39th week of 2009 patent applcation highlights part 56 |
Patent application number | Title | Published |
20090240926 | ARITHMETIC OPERATING APPARATUS AND METHOD FOR PERFORMING ARITHMETIC OPERATION - A technique realizes execution of various combinations of arithmetic operations in, for example SIMD floating-point multiply-add arithmetic operation, with less instruction kind codes. An arithmetic operating apparatus includes a setting unit that sets in one or more unused bits of a single instruction extended instruction information to instruct at least one of a register and arithmetic operators to perform an extended process different from an ordinary process. | 2009-09-24 |
20090240927 | PROCESSOR AND INFORMATION PROCESSING APPARATUS - A processor capable of executing conditional store instructions without being limited by the number of condition codes is provided. Condition data is stored in floating-point registers, and an operation unit executes a conditional floating-point store instruction of determining whether to store, in cache, store data. | 2009-09-24 |
20090240928 | CHANGE IN INSTRUCTION BEHAVIOR WITHIN CODE BLOCK BASED ON PROGRAM ACTION EXTERNAL THERETO - Extended, alternate and/or modified instruction behavior can be established using a program construct that appears outside a bounded block of program code in such a way that the behavioral changes are limited to the bounded block and coincide with a particular point in the execution thereof. These extensions, alternations and/or modifications are supported in some processor embodiments in ways that add neither additional code space nor additional execution cycles to the bounded block. In general, the particular point in execution of the bounded block may be specified in a variety of ways, including positionally or temporally. Techniques described herein have broad applicability, but will be understood by persons of ordinary skill in the art in the context of certain illustrative code blocks, including zero- (or low-) overhead loops, lightweight procedures and very long instruction word (VLIW) type instruction packets, and processors that support them. | 2009-09-24 |
20090240929 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR REDUCED OVERHEAD ADDRESS MODE CHANGE MANAGEMENT IN A PIPELINED, RECYLING MICROPROCESSOR - A method, system, and computer program product for reduced overhead address mode change management in a pipelined, recycling microprocessor are provided. The recycling microprocessor includes logic executing thereon. The microprocessor also includes an instruction fetch unit (IFU) supporting computation of address adds in selected address modes and reporting non-equal comparison of the computation to the logic. The microprocessor further includes a fixed point unit determining whether the mode has changed and reporting changes to the logic. Upon determining the comparison yields an equal result but the mode has changed, a recycle event is triggered to ensure subsequent ofetches are relaunched in the correct mode and that no execution writebacks occur from work performed in an incorrect mode. For comparisons yielding a non-equal result and a changed mode, the logic clears bits set in response to the determinations, and a serialization event is taken to reset a corresponding pipeline for operation in the correct mode. | 2009-09-24 |
20090240930 | Executing An Application On A Parallel Computer - Methods, systems, and products are disclosed for executing an application on a parallel computer including a plurality of nodes connected together through a data communications network. Each node has a plurality of processors capable of operating independently for serial processing and capable of operating symmetrically for parallel processing. The application has parallel segments for parallel processing and serial segments for serial processing. Embodiments of the invention include: booting up a first subset of the plurality of nodes in a serial processing mode; booting up a second subset of the plurality of nodes in a parallel processing mode; and executing the application on the plurality of nodes, including: migrating the application to the nodes booted up in the parallel processing mode upon encountering the parallel segments during execution, and migrating the application to the nodes booted up in the serial processing mode upon encountering the serial segments during execution. | 2009-09-24 |
20090240931 | Indirect Function Call Instructions in a Synchronous Parallel Thread Processor - An indirect branch instruction takes an address register as an argument in order to provide indirect function call capability for single-instruction multiple-thread (SIMT) processor architectures. The indirect branch instruction is used to implement indirect function calls, virtual function calls, and switch statements to improve processing performance compared with using sequential chains of tests and branches. | 2009-09-24 |
20090240932 | INFORMATION PROCESSING DEVICE, AND METHOD OF STARTING INFORMATION PROCESSING DEVICE - In an information processing device, a screen display control part displays an operation screen, and a firmware update part updates a firmware of the screen display control part. An operating state holding part stores an operating state of the information processing device at a time of displaying the operation screen after the firmware is updated by the firmware update part. A high-speed starting part starts the information processing device and displays the operation screen based on the stored operating state. | 2009-09-24 |
20090240933 | Computer system architecture and operating method for the operating system thereof - In order to develop a mobile operating system for a computer, first the mobile operating system must be independent from the computer hardware device. Therefore, the present invention discloses a new computer system architecture which loads a Transient Resident Operating System (TROS) from an external device and provides a predefined hardware device driver to the operating system, and then the TROS can be stored into a portable memory storage device to be a Mobile Operating System (MOS). By applying the technique disclosed in the present invention, the TROS can work beyond the Intrinsic Operating System (IOS) of the computer without the mutual interference from each other, such that a computer environment with a Parasitic Operating System (POS) is created. | 2009-09-24 |
20090240934 | COMPUTER SYSTEM WITH DUAL BOOT-PROGRAM AREA AND METHOD OF BOOTING THE SAME - A computer system with a dual boot-program area, comprises: a processing unit; a BIOS ROM having a primary boot-program area, a secondary boot-program area, and a BIOS main-code area, wherein a first code is both stored at a first address of the primary boot-program area and a second address of the secondary boot-program area; and a BIOS-switching circuit, connected to the BIOS ROM, further comprising a detecting circuit and an address-switching circuit. The detecting circuit can control the address-switching circuit to be operated in an enable mode or a disable mode. A command, issued from the processing unit and for retrieving the first code, is sent to the first address after a power button of the computer system is pressed if the address-switching circuit is operated in the disable mode; or, the command is sent to the second address if the address-switching circuit is operated in the enable mode. | 2009-09-24 |
20090240935 | COMPUTING ENVIRONMENT CONFIGURATION - Within a computing environment, an application may run in a variety of contexts, e.g., as a natively executable application, as a client-side interpretable application embedded in a web browser, or as a server-side application that communicates with the user through a web interface presented on a device. The application may also access resources of the computing environment stored on multiple devices. The configuration of the application to operate equivalently in these diverse environments may be facilitated by representing the application within an object hierarchy representing the computing environment. The application may be configured to operate on the objects of the object hierarchy regardless of the location of the stored objects, to execute on any device, and to execute upon a standard set of application programming interfaces. The configuration of the application in this manner promotes the versatility of the application in operating equivalently in different programming contexts. | 2009-09-24 |
20090240936 | SYSTEM AND METHOD FOR STORING CLIENT-SIDE CERTIFICATE CREDENTIALS - A method and system is provided for storing a plurality of client certificate credentials via a client web browser into one or more keystore file(s). The client web browser is used to establish the secure data transfer link between the client and the server. The client web browser includes a plug-in software component. The plug-in software component is configured to generate the keystore file and a key pair. The method may continue with generating a certificate request on the client. The certificate request generated is then transmitted to a certificate server. The certificate server is configured to digitally sign the certificate request generated. The method continues with the client receiving a signed certificate request. The signed certificate request is received by the client via the client web browser. The method may conclude by storing the plurality of client certificate credentials associated with the signed certificate request in one or more keystore file(s). | 2009-09-24 |
20090240937 | SEPARATED STORAGE OF DATA AND KEY NECESSARY TO ACCESS THE DATA - A novel approach introduces an extra layer of data security by storing files and the keys required to access the files separately. When the files are being accessed, the host of the files sends a request to an access device that stores the keys to access the files. The key will be provided to the host only if at least one of the following conditions is met: the host is within close proximity of the access device, the identity of the person attempting to access the files is authenticated, or the security status of the host is verified. | 2009-09-24 |
20090240938 | Device, System and Method for Service Delivery with Anti-Emulation Mechanism - A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an identifier of the service. The system server verifies that the client is authorised to access to the service and that the client is non-emulated. If this is verified, the service is provided to the client. In a preferred embodiment, the service is scrambled content and the system server provides a descrambling key to the client, and instructs a content server to provide the scrambled content to the client. Also claimed are a device, a system, and a system server. | 2009-09-24 |
20090240939 | SYSTEM AND METHOD FOR AUTHENTICATION IN WIRELESS NETWORKS BY MEANS OF ONE-TIME PASSWORDS - The present invention is directed to perform high-reliable authentication using a one-way function that a communication is a communication which was performed with the same apparatus to be authenticated by storing a password only in an apparatus to be authenticated (it is unnecessary to store a password in both of an authentication apparatus and an apparatus to be authenticated) without transmitting a challenge code. When a setting is updated in a setting management server, authentication is performed by using a one-time password obtained last time. A sound communication terminal performs a process using a hash function once on a one-time password transmitted this time, and performs authentication by determining whether the processed one-time password matches a one-time password obtained last time or not. Whether the information at the time of the change in the setting is proper or not is determined by a sound terminal. | 2009-09-24 |
20090240940 | POSITION BASED ENHANCED SECURITY OF WIRELESS COMMUNICATIONS - The convenience of a wireless network is tempered by the concern that a rogue device can listen in on the wireless communications. Determining the position of the home device and other devices within range allows the user of the home device to choose the specific wireless devices with which to communicate. The distance to the other devices within wireless communications range is helpful and allows the user to sort between safe and unsafe or rogue devices. Distance can be determined by a variety of methods including use of trusted references, signal strength, and error rate. Once the safe device is selected, the system will then establish a communications path with that device. | 2009-09-24 |
20090240941 | METHOD AND APPARATUS FOR AUTHENTICATING DEVICE IN MULTI DOMAIN HOME NETWORK ENVIRONMENT - A device authentication method and device authentication apparatus in a multi domain home network environment are provided. The method includes registering a new device in each local domain and issuing a local domain certificate; making an agreement between local domains in order to authenticate a device registered to another local domain; when the device registered to the home local domain or another local domain requests a service, authenticating the device via communication inside the local domains, thereby minimizing a user's intervention, making it easier to use the apparatus, reducing a device operation with regard to a device having limited performance, and making it easier to extend the apparatus. | 2009-09-24 |
20090240942 | LONG TERM KEY ESTABLISHMENT FOR EMBEDDED DEVICES - A secure communication session is established between a first device and a second device, by generating, in the first device, a first secret key to be utilized for communication sessions with other devices. The second device requests to establish a first communication session with the first device, and the second device generates a second secret key corresponding to the first secret key of the first device. The second device stores the generated second secret key in a non-volatile memory of the second device, the second secret key being stored in the non-volatile memory in association with an identifier of the first device. Finally, a secure communication session is established between the first and second devices utilizing the first and second secret keys. | 2009-09-24 |
20090240943 | CHALLENGE RESPONSE-BASED DEVICE AUTHENTICATION SYSTEM AND METHOD - A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the requesting device. The requesting device combines the challenge with a hash of a password provided by a user, and the combination is further hashed in order to generate a requesting encryption key used to encrypt the user supplied password. The encrypted user supplied password is sent to the authenticating device as a response to the issued challenge. The authenticating device generates an authenticating encryption key by generating the hash of a combination of the challenge and a stored hash of an authenticating device password. The authenticating encryption key is used to decrypt the response in order to retrieve the user-supplied password. If the user-supplied password hash matches the stored authenticating device password hash, the requesting device is authenticated and the authenticating device is in possession of the password. | 2009-09-24 |
20090240944 | GENERATION METHOD AND UPDATE METHOD OF AUTHORIZATION KEY FOR MOBILE COMMUNICATION - The present invention relates to an authorization key generating method and an authorization key updating method in a mobile communication system. A terminal and a base station generate an authorization key by using a terminal random value and a base station random value that are exchanged in an authorization key generating procedure as input data. In addition, a lifetime of an authorization key is established to be shorter than a lifetime of a root key, and the authorization key is updated with an updating period that is shorter than that of the root period. | 2009-09-24 |
20090240945 | ANTICOUNTERFEITING MEANS FOR OPTICAL COMMUNICATION COMPONENTS - Methods and systems for detecting counterfeit optical communications products are described. An exemplary system includes a host device and a fiber optic component, such as an optical transceiver. The optical transceiver may include a TOSA, a ROSA, a controller circuit, and a memory module. The controller circuit may be operably connected to the TOSA, the ROSA, and the memory module. The host device may send a set of challenge data to the optical transceiver. The optical transceiver may respond with a data set encrypted by the controller circuit using a secret key stored in the memory module. The encrypted response data set may be evaluated to determine whether the optical transceiver is authenticate. | 2009-09-24 |
20090240946 | DYNAMIC IDENTIFIER FOR USE IN IDENTIFICATION OF A DEVICE - A method for execution by a device, which comprises: generating a first signature by encrypting an identifier of the device together with first additional data; generating a second signature by encrypting the identifier of the device together with second additional data that is different from the first additional data; releasing the first signature to identify the device on a first occasion; and releasing the second signature to identify the device on a second occasion. Also, a device, which comprises: a memory storing an identifier of the device; a processing entity configured to generate a plurality of different signatures encoding the identifier and to store the signatures in the memory; and a transmit/receive entity configured to identify the device on respective occasions by releasing individual ones of the signatures. | 2009-09-24 |
20090240947 | SYSTEM AND METHOD FOR SECURELY ACCESSING MOBILE DATA - The present invention provides a system and method for maintaining secure information on mobile devices and that balances security and convenience in the provision of mobile data access. Security is maintained by extending the use of industry-accepted two-factor authentication methods, and convenience is enhanced by utilizing a user's existing mobile device accessories as an authentication factor. As a result, the present invention provides a strong authentication system and method without the cost or burden of requiring the user to acquire additional hardware for security purposes. | 2009-09-24 |
20090240948 | METHODS AND ARRANGMENTS FOR REALISING BETTING WITH OFF-LINE TERMINALS - Methods and arrangements are provided for handling, within a communications system comprising a distributed domain ( | 2009-09-24 |
20090240949 | Identity authentication based on keystroke latencies using a genetic adaptive neural network - A system and method identify the person who is using a keyboard based on keystroke latencies as the person types certain key combinations. In some embodiments the latencies are monitored as the person types a password, while in others they are monitored as the person types other information and continues to use the computer. In some embodiments the identification yields a binary result (whether the latency profile matches the profile stored for a particular user), while in others a confidence level is given. A mismatch, or a confidence level below a particular threshold, results in a request for further identity verification, creation of a log entry, immediate notification of responsible personnel, or denial of access (or continued access). | 2009-09-24 |
20090240950 | Information processing apparatus and information management method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores therein user signature information in which biometric information of a user and a user electronic signature key that is a key for generating an electronic signature of the user for information created by the user are associated with each other and an encryption key that is a key for encrypting information, an electronic signature adding unit that, if the biometric information is obtained from the user, searches the storage unit for the user signature information corresponding to the biometric information, and adds the electronic signature of the user to user created information with a user electronic signature key in the user signature information, and an encrypt processing unit that encrypts with the encryption key the user created information processed by the electronic signature adding unit. | 2009-09-24 |
20090240951 | SYSTEM SECURITY MANAGER - In another embodiment, a method for securing a field-programmable logic chip or circuit (FPLC) is disclosed. Information is cryptographically processed within the FPLC. An error condition is detected outside of the FPLC and the error condition is communicated to the FPLC to disrupt an image(s) within the FPLC. Optionally, at least a portion of a key can be erased such that cryptographic processing is curtailed or eliminated. | 2009-09-24 |
20090240952 | Method and system for decryption of file characteristics of .ZIP files - The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data | 2009-09-24 |
20090240953 | ON-DISK SOFTWARE IMAGE ENCRYPTION - A technique is introduced to support on-disk software image encryption. Image of a software component deployed to a host is encrypted when the image is created and/or its content is changed, before such image of the software component is being saved to a non-volatile storage of the host. The encrypted image of the software component is decrypted only at startup and/or resume time of the software component. Once decrypted, the image of the software component is loaded into a volatile storage of the host so that the software component can be up and running. | 2009-09-24 |
20090240954 | METHOD FOR SECURELY STORING A PROGRAMMABLE IDENTIFIER IN A COMMUNICATION STATION - Disclosed is a method for storing an identifier in a first station having a secure non-volatile data store protected by cryptographic data, an identifier flag for indicating that the identifier has been written to the secure data store, and an authenticated trust agent that prohibits writing of an identifier to the secure data store if the identifier flag is set. In the method, the identifier is written to the secure non-volatile data store, wherein the identifier written to the secure data store is encrypted using the cryptographic data. The identifier flag is irreversibly set after writing the identifier to the secure data store so that the trust agent prohibits another write of an identifier to the secure data store. | 2009-09-24 |
20090240955 | SECURE MEDIA STORAGE DEVICE AND METHOD OF SECURING MEDIA STORAGE DEVICES - A secure media storage device for an imaging device, comprising an interface ( | 2009-09-24 |
20090240956 | Transparent encryption using secure encryption device - A system and method for allowing application programs that are external to the relational database to access the sensitive data in the database in a seamless fashion are described. The application programs are allowed to use existing query statements without having to modify such statements for accessing encrypted data in the relational database. | 2009-09-24 |
20090240957 | COPY PROTECTION METHOD, CONTENT PLAYBACK APPARATUS, AND IC CHIP - An IC chip that can be added to a content recording medium and that has a chip ID which is non-rewritably and uniquely set and originally recorded therein, wherein the IC chip includes a writable/readable ID memory that stores an encrypted content ID obtained by encrypting a content ID that identifies content, and an encrypted chip ID obtained by encrypting the chip ID. | 2009-09-24 |
20090240958 | SYSTEM AND METHOD FOR GENERATING A SECURE STATE INDICATOR ON A DISPLAY - A system and method for generating a security indicator on a display of a computing device (e.g. a mobile device), to indicate when the computing device is in a secure state while locked. A determination is made (e.g. by a data protection system) as to whether at least some of the secure data stored on the computing device can be decrypted by any applications on the computing device, while the computing device is in the locked state. An icon or other identifier can be displayed to indicate that the secure state has been attained. In one embodiment, the secure state is considered to have been attained, if it is determined that all tickets that have been issued to applications on the computing device while the computing device was unlocked have been released, and any decrypted encryption keys that may be used to decrypt the secure data have been deleted. | 2009-09-24 |
20090240959 | BLOCK BASED POWER MANAGEMENT - A system and method is disclosed for efficiently managing power distribution among the various functional blocks used within portable electronic devices. The method includes allowing each functional block to be independently controlled, containing its own low-level software and power controls for setting the local power state of the functional block. For each power control domain in the implementation, hardware uses these local power states and sets the actual operating state of the power control domain accordingly. | 2009-09-24 |
20090240960 | Serially loading programming information into a psr cc/cv controller integrated circuit - A primary-side regulation (PSR) controller integrated circuit includes a PSR CC/CV controller and a non-volatile shift register. An assembled power supply that includes the integrated circuit is in-circuit tested to determine errors in power supply output voltage and/or current. Programming information is determined and shifted into the shift register. During programming, the power supply regulates to a different output voltage, and the different voltage is used for shift register programming. After programming, the power supply operates in a normal mode so that the output voltage and current are within specification. The voltage and current to which the power supply regulates are set by some of the bits of the programming information. Other of the bits set error correction circuits of the PSR CC/CV controller such as a primary inductance variation compensation circuit, a line input voltage variation compensation circuit, an efficiency variation compensation circuit, and a cord resistance compensation circuit. | 2009-09-24 |
20090240961 | INFORMATION PROCESSOR, COMPUTER READABLE RECORDING MEDIUM WHICH RECORDS DATA EVACUATION PROGRAM, AND DATA EVACUATION METHOD - An information processor includes a set information storage unit storing evacuation residual quantity information representing an evacuation residual quantity as a residual quantity of the battery that corresponds to electric power necessary for executing a data evacuation process for storing data, stored in a memory of the information processor, onto a nonvolatile recording medium, a battery residual quantity detecting unit detecting the battery residual quantity of the battery, a load information collecting unit acquiring load information representing an electric load of the information processor, an evacuation residual quantity setting unit setting the evacuation residual quantity based on the load information collected by the load information collecting unit, and controls the set information storage unit to store the evacuation residual quantity information representing the set evacuation residual quantity, and an evacuation control unit controlling execution of the data evacuation process. | 2009-09-24 |
20090240962 | POWER-AWARE WIRELESS TRANSMISSIONS - A technique for operating a device at multiple different power levels dependent upon the amount of power received involves sensing the amount of power received and turning on circuit components if power is adequate. A device constructed according to the technique should have the ability to detect at least two different, non-zero, power levels and turn on circuits to the extent that sufficient power is detected. | 2009-09-24 |
20090240963 | Distributed advanced power management - Power management commands from virtual machines (VMs) in a VM environment may be trapped by a VM monitor. Depending on the current power states of the other VMs in the VM environment, the VMM may emulate increase or decrease in available resources as applied to the VM issuing the power management commands. The VMM may modify the actual hardware resources available in a platform when such modification may not affect the current power states of the VMs in the VM environment. | 2009-09-24 |
20090240964 | Method and apparatus for holistic power management to dynamically and automatically turn servers, network equipment and facility components on and off inside and across multiple data centers based on a variety of parameters without violating existing service levels - The present invention provides a METHOD AND APPARATUS FOR HOLISTIC POWER MANAGEMENT TO DYNAMICALLY AND AUTOMATICALLY TURN SERVERS, NETWORK EQUIPMENT AND FACILITY COMPONENTS ON AND OFF INSIDE AND ACROSS MULTIPLE DATA CENTERS BASED ON A VARIETY OF PARAMETERS WITHOUT VIOLATING EXISTING SERVICE LEVELS. This method and apparatus pertains specifically to a method and apparatus for power management in data centers and large server environments. | 2009-09-24 |
20090240965 | ELECTRONIC APPARATUS AND AUTO WAKE-UP CIRCUIT THEREOF - The present invention relates to an electronic apparatus and an auto wake-up circuit thereof. The electronic apparatus comprises a main module for performing a main function of the electronic apparatus and generating a first control signal when the electronic apparatus enters a sleep mode; an auxiliary module, coupled to the main module, for performing an auxiliary function of the electronic apparatus and generating a second control signal; and a wake-up circuit module, coupled to the main module and the auxiliary module, for generating a third control signal based on the first control signal and the second control signal. The auxiliary module maintains the auxiliary function based on the third control signal while the electronic apparatus is in the sleep mode. | 2009-09-24 |
20090240966 | IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD, AND RECORDING MEDIUM - An image processing device including a first control unit to control a normal operating mode during which image processing is performed, a second control unit to control an energy-saving mode during which power consumption is lower than during the normal operating mode, an interrupt request receiver connected to an external device to receive an interrupt request from the external device, interrupt factor distributors to distribute the interrupt request received by the interrupt request receiver based on whether or not the interrupt request includes a predetermined interrupt factor, interrupt request notification units to notify the second control unit as well as the first control unit of the interrupt request in accordance with distribution results from the interrupt factor distributors, and job adjustors to control transfer of a job between the first control unit and the second control unit based on notification from the interrupt request notification units. | 2009-09-24 |
20090240967 | EFFICIENT LOW POWER RETRIEVAL TECHNIQUES OF MEDIA DATA FROM NON-VOLATILE MEMORY - Power consumption may be reduced in a media device including a first processor coupled to the non-volatile memory, either directly or indirectly, allowing the first processor to generate a pointer structure. The first processor may also be coupled, either directly or indirectly to a memory space, allowing the first processor to write the pointer structure in the memory space. The media device includes a second processor, such as a DSP/SHW or peripheral processor, and may be also be coupled, either directly or indirectly to the memory space, allowing the second processor to retrieve a block of media data from the non-volatile memory. Retrieval of the block of media data may be read directly from the non-volatile memory, or in some cases, the media data being retrieved may be parsed. The media data may be an audio file data, video file data, or both. | 2009-09-24 |
20090240968 | METHOD FOR CALIBRATING READ OPERATIONS IN A MEMORY SYSTEM - A method of calibrating read operations in a memory system is disclosed. The method involves placing a memory controller in a calibration mode, and performing a series of dummy read operations. Each of the read operations performs a read of pre-specified data stored in at least one memory component while using different ones of delayed enable signals. Data read from respective dummy read operations is compared to identify successful read operations while the timing information from successful read operations is compared to identify a suitable delayed enable signal. | 2009-09-24 |
20090240969 | System and Method to Facilitate Deterministic Testing of Data Transfers between Independent Clock Domains on a Chip - A system and method of deterministically transferring data across a first clock domain to a second clock domain includes receiving a resynchronize command, initiating a corresponding one of a plurality of read delays in each one of a second plurality of devices in the second clock domain, counting down the plurality of read delays to zero, receiving a training pattern after the plurality of read delays count down to zero in each one of the second plurality of devices, recovering a clock data in each of the second plurality of devices, receiving a synch byte by each of the second plurality of devices, selecting one of a plurality of serial lanes as a reference lane, wherein the plurality of serial lanes couple the first clock domain to the second clock domain, initiating a write pointer, writing n bytes of serial data to a buffer and converting the n bytes of data from serial data to parallel data in a serial to parallel converter such that the serial n byte data in the buffer are aligned in time. | 2009-09-24 |
20090240970 | CLOCK DISTRIBUTION APPARATUS, SYSTEMS, AND METHODS - Apparatus, systems, and methods are disclosed that operate to adjust power received by a clock distribution network at least partially based on operating conditions of an integrated circuit. Additional apparatus, systems, and methods are disclosed. | 2009-09-24 |
20090240971 | OPTIMIZED PERFORMANCE AND POWER ACCESS TO A SHARED RESOURCE IN A MULTICLOCK FREQUENCY SYSTEM ON A CHIP APPLICATION - A request from a first processor for access to a shared resource in a computing system is received, and access is provided to the shared resource by the first processor at a first clock frequency. A request from a second processor for access to a shared resource in a computing system is received, and access is provided to the shared resource by the second processor at a second clock frequency that is lower than the first clock frequency. | 2009-09-24 |
20090240972 | MODELING RECURRING EVENTS IN A DATA STORE - Time-related properties may be modeled independent of a base object. Rather than storing time properties with the object, they may be stored independently. A given object may be stored once, even if it has a recurrent time property. The description of a “meeting,” for example, may be stored once. Each occurrence of that object over time may be stored in a “timeslot” (object occurs at time ‘t’ on day ‘d’). If it is a recurring property, recurrence information may be stored independently. “Exception” information may be stored independently as well. | 2009-09-24 |
20090240973 | System and method for effectively performing a clock adjustment procedure - A system and method for effectively performing a clock adjustment procedure includes a multi-core processor that has a plurality of processor cores that each operate with reference to a target clock signal for performing various processing tasks. The processor cores include functional processor cores and one or more non-functional processor cores. A clock manager performs the clock adjustment procedure under control of a master processor core by selecting and applying a target clock frequency for the target clock signal. The target clock frequency is selected to allow the functional processor cores to compensate for the non-functional processor cores by collectively performing all of the required processing tasks. | 2009-09-24 |
20090240974 | Data replication method - Provided is a data replication method capable of reducing the number of communication times when a processing result of an active system is replicated to a standby system. The data replication method, in which a first computer receives a first message containing a first processing request, and a plurality of second computers replicates the first message, includes the steps of: sending, by a third computer, the first message to the first computer and the second computers; sending, by each of the second computers, a message receive notification of the first message to the first computer; sending, by the first computer, after reception of the message receive notification from the second computers, the message receive notification of the first message to the third computer; and sending, by the first computer, a notification indicating that the first processing request becomes executable by the first computer to the second computers. | 2009-09-24 |
20090240975 | METHOD AND APPARATUS FOR VIRTUAL NETWORK ATTACHED STORAGE REMOTE MIGRATION - A system and a method for causing migration of VNASs formed on NAS heads of one NAS system to other NAS heads on the same NAS system or on other NAS systems including independent storage systems. A VNAS management program on each NAS head includes a VNAS assign program, a failure detect program and a load balance program, that all include a capability for causing remote migration of VNASs on the NAS head in case a VNAS fails, the NAS head fails, or the entire NAS system fails. The VNAS management capability may cause VNAS migration if a NAS head is over loaded or if it is lightly loaded and may be powered down after its VNASs have been transferred. | 2009-09-24 |
20090240976 | METHODS AND SYSTEMS FOR A STORAGE SYSTEM - A storage system that may include one or more memory sections, one or more switches, and a management system. The memory sections include memory devices and a section controller capable of detecting faults with the memory section and transmitting messages to the management system regarding detected faults. The storage system may include a management system capable of receiving fault messages from the section controllers and removing from service the faulty memory sections. Additionally, the management system may determine routing algorithms for the one or more switches. | 2009-09-24 |
20090240977 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR HARD ERROR DETECTION - An error detection system is provided. The system includes a data array that includes one or more data entries. A copy datastore selectively stores a copy of a first single data entry of the data array. An index generator selectively increments an index that references the data array. A first comparator compares the copy with a second single data entry from the data array based on the index. An error generator generates an error signal based on a result from the first comparator. | 2009-09-24 |
20090240978 | INFORMATION STORAGE MEDIUM AND INFORMATION STORAGE MEDIUM PROCESSING APPARATUS - An information storage medium according to one embodiment of the invention includes a card main body embedded with a module, in which the module includes a communication control unit for interpreting received data, and selectively executing normal processing for returning response data to a transmission source of the received data based on a determination result indicating that the received data is correct data complying with a predetermined communication protocol, and error processing for returning an error to the transmission source of the received data based on a determination result indicating that the received data is error data. | 2009-09-24 |
20090240979 | DETERMINING A SET OF PROCESSOR CORES TO BOOT - Techniques that determine a strict subset of multiple processor cores from a set of multiple functional processor cores integrated within a single integrated circuit package. The determined strict subset of multiple processor cores differs from a previously determined strict subset of multiple processor cores from the set of multiple functional processor cores used to initiate an immediately previous core booting. In response to a processor reset, booting of the strict subset of multiple processor cores is initiated. Also, support for selecting multiple modes of operations, either supporting fault tolerance or extended life. | 2009-09-24 |
20090240980 | INFORMATION PROCESSING DEVICE AND FAILURE CONCEALING METHOD THEREFOR - An information processing device comprises a plurality of processing units on which OSs and execution environments operate, and shared peripheral devices shared by the plurality of processing units. The information processing device is provided with a failure concealing device for concealing a failure which has occurred in a processing unit. The failure concealing device determines a substitutional processing unit that will act as a substitute for a failed processing unit so that the OS and execution environment which have operated on the failed processing unit will operate on the substitutional processing unit, switches the OS and execution environment which have operated on the failed processing unit so that they will operate on the substitutional processing unit, and switches a shared resource used by the failed processing unit such that it is available to the substitutional processing unit. | 2009-09-24 |
20090240981 | BOOTSTRAP DEVICE AND METHODS THEREOF - A method of booting a multi-processor data processing device includes establishing a link between a first processor and a memory. The link is monitored to determine if, in response to a request from the processor, expected initialization data is communicated between the memory and the first processor. If unexpected data is detected on the link, the link is severed and a new link established between a second processor and the memory to allow the second processor to initiate the boot process. This ensures that, in the event of an error in the boot process at the first processor, the device can complete the boot process, thereby reducing device downtime. | 2009-09-24 |
20090240982 | IMAGE READING APPARATUS, METHOD FOR READING IMAGE, IMAGE FORMING APPARATUS, AND PROGRAM - The image reading apparatus continuously reads image data of a plurality of pages of a document, each page being added with identification information including specific information of the page and common information showing relationship with at least one precedent and one subsequent pages, that includes an image storage potion for storing image data of each page of the read document, an identification information extracting portion for extracting the identification information from the image data, a missing page detecting portion for detecting a page missed by failure of reading in the document based on identification information of each extracted page, and a display portion for prompting reading of the document by displaying the missing page, in which when an instruction of rereading is given and identification information of the missing page is extracted from image data read again, the image data is additionally stored in the image storage portion. | 2009-09-24 |
20090240983 | METHOD AND SYSTEM FOR LICENSE INTERACTION AND INTERACTION RECOVERY AFTER INTERRUPTION - A method for license interaction and interaction recovery after interruption overcomes the problems of mobility loss and waste of rights of the license due to interruption of communication during the license interaction. This method includes: when a first device and a second device interact on license information, both devices record the interaction related information; after the interaction is interrupted and the connection is re-established, the first device and the second device continue the interaction when determining that the interaction is uncompleted according to the recorded information. A communication device and a digital rights management (DRM) system are also disclosed. | 2009-09-24 |
20090240984 | TEST APPARATUS FOR TESTING AN INFORMATION PROCESSING APPARATUS - A test apparatus for testing an information processing apparatus includes a control unit connected to the control signal line through the connector unit to receive command information from the processing unit to execute the program, and a switching unit connected to the control unit to connect the second communication signal line and the fourth communication signal line under the control of the control unit. | 2009-09-24 |
20090240985 | METHOD AND SYSTEM FOR MONITORING A COMPUTING DEVICE - In general, in one aspect, the invention relates to a method for monitoring a computing device, that includes receiving, by a data collector, a plurality of system messages from a system controller, wherein the data collector is wired to a serial port component of the system controller, wherein the system controller is factory preconfigured to automatically send the plurality of system messages via the serial port when the data collector is connected to the serial port, wherein the computing device comprises the system controller, and wherein the data collector is independent of the computing device. The method further includes storing data from the plurality of system messages on the data collector, receiving, by the data collector, a data transmit request, and wirelessly transmitting, by the data collector, the data to a field receiver. | 2009-09-24 |
20090240986 | GENERATION OF SIMULATED ERRORS FOR HIGH-LEVEL SYSTEM VALIDATION - Embodiments of the invention enable error simulation for system validation. Errors can be simulated by modifying data presented to the processor as well as generating interrupts consistent with the modified data in the ASIC hardware. Modify logic may be added to the ASIC so when the microprocessor attempts to read a specific address, the modify logic may mask one or more of the data bits returned by the requested address. Address, bit mask, and force value data may be stored in registers to determine which address may be modified, the bit location to be modified, and the value that bit location should be changed to. Selection logic may then determine whether data from the modify logic or the unmodified value from an attached device should be sent to the ASIC interface and on to the microprocessor. A timer may also be used to decouple the setup from the test. | 2009-09-24 |
20090240987 | TEST AMPLIFICATION FOR DATACENTER APPLICATIONS VIA MODEL CHECKING - Systems and methods are provided to determine execution errors in distributed computing environments. In an illustrative implementation, a computing environment comprises a test amplification engine and at least one instruction set to instruct the test amplification engine to process data representative of a request to perform a test for one or more execution errors in an distributed computing environment according to a selected execution error testing paradigm dependent on identifying critical sources of non-determinism for execution within the exemplary distributed computing environment. In an illustrative operation, a participating distributed computing environment operator (e.g., programmer) can cooperate with the test amplification engine to select an existing unit or integration test, instrument sources of non-determinism and to select one or more instrumentations for the unit or integration test for execution in the exemplary distributed computing environment to elicit the occurrence of one or more execution errors. | 2009-09-24 |
20090240988 | METHOD OF CORRECTING JOB CONTROL LANGUAGE JOB ERRORS - A method of correcting job control language (JCL) jobs scans a JCL job against a set of JCL syntax rules. The method automatically corrects any syntax errors discovered during the scanning, thereby forming a corrected JCL job. The method then runs the corrected JCL job. If the corrected JCL ends abnormally due to an execution error, the method then automatically determines if the execution error is recoverable. If the execution error is recoverable, the method automatically corrects the recoverable error to form a recovered corrected JCL job. The method reruns the recovered corrected JCL job. | 2009-09-24 |
20090240989 | TEST SYSTEM AND BACK ANNOTATION METHOD - A test system for performing a test of a device is provided that comprises a source file of a test plan that describes a program for performing a test, and one or more of elements that are formed in a unit that divides the source file into one or more blocks. The test system further comprises an annotatable object that, when debugging of objects of the source file is performed, manages modification details of the debugging with reference to an element corresponding to a portion where the debugging is performed, and a controller that, after the debugging, rewrites the source file with details after the debugging is performed on an element basis based on the element and the annotatable object. | 2009-09-24 |
20090240990 | DETERMINING AN UNDERLYING CAUSE FOR ERRORS DETECTED IN A DATA PROCESSING SYSTEM - Determining an underlying cause for errors that are detected in the data processing system is performed. An occurrence of at least one error in the data processing system is detected, thereby forming a detected error. Responsive to detecting the detected error, a determination is made as to whether there is at least one previously recorded error in an error history data structure that is the underlying cause for the detected error. The at least one previously recorded error is related to the detected error and the at least one previously recorded error is of a different type from the detected error. Responsive to identifying the at least one previously recorded error, the at least one previously recorded error is reported to a user. | 2009-09-24 |
20090240991 | Automation device with diagnosis functionality - An automation device having a diagnosis program for detecting operating and/or error statuses in hardware and/or software components of the automation device is disclosed. The diagnosis program is included in a Basic Input Output System of the automation device. | 2009-09-24 |
20090240992 | Storage system and control method thereof - Provided is a storage system, including: one or more disk drives storing data; a disk controller for controlling data access to the disk drive; a power supply controller for autonomously turning off a power source of the disk drive according to the data access status to the disk drive, and autonomously turning on the power source of the disk drive, which was turned off, after the lapse of a prescribed period from the time the power source was turned off irrespective of the data access status to the disk drive; and a media inspection unit for inspecting a failure in the disk drive in which the power source thereof was autonomously turned on irrespective of the data access status to the disk drive. | 2009-09-24 |
20090240993 | COMPUTER PROGRAM AND METHODS FOR AUTOMATICALLY INITIALIZING AN AUDIO CONTROLLER - A computer program of the type commonly known as a “wizard” is disclosed that initializes user interface software for controlling an audio conferencing device. The wizard allows the desired audio inputs (e.g., microphone, telephones, etc.) and audio outputs (speakers, recording devices, etc.) to be chosen by an audio system administrator. Thereafter, the wizard allows an audio conferencing device (or devices) to be chosen by the administrator, or allows such a device(s) to be optimally chosen dependent upon the chosen inputs and outputs. The wizard then maps the inputs and outputs to the input and output ports on the audio conferencing device. When the administrator finishes the wizard, the wizard computes the mapping parameters and other audio-optimizing parameters for the selected inputs and outputs. These parameters are then loaded into the user interface software automatically. | 2009-09-24 |
20090240994 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING DATA BITS - Provided are an apparatus and method for transmitting and receiving data bits. The apparatus includes a transmitter configured to generate a transmission signal corresponding to the data bits and having a periodic transition, a data line configured to transmit the generated transmission signal, and a receiver configured to generate a reception clock signal from the periodic transition of the transmission signal (“reception signal”) transmitted through the data line, sample the reception signal according to the generated reception clock signal to recover the data bits. Accordingly, it is possible to transmit clock information without a clock line separate from the data line. | 2009-09-24 |
20090240995 | METHOD AND APPARATUS FOR IMPROVING RANDOM PATTERN TESTING OF LOGIC STRUCTURES - A test method and apparatus for randomly testing logic structures. The method includes identifying and analyzing a functional behavior of a logic structure to be covered during the random testing, modifying the logic structure such that the logic structure behaves in a functional manner during random testing, and generating patterns to exercise the modified logic structure. | 2009-09-24 |
20090240996 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE - A semiconductor integrated circuit equipped with multiple serially coupled scan chains which are used to shift inspection data based on different clock signals in order to inspect a scan path is provided. Inspection data is supplied to the respective scan chains in a first inspection mode, and the inspection data is supplied to the first stages of scan chains when in a second inspection mode. The inspection data supplied to the serially coupled scan chains in the second inspection mode is held in sequence by data hold units while being shifted between the scan chains. | 2009-09-24 |
20090240997 | SEMICONDUCTOR INTEGRATED CIRCUIT AND DESIGN AUTOMATION SYSTEM - A scan chain circuit causes a plurality of flip-flops to function as shift registers during execution of a scan test and can execute a scan shift that serially transfers test pattern data for the scan test. A clock gating circuit controls output of a pulse of a clock signal supplied to the scan chain circuit in accordance with a clock gating signal, whereas disables the clock gating signal based on a logic of a scan enable signal authorizing the scan shift. A first clock gating circuit included in the clock gating circuit disables the clock gating signal during the scan shift based on the logic of the scan enable signal and also inverts the clock signal and outputs a result of inverting. | 2009-09-24 |
20090240998 | METHOD AND SYSTEM FOR WIRELESS REAL-TIME TRANSMISSION OF MULTICHANNEL AUDIO OR VIDEO DATA - A method and a system for streaming multi channel digital isochronous data. The method is used for streaming multi channel digital isochronous data, e.g. audio data, in a standard wireless local area network transmission system where bandwidth is reserved for both contention-based traffic and contention free traffic and the audio data formed by samples is organized in audio frames and sent to receivers using multicasting, within consecutive beacon intervals. The contention free traffic of the beacon interval is adjusted to an optimum value, and the length of the beacon interval is adjusted such that a required amount of audio data can be sent to the receivers with minimum system delay. | 2009-09-24 |
20090240999 | METHOD FOR RESOURCE ALLOCATION IN HARQ - A resource allocation method for use in a system for performing a decoding function by combining an first-transmitted packet with a re-transmitted packet includes: transmitting a packet using N resource blocks (where N=integer >0); receiving a first negative-acknowledgement (NACK) signal for the packet; and re-transmitting the packet using M resource blocks according to the first NACK signal (where M=N >integer >0). Therefore, the resources can be efficiently allocated during the re-transmission. | 2009-09-24 |
20090241000 | Automated content delivery to distributed media outlets - A method can include sending a request to a media content provider requesting media content and receiving the media content and instructions from the media provider. The instructions can be utilized by the media provider to broadcast the media content. The media provider can store the received media content in a database process the instructions then distribute the media content and the instructions to distributed media outlets. The media content provider can receive information indicating that the media content was broadcast by the distributed media outlets according to the instructions. | 2009-09-24 |
20090241001 | RETRANSMISSION AND DELAYED ACK TIMER MANAGEMENT LOGIC FOR TCP PROTOCOL - Provided is an apparatus for detection timeout of each channel, which is a socket connection, in a Transmission Control Protocol (TCP) Offload Engine (TOE) using TCP accelerating hardware, and a method thereof. The timer managing apparatus of the TOE using the TCP accelerating hardware, including: a command register for receiving a command for a retransmission timer or a delayed ACK timer from an embedded processor of the TOE; a finite state machine (FSM) for storing information of a timer in operation by analyzing the command for the retransmission timer or the delayed ACK timer stored in the command register and controlling an entire operation of the timer managing apparatus; and a timeout checker for checking timeout of a timer in operation by using the stored timer information and notifying the timeout to the FSM. | 2009-09-24 |
20090241002 | Method and apparatus for selecting retransmission mode in a mimo communication system - A method and apparatus for selecting a retransmission mode in a MIMO communication system are provided wherein a receiver receives m initial transmission streams from a transmitter, m being an integer of 2 or larger, channel-decodes the m initial transmission streams and checking errors in the m channel-decoded streams, selects, if at least two channel-decoded streams have errors among the m channel-decoded streams, a retransmission mode to be used for the at least two streams having errors in the transmitter, and transmits information including the selected retransmission mode to the transmitter. | 2009-09-24 |
20090241003 | COMMUNICATION METHOD AND COMMUNICATION APPARATUS - A communication method including receiving a common channel signal, transmitting information indicating a reception state based on data included in the received signal, determining whether or not the data included in the received signal is acquirable, measuring fading speed based on the received signal in the case where the data is determined not to be acquirable, estimating whether or not the data is determined to be acquirable by re-determination based on the measurement result, and adding specified signals before and after the information indicating the reception state when the estimating results in a determination that the data is acquirable by re-determination. | 2009-09-24 |
20090241004 | METHOD FOR EFFECTIVELY TRANSMITTING CONTROL SIGNAL IN WIRELESS COMMUNICATION SYSTEM - A method of performing HARQ performed by a user equipment (UE) is provided. The method includes receiving a bundling indicator which indicates the number of bundled downlink subframes, determining whether at least one bundled downlink subframe is missed by comparing the bundling indicator with the number of detected bundled downlink subframes, generating a representative ACK/NACK signal when no bundled downlink subframe is missed, and transmitting the representative ACK/NACK signal on an uplink channel. Recovery capability is maximized and the packet loss is reduced in such a situation that less number of ACK/NACK signals are fed back than that of downlink packets. | 2009-09-24 |
20090241005 | METHOD FOR PACKET SCHEDULING IN SELECTIVE HYBRID ARQ - There is provided a method for packet scheduling in a selective hybrid automatic repeat request (HARQ) including the steps of: increasing a priority of a receiver buffer after a packet is transmitted to the receiver; receiving a feedback packet for the transmitted packet and determining whether the feedback packet is an ACK packet or a NACK packet; lowering the priority of the receiver buffer if the feedback packet is an ACK packet; determining whether the feedback packet is a NACK packet for initial transmission or the feedback packet is a NACK packet for retransmission if the feedback packet is the NACK packet, increasing the priority of the receiver buffer if the feedback packet is the NACK packet for the initial transmission, and lowering the priority of the receiver buffer if the feedback packet is the NACK packet for retransmission; and scheduling packets after calculating a priority of each receiver buffer by performing the priority increasing step to the determining step for all of receivers. | 2009-09-24 |
20090241006 | Bitwise Operations and Apparatus in a Multi-Level System - A system uses multi-level encoding where each symbol of a plurality of symbols represents more than one bit of information in a user data symbol stream for transfer using a multilevel transmission channel. The user data symbols are represented in a digital bitwise form such that each symbol is presented as a plurality of bits and each bit is subject to a different probability of error. An error correction procedure is applied based on the different error probability that is associated with each bit in the plurality. The channel can be configured to support a mosaic tile structure, each tile containing a channel symbol such that a selected tile has a collective error probability that is different from other tiles. Customized coding can be applied to the tile structure to allocate a selected amount of error correction power to the selected tile based on an overall available correction power. | 2009-09-24 |
20090241007 | METHOD AND APPARATUS FOR UNEQUAL ERROR PROTECTION OF VIDEO SIGNAL OVER WIDEBAND HIGH FREQUENCY WIRELESS SYSTEM - Disclosed are an Unequal Error Protection (UEP) method and apparatus of video signals based on a dynamic link in a broadband high frequency wireless system. | 2009-09-24 |
20090241008 | Memory devices and encoding and/or decoding methods - Memory devices and/or encoding/decoding methods are provided. A memory device may include: a memory cell array; an internal decoder configured to apply, to a first codeword read from the memory cell array, a first decoding scheme selected based on a characteristic of a first channel in which the first codeword is read to perform error control codes (ECC) decoding of the first codeword, and apply, to a second codeword read from the memory cell array, a second decoding scheme selected based on a characteristic of a second channel in which the second codeword is read to perform the ECC decoding of the second codeword; and an external decoder configured to apply an external decoding scheme to the ECC-decoded first codeword and the ECC-decoded second codeword to perform the ECC decoding of the first codeword and the second codeword. | 2009-09-24 |
20090241009 | Encoding and/or decoding memory devices and methods thereof - Encoding/decoding memory devices and methods thereof may be provided. A memory device according to example embodiments may include a memory cell array and a processor including at least one of a decoder and an encoder. The processor may be configured to adjust a redundant information rate of each channel, where each of the channels is a path of the memory cell array from which data is at least one of stored and read. The redundant information rate may be adjusted by generating at least one codeword based on information from a previous codeword. Therefore, example embodiments may reduce an error rate when data is read from and written to the memory device. | 2009-09-24 |
20090241010 | MEMORY SYSTEM - A memory system includes a controller that manages data stored in the first and second storing areas. The controller determines, when a readout error occurs when the stored data in the second storing area is read out, success or failure of error correction to the read-out data based on the result of the error correction stored in a storage buffer, writes, when the error correction is successful, correction data corresponding to the read-out data stored in the storage buffer, and writes, when the error correction fails, the read-out data itself not subjected to error correction processing. | 2009-09-24 |
20090241011 | MEMORY DEVICE - A method of controlling a memory device connectable to a host for sending out a command to the memory device, having a medium including a plurality of sectors, a head for writing data into and reading data from the medium, and a buffer memory for storing information, the method has receiving information indicating an error of data read out from a sector by the memory device and storing identification information of the sector where the error has been detected in the buffer memory and receiving information indicating an error of data read out from a sector by the host and storing in the buffer memory identification information of the sector where the error has been detected such that in the absence of vacant area in the buffer memory, the identification information is written over into an address where information of sector error detected by the memory device has been stored. | 2009-09-24 |
20090241012 | MEMORY CONTROLLER - A memory controller for writing data in a first semiconductor memory including a plurality of memory cells having series-connected current paths and charge storage layers includes a host interface which configured to be receivable of first data from a host apparatus, a second semiconductor memory which temporarily holds second data, and an arithmetic unit which generates the second data in accordance with the state of the first semiconductor memory, temporarily holds the second data in the second semiconductor memory, and writes the first and second data in the first semiconductor memory. When writing the second data, the arithmetic unit does not select a word line adjacent to a select gate line, and selects a word line not adjacent to the select gate line. | 2009-09-24 |
20090241013 | EFFICIENT DECOUPLING SCHEMES FOR QUANTUM SYSTEMS USING SOFT PULSES - A system and method for dynamical decoupling of a quantum system includes forming a graph including elements to account for decoupling sequence effects represented as nodes in the graph and soft pulses applied being represented as edges in the graph. Sequences which visit edges and nodes in the graph are provided. Binary strings corresponding to the nodes in a coordinate system are mapped using a fixed linear error correcting code. A decoupling method is provided based upon a matrix formed using the error correcting code to determine features of the soft pulses to decouple environmental effects from the quantum system. | 2009-09-24 |
20090241014 | Safe threshold-detection device for a railway system - A device for the safe threshold-detection of state information from an analog signal including a decision component and at least two acquisition diversity channels including in series a safe adaptation circuit, an electronic analog-to-digital conversion circuit, and a unit for comparing the digital output signal of the analog-to-digital conversion circuit with a reference signal is provided. | 2009-09-24 |
20090241015 | APPARATUSES, METHODS AND SYSTEMS FOR A COMPOSITE MULTIMEDIA CONTENT GENERATOR - The disclosure details the implementation of apparatuses, methods, and systems for a Composite Content Generator. The disclosure teaches a Composite Content Generator, which provides a straightforward, unified, and transparent interface that presents users with the ability to customize publication purchases. Buyers of content may desire to customize their purchases in order to acquire certain sections of a work (e.g., select chapters from a travel book, select recipes from a cook book, choose certain subjects out of reference or medical journals, and specific sections of a periodical). In one embodiment, the Composite Content Generator allows buyers to view, select, and purchase portions of various works (e.g., such as books, periodicals, reference materials, and/or the like) and receive fulfillment of their purchase as a customized and modular composite publication. | 2009-09-24 |
20090241016 | DISPLAY CONTROL APPARATUS, DISPLAY CONTROL METHOD AND COMPUTER PRODUCT - A display control apparatus acquires a Web page from a Web server to transmit the Web page to a user terminal. The display control apparatus receives, from the user terminal, a request for access to a second Web page among link destination Web pages of a first Web page in which a link to one or a plurality of the link destination Web pages is embedded; extracts, from the first Web page, a keyword relevant to the second Web page; detects a notable portion, serving as a portion relevant to the keyword, in the second Web page; and sets a display priority of a notable part including the notable portion of the second Web page so that the display priority of the notable part is higher than that of an accessory part serving as a part other than the notable part. | 2009-09-24 |
20090241017 | SHARING SYNDICATED FEED BOOKMARKS AMONG MEMBERS OF A SOCIAL NETWORK - A computer-implemented method of bookmarking syndicated feeds. The method can include receiving a request to bookmark a first network resource and determining whether at least one syndicated feed is associated with the first network resource. When at least one syndicated feed is associated with the first network resource, the syndicated feed can be identified to a user and the user can be prompted to indicate whether to bookmark the syndicated feed. Responsive to receiving an indication from the user to bookmark the syndicated feed, a bookmark can be generated for the syndicated feed and the syndicated feed bookmark can be output. | 2009-09-24 |
20090241018 | APPARATUS AND METHOD FOR DISPLAYING SEARCH RESULTS WITH CONFIGURABLE COLUMNS AND TEXTUAL SUMMARY LENGTHS - A graphical user interface includes configurable parameters to format search results. The configurable parameters include configurable parameters to specify column configuration and textual summary length. | 2009-09-24 |
20090241019 | SYSTEM AND METHOD OF FORMING HELP FILES - A system of forming a help file in a computer system, including an external configuration file containing information about a computer application running on the computer system, a help file having at least one page of help and an internal configuration file, and a control element to generate the at least one page of help according to the internal configuration file, wherein the control element incorporates the information from the external configuration file to the at least one page of help upon activation of the pages of help. | 2009-09-24 |
20090241020 | Method and Related Apparatus and Website Access System Capable of Enhancing Website Compatibility - A method capable of enhancing website compatibility includes receiving a command for browsing a first website stored in a website server through a website browser, receiving a first program code of the first website according to the command, determining whether the first program code is capable of being interpreted by the website browser, so as to generate a determination result, transforming the first program code according to the determination result, and outputting a transformation result of the first program code to the website browser. | 2009-09-24 |
20090241021 | DOCUMENT MANAGEMENT SYSTEM AND DOCUMENT MANAGEMENT METHOD WHICH ENABLES A DOCUMENT OPERATION USING A SHORT CUT TEMPLATE - A client device network-connected to a document management server managing a document stored in a storage and keeping at least one document managing rule, firstly edits a template which includes information for an operation performed to a document, information for a name of a menu to be registered in the device, and an identifier of a document managing rule. Then, a document managing rule specified by the identifier which is included in the edited template is obtained from the server. Then, a determination is made as to whether or not an operation which is included in the edited template is pursuant to the obtained document managing rule. Finally, a name of a menu instructing to perform the operation in the client device is registered, if it is determined that the operation included in the edited template is pursuant to the obtained document managing rule, and is not registered otherwise. | 2009-09-24 |
20090241022 | MACHINE-IMPLEMENTED DATA CONVERSION METHOD FOR A BILL OF MATERIALS - A machine-implemented method for data conversion, which is adapted for converting a plurality of entries of component data in a bill of materials, includes the steps of: (a) reading the entries of the component data from the bill of materials; (b) acquiring a critical text set from each of the entries of the component data; (c) generating a converted component value and a converted component value range for the critical text set acquired from each of the entries of the component data; and (d) rearranging the entries of the component data in the bill of materials according to the converted component values, and displaying the rearranged entries of the component data together with the corresponding converted component values and the corresponding converted component value ranges. | 2009-09-24 |
20090241023 | DISPLAY APPARATUS, DISPLAY METHOD, AND PROGRAM - The present invention provides a display apparatus including a storage unit that stores information on electronic tickets; a reading unit that reads the information on electronic tickets stored in the storage unit; a determining unit that determines whether the electronic tickets are in use based on usage information of the electronic tickets included in the information on electronic tickets read by the reading unit; a display order determining unit that determines display order on a screen display of the electronic tickets based on results of the determination made by the determining unit; and a display screen generating unit that generates a display screen showing the electronic tickets according to the display order on the screen display determined by the display order determining unit. | 2009-09-24 |
20090241024 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PRINTING SYSTEM - An information processing apparatus including a preview object unit configured to generate a preview document based on document data stored in a preview print queue. The preview object unit displays the preview document on a screen, and stores the preview document in a print command generation print queue. The information processing apparatus also includes a print command generation object unit configured to generate a print command based on the preview document stored in the print command generation print queue. | 2009-09-24 |
20090241025 | Image Processing Apparatus - An image processing apparatus includes an receiving unit that receives e-mail via a first path, an acquiring unit that acquires an acquired file via a path other than the first path, a determining unit that determines whether an attached file and synthesization information for synthesizing the attached file and the acquired file are included in the received e-mail, and a synthesizing unit which, when the attached file and the synthesization information are included in the received e-mail, synthesizes the attached file and the acquired file based on the synthesization information. | 2009-09-24 |