35th week of 2011 patent applcation highlights part 47 |
Patent application number | Title | Published |
20110213870 | PROVIDING SERVICES TO MULTIPLE TENANTS OF AN APPLICATION - A method, system and computer program product for providing a service to multiple tenants of an application. Responsive to receiving from a client of a tenant a request, a tenant context of the tenant is bound to the request. With respect to an access to an isolation point of the application in the request, the access to the isolation point is redirected to a partition based on the tenant context bound to the request. The partition may be pre-established for the tenant with respect to the application. Hence, it is possible to provide a multi-tenant solution in a convenient, fast, and cost-effective way, and, in turn, to achieve resource sharing to a greater extent and enhance the resource efficiency. | 2011-09-01 |
20110213871 | MACHINE-TO-MACHINE GATEWAY ARCHITECTURE AND FUNCTIONALITY - A machine-to-machine (M2M) gateway (GW) includes reachability, addressing, and repository (RAR) capability. The GW maintains a local mapping table and local device application repository, performs data aggregation, address/name translation, provides event reporting and establishes GW reachability and wake-up time. The GW supports requests from M2M applications or other capabilities within the GW, and from a network and application (N&A) domain RAR. The GW may include an M2M device and M2M gateway management (MDGM) capability that receives management requests for an M2M device and functions as a network proxy. The MDGM accepts and processes requests from the N&A domain on behalf of the M2M device and performs management functions of the M2M device on behalf of the N&A domain. The MDGM may request the N&A domain for permission to interact with the M2M device, initiate an interaction for device management tasks with the M2M device, and report to the N&A domain. | 2011-09-01 |
20110213872 | QUALITY OF SERVICE MANAGEMENT FOR MESSAGE FLOWS ACROSS MULTIPLE MIDDLEWARE ENVIRONMENTS - A method of managing information system resources to provide a message flow having a consistent level of quality of service (QoS) within and across a plurality of interconnected middleware domains is described. The method includes receiving a QoS message from a first QoS manager expressing at least one QoS requirement, translating the at least one QoS requirement to at least one parameter specific to a messaging service that communicatively couples multiple middleware domains, creating a client connection between a first middleware domain and the messaging service for receiving the message flow, transmitting the QoS message to a second middleware domain, and creating a client connection between the messaging service and the second middleware domain for transmitting the message flow. | 2011-09-01 |
20110213873 | Method and Arrangement for Improved Session Setup Signaling Policing - In an improved method in a control node managing media sessions between nodes in a telecommunication network, exchanging S | 2011-09-01 |
20110213874 | LOST COMPUTING RESOURCE NOTIFICATION - Some embodiments of a system and a method to notify applications of lost computing resources have been presented. For instance, a processing device running on a client machine can monitor a computing resource used by an application, which also runs on the client machine. If the computing resource is lost, then the processing device can notify the application of the loss and provides details about the lost computing resource to the application so that the application can take appropriate action in response to the loss. | 2011-09-01 |
20110213875 | Methods and Systems for Providing Deployment Architectures in Cloud Computing Environments - A decision system for providing customized deployment architectures to users of a cloud computing environment. The decision system can identify one or more parameters for analyzing applications and processes running in a cloud, monitor the applications and processes executed in the cloud, and collect information such as usage of cloud resources, number and type of computing processes instantiated, software programs utilized by the computing processes. The decision system can then generate customized deployment architectures based on the collected information. | 2011-09-01 |
20110213876 | USING A SERVICE DISCOVERY REQUEST TO FIND AVAILABLE DEVICES - The described embodiments provide an electronic device for forming a network connection. In the described embodiments, a first electronic device determines that a network connection is to be made to at least one other electronic device to access a service on the other electronic device. The first electronic device then searches for available electronic devices that provide the service. Prior to finding a second electronic device that provides the service, the first electronic device receives a request from the second electronic device to access a related service provided by the first electronic device. In these embodiments, the request is received on a network connection formed by the second electronic device between the second electronic device and the first electronic device. Based on the received request, the first electronic device then uses the network connection formed by the second electronic device to communicate with the second electronic device. | 2011-09-01 |
20110213877 | Self Healing Networking Device Systems And Related Methods - In one embodiment, a networking system can comprise a networking device comprising an operating system module and performance management modules. The performance management modules can comprise at least one of a channel hopping module or a channel bonding module. The channel hopping module can switch the networking device from a first channel to a second channel having less interference than the first channel. The channel bonding module can toggle the networking device between a single-channel communications mode and a bonded channel communications mode via a plurality of bonded channels. The operating system module can actuate at least one of the performance management modules to sustain a performance level of the networking device in response to one or more triggering events from a performance review operation executed by the operating system module. Other examples and related methods are described herein. | 2011-09-01 |
20110213878 | METHOD AND SYSTEM FOR MONITORING A SECURITY-RELATED SYSTEM - A system for monitoring a security-related system has a monitoring device on which a first process occurs. The monitoring device generates a monitoring result which is transmitted to another device that forms at least part of the security-related system. Accordingly, a second monitored process of the security-related system returns the received monitoring result to the first process for testing in order to calculate a processing result. | 2011-09-01 |
20110213879 | Multi-level Decision Support in a Content Delivery Network - A content delivery network (CDN) is provided with a multi-tiered decision-support system. Client-side metrics managers collect link-performance data from client devices for formulating requests for network resources from the CDN. Network-node metrics managers broker the network resources from the CDN to the clients based on data collected from the client-side metrics managers. A node-cloud metrics manager distributes the network resources between a plurality of network nodes based on data collected from the network-node metrics managers. When the CDN includes a wireless network, formulating the requests and/or brokering the network resources may be adapted based on network performance data corresponding to the wireless network. | 2011-09-01 |
20110213880 | System and method for performing capacity planning for enterprise applications - A system and method for capacity planning for enterprise networks, such as identifying bottlenecks and removing or replacing the bottleneck device are provided. The device utilization for one or more network devices are measured or read from measured data. A relative load is calculated from the device utilization data and device utilization is compared to a device threshold to determine the bottleneck device. A method is also provided for determining network utilizations, network populations and a relative response times based on only limited measurable device usage data. | 2011-09-01 |
20110213881 | Digital Living Network Alliance (DLNA) Enabled Portable Electronic Devices and DLNA Management Consoles - Digital living network alliance (DLNA) enabled portable electronic devices are provided that include a DLNA device circuit and a DLNA management console circuit. The DLNA device circuit is configured to attach the portable electronic device to an existing DLNA network having at least one existing DLNA management console so as to allow the portable electronic device to be a source for data on the existing DLNA network. The DLNA management console circuit is configured to enable the portable electronic device to operate as a portable management console for the existing and/or a new DLNA network. Related management consoles and methods of operating DLNA enabled portable electronic devices are also provided. | 2011-09-01 |
20110213882 | Method and system for handling computer network attacks - A method and apparatus for serving content requests using global and local load balancing techniques is provided. Web site content is cached using two or more point of presences (POPs), wherein each POP has at least one DNS server. Each DNS server is associated with the same anycast IP address. A domain name resolution request is transmitted to the POP in closest network proximity for resolution based on the anycast IP address. Once the domain name resolution request is received at a particular POP, local load balancing techniques are performed to dynamically select the appropriate Web server at the POP for use in resolving the domain name resolution request. Approaches are described for handling bursts of traffic at a particular POP, security, and recovering from the failure of various components of the system. | 2011-09-01 |
20110213883 | SYSTEM AND METHOD FOR OBJECT MIGRATION USING WAVES - A system and method for information technology (IT) migration includes determining a relationship among objects to be migrated such that the relationship includes a set of objects having at least one of a common feature or dependency between the objects in the set. The objects are grouped into a plurality of migration waves such that cross-wave relationships are minimized among the plurality of migration waves. The objects are migrated wave by wave. | 2011-09-01 |
20110213884 | METHODS AND SYSTEMS FOR MATCHING RESOURCE REQUESTS WITH CLOUD COMPUTING ENVIRONMENTS - A matching system can provide matching services to users of cloud computing environments. The matching system can receive user requests for sets of services. Once received, the matching system can collect information about available cloud appliances. The matching system can match the cloud appliances with the user requested services and provide the user with information related to available cloud appliances that meet the user's request. | 2011-09-01 |
20110213885 | Automating Application Provisioning for Heterogeneous Datacenter Environments - Disclosed are methods and systems to automate the provisioning and deployment of application instances within a heterogeneous data center. In one embodiment, the application provisioning is performed based upon a blueprint and deployment model defining requirements of the provisioned application. In another embodiment, the totality of available resources for provisioning is divided into different segments. When resources are requested and assigned to an incoming provisioning request, the resource pool may be refreshed or augmented as defined by thresholds or forecasting of user needs. The resource pool may be refreshed by recapturing allocated resources that are no longer in use or by configuring resources taken from the reserve. Further, when reserve resources are not available or are below a minimum reserve threshold, capacity planning actions may be initiated or advised. | 2011-09-01 |
20110213886 | Intelligent and Elastic Resource Pools for Heterogeneous Datacenter Environments - Disclosed are methods and systems for intelligent resource pool management of heterogeneous datacenter resources. In one embodiment, intelligent resource pool management is utilized to assist in application provisioning performed based upon a blueprint and deployment model defining requirements of the provisioned application. In other embodiments, intelligent resource pool managers are configured to work in concert with other intelligent resource pool managers and/or a centralized provisioning engine. Resource pools may also be configured in a hierarchical manner whereby higher level resource pools may automatically draw resources from lower level resource pools as directed by one or more intelligent resource pool managers. | 2011-09-01 |
20110213887 | SCHEDULABLE TRANSPORT FOR CONTRIBUTION SERVICES - In one embodiment a method includes receiving a request to schedule an audiovisual data streaming session, the request including an identifier of an encoder, a session time and an identifier of an invitee, generating a command configured to cause the encoder to begin encoding audiovisual content at the session time, and to stream encoded audiovisual content via the network, receiving an indication that the invitee has joined the audiovisual data streaming session, and generating a command configured to cause an audiovisual decoder designated by the invitee to begin decoding the encoded audiovisual content upon receipt of the encoded audiovisual content. | 2011-09-01 |
20110213888 | METHOD AND APPARATUS FOR SCREENING REQUEST TO ESTABLISH SIP SESSION - A method and apparatus for screening a request to establish a SIP session is provided. The method may include a) receiving a request to establish a SIP session at a network node of an internet protocol network and incrementing a counter, b) determining whether the request includes a resource priority parameter with an elevated priority value and, if so, incrementing a counter, c) comparing a ratio of the priority request count to the total request count to a threshold, and d) processing each request that includes the elevated priority value using more comprehensive screening after the ratio exceeds the threshold, allowing processing for each request that includes the elevated priority value to continue in accordance with the elevated priority value after the ratio does not exceed the threshold, and allowing processing for each request that does not include the elevated priority value to continue in accordance with a routine priority. | 2011-09-01 |
20110213889 | Method For Configuring At Least One Communications Link For Transmitting Medical Image Datasets And System For Managing And/Or Processing Medical Image Datasets - A method is disclosed for configuring at least one communications link for transmitting medical image datasets by means of a special transmission protocol, in particular the DICOM protocol, from a first computing device to at least one second computing device, in particular a plurality of different second computing devices. In at least one embodiment, the transmission performance is determined automatically at the first computing device for a plurality of sets of configuration parameters of the communications link and the set of configuration parameters having the best transmission performance is selected for the configuration. | 2011-09-01 |
20110213890 | METHOD FOR RECOVERY OF A CONTROLLED FAILOVER OF A BORDER GATEWAY PROTOCOL SPEAKER - A method and apparatus for recovering from a controlled failover of a BGP speaker is provided. A user sends, to a network element, a request to switch a designation of an active Border Gateway Protocol (BGP) speaker of the network element from a first BGP speaker to a second BGP speaker. After receiving the request, the network element pauses operation of a transport for BGP. Routing data, which describes a state of a first routing information base (RIB) maintained by the active BGP speaker, is transferred from the first BGP speaker to the second BGP speaker. Thereafter, the first BGP speaker may instruct the second BGP speaker to become the active BGP speaker. After the second BGP speaker becomes the active BGP speaker, the second BGP speaker resumes operation of the BGP transport. | 2011-09-01 |
20110213891 | INTEGRATED HOME SERVICE NETWORK - The present invention provides a centralized home controller that is used to coordinate a plurality of associated packet communication clients. The home controller provides a centralized and unified control and messaging system for the various packet communication clients. The home controller also allows the packet communication clients to establish and control packet sessions among the associated packet communication clients, as well as between any one of the packet communication clients and remote clients. The packet communication clients are provided in consumer electronics devices, and the associated packet sessions support data, voice, audio, or video content. In one embodiment, the home controller acts as a proxy for the various communications between the packet communication clients. | 2011-09-01 |
20110213892 | MEDIA FOUNDATION MEDIA PROCESSOR - A system and method for a media processor separates the functions of topology creation and maintenance from the functions of processing data through a topology. The system includes a control layer including a topology generating element to generate a topology describing a set of input multimedia streams, one or more sources for the input multimedia streams, a sequence of operations to perform on the multimedia data, and a set of output multimedia streams, and a media processor to govern the passing of the multimedia data as described in the topology and govern the performance of the sequence of multimedia operations on the multimedia data to create the set of output multimedia streams. The core layer includes the input media streams, the sources for the input multimedia streams, one or more transforms to operate on the multimedia data, stream sinks, and media sinks to provide the set of output multimedia streams. | 2011-09-01 |
20110213893 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DETECTING AN IDLE TCP CONNECTION - Methods and systems are described for detecting an idle TCP connection. In one aspect, a packet in a TCP connection is received by a first node. The first node identifies in the packet a header for detecting a time period during which the first node receives no data included in a data stream sent in the connection from a second node. The first node detects the time period based on the header and deactivates the connection, in response. In another aspect, information is received by a second node for detecting an idle TCP connection. The second node creates a packet including a header based on the information. The second node sends the packet in the connection to a first node for detecting a time period during which the first node receives no data in a data stream sent in the connection from the second node. | 2011-09-01 |
20110213894 | MECHANISM FOR SUPPORTING USER CONTENT FEEDS - In one embodiment, for each one of one or more content producers, access a content-producing rate at which the content producer produces one or more items of content; and for each one of one or more content consumers, access a content-consuming rate at which the content consumer consumes one or more items of content. For each one of a plurality of consumer-producer pairs, wherein the consumer-producer pair comprises one of the content consumers and one of the content producers, and the content consumer follows the content producer, select between a push strategy and a pull strategy for delivering one or more items of content from the content producer to the content consumer based on the content-consuming rate of the content consumer and the content-producing rate of the content producer. | 2011-09-01 |
20110213895 | APPARATUS FOR SUPPORTING CREATION OF ACCESS PATH FROM HOST TO LOGICAL VOLUME - A path creation support apparatus acquires either a portion of the parameters required for path creation or parameter decision information for deciding this portion of the parameters from a storage system or a host. The path creation support apparatus decides the portion of the parameters based on the parameter decision information. Upon receiving an access path creation start request, the path creation support apparatus sends an access path creation indication to the host and the storage system which specifies the parameters together with the access path creation start request, and either the parameters acquired beforehand or the acquired parameters decided based on the parameter decision information. | 2011-09-01 |
20110213896 | IMS RESTORATION PROCEDURES FOR MULTIPLE CONTACTS - In one aspect, the invention provides a method, and associated apparatus for re-registering a contact address of a user of an IP Multimedia Subsystem, IMS, network. A request for re-registration of the contact address is received at a Serving-Call Session Control Function, S-CSCF, node serving the user. After a determination that the S-CSCF has no stored information relating to the contact address, a request is sent to a Home Subscriber Server, HSS, of the user to register the contact address information. The HSS detects if the contact address information relating to the user has already been backed-up by the HSS, and notifies the node serving the user of registered contact address information backed-up by the HSS. Another aspect provides a method and associated apparatus for de-registering a registered contact address of a user of an IP Multimedia Subsystem, IMS, network. | 2011-09-01 |
20110213897 | SYSTEMS AND METHODS FOR RELEASING STALE CONNECTION CONTEXTS - Systems and methods for releasing stale connection contexts are provided herein. The systems and methods help to ensure that connection records between mobile devices and communications nodes are synchronized so as to avoid and/or fix stale connection contexts. | 2011-09-01 |
20110213898 | MOBILE DEVICE POWER MANAGEMENT IN DATA SYNCHRONIZATION OVER A MOBILE NETWORK WITH OR WITHOUT A TRIGGER NOTIFICATION - A real-time communication architecture establishes a continuous connection between an enterprise network and a communication management system. The connection is continuously held open allowing mobile devices real-time access to enterprise email systems. The real-time communication architecture can support an entire enterprise email system or individual email users. The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompanying drawings. | 2011-09-01 |
20110213899 | INFORMATION PROCESSING APPARATUS FOR CONDUCTING SECURITY PROCESSING AND SECURITY PROCESSING METHOD - An information processing apparatus that executes security processing for a storage device connected thereto, the apparatus includes a processing command storage unit that stores a plurality of processing commands related to security processing according to a type of the storage device, a determining unit that determines the type of the storage device connected thereto, an obtaining unit that obtains a processing command corresponding to the type determined by the determining unit from the processing command storage unit, and an executing unit that executes the security processing corresponding to the storage device based on the obtained processing command. | 2011-09-01 |
20110213900 | FIELD COMMUNICATION MANAGEMENT APPARATUS - There is provided a field communication management apparatus capable of setting configuration information segments with certainty without causing a burden, and an inexpedience at the time of an operation for setting. A reception unit receives download information. A setting unit sets individual information segments contained in download information received by the reception unit in a corresponding field device and a gateway itself. A communication limiting unit prohibits communication between the field device and host devices for a period before the individual information segments are set in the field device and the gateway itself, respectively, by the setting unit. | 2011-09-01 |
20110213901 | ENHANCEMENTS TO DATA-DRIVEN MEDIA MANAGEMENT WITHIN AN ELECTRONIC DEVICE - A centralized resource manager manages the routing of audio or visual information within a device, including a handheld device such as a smartphone. The resource manager evaluates data-driven policies to determine how to route audio or visual information to or from various input or output components connected to the device, including headphones, built-in speakers, microphones, bluetooth headsets, cameras, and so on. Among the data considered in the policies are connection status data, indicating if a device is connected, routing status data, indicating if a device is permitted to route information to or from a component, and grouping data, indicating logical relationships between various components. Components may be considered inherently routable, automatically routable, or optionally routable. Numerous other uses exist for such data, including providing simpler and more logical management interfaces. | 2011-09-01 |
20110213902 | INFORMATION PROCESSING SYSTEM - An information processing system includes a plurality of processors for executing processing according to a predetermined processing request sent from a different device; a switching device for performing data transfer between the individual processors and the different device; and a storage device which is connected to the switching device and enables data transfer to and from the individual processors. At least one of the processors includes a processing request storing unit for storing processing request data sent from the different device to the processor, into the storage device by data transfer. At least another one of the processors includes a processing request reading unit for reading the processing request data stored in the storage device from the storage device by data transfer. | 2011-09-01 |
20110213903 | Pin Multiplexing - A semiconductor device coupled to input/output pins includes a first core to operate a first function and a second core to operate a second function. A multiplexer is arranged to set the input/output pins to the first function or to the second function, and an arbiter is configured to receive requests from the cores to use the input/output pins and to grant use of the input/output pins to a selected core. A register is arranged to store a value indicative of a delay to be applied by the arbiter when granting use of the input/output pins to the second core. | 2011-09-01 |
20110213904 | Storage apparatus and method of updating control information in storage apparatus - A storage apparatus | 2011-09-01 |
20110213905 | COMMUNICATION PROTOCOL FOR CONTROLLING TRANSFER OF TEMPORAL DATA OVER A BUS BETWEEN DEVICES IN SYNCHRONIZATION WITH A PERIODIC REFERENCE SIGNAL - A communication protocol over the serial bus allows a peripheral device to control the flow of data between a host computer and the peripheral device so as to maintain synchronization to a periodic reference signal. The protocol involves transferring flow control messages between the peripheral device and the host computer, allowing the peripheral device to control how and when the host computer sends the uncompressed audio and video data. | 2011-09-01 |
20110213906 | Interrupt Controller and Methods of Operation - Methods of operation and interrupt controllers for generating interrupt signals to a unit, which could enter an active mode and a non-active mode, are disclosed. The interrupt controllers have interrupt logic ( | 2011-09-01 |
20110213907 | SEMICONDUCTOR RESISTANCE ELEMENT, SEMICONDUCTOR MODULE INCLUDING THE SAME, AND PROCESSOR-BASED SYSTEM INCLUDING THE SEMICONDUCTOR MODULE - Provided may be a semiconductor resistance element including resistance patterns disposed on an insulating substrate. The substrate may have first and second planer surfaces disposed in a first direction, third and fourth planar surfaces at least between the first and second planar surfaces in a second direction and fifth and sixth planar surfaces at least between the first and second planar surfaces in a third direction. The semiconductor resistance element may include a first resistance pattern configured to cover a selected one of the first and second planar surfaces and a second resistance pattern on at least one of the third through sixth planar surfaces. | 2011-09-01 |
20110213908 | CONFIGURABLE INTERCONNECTION SYSTEM - An interconnection system, apparatus and method is described where the motherboard may be populated with less than all of the modules that it has been designed to accept while maintaining a configuration such that in the event of a module failure, a memory controller failure, or a combination thereof, the connectivity of the remaining modules is maintained. Where data is stored using a RAID organization of the memory on the modules, the data may be reconstructed to a spare module. The system also provides for the orderly incremental expansion of the memory by adding additional memory modules and memory controllers, while maintaining the connectivity properties. | 2011-09-01 |
20110213909 | Programmable controlled computer switch - A programmable controlled computer switch is disclosed. Console devices and universal serial bus devices of the computer switch can be switched as having a controlling function or a hub function. The computer switch includes a console port interface having console ports for connecting console devices, which initially have a controlling function; a universal serial bus hub port interface having hub ports for connecting universal serial bus devices, which initially have a hub function; plural computer interfaces having a computer port respectively for connecting a computer device; a matrix switching circuit connected to the console port interface, the universal serial bus hub port interface and the plural computer interfaces; and a main controlling circuit connected between the matrix switching circuit and the plural computer interfaces. | 2011-09-01 |
20110213910 | Stackable Form-Factor Peripheral Component Interconnect Device and Assembly - A stackable form-factor Peripheral Component Interconnect (PCI) device can be configured as a host controller or a master/target for use on a PCI assembly. PCI device may comprise a multiple-input switch coupled to a PCI bus, a multiplexor coupled to the switch, and a reconfigurable device coupled to one of the switch and multiplexor. The PCI device is configured to support functionality from power-up, and either control function or add-in card function. | 2011-09-01 |
20110213911 | Mechanism for Dynamic Placement of Virtual Machines During Live Migration Based on Memory - A mechanism for dynamic placement of virtual machines (VMs) during live migration based on memory is disclosed. A method of embodiments of the invention includes determining candidate target host machines capable of receiving a VM to be migrated, obtaining a hash value for memory pages of the VM to be migrated, obtaining for each candidate target host machine hash values for shared memory pages utilized by one or more VMs hosted by the candidate target host machine, comparing for each candidate target host machine the hash values for the memory pages of the VM to be migrated with the hash values for the shared memory pages, and adjusting a score in a general selection algorithm for the candidate target host machine with the most identical matches of the hash values for the shared memory pages with the hash values for the memory pages of the VM to be migrated. | 2011-09-01 |
20110213912 | MEMORY MANAGEMENT AND WRITING METHOD, AND MEMORY CONTROLLER AND MEMORY STORAGE SYSTEM USING THE SAME - A memory management and writing method for managing a memory module is provided. The memory module has a plurality of memory units and a plurality of data input/output buses corresponding to the memory units. The method includes configuring a plurality of logical units, dividing each of the logical units as a plurality of logical parts, and mapping the logical parts of each of the logical units to physical blocks of the memory units. The method also includes respectively establishing mapping tables corresponding to the data input/output buses, and only using one of the data input/output buses to write data from a host system into the corresponding memory unit according to the mapping table corresponding to the data input/output bus. Accordingly, the method can effectively increase the speed of writing data into the memory module. | 2011-09-01 |
20110213913 | MEMORY SYSTEM - According to one embodiment, a memory system includes a nonvolatile memory, a managing unit, an order rule holding unit, a position information storing unit, a list selecting unit, a block selecting unit, a writing unit, and an updating unit. The managing unit holds for each of storage areas of the nonvolatile memory a free block list indicating free blocks. The order rule holding unit holds an order rule used to determine an order of the free block lists. The position information storing unit stores position information indicating the position of the free block list in the order rule. The list selecting unit selects the free block list corresponding to the position indicated by the position information and the block selecting unit selects the free block therefrom. The updating unit updates after the list selection the position information in the position information storing unit with position information indicating the position of the subsequently selected free block list. | 2011-09-01 |
20110213914 | I-PEN - This patent consists of a USB flash drive that includes two USB connectors at the ends of the main body that perform different functions. This storage device also includes an LCD display, headphone jack, and internal or removable battery. | 2011-09-01 |
20110213915 | NONVOLATILE STORAGE DEVICE, ACCESS DEVICE AND NONVOLATILE STORAGE SYSTEM - A nonvolatile storage device includes a nonvolatile memory that stores data and a memory controller that controls the nonvolatile memory. The memory controller accepts a pause instruction to pause writing from the access device within a period in which data from the access device are written, and writes the data received from the access device to the nonvolatile memory within a predetermined time interval, then pauses the writing and accepts read and/or write of new data from the access device. | 2011-09-01 |
20110213916 | STORAGE CONTROL APPARATUS, DATA MANAGEMENT SYSTEM AND DATA MANAGEMENT METHOD - A storage control apparatus according to the present invention includes a plurality of connecting units connected to one or more host computers and one or more hard disk drives as storage media for storing data, one or more non-volatile storage media which are of a different type from the hard disk drives and which store data WRITE requested from the host computer, a plurality of processing units for processing WRITE and READ requests from the host computer by using the hard disk drives or the non-volatile storage media and, a plurality of memory units for storing control information to be by the processing units. | 2011-09-01 |
20110213917 | Methods and Systems for Improving Read Performance in Data De-Duplication Storage - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a data de-duplication system that retrieves data from a data storage device in an order based on the location of blocks on the data storage device. Some embodiments break a data stream into multiple blocks of data and store the blocks of data on a data storage device of a data de-duplication system, wherein a code representing a redundant block of data is stored in place of the block of data. A location for each block of data may be stored. Additionally, the blocks may be read in an order that is determined based on the location of the blocks. | 2011-09-01 |
20110213918 | METHOD OF STORING DATA ON A FLASH MEMORY DEVICE - Methods and apparatus are disclosed, such as those involving a flash memory device. One such method includes storing data on memory cells on a memory block including a plurality of word lines and a plurality of memory cells on the word lines. The word lines comprising one or more bottom edge word lines, one or more top edge word lines, and intermediate word lines between the bottom and top edge word lines. The data is stored first on memory cells on the intermediate word lines. Then, a remaining portion, if any, of the data is stored on memory cells on the bottom edge word lines and/or the top edge word lines. This method enhances the life of the flash memory by preventing a premature failure of memory cells on the bottom or top edge word lines, which can be more prone to failure. | 2011-09-01 |
20110213919 | FLASH-based Memory System with Static or Variable Length Page Stripes Including Data Protection Information and Auxiliary Protection Stripes - Methods and apparatuses for enhanced protection of data stored in a FLASH memory system involve a controller capable of protecting data using page stripes and auxiliary protection stripes. The controller stores the data in a manner such that the pages making up each page stripe include a plurality of data pages and at least one data protection page and the pages making up each auxiliary protection stripe include a plurality of data pages and an auxiliary protection page. At least a plurality of data pages are within one page stripe and one auxiliary protection stripe such that each data page is protected both by a data protection page in the page stripe and an auxiliary protection page in the auxiliary protection stripe. | 2011-09-01 |
20110213920 | FLASH-based Memory System with Static or Variable Length Page Stripes Including Data Protection Information and Auxiliary Protection Stripes - Methods and apparatuses for enhanced protection of data stored in a FLASH memory system involve a controller capable of protecting data using page stripes and auxiliary protection stripes. The controller stores the data in a manner such that the pages making up each page stripe include a plurality of data pages and at least one data protection page and the pages making up each auxiliary protection stripe include a plurality of data pages and an auxiliary protection page. At least a plurality of data pages are within one page stripe and one auxiliary protection stripe such that each data page is protected both by a data protection page in the page stripe and an auxiliary protection page in the auxiliary protection stripe. | 2011-09-01 |
20110213921 | Command Queuing Smart Storage Transfer Manager for Striping Data to Raw-NAND Flash Modules - A flash module has raw-NAND flash memory chips accessed over a physical-block address (PBA) bus by a NVM controller. The NVM controller is on the flash module or on a system board for a solid-state disk (SSD). The NVM controller converts logical block addresses (LBA) to physical block addresses (PBA). Data striping and interleaving among multiple channels of the flash modules is controlled at a high level by a smart storage transaction manager, while further interleaving and remapping within a channel may be performed by the NVM controllers. A SDRAM buffer is used by a smart storage switch to cache host data before writing to flash memory. A Q-R pointer table stores quotients and remainders of division of the host address. The remainder points to a location of the host data in the SDRAM. A command queue stores Q, R for host commands. | 2011-09-01 |
20110213922 | PHASE CHANGE RANDOM ACCESS MEMORY DEVICE AND RELATED METHODS OF OPERATION - A method of operating a phase change random access memory (PRAM) device includes performing a program operation to store data in selected PRAM cells of the device, wherein the program operation comprises a plurality of sequential program loops. The method further comprises suspending the program operation in the middle of the program operation, and after suspending the program operation, resuming the program operation in response to a resume command. | 2011-09-01 |
20110213923 | METHODS FOR OPTIMIZING PERFORMANCE OF TRANSIENT DATA CALCULATIONS - A redundant array of independent disk (RAID) stack loads a parity block of RAID data from a main memory into a first register of a processing device and loading the parity block into a cache memory of the processing device. The RAID stack loads a first data block of the RAID data from the main memory into a second register of the processing device without loading the first data block into the cache memory of the processing device. The processing device performs a first parity calculation based on the parity block of the first register and the first data block of the second register. | 2011-09-01 |
20110213924 | METHODS FOR ADAPTING PERFORMANCE SENSITIVE OPERATIONS TO VARIOUS LEVELS OF MACHINE LOADS - For each of a plurality of memory access routines having different access timing characteristic, a redundant array of independent disk (RAID) stack executes the memory access routine to load predetermined data from a main memory to a register of a processor of a data processing system. The RAID stack determines an amount of cache misses for the execution of the memory access routine. The RAID stack selects one of the plurality of memory access routines that has the least amount of cache misses for further memory accesses for the purpose of parity calculations of RAID data. | 2011-09-01 |
20110213925 | METHODS FOR REDUCING CACHE MEMORY POLLUTION DURING PARITY CALCULATIONS OF RAID DATA - A redundant array of independent disk (RAID) stack loads a first parity block of RAID data into a first memory address of a main memory of a data processing system. A first parity calculation is performed on a first plurality of data blocks of the RAID data with the first parity block loaded from the first memory address of the main memory into a register of the processor of the data processing system and a cache memory associated with the processor. The RAID stack loads subsequent parity blocks of RAID data into subsequent memory addresses of the main memory, where a difference between the first memory address and the subsequent memory addresses equals to one or more multiples of an alias offset associated with the cache memory. A second parity calculation is performed on a second plurality of data blocks and the second parity block of the RAID data. | 2011-09-01 |
20110213926 | METHODS FOR DETERMINING ALIAS OFFSET OF A CACHE MEMORY - A redundant array of independent disk (RAID) stack determines a first number of processor cycles to reload first data from a first memory address of a main memory into a processor of a data processing system. The RAID stack loads second data from a second memory address of the main memory into the processor, where the second memory address is configured to be an address offset from the first memory address. The RAID stack reloads the first data from the first memory address of the main memory and determines a second number of processor cycles to reload the first data from the first memory address of the main memory. An alias offset of a cache memory associated with the processor of the data processing system is determined based on the first number of processor cycles and the second number of processor cycle. | 2011-09-01 |
20110213927 | CONFIGURABLE AND SCALABLE STORAGE SYSTEM - The system utilizes a plurality of layers to provide a robust storage solution. One layer is the RAID engine that provides parity RAID protection, disk management and striping for the RAID sets. The second layer is called the virtualization layer and it separates the physical disks and storage capacity into virtual disks that mirror the drives that a target system requires. A third layer is a LUN (logical unit number) layer that is disposed between the virtual disks and the host. By using this approach, the system can be used to represent any number, size, or capacity of disks that a host system requires while using any configuration of physical RAID storage. | 2011-09-01 |
20110213928 | DISTRIBUTEDLY STORING RAID DATA IN A RAID MEMORY AND A DISPERSED STORAGE NETWORK MEMORY - A method begins by a processing module receiving redundant array of independent disks (RAID) data and determining whether to store the RAID data in at least one of a RAID format and in a dispersed storage network (DSN) format. The method continues with the processing module converting at least a portion of the RAID data into at least one set of encoded data slices when the at least a portion of the RAID data is to be stored in the DSN format. The method continues with the processing module outputting the at least one set of encoded data slices to a DSN memory. | 2011-09-01 |
20110213929 | DATA MIGRATION BETWEEN A RAID MEMORY AND A DISPERSED STORAGE NETWORK MEMORY - A method begins by a processing module determining whether to convert data between a redundant array of independent disks (RAID) format and a dispersed storage network (DSN) format. The method continues with the processing module retrieving the data from a RAID memory to produce retrieved RAID data when the data is to be converted from the RAID format to the DSN format. The method continues with the processing module converting stripe-block data of the retrieved RAID data into a plurality of sets of encoded data slices and outputting the plurality of sets of encoded data slices to at least one of the RAID memory and a DSN memory for storage therein. | 2011-09-01 |
20110213930 | Multi-level cell memory device and method thereof - A Multi-Level Cell (MLC) memory device and method thereof are provided. The example MLC memory device may be configured to perform data operations, and may include an MLC memory cell, a first coding device performing a first coding function, the first coding function being one of an encoding function and a decoding function, a second coding device performing a second coding function, the second coding function being one of an encoding function and a decoding function and a signal module configured to perform at least one of instructing the MLC memory cell to store data output by the second coding device if the first and second coding functions are encoding functions, and generating a demapped bit stream based on data retrieved from the MLC memory cell if the first and second coding functions are decoding functions. | 2011-09-01 |
20110213931 | NON BLOCKING REHASHING - An apparatus and a method operating on data at a server node of a data grid system with distributed cache is described. A coordinator receives a request to change a topology of a cache cluster from a first group of cache nodes to a second group of cache nodes. The request includes a cache node joining or leaving the first group. A key for the second group is rehashed without blocking access to the first group while rehashing. | 2011-09-01 |
20110213932 | DECODING APPARATUS AND DECODING METHOD - A decoding apparatus is used which includes: a CABAC processing unit ( | 2011-09-01 |
20110213933 | INFORMATION PROCESSING APPARATUS AND MEMORY CONTROL APPARATUS - A memory control apparatus, in a case of receiving from a processor, under a condition where the number of cache memories retaining a copy of data stored in a main storage device is one, a notification to the effect that data retained in the cache memory is purged, updates directory information on a directory cache without accessing the main storage device when the data is not modified by the processor, and the directory information on the directory cache and directory information on the main storage device is determined to be different and the directory information on the main storage device is determined to be in a state indicating that the copy of the data is not retained by any processor in the state of coherence. | 2011-09-01 |
20110213934 | Data processing apparatus and method for switching a workload between first and second processing circuitry - A data processing apparatus and method are provided for switching performance of a workload between two processing circuits. The data processing apparatus has first processing circuitry which is architecturally compatible with second processing circuitry, but with the first processing circuitry being micro-architecturally different from the second processing circuitry. At any point in time, a workload consisting of at least one application and at least one operating system for running that application is performed by one of the first processing circuitry and the second processing circuitry. A switch controller is responsive to a transfer stimulus to perform a handover operation to transfer performance of the workload from source processing circuitry to destination processing circuitry, with the source processing circuitry being one of the first and second processing circuitry and the destination processing circuitry being the other of the first and second processing circuitry. During the handover operation, the switch controller causes the source processing circuitry to makes it current architectural state available to the destination processing circuitry, the current architectural state being that state not available from shared memory at a time the handover operation is initiated, and that is necessary for the destination processing circuitry to successfully take over performance of the workload from the source processing circuitry. In addition, the switch controller masks predetermined processor specific configuration information from the at least one operating system such that the transfer of the workload is transparent to that operating system. Such an approach has been found to yield significant energy consumption benefits whilst avoiding complexities associated with providing operating systems with the capability for switching applications between processing circuits. | 2011-09-01 |
20110213935 | Data processing apparatus and method for switching a workload between first and second processing circuitry - A data processing apparatus and method are provided for switching performance of a workload between two processing circuits. The data processing apparatus has first processing circuitry which is architecturally compatible with second processing circuitry, but with the first processing circuitry being micro-architecturally different from the second processing circuitry. At any point in time, a workload consisting of at least one application and at least one operating system for running that application is performed by one of the first processing circuitry and the second processing circuitry. A switch controller is responsive to a transfer stimulus to perform a handover operation to transfer performance of the workload from source processing circuitry to destination processing circuitry, with the source processing circuitry being one of the first and second processing circuitry and the destination processing circuitry being the other of the first and second processing circuitry. The switch controller is arranged, during the handover operation, to cause the source processing circuitry to make its current architectural state available to the destination processing circuitry, the current architectural state being that state not available from shared memory shared between the first and second processing circuitry at a time the handover operation is initiated, and that is necessary for the destination processing circuitry to successfully take over performance of the workload from the source processing circuitry. Further, the source processing circuitry and second processing circuitry implement an accelerated mechanism to make the current architectural state available to the destination processing circuitry without routing of the current architectural state via the shared memory. Since the accelerated mechanism is quick and energy efficient, it increases the number of situations it which it is energy efficient to make the switch from one processing circuitry to the other. | 2011-09-01 |
20110213936 | PROCESSOR, MULTIPROCESSOR SYSTEM, AND METHOD OF DETECTING ILLEGAL MEMORY ACCESS - A processor included in a multiprocessor system including a shared memory, the processor according to an embodiment of the present invention comprises: a storing unit that stores a break occurrence memory area that is address information of the shared memory; and a break generator that causes memory access break when the break occurrence memory area is accessed and puts the processor to a debug state. The break occurrence memory area includes address information of the shared memory in another processor included in the multiprocessor system. | 2011-09-01 |
20110213937 | Methods and Apparatus for Address Translation Functions - Techniques are described for efficient reordering of data and performing data exchanges within a register tile or memory, or in general, any device storing data that is accessible through a set of addressable locations. In one technique, an address translator is placed in the path of all or a selected set of address busses to a storage device to provide a programmable and selectable means of translating the storage device addresses. An effect of this translation is that the data stored in one pattern may be accessed and stored in another pattern or accessed, processed and stored in another pattern. The address translation operation may be carried out in a single cycle, does not involve the physical movement of data in swap operations, allows data to effectively be ordered more efficiently for algorithmic processing and therefore saves power. Address translation functions are shown to be useful for vector operations and a new type of storage unit using built in address translation functions is presented. | 2011-09-01 |
20110213938 | SIMULTANEOUS PERSONAL SENSING AND DATA STORAGE - A personal sensing device that may be used for storing personal data and sensed data arbitrates and prioritizes competing requests for memory access from sensing, wireless, and wired interfaces. The personal sensing device enables power efficiency with burst-writes to the memory at higher data rates then an incoming sensor data stream without risk of data loss. Sensing operations coordinated by reconfigurable control logic are partitioned from storage operations coordinated by a multi-port memory controller. The interface between the functional partitioning uses message passing, status/control registers and buffering to reduce or eliminate system interdependencies. | 2011-09-01 |
20110213939 | QUICK DEPLOYMENT METHOD - Provided is a deployment method for a server system that includes a storage system having logical disks where disk images are stored and plural servers connected to the storage system via a storage network, the method including the step of causing a deploy management module to copy the logical disks which store the disk images to a free area of the storage system before a deployment command is received. According to this invention, disk images are quickly deployed to servers. | 2011-09-01 |
20110213940 | VIRTUALIZED DATA STORAGE VAULTS ON A DISPERSED DATA STORAGE NETWORK - A method begins with a slice server receiving a request to access a virtual digital data storage vault. The method continues by determining whether the virtual digital data storage vault is a first virtual digital data storage vault or a second virtual digital data storage vault. The slice server supports a portion of each of the first and the second virtual digital data storage vaults. When the virtual digital data storage vault is the first or the second virtual digital data storage vault, the method continues by determining whether the request is valid. When the request is valid, the method continues by executing the request to generate a response. | 2011-09-01 |
20110213941 | SYSTEMS AND METHODS FOR MANAGING STORAGE DEVICES - Systems and methods for managing storage devices are provided. The system includes a storage device having at least one hidden area. The hidden area is created using initialization firmware, and the hidden area is allowed to be accessed by using a library. A password authentication mechanism is applied to the hidden area of the storage device. When an input password received via a specific application conforms to a predefined password of the hidden area, the hidden area is allowed to be accessed by using the library. Since the storage device may have a plurality of hidden areas, and each hidden area may have a respective password, the respective hidden areas can be independently and securely managed. Additionally, since the predefined password can be changed by a purchasing company, the manufacturer of the storage device or the microcontroller company which designed the microcontroller of the storage device is prohibited from accessing the hidden area by any means after the predefined password of the hidden area is changed by the purchasing company. | 2011-09-01 |
20110213942 | PARALLEL MEMORY MIGRATION - A method and apparatus is described herein for performing parallel memory migration, as well as execution of management tasks over a plurality of management windows. Handlers are dispatched to multiple resources, such as processing elements or threads, to determine a proper memory migration handler. Each resource, during a management mode, executes a designated memory migration handler or an instance of a memory migration handler to perform a portion of a memory migration task in parallel. A task data structure is capable of supporting tracking of portions of memory migrated. In addition the task data structure is potentially also capable of tracking management tasks through plurality of management windows to support servicing of management tasks through multiple management windows. | 2011-09-01 |
20110213943 | MEMORY MANAGEMENT METHOD AND COMPUTER USING THE METHOD - Memory management by garbage collection involves a memory area that is allocated in a computer. Data is created in the memory area in accordance with a program executed by a processor of the computer, and it is checked whether or not data necessary to execute the program exists in the memory area to be released, in response to an explicit instruction to release the memory area. As a result of the check, if data necessary to execute the program does not exist in the memory area, the memory area is released. As a result of the check, if data necessary to execute the program exists in the memory area, the data is moved to a memory area different from the memory area to be released. | 2011-09-01 |
20110213944 | SYNCHRONIZATION SYSTEM AND RELATED INTEGRATED CIRCUIT - A synchronization system includes a memory and a control circuit. The control circuit includes a write interface for writing data in said memory with a first clock signal, wherein the write interface is configured for operating with a write pointer in response to a write command, a read interface for reading data from said memory with a second clock signal, wherein the read interface is configured for operating with a read pointer in response to a read command, a synchronization circuit for synchronizing said write pointer and said read pointer with a synchronization latency, and an elaboration circuit for elaborating data in memory with an elaboration latency, wherein the elaboration latency is smaller than the synchronization latency. | 2011-09-01 |
20110213945 | DATA PARTITIONING SCHEME FOR NON-VOLATILE MEMORIES - Systems and methods are disclosed for partitioning data for storage in a non-volatile memory (“NVM”), such as flash memory. In some embodiments, a priority may be assigned to data being stored, and the data may be logically partitioned based on the priority. For example, a file system may identify a logical address within a first predetermined range for higher priority data and within a second predetermined range for lower priority data, such using a union file system. Using the logical address, a NVM driver can determine the priority of data being stored and can process (e.g., encode) the data based on the priority. The NVM driver can store an identifier in the NVM along with the data, and the identifier can indicate the processing techniques used on the associated data. | 2011-09-01 |
20110213946 | PARALLEL COMPUTING SYSTEM AND COMMUNICATION CONTROL PROGRAM - A parallel computing system includes a plurality of processors multi-dimensionally commented by an interconnection network, wherein each of the processors in the parallel computing system determines, in dimensional order, communication channels to other processors in the interconnection network, each of the processors sets, as relative coordinates of destination processors with respect to the plurality of processors in data communications performed at a same timing, relative coordinates common to all of the processors, and each of the processors performs data communications with destination processors having the set relative coordinates. | 2011-09-01 |
20110213947 | System and Method for Power Optimization - A technique for reducing the power consumption required to execute processing operations. A processing complex, such as a CPU or a GPU, includes a first set of cores comprising one or more fast cores and second set of cores comprising one or more slow cores. A processing mode of the processing complex can switch between a first mode of operation and a second mode of operation based on one or more of the workload characteristics, performance characteristics of the first and second sets of cores, power characteristics of the first and second sets of cores, and operating conditions of the processing complex. A controller causes the processing operations to be executed by either the first set of cores or the second set of cores to achieve the lowest total power consumption. | 2011-09-01 |
20110213948 | Efficient Processor Apparatus and Associated Methods - An apparatus includes a processor. The processor includes two memories. The first memory stores one set of instructions. The second memory stores another set of instructions that are longer than the set of instructions in the first memory. An instruction in the set of instructions in the first memory is used as a pointer to a corresponding instruction in the set of instructions in the second memory. | 2011-09-01 |
20110213949 | METHODS AND APPARATUS FOR OPTIMIZING CONCURRENCY IN MULTIPLE CORE SYSTEMS - Various methods and apparatus are described for communicating transactions between one or more initiator IP cores and one or more target IP cores coupled to an interconnect. Tag logic may be located within the interconnect, such as located in an agent, and configured to assign different interconnect tag identification numbers to two or more transactions from a same thread. The tag logic assigns different interconnect tag identification numbers to allow the two or more transactions from the same thread to be outstanding over the interconnect to two or more different target IP cores at the same time, allow the two or more transactions from the same thread to be processed in parallel over the interconnect, and potentially serviced out of issue order while being returned back to the multiple threaded initiator IP core realigned in expected execution order. | 2011-09-01 |
20110213950 | System and Method for Power Optimization - A technique for reducing the power consumption required to execute processing operations. A processing complex, such as a CPU or a GPU, includes a first set of cores comprising one or more fast cores and second set of cores comprising one or more slow cores. A processing mode of the processing complex can switch between a first mode of operation and a second mode of operation based on one or more of the workload characteristics, performance characteristics of the first and second sets of cores, power characteristics of the first and second sets of cores, and operating conditions of the processing complex. A controller causes the processing operations to be executed by either the first set of cores or the second set of cores to achieve the lowest total power consumption. | 2011-09-01 |
20110213951 | Storing Branch Information in an Address Table of a Processor - Methods for storing branch information in an address table of a processor are disclosed. A processor of the disclosed embodiments may generally include an instruction fetch unit connected to an instruction cache, a branch execution unit, and an address table being connected to the instruction fetch unit and the branch execution unit. The address table may generally be adapted to store a plurality of entries with each entry of the address table being adapted to store a base address and a base instruction tag. In a further embodiment, the branch execution unit may be adapted to determine the address of a branch instruction having an instruction tag based on the base address and the base instruction tag of an entry of the address table associated with the instruction tag. In some embodiments, the address table may further be adapted to store branch information. | 2011-09-01 |
20110213952 | Methods and Apparatus for Dynamic Instruction Controlled Reconfigurable Register File - A scalable reconfigurable register file (SRRF) containing multiple register files, read and write multiplexer complexes, and a control unit operating in response to instructions is described. Multiple address configurations of the register files are supported by each instruction and different configurations are operable simultaneously during a single instruction execution. For example, with separate files of the size 32×32 supported configurations of 128×32 bit s, 64×64 bit s and 32×128 bit s can be in operation each cycle. Single width, double width, quad width operands are optimally supported without increasing the register file size and without increasing the number of register file read or write ports. | 2011-09-01 |
20110213953 | System and Method for Measuring Staleness of Attestation Measurements - A method is provided for determining with a first device, staleness of attestation measurements at a second device. The method includes booting up the second device at a first time, the second device having a communication portion, a security portion, a basic input/output system and a trusted protection module. Further, the method includes generating an initial counter based on the booting up of the second device at the first time. A current counter is then generated based on a second time after the first time. The method additionally includes providing a request to the second device from the first device, the request requesting booting information and current information, the booting information being based on the initial counter, the current information being based on the current counter. Still further, the method includes providing a response to the first device from the second device, the response including the booting information and the current information. Finally, the method includes determining, via the first device, the generated initial counter and the current counter based on the response. | 2011-09-01 |
20110213954 | METHOD AND APPARATUS FOR GENERATING MINIMUM BOOT IMAGE - A boot image generating method including erasing code used to execute an application that is executing in a device at a predetermined time from a volatile memory of the device; storing data used to execute the application in a non-volatile memory; and generating a boot image including at least one selected from the group consisting of a code used to execute an Operating System (OS) of the device and data used to execute the OS at the predetermined time. | 2011-09-01 |
20110213955 | MEMORY INITIALIZATION METHOD, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM RECORDING AN INITIALIZATION PROGRAM, AND INFORMATION PROCESSING APPARATUS - A memory initialization method in a boot sequence of an information processing apparatus having a memory and a plurality of processors sharing the memory, the memory initialization method includes initializing a first area of the memory required for an operation of the firmware and a second area of the memory required for a kernel activation by executing the firmware stored in a first storage by a first processor, storing the kernel to the initialized second area from a second storage by executing the firmware by the first processor, making a second processor activate and execute the kernel stored in the second area by executing the firmware by the first processor, and initializing a remaining area of the memory by the kernel executed by the second processor and the firmware executed by the first processor in parallel. | 2011-09-01 |
20110213956 | TECHNIQUES FOR MANAGING A SECURE COMMUNICATION SESSION - Techniques for managing a secure communication session are provided. A non-browser application utilizes a browser to establish a secure communication session with a server. The session cookie set in the browser is mapped by the server to a secret token that is supplied via the browser to the non-browser application. The browser is then closed and the secure communication session between the server and the non-browser application continues unabated via the secret token. | 2011-09-01 |
20110213957 | LAYERED PROTECTION AND VALIDATION OF IDENTITY DATA DELIVERED ONLINE VIA MULTIPLE INTERMEDIATE CLIENTS - A method is provided for securely delivering identity data units over a communications network to a client device. The method includes receiving a selection from a customer identifying a final zipped package to be unpacked. The final zipped package is unpacked to obtain a common package and a digital signature file signed by an entity generating identity data requested by the customer. The digital signature in the digital signature file is verified and the common package is unpacked to obtain a plurality of outer packages and an encrypted symmetric key. The symmetric key is decrypted with a private key associated with the customer and each of the outer packages is decrypted with the symmetric key to obtain a plurality of identity data units. | 2011-09-01 |
20110213958 | SYSTEMS AND METHODS FOR UTILIZING IMS DATA SECURITY MECHANISMS IN A CIRCUIT SWITCHED NETWORK - Aspects of the present invention provide a mechanism to utilize IMS media security mechanisms in a CS network and, thereby, provide end-to-end media security in the case where the media traffic travels across both a CS network and a PS network. | 2011-09-01 |
20110213959 | METHODS, APPARATUSES, SYSTEM AND RELATED COMPUTER PROGRAM PRODUCT FOR PRIVACY-ENHANCED IDENTITY MANAGEMENT - A method and related apparatus include the steps of registering, from a client at a service providing network entity, first client-related identity information and, from the client at an identity providing network entity, second client-related identity information being different from the first client-related identity information and being generated based on the first client-related identity information. Key information is a secret of the client and identity information is related to the service providing network entity. A second method and related apparatus include the step of determining, at a service providing network entity, the first client-related identity information based on the second client-related identity information being received from the identity providing entity. Finally, a third method and related apparatus include the step of authenticating, towards the service providing network entity, the second client-related identity information being received from the client. | 2011-09-01 |
20110213960 | CUSTOMIZABLE PUBLIC KEY INFRASTRUCTURE AND DEVELOPMENT TOOL FOR SAME - A public key infrastructure comprises a client side to request and utilize certificates in communication across a network and a server side to administer issuance and maintenance of said certificates. The server side has a portal to receive requests for a certificate from a client. A first policy engine to processes such requests in accordance with a set of predefined protocols. A certification authority is also provided to generate certificates upon receipt of a request from the portal. The CA has a second policy engine to implement a set of predefined policies in the generation of a certificate. Each of the policy engines includes at least one policy configured as a software component e.g. a Java bean, to perform the discreet functions associated with the policy and generate notification in response to a change in state upon completion of the policy. | 2011-09-01 |
20110213961 | DYNAMIC USER INTERFACE GENERATION BASED ON CONSTRAINTS OF A CERTIFICATE PROFILE - A method and system for dynamic user interface generation based on constraints of a certificate profile is described. | 2011-09-01 |
20110213962 | DOMAIN MANAGEMENT FOR DIGITAL MEDIA - In accordance with the domain management for digital media, a device obtains multiple pieces of protected content from multiple content providers, where two or more of the content providers employ different digital rights management systems. The device also accesses a license server to obtain, for each piece of protected content, a content license that is bound to a domain. The content license permits the device to play back a piece of protected content. | 2011-09-01 |
20110213963 | USING AN OCSP RESPONDER AS A CRL DISTRIBUTION POINT - A certificate revocation list (CRL) distribution system receives a request from a client pertaining to a status of a certificate and determines whether the client is an online certificate status protocol (OCSP) compliant client. The certificate status distribution system sends the certificate status to the client using OCSP in response to a determination that the client is an OCSP compliant client and sends a certificate revocation list to the client in response to a determination that the client is not an OCSP compliant client. | 2011-09-01 |
20110213964 | AUTOMATICALLY DETERMINING AN ACCEPTABLE CRL SIZE BASED ON SYSTEM CAPABILITY - A certificate revocation list (CRL) deployment system loads a portion of test data that represents revoked certificates into a cache at periodic intervals and generates a CRL for a corresponding periodic interval using the test data that is loaded in the cache at that corresponding periodic interval. The CRL deployment system determines a CRL size that the server computing system is capable to support using the generated CRLs and notifies a user of the CRL size that the server computing system is capable to support. | 2011-09-01 |
20110213965 | IDENTITY MANAGEMENT CERTIFICATE OPERATIONS - A method and system for identity management certificate operations is described. | 2011-09-01 |
20110213966 | AUTOMATICALLY GENERATING A CERTIFICATE OPERATION REQUEST - A method and system for automatically generating a certificate operation request is described. | 2011-09-01 |
20110213967 | PRE-ENCODING A CACHED CERTIFICATE REVOCATION LIST - A method and system for pre-encoding a cached CRL is described. | 2011-09-01 |
20110213968 | System and Methods to Perform Public Key Infrastructure (PKI) Operations in Vehicle Networks using One-Way Communications Infrastructure - A set of certificate management methods designed to significantly reduce or eliminate reliance on infrastructure network connectivity after vehicles are sold uses techniques to support certificate management operations in order to reduce the frequency which vehicles need to communicate with the Certificate Authorities (CAs) and the amount of data that needs to be exchanged between vehicles and the CA. These methods include, for example, approaches to use one-way communications and vehicle-to-vehicle (V2V) communications to replace expired certificates, approaches to use one-way communications and V2V communications to replace revoked certificates, and use of a small subset of vehicles as proxies to help retrieve and distribute Certificate Revocation Lists (CRLs) and replacement certificates. The combination of these techniques leads to solutions that can eliminate the need for roadside infrastructure networks completely. | 2011-09-01 |
20110213969 | DYNAMIC CRYPTOGRAPHIC SUBSCRIBER-DEVICE IDENTITY BINDING FOR SUBSCRIBER MOBILITY - A method of authentication and authorization over a communication system is provided. The method performs a first authentication of a device based on a set of device identity and credentials. The first authentication includes creation of a first set of keying material. The method also includes performing a second authentication of a subscriber based on a set of subscriber identity and credentials. The second authentication includes creation of a second set of keying material. A set of compound key material is created with a key derivation mechanism that uses the first set of keying material and the second set of keying material. A binding token is created by cryptographically signing at least the device identity authenticated in the first authentication and the subscriber identity authenticated in the second authentication using the set of compound keying material. The signed binding token is exchanged for verification with an authenticating and authorizing party. | 2011-09-01 |