40th week of 2011 patent applcation highlights part 75 |
Patent application number | Title | Published |
20110246760 | ELECTRONIC DEVICE AND ELECTRONIC DEVICE SYSTEM - According to one embodiment, an electronic device system includes a first controller and an electronic device. The first controller includes a command terminal for outputting a command to an electronic device and a plurality of data terminals for transmitting/receiving data. The electronic device coupled to the first controller via the command terminal and the data terminals, the electronic device stores a boot information, wherein when power is turned on, the first controller generates a signal and supplies the signal from one of the data terminals to the electronic device, and receives the boot information read from the electronic device in accordance with the signal. | 2011-10-06 |
20110246761 | Systems and methods for distributed media stream transcoding and sharing - A new approach is proposed that contemplates systems and methods to support distributed stream media transcoding and sharing in real time. Under the approach, a host associated with a sender generates a high quality stream of media content that is to be shared with a plurality of viewers over a communication network. The hosting devices associated with the plurality of viewers are evaluated for their capability to process and/or transcode the high quality media stream. Based on the evaluation, the host of the sender encodes and transmits the high quality media stream to at least one selected host associated a viewer. Besides decoding the received high quality media stream and displaying it for its own consumption, the selected host of the sender further transcodes the media stream by re-encoding the high quality media steam into a different, probably lower quality media stream, and transmits the re-encoded media stream to a mobile device associated with another viewer, which then decodes and displays the lower quality media stream on the mobile device. | 2011-10-06 |
20110246762 | System and Method for Exchanging Cryptographic Protocol Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly. | 2011-10-06 |
20110246763 | Parallel method, machine, and computer program product for data transmission and reception over a network - A method, machine, and computer program product for high speed data transmission over networks by multiple data connections transmitting data in parallel having read from a data source sequentially a fixed number of blocks equal to the number of data connections in use to transmit the data. A method, machine, and computer program product for high speed data receipt from networks by multiple data connections receiving data in parallel and writing to a data target sequentially a fixed number of blocks equal to the number of data connections in use to receive the data. The purpose is to provide high speed data transfers over a network while maintaining: the same sequential order of data which was read from the data source and subsequently written to the data target, a stable and uniform transmission speed, and limited data loss in the event of a network failure. | 2011-10-06 |
20110246764 | USER AUTHENTICATION SYSTEM - An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests a decryption key for a local encrypted vault file from a network server by supplying a personal identification number (PIN) from the user through the input device, a copy of the GUID, and a signature of GUID using a private key for the root certificate. If a decryption key is returned from the network server, the local encrypted vault file is unlocked and automatically supplies a corresponding user ID and password to log-on to the third-party website without the user. | 2011-10-06 |
20110246765 | Efficient, Secure, Cloud-Based Identity Services - An Identity Ecosystem Cloud (IEC) provides global, scalable, cloud-based, cryptographic identity services as an identity assurance mechanism for other services, such as data storage, web services, and electronic commerce engines. The IEC complements these other services by providing enhanced identity protection and authentication. An IEC performs identity services using surrogate digital certificates having encryption keys that are never exposed to the public. An individual requesting other services must meet an identity challenge before access to these other services is granted. Service requests to the IEC, and responses from the IEC, are securely encrypted. An IEC integrates smoothly into existing services by layering on top of, or being used in conjunction with, existing security measures. Identity transactions may be logged in a manner that complies with strict medical and financial privacy laws. | 2011-10-06 |
20110246766 | SYSTEMS AND METHODS FOR SECURING DATA IN MOTION - The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access. | 2011-10-06 |
20110246767 | SECURE VIRTUAL MACHINE MEMORY - Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed. | 2011-10-06 |
20110246768 | SYSTEMS AND METHODS IMPROVING CRYPTOSYSTEMS WITH BIOMETRICS - In one aspect, systems and methods to improve a cryptosystem include computer-implemented operations such as scanning a biometric attribute for comparison with stored biometric data, and generating a keystream based upon the stored biometric data if the scanned biometric attribute substantially matches the stored biometric data. The computer-implemented method may also include operations for encrypting object data, and encrypting final data based upon the keystream and the encrypted object data. | 2011-10-06 |
20110246769 | SUBSYSTEM AUTHENTICITY AND INTEGRITY VERIFICATION (SAIV) - Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security. | 2011-10-06 |
20110246770 | AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, SERVER TERMINAL, CLIENT TERMINAL AND COMPUTER PROGRAMS THEREFOR - An authentication method between a client ( | 2011-10-06 |
20110246771 | CONTENT REPRODUCING APPARATUS AND PROGRAM OF THE SAME - When continuously reproducing a plurality of contents, a content reproducing apparatus determines whether or not a remaining time of an expiration date of a session key is shorter than a total reproduction time of the plurality of contents to be continuously content. When it is determined that the remaining time of the expiration date of the session key is shorter than the total reproduction time of the plurality of contents to be continuously reproduced, a new session key is acquired from a server, and then the plurality of contents are continuously reproduced, using the new session key. When it is determined that the remaining time of the expiration date of the session key is not shorter than the total reproduction time of the plurality of contents to be continuously reproduced, the plurality of contents are continuously reproduced, using the current session key without acquiring the new session key from the server. This can prevent the continuous reproduction of the plurality of contents from being stopped due to the acquisition processing of the session key when the plurality of contents are continuously reproduced. | 2011-10-06 |
20110246772 | Secure client-side communication between multiple domains - Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication latency particularly effective for dynamic multi-domain and/or multi-tenant environments while allowing for granular security or specific security of messages and operations with regard to users, user sessions, groups, organizations, permissions sets, applications, or any other logical delineation. Such methods and systems may involve a variety of security components, for example, at least one set of instructions including a plurality of defined instruction to be utilized by users of the set of instructions to communicate, and cryptographic construct data in order to verify the data integrity and the authenticity of messages sent and received using the secure client-side communication between multiple domains. | 2011-10-06 |
20110246773 | SYSTEM AND METHOD FOR UNATTENDED COMPUTER SYSTEM ACCESS - A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module. | 2011-10-06 |
20110246774 | SECURING DIGITAL CONTENT SYSTEM AND METHOD - A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like. | 2011-10-06 |
20110246775 | System and Method For Providing Unique Encryption Key - A system and method for providing a unique encryption key including a receiver, at a Voice over Internet Protocol (VoIP) adapter, configured to receive a configuration file, a processor, at the VoIP adapter, configured to decrypt the configuration file using a default key stored in the VoIP adapter, update one or more profile parameters of the configuration file, and install an encryption key at the VoIP adapter using the configuration file, and a transmitter, at the VoIP adapter, configured to register, with a network element, for network service using the updated configuration file such that the receiver is configured to receive network service from the network element when the updated configuration file is authenticated by the network element. | 2011-10-06 |
20110246776 | Method and Apparatus for Secure Key Delivery for Decrypting Bulk Digital Content Files at an Unsecure Site - Rather than downloading each content document on demand from the publisher location to the user site, at the publisher location, each content document is encrypted and then multiple encrypted documents are assembled into a distribution archive that is itself encrypted with a scheduled key. The distribution archive is then downloaded into a content server at the user site. When the content server receives the distribution archive, it decrypts the archive file and unpacks the encrypted documents. The scheduled key used to decrypt an archive file is included with an archive file that was sent previously to the user site in accordance with the subscription service. The scheduled key to decrypt the first archive file sent to the user is sent from the publisher to the user over a communication channel different from the communication channel used to send the archive file from the publisher to the user. | 2011-10-06 |
20110246777 | System and Method for Managing Security Key Architecture in Multiple Security Contexts of a Network Environment - A scheme for managing security key architecture in a network environment where a user equipment (UE) device can engage in multiple security contexts depending on the access technology. In one embodiment, when multiple security contexts are engaged and different sets of authentication vectors are created, an adapter component of the UE device manages potential interference that may be caused among the different sets of the authentication vectors as to where they are stored and which authentication vectors are used for service handovers. | 2011-10-06 |
20110246778 | PROVIDING SECURITY MECHANISMS FOR VIRTUAL MACHINE IMAGES - A method for providing a security mechanism for validating and executing a virtual machine image where the virtual machine image is obtained from an external source to run on an endpoint or host system. An electronic device storing validation data is connected to the host system, and the virtual machine image is validated with the validation data. The virtual machine image run on the host system if validated and/or decrypted. The electronic device can be a USB flash drive, and the electronic device can include a security processor with memory in addition to having a display, keypad, token, or any combination thereof. The validation data utilized may comprise a keyed hash or digital signature when validating the virtual machine image. | 2011-10-06 |
20110246779 | ZERO-KNOWLEDGE PROOF SYSTEM, ZERO-KNOWLEDGE PROOF DEVICE, ZERO-KNOWLEDGE VERIFICATION DEVICE, ZERO-KNOWLEDGE PROOF METHOD AND PROGRAM THEREFOR - Provided is a zero-knowledge proof system that allows a discrete-logarithm zero-knowledge proof. The zero-knowledge proof device includes a temporary memory unit that stores pseudorandom numbers and previously determined hash values, a first processing unit that calculates multiple pseudorandom numbers and performs multiple iterations of processing to calculate hash values based on the calculated pseudorandom numbers and the information stored in the temporary memory unit, a second processing unit that determines some of the multiple pseudorandom numbers based on the hash values, and a third processing unit that re-calculates some of the pseudorandom numbers and sends the hash values obtained to a zero-knowledge verification device. The zero-knowledge verification device includes a temporary memory region, a data receiving module that sequentially receives new input data, and a processing module that overwrites hash values including variables and input data, as variables into the temporary memory region each time the input data are received. | 2011-10-06 |
20110246780 | VALIDATION METHOD AND SYSTEM FOR USE IN SECURING NOMADIC ELECTRONIC TRANSACTIONS - A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over a local communication path; deriving a received data set from said response; determining at least one data set that had been previously transmitted to the communication device over a wireless portion of a second communication path different from the local communication path; and validating the response based on the received data set and the at least one previously transmitted data set. | 2011-10-06 |
20110246781 | CLIENT TERMINAL, SERVER, SERVER-CLIENT SYSTEM, COOPERATION PROCESSING METHOD, PROGRAM AND RECORDING MEDIUM - An application on a client terminal transmits application session information indicating a state of the application itself and an application signature proving the identity of the application to a browser. The browser transmits the application session information and the application signature to a server. The server generates an HTML page in which a script specifying an operation to be performed by the application is inserted and server session information and transmits the HTML page and the server session information to the browser along with the application signature received from the browser. When the script is activated, the browser passes the information received from the server to the application. The application performs processing according to the server session information only if the application signature passed from the browser is an application signature generated by the application itself. | 2011-10-06 |
20110246782 | Data Protection Systems and Methods - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 2011-10-06 |
20110246783 | INFORMATION PROCESSING DEVICE, MANAGEMENT DEVICE, ILLEGAL MODULE DETECTION SYSTEM, ILLEGAL MODULE DETECTION METHOD, RECORDING MEDIUM ON WHICH ILLEGAL MODULE DETECTION PROGRAM IS RECORDED, MANAGEMENT METHOD, RECORDING MEDIUM AND INTEGRATED CIRCUIT ON WHICH MANAGEMENT METHOD IS RECORDED - The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks. | 2011-10-06 |
20110246784 | SYSTEMS AND METHODS FOR DISK ENCRYPTION WITH TWO KEYS - Embodiments provide for using two encryption keys to encrypt data instead of only one as is customarily used in the industry. According to various embodiments, a default encryption key is generated and is initially used to encrypt data, while a second encryption key is available for generation by an end user. Embodiments provide that data is encrypted with the default key until the user generates their own key, after this event, all data is encrypted with key generated by the user. | 2011-10-06 |
20110246785 | HARDWARE SUPPORTED VIRTUALIZED CRYPTOGRAPHIC SERVICE - A Trusted Platform Module (TPM) can be utilized to provide hardware-based protection of cryptographic information utilized within a virtual computing environment. A virtualized cryptographic service can interface with the virtual environment and enumerate a set of keys that encryption mechanisms within the virtual environment can utilize to protect their keys. The keys provided by the virtualized cryptographic service can be further protected by the TPM-specific keys of the TPM on the computing device hosting the virtual environment. Access to the protected data within the virtual environment can, thereby, only be granted if the virtualized cryptographic service's keys have been protected by the TPM-specific keys of the TPM on the computing device that is currently hosting the virtual environment. The virtualized cryptographic service's keys can be protected by TPM-specific keys of TPMs on selected computing devices to enable the virtual environment to be hosted by other computing devices. | 2011-10-06 |
20110246786 | Mechanism for Automatically Encrypting and Decrypting Virtual Disk Content Using a Single User Sign-On - A mechanism for automatically encrypting and decrypting virtual disk content using a single user sign-on is disclosed. A method of embodiments of the invention includes receiving credentials of a user of a virtual machine (VM) provided as part of a single sign-on process to access the VM, referencing a configuration database with the received credentials of the user, determining encryption and decryption policy settings for the VM from the configuration database, and at least one of encrypting or decrypting, by the VM, files of the VM based on the determined encryption and decryption policy settings. | 2011-10-06 |
20110246787 | OBFUSCATING TRANSFORMATIONS ON DATA ARRAY CONTENT AND ADDRESSES - In a first computer (digital) data obfuscation process, data which is conventionally arranged in a data structure called an array (e.g., a table) and conventionally stored in computer or computer device memory is obfuscated (masked) by logically or mathematically combining the data, entry-by-entry, with a masking value which is computed as a logical or mathematical function of the entry itself or its index in the array, modulo a security value. The complementary unmasking value is a pointer to the entry's address in the table modulo the security value. In a second computer (digital) data obfuscation process, the addresses (location designations) in memory of a data array are themselves obfuscated (masked) by partitioning the array into blocks of entries and shuffling the order of the data entries in each block by a predetermined algorithm, resulting in a shuffled array also differing from the original array in terms of its size (the total number of entries). | 2011-10-06 |
20110246788 | DATA SECURITY SYSTEM FOR A DATABASE - A method and an apparatus for processing data provides protection for the data. The data is stored as encrypted data element values (DV) in records (P) in a first database (0-DB), each data element value being linked to a corresponding data element type (DT). In a second database (IAM-DB), a data element protection catalogue (DC) is stored, which for each individual data element type (DT) contains one or more protection attributes stating processing rules for data element values (DV), which in the first database (0-DB) are linked to the individual data element type (DT). In each user-initiated measure which aims at processing a given data element value (DV) in the first database (0-DB), a calling is initially sent to the data element protection catalogue for collecting the protection attribute/attributes associated with the corresponding data element types. The user's processing of the given data element value is controlled in conformity with the collected protection attribute/attributes. | 2011-10-06 |
20110246789 | INTEGRATED CIRCUIT PROTECTED AGAINST HORIZONTAL SIDE CHANNEL ANALYSIS - An integrated circuit including a multiplication function configured to execute a multiplication operation of two binary words x and y including a plurality of basic multiplication steps of components xi of word x by components yj of word y is described. The multiplication function of the integrated circuit is configured to execute two successive multiplications by modifying, in a random or pseudo-random manner, an order in which the basic multiplication steps of components xi by components yj are executed. | 2011-10-06 |
20110246790 | SECURED REMOVABLE STORAGE DEVICE - This present disclosure combines a data storage drive, such as flash-based USB drive or a SSD drive with redundant, multiple levels of security protection. In an embodiment, the security protection includes password protection, fingerprint recognition, and real-time data encryption. The biometric sensors may be integrated into the storage device without substantially adding weight and size. Further, the secured device may have a built-in internal power source to self-sustain the protection without having to connect to a host device or an external power source. Thus, it is possible to remotely track the location of the secured device and disable or enable the security protection or manage the security setups. | 2011-10-06 |
20110246791 | MEMORY CHIP, INFORMATION STORING SYSTEM, AND READING DEVICE - According to one embodiment, a memory chip, which is connected to a writing device that writes data and to a reading device that reads data, includes: a memory including a first area that is a predetermined data storage area; a second encryption key generating unit that receives second key information stored in the reading device and generates a third key; and a sending unit that transmits, to the reading device, second encrypted data obtained by encrypting data stored in the memory using the third key. The second encrypted data is received by the reading device and is decrypted by using a fourth key that is stored in the reading device and that corresponds to the third key. | 2011-10-06 |
20110246792 | METHOD, SYSTEM AND MEDIUM FOR ANALOG ENCRYPTION IN A FLASH MEMORY - A system and method for analog encryption and decryption. A threshold level encryption key stream is generated and a programming level for each bit of a cipher data stream, with each bit having a one or zero state, is determined, where a threshold for distinguishing between the one or zero state for each bit varies based on a corresponding entry in the threshold level encryption key steam. Each bit of the cipher data stream in a cell of a memory is programmed based on the programming level. | 2011-10-06 |
20110246793 | METHOD OF PROVIDING OUT OF BAND MONITORING AND CONTROL OF A DATA STORAGE SUBSYSTEM - The invention provides a method of providing out of band monitoring and/or control of a data storage subsystem, the storage subsystem comprising one or more storage media, a controller for controlling the storage media and a power supply unit, the method comprising: providing out of band control and/or monitoring signals to and/or from the power supply unit. | 2011-10-06 |
20110246794 | COMPUTER MOTHERBOARD AND POWER SUPPLY CIRCUIT THEREOF - A computer motherboard includes a number of peripheral device interfaces, first and second voltage output terminals, and a number of power supply circuits corresponding to the S peripheral device interfaces. Each peripheral device interface includes a first power pin and a second power pin. Each power supply circuit includes a delay circuit, and first to third electronic switches. The delay circuit controls the first electronic switch to be turned on after a delay time. The delay times of the power supply circuits are different. The second and third electronic switches are turned on in response to the first electronic switch being turned on. The first voltage output terminal is connected to the first power pin through the second electronic switch. The second voltage output terminal is connected to the second power pin through the third electronic switch. | 2011-10-06 |
20110246795 | POWER SUPPLY SYTEM FOR COMPUTER - A power supply system for a computer, includes a power supply unit, a DC/DC converter circuit, memory, and a computer boot component. The power supply unit rectifies AC voltage into a first DC voltage. The DC/DC converter circuit is provided with the first DC voltage, and converts the first DC voltage into a plurality of usable DC voltages. The memory is provided with part of the plurality of usable DC voltages directly, and stores power on data which is capable of power on the computer. The computer boot component is provided with part of the plurality of usable DC voltages directly. The computer boot component is triggered to generate a power on signal to revive the power on data from the memory to power on the computer. | 2011-10-06 |
20110246796 | ELECTRONIC APPARATUS AND POWER CONTROL METHOD - According to one embodiment, an electronic apparatus includes: a first and second ports each having: a data line configured to perform a signal reception to receive a signal corresponding to at least one of video and audio; and a power line configured to perform a power supply; and a controller configured to perform, upon a physical connection of a first electronic device to the first port, the signal reception from the first electronic device and the power supply to the first electronic device, and to perform, upon a physical connection of a second electronic device to the second port in addition to the physical connection of the first electronic device to the first port, the power supply to the second electronic device without performing the signal reception from the second electronic device. | 2011-10-06 |
20110246797 | System and Method for Enabling Power over Ethernet for Legacy Devices - A system and method for enabling power over Ethernet (PoE) for legacy devices. Legacy devices often represent a large installed base of devices. This installed base of devices (e.g., mobile computing devices) may have little or no PoE functionality. It is a feature of the present invention that an external device (e.g., dongle) can be used to retrofit such an installed base of devices for use with state of the art PoE functionality. | 2011-10-06 |
20110246798 | Method, apparatus, and system for enabling platform power states - To address the need for power management, the following facilitates maintaining power states in an efficient manner based at least in part on managing packets at different layers of an input/output interface that supports multiple layers. One specific example prevents a destructive event for link layer control logic because packets and information might have been lost or dropped due to a hang condition and/or a dropped packet. In yet another example of power management, this facilitates a low power platform state by preventing the loss of packets or data upon exiting a platform power state upon initiation of a link reset condition by preventing certain types of packets from reaching link layer controller logic. | 2011-10-06 |
20110246799 | DATA-COLLECTION APPARATUS AND DATA-COLLECTION SYSTEM USING THE SAME - Embodiments relate to a data-collection apparatus and a data-collection system using the same. The data-collection apparatus includes a battery, a wireless unit to communicate wirelessly to an external device, a measurement unit to measure a measurement target, a power-supply circuit unit to control power supply to the wireless unit and the measurement unit, and a controller. In response to a data-collection start command from the external device, the controller performs a control such that the power-supply circuit unit supplies power to the measurement unit and wireless unit, and that the data measured by the measurement unit is transmitted via the wireless unit to the external device. In response to a power-saving command from the external device, the controller performs a control such that the power-supply circuit unit stops supplying power to the measurement unit and wireless unit for a predetermined period. | 2011-10-06 |
20110246800 | OPTIMIZING POWER MANAGEMENT IN MULTICORE VIRTUAL MACHINE PLATFORMS BY DYNAMICALLY VARIABLE DELAY BEFORE SWITCHING PROCESSOR CORES INTO A LOW POWER STATE - Distributing a thread for running on a physical processor and enabling the physical processor to be switched into a low power snooze state when said running thread is IDLE. However, this switching into said low power state is enabled to be delayed by a delay time from an IDLE dispatch from said running thread; such delay is determined by tracking the rate of the number of said IDLE dispatches per processor clock interval and dynamically varying said delay time wherein the delay time is decreased when said rate of IDLE dispatches increases and the delay time is increased when said rate of IDLE dispatches decreases. | 2011-10-06 |
20110246801 | POWER MANAGEMENT OF ELECTRONIC DEVICE WITH DISPLAY - An electronic device, such as an e-book, for displaying information includes a power source; a display having a high power mode and a low power mode, said display being powered by said power source; and a power control arrangement for switching the display to a low power mode when no changes to selected regions of the display are required for at least a predetermined time. The power control arrangement switches said display from said low power mode to said high power mode when changes of said display are required in display portions other than said selected portions. A method for operating the electronic device. A computer readable medium having computer readable instructions thereon for implementing the method. | 2011-10-06 |
20110246802 | INFORMATION PROCESSOR - According to one embodiment, an information processor, which is capable of supplying power to an external device, includes a connector, a storage module, and a power supply control module. The connector connects the external device to the information processor. The storage module stores a plurality of power supply modes each defining conditions of respective modules of the information processor to make the external device connected to the connector chargeable. The power supply control module selects a power supply mode effective for the external device from the power supply modes when the external device is connected to the connector, and sets the respective modules of the information processor according to the conditions corresponding to the power supply mode selected. | 2011-10-06 |
20110246803 | PERFORMING POWER MANAGEMENT BASED ON INFORMATION REGARDING ZONES OF DEVICES IN A SYSTEM - One or more target components of a system that are not associated with an active initiator are identified, where the identifying is based on information regarding zones of devices in the system. The devices in each of the zones include at least one initiator and at least one target component accessible by the initiator. The information describes accessibility of devices between the zones. A power management procedure is performed with respect to the identified one or more target components that are not associated with an active initiator to place the identified one or more target components in a reduced power state. | 2011-10-06 |
20110246804 | METHOD AND APPARATUS FOR INTERRUPT POWER MANAGEMENT - Embodiments of a method and apparatus are described for low power operation of a multi-core processing system. An apparatus may comprise, for example, an affinitization management module operative to detect a media application operative to execute on one or more of a plurality of processor cores of a multi-core processor, dynamically select a subset of processor cores of the multi-core processor, and affinitize the media application to execute on the subset of processor cores. Other embodiments are described and claimed. | 2011-10-06 |
20110246805 | POWER MANAGEMENT UNIT FOR PORTABLE ELECTRONIC DEVICES - A power management unit (PMU) for supplying electrical energy to a circuitry of a portable electronic device includes a power supply module, a power detection module connected to the power supply module, and a power control module connected to the power detection module and the circuitry. The power supply module provides electrical energy to the circuitry through the power detection module and the power control module. The power detection module detects the power of the electrical energy provided to the circuitry and controls the power control module to limit the power of the electrical energy provided to the circuitry when the power of the electrical energy provided to the circuitry exceeds a predetermined value. | 2011-10-06 |
20110246806 | BLOCK BASED POWER MANAGEMENT - A system and method is disclosed for efficiently managing power distribution among the various functional blocks used within portable electronic devices. The method includes allowing each functional block to be independently controlled, containing its own low-level software and power controls for setting the local power state of the functional block. For each power control domain in the implementation, hardware uses these local power states and determines and sets the actual operating state of the power control domain accordingly. | 2011-10-06 |
20110246807 | DEMAND BASED POWER ALLOCATION - A demand based power re-allocation system includes one or more subsystems to assign a power allocation level to a plurality of servers, wherein the power allocation level is assigned by priority of the server. The system may throttle power for one or more of the plurality of servers approaching the power allocation level, wherein throttling includes limiting performance of a processor, track server power throttling for the plurality of servers. The method compares power throttling for a first server with power throttling for remaining servers in the plurality of servers and adjusts throttling of the plurality of servers, wherein throttled servers receive excess power from unthrottled servers. | 2011-10-06 |
20110246808 | Receiver, System, and Memory with Memory Protection During Power Supply Transitions - A receiver includes a memory, processing circuitry, and a memory protection unit. The processing circuitry is coupled to the memory, and has an input for receiving a radio frequency (RF) signal, and an output for providing an output signal at another frequency. The processing circuitry includes one or more independently powered components adapted to write data to the memory. The memory protection unit is coupled to the memory, and monitors a power supply voltage level corresponding to each independently powered component and, if the power supply voltage level changes during a power supply transition of an independently powered component in which the power supply voltage remains sufficiently large to power the independently powered component, to prevent write operations received from a corresponding one of the one or more independently powered components from occurring at least while the power supply voltage level is changing. | 2011-10-06 |
20110246809 | Synchronization of Converters Having Varying Group-Delays in a Measurement System - An analog-to-digital-converter (ADC) timing engine may simplify the use of Delta-Sigma ADCs by compensating for the group-delay of the ADC. The compensation may render the group-delay corresponding to the ADC largely transparent to the end-user of the ADC. Therefore, multiple ADCs may be easily synchronized with each other, even if they have different group-delays, and they may further be synchronized with other types of ADCs that do not have group-delays. The data from the ADCs may also be synchronized with external events. The ADC timing engine (ATE) may be programmed with a number of parameters to set proper delays taking into account not only the group-delays corresponding to the various ADC, but delays stemming from a variety of other sources. Multiple ATEs may be synchronized with each other to ensure that data acquisition by the participating ADCs is started and/or stopped at the same point in time. | 2011-10-06 |
20110246810 | CLOCK SIGNALS FOR DYNAMIC RECONFIGURATION OF COMMUNICATION LINK BUNDLES - In at least some embodiments, an electronic device includes a processor and a memory coupled to the processor. The electronic device also includes a serial communication link controller coupled to the processor, the serial communication link controller supporting dynamic reconfiguration of a plurality of communication link bundles. The serial communication link controller receives an input clock and generates first and second clock signals based on the input clock, the first and second clock signals having different clock rates and being provided to each of a plurality of communication link bundles. | 2011-10-06 |
20110246811 | METHOD FOR ESTIMATING THE RELIABILITY OF AN ELECTRONIC CIRCUIT, CORRESPONDING COMPUTERIZED SYSTEM AND COMPUTER PROGRAM PRODUCT - The determination of a reliability guideline of an electronic circuit having a nodal network of components including at least one reconvergence path between a correlation source and a sink, involves at the level of each component of the path, a computation of a conditional probability matrix whose conditioning is related to at least one node of the path situated upstream of the component. | 2011-10-06 |
20110246812 | WINDOW SUPPRESSION - A method of suppressing unwanted windows created by an operating system is described. The method comprises: monitoring calls from the operating system relating to creation of a window and ascertaining if a monitored call relates to creation of a window of a type corresponding to a window type to be blocked. If the window is not of a type that is to be blocked, then the method involves displaying the window. If the window is of a type that is to be blocked, then the method involves: registering a new window procedure for that window; and returning an error message to the operating system using the new window procedure to suppress display of the window. | 2011-10-06 |
20110246813 | REPURPOSABLE RECOVERY ENVIRONMENT - A reconfiguration manager is operable to reconfigure a repurposable recovery environment between a recovery environment for a production environment and a second environment different from the recovery environment. A storage system in the repurposable recovery environment periodically saves production information from the production environment while the repurposable recovery environment is operating as the second environment. The production information in the storage system is used to reconfigure the repurposable recovery environment from the second environment to the recovery environment. | 2011-10-06 |
20110246814 | Facilitating Persistence Of Routing States - In certain embodiments, replicating data elements includes calculating a key value for a data element. The key value is calculated from at least a part of content of the first data element. K computing elements are automatically selected from X computing element nodes according to the key value and a mapping schema. K is a greater than 2 and less than X. The computing element nodes each include computer-readable memory embodied within one or more routers. K replications of the data element are automatically written to the computer-readable memory of the K computing element nodes. | 2011-10-06 |
20110246815 | RECOVERING FROM LOST RESOURCES IN A DISTRIBUTED SERVER ENVIRONMENT - An apparatus, method, and computer readable storage medium are disclosed to recover from lost resources in a distributed server environment. A status monitor module receives, at a first computer, periodic status messages from a peer computer. Each periodic status message indicates that the peer computer is providing a service for which the first computer serves as a backup service provider. A failure detection module determines, based on the periodic status messages, that the peer computer has stopped providing the service. An advancement module provides the service, at the first computer, in response to determining that the peer computer has stopped providing the service. | 2011-10-06 |
20110246816 | CONFIGURING A SYSTEM TO COLLECT AND AGGREGATE DATASETS - Methods for configuring a system to collect and aggregate datasets are disclosed. One embodiment includes, identifying a data source in the system from where dataset is to be collected, configuring a machine in the system that generates the dataset to be collected, to send the dataset to the data source, identifying an arrival location where the dataset that is collected is to be aggregated or written, and/or configuring an agent node by specifying a source for the agent node as the data source in the system and specifying a sink for the agent node as the arrival location. | 2011-10-06 |
20110246817 | SYSTEMS AND METHODS FOR SECURING DATA IN MOTION - Systems and methods for reading and writing a set of data using a journaling service are provided. The journaling service may be used to identify and record data storage operations associated with one or more shares of data stored in one or more share locations. The journaling service may use logs to record each of the read and write requests to the share locations. In some embodiments, the log may be a queue data structure that stores information associated with failed data storage operations. In some embodiments, the journaling service may leverage both memory and disk storage in order to maintain the journaling queue. In some embodiments, the journaling queue may maintain information associated with the state of each share location. In some embodiments, this information may be used by the journaling service to determine when to monitor and record information regarding data storage operations associated with the share locations. | 2011-10-06 |
20110246818 | STORAGE SYSTEM AND CONTROL METHOD OF STORAGE SYSTEM - A fault-tolerant storage system is provided. The storage system is composed of a controller having a plurality of processors and other units. When an error occurs in any one of the components in the controller, the storage system cuts off an I/O path of the controller, specifies the failed component in the cutoff status, and invalidates the failed component. After invalidating the failed component, the storage system determines whether it is operable only with the normal components, cancels (releases) the cutoff of the I/O path when it determines that it is operable, and resumes operation by rebooting. | 2011-10-06 |
20110246819 | FAULT TOLERANCE AND FAILOVER USING ACTIVE COPY-CAT - Fault tolerant operation is disclosed for a primary instance, such as a process, thread, application, processor, etc., using an active copy-cat instance, a.k.a. backup instance, that mirrors operations in the primary instance, but only after those operations have successfully completed in the primary instance. Fault tolerant logic monitors inputs and outputs of the primary instance and gates those inputs to the backup instance once a given input has been processed. The outputs of the backup instance are then compared with the outputs of the primary instance to ensure correct operation. The disclosed embodiments further relate to fault tolerant failover mechanism allowing the backup instance to take over for the primary instance in a fault situation wherein the primary and backup instances are loosely coupled, i.e. they need not be aware that they are operating in a fault tolerant environment. As such, the primary instance need not be specifically designed or programmed to interact with the fault tolerant mechanisms. Instead, the primary instance need only be designed to adhere to specific basic operating guidelines and shut itself down when it cannot do so. By externally controlling the ability of the primary instance to successfully adhere to its operating guidelines, the fault tolerant mechanisms of the disclosed embodiments can recognize error conditions and easily failover from the primary instance to the backup instance. | 2011-10-06 |
20110246820 | MICROCOMPUTER MUTUAL MONITORING SYSTEM AND A MICROCOMPUTER MUTUAL MONITORING METHOD - The present invention is related to a microcomputer mutual monitoring system in which mutual monitoring is performed between a first microcomputer | 2011-10-06 |
20110246821 | RELIABILITY SCHEME USING HYBRID SSD/HDD REPLICATION WITH LOG STRUCTURED MANAGEMENT - In one embodiment, a method of storing data includes storing a first copy of data in a solid state memory and storing a second copy of the data in a hard disk drive memory substantially simultaneously with the storing the first copy. In another embodiment, a system for storing data includes a solid state memory, at least one hard disk drive memory, and a controller for controlling storage of data in the solid state memory and the hard disk drive memory. Other methods, systems, and computer program products are also described according to various embodiments. | 2011-10-06 |
20110246822 | TRANSACTION PARTICIPANT REGISTRATION WITH CAVEATS - In a distributed computing system, a processing device executing a caveat enabled transaction manager registers one or more transaction participants with the transaction manager. To register a transaction participant, the caveat enabled transaction manager records an address of the transaction participant. The caveat enabled transaction manager additionally determines whether the transaction participant is associated with any transaction caveats. If the transaction participant is associated with a transaction caveat, the caveat enabled transaction manager records the transaction caveat. | 2011-10-06 |
20110246823 | TASK-ORIENTED NODE-CENTRIC CHECKPOINTING (TONCC) - Node-centric checkpointing may be used in a multi-node computing system to provide fault-tolerance. Such checkpointing may involve storage of input and/or output data prior to and/or after execution of a task on a node. | 2011-10-06 |
20110246824 | THROTTLING NON-DELIVERY REPORTS BASED ON ROOT CAUSE - A root cause for a failed attempted delivery of a message is attempted to be determined before sending a non-delivery report (NDR) for the failed message. When a message fails without a known cause, the root cause is determined using the context of the message. For a given context, the root cause may be determined by a single failure or it may be determined by the relative number of failed messages of same context. While determining the root cause of the problem, any messages failing delivery are deferred from being delivered, as is generation of the corresponding NDR(s), to allow time for corrective action to occur. If the problem is resolved within a predetermined time period, the deferred messages are delivered without having to issue NDR(s). | 2011-10-06 |
20110246825 | IMAGE FORMING APPARATUS AND DATA TRANSFER METHOD - An image forming apparatus includes a storage part, an error detection part, a connection detection part, a determination part and a data transfer part. The storage part stores data. The error detection part detects whether data transfer between the storage part and an external storage device failed. The connection detection part detect whether an external storage device is connected. The determination part determines whether the external storage device whose connection is detected by the connection detection part is coincident with the external storage device which failed in the data transmission. When the determination part determines the coincidence, the data transfer part transfers the transfer failed data between the storage part and the external storage device whose connection is detected by the connection detection part. | 2011-10-06 |
20110246826 | COLLECTING AND AGGREGATING LOG DATA WITH FAULT TOLERANCE - Systems and methods of collecting and aggregating log data with fault tolerance are disclosed. One embodiment includes, one or more devices that generate log data, the one or more machines each associated with an agent node to collect the log data, wherein, the agent node generates a batch comprising multiple messages from the log data and assigns a tag to the batch. In one embodiment, the agent node further computes a checksum for the batch of multiple messages. The system may further include a collector device, the collector device being associated with a collector tier having a collector node to which the agent sends the log data; wherein, the collector determines the checksum for the batch of multiple messages received from the agent node. | 2011-10-06 |
20110246827 | Testing Device and Testing Method - A testing device for testing an embedded system includes an interface capable of being coupled to the embedded system by means of insertion, a storage unit for storing data, and a processor for receiving a testing message corresponding to a testing command from the embedded system via the interface according to an enabling signal and storing the testing message into the storage unit when the interface is coupled to the embedded system. | 2011-10-06 |
20110246828 | Memory Checkpointing Using A Co-Located Processor and Service Processor - A system and method is shown that includes a processor operatively connected to a memory, the processor to include a memory controller to control access to the memory. The system and method also includes a service processor, co-located on a common board and operatively connected to the processor and the memory, the service processor to include an additional memory controller to control access to the memory as part of a checkpoint regime. | 2011-10-06 |
20110246829 | Method for Fast Detection of Node Mergers and Simplification of a Circuit - The present invention discloses a method for fast detection of node mergers and simplification of a circuit. The steps of the method include: (a) a circuit with a large amount of nodes is provided; (b) a target node is selected for computing mandatory assignments (MAs) of the stuck-at 0 and stuck-at 1 fault tests on the target node respectively by a computer; (c) the MAs of the stuck-at 0 and stuck-at 1 fault tests of the target node are utilized to find substitute nodes; (d) the substitute node that is closest to primary inputs is used to replace the target node; and (e) the steps (b)˜(d) are repeated for removing the replaceable nodes and simplifying the circuit. | 2011-10-06 |
20110246830 | Creating Virtual Appliances - Techniques for creating a virtual appliance in a virtualization environment are provided. The techniques include implementing a framework, wherein the framework comprises a knowledge representation scheme for describing library knowledge to specify one or more libraries that are used for interaction between two or more appliance components, and using the framework to instrument the one or more libraries via use of the library knowledge, record each of one or more communication parameter values in an original environment, and package one or more disk images, wherein the one or more disk images contain the one or more instrumented libraries, the one or more communication parameter values, and translation logic, to create a virtual appliance. | 2011-10-06 |
20110246831 | METHOD AND APPARATUS FOR OPERATIONAL-LEVEL FUNCTIONAL AND DEGRADATION FAULT ANALYSIS - An apparatus and method are provided for analyzing fault tolerance of a system, and performing “what if?” analysis for various fault-tolerant system design options. The fault tolerance analysis approach handles logical failures and quality faults emanating from loss of precision in signal values. The method can detect quality faults, which can allow systems to be built which are resilient to precision losses. Two analysis steps are provided, one static and another simulation-based, which are used in tandem to check the fault tolerance of an automotive or other system. While a simulation-based method checks fault-resilience under specific test cases and fault-scenarios, the static analysis method quickly checks all test cases and fault-scenarios. The static analysis method makes approximations while performing the analysis, and any fault detected is reproduced using the simulation-based method. All analysis operations are performed on operations-level behavioral models of the applications, thereby reducing the cost of analysis. | 2011-10-06 |
20110246832 | PROCESSING APPARATUS, DATA MIGRATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM HAVING DATA MIGRATION PROGRAM RECORDED THEREON - By providing a unit storage area usage information calculation unit that calculates, during copy of data by a data copy control unit, usage information of a unit storage area in a storage unit that stores the data transferred from a migration source apparatus, as unit storage area usage information, and a comparison unit that compares data stored in the storage unit related to a unit storage area to be verified, selected based on the unit storage area usage information calculated, with data in the migration source apparatus related to the area to be verified, efficient and reliable data compare can be performed. | 2011-10-06 |
20110246833 | Detecting An Unreliable Link In A Computer System - One embodiment of a system for analyzing reliability of a communication link comprises a link control component that controls the communication link, where the link control component couples to a processor and a diagnostic component. The diagnostic component is configured to determine whether transmission errors have occurred on the communication link exceeding or matching a first programmable threshold over a range of multiple periods of time that exceeds or matches a second programmable threshold. | 2011-10-06 |
20110246834 | TESTING SOFTWARE IN ELECTRONIC DEVICES - Software in an electronic device can be tested using a combination of random testing and deterministic testing. In various embodiments, deterministic tests can run for a prescribed duration and/or a prescribed number of iterations before and/or after random testing. Test results can be weighted using a metric representing an amount of code that was stressed during testing. This metric can be determined by tracking software code that is loaded into memory during testing. | 2011-10-06 |
20110246835 | MANAGEMENT SERVER AND MANAGEMENT SYSTEM - An operation management system | 2011-10-06 |
20110246836 | Program Counter (PC) Trace - In one embodiment, an integrated circuit comprises a first processor configured to output program counter (PC) trace records, wherein PC trace records provide data indicating the PCs of instructions retired by the first processor. The integrated circuit further comprises a second source of trace records, and a trace unit coupled to receive the PC trace records from the first processor and the trace records from the second source. The trace unit comprises a trace memory into which the trace unit is configured to store the PC trace records and trace records from the second source. The trace unit is configured to interleave the PC trace records and the trace records from the second source in the trace memory according to the order of receipt of the records. | 2011-10-06 |
20110246837 | SYSTEM OPERATIONS MANAGEMENT APPARATUS, SYSTEM OPERATIONS MANAGEMENT METHOD AND PROGRAM STORAGE MEDIUM - In a system operations management apparatus, a burden to a system administrator when providing a decision criterion in detection of a failure in the future is reduced. The system operations management apparatus | 2011-10-06 |
20110246838 | DEVICE FOR USE IN INSPECTING A CPU AND METHOD THEREOF - A device for use in inspecting a CPU and a method thereof are provided. The device comprises a receiving interface and a processor. The receiving interface receives a first data stream from the CPU when the CPU executes a reference hardware inspection program in a first time interval, and receives a second data stream from the CPU when the CPU executes the reference hardware inspection program in a second time interval. The processor sets the first data stream as a good log, and sets the second data stream as an erroneous log. The processor compares the good log and the erroneous log to determine a segment of the erroneous log as an erroneous range, and determine a defect of the CPU according to the erroneous range. | 2011-10-06 |
20110246839 | CONTROL DEVICE - An RTC, having a crystal oscillator of different characteristics from those of a crystal oscillator, is provided, and the pulse period of the pulse signal from the RTC and the pulse signal based on the crystal oscillator are compared to detect a fault in the crystal oscillator. As a result, even if, for example, located in a high temperature environment, the degrees to the decrease in frequency will be different, thus making it possible to detect reliably a fault in the crystal oscillator. | 2011-10-06 |
20110246840 | TRANSMISSION OF ACKNOWLEDGEMENT AND NEGATIVE ACKNOWLEDGEMENT IN A WIRELESS COMMUNICATION SYSTEM - A communication device configured for transmission of Acknowledgement and Negative Acknowledgement (ACK/NACK) is described. The communication device includes a processor and instructions stored in memory. The communication device determines one or more thresholds based on a size of one or more code words and generates a compressed ACK/NACK sequence. The compressed ACK/NACK sequence identifies one or more correctly received code words and one or more incorrectly received code words if the number of incorrectly received code words is less than the threshold. If the number of incorrectly received code words is greater than the threshold, the compressed ACK/NACK sequence indicates that all of the one or more code words were incorrectly received. | 2011-10-06 |
20110246841 | STORING APPARATUS - A storing apparatus, equipped with a control unit configured to control the writing of data into a memory and to communicate a notice to an external device with a communication unit if the remaining amount of substitute blocks becomes equal to or less than a threshold value specified by stored threshold value information, includes the control unit configured to change the threshold value information, used for the notice communicated by the control unit, by the use of threshold value information received from the external device with the communication unit. | 2011-10-06 |
20110246842 | METHODS AND APPARATUS FOR APPROXIMATING A PROBABILITY DENSITY FUNCTION OR DISTRIBUTION FOR A RECEIVED VALUE IN COMMUNICATION OR STORAGE SYSTEMS - Methods and apparatus are provided for approximating a probability density function or distribution for a received value in communication or storage systems. A target distribution is approximated for a received value in one or more of a communication system and a memory device, by substantially minimizing a squared error between the target distribution of the received values and a second distribution obtained by mapping a predefined distribution, such as a Gaussian distribution, through a mapping function, wherein the second distribution has an associated set of parameters. The mapping function can be, for example, a piecewise linear function. The second distribution has a plurality of segments and each of the segments has an associated set of parameters. The associated set of parameters can be used to compute probability values, soft data values or log likelihood ratios. | 2011-10-06 |
20110246843 | ERROR DETECTION IN PRECHARGED LOGIC - An integrated circuit is provided with domino logic including a speculative node and a checker node. Precharged circuitry precharges both the speculative node and the checker node. Logic circuitry provides a discharge path for the speculative node and the checker node in dependence upon input signal values. Evaluation control circuitry first couples the speculative node to the logic circuitry and then subsequently couples the checker node to the logic circuitry such that these can be discharged if the input signals to the logic circuitry have appropriate values. Error detection circuitry detects an error when the speculative node and the checker node are not one of both discharged or both undischarged. | 2011-10-06 |
20110246844 | Test Mode Soft Reset Circuitry and Methods - A soft-function trigger state machine includes state machine logic defined to use a scan-in waveform to sample a scan-clock waveform to obtain a sampled data pattern. The state machine logic is defined to compare the sampled data pattern to a soft action pattern to determine whether the sampled data pattern matches the soft action pattern. The state machine logic is also defined to trigger an action associated with the soft action pattern when the sampled data pattern matches the soft action pattern. | 2011-10-06 |
20110246845 | METHODS AND APPARATUSES FOR FACILITATING ERROR CORRECTION - Methods and apparatuses are provided for facilitating error correction. A method may include receiving a content item and first repair data over a content delivery network via a first network connection. The method may further include receiving second repair data via a second network connection from a remote device having received the content item over the content delivery network. The first and second repair data may be configured to enable error correction of the content item. Corresponding apparatuses are also provided. | 2011-10-06 |
20110246846 | METHOD AND APPARATUS FOR PROVIDING A DATA RETRANSMISSION SCHEME - An approach is provided for efficient retransmissions by allocating a transmission resource for transmitting data and allocating a retransmission resource for retransmitting the data according to a transmission scheme that specifies relationship between the transmitted data and the retransmitted data for providing communication over a radio network. | 2011-10-06 |
20110246847 | Link Adaptation for Retransmission Schemes - Link adaptive retransmission techniques are provided for use in connection with wireless communications between a first wireless communication device and a second wireless communication device. The first wireless communication device generates M packet error information values for the transmit session of a packet based on whether an acknowledgment message or a non-acknowledgment message is received from the second wireless communication device for a transmission and for previously sent transmissions even if less than M transmissions are sent by the first wireless communication device to the second wireless communication device upon completion of the transmit session. The first wireless communication device computes a retransmission fading margin based on the M packet error information values, from which an effective carrier-to-interference-plus-noise ratio is derived for selection of a modulation scheme. | 2011-10-06 |
20110246848 | LT DECODING AND RETRANSMISSION FOR WIRELESS BROADCAST - Methods and systems for doped rateless retransmission include receiving ratelessly coded symbols. An attempt is made to decode the coded symbols using a processor by creating an associated code graph that represents the structure of the rateless code used by the symbols. If the decoding attempt fails, an input node is selected from the code graph using a metric that gauges the number and degree of connections to the input node based on the code graph structure. The selected input node is then requested for retransmission of the selected input node by a feedback channel. | 2011-10-06 |
20110246849 | Reducing Power Consumption In An Iterative Decoder - A method for controlling power consumption of an iterative decoder based on one or more criteria is described. The method may include performing iterative decoding on a demodulated signal to provide a decoded signal, determining whether the iterative decoding is suffering an impairment, and terminating the iterative decoding responsive to the determination of the impairment, otherwise continuing the iterative decoding to provide the decoded signal. | 2011-10-06 |
20110246850 | Techniques To Control Power Consumption In An Iterative Decoder By Control Of Node Configurations - A method for controlling power consumption of an iterative decoder based on one or more criteria is described. The method may include performing iterative decoding on a demodulated signal to provide a decoded signal, receiving information regarding the iterative decoding, and based on the information controlling a number of nodes of the iterative decoder to enable during a next iteration of the iterative decoding. | 2011-10-06 |
20110246851 | Transmission device, transmission method and program - A transmission device includes a first conversion unit converting first transmission target data into first transmission data formed by N symbol values, with predetermined units of data, based on a first conversion table, a second conversion unit converting first error correction data into first symbol data formed by the a symbol values, based on a second conversion table, a third conversion unit converting second transmission target data into second symbol data formed by the (N-a) symbol values, based on a third conversion table, an addition and generation unit adding the second symbol data to the first symbol data and generating second transmission data formed by the N symbol values, and a transmission unit transmitting a transmission signal formed by the first and second transmission data. | 2011-10-06 |
20110246852 | SYSTEM AND METHOD FOR RESTORING DAMAGED DATA PROGRAMMED ON A FLASH DEVICE - A system and a method for restoring damaged data programmed on a memory, such as a Flash memory, including detecting a failure of a memory controller to successfully decode encoded data using a first decoding algorithm, performing soft sampling of the encoded data to provide soft samples of the encoded data, applying, for example, by a computer coupled to the memory controller, a second decoding algorithm on the soft samples of the encoded data. The second decoding algorithm may have an error correction capability exceeding an error correction capability of the first decoding algorithm | 2011-10-06 |
20110246853 | SEMICONDUCTOR DEVICE AND DECODING METHOD THEREOF - An error control coding (ECC) circuit includes a first decoder, a second decoder, and a controller. The first decoder receives encoded data comprising a first parity and a second parity. The first decoder decodes the encoded data to a first code by using the first parity. The second decoder is connected to the first decoder. The second decoder is configured to decode the encoded data when the first decoder is deactivated and decode the first code using the second parity when the first decoder is deactivated. The controller transmits a control signal to the first decoder and the second decoder to control the first decoder and the second decoder. | 2011-10-06 |
20110246854 | Secure Communication Using Non-Systematic Error Control Codes - A transmitter device ( | 2011-10-06 |
20110246855 | Method and Apparatus of Generating a Soft Value for a Memory Device - A method and apparatus of generating the soft value for a memory device is disclosed. Memory read-related parameters are set, and data are read out of the memory device according to the set parameters. The data reading is performed for pre-determined plural iterations, thereby obtaining the soft value according to the read-out data and the set parameters. | 2011-10-06 |
20110246856 | Systems and Methods for Efficient Data Storage - Various embodiments of the present invention provide systems and methods for preparing and accessing super sector data sets. As an example, a data storage system including a storage medium is disclosed. The storage medium includes a first servo data region and a second servo data region separated by a user data region. The user data region includes at least a portion of a first codeword and a portion of a second codeword that are together associated with a common header data. | 2011-10-06 |
20110246857 | MEMORY SYSTEM AND METHOD - A memory system includes a memory controller and a memory device. The memory device exchanges data through a first channel with the memory controller, exchanges a first cyclic redundancy check (CRC) code associated with the data through a second channel with the memory controller, and receives a command/address packet including a second CRC code associated with a command/address from the memory controller through a third channel. | 2011-10-06 |
20110246858 | Information Processing Apparatus and Information Processing Method - According to one embodiment, there is provided an information processing apparatus including: a flash memory storing data and a first error correcting code at a physical storage area thereof, the physical storage area including a plurality of blocks, each block including a plurality of columns; a first error correcting portion configured to perform, when there is an erroneous part in the data physically read from the flash memory, a first error correction based on the first error correcting code physically read from the flash memory to thereby correct the erroneous part; and a second error correcting portion configured to perform, when the erroneous part is not corrected through the first error correction, a second error correction based on a second error correcting code obtained from the read data to thereby correct the erroneous part. | 2011-10-06 |
20110246859 | METHODS AND APPARATUS FOR COMPUTING SOFT DATA OR LOG LIKELIHOOD RATIOS FOR RECEIVED VALUES IN COMMUNICATION OR STORAGE SYSTEMS - Methods and apparatus are provided for computing soft data or log likelihood ratios for received values in communication or storage systems. Soft data values or log likelihood ratios are computed for received values in a communication system or a memory device by obtaining at least one received value; identifying a segment of a function corresponding to the received value, wherein the function is defined over a plurality of segments, wherein each of the segments has an associated set of parameters; and calculating the soft data value or log likelihood ratio using the set of parameters associated with the identified segment. The computed soft data values or log likelihood ratios are optionally provided to a decoder. | 2011-10-06 |