31st week of 2011 patent applcation highlights part 62 |
Patent application number | Title | Published |
20110191574 | METHOD AND APPARATUS FOR BINDING TPM KEYS TO EXECUTION ENTITIES - A method and apparatus for binding trusted platform module (TPM) keys to execution entities are described. In one embodiment, the method includes the receipt of an authorization request issued by an execution entity for authorization data. According to the authorization request, the execution entity may be measured to generate an entity digest value. Once the entity digest value is generated, a platform reference module may grant the authorization request if the entity digest value verifies that the execution entity is an owner of the key held by the TPM. Accordingly, in one embodiment, a platform reference module, rather than an execution entity, holds the authorization data required by a TPM to use a key owned by the execution entity and held within sealed storage by the TPM. Other embodiments are described and claimed. | 2011-08-04 |
20110191575 | IC CHIP, INFORMATION PROCESSING APPARATUS, SOFTWARE MODULE CONTROL METHOD, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An IC chip, an information processing apparatus, a software module control method, an information processing system, an information processing method, and a program for allowing a plurality of software modules to ensure their respective security when operating are provided. An information processing system is provided to include a reader/writer and a portable communication terminal accessed by the reader/writer through near-field communication. In the portable communication terminal, a memory access management module stores a map regarding a plurality of software modules J and F for handling information exchanged in accordance with different noncontact communication principles while managing the software modules J and F based on the map. Another software module A performs mapping of the map for permitting or inhibiting the operations of the plurality of software modules. | 2011-08-04 |
20110191576 | INTEGRATION OF PRE REL-8 HOME LOCATION REGISTERS IN EVOLVED PACKET SYSTEM - Cryptographic network separation functionality is provided on a user device. An option to store information about a type of database where a user is homed is provided in an indicator on a storage medium. An interface is provided between the user device and the storage medium for accessing the indicator. In case the information about the type of database cannot be obtained from the storage medium, it is determined not to enforce the cryptographic network separation functionality on the user device. | 2011-08-04 |
20110191577 | Media Processing Devices For Adaptive Delivery Of On-Demand Media, And Methods Thereof - In one embodiment, a method of streaming media includes partitioning a media stream to be transmitted into a first stream of media segments at a media server. The first stream of the media segments has a first sequence. An index table is generated to identify the first sequence of the first stream of the media segments. The index table is encrypted using a key. A second stream of the media segments is generated. The second stream has a second sequence, which is random relative to the first sequence. The encrypted index table and a transcoded media stream having the second stream of the media segments are transmitted. | 2011-08-04 |
20110191578 | Method for digital identity authentication - In a preferred embodiment of the invention, an authenticating device ( | 2011-08-04 |
20110191579 | TRUSTED NETWORK CONNECT METHOD FOR ENHANCING SECURITY - A trusted network connect method for enhancing security, it pre-prepares platform integrity information, sets an integrity verify demand. A network access requestor initiates an access request, a network access authority starts a process for bi-directional user authentication, begins to perform the triplex element peer authentication protocol with a user authentication service unit. After the success of the bi-directional user authentication, a TNC server and a TNC client perform bi-directional platform integrity evaluation. The network access requestor and the network access authority control ports according to their respective recommendations, implement the mutual access control of the access requestor and the access authority. The present invention solves the technical problems in the background technologies: the security is lower relatively, the access requestor may be unable to verify the validity of the AIK credential and the platform integrity evaluation is not parity. The present invention may simplify the management of the key and the mechanism of integrity verification, expand the application scope of the trusted network connect. | 2011-08-04 |
20110191580 | METHOD AND SYSTEM FOR EXECUTION MONITOR-BASED TRUSTED COMPUTING - A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service transaction associated with the remote service, the service transaction being requested by a service requester. The method further includes determining whether a deviation exists between the runtime dependencies and a trusted list of dependencies associated with the remote service. The method also includes blocking execution of the service transaction based on determining that the deviation between the runtime dependencies and the trusted list of dependencies exists. | 2011-08-04 |
20110191581 | METHOD AND SYSTEM FOR USE IN MANAGING VEHICLE DIGITAL CERTIFICATES - A system and method is provided for managing digital certificates, the system including one or more a certificate authorities and a vehicle-bound digital certificate manager, the apparatus comprising: a mobile client having a wireless transceiver with internet protocol capabilities and a vehicle communication device; the client further including at least one processor and at least one non-transitory computer readable medium encoded with instructions, which when loaded on the at least one computer, establishes processes for information handling, comprising: establishing secure communications with a certificate authority to receive at least one of a Vehicle Identification Digital Certificate (“VIDC”), an Anonymous Vehicle digital Certificate (“AVDC”), and a Certificate Revocation Lists (“CRLs”); storage management of at least one of the VIDC, AVDCs, and CRLs; and forwarding of at least one of the VIDC, AVDCs, and CRLs received from the certificate authority to the digital certificate manager using the vehicle communication device. | 2011-08-04 |
20110191582 | Agile Network Protocol For Secure Communications With Assured System Availability - A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are rejected. In addition to “hopping” of IP addresses and discriminator fields, hardware addresses such as Media Access Control addresses can be hopped. The hopped addresses are generated by random number generators having non-repeating sequence lengths that are easily determined a-priori, which can quickly jump ahead in sequence by an arbitrary number of random steps and which have the property that future random numbers are difficult to guess without knowing the random number generator's parameters. Synchronization techniques can be used to re-establish synchronization between sending and receiving nodes. | 2011-08-04 |
20110191583 | Methods For Upgrading Software Or Updating Contents In Terminal Devices Based On Digital TV Data Broadcast - A method for upgrading software or contents in a terminal device based on digital TV data broadcasting is provided. The method comprises steps of uploading an upgrading file or content file to an access gateway by a service provider via a data broadcasting system; transmitting the upgrading file or content file to the terminal device in a broadcast mode by the data broadcasting system; and receiving the transmitted upgrading file or content file by the terminal device. The method further comprises a step of determining whether the received upgrading file or content file is of a higher version than that of a currently used software file or content file of the terminal device; and if yes, upgrading the currently used software file or content file. The method according to the present invention decreases maintenance cost of the terminal device, facilitates upgrading system in time, maintains copyright benefit of the service provider, and is convenient for the user to upgrade his terminal device. | 2011-08-04 |
20110191584 | System and Method for Computationally Private Information Retrieval - A device is provided for use with a database server having a matrix of data stored therein, wherein the database can transmit a return vector based on the matrix of data. The device includes a communication portion, an encryption portion and a decryption portion. The encryption portion can generate an encrypted request to obtain a portion of the matrix of data, wherein the encrypted request includes a plurality of subqueries. The communication portion can transmit the encrypted request to the database server and can receive the return vector from the database server. One of the subqueries is based on a first random vector and a target vector corresponding to the portion of the matrix of data. One of the subqueries is based on a second random vector. The decryption portion can decrypt the return vector by way of a modulo summation. | 2011-08-04 |
20110191585 | Device Authentication - Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices. | 2011-08-04 |
20110191586 | METHOD AND APPARATUS FOR AUTHENTICATING PUBLIC KEY WITHOUT AUTHENTICATION SERVER - Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value. | 2011-08-04 |
20110191587 | Media Processing Devices With Joint Encryption-Compression, Joint Decryption-Decompression, And Methods Thereof - In one embodiment, a method of adaptive media streaming includes receiving a cipher media stream at a media device. The cipher media stream is compliant with a media compression standard. The cipher media stream is decrypted and decoded using an inverse stream cipher algorithm and a compressed media stream is generated by combining the cipher media stream with a keystream. | 2011-08-04 |
20110191588 | METHOD AND APPARATUS FOR FACILITATING EFFICIENT AUTHENTICATED ENCRYPTION - A shared-key encryption scheme that uses identically keyed block-cipher calls, low additional overhead, supports the encryption of arbitrary-length strings, produces a minimal-length-ciphertext, and is fully parallelizable. In one embodiment, “OCB”, a key shared between communicating parties is mapped to a key variant using the block cipher. The key variant is mapped into a sequence of basis offsets using shifts and conditional xors. To encrypt a message using a nonce, a nonce-dependent base offset is formed, and then a sequence of offsets is constructed by starting with the base offset and then xoring, for each offset, an appropriate basis offset. The message is partitioned into message blocks of the same length as the block length of the block cipher, along with a message fragment that may be shorter. Each message block is combined with a corresponding offset, enciphered, and then combined again with the offset, yielding a ciphertext block. The message fragment is xored with an appropriately computed pad to give a ciphertext fragment. A checksum is formed using the message blocks, the message fragment, and the pad. The checksum is combined with an offset and enciphered to yield a tag. The encrypted message includes the ciphertext blocks, the ciphertext fragment, and the tag. | 2011-08-04 |
20110191589 | PREVENTING THE USE OF MODIFIED RECEIVER FIRMWARE IN RECEIVERS OF A CONDITIONAL ACCESS SYSTEM - The invention enables the shared secret, which is used for encrypting the communication of CWs from a smartcard to a receiver, to cover at least a part of a binary image of firmware that is executing in the receiver. Preferably the shared secret covers the entire binary image of the firmware. Hereto, data from one or more predefined firmware memory locations are read, the set of data forming the shared secret. | 2011-08-04 |
20110191590 | METHOD AND APPARATUS FOR DIGITAL AUTHENTICATION OF VALUABLE GOODS - A method for digital certification of authenticity of a physical object, and corresponding computer program and storage device, as well as to the use of the method for digital certification of authenticity of a physical object of value. The method includes the steps of issuing a storage device including a digital certificate of authenticity including encrypted information reflecting at least one characteristic unique to the physical object, checking, whenever required, the validity of the digital certificate of authenticity by use of a network computer, the network computer cooperating with the storage device and a validating or a certifying authority so as to output sensibly in real time the status of validity of the digital certificate of authenticity, and modifying the status of validity of the digital certificate of authenticity, whenever required. | 2011-08-04 |
20110191591 | Transmitting Information Using Virtual Input Layout - Method and apparatus for information transmission are provided. A method for information transmission uses a virtual input layout to encrypt security information. The method uses a server to receive an access request from a user client and to generate a virtual input layout based on information of an actual input layout of the user client. Each key in the virtual input layout has a corresponding relationship with a respective key in the actual input layout, and at least some of the keys in the virtual input layout represent symbols or functions that are different from their corresponding keys in the actual input layout. The server sends the virtual input layout to the user client to be displayed, and subsequently receives from the user client a virtual security information entered by the user according to the virtual input layout displayed. The server then converts the virtual security information to obtain true security information. | 2011-08-04 |
20110191592 | Secure Access by a User to a Resource - A method for allowing user access to a resource includes a large number of arrays of elements which are generated and stored for each user for use in a series of log-in sessions. A user input token is calculated by identifying a subset of the array by a pattern of the elements in the array, combined in an operation on the elements selected using one or more mathematical, relational and/or logical operations. The arrays are stored in a table with the tokens calculated from those arrays and withdrawn in a random pattern for use in the sessions for that user. Each array includes multiple possible solutions including the actual solution using the pattern and calculation of that user and these other possible solutions act as hacker traps to indicate the presence of a hacker who has calculated a solution but found the wrong solution | 2011-08-04 |
20110191593 | Software License Embedded In Shell Code - Software application protection methods and systems for protecting and verifying licensing of an original application. The system reads the original application executable, and generates a shelled application comprising the original application and a shell containing the license information. The shelled application implements license APIs, and establishes secure communications within the shelled application between the original application and the shell. Licensing for the original application can be verified by the shelled application alone. | 2011-08-04 |
20110191594 | KEY ROTATION FOR ENCRYPTED STORAGE MEDIA - An I/O module is provided to service I/O requests from a host to access storage media. Data blocks of the storage media are encrypted with an old key, and the I/O module performs key rotation to cause data blocks to be re-encrypted with a new key. | 2011-08-04 |
20110191595 | ENCRYPTION KEY ROTATION MESSAGES WRITTEN AND OBSERVED BY STORAGE CONTROLLERS VIA STORAGE MEDIA - Storage media is coupled to first and second storage controllers. When the first storage controller performs encryption key rotation, the First storage controller writes a key rotation message to a storage controller metadata section of the storage media indicating that key rotation is underway. The second storage controller observes the key rotation message indicating that key rotation is underway and suspends access by the second storage controller to encrypted portions of the storage media. | 2011-08-04 |
20110191596 | Security Protocols for Processor-Based Systems - A processor-based system such as a wireless communication module may implement security functions in a cost effective fashion by providing a virtual memory space whose addresses may be recognized. The memory is integrated with an application processor. When those addresses are recognized, access to special security protocols may be allowed. In another embodiment, a variety of dedicated hardware cryptographic accelerators may be provided to implement security protocols in accordance with a variety of different standards. By optimizing the hardware for specific standards, greater performance may be achieved. | 2011-08-04 |
20110191597 | METHOD AND SYSTEM FOR SECURING SOFTWARE - In a method and system for securing a software package that can be broken down into a number of “event-action” type independent tasks, the tasks managing a set of “scripts”, the method includes using a script and message encapsulation module and a transmission of encapsulated scripts to a trust resource suitable for executing them. | 2011-08-04 |
20110191598 | DOCK FOR A PORTABLE HARD DISK AND A METHOD FOR ACCESSING CONTENT ON A HOST DEVICE USING THE DOCK - There is provided a first dock for a portable hard disk, where the first dock is connectable to a host device. There is also provided a corresponding method for accessing content on the host device during use of the dock. It is advantageous that the host device is able to access content from portable hard disks that are docked with the first dock and a second dock. | 2011-08-04 |
20110191599 | Apparatus and method for providing hardware security - A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of unauthorized accesses from external sources outside of the secure boundary to obtain the secure key. The hardware security module includes a security processor to unwrap and authenticate a secure key within the secure boundary to decrypt or encrypt data and to provide data through a single interface that communicates with external sources, so that all data transfers between the secure boundary, formed by the hardware security module, and external sources are transferred only through the interface. The hardware security module ensures no unwrapped key leaves the secure boundary established by the hardware security module. | 2011-08-04 |
20110191600 | System, Method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media - A secure software package for original equipment manufacturers to run in electronic devices in order to access and dynamically decrypt encrypted audio video or other content from a memory storage device such as a memory card, optical or hard disk such that the user interface of the device need only send simple commands and the decrypted content is output. | 2011-08-04 |
20110191601 | Storage System - A storage system includes one or more first power supplies which receive power from the first input and supplies power to each of multiple load groups through multiple first paths and multiple second power supplies which receive power from the second input and supplies power to each of the multiple load groups through multiple second paths. Each load group is comprised of at least one load, and each load is a storage device. Power is supplied from different second power supplies respectively to two or more load groups to which power is supplied from the first power supply through two or more first paths. | 2011-08-04 |
20110191602 | PROCESSOR WITH SELECTABLE LONGEVITY - A processor and method has at least one processor core for processing information and receives an operating voltage for powering circuitry of the processor. A selector receives a value indicative of a temperature within the processor and receives a value from a plurality of possible longevity values that each indicates a predetermined desired longevity of valid operation of the processor. An output provides an identifier that controls at least one of an operating voltage or an operating frequency of the processor, wherein the identifier provided is at least based on the value indicative of temperature and the predetermined desired longevity. A reliability storage device coupled to the selector stores the value from the plurality of possible longevity values that each indicates the predetermined desired longevity of valid operation of the processor. | 2011-08-04 |
20110191603 | Power Management for Systems On a Chip - A system for controlling a multitasking microprocessor system includes an interconnect, a plurality of processing units connected to the interconnect forming a single-source, single-sink flow network, wherein the plurality of processing units pass data between one another from the single-source to the single-sink, and a monitor connected to the interconnect for monitoring a portion of a resource consumed by each of the plurality of processing units and for controlling the plurality of processing units according to a predetermined budget for the resource to control a data overflow condition, wherein the monitor controls performance and power modes of the plurality of processing units. | 2011-08-04 |
20110191604 | STORAGE SYSTEM - A storage system comprises multiple physical storage devices, and a power supply for the multiple physical storage devices. Each physical storage device requires an input of a first voltage and an input of a second voltage that is a lower voltage than the first voltage. The power supply comprises a first power supply circuit that is made redundant and a second power supply circuit that is made redundant. Each first power supply circuit outputs a first voltage, which is input to the respective physical storage devices. Each second power supply circuit outputs a second voltage to a storage device group (two or more physical storage devices of the multiple physical storage devices) corresponding to this second power supply circuit. Each second power supply circuit is isolated from a circuit board comprising the first power supply circuit. | 2011-08-04 |
20110191605 | TIME SEQUENCE CONTROL CIRCUIT - A time sequence control circuit that can control time sequence of a computer. After the computer is turned on, a power supply terminal outputs a high level enabling signal to an enabling pin of a power supply circuit, the power supply circuit is active. A power supply pin of the power supply circuit outputs a standard voltage to a power pin of each of the motherboard components. A first electronic switch is turned on, a second electronic switch is turned off, and a power supply state pin of the power supply circuit outputs a high level power supply state signal to a power state input pin of a main chip after the power supply circuit outputs the standard voltage. | 2011-08-04 |
20110191606 | FAST TRACKING POWER SUPPLY DEVICE, FAST TRACKING POWER SUPPLY CONTROL METHOD, AND COMMUNICATION EQUIPMENT - A fast tracking power supply device, a fast tracking power supply control method, and communication equipment are provided. The fast tracking power supply device includes: a basic voltage output unit, configured to output a basic voltage; a basic current unit, configured to output a basic current; a linear amplifier, configured to output a compensation current and a compensation voltage, the linear amplifier is connected in parallel with the basic current output unit, and then is connected in series with the basic voltage output unit. The device can output signal with high efficiency and bandwidth. | 2011-08-04 |
20110191607 | INDEPENDENT POWER CONTROL OF PROCESSING CORES - Independent power control of two or more processing cores. More particularly, at least one embodiment of the invention pertains to a technique to place at least one processing core in a power state without coordinating with the power state of one or more other processing cores. | 2011-08-04 |
20110191608 | SYSTEM AND METHOD FOR MANAGING POWER CONSUMPTION IN DATA PROPAGATION ENVIRONMENTS - An example method includes communicating a first signal to a remote computer element, the first signal can be used to establish a link between the remote computer element and a local computer element. The method also includes evaluating whether the remote computer element is configured to support a low-power protocol in which low-power IDLE signals are exchanged between the local computer element and the remote computer element, the evaluating occurs using a link layer protocol. In detailed embodiments, the method includes negotiating a wake-up time for the remote computer element to shift from a low-power mode to an active mode. The method can also include evaluating buffer parameters to confirm the wake-up time for the remote computer element to shift to the active mode. In still other embodiments, the method can include delaying a data transmission on the link for at least the wake-up time that was negotiated. | 2011-08-04 |
20110191609 | POWER USAGE MANAGEMENT - The invention relates to a method of influencing power consumption of a process being executed on a computer system, comprising calculating an estimate of usage of at least one system resource by the process, converting the estimate of usage into a power consumption estimate, monitoring a time period during which the process is in an idle state and influencing at least one aspect of the computer system if the power consumption estimate exceeds a predefined limit while the process is in an idle state. Preferably this influencing comprises automatic termination of the process if the power consumption estimate exceeds the predefined limit. The at least one system resource may be selected from the group of: a central processing unit (CPU), a storage medium such as a hard disk, a monitor, a graphics card and a communications bus. | 2011-08-04 |
20110191610 | ARCHITECTURE TO ENABLE ENERGY SAVINGS IN NETWORKED COMPUTERS - This application includes systems and techniques that permit computers to remain accessible while in a low-power mode. In some implementations, the technique includes receiving at a first computer, via a computer network, information regarding a second computer transitioning to a low-power mode of operation; receiving at the first computer network communications designated for the second computer; processing at the first computer at least a portion of the network communications on behalf of the second computer without transitioning the second computer out of the low-power mode of operation, where the processing comprises processing the at least a portion of the network communications on behalf of the second computer within a virtual machine corresponding to the second computer; and initiating, via the computer network, a transition of the second computer out of the low-power mode of operation when at least one of the network communications satisfies a predetermined condition. | 2011-08-04 |
20110191611 | MOBILE COMMUNICATION TERMINAL AND METHOD FOR DISPLAYING ICONS ON DISPLAY OF MOBILE COMMUNICATION TERMINAL - A mobile communication terminal configured to run a plurality of application programs is provided, which includes an operation section configured to be operated by a user, a display section configured to display a plurality of icons individually corresponding to the respective programs, a first memory in which a history of use of the programs can be stored, a second memory in which an arrangement of the icons displayed on the display section can be stored, an updating section configured to update the arrangement of the icons stored in the second memory on the basis of the history of use of the programs stored in the first memory, and a display controller configured to display the icons on the display section in accordance with the arrangement stored in the second memory upon the operation section being operated by the user in a specific manner. | 2011-08-04 |
20110191612 | POWER SUPPLY SYSTEM, ELECTRONIC APPARATUS, AND METHOD FOR CONTROLLING POWER SUPPLY SYSTEM - A power supply system includes a plurality of power supply units that each includes an output terminal connected each other in parallel to other output terminals each included in other power supply units and connected to a plurality of load units, a power supply section that inputs an input voltage and outputs a first output voltage from the output terminal to the plurality of load units, and a shut-off control section that shuts off the output of the first output voltage from the output terminal based on an inputted stand-by signal, and a management control unit that inputs a configuration information representing a configuration of each of the plurality of load units in which the first voltage is inputted, and outputs the stand-by signal to any of the plurality of power supply units based on the configuration information. | 2011-08-04 |
20110191613 | COMMUNICATION APPARATUS AND METHOD OF CONTROLLING COMMUNICATION APPARATUS - A communication apparatus which is connected to an information processing apparatus so as to operate dependent on the information processing apparatus and connects the information processing apparatus and an external apparatus, includes a judgment unit which judges instruction information transmitted from the external apparatus, a storage unit which stores the instruction information, a transmission unit which detects whether the information processing apparatus is in a normal state in which power is consumed normally or a power-saving state in which power consumption is reduced, and transmits the instruction information stored by the storage unit to the information processing apparatus when the information processing apparatus is in the normal state, and a switching unit which switches the communication apparatus to the normal state if the judgment unit judges that the instruction information is an instruction for directing the operation when the communication apparatus is in the power-saving state. | 2011-08-04 |
20110191614 | COMMUNICATION APPARATUS - A communication apparatus that is to be connected to a network includes: a first processing unit configured to transition between a sleep state and a non-sleep state and configured to process a packet received via the network when the first processing unit is in the non-sleep state; and a second processing unit configured to process a packet when the first processing unit is in the sleep state, wherein the second processing unit is capable of executing packet-processing for sequentially processing of unprocessed packets, wherein the second processing unit includes a detecting section that detects a reception of the unprocessed packet, wherein, when the first processing unit is in the sleep state and the reception of the unprocessed packet is detected, the second processing unit starts the packet-processing, and wherein, the second processing unit terminates the packet-processing if a continuous packet-processing period exceeds an allowable time period. | 2011-08-04 |
20110191615 | MEMORY CLOCK SLOWDOWN - Circuits, methods, and apparatus for slowing clock circuits on a graphics processor integrated circuit in order to reduce power dissipation. An exemplary embodiment of the present invention provides a graphics processor having two memory clocks, specifically, a switched memory clock and an unswitched memory clock. The switched memory clock frequency is reduced under specific conditions, while the unswitched memory clock frequency remains fixed. In a specific embodiment, the switched memory clock frequency is reduced when related graphics, display, scaler, and frame buffer circuits are not requesting data, or are such data requests can be delayed. Further refinements to the present invention provide circuits, methods, and apparatus for ensuring that the switched and unswitched memory clock signals remain in-phase and aligned with each other. | 2011-08-04 |
20110191616 | USB POWER MANAGING SYSTEM AND METHOD THEREOF - The present invention relates to a USB power managing system and a method thereof, the USB power managing system comprises an USB peripheral device and an USB interface, wherein the USB interface includes: a micro controlling unit; a data switch coupled to the micro controlling unit; an USB connecting unit coupled to the data switch; and a power switch coupled to the micro controlling unit and the USB connecting unit; wherein when the USB peripheral device is coupled to the USB connecting unit, the micro controlling unit switches the power switch for providing a power the USB peripheral device through the USB connecting unit; moreover when the USB peripheral device enters a standby mode, the micro controlling unit turns off the power switch for stopping providing the power to the USB peripheral device. | 2011-08-04 |
20110191617 | APPARATUS FOR CHARGER CIRCUIT IN PORTABLE TERMINAL AND OPERATION METHOD THEREOF - An apparatus for a charger circuit in a portable terminal and an operation method thereof are provided. The apparatus includes a charger Integrated Circuit (IC) for, upon detecting an insertion of a charging cable, determining whether a charging error occurs by collecting charging-related information, and for outputting a signal for indicating the occurrence of the charging error, and a Central Processing Unit (CPU) for performing an error control operation upon receiving the signal for indicating the occurrence of the charging error from the charger IC. | 2011-08-04 |
20110191618 | Systems and Methods for Power Supply Warm Spare and Programmable Load Sharing - A power supply system for an information handling system is disclosed. The power supply system includes power supply units electrically coupled via an output line. The power supply units are configured to supply an output voltage to the output line. Each power supply unit receives a feedback signal indicative of a voltage of the output line and a programmed voltage signal indicative of a supply voltage required for the output line. A standby power supply unit is configured to transition between a standby mode and an active mode based, at least in part, on the feedback signal and the programmed voltage signal. Power supply units are configured to transition to a load sharing mode where the power supply units cooperatively supply an output voltage to the output line. The transitioning is based, at least in part, on the feedback signal and the programmed voltage signal. | 2011-08-04 |
20110191619 | Reducing Latency in Serializer-Deserializer Links - A system for increasing the efficiency of data transfer through a serializer-deserializer (SerDes) link, and for reducing data latency caused by differences between arrival times of the data on the SerDes link and the system clock with which the device operates. | 2011-08-04 |
20110191620 | MULTICORE PROCESSOR AND ONBOARD ELECTRONIC CONTROL UNIT USING SAME - A multicore processor according to the invention has a plurality of cores. The plurality of cores are configured to operate at an operation clock with a frequency varying periodically with the same period, and a variation phase of a frequency of the operation clock of each core of the plurality of cores is shifted by a predetermined amount among the plurality of cores. | 2011-08-04 |
20110191621 | DYNAMIC FREQUENCY ADJUSTMENT FOR INTEROPERABILITY OF DIFFERENTIAL CLOCK RECOVERY METHODS - A system and method for dynamic frequency adjustment for interoperability of differential clock recovery, including one or more of the following: a frequency generator for receiving a frequency reference clock signal and generating a plurality of frequency signals by operating on the frequency reference clock signal, the plurality of frequencies signals being output from the frequency generator and each having a different frequency; a flexible distributor for receiving the plurality of frequency signals from the frequency generator and selecting ones of said plurality of frequency signals and transmitting said selected ones of said plurality of frequency signals; and a plurality of differential units, each for receiving one of said selected ones of said plurality of frequency signals, each for applying a differential signal to said selected ones of said plurality of frequency signals, and each for adding time stamps to the selected ones of said plurality of frequency signals and outputting respective time stamped differential selected frequency signals. | 2011-08-04 |
20110191622 | COMPUTER SYSTEM AND BOOT CONTROL METHOD - When a primary computer is taken over to a secondary computer in a redundancy configuration computer system where booting is performed via a storage area network (SAN), a management server delivers an information collecting/setting program to the secondary computer before the user's operating system of the secondary computer is started. This program assigns a unique ID (World Wide Name), assigned to the fibre channel port of the primary computer, to the fibre channel port of the secondary computer to allow a software image to be taken over from the primary computer to the secondary computer. | 2011-08-04 |
20110191623 | METHOD FOR TRANSMITTING AND NEGOTIATING NETWORK-CONTROLLED FUNCTIONAL DATA BETWEEN A CLIENT AND A SERVER - The invention relates to a method for transmitting control data in a telecommunication network for controlling a service administered by the telecommunication network, especially a server connected to the telecommunication network. According to said method, the telecommunication network provides a data object, especially a contact of an address book, with a function that is special with respect to other data objects. A parameterized message is transmitted by the terminal device for telecommunication via the telecommunication network to a higher order system component of the telecommunication network, said message comprising at least one first parameter for characterizing the data object and a second parameter containing a control information, especially for the activation, deactivation or modification of the service. The higher order system component checks at least one of parameters and the service is controlled depending on the result of the check and in accordance with the control parameter. | 2011-08-04 |
20110191624 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR PROVIDING INSTANTANEOUS FAILOVER OF PACKET PROCESSING ELEMENTS IN A NETWORK - Systems, methods, and computer program products for providing instantaneous failover of packet processing elements in a network are disclosed. According to one aspect, the subject matter described herein includes a system for providing instantaneous failover of packet processing elements in a network. The system includes a plurality of packet processing elements for processing packets in a network and a packet distribution module for maintaining information about the operating status of each element of the plurality of packet processing elements, for maintaining information about packet flows being processed by the packet processing elements, and, for each packet flow, assigning one of the plurality of packet processing elements as the primary element for the packet flow and assigning another of the plurality of packet processing elements as the secondary element for the packet flow. The packet distribution module routing packets to the packet processing elements according to the operating status of the packet processing elements that have been assigned to the packet flow with which the packets are associated. | 2011-08-04 |
20110191625 | CONTROLLING THE STATE OF DUPLEXING OF COUPLING FACILITY STRUCTURES - A coupling facility is coupled to one or more other coupling facilities via one or more peer links. The coupling of the facilities enables various functions to be supported, including the duplexing of structures of the coupling facilities. Duplexing is performed on a structure basis, and thus, a coupling facility may include duplexed structures, as well as non-duplexed or simplexed structures. | 2011-08-04 |
20110191626 | Fault-tolerant network management system - The fault-tolerant network management system is a hierarchical system having two Manager-of-Managers (MoM) that are implemented at the highest layer in an active-passive mode. A middle layer includes Mid-Level Managers (MLMs), which are used to manage agents disposed throughout different areas of the network at the lowest layer. The MLMs relieve the MoM from dealing with individual agents, and hence enhance the scalability of the whole Network Management Systems. MLMs are configured to work in pairs, where each pair includes two MLMs working in an active-active mode. The MoMs and MLMs have the capability of backing each other up in the case of a failure. | 2011-08-04 |
20110191627 | System And Method for Handling a Failover Event - A system comprising a memory storing a set of instructions executable by a processor. The instructions being operable to monitor progress of an application executing in a first operating system (OS) instance, the progress occurring on data stored within a shared memory area, detect a failover event in the application and copy, upon the detection of the failover event, the data from the shared memory area to a fail memory area of a second instance of the OS, the fail memory area being an area of memory mapped for receiving data from another instance of the OS only if the application executing on the another instance experiences a failover event. | 2011-08-04 |
20110191628 | COMPUTER PROGRAM, METHOD, AND APPARATUS FOR CONTROLLING DATA ALLOCATION - A computer executes a data allocation control program to control allocation of data in a plurality of disk nodes. A redundancy restoration module executes a redundancy restoration procedure by commanding disk nodes to create a new copy of redundancy-lost data. An error message reception module receives a write error message indicating a write error in a storage device during the redundancy restoration procedure and records an identifier of the faulty storage device in an error record memory. A copy command module identifies accessed data in the faulty storage device and commands a relevant disk node to create a copy of the identified data in the faulty storage device in the case where there is no redundant copy of the data. | 2011-08-04 |
20110191629 | STORAGE APPARATUS, CONTROLLER, AND METHOD FOR ALLOCATING STORAGE AREA IN STORAGE APPARATUS - A storage apparatus for storing data includes a plurality of physical media provided with storage areas to store data, a storage group determining unit configured to determine, upon detecting a request to write new data to a virtual volume to be accessed, a storage group from which to allocate storage area by selecting a storage group from among a plurality of storage groups made up of the plurality of physical media, wherein the selected storage group is other than any storage groups that include a physical medium where a failure has occurred, and a storage area allocator configured to allocate storage area on the physical media existing within the storage group that was determined by the storage group determining unit to the virtual volume, the size of the storage area corresponds to the data size of the new data. | 2011-08-04 |
20110191630 | DIAGNOSING A FAULT INCIDENT IN A DATA CENTER - A method, computer program product and apparatus for diagnosing a fault incident in a data center. A determination is made as to whether a fault incident happened in the data center. If a fault incident happened, then the business logic being executed in a node where the fault incident happened is determined. The log files associated with the execution process of the business logic is selected based on a management model corresponding to the data center, where the management model reflects the deployment and application dependency of the business logics. The fault incident is diagnosed based on the log files. The management model is utilized to select the log files associated with the execution process of the business logic, and to write information of the business logic and dependency relationships between the applications into the log file, so as to automatically, rapidly and accurately diagnose the fault incident. | 2011-08-04 |
20110191631 | INFORMATION PROCESSING APPARATUS, COMMUNICATION APPARATUS, WIRELESS DIAGNOSIS METHOD AND PROGRAM - An information processing apparatus includes: a first communication section which communicates with an external device having a diagnosis function of a network using a first communication method; a second communication section which communicates with the external device using a second communication method; a first transmission section which transmits a diagnosis request to the external device through the first communication section; and a second transmission section which transmits a diagnosis signal to the external device through the second communication section, after transmission of the diagnosis request. | 2011-08-04 |
20110191632 | SMALL FORM FACTOR PLUGGABLE (SFP) CHECKING DEVICE FOR READING FROM AND DETERMINING TYPE OF INSERTED SFP TRANSCEIVER MODULE OR OTHER OPTICAL DEVICE - A SFP checking device (SFP Check) connects to a SFP transceiver and a PC or laptop via a USB cable. The SFP Check uses the default web browser of the PC, without an internet connection, to display details of the SFP transceiver such as wavelength, description, range, manufacturer, among other information, in accordance with program code provided to the PC via the SFP Check. All of the information a technician in the field needs to determine which SFP transceiver is the right one for a selected application and optical link is available from the SFP Check. The SFP Check and SFP transceiver both receive power via the USB cable connection to the PC. The SFP Check appears to the PC as a memory stick. A method is provided for determining the drive letter associated with the SFP Check and the program coder or file(s) it provides to the PC. | 2011-08-04 |
20110191633 | PARALLEL DEBUGGING IN A MASSIVELY PARALLEL COMPUTING SYSTEM - A method and apparatus is described for parallel debugging on the data nodes of a parallel computer system. A data template associated with the debugger can be used as a reference to the common data on the nodes. The application or data contained on the compute nodes diverges from the data template at the service node during the course of program execution, so that pieces of the data are different at each of the nodes at some time of interest. For debugging, the compute nodes search their own memory image for checksum matches with the template and produces new data blocks with checksums that didn't exist in the data template, and a template of references to the original data blocks in the template. Examples herein include an application of the rsync protocol, compression and network broadcast to improve debugging in a massively parallel computer environment. | 2011-08-04 |
20110191634 | TEST-OPERATION CONTROL APPARATUS, SYSTEM, AND METHOD - A test-operation control apparatus, system and method are disclosed to reduce time and cost required for test operation by automatically performing test-operation on a control point of facilities installed on site based on a previously established template sequence and operational conditions of the situation on the spot. The test-operation control apparatus includes: a storage unit configured to store a basic sequence with respect to each of one or more control points set in the facilities installed on the spot (or site); an input unit configured to selectively receive one or more of the control points and receive operational conditions of each basic sequence with respect to each of the one or more of the selected control points; and a controller configured to combine the basic sequences with respect to each of the one or more of the selected control points according to the inputted operational conditions to generate a test-operation sequence. | 2011-08-04 |
20110191635 | NOISY MONITOR DETECTION AND INTERMITTENT FAULT ISOLATION - A method of detecting and diagnosing system faults, includes detecting the noisy status of a monitor during operations and incorporating a quantified monitor uncertainty level to support fault isolation reasoning. A sequential probability ratio test is used to statistically test the noisy status of a monitor and Shannon's entropy theory is used to quantify the uncertainty levels of the monitor to support the use of the monitor values in fault isolation. | 2011-08-04 |
20110191636 | Microprogrammable Device Code Signature - A microprogrammable electronic device has a code memory storing a software and/or firmware code having instructions. The microprogrammable electronic device is configured to compute a signature of the code stored in the code memory, and to detect any corruption of the code stored in the code memory on the basis of the computed signature. The microprogrammable electronic device is characterized by being further configured to operate according to instruction cycles, each divided into a respective first and a respective second operating phase; to read a first instruction from the code memory at the first operating phase of an instruction cycle; to decode and execute the read first instruction at the second operating phase of the instruction cycle; to read a second instruction from the code memory at the second operating phase of the instruction cycle; and to compute the signature on the basis of the read second instruction. | 2011-08-04 |
20110191637 | Method and apparatus for SAS speed adjustment - A method for maintaining reliable communication between a command initiator and a target device is provided. After the command initiator detects an error corresponding to the target device and a path between the command initiator and the target device, the command initiator performs a downshift evaluation. The initiator maintains a transmission speed if the downshift evaluation determines that forgoing a transmission speed downshift is required, and reduces the transmission speed if the downshift evaluation determines that transmission speed downshift is required. The command initiator then logs the downshift evaluation result and reports any transmission speed change to a user. | 2011-08-04 |
20110191638 | PARALLEL COMPUTER SYSTEM AND METHOD FOR CONTROLLING PARALLEL COMPUTER SYSTEM - A parallel computer system includes a first, a second, and a third apparatuses. The first apparatus includes a first arithmetic processing unit that stores first information regarding execution of a first program stored in a first area of a first storage device in a second area of the first storage device, outputs the first information, and sends a first notification of output of the first information. The second apparatus includes a second arithmetic processing unit that stores second information regarding execution of a second program stored in a third area of a second storage device in a fourth area of the second storage device, receives the first notification from the first apparatus, and outputs the second information. The third apparatus includes a third arithmetic processing unit that stores the first information and the second information in a third storage device. | 2011-08-04 |
20110191639 | STORAGE SYSTEM AND CONTROL METHOD - Provided are a storage system and its control method having superb functionality of being able to notify an administrator of the extent of impact of a pool fault in an easy and prompt manner. The foregoing storage system and its control method manage a storage area provided by a storage medium by dividing it into multiple pools, provide a virtual logical device to a host system, dynamically allocate a storage area to the logical device according to a data write request from the host system for writing data into the logical device, move data that was written into the logical device to another pool according to the access status from host system to such data, identify, when a fault occurs in any one of the pools, an extent of impact of the fault based on the correspondence relationship of the logical device and the pool, and notify the identified extent of impact of the fault to an administrator. | 2011-08-04 |
20110191640 | SEMICONDUCTOR MEMORY DEVICE - A memory device and a method of controlling the memory device are provided, comprising: generating commands at a memory controller; counting a number of commands in response to a clock signal; storing the commands and the count numbers corresponding to the commands; transmitting to a memory device the commands, the count number of the commands, and data; receiving at the memory device the commands, the count number of the commands, and data sent from the memory controller; counting at the memory device the number of commands received in response to the clock signal; storing at the memory device the count number of commands received; and transmitting the count number of the commands received to the memory controller, wherein said transmitting the count number of the command to the memory controller is performed upon indication of an error condition. | 2011-08-04 |
20110191641 | RAID DEVICE, ABNORMAL DEVICE DETECTING APPARATUS, AND ABNORMAL DEVICE DETECTING METHOD - A RAID device has a plurality of HDDs for a RAID configuration and controls the RAID configuration. The RAID device has a host that performs various data processes on the HDDs and a control unit that controls communication with the HDDs. With this configuration, if an initialization process for assigning physical addresses unique to the HDDs is performed, the RAID device receives initialization frames from the HDDs. Then, the RAID device detects abnormality of the HDDs in accordance with information contained in the received initialization frames. | 2011-08-04 |
20110191642 | METHOD AND APPARATUS FOR PROVIDING INTELLIGENT ERROR MESSAGING - A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. | 2011-08-04 |
20110191643 | Detection And Diagnosis Of Scan Cell Internal Defects - A diagnosis technique to improve scan cell internal defect diagnostic resolution using scan cell internal fault models. | 2011-08-04 |
20110191644 | Method and apparatus for SAS speed adjustment - A method for maintaining reliable communication on a bidirectional communication link is provided. A receiver on the bidirectional communication link detects an error and maintains a count of detected errors. The transmitter on the bidirectional communication link polls the receiver in order to determine the count of detected errors, and performs a downshift evaluation for the bidirectional communication link. In response to performing the downshift evaluation for the bidirectional communication link, the transmitter maintains a transmission speed of the bidirectional communication link if the downshift evaluation determines that forgoing transmission speed downshift is required for the bidirectional communication link, and reduces the transmission speed of the path if the downshift evaluation determines that transmission speed downshift is required for the bidirectional communication link. | 2011-08-04 |
20110191645 | METHOD AND APPARATUS FOR ADJUSTING NUMBER OF ITERATIONS IN ITERATIVE DECODING PROCEDURE - In a method of determining an iteration value for an iterative decoding process of a hard disk drive, a bit error rate (BER) of a digital signal is measured in multiple iterations. A difference is calculated between BERs of consecutive iterations, and the calculated differences are compared with a reference value. An adjusted iteration value is then determined based on the comparison. | 2011-08-04 |
20110191646 | Fault-and Variation-Tolerant Energy - and Area-Efficient Links for Network-on-Chips - The present invention provides methods for detecting and correcting transmission errors in inter-router links of Network-on-Chip (NoC) architectures. A NoC has repeaters along its bus lines. The output of a main repeater is compared and multiplexed with the output of a shadow repeater. If these outputs are the same the multiplexer outputs the output of the main repeater, otherwise an error is detected and the multiplexer outputs the output of the shadow repeater. | 2011-08-04 |
20110191647 | COMMUNICATION INTERFACE AND PROTOCOL - An apparatus includes a receiver, an error detection unit, and an acknowledgement unit. The receiver may receive frames of data from a transmitter unit of a second apparatus via a first communication path. The error detection unit may detect data errors in the frames of data received via the first communication path. The acknowledgment unit may maintain an acknowledgement indicator indicative of whether frames received by the apparatus are error free. In response to the error detection unit detecting an error, the acknowledgement unit may indicate an error condition exists by freezing a value of the acknowledgement indicator, or alternatively the acknowledgement unit may set a current value of the acknowledgement indicator to a predetermined error value. Further, the apparatus may successively convey values of the acknowledgement indicator to the second apparatus via a second communication path while the apparatus is receiving frames. | 2011-08-04 |
20110191648 | INFORMATION PROCESSING APPARATUS, INFORMATION TRANSMITTING METHOD, AND INFORMATION RECEIVING METHOD - A transmitting-side device and a receiving-side device are connected to each other with a parallel bus that carries transmit data and an error-correcting code based on this transmit data in parallel. The transmitting-side device includes a signal inversion unit for inverting a signal to be sent to the parallel bus. The receiving-side device includes a signal inversion unit for inverting a received signal from the parallel bus, and an error detection unit for performing error detection and error correction based on a signal output from the signal inversion unit. The signal inversion unit of the transmitting-side device inverts a signal to be sent to all bus lines of the parallel bus and the signal inversion unit of the receiving-side device inverts the signal received from the all bus lines, which enables the error detection unit to perform error check on the parallel bus. | 2011-08-04 |
20110191649 | SOLID STATE DRIVE AND METHOD OF CONTROLLING AN ERROR THEREOF - The present general inventive concept relates to a solid state drive and a method of controlling an error thereof. A flash translation layer includes a parity managing module to correct errors. A block address of a storage medium including error data that can be recovered is managed through the parity managing module. Parity data of a block including error data is generated through the parity managing module. The generated parity data is managed through the parity managing module. The generated parity data can be stored in an assigned area of the storage medium. When data of a block managed by the parity managing module is not recovered by an error correction code unit, error data is recovered with reference to the generated parity data. | 2011-08-04 |
20110191650 | Cyclic Shift Device, Cyclic Shift Method, LDPC Decoding Device, Television Receiver, and Reception System - The present invention relates to a cyclic shift device, a cyclic shift method, an LDPC decoding device, a television receiver, and a reception system, whereby reduction in size of a device can be realized. | 2011-08-04 |
20110191651 | TWO-PLANE ERROR CORRECTION METHOD FOR A MEMORY DEVICE AND THE MEMORY DEVICE THEREOF - In order to correct errors of a first page on one plane in a two-plane NAND flash memory, use data of a second page on another plane to mix the encoding and leverage the error correction code of the first page. Each of the error correction codes of the first page and the second page is divided into an inner correction code and a cross correction code. The inner correction codes are used to correct errors of their own pages and the cross correction codes are used to correct errors of two distinct groups, grouped from the even and odd bytes of the two pages respectively. The second page, with fewer errors, is therefore used to enhance the correcting ability of the first page, without lengthening the error correction code of the first page. | 2011-08-04 |
20110191652 | MEMORY READ-CHANNEL WITH SELECTIVE TRANSMISSION OF ERROR CORRECTION DATA - A memory read-channel is provided with selective transmission of error correction data. The disclosed read-channel improves throughput and reduces power consumption when error correction codes are unnecessary. The data read from a memory device comprises user data, error detection data and error correction data. In one embodiment, the error detection data is evaluated to determine if there is a data error; and the error correction data is transmitted only if a data error is detected. In another variation, the error detection data is evaluated during data transmission to determine if there is a data error and the transmission is suspended if a data error is detected. Typically, the error detection data comprises a cyclic redundancy check and the error correction data comprises parity check data. | 2011-08-04 |
20110191653 | QUASI-CYCLIC LDPC ENCODING AND DECODING FOR NON-INTEGER MULTIPLES OF CIRCULANT SIZE - In processing quasi-cyclic low-density parity-check (QC-LDPC) data, an input signal is received which includes decision and reliability information corresponding to unpadded data. Decision and reliability information corresponding to padded data is introduced into the input signal. Message passing is performed one or more times to obtain decoded data. This includes using (1) the decision and reliability information corresponding to the unpadded data and (2) the decision and reliability information corresponding to the padded data, where a preference is given to the decision and reliability information corresponding to the padded data over the decision and reliability information corresponding to the padded data during message passing. Zero padding is removed from the decoded data. | 2011-08-04 |
20110191654 | ADJUSTABLE ERROR CORRECTION CODE LENGTH IN AN ELECTRICAL STORAGE DEVICE - An apparatus includes a memory that is allocated to reported portions and overprovisioned portions. The apparatus includes an error correction circuit that communicates with the memory in error correction coded data that has a controllable ECC length. The ECC length is a function of a history of error reports. A memory allocation engine balances a size of the overprovisioned portions to maintain a size of the reported portions. The balancing is performed as a function of an average of ECC lengths in the ECC length table over a time interval in which a size of the memory decreases with accumulated erase cycles of the memory. | 2011-08-04 |
20110191655 | MEMORY ARRAY ERROR CORRECTION APPARATUS, SYSTEMS, AND METHODS - Various embodiments include apparatus, methods, and systems that operate to extend the processes of reading, modifying, and writing data stored in or being provided to a memory array without interrupting a continual stream of data to be written into the memory array. Embodiments may include an apparatus comprising a memory array, and an error code module coupled to the memory array with a data buffer having a plurality of data burst registers operable to receive a plurality of data bursts to be written to the memory array on a corresponding plurality of consecutive clock cycles. The error code module is operable to perform a read/modify/write process on each of the plurality of data bursts within a time period no longer than a period of two consecutive cycles of the plurality of consecutive clock cycles. | 2011-08-04 |
20110191656 | Systems for High-Speed Backplane Applications Using Pre-Coding - In conventional Backplane Ethernet systems, data is transmitted over two pairs of copper traces in one direction using a PAM-2 scheme and a baud rate of 10.3125 GHz, giving an effective bit rate of 10.3125 Gbps. The rate at which data can be transmitted in Backplane Ethernet systems, while still being reliably received, is typically limited by ISI caused by the dispersive nature of the copper traces, frequency dependent transmission losses caused primarily by skin effect and dielectric loss of the copper traces, and cross-talk from adjacent communication lines. The present invention is directed to systems for overcoming these and other signal impairments to achieve speeds up to, and beyond, twice the conventional 10 Gbps limit associated with Backplane Ethernet systems. | 2011-08-04 |
20110191657 | Systems for High-Speed Backplane Applications Using FEC Encoding - In conventional Backplane Ethernet systems, data is transmitted over two pairs of copper traces in one direction using a PAM-2 scheme and a baud rate of 10.3125 GHz, giving an effective bit rate of 10.3125 Gbps. The rate at which data can be transmitted in Backplane Ethernet systems, while still being reliably received, is typically limited by ISI caused by the dispersive nature of the copper traces, frequency dependent transmission losses caused primarily by skin effect and dielectric loss of the copper traces, and cross-talk from adjacent communication lines. The present invention is directed to systems for overcoming these and other signal impairments to achieve speeds up to, and beyond, twice the conventional 10 Gbps limit associated with Backplane Ethernet systems. | 2011-08-04 |
20110191658 | Method and Apparatus for Storing Data - When coding user data, it may be desirable to mark user data as invalid. This may arise, by way of example, in applications in which a stored data item needs to be updated by virtue of an updated data item additionally being stored and the old stored data item being marked as invalid. In order to mark the invalidity of a stored data item by means of the value of the data item and to be able to apply an error-recognizing or error-correcting coding dependably, the user data are extended by supplementary data and the coding is applied to the extended user data. | 2011-08-04 |
20110191659 | SYSTEM AND METHOD PROVIDING FAULT DETECTION CAPABILITY - A system and method for providing fault detection capability is provided which comprises a first node ( | 2011-08-04 |
20110191660 | Apparatus, System, and Method for Specifying Intermediate CRC Locations in a Data Stream - An apparatus, system, and method are disclosed for determining the location of intermediate CRC in a data stream sent from a channel subsystem to a control unit of an I/O processing system. A CRC locating module determines the location of at least one intermediate CRC in a transport data information unit. A CRC offset module determines a CRC offset of the at least one intermediate CRC. The CRC offset is a value identifying the difference between the location of the at least one intermediate CRC and the location of the first byte of user data in the transport data information unit. An offset block creation module creates a CRC offset block which includes a CRC offset value for each of the at least one intermediate CRC within the transport data information unit and a transmission module transmits the COB to a control unit in the I/O processing system. | 2011-08-04 |
20110191661 | EDITING TIME-BASED MEDIA WITH ENHANCED CONTENT - Creation of a program with interactive content and time-based media would be improved by having several people working simultaneously on both the interactive content and the time-based media. The range of types of data that can be associated with the time-based media also can include a variety of types of content that enhance the time-based media, including data that is opaque to the editing system. To support editing of such programs, enhanced content may be edited into a program as either a clip or a locator, according to a user's selection. The components that represent enhanced content also may be edited in the same way as components that represent time-based media. Enhanced content may be represented by enhancement files that include data defining enhancements. An enhancement includes an identifier of the enhancement within the enhancement file, and a reference to a file defining enhanced content associated with the enhancement. Such enhancement files may be imported into a bin of an editing system to create components that describe the enhanced content referenced by the enhancements. The enhanced content may be modified using native applications for the enhanced content during editing of the program. The components describing the enhanced content in the editing system can be updated using identifiers of the enhanced content that are stored by the components. Enhanced content also may be automatically synchronized with time-based media. | 2011-08-04 |
20110191662 | TRAVEL GUIDES FORMED BY AGGREGATION OF LOCATION-AWARE CONTENT FROM MULTIPLE PUBLISHERS THROUGH A UNIFIED INTERFACE - The present invention relates to the field of publishing and distributing information on a network. More particularly, the present invention relates to systems, methods, and devices for identifying multiple published entities each having electronic-based content of interest for a user, selecting portions of the e-content based on user preferences, aggregating the portions of e-content into a virtual compilation of e-content (e.g., virtual book) in a manner such that the portions of e-content appear to originate from the compilation and not the original source. The present invention is particularly advantageous in the travel guide industry where now portions of several larger travel guides can be aggregated together to provide mobile device users information tailored to a mobile device user's actual, exact, approximate, or anticipated location and optionally further refined in combination with the user's personal preferences. Even further, one of the key business implications of the aggregation scheme is that a publisher can take an existing work and divide it down into a set of smaller guides, even with some overlaps in content. Then the publisher can market those smaller guides at a lower price than the single complete guide to generate higher revenues than with publishing the indivisible discrete content alone (original complete travel guide). | 2011-08-04 |
20110191663 | EFFICIENT PRESENTATION OF IMPORTANT PROFILE INFORMATION TO A PROFILE READER - The subject matter disclosed herein provides a streamlined view of an online resume, profile, or other computer-generated document representing an individual and to tailor it to a particular reader. The streamlining occurs through the use of tabs or other sectioned areas in the document so that the reader of the document can find important information about the individual more quickly. Information in the document may be prioritized according to rules set by the reader, the document owner, or pre-defined rules. | 2011-08-04 |
20110191664 | SYSTEMS FOR AND METHODS FOR DETECTING URL WEB TRACKING AND CONSUMER OPT-OUT COOKIES - An anti-tracking server includes a rendering engine for URL tracking and/or an opt-out cookie web crawler. The rendering engine is configured for emulating a browser visiting a plurality of web sites and processing elements of web content in web pages of the visited web sites. Web communication traffic generated as a result of said processing is captured and analyzed to identify URL tracking patterns. A URL tracking database reflecting identified URL tracking patterns is maintained. The opt-out cookie web crawlers are configured for visiting a second plurality of web sites, identifying hyperlinks pertaining to opt-out cookies in the second plurality of web sites, and following the identified hyperlinks to determine definitive uniform resource locators (URLs) for the opt-out cookies. An opt-out cookie database containing the definitive opt-out cookie URLs is maintained. The server coordinates with an anti-tracking application of a user device to provide the user device with access to information in the URL tracking database and information indicative of the definitive URLs. | 2011-08-04 |
20110191665 | SYSTEM AND METHOD FOR DYNAMIC DATA ACCESS IN A SPREADSHEET WITH EXTERNAL PARAMETERS - In one aspect, the present invention relates to utilizing a spreadsheet by defining a parameter external to the spreadsheet and associating the parameter with the spreadsheet to define a parameterized workbook. In one embodiment, this utilization further comprises storing a location of the spreadsheet and storing the name of the parameter in the same storage module as the location. In another embodiment, it includes defining a result external to the spreadsheet, the result referencing one or more cells within the spreadsheet. In another embodiment, this utilization further comprises receiving a value for the parameter and generating the result based at least in part on the value and the spreadsheet. In another embodiment, it further comprises associating a type with the parameter. The type can define a range of values or attributes associated with the parameter. | 2011-08-04 |
20110191666 | ANIMATION CONTROL METHODS AND SYSTEMS - Animation control methods and systems. In one embodiment, a method to control animations includes receiving data representing content of a page (e.g. a web page), detecting, from the data, whether the page includes animated content, determining whether to halt execution of the detected animated content, and halting execution of the animated content if a determination to halt was made. In one implementation, the content can be configured into a document object model (DOM) and decisions to halt or not to halt can be made on a node-by-node basis within the DOM. In one implementation, the animated content can be allowed to execute for a shortened duration (e.g. in order to allow a user to see it) and then is halted. | 2011-08-04 |
20110191667 | Method and System for Transforming Content for Execution on Multiple Platforms - A method and system are disclosed for acquiring and transforming existing content (e.g., Hyper Text Markup Language HTML content) for display and execution on multiple platforms and architectures. In one embodiment, capture templates are created to harvest content from disparate content sources on multiple platforms. Data is extracted from the content from the disparate content sources using the created capture templates that drives extracting process. A standardized data stream is generated from the extracted data. The standardized data stream is provided for display on one or more different type of platforms. | 2011-08-04 |
20110191668 | EXTENDED CASCADING STYLE SHEETS - A CSSX (Extended Cascading Style Sheets) file including non-CSS (Cascading Style Sheet) extensions is used to define and reference variables and inheritance sets. A CSSX file compiler determines a value of the defined variable, modifies the CSSX file by replacing all references to the defined variable with the value, and generates the CSS file from the modified CSSX file. The inheritance set is defined in the CSSX file and includes a reference to a previously defined CSS rule set. The CSSX file compiler defines a new CSS rule set as a function of the determined attributes included in the previously defined CSS rule set of the defined inheritance set and generates the CSS file including the newly defined CSS rule set. | 2011-08-04 |
20110191669 | FLASH CONTENT NAVIGATION METHOD, MOBILE ELECTRONIC DEVICE, AND COMPUTER-READABLE MEDIUM - A flash content navigation method, a mobile electronic device, and a computer-readable medium are provided, wherein the flash content is embedded in a web page, and a visible area within the web page is predetermined for displaying at least a portion of the flash content. In the method, when receiving a flash navigating signal, a full screen interface is popped up. If a size of the visible area is greater than that of the touch screen, the flash content is scaled down to make the flash content displayed in the visible area fit the size of the touch screen, and the flash content displayed in the visible area is played back by a scaled size. When receiving a flash interacting signal from the touch screen, the flash interacting signal is transmitted to a flash engine to perform an action on the flash content according to the flash interacting signal. | 2011-08-04 |
20110191670 | METHOD AND SYSTEM FOR SPECIALTY IMAGING EFFECT GENERATION USING MULTIPLE LAYERS IN DOCUMENTS - A computer-implemented system and method for generating specialty imaging effects from layered documents are provided. The method includes providing a layered document that contains one or more effect layers and one or more visual layers. For each visual layer, the method includes identifying visual graphical elements within the visual layer. For each of the visual graphical elements, the method identifies, as a next effect layer, a closest effect layer above the visual layer which includes an effect graphical element that overlaps, at least in part, the identified visual graphical element. A new graphical element is created by merging at least part of the identified visual graphical element with at least part of the overlapping effect graphical element. The merging may be performed with regular specialty imaging techniques. The input layered document is transformed by replacing the identified visual graphical element on the visual layer with the new graphical element. | 2011-08-04 |
20110191671 | Website Font Previewing - Aspects of this disclosure relate to a system and method for loading and viewing a web page in a browser to preview fonts without altering the constituent elements of the web page. According to one or more aspects of this disclosure, the system may include a browser for viewing a web page and previewing fonts on the web page. According to one or more aspects of this disclosure, the method may include receiving a web page at a browser, storing a representation of the web page into a memory, rendering the representation of the web page, receiving a selection of one or more elements of the web page, receiving a font property that specifies a change to a font type and/or a font size, and applying the specified font property to the selected elements. | 2011-08-04 |
20110191672 | METHOD, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM FOR EFFICIENT AGENDA DRAFTING, SYNCHRONIZATION AND DISPLAY - The present invention relates to a method for efficient agenda drafting, synchronization and display comprising:
| 2011-08-04 |
20110191673 | APPARATUS, METHOD, AND PROGRAM FOR SUPPORTING PROCESSING OF CHARACTER STRING IN DOCUMENT - A support apparatus, computer-implemented method, and article of manufacture for supporting a processing of a character string in a document. The support apparatus includes: a document storage unit; a designation reception unit; a document acquisition unit; a historical-information storage unit; a reference-information generator; and a presentation unit. The method includes: receiving designation from a user; acquiring a document from the document storage device based on the designation by the user; reading pieces of historical information related to the acquired document from the historical-information storage device, and thereby generating reference information for helping the user to select a processing of the character string in the document; and presenting, to the user, a screen for receiving the designation of the processing of the character string in the acquired document, together with the reference information. | 2011-08-04 |