module, an identifier analyzing module and a data transmitting module. The method is described as follows. A first file is loaded into a first E-book device, and a first identifier is added into the first file. Then the first file is uploaded to a server. Then a second E-book device for receiving the first file is determined based on the first identifier. And the first file is transmitted from the server to the second E-book device. A second file derived from the first file can also be transmitted to the first E-book device according to the described method. | 2011-06-30 |
20110161468 | METHOD AND SYSTEM FOR CASCADING PEER-TO-PEER CONFIGURATION OF LARGE SYSTEMS OF IEDS - A method and system of efficiently distributing configuration information for IEDs across one or more networks in an electrical monitoring system is disclosed. Changing configuration information is managed by a configuration management system. The IEDs in the network or networks are organized in peer relationships, each peer relationship having at least one seed IED. The configuration information is loaded to the seed IED or seed IEDs which make the configuration parameter available to other IEDs in a peer relationship with the seed IED. The other IEDs may in turn become seed IEDs for other IEDs. The configuration information therefore cascades throughout the network without further communication between the configuration management system and the selected IEDs. | 2011-06-30 |
20110161469 | METHOD FOR BUILDING SPONTANEOUS VIRTUAL COMMUNITIES BASED ON COMMON INTERESTS USING INTEREST BANDS - The present invention refers to a method for establishing communication between equipments within groups and/or communities, which are formed according to the interest of each user. The equipments are programmable, allowing inserting predicates based on the interests of the user, creating interest bands. The communication equipment syntonizes the interests of an user with the interests of a group. The interest bands are formed with predicates which contain both anonymous and identified information; in this case, the user allows such information to be shared with all or with groups of same interest bands. The method is preferably distributed and communication is spontaneous and volatile. | 2011-06-30 |
20110161470 | Method, System and Computer Program Product for Server Selection, Application Placement and Consolidation Planning of Information Technology Systems - A plurality of application profiles are obtained, for a plurality of applications. Each of the profiles specifies a list of resources, and requirements for each of the resources, associated with a corresponding one of the applications. Specification of a plurality of constraints associated with the applications is facilitated, as is obtaining a plurality of cost models associated with at least two different kinds of servers on which the applications are to run. A recommended server configuration is generated for running the applications, by formulating and solving a bin packing problem. Each of the at least two different kinds of servers is treated as a bin of a different size, based on its capacity, and has an acquisition cost associated therewith. The size is substantially equal to a corresponding one of the resource requirement as given by a corresponding one of the application profiles. Each of the applications is treated as an item, with an associated size, to be packed into the bins. The bin packing problem develops the recommended server configuration based on reducing a total acquisition cost while satisfying the constraints and the sizes of the applications. | 2011-06-30 |
20110161471 | INCENTING DIVULGENCE OF INFORMATION FOR BINDING IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 2011-06-30 |
20110161472 | CLIENT-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 2011-06-30 |
20110161473 | ANALYTICS-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 2011-06-30 |
20110161474 | BROKERING INFORMATION ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 2011-06-30 |
20110161475 | HEALTH PRESENCE LOCAL MANAGEMENT INTERFACE - In one embodiment, a method includes monitoring a first current status of a communication link coupling a first health-presence unit at a first physical location to a second health-presence unit at a second physical location remote from the first physical location for a remote health-service session. The remote health-service session includes a health-service provider at the second physical location providing a health service to a patient at the first physical location. The method includes monitoring a second current status of the health device of the first health-presence unit and communicating data indicating the first current status and the second current status to the second health-presence unit for presentation to the health-service provider to facilitate assessment by the health-service provider of a usefulness of the health device to the health-service provider during the health-service session in light of the first or second current status. | 2011-06-30 |
20110161476 | SYSTEM AND METHOD FOR DISTRIBUTING USER INTERFACE DEVICE CONFIGURATIONS - A system that incorporates teachings of the present disclosure may include, for example, a server including a memory and a controller that is programmed to receive a first User Interface (UI) device configuration from a first computing device that is associated with a first gamer and to provide configuration data over a network to a second computing device for presentation of a Graphical User Interface that displays a plurality of UI device configurations including the first UI device configuration. Other embodiments are disclosed. | 2011-06-30 |
20110161477 | Method and System to Automatically Adapt Web Services from One Protocol/Idiom to Another Protocol/Idiom - A method and system to convert an existing web service from a first web services implantation type to a second web services implementation type. Example implementation types include SOAP and Representational State Transfer (REST). This conversion is achieved by recognizing and classifying available information from each of the distinct implementation types. After proper recognition and classification as disclosed herein, a deterministic process may be utilized to assist in converting or translating the exposed interface; thereby assisting in developing an interface, based on a different interface type than the one already exposed, may be provided. | 2011-06-30 |
20110161478 | SOCIAL WEB OF OBJECTS - According to exemplary embodiments, networked object management software, devices, systems and methods are described which use social mapping principles to streamline interactions between users and their networked objects, as well as between the networked objects themselves. Friendship relationships are established, by a network management system, between a plurality of the networked objects, each of the plurality of networked objects being associated with a use. When the network management system receives a task request, it can then assign the requested task to one of the plurality of networked objects which has a capability to perform the requested task and which also has an established friendship relationship with the user. | 2011-06-30 |
20110161479 | Systems and Methods for Presenting Content - Systems and methods for providing content. In one embodiment, a method for providing user access to online content can be provided. The method can include aggregating content from one or more third party webpages; storing at least a portion of the content in at least one data storage device; and when the user requests, via a browser program, a selection of content from the one or more third party webpages, providing the user with access to the stored portion of content. | 2011-06-30 |
20110161480 | APPARATUS AND METHOD FOR PROVIDING INFORMATION FOR A WIRELESS NETWORK CONNECTION USING WI-FI - An apparatus, method, and system for providing information for a wireless network connection using Wi-Fi. Device information for at least one UPnP device is provided from a plurality of wireless devices including the at least one UPnP device, a device information announcement message including the device information for the at least one UPnP device is generated, and the generated device information announcement message is broadcasted. In this way, information on a UPnP device to which to connect a wireless device is provided in advance, and a user can easily perform a network connection. | 2011-06-30 |
20110161481 | Cluster Computing - A method for arranging a plurality of nodes in a cluster is disclosed. The invention proposes a scheme for creation of a cluster having optimum number of connections and with a diameter of two, meaning any two nodes are at most two edges away from each other. The present invention uses Singer Difference Set for deriving networks with a smaller number of connections per node for clusters of the same size. Further, the method envisaged by the present invention allows multiple computers to be placed at each node with the computers sharing the network in a non-conflicting manner, resulting in a powerful cluster at reduced cost. | 2011-06-30 |
20110161482 | REMOTE GRAPHICS CONSOLE AND VIRTUAL MEDIA ACCESS TO VIRTUAL MACHINE GUESTS - A data processing system supports remote graphics console and virtual media access to virtual machines. The data processing system is configured for usage with a virtualization platform that runs multiple operating systems simultaneously on at least one physical server. The data processing system comprises a virtual keyboard/video/mouse (KVM) element integrated into the virtualization platform and is configured to generate a remote management graphics console and map virtual media into the operating system plurality. | 2011-06-30 |
20110161483 | VIRTUAL SERVER SYSTEM AND PHYSICAL SERVER SELECTION METHOD - Physical servers in which a plurality of servers can operate are classified into groups in accordance with a predetermined index, such as loads and amounts of free resources of the physical servers. A predetermined number of representative servers are selected in each group, a physical server as a destination of a target virtual server is determined from among the representative servers of each group, and the target virtual server is moved to the determined physical server as the destination. | 2011-06-30 |
20110161484 | DYNAMIC MOBILE APPLICATION QUALITY-OF-SERVICE MONITORING AND REPORTING - In accordance with embodiments of the present disclosure, a process for determining a quality-of-service for a mobile application running on a mobile device coupled with a mobile network is presented. The process may be implemented to monitor, on an application layer level, a network usage pattern of the mobile application communicating via the mobile network. The process may emulate the network usage pattern of the mobile application by transmitting or receiving test data via the mobile network. And the process may determine the quality-of-service for the mobile application by analyzing the test data being transmitted or received. | 2011-06-30 |
20110161485 | MANAGING MULTIPLE DYNAMIC MEDIA STREAMS - A coordinated adaptive streaming system provides a level of intelligence between adaptive streaming heuristics applied to multiple multi-bitrate streams playing on a client computer at the same time. The system receives a media event that includes multiple multi-bitrate streams and plays two or more of the streams. Each stream registers with the coordinated adaptive streaming system so that the system is aware of each of the streams. The system receives a priority indication from each stream that indicates the priority of the stream relative to other streams associated with the media event. The system uses the received priority indications to make adaptive streaming decisions. Thus, the coordinated adaptive streaming system provides playback that more closely aligns with a user's priorities and provides a higher quality experience to a user viewing multiple concurrent media streams. | 2011-06-30 |
20110161486 | DETECTING AND MONITORING SERVER SIDE STATES DURING WEB APPLICATION SCANNING - A computer-implemented method, system, and computer program product for detecting and monitoring server side state during the scanning of a web application. The method includes: monitoring executed code of the web application while scanning the web application; retrieving code coverage information from the monitoring of the executed code and retrieving scanning information from the scanning of the web application; correlating the code coverage information with the scanning information; and determining a change in the server side state based on the correlation. The system includes one or more devices that executes the steps of the method. The computer program products includes computer program instructions stored on a computer readable storage medium, where the instructions, when executed, will cause a computer to perform the steps of the methods. | 2011-06-30 |
20110161487 | METHOD AND SYSTEM FOR COMMUNICATION SESSIONS - A method and computer program product includes calculating a score for one or more communication sessions on a communication device, associating the score with the one or more communication sessions, and measuring a performance metric on the communication device. The performance metric may be indicative of a load on the communication device, and may be caused, at least in part, by the one or more communication sessions. If the performance metric on the communication device falls outside an acceptable value, a number of participants in at least one of the one or more communication sessions may be reduced based on the score associated with the at least one of the one or more communication sessions. | 2011-06-30 |
20110161488 | REDUCING WORKLOAD ON A BACKEND SYSTEM USING CLIENT SIDE REQUEST THROTTLING - Embodiments of the present invention address deficiencies of the art in respect to workload management of backend systems and provide a novel and non-obvious method, system and computer program product for limiting a request rate from a client based on a health state of a server system. In one embodiment of the invention, a computer-implemented method for limiting a request rate from a client based on a health state of a server system that includes monitoring a server system, determining a measure of health of the server system, sending the determined measure of health to a client submitting a request to the server system and receiving a subsequent request from the client that is delayed by a time period, wherein the time period is based at least in part upon the determined measure of health. The computer-implemented method can further include receiving server system CPU utilization, determining an approximate predicted real server response time of a transaction and sending the determined approximate predicted real server response time of a transaction to a client submitting a request to the server system. | 2011-06-30 |
20110161489 | AUTOMATIC AGGREGATION OF INTER-DEVICE PORTS/LINKS IN A VIRTUAL DEVICE - A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation. | 2011-06-30 |
20110161490 | TERMINAL CAPABLE OF SUBSTITUTING FOR CONTROL STATION - A terminal of the present invention comprises a control frame detection portion of detecting a control frame issued from a control station, a control frame memory portion of storing control information contained in the control frame, a substitute frame issuance determination portion of determining to issue a substitute frame when the control frame is not detected until a predetermined first time period is elapsed, and a substitute frame issuance portion of creating a frame which is the same as or equivalent to the control frame, as the substitute frame, based on the control information stored in the control frame memory portion when the substitute frame issuance determination portion determines to issue the substitute frame, and issuing the created substitute frame. | 2011-06-30 |
20110161491 | MIGRATION CONTROL APPARATUS AND MIGRATION CONTROL METHOD - A migration control apparatus for controlling migration of a virtual machine includes a monitoring section, a planning section, a time estimation section, a comparing section, and a plan execution section. The monitoring section monitors a status of a current migration of the virtual machine running on a first physical machine. The planning section makes, on the basis of the status of the current migration, a new migration plan for migrating the virtual machine. The time estimation section estimates a first migration time required to perform a new migration. The comparing section compares the first migration time with a second migration time to determine which migration will be completed earlier. The second migration time is an estimated time required to complete the current migration. The plan execution section performs the new migration when it has been determined that the new migration will be completed earlier. | 2011-06-30 |
20110161492 | PRESERVATION OF SCORES OF THE QUALITY OF TRAFFIC TO NETWORK SITES ACROSS CLIENTS AND OVER TIME - A method and system for preserving scores of the quality of traffic to network sites, so that the scores are consistent over time and/or are comparable across clients. | 2011-06-30 |
20110161493 | SYSTEMS AND METHODS FOR SELECTING BUFFERING TIME FOR MEDIA DATA - The invention is related to methods and apparatus for tailoring an amount of Pre-Data that can be used in media clip streaming applications. A variable-bit-rate encoded media clip can be encoded at an average playback bit rate. When the actual transmission bit rate exceeds the average playback bit rate, a maximum bit deficit computation that uses the average playback bit rate overestimates the amount of Pre-Data that can be used to buffer the media clip. Embodiments of the invention tailor the amount of Pre-Data at least in part to the amount of data used to encode intervals of data and to actual transmission bit rates or to predictions of actual transmission bit rates, thereby decreasing the amount of Pre-Data that can be used and decreasing a latency time before play of the media clip begins. | 2011-06-30 |
20110161494 | FEATURE DELIVERY PACKETS FOR PEER-TO-PEER BASED FEATURE NETWORK - A device communicates with feature peers, associated with a network, to obtain information associated with the feature peers, and receives a customer packet. The device also determines, based on the feature peer information, which of the feature peers support a feature associated with the customer packet, and selects, from the determined feature peers, a set of feature peers for the customer packet to traverse. The device further associates, with the customer packet, an additional packet used for delivering the feature associated with the customer packet, and forwards the customer packet and the additional packet to one of the feature peers in the selected set of feature peers. | 2011-06-30 |
20110161495 | ACCELERATING OPENCL APPLICATIONS BY UTILIZING A VIRTUAL OPENCL DEVICE AS INTERFACE TO COMPUTE CLOUDS - Methods and apparatus for accelerating OpenCL (Open Computing Language) applications by utilizing a virtual OpenCL device as interface to compute clouds are described. In one embodiment, one or more computing operations may be offloaded from a local processor to a virtual device that represents available resources of a cloud. Other embodiments are also described. | 2011-06-30 |
20110161496 | IMPLEMENTATION AND MANAGEMENT OF INTERNET ACCESSIBLE SERVICES USING DYNAMICALLY PROVISIONED RESOURCES - Systems and methods for providing a decentralized computing resource marketplace captures various attributes of a consumer's needs for remote computing services, such as cost, location, performance, network connectivity, reliability, hardware composition and service levels and identifies, provisions and manages remote resources offered by third parties on behalf of the consumers. Lease agreements may be brokered and enforced among consumers of remote computing services (e.g., storage) and the providers of such resources. | 2011-06-30 |
20110161497 | Method, System and Program Product for Outsourcing Resources in a Grid Computing Environment - A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment. In addition, the dynamic feedback on the new resource request that exceeds a service level agreement can be used to develop a new service level agreement or temporary service offer that addresses the unique resource condition. | 2011-06-30 |
20110161498 | SELF-SERVICE TERMINAL - A self-service terminal comprises: a plurality of session initiation devices, each associated with an initiation token, so that a customer can initiate a transaction using one of a plurality of different initiation tokens. The terminal further comprises a plurality of session suppliers, each session supplier being associated with one of the session initiation devices, and each session supplier being operable: (i) to receive from its associated session initiation device, information from an initiation token provided by a customer, and (ii) to create an electronic access token based on the received information. The terminal also comprises a session supplier aggregate operable to receive an electronic access token from one of the session suppliers for each session to be created; and a session component operable (i) to receive the electronic access token from the session supplier aggregate and (ii) to create a session based on the received electronic access token. | 2011-06-30 |
20110161499 | NETWORK ADDRESS TRANSLATION METHOD, NETWORK ADDRESS TRANSLATOR, AND COMMUNICATION SYSTEM FOR MEDIA STREAMING - A network address translation method includes: configuring a network address translator (NAT) to receive a first control signal from a first user end indicating an intent to conduct media streaming, a media description in the first control signal including a private first address and a private first port; configuring the NAT to modify the first address and the first port to a public second address and a public second port, and to send a second control signal containing a media description that includes the second address and the second port to a control signal server; and configuring the NAT to receive a third control signal sent in response from a second user end via the control signal server, parse a media description in the third control signal to obtain a public third address and a public third port, and establish an address translation rule using the addresses and ports. | 2011-06-30 |
20110161500 | SYSTEMS AND METHODS FOR MANAGING PORTS FOR RTSP ACROSS CORES IN A MULTI-CORE SYSTEM - The present application is directed towards systems and methods for systems and methods for handling real-time streaming protocol sessions by an intermediary multi-core system. When a multi-core intermediary receives a setup request for a real-time streaming protocol session, the intermediary processes and forwards the request to a server providing the streaming media. The server sets up an RTSP session and transmits a session identification to the multi-core intermediary. A core of the intermediary receives the transmitted session identification and determines an owner core of the session, based on a hash of the session identification. The core transmits the session information to the determined owner core, which selects two consecutive ports on which to establish listening services. The owner core then notifies all other cores to establish listening services on the same consecutive ports, such that any core that receives an RTSP control message from a client can handle it properly. | 2011-06-30 |
20110161501 | METHOD AND APPARATUS FOR COMMUNICATING DATA BETWEEN TWO HOSTS - A method for communicating video data between at least a first host and a second host comprises: identifying, at a server, an address of the first host, to which the second host may communicate video data, and a sequence number expected by a network security system coupled between the first host and the server; and communicating, from the second host to the first host, video data using the address of the first host and the sequence number expected. The method may further comprise: identifying, at the server, an address of the second host, to which the first host may communicate video data, and a second sequence number expected by a network security system coupled between the second host and the server; and communicating, from the first host to the second host, video data using the address of the second host and the second expected sequence number. The second host may be adapted to perform the act of communicating without use of an intermediate server. The method may also further comprise communicating periodically, from the first host to the server, through the network security system, so as to maintain an open communication channel through the network security system to the first host at the address of the first host. The address of the first host may include address information and port information. | 2011-06-30 |
20110161502 | METHOD AND SYSTEM FOR ACTIVATING NETWORK STORAGE, MESSAGE PROCESSING SERVER, AND CLIENT - A method for activating network storage includes: a message processing server receives a network storage request from a client; the message processing server establishes a session with a history function (HF) according to the network storage request, and sends the content from the session in which the client participates to the HF through the session with the HF. A system for activating network storage, a message processing server, and a client are also provided. With the present invention, the network storage is implemented more conveniently, and the user experience is improved. | 2011-06-30 |
20110161503 | METHOD AND SYSTEM FOR MULTIPLE PHYSICAL USE OF A SINGLE IDENTIFIER CODE SHARED BY A GROUP OF TERMINALS IN MOBILE TELECOMMUNICATIONS NETWORKS - A method for conducting communication between a plurality of terminals and at least one control center via a network, the terminals being combined into a group, with all the terminals in that group having the same identifier code within the network, and attachment to the network and establishment of a connection between an individual terminal and the control center taking place within a predetermined time window with subsequent terminating of the connection and detachment from the network, and attachment to the network and establishment of a connection between the next terminal in that group and the control center taking place within the following time window, so that after a predeterminable time period has elapsed all the terminals assigned to the group were or could have been connected to the control center at least once. | 2011-06-30 |
20110161504 | METHOD AND APPARATUS FOR IDENTIFYING SESSION INFORMATION - A method and an apparatus for identifying session information are disclosed by the present invention, wherein the method includes: a sending end PCRF sends an S9 session message to a receiving end PCRF in order to transmit the Diameter session information, wherein the S9 session message carries the identification information identifying the Diameter session uniquely; the receiving end PCRF determines the Diameter session corresponding to the Diameter session information carried by the S9 session message according to the identification information. By the present invention, when the receiving end PCRF issues the policy control information, it issues the policy control information to a corresponding Gxx session or AF session according to the unique identification information carried by the S9 session, thereby it can consummate the application flow of the realization of the S9 roaming interface in the policy charging control frame. | 2011-06-30 |
20110161505 | METHOD AND APPARATUS FOR PROCESSING A CALL TO AN AGGREGATE ENDPOINT DEVICE - A method and an apparatus for processing a call to an aggregate endpoint device over a network are disclosed. For example, the method receives a session request by a Serving-Call Session Control Function (S-CSCF), wherein a route header for the session request comprises an aggregate endpoint identifier, and interacts with an application server to receive a Public User Identity (PUID) of the aggregate endpoint device in accordance with the aggregate endpoint identifier. The method performs a termination processing for the session request using the PUID of the aggregate endpoint device, and forwards the session request towards the aggregate endpoint device. | 2011-06-30 |
20110161506 | METHODS, APPARATUSES & COMPUTER PROGRAM PRODUCTS FOR FACILITATING REMOTE SESSION POOLING - An apparatus is provided for generating a pool of remote session references that may be utilized to establish authenticated sessions. The apparatus includes a processor configured to generate remote session references that may be maintained in a pool. The remote session references may include information used to establish authenticated sessions with a secure device. The processor is also configured to determine whether a remote session reference(s) of the pool may be borrowed in response to receipt of a request for a resource(s) on the secure device. Additionally, the processor may perform a test on a borrowed remote session reference when a determination reveals that one of the remote session references may be borrowed. The processor may also provide the secure device with the borrowed remote session reference and a request for the resource(s) in response to determining that the test passed. Corresponding computer program products and methods are also provided. | 2011-06-30 |
20110161507 | METHOD AND SYSTEM FOR TIME-LIMITATION SETTINGS IN COMMUNICATION SESSIONS - A method and computer program product includes initiating an instant messaging session on one or more communication devices. A first time-limitation setting for the instant messaging session based upon a user identification may be received. The first time-limitation setting may represent a maximum duration for the instant messaging session. A second time-limitation setting for the instant messaging session based upon the user identification may also be received. The second time-limitation setting may represent a minimum time between one or more instant messaging sessions. The instant messaging session may be terminated if the duration of the instant messaging session exceeds the first time-limitation setting. A subsequent instant messaging session may be prevented if the time between the instant messaging session and the subsequent communication does not exceed the second time-limitation setting. | 2011-06-30 |
20110161508 | METHOD FOR CONTROLLING SESSION AND SERVER USING THE SAME - Disclosed is a method for masking media flows against a discovery procedure for inter-UE transfer. According to the method, when a Service Centralization and Continuity Application Server (SCC AS) establishes a session, an User Equipment (UE) is able to indicate to the network that some or all of the media flow composing a session are not discoverable from other UEs. Therefore, when the SCC AS receives the request for discovery for discovery of the ongoing session on any UE, the SCC AS identifies which media flows in the ongoing session of the UE are indicated as indiscoverable, and does not send information about theses media flows to the other UEs | 2011-06-30 |
20110161509 | METHOD AND SYSTEM FOR FAST CHANNEL SWITCHING USING STANDARD RTSP MESSAGES - Method and system for performing fast channel switching in client-server systems, in which live media streams sent by a streaming server under the RTSP protocol are played by the client, are described. The existing functionality of the media player, for example seek functionality, is overloaded to provide switching between live media streams by using standard RTSP message in-band within a single RTSP session. | 2011-06-30 |
20110161510 | Method and system for layer-3 subscriber login in a cable data network - A subscriber login server is used for managing a subscriber login session. The login server is associated with a DHCP server for configuring a premise equipment device and operator-managed device. A subscriber login client at the premise equipment device securely communicates login username and password identifiers to the subscriber login server without using PPP technology. The login server retrieves matching identifiers from a RADIUS server and authorizes service with messages to the DHCP server and the CMTS. | 2011-06-30 |
20110161511 | METHOD AND SYSTEM FOR PROVIDING SECURE HANDLING OF INFORMATION FOR COMPLETE INTERNET ANYWHERE - An Internet capable set-top-box (STB) may be operable to extend a security boundary from the Internet capable STB to an application server to allow support of web browsing operations from the application server. A secure link between the Internet capable STB and the application server may be established. The Internet capable STB may communicate a request for web page information from a secure web server along with cryptographic credentials to the application server, via the secure link. The application server may be allowed to receive the web page information directly from the secure web server and process at least the unsupported portion of the received web page information. The Internet capable STB may then receive the web page information with at least the unsupported portion processed from the application server, via the secure link, for further processing and rendering. | 2011-06-30 |
20110161512 | SYSTEM AND METHOD OF MAXIMIZING UTILITY IN MEDIA DELIVERY NETWORK - A method is provided for maximizing utility of a media delivery network having a media source, a first media adaptor, a second media adaptor and a media renderer. The media source can provide data in a first format and a second format. The first media adaptor can receive the data in the first format from the media source. The second media adaptor can receive the data in the second format from the media source. The first media adaptor can further provide data in a third format based on the received data in the first format. The second media adaptor can further provide data in a fourth format based on the received data in the second format. The media renderer can render the data in the third format and can render the data in the fourth format. The method includes: defining constraints of the media delivery network; predetermining factors to measure a utility of the media delivery network; defining a utility function based on the predetermined factors; and maximizing the utility function in light of the defined constraints. | 2011-06-30 |
20110161513 | Media Stream Monitor - A stream monitor can request a streaming media server to send stream records associated with streams currently being served. The stream monitor uses the stream records to test streams being served by the streaming media server. The stream monitor can concurrently test multiple streams for connection errors, silence errors, metadata errors, and other errors. | 2011-06-30 |
20110161514 | METHOD AND APPARATUS FOR DELEGATING COMPUTATIONALLY INTENSIVE FUNCTIONS - A method and apparatus are provided for receiving compressed sensed data at a device and providing for decompression of the compressed sensed data at a delegated resource. A method of using resources may be provided with superior processing capacity and/or power capacity for computationally intensive decompression of compressed sensed data. A method may include determining a target recipient device for decompressed data, determining the appropriate decompressed data format for the decompressed data, and determining a delegated resource to select for decompression of the compressed sensed data. The method may further include providing for transmission of the compressed sensed data to the delegated resource. | 2011-06-30 |
20110161515 | MULTIMEDIA STREAM RECORDING METHOD AND PROGRAM PRODUCT AND DEVICE FOR IMPLEMENTING THE SAME - A multimedia stream recording method, and a program product and a device for implementing the same are presented. The method includes encoding multimedia data into multimedia streams and storing the multimedia streams in a queue; detecting an event; recording the multimedia streams in a storage device at a low frame rate in a normal recording mode; when the event occurs, converting the multimedia streams stored in the queue before a time point when the event occurs into the specific file format and storing the multimedia streams in the storage device according to a preset condition; and converting the multimedia streams in a preset time range after the time point when the event occurs into the specific file format and then storing the multimedia streams in the storage device, and subsequently recovering a normal storage mode. | 2011-06-30 |
20110161516 | COMMUNICATION APPARATUS, IMAGE SENSING APPARATUS, AND CONTROL METHOD THEREFOR - A communication apparatus such as a digital video camcoder acquires an IP address from a DHCP server on a UPnP network. During the communication apparatus is transmitting an image stream, which is a sensed image, to the DTV, the communication apparatus issues an IP address update request to the DHCP server. In this case, when the DHCP server leaves the UPnP network, the communication apparatus keeps transmitting the stream while holding an already set IP address. Upon completely transmitting the series of the stream, the communication apparatus generates its own IP address using an AutoIP function. | 2011-06-30 |
20110161517 | Method of Switching from a First Encoded Video Stream to a Second Encoded Video Stream - The invention relates to a method ( | 2011-06-30 |
20110161518 | ASYNCHRONOUS INVOCATION MECHANISM IN SESSION INITIATION PROTOCOL (SIP) SERVER CLUSTERS - Providing SIP application server interoperability, including detecting at a first SIP application server an event necessitating that work be performed in relation to a SIP application session that is managed by a second SIP application server, creating a SIP message object carrying a set of instructions representing the work, and sending the SIP message object for delivery to the second SIP application server and performance of the instructions at the second SIP application server in relation to the SIP application session. | 2011-06-30 |
20110161519 | METHOD AND APPARATUS FOR PROVIDING A TRANSIT SERVICE FOR AN AGGREGATE ENDPOINT - A method and an apparatus for providing a transit service in a communications network are disclosed. For example, the method receives a session request by a routing device, where the session request is directed towards a user endpoint device that accesses one or more services via the aggregate endpoint device, and interrogates a Home Subscriber Server (HSS) for domain information of the aggregate endpoint device. The method determines if the domain information of the aggregate endpoint device is associated with a transit function, and routes the session request to the transit function for completion, if the domain information of the aggregate endpoint device is associated with the transit function. | 2011-06-30 |
20110161520 | STORAGE SYSTEM FOR OPTIMALLY CONTROLLING A PLURALITY OF DATA TRANSFER PATHS AND METHOD THEREFOR - Provided is a storage system, which includes: a storage medium for storing data; a plurality of ports for connection to a network; and a control section, and in which: the network is connected to another storage system; the plurality of ports include a first port; the plurality of ports involve a plurality of data transfer paths extending from the plurality of ports to the another storage system, which include a first data transfer path extending from the first port to the another storage system; and the control section: transmits data to be stored into the another storage system from the plurality of ports; acquires performances of the plurality of data transfer paths; and transmits, if the performance of the first data transfer path is lower than a predetermined threshold value, the data to be stored into the another storage system from the plurality of ports excluding the first port. | 2011-06-30 |
20110161521 | MANAGEMENT OF INTER-PROVIDER PEER-TO-PEER BASED FEATURE NETWORK - A device communicates with feature peers, associated with a network, to obtain information associated with the feature peers, and receives a customer packet. The device also determines, based on the feature peer information, which of the feature peers support a feature associated with the customer packet, and determines service providers associated with the determined feature peers. The device further selects, from the determined feature peers, a set of feature peers for the customer packet to traverse when the service providers associated with the determined feature peers are also associated with the device. The device then provides a tunnel header and a feature header in the customer packet to create a modified customer packet, and forwards, based on the tunnel and feature headers, the modified customer packet to one of the feature peers in the selected set of feature peers. | 2011-06-30 |
20110161522 | System and Method for Enhanced Energy Control Policy for Unmanaged Switch Applications - A system and method for enhanced energy control policy for unmanaged device applications. EEE control customizations are provided to a profile element (e.g., PROM, EEPROM, flash memory, system memory, input pins, etc.) that is included in the unmanaged device. The configuration information stored in profile element is accessed by an EEE control policy for customization of the EEE control policy. In one embodiment, the EEE control customization can be generated by another device (e.g., managed device) separate from the unmanaged device. | 2011-06-30 |
20110161523 | Method and System for Compression and Decompression for Handling Web Content - Certain aspects of a method and system for compression and decompression for handling web content may include a communication system that comprises a server in a server computing cloud that coordinates operation of one or more set-top boxes. The server may be operable to receive a request to display one or more frames of web content from the one or more set-top boxes. The server may be operable to receive one or more parameters associated with the one or more frames of the requested web content from the one or more set-top boxes. The server may be operable to dynamically encode at least a portion of one or more frames of the requested web content into one or more color spaces based on the received one or more parameters. | 2011-06-30 |
20110161524 | METHOD FOR SYNCHRONIZING CLOCKS IN A COMMUNICATION NETWORK - The invention refers to a method for synchronizing clocks in a communication network, wherein a first clock of a first network element (MA) which is a master element is used for synchronizing second clocks of one or more second network dements which are slave elements. According to the method of the invention, a first sequence of first messages transmitted from the first network element to the second network element and/or a second sequence of second messages transmitted from the second network element to the first network element is recorded. First messages and/or second messages out of those sequences are identified by using an appropriate threshold function with respect to the transmission delays of those messages. Those identified messages have the same constant minimum delay, and based on those messages clock synchronization between the first clock and the second clock is performed. The invention has the advantage that clock synchronization is possible even if an intermediate switch causing an unknown delay is located in the transmission path between the first and the second network element. This is because most of the messages are transmitted within a minimum constant delay via such an intermediate switch and, by identifying those messages, a line delay between the first network element and second network element can be estimated and used for synchronizing the second clock with the first clock. The synchronization method of the invention is preferably used for synchronizing clocks in a DECT network. Furthermore, in a preferred embodiment, the first and second messages are messages according to the standard IEEE 1588. | 2011-06-30 |
20110161525 | RELAY SERVER AND RELAY COMMUNICATION SYSTEM - In a relay communication system in which remote LANs communicate with one another beyond a WAN, respective apparatuses confirm a virtual network environment of the relay communication system in real time. Relay servers relay mutual communication between client terminals. The relay server creates information shown below, and allows the whole of the relay communication system to share the information: a relay group information indicating virtual private IP addresses of the relay servers and a connection establishment state therebetween; and a relay server information indicating a virtual private IP address and connection establishment state of a client terminal capable of communicating with the relay server. The respective apparatuses in the relay communication system can share the information regarding the virtual private IP addresses and connection establishment states of all the apparatuses, and can flexibly execute communication in which the virtual private IP addresses are designated as destinations for communication. | 2011-06-30 |
20110161526 | Method and Apparatus for Discovering, Negotiating, and Provisioning End-to-End SLAS Between Multiple Service Provider Domains - Domains (multiple collaborating service providers) create service offerings between pairs of edge nodes that interconnect with other domains in the network. The service offerings may specify the available bandwidth, quality of service, reliability, available security, price, subscriber and service contextual specific and other SLA information. When a new service is to be created, the service definition is used along with information about the available service offerings to determine a set of networks to implement the service. Information associated with the service offerings may be flooded to all other networks. Alternatively, the service offering information may be provided to a trusted third party (SLA broker) which may provide SLA services on the network to select sets of domains to implement inter-domain services, and may also proxy to set up the service for the SLA requesting party. A hybrid approach may also be used wherein some SLA information is flooded and other information is retained in secret and provided only to the SLA broker. | 2011-06-30 |
20110161527 | Distributed Computing Bus - A distributed computing bus that provides both data transport and ambient computing power is provided. Contemplated buses comprise a network fabric of interconnected networking infrastructure nodes capable of being programmed before or after installation in the field. A fabric manager organizes the fabric into a bus topology communicatively coupling computing elements that exchange payload data using a bus protocol. Nodes within the bus topology operate on the payload data as the data passes through the node on route to its destination. | 2011-06-30 |
20110161528 | Program use system, program use method and program - Of an existing macro for controlling one or more first devices, device designation information for designating each electronic device in the first devices in the macro is converted to category designation information for designating a category of the electronic device based on device information of the electronic device, and the converted existing macro is recorded. A macro usable for controlling one or more second devices is selected from recorded existing macros based on device information of a controller and the first and second devices. Category designation information in the selected macro is converted to device designation information for designating the electronic device in the second electronic devices, belonging to the category designated by the category designation information, based on the device information of the controller and the first and second devices. | 2011-06-30 |
20110161529 | COMMUNICATION APPARATUS AND INTERFACING METHOD FOR INPUT/OUTPUT CONTROLLER INTERFACE - A communication apparatus is disclosed. The communication apparatus comprises a transmission module and an I/O controller interface. The transmission module is configured to transmit data. The I/O controller interface acts as a host controller interface between the transmission module and a host module of an alternate MAC/PHY (AMP) manager. The I/O controller interface directs the transmission module to transmit and receive data of the AMP manager according to I/O request packets forwarded by the host module. | 2011-06-30 |
20110161530 | USB 3.0 SUPPORT IN MOBILE PLATFORM WITH USB 2.0 INTERFACE - Memory associated with a mobile communication device, such as memory removably inserted into a memory card slot, may be accessed, in the alternative, by a mobile communication platform or by a remote USB host. A memory access module connected to the memory card slots is operative in one of two modes: a pass-through mode and a USB mode. In the pass-through mode, the memory card slots are directly connected, via switching circuits, to memory interfaces on the mobile communication platform. A USB interface on the mobile communication platform may additionally be connected, in pass-through mode, via a USB hub to a remote USB host. In the USB mode, the memory card slots are connected, via switching circuits, second memory interfaces, and a controller, to a USB hub supporting USB 3.0 transfer protocols, and accessible by a remote host. | 2011-06-30 |
20110161531 | USB DEVICE APPARATUS - A USB device apparatus, which is capable of performing communication with a USB host apparatus through a USB connection supporting a high-speed USB mode, includes a communication section configured to be capable of performing communication with the USB host apparatus, and a connection section configured to, while the USB device apparatus is being connected to the USB host apparatus by the communication section through a USB connection in the high-speed USB mode, when a predetermined condition for movement to a sleep status is satisfied, perform switching of a connection mode of the USB connection to the USB apparatus from the high-speed USB mode to a full-speed USB mode. | 2011-06-30 |
20110161532 | TRANSCEIVER FOR WIRED SERIAL COMMUNICATION - This document discusses, among other things, transceiver apparatus and methods for wired serial communication to a remote device. The transceiver can be configured to generate an output signal using received compensation information to maintain a specified signal quality at the remote device. The transceiver can include an input for receiving first information, a compensation input for receiving the compensation information and an output to transmit the output signal including the first information to a component coupled between the transceiver and the remote device. | 2011-06-30 |
20110161533 | Broadcast by KVM System and Method Thereof - A system and method for override broadcast in a KVM (Keyboard, video monitor, mouse) system is provided. The KVM system includes a plurality of computers, a plurality of console devices and a KVM switch that connects those computers and console devices with or without network. With a firmware build in the KVM device, the administer of the KVM system can select one of the computers as the broadcaster computer and several of the console devices as the broadcastee console devices through the broadcaster console device. After receiving the broadcast command, the KVM disconnects the signal connections between the broadcastee console devices and the computers that the broadcastee console devices originally connected. The KVM then broadcasts the output signals of the broadcaster computer to the broadcastee console devices. | 2011-06-30 |
20110161534 | Control Architectures for RF Transceivers - Described herein are devices and methods for implementing a transceiver with independently controlled components. The components may include a programmable digital portion, a dedicated digital portion, and an analog portion. Each independently controlled component includes a programmable controller that resides in the programmable digital portion of the component that controls components in the dedicated digital or analog portions using state transition information. The programmable controller is configured to accommodate a broad spectrum of state transition information and is capable of emulating a plurality of hardwired finite state machines | 2011-06-30 |
20110161535 | ADAPTABLE DATAPATH FOR A DIGITAL PROCESSING SYSTEM - The present invention includes an adaptable high-performance node (RXN) with several features that enable it to provide high performance along with adaptability. A preferred embodiment of the RXN includes a run-time configurable data path and control path. The RXN supports multi-precision arithmetic including 8, 16, 24, and 32 bit codes. Data flow can be reconfigured to minimize register accesses for different operations. For example, multiply-accumulate operations can be performed with minimal, or no, register stores by reconfiguration of the data path. Predetermined kernels can be configured during a setup phase so that the RXN can efficiently execute, e.g., Discrete Cosine Transform (DCT), Fast-Fourier Transform (FFT) and other operations. Other features are provided. | 2011-06-30 |
20110161536 | METHOD FOR HIGH SPEED DATA TRANSFER - A method for transferring data between a data source and a data sink which are controlled by a common clock provides a handshake-based streaming data protocol for intra-circuitry data transfer between and through functional units of a system built in an integrated circuit. | 2011-06-30 |
20110161537 | METHOD FOR GENERATING ELECTROMAGNETIC WAVES USING SOFTWARE - Provided is a method of generating electromagnetic waves using software. The method includes setting electromagnetic wave pattern data in consideration of a number of a bus ( | 2011-06-30 |
20110161538 | Method and System for Implementing Redundant Network Interface Modules in a Distributed I/O System - A method and system is disclosed for implementing redundant master NIMs ( | 2011-06-30 |
20110161539 | OPPORTUNISTIC USE OF LOCK MECHANISM TO REDUCE WAITING TIME OF THREADS TO ACCESS A SHARED RESOURCE - Embodiments of the invention provide a method, apparatus and computer program product for enabling a thread to acquire a lock associated with a shared resource, when a locking mechanism is used therewith, wherein each embodiment reduces waiting time and enhances efficiency in using the shared resource. One embodiment is associated with a plurality of processors, which includes two or more processors that each provides a specified thread to access a shared resource. The shared resource can only be accessed by one thread at a given time, a locking mechanism enables a first one of the specified threads to access the shared resource while each of the other specified threads is retained in a waiting queue, and a second one of the specified threads occupies a position of highest priority in the queue. The method includes the step of identifying a time period between a time when the first specified thread releases access to the shared resource, and a later time when the second specified thread becomes enabled to access the shared resource. Responsive to an additional thread that is not one of the specified threads being provided by a processor to access the shared resource during the identified time period, it is determined whether a first prespecified criterion pertaining to the specified threads retained in the queue has been met. Responsive to the first criterion being met, the method determines whether a second prespecified criterion has been met, wherein the second criterion is that the number of specified threads in the queue has not decreased since a specified prior time. Responsive to the second criterion being met, the method then decides whether to enable the additional thread to access the shared resource before the second specified thread accesses the resource. | 2011-06-30 |
20110161540 | HARDWARE SUPPORTED HIGH PERFORMANCE LOCK SCHEMA - A method and apparatus for lock allocation control. When a processor core acquires a lock, other processor cores do not need to constantly poll memory to check whether the required lock is released. Instead, other processor cores will be in sleep state and the next processor core needed will be selectively woken up based on predetermined rule, such that an out-of-order lock contention procedure is turned into an in-order lock allocation procedure. By selectively waking up a processor core that is in sleep state, the method and apparatus can avoid occupying a large amount of bus bandwidth, can avoid cache misses, and can save power consumption of chip. | 2011-06-30 |
20110161541 | POSTING INTERRUPTS TO VIRTUAL PROCESSORS - Embodiments of systems, apparatuses, and methods for posting interrupts to virtual processors are disclosed. In one embodiment, an apparatus includes look-up logic and posting logic. The look-up logic is to look-up an entry associated with an interrupt request to a virtual processor in a data structure. The posting logic is to post the interrupt request in a data structure specified by information in the first data structure. | 2011-06-30 |
20110161542 | EMULATION OF AN INPUT/OUTPUT ADVANCED PROGRAMMABLE INTERRUPT CONTROLLER - Embodiments of systems, apparatuses, and methods for emulating an input/output Advanced Programmable Interrupt Controller are disclosed. In one embodiment, an apparatus includes a first interrupt controller having a first programming model, and emulation logic to emulate a second interrupt controller having a second programming model that is different from the first programming model. The emulation logic is also to mask one of a plurality of interrupt requests to the first interrupt controller for each of the plurality of interrupt requests handled by the emulation logic. | 2011-06-30 |
20110161543 | Memory Management - An Accelerated Storage Controller (ASC) in an electronic device allows both conventional (slower) application processor to memory interfaces to be employed transparently to existing software, while also allowing software configuration to realize an accelerated storage architecture on demand. Some use cases for the electronic device do not require accelerated storage, and a bypass mode does not require any modification to existing software. Other use cases (such as fast download of multiple gigabytes of media) benefit from an accelerated storage architecture offloading transfer from the electronic device application processor, but could also work with the traditional processor to memory interface, at the cost of slower downloads. Embodiments of the present invention provide for both these possibilities in a software-configurable architecture. Furthermore, a number of other connectivity options are provided under software control to optimize performance and connectivity for different use case scenarios. | 2011-06-30 |
20110161544 | LOW LATENCY SERIAL MEMORY INTERFACE - A device applies synchronous clocking across a first component and a second component of the device, and designates a particular serial link, from a group of serial links, as a master serial link. The device also designates the remaining serial links as slave serial links, provides, via the master serial link, an encoded data stream, and provides, via the slave serial links, un-encoded and scrambled data streams. | 2011-06-30 |
20110161545 | I2C/SPI CONTROL INTERFACE CIRCUITRY, INTEGRATED CIRCUIT STRUCTURE, AND BUS STRUCTURE THEREOF | 2011-06-30 |
20110161546 | COMPUTER SYSTEM WITH BRIDGE - A computer system includes a central processing unit (CPU), a north bridge, a south bridge, a bridge and a slot. The north bridge is electrically connected to the CPU. The bridge is electrically connected to the north bridge and the south bridge, and the connector is connected to the bridge. The bridge generates a first data and a second data according to the data packages transmitted from the north bridge and adjusts the output bandwidth of the first data and the second data according to a channel control signal. The south bridge receives or transfers the first data via the bridge so as to communicate with the north bridge. The slot is electrically connected to the bridge and receives or transfers the second data via the bridge so as to communicate with the north bridge. | 2011-06-30 |
20110161547 | METHOD AND DEVICE FOR DISABLING A HIGHER VERSION OF A COMPUTER BUS AND INTERCONNECTION PROTOCOL FOR INTEROPERABILITY WITH A DEVICE COMPLIANT TO A LOWER VERSION OF THE COMPUTER BUS AND INTERCONNECTION PROTOCOL - A method and a device for disabling a lower version of a computer bus and interconnection protocol (e.g., Peripheral Component Interconnect Express (PCIe) 2.0 or higher) for interoperability with a receiver compliant to a lower version of the protocol are disclosed. The device detects a presence of a receiver, and starts link training. During the link training, the number of link training failures or the elapsed time is counted. The device transmits a training sequence including symbols set in accordance with a higher version of the protocol that the device supports on each lane that the receiver is detected as long as the number of link training failures or the elapsed time is below a predetermined threshold. If the number of link training failures or the elapsed time reaches a predetermined threshold, the device transmits a training sequence including symbols set in accordance with a lower version of the protocol. | 2011-06-30 |
20110161548 | Efficient Multi-Level Software Cache Using SIMD Vector Permute Functionality - A cache manager receives a request for data, which includes a requested effective address. The cache manager determines whether the requested effective address matches a most recently used effective address stored in a mapped tag vector. When the most recently used effective address matches the requested effective address, the cache manager identifies a corresponding cache location and retrieves the data from the identified cache location. However, when the most recently used effective address fails to match the requested effective address, the cache manager determines whether the requested effective address matches a subsequent effective address stored in the mapped tag vector. When the cache manager determines a match to a subsequent effective address, the cache manager identifies a different cache location corresponding to the subsequent effective address and retrieves the data from the different cache location. | 2011-06-30 |
20110161549 | MEMORY CONTROL DEVICE AND CACHE MEMORY CONTROLLING METHOD - A memory control device for controlling an access from a processing unit to a cache memory, the memory control device includes: an address estimation circuit for receiving a first read address of the cache memory from the processing unit and estimating a second read address on the basis of the first read address; an access start detection circuit for detecting an access start of accessing cache memory at the first read address and outputting an access start signal; a data control circuit for receiving read data from the cache memory and for outputting the read data to the processing unit; and a clock control circuit for controlling a read clock to be output to the processing unit in response to the access start signal, the processing unit receiving the read data from the data control circuit with the read clock. | 2011-06-30 |
20110161550 | SUB-OS VIRTUAL MEMORY MANAGEMENT LAYER - A binary memory image in system is modified. The system may or may not already have virtual memory management enabled. Virtual memory management is enabled and/or modified by inserting a sub-OS virtual memory management layer in the binary memory image. Part of the binary memory image may be compressed to make room for the sub-OS virtual memory management layer. | 2011-06-30 |
20110161551 | VIRTUAL AND HIDDEN SERVICE PARTITION AND DYNAMIC ENHANCED THIRD PARTY DATA STORE - A system reserves and manages a hidden service partition through components of the hardware platform of a computing device. The hidden partition is not accessible by way of a host operating system on the computing device. A hardware platform controller provisions a portion of nonvolatile storage through configuration settings of the hardware platform controller. When the host system requests settings related to storage in the system, the request is routed through the interfaces of the hardware platform, and the hardware platform controller reports in accordance with the configuration settings, hiding the service partition. The hidden partition is dynamically modifiable through secure remote access to the hardware platform controller, not through the host system such as operating system or BIOS. | 2011-06-30 |
20110161552 | Command Tracking for Direct Access Block Storage Devices - Described embodiments provide tracking and processing of commands received by a storage device. For each received command, the storage device determines one or more requested logical block addresses (LBAs), including a starting LBA and a length of one or more LBAs of the received command. The storage device determines whether command reordering is restricted. If command reordering is not restricted, the storage device processes the received commands. Otherwise, if command reordering is restricted, the storage device conflict checks each received command. If no conflict is detected, the storage device tracks and processes the received command. Otherwise, if a conflict is detected, the storage device queues the received command. | 2011-06-30 |
20110161553 | MEMORY DEVICE WEAR-LEVELING TECHNIQUES - The wear-leveling techniques include discovering a persistent state of one or more memory devices, or building and caching persistent state parameters for each logical unit of a given memory device if a persistent state is not discovered for a given memory device. The techniques may also include processing memory access commands utilizing the cached persistent state parameters. When processing memory access commands, the logical block address and length parameter of a logical address of a command may be translated to a plurality of physical addresses for accessing one or more memory devices, each physical address includes a device address, a logical unit address, a block address, and a page address, wherein the block address includes one or more interleaved address bits. | 2011-06-30 |
20110161554 | Method and Controller for Performing a Sequence of Commands - The embodiments described herein provide a method and controller for performing a sequence of commands. In one embodiment, a controller receives a command from a host to perform a memory operation in a flash memory device, wherein the command comprises at least one bit that indicates whether the command is a stand-alone command or is part of a sequence of commands. The controller analyzes the at least one bit to determine whether the at least one bit indicates that the command is a stand-alone command or is part of a sequence of commands. If the at least one bit indicates that the command is a stand-alone command, the controller performs the command. If the at least one bit indicates that the command is part of a sequence of commands, the controller performs the command as part of the sequence of commands. | 2011-06-30 |
20110161555 | DYNAMIC DATA FLOW MANAGEMENT IN A MULTIPLE CACHE ARCHITECTURE - The disclosure is related to systems and methods of dynamic dataflow in a multiple cache architecture. In an embodiment, a system having a data storage device with a multiple cache architecture may detect at least one attribute affecting a data storage workload or data storage performance. The system may select at least one of a plurality of data flow schemes based on the at least one attribute, which may be done to optimize the data storage workload for various conditions. In another embodiment, a data storage controller may automatically and dynamically select one of multiple data flow schemes within a data storage device having a multiple cache architecture. The data storage controller may monitor attributes to determine which data flow scheme to select for various workloads of the data storage device. | 2011-06-30 |
20110161556 | SYSTEMS AND METHODS FOR STORING DATA IN A MULTI-LEVEL CELL SOLID STATE STORAGE DEVICE - This disclosure is related to systems and methods for storing data in multi-level cell solid state storage devices, such as Flash memory devices. In one example, a multi-level cell memory array has programmable pages, a first page having a first programming time, and a second page having a second programming time that is different than the first programming time. In one embodiment, the first programming time is faster than the second programming time. Further, a controller coupled to the multi-level cell memory array may be configured to select the first page to store the data when a priority level of a write operation indicates a first priority level and select the second page to store the data when the priority level indicates a second priority level. | 2011-06-30 |
20110161557 | DISTRIBUTED MEDIA CACHE FOR DATA STORAGE SYSTEMS - This disclosure is related to distributed media cache for data storage systems, such as disc drives, flash devices, or hybrid devices. In one example, a data storage device comprises a data storage medium and a controller adapted to selectively divide a media cache into a plurality of physically separate media cache portions on the data storage medium based on a physical attribute of the data storage medium and to store data received from a host system into the media cache portions. | 2011-06-30 |
20110161558 | RECORD SORTING - A method, computer program product, and computing system for record sorting is described. The method may comprise splitting an incoming record into a separate key block and payload block. The method may further comprise storing the key block in a first memory. The method may also comprise assigning the payload block an address in a second memory at the beginning of a sort. Moreover, the method may store, with the key block in the first memory, the address of the payload block in the second memory. Additionally, the method may store the payload block at the address in the second memory. | 2011-06-30 |
20110161559 | PHYSICAL COMPRESSION OF DATA WITH FLAT OR SYSTEMATIC PATTERN - Systems and methods are disclosed to improve the performance of a memory system by freeing up physical memory areas that correspond to logical block address ranges that have repeated data patterns. A controller detects data patterns in incoming data. When a data pattern is detected, the data is not written to non-volatile storage area. Rather, the logical block address range of the data is marked in a data structure as having pattern data. The pattern may also be recorded in the data structure as a pattern descriptor. Because the data having the data pattern is not written to the non-volatile storage area, the freed up corresponding physical memory area may be utilized by the memory system for other purposes, thereby improving the overall performance and endurance of the memory system. | 2011-06-30 |
20110161560 | ERASE COMMAND CACHING TO IMPROVE ERASE PERFORMANCE ON FLASH MEMORY - Systems and methods are disclosed to reduce the number of partial logical groups that are erased by writing erase patterns to memory in a non-volatile memory system. When a non-aligned erase command is received, the logical addresses of data associated with the erase command may be marked as erased. If the logical group corresponds to the size of a physical metablock, the controller may also issue a physical erase command for complete logical groups within the erase command. For those parts of the erase command that encompass only partial logical groups, the ranges of the logical block addresses marked for erasure are stored. As subsequent erase commands are received the address ranges of the erase commands are added to the previously stored address ranges. When a set of erase commands spans an entire logical group, the logical group is marked for physical erasure in its entirety. | 2011-06-30 |