37th week of 2010 patent applcation highlights part 64 |
Patent application number | Title | Published |
20100235584 | Lateral Castout (LCO) Of Victim Cache Line In Data-Invalid State - A victim cache line having a data-invalid coherence state is selected for castout from a first lower level cache of a first processing unit. The first processing unit issues on an interconnect fabric a lateral castout (LCO) command identifying the victim cache line to be castout from the first lower level cache, indicating the data-invalid coherence state, and indicating that a lower level cache is an intended destination of the victim cache line. In response to a coherence response to the LCO command indicating success of the LCO command, the victim cache line is removed from the first lower level cache and held in a second lower level cache of a second processing unit in the data-invalid coherence state. | 2010-09-16 |
20100235585 | DATA CACHING IN CONSOLIDATED NETWORK REPOSITORY - System(s) and method(s) are provided for caching data in a consolidated network repository of information available to mobile and non-mobile networks, and network management systems. Data can be cached in response to request(s) for a data element or request(s) for an update to a data element and in accordance with a cache retention protocol that establishes a versioning protocol and a set of timers that determine a period to elapse prior to removal of a version of the cached data element. Updates to a cached data element can be effected if an integrity assessment determines that recordation of an updated version of the data element preserves operational integrity of one or more network components or services. The assessment is based on integrity logic that establishes a set of rules that evaluate operational integrity of a requested update to a data element. Retention protocol and integrity logic are configurable. | 2010-09-16 |
20100235586 | MULTI-CORE PROCESSOR SNOOP FILTERING - Systems, methods, and devices for reducing snoop traffic in a central processing unit are provided. In accordance with one embodiment, an electronic device includes a central processing unit having a plurality of cores. A cache memory management system may be associated with each core that includes a cache memory device configured to store a plurality of cache lines, a page status table configured to track pages of memory stored in the cache memory device and to indicate a status of each of the tracked pages of memory, and a cache controller configured to determine, upon a cache miss, whether to broadcast a snoop request based at least in part on the status of one of the tracked pages in the page status table. | 2010-09-16 |
20100235587 | Staged Software Transactional Memory - A new form of software transactional memory based on maps for which data goes through three stages. Updates to shared memory are first redirected to a transaction-private map which associates each updated memory location with its transaction-private value. Maps are then added to a shared queue so that multiple versions of memory can be used concurrently by running transactions. Maps are later removed from the queue when the updates they refer to have been applied to the corresponding memory locations. This design offers a very simple semantic where starting a transaction takes a stable snapshot of all transactional objects in memory. It prevents transactions from aborting or seeing inconsistent data in case of conflict. Performance is interesting for long running transactions as no synchronization is needed between a transaction's start and commit, which can themselves be lock free. | 2010-09-16 |
20100235588 | SHARED INFORMATION DISTRIBUTING DEVICE, HOLDING DEVICE, CERTIFICATE AUTHORITY DEVICE, AND SYSTEM - A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an n | 2010-09-16 |
20100235589 | MEMORY ACCESS CONTROL IN A MULTIPROCESSOR SYSTEM - Access to a memory area by a first processor that executes a first processor program and a second processor that executes a second processor program is granted to one of the first processor and the second processor at a time. Access to the memory area by the first processor and the second processor are cyclically uniquely allocated (e.g., t≡[(ad mod m)=o]) between the first and the second processor by the first and second processor programs. | 2010-09-16 |
20100235590 | Multi-bank Multi-port Architecture - A memory system including a plurality of ports and a memory core having a plurality of memory banks. Access requests received at the ports are broadcast to the memory banks. Multiple memory banks may be concurrently accessed in response to access requests received on different ports. A memory controller provides the access requests to the memory system, and ensures that a single memory bank is not concurrently accessed by different ports. All access requests are processed with the same latency. If the memory banks include memory cells that must be periodically refreshed, then the memory controller also provides refresh requests to the memory banks. Because multiple memory banks may be concurrently accessed in response to access requests provided on different ports, the memory banks can operate at a lower frequency than the ports. | 2010-09-16 |
20100235591 | COMPUTER SYSTEM AND SNAPSHOT CREATION METHOD THEREOF, DELAYING SNAPSHOT CREATION UNTIL PENDING TRANSFER BETWEEN VOLUMES IS COMPLETE - A storage system and snapshot method wherein after a first processor transfers data stored in a first data area to a second storage system, the first processor transfers a first marker stored in a first marker area to a second storage system so that the first marker is stored in a second marker area of a second volume, wherein a second processor checks whether the first marker stored in the second storage area of the second volume corresponds to a second marker designated, and wherein, if the first marker stored in the second storage are of the second volume is a second marker designated, the second processor creates a snapshot of the data that is stored in the second data area, in a third storage volume. | 2010-09-16 |
20100235592 | DATE VOLUME MIGRATION WITH MIGRATION LOG CONFIRMATION - Exemplary embodiments provide data volume migration with migration log confirmation in which the same data volume identifier is used beyond migration for a data volume. In one embodiment, data is migrated to or from a data volume in a data storage area of a storage apparatus. The data being migrated is identified by a data volume identifier which remains unchanged after migration. The same data volume identifier is used in both the source data volume and the destination data volume. The storage apparatus stores migration log information of the data volume. The migration log information includes the data volume identifier, a source name of the source data volume of the data being migrated, a destination name of the destination data volume of the data being migrated, and log information on any prior migration of the data being migrated. | 2010-09-16 |
20100235593 | FLOW RESILIENCY - In an example embodiment, packets for a selected flow are replicated and sent over one or more diverse paths, such as a primary path and at least one secondary path, to a destination switching device. At the destination switching device, one copy of the replicated packets is selected for delivery to the destination, and the remaining copies are discarded. In the event that packets are not received at the destination switching device due to loss of connection on the primary path or packets are not timely delivered due to congestion on the primary path, a different path may be selected as the primary path. | 2010-09-16 |
20100235594 | ENHANCEMENT OF EFFICIENCY IN POWER FAILURE HANDLING IN FLASH MEMORY - A method and system for enhancing efficiency in power failure handling in flash memory devices is disclosed. The method includes the controller of a storage device receiving a page of data, selecting a block having a desired back-up cost and copying previously stored data in the selected block to a back-up block prior to writing the received page to the selected block based on a category of the previously stored data. The system includes non-volatile memory having a plurality of operative blocks, at least one spare block and a controller. The controller is configured to receive a page of data, select an operative block in the memory having a desired back-up cost, and copy previously stored data in the selected block to a spare block based on a category of the previously stored data prior to writing the received page to the selected block. | 2010-09-16 |
20100235595 | DATA STORAGE SYSTEM AND BACKUP METHOD THEREOF - A data storage system and the backup method thereof are provided. The data storage system includes a storage device and a storage controller. The storage controller is coupled to the storage device and used for dividing the storage device into a primary data block and a backup data block and setting the data storage system to operate under one of a real time backup mode and a non-real time backup mode. Under the non-real time backup mode, the storage controller backups the data stored in the primary data block to the backup data block when the data storage system is idle. | 2010-09-16 |
20100235596 | Offline Device-Side Logical Unit Number Controller - Described is a technology by which a single physical storage device such as a USB flash memory device is able to boot different computing devices via corresponding different operating systems. The storage device includes a selection mechanism that determines which virtual disk (corresponding to a LUN) is seen by the host as the currently active LUN having sector | 2010-09-16 |
20100235597 | METHOD AND APPARATUS FOR CONVERSION BETWEEN CONVENTIONAL VOLUMES AND THIN PROVISIONING WITH AUTOMATED TIER MANAGEMENT - A method for providing storage volumes, which are to be converted to thin provisioned volumes, comprises receiving from a host computer a read/write request identifying a target storage volume among the storage volumes and a target area of access; processing the read/write request and updating an access information of the target storage volume; if the target storage volume does not have access information, generating access information for the converted thin provisioned volume from initial values; and if the target storage volume has access information, generating access information for the converted thin provisioned volume based on the access information of the target storage volume. | 2010-09-16 |
20100235598 | Using Domains for Physical Address Management in a Multiprocessor System - A multi-processor computer system is provided for managing physical memory domains. The system includes at least one processor having an address interface for sending a memory access message, which includes an address in physical memory and a domain identification (ID). The system also includes a physical memory portioned into a plurality of domains, where each domain includes a plurality of physical addresses. A domain mapping unit (DMU) has an interface to accept the memory access message from the processor. The DMU uses the domain ID to access a permission list, cross-reference the domain ID to a domain including addresses in physical memory, and grant the processor access to the address in response to the address being located in the domain. | 2010-09-16 |
20100235599 | ACCESS CONTROL DEVICE, STORAGE SYSTEM, AND ACCESS CONTROL METHOD - An access control device for controlling access from a host system to a plurality of storage areas in a storage system, the access control device includes a memory for storing access management information for the plurality of storage areas, and a controller for managing and monitoring access performed by the host system, the controller monitoring frequency of access by the host system to each of the plurality of storage areas and storing information of the frequency of the access to each of the storage areas in the memory, detecting at least one of the storage areas in which the frequency of the access is less than a predetermined range, and restricting the host system from accessing to the detected storage area. | 2010-09-16 |
20100235600 | System and Method of Waste Management - A method of application waste management in a wireless device is provided. The method comprised a first low-memory event. Deleting a first set of data records incrementally until event is cleared or no more records are present. Determining a second low-memory event when memory is still low. Executing a clean-up script to mark additional data records for deletion. Deleting the second set of data records until the second low-memory condition are cleared or no more records are present. | 2010-09-16 |
20100235601 | METHOD AND SYSTEM FOR ENABLING PERSONAL DIGITAL ASSISTANTS AND PROTECTING STORED PRIVATE DATA - A method and system for enabling personal digital assistants (PDAs) and protecting stored private data. Specifically, one embodiment in accordance with the present invention includes a removable expansion card about the size of a postage stamp which plugs into a slot of a personal digital assistant. The removable expansion card, referred to as a personality card, is capable of storing all of a user's private information and data which is used within their personal digital assistant. By removing the personality card from the personal digital assistant, all of the user's private information and data may be removed from the personal digital assistant. Furthermore, the personal digital assistant may also be rendered totally or partially useless once the personality card is removed from it. There are several advantages associated with a personality card system in accordance with the present invention. For example, one of the advantages is that a user is able to restrict access to their stored private information and data by simply removing their personality card from their personal digital assistant. Furthermore, as personal digital assistants equipped with personality card slots become increasingly more common, a user will be able to continually carry around their personality card and enable a spare and locally available personal digital assistant with their private information when desired. | 2010-09-16 |
20100235602 | APPLICATION INDEPENDENT STORAGE ARRAY PERFORMANCE OPTIMIZER - A system comprising a performance module and an application. The performance module may be configured to (i) monitor a LUN for a predetermined amount of time, (ii) capture information relating to the LUN, and (iii) store the information. The application may be configured to (i) retrieve the information, (ii) analyze the information, (iii) generate a configuration based on the analysis of the information and (iv) send the configuration to the performance module. The performance module may reconfigure the LUN based on the configuration. | 2010-09-16 |
20100235603 | ADAPTIVE MEMORY ALLOCATION - In one embodiment, a memory manager may identify allocators as either transient in nature or static in nature based on a length of time each one of the allocators held, holds, or both, onto requested memory blocks. The memory manager may also allocate memory blocks requested by allocators identified as transient in nature from one memory pool and allocate memory blocks requested by allocators identified as static in nature from another memory pool. In one example, the memory manager may also use a deferred splitting strategy to optimize allocation of free memory next to memory blocks reserved by the most transient allocators by not splitting such free memory if the free bytes are less than a maximum block size threshold. | 2010-09-16 |
20100235604 | COMPUTER-READABLE RECORDING MEDIUM STORING MANAGEMENT PROGRAM, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD - A management apparatus and method that manage a storage system, in which an access node and a storage node, with which the management apparatus is in communication via the network. The management apparatus includes a logical volume judging unit that acquires a plurality of processing requests to each of the plurality of storage areas, references a logical volume allocation information storage unit that stores a correspondence relationship between the plurality of storage areas and the plurality of logical volumes in the storage node, and judges a logical volume corresponding to a storage area to become a processing object of each processing request, and a processing request breakdown calculating unit that counts an acquisition count of each processing request for each logical volume based on a judgment result by the logical volume judgment unit, and calculates a proportion of each acquisition count to a total of respective acquisition counts. | 2010-09-16 |
20100235605 | ENHANCEMENT OF STORAGE LIFE EXPECTANCY BY BAD BLOCK MANAGEMENT - A method and system are disclosed that permit a storage device to remain fully functional despite running out of a sufficient supply of spare blocks in memory. The storage device includes a non-volatile memory and a controller, where the controller is configured to detect an insufficiency of spare blocks and convert operative blocks to spare blocks. The method includes techniques for selecting certain operative blocks for conversion to spare blocks using the storage manager on the storage device and a file system manager that may or may not be part of the storage device. | 2010-09-16 |
20100235606 | COMPOSITE HASH AND LIST PARTITIONING OF DATABASE TABLES - A method for partitioning during an online node add. The method includes providing a data storage cluster with first and second nodes, and storing a table of data in the data storage cluster with a first partition storing a set of rows or data elements in the first node and a second partition storing a set of rows or data elements in the second node. The method includes adding a third node to the cluster and adding a third partition to the table using a partitioning mechanism to create a distribution mapping for data elements in the first, second, and third partitions. The distribution mapping provides substantially uniform distribution of the data elements over the first, second, and third partitions by the partitioning mechanism using modulo hash partitioning as a function of data elements or by combining hash and list partitioning such that data is retained on the original partitions. | 2010-09-16 |
20100235607 | PROCESSOR - A processor includes a setting register in which a mode is set, a general-purpose register including a preferred slot used during scalar computing and a slot not used during the scalar computing, a selector configured to select and output data of a register designated by a mode set in the setting register during the scalar computing, and a computing unit configured to execute the scalar computing using the preferred slot of the general-purpose register and store computing result data of the scalar computing in the preferred slot of the general-purpose register. The data of the register output from the selector is stored in the slot of the general-purpose register. | 2010-09-16 |
20100235608 | METHOD AND APPARATUS FOR GAME PHYSICS CONCURRENT COMPUTATIONS - An apparatus for physical properties computation comprising an array processor. The array processor comprises of a plurality of processing elements, said processing elements arranged in a grid. A processing unit (PU) is coupled to the array processor. A local memory is coupled to the PU. The PU broadcasts data to rows of said processing elements in said grid, and performs physical computations in an order of complexity of O((√N) log N). | 2010-09-16 |
20100235609 | RING-PATTERN BUS CONNECTED INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - In an information apparatus including a plurality of processing circuits connected to a ring bus, when processing speeds (throughput) of processing circuits are different or an amount of data in the processing circuit is increased or decreased, deadlock can occur or the throughput can be decreased in the ring bus. In order to solve this problem, a stall state of other processing unit is detected from a packet acquired from the ring bus and a packet is restricted from being newly generated by the processing circuit nor transmitted therefrom when other processing unit is in the stall state. | 2010-09-16 |
20100235610 | PROCESSING SYSTEM, PROCESSING APPARATUS AND COMPUTER READABLE MEDIUM - A processing apparatus includes: an operation detection unit that detects an operation; a request unit that requests other processing apparatuses to transmit functions when the operation is detected by the operation detection unit; a receiving unit that receives replies in response to the requests of the request unit from the at least one of the other processing apparatuses; a selection unit that selects at least one of the other processing apparatuses from which the receiving unit has received the replies; and a communication unit that performs communication with the at least one of the other processing apparatuses selected by the selection unit. | 2010-09-16 |
20100235611 | COMPILER, COMPILE METHOD, AND PROCESSOR CORE CONTROL METHOD AND PROCESSOR - A compiler compiling a source code and is implemented in a plurality of processor cores includes a parallel loop processing detection unit configured to detect from the source code a loop processing code for execution of an internal processing operation for a given number of repeating times, and an independent parallel loop processing code in the internal processing operation performed for each repetition to be concurrently processed, and a dynamic parallel conversion unit configured to generate a control core code for control of the number of repeating times in the parallel loop processing code and a parallel processing code for changing the number of repeating times corresponding to the control from the control core code. | 2010-09-16 |
20100235612 | MACROSCALAR PROCESSOR ARCHITECTURE - A macroscalar processor architecture is described herein. In one embodiment, an exemplary processor includes one or more execution units to execute instructions and one or more iteration units coupled to the execution units. The one or more iteration units receive one or more primary instructions of a program loop that comprise a machine executable program. For each of the primary instructions received, at least one of the iteration units generates multiple secondary instructions that correspond to multiple loop iterations of the task of the respective primary instruction when executed by the one or more execution units. Other methods and apparatuses are also described. | 2010-09-16 |
20100235613 | METHOD, APPARATUS OR SOFTWARE FOR PROCESSING EXCEPTIONS PRODUCED BY AN APPLICATION PROGRAM - A method, apparatus and software is disclosed in which original exceptions issued by an application program are encoded as substitute exceptions with associated metadata identifying the original exception so as to enable to enable a first application program receiving the exception but not arranged to process the original exception to process the substitute exception and to enable a second application program receiving the exception and arranged to process the original exception to extract and process that original exception. | 2010-09-16 |
20100235614 | INDUSTRIAL CONTROL DEVICE CONFIGURATION AND DISCOVERY - The subject disclosure pertains to the communications configuration of programmable logic controller modules in an industrial automation environment. Systems and methods are provided that automatically enables a programmable logic controller module to operate on a communications network once communicatively coupled thereto. Other control modules, a personal computer, or the like can access and/or otherwise interact with a module as soon as it coupled to a network. Accordingly, manual module configuration it is not required prior to access and interaction in an industrial control system. | 2010-09-16 |
20100235615 | METHOD AND SYSTEM FOR DISCOVERY OF A ROOT FILE SYSTEM - A method for discovery of a root file system that includes obtaining a tag corresponding to a boot image for an operating system, identifying, by a boot loader, a location of the boot image having a predefined value matching the tag, loading a kernel of the operating system retrieved from the boot image, and transferring execution to the kernel, wherein the boot loader provides the tag for the location to the kernel. The method further includes identifying, by the kernel, the location of the root file system based on the tag provided by the boot loader, and executing the operating system on a processor using the root file system identified by the kernel. | 2010-09-16 |
20100235616 | METHOD AND SYSTEM FOR DISPLAYING INFORMATION ON INSTALLED UNITS - An exemplary embodiment of the present invention provides a method for providing information about units installed in a computing device. The method includes identifying an installed unit prior to an initialization of an operating system and obtaining information about the installed unit, wherein the information comprises a regulatory identification number, a manufacturer's logo, or a combination thereof. The method also includes receiving a request to provide information about the installed unit and providing the information about the installed unit. | 2010-09-16 |
20100235617 | SYSTEM RECOVERY METHOD AND EMBEDDED SYSTEM WITH AUTOMATIC RECOVERY FUNCTION - A system recovery method and an embedded system with an automatic recovery function used between a network and a server are introduced. The embedded system includes a nonvolatile memory storing a first part program code and a processor electrically connected to the nonvolatile memory and the network. The method includes the following steps, the embedded system enters a boot process; when the processor of the embedded system in the boot process determines that the first part program code in the nonvolatile memory does not satisfy a first specific condition, the processor transmits a signal through the network to establish a signal connection with the server; and the processor downloads a backup program code from the server through the network for execution to complete the boot process. | 2010-09-16 |
20100235618 | START-UP OF COMPUTING SYSTEMS - A computing device is provided that includes a computing unit, which has a working memory and a processing unit, and a boot memory having control instructions for operating the computing device. The control instructions are stored in boot memory and are to be transferred to the computing unit at start-up of the computing device. A boot control unit is connected to the computing unit by at least a first and a second interface and connected to the boot memory by a third interface. The boot control unit is configured to transfer a first part of the control instructions from the boot memory via the first interface to the computing unit and to transfer a second part of the control instructions from the boot memory via the second interface to the computing unit. | 2010-09-16 |
20100235619 | IMAGE PROCESSING APPARATUS, COMMUNICATION SYSTEM, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - An apparatus connected to a network via a network interface device and capable of executing encrypted communication with an external device on the network requests that a first algorithm to be used in the encrypted communication with the external device is changed to a second algorithm included in the network interface device when the apparatus detects that a condition for shifting to a power saving mode, in which power consumption is smaller than that in a normal power mode, is satisfied while the apparatus is operated in the normal power mode. | 2010-09-16 |
20100235620 | Method and Arrangement for Deciding a Security Setting - The present invention relates to a method and arrangements in a mobile telecommunications network including a plurality of access points ( | 2010-09-16 |
20100235621 | METHOD OF SECURELY PAIRING DEVICES WITH AN ACCESS POINT FOR AN IP-BASED WIRELESS NETWORK - A wireless access point and method of using a wireless access point to allow a user to use a pre-determined security key provided with the access point or a personal security key that is provided by the user. The access point is purchased with a pre-determined security key. A user of the access point may press a pairing button on the access point to automatically pair other devices with the access point using the pre-determined security key. A label with a passphrase that corresponds to the pre-determined security key is provided with the access point, allowing the user to manually enter the passphrase into devices that cannot automatically pair with the access point. The wireless access point also has a “security on/off” button. When the user presses the security on/off button, the access point may cease use of the pre-determined security key in favor of a personal security key. | 2010-09-16 |
20100235622 | TRANSFER DEVICE FOR SENSITIVE MATERIAL SUCH AS A CRYPTOGRAPHIC KEY - Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure element. The device enables a user to enter sensitive information in the user input which is then passed directly to the secure element without traversing any other element such that the secure element can encode and/or encrypt the sensitive information. Once the sensitive information has been encoded and/or encrypted by the secure element, the now secure sensitive information can be shared with other entities using familiar and popular, yet relatively unsecure, transfer methods. | 2010-09-16 |
20100235623 | Methods and systems for identity verification - The present invention relates to methods and systems for identity verification. The method includes transmitting from a customer system to a customer connector server an identity verification request containing identification information for an individual. At the customer connector server, at least one verification service required for the request is identified and a data manager server is selected for each service. A verification service request is transmitted to each data manager server. At each data manager server, at least one data access service is identified and one data connector server is selected for each service. A data accesss service request is transmitted to each data connector server. At least one data source is accessed from each data connector server for each request. The identification information provided is then verified against identity information stored within the at least one data source and a response is generated and communicated to the customer system. | 2010-09-16 |
20100235624 | METHOD AND APPARATUS FOR PROTECTING THE TRANSFER OF DATA - According to one embodiment, a conditional access (CA) control system comprises circuitry that is adapted to: (i) transmit information including a unique identifier assigned to a digital device and mating key generator values to the remote source, (ii) receive a mating key from the remote source, the mating key being based on the transmitted unique identifier and mating key generator values, the mating key being used to encrypt data used for scrambling either additional key information or program data prior to transmission to the digital device, and (iii) transmit the mating key generator values and the encrypted data to the digital device, the mating key generator values are used to regenerate the mating key in the digital device. | 2010-09-16 |
20100235625 | TECHNIQUES AND ARCHITECTURES FOR PREVENTING SYBIL ATTACKS - Techniques and architectures for preventing Sybil attacks are provided. A node authenticates to a local certificate authority associated with a social networking group. The local certificate authority issues an encrypted certificate with a secret to the node. The node then makes a request to participate in another external group via a remote certificate authority. The remote certificate authority verifies the secret and grants permission to the node to participate in the external group. Also, a dynamic architecture permits local nodes in a social networking group self organize with some nodes becoming local certificate authorities and others becoming regular participants. | 2010-09-16 |
20100235626 | APPARATUS AND METHOD FOR MUTUAL AUTHENTICATION IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - A mutual authentication apparatus in a Downloadable Conditional Access System (DCAS) includes an announce protocol processor to authenticate SecurityAnnounce information using an Authentication Proxy (AP) and to transmit the authenticated SecurityAnnounce information to a Secure Micro (SM), a keying protocol processor to relay KeyRequest information and KeyResponse information between a Trusted Authority (TA) and the SM in response to the SecurityAnnounce information, a decryption unit to decrypt the KeyResponse information using the SM, an authentication protocol processor to determine whether a first encryption key of the KeyResponse information is identical to a second encryption key generated by the AP, and a download protocol processor to control DownloadInfo to be transmitted from the AP to the SM, the DownloadInfo permitting the SM to download SM Client Image information. | 2010-09-16 |
20100235627 | SECURING COMMUNICATIONS SENT BY A FIRST USER TO A SECOND USER - A computer-implemented method of securing communications sent by a first user to a second user may include receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user, providing, by the first user to a second user, a plurality of values corresponding to an identification device identified by an identifier, deriving, by the first user, a shared key, using the at least one private cryptographic value of the first user, and at least one of the plurality of values corresponding to the identification device identified by the identifier and protecting communications sent by the first user to the second user with the shared key. | 2010-09-16 |
20100235628 | System and Method for Accessing Keys for Secure Messaging - Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity check may uncover an issue that exists with sending a secure message to the recipient. A reason is determined for the validity check issue and is provided to the mobile device's user. | 2010-09-16 |
20100235629 | INFORMATION STORAGE MEDIUM, AUTHENTICATION DATA GENERATION METHOD, AND MEDIUM AUTHENTICATION SYSTEM - An authentication data generation method includes receiving an authentication command from an authentication device, determining a communication protocol with the authentication device, changing encryption key reference information contained in the authentication command based upon the determination result of the communication protocol with the authentication device, selecting a target encryption key corresponding to the changed encryption key reference information from a plurality of encryption keys stored in advance, generating authentication data based upon the target encryption key and inclusion data included in the authentication command, and transmitting the authentication data to the authentication device. | 2010-09-16 |
20100235630 | SYSTEM AND METHOD FOR PROVIDING KEY-ENCRYPTED STORAGE IN A CLOUD COMPUTING ENVIRONMENT - System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment. | 2010-09-16 |
20100235631 | DIGITAL RIGHTS MANAGEMENT HANDLER AND RELATED METHODS - A system and method of providing universal digital rights management system protection is described. One feature of the invention concerns systems and methods for repackaging and securing data packaged under any file format type, compression technique, or digital rights management system. Another feature of the invention is directed to systems and methods for securing data by providing scalability through the use of modular data manipulation software objects. | 2010-09-16 |
20100235632 | PROTECTING AGAINST DENIAL OF SERVICE ATTACKS USING TRUST, QUALITY OF SERVICE, PERSONALIZATION, AND HIDE PORT MESSAGES - According to an embodiment of the invention, a system for processing a plurality of service requests in a client-server system includes a challenge server for: presenting a cryptographic challenge to the client; initializing a trust cookie that encodes a client's initial priority level after the client correctly solves the cryptographic challenge; computing a trust level score for the client based on a service request wherein said trust level score is associated with an amount of resources expended by the server in handling the service request such that a higher trust level score is computed for service requests consuming less system resources; assigning the trust level score to the client based on the computation; and embedding the assigned trust level score in the trust cookie included in all responses sent from the server to the client. The system further includes an application server coupled with a firewall. | 2010-09-16 |
20100235633 | AUTHENTICATION AND ENCRYPTION UTILIZING COMMAND INDENTIFIERS - A data processing system, recording device, data processing method and program providing medium are provided to execute authentication processing and content storing processing between apparatuses. Program localization is employed to restrict access to program content. A plurality of key blocks store key data for authentication processing. Key block designation information is set in a recorder/reproducer, which is configured for executing authentication processing with the recording device by designating a key block. The recorder/reproducer can set a key block for each product, model or the like. In addition, data stored according to a selected key block cannot be utilized in a recorder/reproducer in which a different key block is set. Furthermore, an encryption processing controlling section of a recording device executes control in accordance with a pre-defined setting sequence. Furthermore, an illegal instrument that has not completed the authentication processing can be prevented from utilizing program content. | 2010-09-16 |
20100235634 | SECURITY CONSIDERATIONS FOR THE LTE OF UMTS - A method for providing message protection includes generating a ciphered message based upon a first counter, a message, and a ciphering key. The method further includes generating an unciphered message authentication code (MAC) based upon the first counter, an integrity protection key, and either the message or the ciphered message, and transmitting security protected data, which includes the MAC and the ciphered message, over a transmission medium. | 2010-09-16 |
20100235635 | Methods, Systems And Computer Program Products For Authenticating Computer Processing Devices And Transferring Both Encrypted And Unencrypted Data Therebetween - Methods for transferring a set of data from a first processing device to a second processing device are provided. Pursuant to these methods a secure shell (“SSH”) authentication is performed to authenticate a first user that is logged onto the first processing device to a second user that is logged onto the second processing device. The set of data is divided into a first data subset and a second data subset. The first data subset is encrypted to provide an encrypted data set. The encrypted data set is transferred from the first processing device to the second processing device. The second data subset is also transferred from the first processing device to the second processing device, but without encrypting the second data subset. Related data transfer systems and computer program products are also provided. | 2010-09-16 |
20100235636 | Method for delivering web content and applications to the user via email or other communication channels - A method of enabling enriched content of an electronic message including embedding instructions within the electronic message for rendering the content of the message correctly on a recipient system. That may be protected by a firewall, anti virus or anti-spam program, the method comprising the steps of transforming the message content including the embedded instructions into data, in accordance with an algorithm; transmitting the data to the recipient system; receiving the data by recipient system, inverse transforming the data to regenerate the message and the embedded instructions, and executing the embedded instructions to correctly display the enriched content. | 2010-09-16 |
20100235637 | Method of Preventing Web Browser Extensions from Hijacking User Information - The invention relates to a portable authentication token comprising connection means for connecting to a computer, browser communication means for communicating with a browser running on the computer, and user authentication means for authenticating a user of the token to a server. The user authentication means are triggered via the browser communication means when the user connects to the server from the browser of the computer. The user authentication means are set to authenticate the user by communicating with the server through the browser. The token comprises out-of-band token communication means set to validate user authentication by establishing a communication channel between the token and the server, the communication channel bypassing the browser. | 2010-09-16 |
20100235638 | IDENTIFICATION AND AUTHENTICATION OF DEVICES IN A NETWORK - A method of distributing a network access key to devices in a network comprises the steps of generating a network access key, and generating a plurality of distinct key shares for the network access key. A device requires a predetermined number of distinct key shares to generate the network access key. Key shares are distributed to devices in the network, such that at least one device receives a plurality of distinct key shares. | 2010-09-16 |
20100235639 | INFORMATION PROCESSING APPARATUS, COMMUNICATION SYSTEM, METHOD OF CONTROLLING THEM, AND STORAGE MEDIUM - An information processing apparatus connected to a network via a network interface device and capable of performing encrypted communication with an external apparatus on the network. When the information processing apparatus is operating in a normal power mode, a sleep control module thereof detects whether a condition under which the apparatus shifts to an energy saving mode in which power consumption is smaller than in the normal power mode is satisfied. When the condition is detected to be satisfied, a proxy response registration module of the apparatus instructs an IPSec module of the same to request the external apparatus not to perform encrypted communication. | 2010-09-16 |
20100235640 | INFORMATION PROCESSING APPARATUS, METHOD OF MUTUAL AUTHENTICATION, MUTUAL AUTHENTICATION PROGRAM, AND STORAGE MEDIUM - An information processing apparatus and a counterpart apparatus supporting data communications are devised. The information processing apparatus is connected to the counterpart apparatus via a communication network. The information processing apparatus and the counterpart apparatus supporting data communications use mutual authentication using a certificate file. The information processing apparatus includes a certificate management unit, a verification information obtaining unit, and a security key generation unit. The certificate management unit encrypts and decrypts the certificate file using a security key. The verification information obtaining unit obtains verification information of the information processing apparatus. The verification information enables identification of the information processing apparatus as a unique physical entity. The security key generation unit generates the security key by conducting a non-reversible transformation of the verification information obtained by the verification information obtaining unit. The verification information is used as source data. | 2010-09-16 |
20100235641 | SECURITY TECHNIQUES FOR COOPERATIVE FILE DISTRIBUTION - Security techniques are provided for cooperative file distribution. An encryption key or a nonce (or both) are generated for a package containing one or more files that are to be sent in a cooperative file distribution system. Random access encryption techniques can be employed to encrypt a package containing one or more files to be sent in a cooperative file distribution system. One or more storage proxies are allocated to a package to be transmitted in a cooperative file distribution system, based on load. Access to trackers in the cooperative file distribution system is controlled using security tokens. Content can automatically expire using a defined expiration period when the content is uploaded into the system. Variable announce intervals allow the tracker to control how often the tracker will receive a message, such as an announcement or a heartbeat message, from peers in the system. | 2010-09-16 |
20100235642 | APPARATUS, SYSTEM, AND METHOD OF SETTING A DEVICE - A device setting apparatus performs setting operation with respect to a counterpart apparatus using secure communication even when the counterpart apparatus is not previously provided with information required for secure communication. The device setting apparatus detects an error when the error occurs during the setting operation, and executes a browser to request a user to correct the error during the setting operation. | 2010-09-16 |
20100235643 | AUTHENTICATION OF AN OBJECT - A system for authenticating an object is disclosed. The system includes an optical sensing device and a processor. The optical sensing device senses coded data provided on a surface associated with the object. The coded data is indicative of a position on the surface, an identity associated with the object, and a part of a signature. The signature is a digital signature of the identity. The processor determines, using the sensed coded data, a sensed identity and a sensed signature part, determines, using the position, a sensed signature part identity, determines, using the sensed identity, at least a determined signature, determines, using the determined signature and the sensed signature part identity, a determined signature part, compares the determined signature part to the sensed signature part, and authenticates the object using the result of the comparison. | 2010-09-16 |
20100235644 | Method and System for a Recursive Security Protocol for Digital Copyright Control - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 2010-09-16 |
20100235645 | APPARATUS AND METHOD FOR LIMITING ACCESS TO MODEL SPECIFIC REGISTERS IN A MICROPROCESSOR - A microprocessor having a control register to which the manufacturer of the microprocessor may limit access. The microprocessor includes a manufacturing identifier that uniquely identifies the microprocessor and that is externally readable from the microprocessor by a user. The microprocessor also includes a secret key, manufactured internally within the microprocessor and externally invisible. The microprocessor also includes an encryption engine, coupled to the secret key, configured to decrypt a user-supplied password using the secret key to generate a decrypted result in response to a user instruction instructing the microprocessor to access the control register. The user-supplied password is unique to the microprocessor. The microprocessor also includes an execution unit, coupled to the manufacturing identifier and the encryption engine, configured to allow the instruction access to the control register if the manufacturing identifier is included in the decrypted result, and to otherwise deny the instruction access to the control register. | 2010-09-16 |
20100235646 | Verification method and system thereof - A verification method and a verification system are disclosed. The verification method is applicable to an electronic device including a system memory and a BIOS memory provided with a Pre-Boot Authentication (PBA) application and prescribed biometric data. In one embodiment, the verification method comprises the steps of executing a BIOS process to load the operation code (OPCode) or the BIOS driver of the BIOS from the BIOS memory to the system memory to establish a communication channel between the electronic device and a biometric device; loading the PBA application to the system memory for running; loading the prescribed biometric data to the system to compare with biometric data acquired by the biometric data capture device; and requesting the BIOS to load an operation system when the comparing result is matched. | 2010-09-16 |
20100235647 | Hardware Security for Software Processes - A system and method for secure processing is provided, wherein a monitor application is injected into a secure application binary within the security perimeter of a secure processor. The components of the monitor application are injected into different portions of the application binary utilizing a seed value. In this manner, the positioning of the monitor application in the application binary is altered each time the application binary is booted. After the monitor application is inserted into the application binary, the secure process is passed to the host processor for execution. During execution of the secure process, a system and method is provided for the monitor application to communicate, to the secure processor, attempts to tamper with or attack the secure process. | 2010-09-16 |
20100235648 | Methods and systems for binding a removable trusted platform module to an information handling system - Methods and systems for binding a removable trusted platform module (TPM) subsystem module to an information handling system to provide a core root of trust for the information handling system without requiring soldering down or other hard and permanent (non-removable) attachment of a TPM device to the information handling system planar (e.g., motherboard). The removable TPM subsystem module may be a plug-in module that may be removed from the information handling system planar (e.g., motherboard), while at the same time maintaining the transitive chain of trust, and being capable of remotely attesting its trusted state. An information handling system platform may be provided that has the capability and flexibility of supporting multiple TPMs on the same system planar. | 2010-09-16 |
20100235649 | PORTABLE SECURE DATA FILES - A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received, one or more records in the metadata portion are accessed to determine whether the current user is permitted to access the file data in the encrypted data portion. If a record indicates the user is permitted to access the file data, a content encryption key in that record is used to decrypt the encrypted data portion. | 2010-09-16 |
20100235650 | Methods and Systems for Encoding and Protecting Data Using Digital Signature and Watermarking Techniques - Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark. If the strong watermark is found, further use of the signal is inhibited, as the presence of the strong watermark, in combination with the absence or corruption of the signature-containing watermark, provides evidence that the signal has been improperly modified. If, on the other hand, the strong mark is not found, further use of the data signal can be allowed, as the absence of the strong mark indicates that the data signal was never registered with the signature-containing watermark. | 2010-09-16 |
20100235651 | SECURE OPERATION OF PROCESSORS - Secure operation of processors is disclosed. A cell processor receives a secure file image from a client device at a processor of a host device (host cell processor), wherein the secure file image includes encrypted contents. | 2010-09-16 |
20100235652 | POWER SUPPLY IDENTIFICATION USING A MODIFIED POWER GOOD SIGNAL - Method, system and apparatus enabling a computing system to automatically identify the capabilities of a power supply coupled to the computing system. The power supply includes a controller that sends an identification code to a computing system prior to sending a power good signal to the computing system. The identification code and the power good signal are preferably sent over a single conductor, such as a power supply connector pin. The computing system receives the identification code for cross-referencing against a list of power supply identification codes and associated capabilities. Optionally, instructions from the computer system to an output device may be controlled as a function of the identified power supply capabilities. | 2010-09-16 |
20100235653 | METHOD AND SYSTEM FOR TRANSMIT QUEUE MANAGEMENT FOR ENERGY EFFICIENT NETWORKING - Aspects of a method and system for queue management for energy efficient 1networking are provided. In various embodiments of the invention a network device may determine whether to transition into or out-of an energy-saving mode of operation, and arm an EEN trigger by buffering the EEN trigger in a queue and/or setting one or more flags. The network device may transition into or out-of the energy-saving mode upon the EEN trigger being read from the queue or upon the queue becoming empty while the trigger is armed. Upon the occurrence of an event meeting one or more criteria prior to the EEN trigger being read from the queue or prior to the queue being empty, the EEN trigger may be disarmed. The network device may disarm the EEN trigger by deleting the EEN trigger from the queue and/or by resetting the flag. | 2010-09-16 |
20100235654 | METHODS OF ACHIEVING COGNIZANT POWER MANAGEMENT - A system and method of increasing the efficiency of overall power utilization in data centers by integrating a power management approach based on a comprehensive, dynamic model of the data center created with integrated environmental and computational power monitoring to correlate power usage with different configurations of business services utilization, with the techniques of CPU level power management | 2010-09-16 |
20100235655 | Method and apparatus for implementing a limited functionality embedded universal serial bus (USB) host controller on a fully functional downstream USB port - A method and apparatus for allowing a limited functionality Universal Serial Bus (USB) host controller to manage specific USB peripheral devices on a downstream facing USB port is provided. The port is also capable of dynamically interfacing to any USB compliant peripheral device, even one not supported directly by the limited capabilities of the host controller. | 2010-09-16 |
20100235656 | Device, method, and computer program product for computing electric power consumption - A disclosed electric power consumption computation device includes an acquisition unit configured to acquire apparatus information from an apparatus connected to the electric power consumption computation device via a predetermined data communication path, and a computation unit configured to compute electric power consumption of the apparatus based on information on a number of output sheets output by the apparatus contained in the apparatus information acquired by the acquisition unit and a TEC value of the apparatus. | 2010-09-16 |
20100235657 | METHOD OF AND APPARATUS FOR CONTROLLING SYSTEM ACCORDING TO POWER FEEDING OF TERMINAL - An apparatus and method for controlling a terminal having two modules connected to a network at power feeding in dual modes. A first power supply feeds main electric power via a main current limiting unit to a first controller and a second controller. The first controller controls a first wireless communication unit using the main electric power and changes a connection state with a first network by checking a connection state of a sub-electric power and determining whether connection with a second network is accessible in accordance with a request for the connection with the second network. A second controller controls a second wireless communication unit for connection to the second network using the main electric power. | 2010-09-16 |
20100235658 | DATA PROCESSING APPARATUS - A data processing apparatus | 2010-09-16 |
20100235659 | SYSTEM AND METHOD FOR CONTROLLING USE OF POWER IN A COMPUTER SYSTEM - In one embodiment, a power adapter comprises a power supply to output power for powering a powered device. The power adapter outputs information indicative of an amount of power output by the power supply for use by the powered device to control the amount of power used by the powered device. | 2010-09-16 |
20100235660 | LOW POWER COMPUTER WITH MAIN AND AUXILIARY PROCESSORS - An architecture for a computer includes a primary processor that consumes power at a first rate, that is operated when the computer is in an high power mode and that is not powered when the computer is in a low power mode. A primary graphics processor communicates with the primary processor, is operated when the computer is in the high power mode and is not powered when the computer is in the low power mode. A secondary graphics processor communicates with a secondary processor. The secondary processor consumes power at a second rate that is less than the first rate. The secondary processor and the secondary graphics processor are operated when the computer is in the low power mode. | 2010-09-16 |
20100235661 | ELECTRONIC DEVICE AND POWER MANAGEMENT METHOD FOR AUDIO CONTROL SYSTEM THEREOF - An audio control system and method of an electronic device receives audio streams, but does not play the audio streams when one or more applications are in a mute mode. The system and method mixes the one or more of the audio streams if the volume of the one or more audio streams is not zero, and transmits the mixed audio streams to an audio processor of the electronic device. | 2010-09-16 |
20100235662 | SERVER POWER MANAGER AND METHOD FOR DYNAMICALLY MANAGING SERVER POWER CONSUMPTION - A server power manager and method for dynamic server power management are generally described herein. The server power manager is configured to implement one or more server management policies that identify target server power consumption and/or target functionality for the server system. The server power manager determines an amount of excess processing capability and/or an amount of excess physical memory based on the target server power consumption and the target functionality. The server power manager may transition a processor core to a lower-operational state when at least a predetermined amount of excess processing capability is determined while maintaining server system functionality. The server power manager may transition a memory module to a lower-operational state when at least a predetermined amount of excess physical memory is determined while maintaining the server system functionality. | 2010-09-16 |
20100235663 | DATA INTERFACE POWER CONSUMPTION CONTROL - Apparatus and techniques relating to data interface power consumption control are disclosed. Components of a data transfer module may be selectively moved between their normal operating states and reduced power states at times when the data transfer module is not to be used for transferring data. Decisions as to particular components that are to be moved to their reduced power states may be based on respective timing characteristics of the components and/or respective power consumption characteristics of the components, for example. In some embodiments, an action may be performed to reduce a powering up time of the data transfer module when normal operation of the data transfer module is to resume. In the case of a multiple-connection interface having respective data transfer modules for each connection, the interface may be partially shut down by moving a subset of the data transfer modules into reduced power states. | 2010-09-16 |
20100235664 | ADAPTIVE POWER SAVING - A device may enter a first active state associated with a device, exit the first active state and entering a sleep state associated with the device when user input is not received within a inactivity period, receive a first user input at the device during the sleep state, measure an elapsed time between a start of the sleep state and the first user input, and increase the inactivity period of the device when the elapsed time is less than a particular threshold. | 2010-09-16 |
20100235665 | System and Method for Enabling Fallback States for Energy Efficient Ethernet - A system and method for enabling fallback states for energy efficient Ethernet (EEE). EEE devices can be designed to support multiple power saving states that impact layers higher than the PHY layer. Typically, these higher levels of power savings would require a greater period of time to accommodate a return to an active state. In a dynamic negotiation process, the receiving device can advertise multiple fallback power saving states to the transmitting device. The transmitting device's allocation of buffering can then determine which of the power saving states would be supported. | 2010-09-16 |
20100235666 | METHOD FOR DETERMINING SWITCHING OF SLEEP MODE, COMPUTER PROGRAM PRODUCT FOR PERFORMING THE METHOD, AND RECORDING MEDIUM FOR THE COMPUTER PROGRAM PRODUCT - A method for determining switching of the sleep mode for a device is provided. The device and a base station have several connections therebetween. In the determining method, one of the connections is first provided and it is determined whether the connection is realtime or non-realtime. It is then determined whether or not the realtime and non-realtime connections satisfy the condition for entering the sleep mode according to a first condition and a second condition, respectively. If the connection does not satisfy the condition for entering the sleep mode, the device enters the normal mode. If the connection satisfies the condition for entering the sleep mode, then the foregoing steps are repeated till the connections have all been checked. If all of the connections satisfy the condition for entering the sleep mode, the device enters the sleep mode. | 2010-09-16 |
20100235667 | MOTION SENSOR DATA PROCESSING USING VARIOUS POWER MANAGEMENT MODES - Systems and methods for processing motion sensor data using various power management modes of an electronic device are provided. Power may be provided to a motion sensor during a first power mode of the device. In response to the motion sensor detecting a motion event with a magnitude exceeding a threshold, the sensor may transmit a wake up signal to a power management unit of the device. In response to receiving the wake up signal, the power management unit may switch the device to a second power mode. The device may provide power to a processor and load the processor with a motion sensing application when switching to the second power mode. During the second power mode, motion sensor data may be processed to determine that the motion event is not associated with an intentional user input and the device may return to the first power mode. | 2010-09-16 |
20100235668 | METHOD AND APPARATUS FOR IMPLEMENTING A SLEEP PROXY FOR SERVICES ON A NETWORK - One embodiment of the present invention provides a system for implementing a sleep proxy. The system starts by receiving a request at the sleep proxy for information pertaining to a service provided by a device. In response to this request, the system determines if the device is a member of a list of devices for which the sleep proxy takes action. If so, the system determines if the sleep proxy can answer the request. If so, the sleep proxy sends a response to the request on behalf of the device. In a variation on this embodiment, if the system cannot answer the request on behalf of the device, the system sends a wakeup packet to the device, wherein the wakeup packet causes the device to exit a power-saving mode so that the device can respond to the request directly. | 2010-09-16 |
20100235669 | MEMORY POWER CONSUMPTION REDUCTION SYSTEM, AND METHOD AND PROGRAM THEREFOR - Disclosed is a memory power consumption reduction system that includes a memory allocation section, which allocates an area of a plurality of physical memories included in a physical information processing device to a process of a virtual machine when the virtual machine is to be controlled with a VMM; a memory compaction section, which performs memory compaction when the physical memory area allocated to the process by the memory allocation section is deallocated upon termination of the process; and a power supply control section, which exercises control so as to shut off the power supply to a physical memory that is unused as a result of memory compaction by the memory compaction section. | 2010-09-16 |
20100235670 | Fast L1 Flush Mechanism - In one embodiment, a processor comprises a data cache configured to store a plurality of cache blocks and a control unit coupled to the data cache. The control unit is configured to flush the plurality of cache blocks from the data cache responsive to an indication that the processor is to transition to a low power state in which one or more clocks for the processor are inhibited. | 2010-09-16 |
20100235671 | BACKUP POWER SYSTEM AND METHOD - Various embodiments of a backup power system and method may include a transfer switch, connections to primary and secondary power sources, a stored energy component, and an interconnected controller with a processor and memory. The transfer switch may provide power to an external load from a selected one of the primary power source, the secondary power source, or the stored energy component. The controller may compare energy stored within the stored energy component against a first threshold relating to a maximum time necessary for the secondary power source to at least reach a predetermined minimum output level, and also to compare the stored energy level to a second threshold greater than the first threshold. The second threshold may be selected to reduce a number of on/off cycles of the secondary power source during periods of intermittent primary power fluctuation that are less severe than a prolonged loss of power. | 2010-09-16 |
20100235672 | MULTI-CORE PROCESSOR, ITS FREQUENCY CONVERSION DEVICE AND A METHOD OF DATA COMMUNICATION BETWEEN THE CORES - A multi-core processor and a frequency conversion device thereof as well as a method of communication between the cores are disclosed. Each processor core of the multi-core processor includes a frequency conversion device, which includes a multi-bit state changing means, a multiple selector, a frequency conversion coefficient register, a multi-input OR gate and a clock-gating circuit unit. A common original clock is sent to the frequency conversion device of each processor core at work. The frequency conversion device real-timely reads the value of the frequency conversion coefficient register of a corresponding processor core and receives data transmission valid signals from other processor cores. By gating the common original clock, a frequency conversion function of the processor core is completed. In the invention, the dynamic frequency conversion function of a multi-core processor is achieved, the frequency conversion coefficient control may be performed by each processor core independently, and a highly effective synchronous communication may be maintained between the processor cores, so as to reduce the overall running consumption of the processor and save power on different processor cores of the multi-core processor or on different IP modules in SOC. | 2010-09-16 |
20100235673 | SIMPLIFIED RECEIVER FOR USE IN MULTI-WIRE COMMUNICATION - An encoder encodes data into a series of parallel codewords. Each codeword is expressed two sets of logic values (e.g., a set of logic 0s and a set of logic 1s) on output nodes. The encoder selects a current codeword from a group of codewords in a codespace which does not overlap the other group of codewords, i.e., codewords in a given group of codewords are not included in any other group of codewords in the codespace. This property allows a receiver of the codewords to be simplified. In particular, a mathematical operation performed on symbols in the current codeword uniquely specifies the corresponding group of codewords. This allows a decoder to decode the current codeword using comparisons of symbols received on a subset of all possible combinations of node pairs. | 2010-09-16 |
20100235674 | Systolic Merge Sorter - A sorter system includes a clock continuously generating a series of clock signals, a systolic array circuit, and control circuitry in communication with serial access memory that stores data items of a sequence to be sorted and with the systolic array circuit to supply thereto data items as input and to receive therefrom data items as output. The systolic array circuit includes at least one processing module and K−1 registers, where K is an integer value greater than two. Each processing module has at least one of the registers, each register for storing one data item. The control circuitry serially presents K data items for input to the systolic array circuit in synchronization with the clock signals. On the next clock cycle after the control circuitry presents to the systolic array circuit the last of the K data items, the data item of least value in the given subsequence is output. | 2010-09-16 |
20100235675 | Non-blocking Address Switch with Shallow Per Agent Queues - In one embodiment, a switch is configured to be coupled to an interconnect. The switch comprises a plurality of storage locations and an arbiter control circuit coupled to the plurality of storage locations. The plurality of storage locations are configured to store a plurality of requests transmitted by a plurality of agents. The arbiter control circuit is configured to arbitrate among the plurality of requests stored in the plurality of storage locations. A selected request is the winner of the arbitration, and the switch is configured to transmit the selected request from one of the plurality of storage locations onto the interconnect. In another embodiment, a system comprises a plurality of agents, an interconnect, and the switch coupled to the plurality of agents and the interconnect. In another embodiment, a method is contemplated. | 2010-09-16 |
20100235676 | METHOD AND SYSTEM FOR PROCESSING EMAIL DURING AN UNPLANNED OUTAGE - The method and system of the present invention provides an improved technique for processing email during an unplanned outage. Email messages are redirected from the primary server to a secondary server during an unplanned outage such as, for example, a natural disaster. A notification message is sent to users alerting them that their email messages are available on the secondary server by, for example, Internet access. After the termination of the unplanned outage, email messages received during the unplanned outage are synchronized into the users standard email application. | 2010-09-16 |
20100235677 | Generating A Parallel Recovery Plan For A Data Storage System - A method of identifying a parallel recovery plan for a data storage system comprises identifying base recovery plans for symbols of an erasure code implemented across a plurality of storage devices in a data storage system, generating a list of first recovery plans for a first symbol by manipulating the base recovery plans, and combining selected first recovery plans from the list to generate a set of parallel recovery plans to reconstruct a failed storage device. | 2010-09-16 |
20100235678 | System and Method for Data Protection Against Power Failure During Sector Remapping - Disclosed herein is a technique to protect sector remapped boundary data from corruption due to catastrophic errors such as loss of power in storage disks including SATA (Serial ATA) drives. Specially, one method is provided for protecting the boundary sector data from power failure through a data recovery mechanism, namely, a boundary sector table in which the boundary sectors are pre-stored in case any power failure or loss occurs during the sector remapped write operations. In connection with the boundary sector table stored in a reserved region of the storage disk, a boundary sector information index is provided in a bridge coupled to the disk, which serves as a key to identify and retrieve the needed boundary sector data from the table for corrupted data recovery. | 2010-09-16 |
20100235679 | DEFECTIVE MEMORY BLOCK REMAPPING METHOD AND SYSTEM, AND MEMORY DEVICE AND PROCESSOR-BASED SYSTEM USING SAME - A non-volatile memory device includes a block remapping system that offsets an input block address by the addresses of non-functional blocks to provide an output block address that is used to address the memory device. The system generates the output block addresses by, in effect, adding to the input block address the addresses of all non-functional blocks of memory that are between an initial address and the output block address. The system performs this function be comparing the input block address to the address of any defective block. If the address of the defective block is less than or equal to the input block address, the addresses of all defective blocks starting at the block address are added to the input block address. The system then iteratively performs this process using each output block address generated by the system in place of the input block address. | 2010-09-16 |
20100235680 | Microprocessor System for Controlling or Regulating at least partly Safety-Critical Processes - A microprocessor system ( | 2010-09-16 |
20100235681 | STREAM RECOVERY METHOD, STREAM RECOVERY PROGRAM AND FAILURE RECOVERY APPARATUS - Stream data is structured including data tuples as a query process target and a recovery point tuple for indicating a position of the data tuples in the stream data. Upon detection of a failure at a computer, another computer reads position information in the stream data indicating a position of data tuples already subjected to the query process by a stream processing apparatus from a recovery points, uses the recovery point positioned lastly among the read recovery points as a reenter point of the input stream, and instructs a stream distribution apparatus to reenter the input stream starting from the reenter position into the other computer. | 2010-09-16 |
20100235682 | I/O UNIT AND INDUSTRIAL CONTROLLER - This invention enables setting of a diagnosis algorithm of a safety device to be easily carried out. A slice I/O unit stores a plurality of diagnosis algorithms each corresponding to a different safety device in an ASIC, and stores specifying information for specifying a diagnosis algorithm to use of the plurality of diagnosis algorithms in a register of the ASIC. The slice I/O unit performs diagnosis of a connected safety device using the diagnosis algorithm specified by the specifying information stored in the register of the plurality of diagnosis algorithms. The diagnosis algorithm to use can be selected by selecting a number, and the like, which is preferable as a setting process at a setting tool device can be facilitated and a human error does not occur. | 2010-09-16 |
20100235683 | TESTING MULTI-CORE PROCESSORS - Methods and apparatuses are disclosed for testing multicore processors. In some embodiments, the tested multicore processor may include at least a first core and a second core, a data input coupled to a first scan chain in the first core and a second scan chain in the second core, and a multiplexer including at least a first input and a second input, the first input coupled with a data output of the first scan chain and the second input coupled with a data output of the second scan chain, the multiplexer further including an output that couples to one or more pins on a package of the processor, the multiplexer further including a select signal that couples to the one or more pins on the package of the processor, and wherein the data input couples to the one or more pins on the package of the processor. | 2010-09-16 |