44th week of 2013 patent applcation highlights part 73 |
Patent application number | Title | Published |
20130290702 | METHOD, DEVICE, AND SYSTEM FOR ACQUIRING ENCRYPTED INFORMATION BASED ON WIRELESS ACCESS - A method, device, and system for acquiring encrypted information based on wireless access are disclosed in embodiments of the present invention, which are applied to the field of communications technologies. In the embodiments of the present invention, encrypted information is preset in an AP. When receiving a first access request sent by a terminal device and used for requesting access to a network, the AP verifies the terminal device. If the verification is successful, the AP schedules the preset encrypted information and sends the preset encrypted information to the terminal device. In this way, the AP sends the encrypted information to the terminal device only after the terminal device initiating the access request is successfully verified. | 2013-10-31 |
20130290703 | ENCRYPTING DATA FOR STORAGE IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module dividing data into a plurality of data segments, encoding a data segment using a dispersed storage error encoding function to produce a set of encoded data slices, and generating slice names for each encoded data slice to produce a plurality of slice names. When a subset of encoded data slices of the set of encoded data slices is to be encrypted, the method continues with the DS processing module generating a master key, selecting a portion of the slice names for the subset of encoded data slices to produce a subset of selected slice name portions, generating a subset of encryption keys, encrypting the subset of encoded data slices using the subset of encryption keys to produce a subset of encrypted encoded data slices, and outputting the subset of encrypted encoded data slices to a dispersed storage network (DSN). | 2013-10-31 |
20130290704 | AUTOMATED OPERATION AND SECURITY SYSTEM FOR VIRTUAL PRIVATE NETWORKS - A node device provides secure communication services over a data network, to multiple computers that are coupled through the node device and multiple other node devices. The node device includes a network communication interface for coupling the node device to the data network, a data storage containing cryptographic information including information that is unique to the node device, a tunneling communication service coupled to the network interface configured to maintaining an encrypted communication tunnel with each of multiple other node devices using the cryptographic information, a routing database for holding routing data and a router coupled to the tunneling communication service and to the routing database. The router can pass communication from one communication tunnel to another. A centralized server can be used to control the node devices in a centralized manner, thereby reducing or eliminating on-site administration of node devices. | 2013-10-31 |
20130290705 | METHOD AND APPARATUS FOR ON-SITE AUTHORISATION - A method for authorisation of a user to access a computer system locally at a site is described. The computer system determines whether a network connection to a remote authentication source is available. If the network connection is available, the computer system authenticates the user by interaction with the remote authentication source. If the network connection is not available, the computer system authenticates the user against a credential provided by the user. In this case, the credential will have been provided by or validated by the remote authentication source less than a predetermined time prior to the authenticating step, and the credential is a certificate issued by a certificate authority already trusted by the computer system and valid for a predetermined period of time. A suitable computer system is also described. | 2013-10-31 |
20130290706 | SYSTEM AND METHOD FOR SECURING CONTROLLERS - A system includes a controller and a certificate authority. The controller is configured to control a process. The certificate authority (CA) is configured to issue and to revoke certificates, wherein the controller is configured to use the CA to mutually authenticate a user to enter into a secure mode of operation. | 2013-10-31 |
20130290707 | INFORMATION DISTRIBUTION SYSTEM - A data delivery system is disclosed in this specification. The system implements an authentication process that verifies data recipients using anonymised geospatial references. Verifying information for each user is stored in client accounts. A server system uses the information to process data requests and generate verification tags for data deliveries. The verification tags include an irreversible encoding of a delivery reference for receipt of a data delivery. Recipient client systems implement a compatible encoding process to generate a delivery authentication tag. The encoded authentication tags are compared to corresponding verification tags to validate data deliveries based on the location of the client system. | 2013-10-31 |
20130290708 | CONFIGURATION PROTECTION FOR PROVIDING SECURITY TO CONFIGURATION FILES - The embodiments include a method for providing security for a set of configuration files corresponding to a remote monitoring application. The method may include accessing a server configured to store the set of configuration files. The server is also configured to receive a connection request, over a network, from an agent having the remote monitoring application, generate an encryption key in response to receiving the connection request, transmit the encryption key, over the network, to the agent, encrypt the set of configuration files according to an encryption algorithm and the encryption key, and transmit the encrypted set of configuration files to the agent. According to one embodiment, the server may be accessed by performing one or more maintenance actions on the server. | 2013-10-31 |
20130290709 | Policy-based dynamic information flow control on mobile devices - A method and system are provided for securing data on a mobile device that supports both enterprise and personal applications. According to the method, information flows and data accesses are tracked on the device at run-time to enable access control decisions to be performed based on a policy, such as an enterprise privacy policy that has been distributed to the device from an enterprise server. The policy may be updated by events at the device as well as at the enterprise server. | 2013-10-31 |
20130290710 | SYSTEM AND METHOD FOR A CLOUD-BASED ELECTRONIC COMMUNICATION VAULT - Disclosed is a system and method for securely, conveniently and effectively storing information in a secure data repository or database, and securely delivering such information to a respective user. The secure repository and database, referred to as a Vault, is a secure storage utility used for storing and safekeeping valuable personal information and documents associated with a user. The Vault can store and provide access to personal documents for a user, such as but not limited to, wills, irreplaceable pictures or video, financial documents/bills, contracts, account numbers and credit card numbers. The Vault can be provided as a service within a smart, cloud-based system, which intelligently gathers, stores and initiates actions for a variety of user documents. | 2013-10-31 |
20130290711 | PROVIDING CONTENT TO A USER ACROSS MULTIPLE DEVICES - Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for providing content. The method comprises receiving a first login associated with a first anonymous identifier and first device, creating an associated first private-public key pair, storing a first private key locally in the first device, and publishing a first public key. The method further comprises receiving a second login from a second different device, creating a second private-public key pair, storing a second private key, publishing the second public key, creating a secret key using the first public key, and associating a second anonymous identifier with the secret key. The method further comprises subsequently receiving a login the first device, creating the secret key using the second public key, associating the first anonymous identifier with the secret key, receiving a request for content from either device, and providing content using the association. | 2013-10-31 |
20130290712 | HASHING PREFIX-FREE VALUES IN A SIGNATURE SCHEME - Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate. | 2013-10-31 |
20130290713 | HASHING PREFIX-FREE VALUES IN A CERTIFICATE SCHEME - Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate. | 2013-10-31 |
20130290714 | METHOD AND SYSTEM FOR ACTIVATION - An activation method includes a security module card verifying an activation server using a shared secret key and a first challenge, mediating a verification of the activation server by a mobile device, and encrypting the second challenge using a generated key to obtain an encrypted second challenge. The security module card further transmits the encrypted second challenge and a third challenge to the mobile device. The method further includes receiving an encrypted third challenge from the mobile device, decrypting the encrypted third challenge to obtain a received third challenge, verifying the mobile device based on the received third challenge being equal to the third challenge sent to the mobile device, and sending a validation of mutual trust between the security module card and the mobile device to the activation server. | 2013-10-31 |
20130290715 | TRANSMITTING A DOCUMENT - A method of transmitting a document from a computing device to a printing device using a document server comprising, at the server, receiving user credentials from a user of an authorized computing device, receiving encrypted data defining the document from the authorized computing device, receiving information indicating the intended recipients of the data, receiving user credentials from an authorized printing device, and delivering the encrypted data to an authorized recipient. | 2013-10-31 |
20130290716 | SYSTEM AND METHOD FOR SECURING USER INFORMATION ON SOCIAL NETWORKS - A computer-implemented method for securing personal information of a user on social networks. The method involves: receiving personal information from a user in an unencrypted textual form by a client computer; transmitting the received personal information via a secure virtual private network (VPN) connection to a dedicated VPN server/proxy; receiving the personal information at the dedicated VPN server/proxy; encrypting the received personal information at the dedicated VPN server/proxy using an encryption key; and transmitting the encrypted personal information from the dedicated VPN server/proxy to the social network. Other users of the social network also use the dedicated VPN server/proxy in order to decrypt (access) the personal information of the user, which has been encrypted as specified above. | 2013-10-31 |
20130290717 | METHOD AND SYSTEM FOR PROVIDING CONTINUED ACCESS TO AUTHENTICATION AND ENCRYPTION SERVICES - A system and method for providing continued access to authentication and encryption services that includes a secure key store communicably coupled to a virtual smart card server. A virtual smart card driver is also provided and is communicably coupled to a virtual smart card secure hardware server. The virtual smart card driver communicates with an authentication client to authenticate a user, and access the user's private key stored in the secure key store when the user's physical smart card is unavailable. Continued access is provided when the user has been authenticated. | 2013-10-31 |
20130290718 | MOBILE STORAGE DEVICE AND THE DATA PROCESSING SYSTEM AND METHOD BASED THEREON - The present invention relates to network security technology, and particularly relates to a mobile storage device for data processing in security, and a data processing system comprising the mobile storage device, and a data processing method using the data processing system. According to the present invention, the mobile storage device for data processing in security comprising: at least one memory for storing a secret key; an interface circuit; and a processing unit for communicating with a remote device via the interface circuit and performing security processing and application processing, the security processing including data encryption and decryption with the secret key. Compared with the prior art, the mobile storage device according to the embodiments of the present invention stores not only confidential information such as secret key and digital certificate but also applications for executing transaction processes, whereby providing security protection for the applications at the same level as the confidential information. In addition, where the mobile storage device has a capability of simulating a network interface, a client terminal, such as a personal computer, previously used for executing the applications now can function as a bridge connector between the mobile storage device and a remote server, and the packeting and unpacketing of the transaction data can be performed inside the mobile storage device. This greatly improves the security performance of the transaction processes. | 2013-10-31 |
20130290719 | SYSTEM AND METHOD FOR ACCESSING INTEGRATED APPLICATIONS IN A SINGLE SIGN-ON ENABLED ENTERPRISE SOLUTION - A method for performing access management to facilitate a user to access applications in a single sign-on enabled enterprise solution is provided. A challenge token and a response token are transmitted between a server and a client. The challenge token and response token comprises one-way hashed data. The response token is verified at the server and the client to authenticate the user. Further, a request for service token is transmitted between the server and the client. The request for service token is encrypted at the client and decrypted at the server using a unique session key negotiated between the server and client. A service token is generated and transmitted between the server and the client. The service token is encrypted and decrypted at the server using a secret key to verify the service token. Based on the verification, the requested applications are rendered on client based user interface. | 2013-10-31 |
20130290720 | PROCESS AND SYSTEM FOR SELECTABLE DATA TRANSMISSION - Method and/or system for use in selectable data transmission. An electronic key may be generated (e.g., by a central module) and stored as assigned to authentication data. Electronic data may then be encrypted (e.g., by the central module) into encrypted data using at least part of the electronic key. A signaling message may be transmitted (e.g., by the central module) to a first communications terminal, and the encrypted data may then be transmitted (e.g., by the central module) to a second communications terminal that is selected by the first communications terminal. At least part of the electronic key may then be transmitted (e.g., by the central module) to the second communications terminal. The encrypted data may be decrypted by the second communications terminal using the at least part of the electronic key. | 2013-10-31 |
20130290721 | KEY EXCHANGE FOR A NETWORK ARCHITECTURE - Provided is a method of providing secure communication between an initiator and a responder in a communication network. The method includes providing an encryption key for securing communications between an initiator and a responder in a communications network that includes the initiator generating an initiator Diffie-Hellman computed value, the initiator transmitting the initiator Diffie-Hellman computed value to the responder, the responder generating the encryption key and a responder Diffie-Hellman computed value, the responder transmitting the responder Diffie-Hellman computed value to the initiator, and the initiator generating the encryption key. | 2013-10-31 |
20130290722 | EXTERNAL AUTHENTICATION SUPPORT OVER AN UNTRUSTED NETWORK - There are provided measures for supporting an authentication to an external packet data network over an untrusted access network, said measures exemplarily comprising authenticating a user equipment to a communication network providing connectivity for the user equipment across an unsecured access network in response to a first authentication request, wherein the authentication request is an authentication request of a key information exchange mechanism and includes authentication data, receiving a second authentication request for authenticating the user equipment towards a packet data network external to the communications network. The measures may further comprise creating a binding update message including the authentication data and identity information of the user received from the user equipment. | 2013-10-31 |
20130290723 | Key sharing method and system for machine type communication (MTC) server - The disclosure discloses a key sharing method for a Machine Type Communication (MTC) server, wherein when establishing a safe connection and performs safe communications with a first MTC server via a Generic Bootstrapping Architecture (GBA) process, an MTC device may send a second MTC server a request message containing a bootstrapping identifier (B-TID) currently used by the MTC device and the first MTC server and a host identifier NAF-ID | 2013-10-31 |
20130290724 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 2013-10-31 |
20130290725 | METHOD AND APPARATUS FOR ONE-STEP SIGNATURE TRUST FOR DIGITALLY-SIGNED DOCUMENTS - A computer implemented method and apparatus for one-step signature trust of digitally signed documents comprising determining whether a digital signature is otherwise valid except for a lack of trust in a digital certificate; offering a recipient an option to establish trust in the digital certificate; and adding the digital certificate to a list of the recipient's trusted digital certificates when recipient opts to establish trust. | 2013-10-31 |
20130290726 | METHODS FOR SECURE RESTORATION OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 2013-10-31 |
20130290727 | ENCRYPTING OPERATING SYSTEM - A method of and system for encrypting and decrypting data on a computer system is disclosed. In one embodiment, the system comprises an encrypting operating system (EOS), which is a modified UNIX operating system. The EOS is configured to use a symmetric encryption algorithm and an encryption key to encrypt data transferred from physical memory to secondary devices, such as disks, swap devices, network file systems, network buffers, pseudo file systems, or any other structures external to the physical memory and on which can data can be stored. The EOS further uses the symmetric encryption algorithm and the encryption key to decrypt data transferred from the secondary devices back to physical memory. In other embodiments, the EOS adds an extra layer of security by also encrypting the directory structure used to locate the encrypted data. In a further embodiment a user or process is authenticated and its credentials checked before a file can be accessed, using a key management facility that controls access to one or more keys for encrypting and decrypting data. | 2013-10-31 |
20130290728 | Method and system for a secure, searchable and sharable digital notary journal - Disclosed is a method and system for an electronic notary journal, to run on a smartphone or computer or similar device. Embodiments allow for the storage in local memory or in a database of data that would go in a notary journal, plus metadata. Further embodiments record digital photographs or scans of the customer, witnesses, and documents. Video of the service itself can also be included in the data. Metadata recording the time, date, and geographical location at which the notary data was saved are incorporated with the notary data. | 2013-10-31 |
20130290729 | SYSTEMS AND METHODS FOR CONTROLLING FILE EXECUTION FOR INDUSTRIAL CONTROL SYSTEMS - A system includes a controller configured to control a process, and store at least one binary file, wherein the at least one binary files is generated from at least one source file, wherein the at least one source file comprises instructions configured to be executed by a processor in the controller. The controller may also be configured to retrieve a whitelist file comprising a first hash key value derived from the at least one binary file, and execute an executable file based on the whitelist file, wherein the executable file comprises the source file. | 2013-10-31 |
20130290730 | SYSTEMS AND METHODS FOR DATA ACCESS PROTECTION - Systems and methods are provided for data access protection. The disclosed computing system can provide an adjusted iteration count to a dynamic key stretching module. The computer system can determine whether the adjusted iteration count is to be used to enhance a passphrase for data encryption or data decryption. When the adjusted iteration count is to be used for data encryption, the computing system is configured to compute the adjusted iteration count by modifying a base iteration count according to an adjustment configuration; when the adjusted iteration count is to be used for data decryption, the computing system is configured to retrieve the adjusted iteration count that was used to encrypt the data. Once the adjusted iteration count is determined, the computing system is configured to provide the adjusted iteration count to the dynamic key stretching module. | 2013-10-31 |
20130290731 | SYSTEMS AND METHODS FOR STORING AND VERIFYING SECURITY INFORMATION - Systems and methods are provided for storing and verifying security information. A method can include receiving a request to access an encrypted file from a storage medium, wherein the request includes security information, performing key stretching on the security information to compute a key associated with the security information, computing a first check value associated with the key, receiving at least one of a header, metadata, or filename of the encrypted file from the storage medium, retrieving a second check value stored in the at least one of the header, metadata, or filename of the encrypted file, comparing the first check value with the second check value, and receiving the encrypted file from the storage medium only when the first check value matches the second check value. | 2013-10-31 |
20130290732 | SYSTEMS AND METHODS FOR STORING AND VERIFYING SECURITY INFORMATION - Systems and methods are provided for storing and verifying security information. A method can include receiving security information for encrypting a file, performing key stretching on the security information to compute a key associated with the security information, encrypting the file using the key, computing a check value associated with the key, wherein at least a portion of the check value is stored in at least one of a header, metadata, or filename of the encrypted file, and storing the encrypted file in a storage medium. | 2013-10-31 |
20130290733 | SYSTEMS AND METHODS FOR CACHING SECURITY INFORMATION - Systems and methods are provided for caching security information. A method can include receiving security information for a file, performing a first hash function on the security information using a first salt and a first mixer to compute a key associated with the security information, performing a second hash function on the key using a second salt and a second mixer to compute an index associated with the key, wherein the second mixer is different from the first mixer, caching at least one of the security information and the key in a storage medium, and storing the index with the file, wherein the index is associated with the at least one of the security information and the key stored in the storage medium. | 2013-10-31 |
20130290734 | SYSTEMS AND METHODS FOR CACHING SECURITY INFORMATION - Systems and methods are provided for caching security information. A method can include receiving security information for a file to be accessed at a device, performing a first hash function on the security information using a salt and a first mixer to compute a key associated with the security information, generating a device identifier (ID) unique to the device, performing a second hash function on the key using the device ID and a second mixer to compute an index associated with the key, wherein the second mixer is different from the first mixer, caching at least one of the security information and the key in a storage medium, wherein the index refers to the at least one of the security information and the key cached in the storage medium, and storing the index with the file. | 2013-10-31 |
20130290735 | AUTHENTICATION DEVICE AND SYSTEM - A public key architecture ( | 2013-10-31 |
20130290736 | DATA STORAGE DEVICE, DATA CONTROL DEVICE AND METHOD FOR ENCRYPTING DATA - According to one embodiment, a data storage device includes an encryption module, a write module, and a controller. The encryption module encrypts or decrypts data. The write module writes, on a storage medium, encrypted data of data received from a host, the encrypted data being encrypted by the encrypting module. The controller causes the encryption module to encrypt data received from a host and to transfer the encrypted data to the write module through a buffer memory, during normal encryption process, and to re-encrypt the data recorded on the storage medium, during re-encryption process. During the re-encryption process, the controller causes the encryption module to decrypt the encrypted data read from the storage medium, to store the decrypted data into the buffer memory, and to re-encrypt the decrypted data from the buffer memory by the encryption module and to transfer the re-encrypted data to the write module. | 2013-10-31 |
20130290737 | METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA - Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal. | 2013-10-31 |
20130290738 | MEMORY CHIP - According to one embodiment, a memory chip, which is connected to a controller that controls reading and writing of data in response to a request from an external device, includes: a memory including a special area that is a predetermined data storage area; a key storage unit that stores therein a second key that corresponds to a first key used by the external device to convert the data; a converting unit that receives, from the controller, data to be written into the special area and generates converted data by converting the data to be written using the second key; and a writing unit that writes the converted data into the special area. | 2013-10-31 |
20130290739 | SHARING POWER BETWEEN NETWORK DEVICES - Power is shared between network devices through a power cable having a first connector at a first end thereof and a second connector at a second end thereof. The first connector comprises a first connection portion for connection with a power sharing connector of a network device and a second connection portion for connection with a connector of another power cable. The second connector comprises a first connection portion for connection with a power sharing connector of a network device and a second connection portion for connection with a connector of another power cable. | 2013-10-31 |
20130290740 | SETTINGS BASED ON OUTPUT POWERED BY LOW POWER STATE POWER RAIL - Example embodiments disclosed herein relate to determining a setting at a component. An output to be powered by a low power state power rail can output a value. The component is to be powered by an auxiliary power rail and determines the setting based on the value at auxiliary power good. | 2013-10-31 |
20130290741 | PORTABLE POWER BANK WITH CARD READING FUNCTION - A portable power bank with card reading function includes a battery unit, a charging unit, a control unit, a voltage converting unit, a first card reading unit, and a connection interface unit. The battery unit is coupled with the charging unit and the voltage converting unit. The control unit is coupled with the charging unit, the voltage converting unit and the first card reading unit. The connection interface unit is coupled with the voltage converting unit and the control unit. The first card reading unit is configured for a first removable electronic card to insert thereinto. An electronic device is removably connected to the connection interface unit. | 2013-10-31 |
20130290742 | DRIVING SYSTEM AND METHOD FOR A PORTABLE 3.5 INCH EXTERNAL HARD DISK WITHOUT USING AN EXTERNAL POWER - A driving system and a driving method for a portable 3.5 inch external hard disk are disclosed. The driving system includes a first power supply module, a second power supply module and the portable 3.5 inch external hard disk. The first power supply module installed in the portable 3.5 inch external hard disk includes a first voltage source having a first output voltage supplies power to a main circuit. The second power supply module includes a second voltage source outputting a first voltage and a second voltage through a first interface output port and a second interface output port, respectively, which are combined to form a second output voltage to supply power to a boost circuit. The boost circuit then outputs a working current to provide to a start circuit, which replaces the first power supply module and hence maintains operation of the external hard disk. | 2013-10-31 |
20130290743 | POWER MANAGEMENT SYSTEMS FOR ACCEPTING ADAPTER AND SOLAR POWER IN ELECTRONIC DEVICES - The disclosed embodiments provide a power management system that supplies power to components in an electronic device. The power management system includes a system microcontroller (SMC) and a charger. During operation, the power management system accepts power from at least one of a power adapter and a solar panel. Next, the power management system supplies the power to components in the electronic device without using a converter circuit between the solar panel and the power management system. | 2013-10-31 |
20130290744 | METHOD AND APPARATUS FOR CONTROLLING TERMINAL POWER - The present invention provides a method and an apparatus for controlling terminal power. The method includes the following steps of: determining whether a power control level set in the terminal is reached or not when controlling the terminal power; if yes, then adjusting a power of the power control level based on a calibration parameter configured in the terminal within a rated output power range corresponding to the power control level; wherein the calibration parameter is 1 dBm; controlling an output power of the terminal according to the adjusted power. The present invention can further perform an accurate terminal power control for reducing power consumption, conserving resources, and increasing system capacity based on a compatibility with conventional power control. | 2013-10-31 |
20130290745 | SYSTEM AND METHOD FOR MANAGING POWER SUPPLY UNITS - A power supply management system includes a power supply backplane, a plurality of power supply units connected to the power supply backplane, and a power controller chip. The power controller chip sends a plurality of power controlling signals to the power supply backplane. The power supply backplane transmits the plurality of power controlling signals to the plurality of power supply units, transition the plurality of power supply units into specific working states according to the plurality of power controlling signals, collect present working states of the plurality of power supply units, and sends the present working states of the plurality of power supply units to the power controller chip. A method for managing power supply units is also provided. | 2013-10-31 |
20130290746 | SYSTEM, APPARATUS, AND METHOD OF PERFORMING CHARGING OPERATION IN HOST MODE - A system, an apparatus, and a method of performing a charging operation in a host mode, which can perform a charging operation in a host mode of a terminal includes a terminal for simultaneously receiving a function of performing communication with a peripheral device and a charging function from an external accessory connected in the host mode. The external accessory simultaneously provides the charging function while performing the communication with the peripheral device to the terminal in a client mode. | 2013-10-31 |
20130290747 | POWER RECEPTION CONTROL DEVICE, POWER RECEPTION DEVICE, POWER TRANSMISSION AND RECEPTION SYSTEM, AND ELECTRONIC DEVICE - Provided is a power reception device in which power consumption at the time of wireless power supply is reduced. A power reception device is provided with a power reception control device capable of temporarily stopping supply of power supply voltage to a communication control unit for controlling communication in a break period of communication intermittently performed between a power transmission device and a power reception device. In the structure, a clock signal is generated on the basis of a power receiving signal transmitted from the power transmission device, and a period of communication intermittently performed can be measured using the clock signal. Further, a structure may be employed in which supply of power supply voltage to the communication unit in the power reception control device can be stopped in the break period of the communication. | 2013-10-31 |
20130290748 | METHOD AND APPARATUS FOR POWER SUPPLY PROTOCOL MANAGEMENT, AND POWER SUPPLY SYSTEM APPLYING THEM - A power supply system includes a PWM power supply connected to and supplying power to a power-consuming unit and a power supply protocol management apparatus connected to the power-consuming unit through a transmission bus for acquiring a VID protocol of the power-consuming unit and acquiring a VID code conversion table matching the VID protocol. The power supply protocol management apparatus converts a VID code output by the power-consuming unit (on the basis of the VID protocol) into a required voltage of the power-consuming unit according to the VID code conversion table, compares the required voltage with a voltage at an output end of the PWM power supply to generate a feedback voltage value, and transmits the generated feedback voltage value to the PWM power supply which adjusts its output voltage according to the feedback voltage value. | 2013-10-31 |
20130290749 | METHOD OF MANAGING THE ENERGY CONSUMPTION OF AN APPLICATION EXECUTABLE IN VARIOUS ENVIRONMENTS AND SOFTWARE ARCHITECTURE IMPLEMENTING SUCH A METHOD - The application being executable by hardware comprising a set of processors using an operating system, a method comprises at least the following steps: a first step of identifying the time constraints of the application; a second step of annotating code sections of the application that are subject to a time constraint, said annotating being performed by means of software markers, the software markers delimiting code segments; a third step of determining the worst case execution times of the segments in a given set of execution modes; a fourth step of memorizing the execution times of the segments in an execution library for each execution mode, said library being able to be interfaced with said hardware, said operating system and said application and to execute an energy management strategy by controlling the state of the processors. | 2013-10-31 |
20130290750 | MEMORY WITH WORD LEVEL POWER GATING - In accordance with at least one embodiment, memory power gating at word level is provided. In accordance with at least one embodiment, a word level power-gating technique, which is enabled by adding an extra control bit to each subarray (e.g., each word, each row, each wordline, each bitline, each portion of an array, etc.) of a memory array, provides fine-grained power reduction for a memory array. In accordance with at least one embodiment, a gating transistor is provided for each subarray (e.g., each word, each row, each wordline, each bitline, each portion of an array, etc.). | 2013-10-31 |
20130290751 | FREQUENCY REDUCTION OF MOBILE DEVICE CORES BASED ON APPLICATION PROCESSING REQUIREMENTS - This disclosure describes systems, methods, and apparatus for reducing power consumption of an application processor in a user equipment. State information of applications that indicate an expected load requirement that the applications will likely place on the application processor, can be used to control power management features of the application processor. For instance, an operating frequency of the application processor, or online cores of the application processor, can be reduced. The number of online cores (those that are not idled) can also be changed to tailor performance and power consumption to the load requirement. Other power management techniques such as adjusting core operational voltage can also be implemented. | 2013-10-31 |
20130290752 | OPERATING SYSTEM SUPPORT FOR MEMORY POWER MANAGEMENT - A system including memory and a resource controller. The memory includes a first memgroup and a second memgroup, wherein the first memgroup comprises a first physical page mapped to a virtual page, and wherein the second memgroup comprises a second physical page. The resource controller is configured to receive a request to stop the first memgroup, instruct a memory power management subsystem to mark the first memgroup as stopped in response to receiving the request to stop the first memgroup, wherein no free pages are allocated from the first memgroup after the first memgroup is marked as stopped, remap the virtual page to the second physical page in response to the marking the first memgroup as stopped, and reduce power to the first memgroup in response to a determination that the first physical page is not mapped to the virtual page. | 2013-10-31 |
20130290753 | MEMORY COLUMN DROWSY CONTROL - In accordance with at least one embodiment, column level power control granularity is provided to control a low power state of a memory using a drowsy column control bit to control the low power state at an individual column level to protect the memory from weak bit failure. In accordance with at least one embodiment, a method of using a dedicated row of bit cells in a memory array is provided wherein each bit in the row controls the low power state of a respective column in the array. A special control signal is used to access the word line, and the word line is outside of the regular word line address space. A mechanism is provided to designate the weak bit column and set the control bit corresponding to that particular column to disable the drowsy/low power state for that column. | 2013-10-31 |
20130290754 | LOAD MONITORING APPARATUS AND METHOD - Embodiments of the present invention provide a load monitoring apparatus and method. The apparatus includes: an operation unit, configured to determine indication information for indicating a working state of each processing module in the operation unit; a working state unit, configured to receive the indication information from the operation unit, and determine load amount information in a current monitoring period according to the indication information, where the load amount information is used for indicating a load amount state of the operation unit in the current monitoring period; and a load monitoring unit, configured to receive the load amount information from the working state unit and record the load amount information, and send the load amount information to a system controller, so that the system controller adjusts a working frequency of the operation unit according to the load amount information. | 2013-10-31 |
20130290755 | ENERGY-AWARE CODE OFFLOAD FOR MOBILE DEVICES - A method described herein includes an act of, at a mobile computing device, receiving an indication that a portion of code of a program executing on the mobile computing device is to be offloaded to a second computing device for execution on the second computing device, wherein the indication is based at least in part upon an estimated energy savings of the mobile computing device by offloading the portion of the code for execution on the second computing device. The method also includes an act of transmitting data to the second computing device that causes the second computing device to execute the portion of the code. | 2013-10-31 |
20130290756 | Power Management For A System On A Chip (SoC) - In one embodiment, the present invention includes a method for sending a first link handshake signal between a first subsystem and a power management unit (PMU) of a system on a chip (SoC) to request entry into a power saving state for the first subsystem, sending a second link handshake signal between the first subsystem and the PMU to acknowledge the request, and placing the first subsystem into the power saving state without further signaling between the PMU and the first subsystem. Other embodiments are described and claimed. | 2013-10-31 |
20130290757 | EMBEDDED CONTROLLER WITH AN INTERNAL TIMER - Example embodiments disclosed herein relate to a computing system including a controller hub to control system sleep states, and an embedded controller including an internal timer. The embedded controller is to remove power from the controller hub when the system enters a sleep state and to enable power to the controller hub prior to the system wake time, The internal timer is to determine when to enable power to the controller hub. Example methods and machine-readable storage media are also disclosed. | 2013-10-31 |
20130290758 | SLEEP MODE LATENCY SCALING AND DYNAMIC RUN TIME ADJUSTMENT - The aspects enable a computing device or microprocessor to determine a low power mode that provides the most system power savings by placing selected resources in a low power mode while continuing to function reliably, depending upon the resources not in use, acceptable system latencies, dynamic operating conditions (e.g., temperature), expected idle time, and the unique electrical characteristics of the particular device. Aspects provide a mechanism for determining an optimal low power configuration made up of a set of low power modes for the various resources within the computing device by determining which low power modes are valid at the time the processor enters an idle state, ranking the valid low power modes by expected power savings given the current device conditions, determining which valid low power mode provides the greatest power savings while meeting the latency requirements, and selecting a particular low power mode for each resource to enter. | 2013-10-31 |
20130290759 | ENHANCED SYSTEM SLEEP STATE SUPPORT IN SERVERS USING NON-VOLATILE RANDOM ACCESS MEMORY - A non-volatile random access memory (NVRAM) is used in a computer system to enhance support to sleep states. The computer system includes a processor, a non-volatile random access memory (NVRAM) that is byte-rewritable and byte-erasable, and power management (PM) module. A dynamic random access memory (DRAM) provides a portion of system address space. The PM module intercepts a request initiated by an operating system for entry into a sleep state, copies data from the DRAM to the NVRAM, maps the portion of the system address space from the DRAM to the NVRAM, and turns off the DRAM when transitioning into the sleep state. Upon occurrence of a wake event, the PM module returns control to the operating system such that the computer system resumes working state operations without the operating system knowing that the portion of the system address space has been mapped to the NVRAM. | 2013-10-31 |
20130290760 | FAST PLATFORM HIBERNATION AND RESUMPTION OF COMPUTING SYSTEMS - Fast platform hibernation and resumption for computing systems. An embodiment of an apparatus includes a volatile system memory, a nonvolatile memory, and a processor to operate according to an operating system, the processor to transition the apparatus to a first reduced power state upon receipt of a request, the transition to the first reduced power state including the processor to store context information for the computer in the volatile system memory. The apparatus further includes logic to transition the apparatus to a second reduced power state, the logic to copy the context data from the volatile system memory to the nonvolatile memory for the transition to the second reduced power state, where copying of the context data includes the logic to scan the volatile system memory to locate non-active memory elements in the volatile system memory, eliminate the non-active memory elements from the volatile system memory to generate compressed context data, and store the compressed context data in the nonvolatile memory. | 2013-10-31 |
20130290761 | METHOD OF AND APPARATUS FOR PROCESSING TOUCH SIGNAL BY TOUCH SENSOR CONTROLLER - Provided are an apparatus and method by which a touch sensor controller of a touch screen apparatus may efficiently process a touch signal in response to a touch event to reduce power consumption of the entire system. An apparatus including a touch screen includes a touch sensor controller configured to generate a touch signal in response to a touch event and process the touch signal and a system controller configured to receive the touch signal from the touch sensor controller and perform an operation in response to the touch signal. The touch sensor controller determines whether the touch event is a multi-touch, generates touch signals having different types depending on whether the touch event is the multi-touch, and transmits the touch signals to the system controller. Thus, power consumption of the apparatus including the touch screen may be efficiently reduced. | 2013-10-31 |
20130290762 | METHODS AND APPARATUSES TO WAKE COMPUTER SYSTEMS FROM SLEEP STATES - Embodiments of the invention describe apparatuses, systems and methods to detect, during a host platform sleep state, a peripheral device audio jack plug being coupled to (e.g., inserted into) an audio jack connection socket. A specific sleep state of the host platform may be determined, and a system wake event may be generated so that the host platform wakes from the sleep state in response to the peripheral device being coupled to the audio jack connection socket. Thus, embodiments of the invention incorporated in handheld mobile computing devices such as smartphones and tablet computers with limited input/output (I/O) provide a user with alternative means for waking the device from a sleep state. | 2013-10-31 |
20130290763 | INFORMATION PROCESSING SYSTEM, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD OF INFORMATION PROCESSING APPARATUS - An information processing apparatus executes a processing sequence including a plurality of processing steps. A management apparatus makes the information processing apparatus execute the processing steps in predetermined order, and thereby manages execution of the processing sequence. The management apparatus takes over execution management of the processing sequence from a first management apparatus. At this time, an information acquisition unit of the management apparatus acquires state information indicating a progress state of the processing sequence from the information processing apparatus. A control unit of the management apparatus makes the information processing apparatus continue execution of an unexecuted processing step of the processing sequence based on the state information acquired by the information acquisition unit. | 2013-10-31 |
20130290764 | ELECTRONIC APPARATUS, CHARGING CONTROL DEVICE, AND CHARGING CONTROL METHOD - According to one embodiment, an electronic apparatus performs a communication with a portable device detachably attached to a port of the apparatus. The apparatus supplies bus power to the portable device through the port. The apparatus includes a notification module configured to execute an operation of notifying the portable device whether the port is a first type port configured to supply a first charging current or a second type port configured to supply a second charging current higher than the first charging current. The apparatus controls, when a remaining level of a battery of the apparatus is lower than a threshold, an operation of the notification module such that the portable device recognizes the port as the first type port. | 2013-10-31 |
20130290765 | CHARGING A PROVIDER/CONSUMER WITH A DEAD BATTERY VIA USB POWER DELIVERY - A method and apparatus are provided. The VBUS conductor is checked to determine whether the voltage on the VBUS conductor is greater than a vSafe0V voltage within a dead battery detect time interval, and the device policy manager is instructed to apply a vSafeDB voltage to the VBUS conductor if the voltage on the VBUS conductor is greater than the vSafe0V voltage. The policy engine waits for a bit stream to be detected within a bit stream detect timer interval. If the bit stream is not detected within the bit stream detect timer interval, then the device policy manager is instructed to apply the vSafe0V voltage to the VBUS conductor. The device policy manager is instructed to apply a vSafe5V voltage to the VBUS conductor if the bit stream is detected, and the policy engine waits for the bit stream to stop within a device ready timer interval. If the bit stream has stopped within the device ready timer interval, then the policy engine sends capabilities as a source port. | 2013-10-31 |
20130290766 | Methods and Systems for Recovering Intermittent Timing-Reference Signals - A source-synchronous communication system in which a first integrated circuit (IC) conveys a data signal and concomitant strobe signal to a second IC. One or both ICs support hysteresis for the strobe channel that allows the second IC to distinguish between strobe preambles and noise, and thus prevent the false triggering of data capture. Hysteresis may also be employed to quickly settle the strobe channel to an inactive level after receipt of a strobe postamble. | 2013-10-31 |
20130290767 | COMMAND PROTOCOL FOR ADJUSTMENT OF WRITE TIMING DELAY - Apparatuses are provided for adjusting the write timing. For instance, the apparatus can include an address/control bus, a write clock data recovery (WCDR) signal bus, and a timing adjustment module. The address/control bus can be configured to concurrently enable a WCDR mode of operation and an active mode of operation. The WCDR signal bus can be configured to transmit WCDR data to a memory device during the WCDR mode of operation. And the timing adjustment module can be configured to adjust a timing based on a phase shift in the WCDR data. | 2013-10-31 |
20130290768 | ARITHMETIC PROCESSING DEVICE, METHOD FOR CONTROLLING ARITHMETIC PROCESSING DEVICE, AND SYSTEM - An arithmetic processing device includes: a communicating unit that communicates with another arithmetic processing device; a clock controller that requests a change in the frequency of a clock signal; a sequence controller that instructs the other arithmetic processing device to change the amount of data to be transmitted by the other arithmetic processing device to the arithmetic processing device per unit time when the sequence controller is requested by the clock controller to change the frequency of the clock signal; and a control circuit that changes the amount of data to be transmitted by the communicating unit to the other arithmetic processing device per unit time when the other arithmetic processing device instructs the arithmetic processing device to change the amount of data to be transmitted by the arithmetic processing device to the other arithmetic processing device per unit time. | 2013-10-31 |
20130290769 | SYSTEMS AND METHODS FOR HANDLING RACE CONDITIONS DURING DATA TRANSFER IN AN IMPLANTABLE MEDICAL DEVICE - The accuracy of data processing operations in implantable medical devices is improved through reductions in errors associated with data acquisition, reading, and transmission. In one embodiment, two or more circuit modules of the device are operated at different clock speeds and a voting scheme is utilized to obtain a valid data value from one of the modules. The disclosure describes methods, devices and systems that utilize the voting schemes to eliminate errors induced by race conditions in obtaining the valid data values by obtaining a plurality of data samples during operation of the circuit modules at the different clock speeds and selecting from among the data samples the valid data value. | 2013-10-31 |
20130290770 | Match Server for a Financial Exchange Having Fault Tolerant Operation - Fault tolerant operation is disclosed for a primary match server of a financial exchange using an active copy-cat instance, a.k.a. backup match server, that mirrors operations in the primary match server, but only after those operations have successfully completed in the primary match server. Fault tolerant logic monitors inputs and outputs of the primary match server and gates those inputs to the backup match server once a given input has been processed. The outputs of the backup match server are then compared with the outputs of the primary match server to ensure correct operation. The disclosed embodiments further relate to fault tolerant failover mechanism allowing the backup match server to take over for the primary match server in a fault situation wherein the primary and backup match servers are loosely coupled, i.e. they need not be aware that they are operating in a fault tolerant environment. | 2013-10-31 |
20130290771 | COMPUTER SYSTEM - A computer system has a plurality of computer nodes, and each computer node has a plurality of virtual computers and a control base unit controlling the virtual computers. Each virtual computer constitutes a multiplexing group with another virtual computer operating on another computer node different from its own computer node, with one operating as the master and the other as the slave. The control base unit controls whether each virtual computer is operating as either the master or the slave, and monitors the respective states of each virtual computer. The control base unit, when it has detected in its own node a failure of the virtual computer operating as the master virtual computer, makes a decision whether to also switch the other virtual computers operating on its own computer node from master virtual computers to slave virtual computers with the virtual computer in which the failure occurred. | 2013-10-31 |
20130290772 | SEQUENCE INDICATOR FOR COMMAND COMMUNICATED TO A SEQUENTIAL ACCESS STORAGE DEVICE - A command is communicated by a computer and received by a sequential storage access device. The command includes a sequence indicator. The sequential storage access device uses the sequence indicator, in a communication path failure recovery operation, to at least determine whether a command has been confirmed by the device driver as being processed by the sequential access storage device. | 2013-10-31 |
20130290773 | STORAGE SYSTEM AND STORAGE CONTROL APPARATUS - A storage system has a RAID group configured by storage media, a system controller with a processor, a buffer memory coupled to storage devices and the processor by a communication network, and a cache memory coupled to the processor and the buffer memory by the network. A processor that stores first data, which is related to a write request from a host computer, in a cache memory, specifies a first storage device for storing data before update, which is data obtained before updating the first data, and transfers the first data to the specified first storage device. A first device controller transmits the first data and second data based on the data before update, from the first storage device to the system controller. The processor stores the second data in the buffer memory, specifies a second storage device, and transfers the stored second data to the specified second storage device. | 2013-10-31 |
20130290774 | SVC CLUSTER CONFIGURATION NODE FAILOVER - Methods, systems, and computer programs are provided for failover responses to configuration node failures in SVC clusters. An SVC cluster manages a plurality of storage devices and includes a plurality of SVCs interconnected via a network, each SVC acting as a separate node. A storage device event log is saved, with an original configuration node. An entry is made in the storage device event log each time the original configuration node receives storage device events and setting the entry to a negative value indicating a storage device event has not been handled. The entry is set to a positive value indicating the storage device event has been handled after the original configuration node notifies respective subscribed clients about those of the storage device events the original configuration node receives. A new configuration node is activated in response to configuration node failures. | 2013-10-31 |
20130290775 | PRIORITIZING RECOVERY IN A STORAGE SYSTEM IMPLEMENTING RAID - A method for determining priority of recovery for a RAID implementation includes detecting a first failure of the RAID implementation; detecting a second failure of the RAID implementation; assigning a first priority to the first failure and a second priority to the second failure; and setting the priority of the recovery based on the first priority and the second priority. | 2013-10-31 |
20130290776 | Redundant Automation System and Method for Operating the Redundant Automation System - A redundant automation system and a method for operating the redundant automation system which is provided with a first subsystem and a second subsystem that each process a control program while controlling a technical process, one of these subsystems operating as a master and the other subsystem operating as a slave, and the slave assuming the function of the master if the master fails such that it becomes possible to dispense with temporally synchronous communication between the participants with regard to the synchronization of the program processing in the two subsystems, thus reducing the communication load. | 2013-10-31 |
20130290777 | STORAGE SYSTEM AND STORAGE CONTROL APPARATUS - A storage system has a RAID group configured by storage media, a system controller with a processor, a buffer memory coupled to storage devices and the processor by a communication network, and a cache memory coupled to the processor and the buffer memory by the network. A processor that stores first data, which is related to a write request from a host computer, in a cache memory, specifies a first storage device for storing data before update, which is data obtained before updating the first data, and transfers the first data to the specified first storage device. A first device controller transmits the first data and second data based on the data before update, from the first storage device to the system controller. The processor stores the second data in the buffer memory, specifies a second storage device, and transfers the stored second data to the specified second storage device. | 2013-10-31 |
20130290778 | RESTORING FROM A LEGACY OS ENVIRONMENT TO A UEFI PRE-BOOT ENVIRONMENT - Restoring from a legacy OS environment to a Unified Extensible Firmware Interface (UEFI) pre-boot environment, including: storing, under the UEFI pre-boot environment, context in the UEFI pre-boot environment that needs to be preserved, where the context in the UEFI pre-boot environment that needs to be preserved includes CPU execution context; restoring a first portion of the CPU execution context in response to the UEFI pre-boot environment failing to load the legacy OS; making a CPU associated with the UEFI pre-boot environment enter into System Management Mode, and restoring a second portion of the CPU execution context under the System Management Mode; and exiting from CPU System Management Mode, thereby returning to the UEFI pre-boot environment. | 2013-10-31 |
20130290779 | PREVENTING AUDIT LOSS FOR ASYNCHRONOUS TARGET - Aspects of the subject matter described herein relate to auditing operations. In aspects, operations may be audited synchronously and/or asynchronously to one or more audit targets. When auditing synchronously, audit records may be written synchronously to an audit target. When auditing asynchronously, a buffer may be used to store audit records until the audit records are flushed to an audit target. If an error occurs in auditing, a policy may be evaluated to determine how to respond. One exemplary response includes failing an operation that triggered a subsequent audit record. Furthermore, if a buffer was unable to be copied to an audit target, the contents of the buffer may be preserved and one or more retries may be attempted to copy the buffer to the audit target. | 2013-10-31 |
20130290780 | RECOVERY SEGMENTS - In one example, a method for implementing recovery segments includes sending an application message from a parent process executed by a first computing device to a child process executed by a second computing device and identifying a dependency created by the application message. This identified dependency is included in a dependence set of the child process and saved. A checkpoint is generated by the parent process and a checkpoint message that includes dependency information is sent from the parent process to the child process. The child process modifies the dependence set according to the dependency information and generates a second checkpoint that is saved in nonvolatile memory of the second computing device. Upon occurrence of a failure of the parent process, the child process reverts to a most recent checkpoint generated by the child process that does not include the effects of processing an orphan message. | 2013-10-31 |
20130290781 | LOW OVERHEAD FAULT TOLERANCE THROUGH HYBRID CHECKPOINTING AND REPLAY - A virtualized computer system provides fault tolerant operation of a primary virtual machine. In one embodiment, this system includes a backup computer system that stores a snapshot of the primary virtual machine and a log file containing non-deterministic events occuring in the instruction stream of the primary virtual machine. The primary virtual machine periodically updates the snapshot and the log file. Upon a failure of the primary virtual machine, the backup computer can instantiate a failover backup virtual machine by consuming the stored snapshot and log file. | 2013-10-31 |
20130290782 | LOW OVERHEAD FAULT TOLERANCE THROUGH HYBRID CHECKPOINTING AND REPLAY - A virtualized computer system provides fault tolerant operation of a primary virtual machine. In one embodiment, this system includes a backup computer system that stores a snapshot of the primary virtual machine and a log file containing non-deterministic events occuring in the instruction stream of the primary virtual machine. The primary virtual machine periodically updates the snapshot and the log file. Upon a failure of the primary virtual machine, the backup computer can instantiate a failover backup virtual machine by consuming the stored snapshot and log file. | 2013-10-31 |
20130290783 | Estimating a Severity Level of a Network Fault - A method of estimating a level of severity of a network fault is provided. Performance parameters are monitored on upstream and downstream links to terminal network elements on a network to detect potential network faults. An alarm is raised with respect to a potential network fault automatically if at least one of the performance parameters as monitored crosses a preset threshold. After an alarm is raised, a level of severity is assigned to the alarm based on pre and post forward error correction (FEC) bit error rates (BER). In addition, the total number of terminal network elements that are impacted by the network fault is estimated and, when multiple alarms are raised of an equal level of severity, a higher priority is placed upon an alarm that affects service to a greatest number of terminal network elements. | 2013-10-31 |
20130290784 | MANAGEMENT APPARATUS AND MANAGEMENT METHOD - A management apparatus and a management method that enable parsing processing to be executed efficiently by means of a working memory of a fixed size are proposed. One or more predefined rules are divided into one or more rule segments that comprise a condition and a conclusion that each form part of the rule, and the rule segments obtained through the division are stored in the secondary storage, and when an event notification from the information processing device is received, one or more related rule segments are selected and, by linking the selected one or more rule segments in the memory as required, a rule parsing network is constructed that indicates relationships between rules in the memory, an inference is derived on the basis of the constructed rule parsing network, and rule segments that are not readily used in inference derivation are deleted from the memory. | 2013-10-31 |
20130290785 | SYSTEMS AND METHODS FOR A SHARED DEBUG PIN - In some examples, a computer system includes a first component associated with a first power domain and a second component associated with a second power domain. The computer system also includes a debug port with a debug port pin shared by a debug operation pin of the first component and a corresponding debug operation pin of the second component. The computer system also includes a switch associated with the debug port pin to selectively isolate the debug operation pin of the first component from leakage current of the corresponding debug operation pin of the second component. | 2013-10-31 |
20130290786 | AUTOMATED TESTING OF APPLICATIONS WITH SCRIPTING CODE - A novel system, computer program product, and method are disclosed for feedback-directed automated test generation for programs, such as JavaScript, in which execution is monitored to collect information that directs the test generator towards inputs that yield increased coverage. Several instantiations of the framework are implemented, corresponding to variations on feedback-directed random testing, in a tool called Artemis. | 2013-10-31 |
20130290787 | SYSTEM AND METHOD FOR RECORDING SYSTEM EVENT LOGS OF SERVER - A method for recording managing SELs of a server includes the following steps. Periodically determining a current number of the SELs stored in a storage unit of the server. Comparing the current number with a historical number to determine newly generated SELs. If the current number is greater than the historical number, determining whether the storage unit is full. If the storage unit is full, controlling the BMC to transfer the newly generated SELs to a cache unit. The stored SELs are erased in the storage unit. Transferring the SELs in the cache unit to the storage unit when the SELs in the storage unit are erased. The historical number is updated. | 2013-10-31 |
20130290788 | MINIMUM OUTPUT CURRENT TEST APPARATUS - An apparatus tests currents from a plurality of power ports of a power supply unit (PSU), to test minimum value of the currents. The apparatus includes a connector, a controller, a time sequence detection circuit, and a plurality of load circuits. The time sequence detection circuit detects a start time-sequence of the ports of the PSU. Each load circuit is electronically connected to a power port of the PSU. The controller activates and applies each load circuit to a power port of the PSU according the start time-sequence of the ports of the PSU, controls a current-draw of each load circuit until the PSU works in a normal state, and displays the established minimum output current when the PSU works in the normal state. | 2013-10-31 |
20130290789 | Memory Dump And Analysis In A Computer System - Systems and methods for executing a memory dump in a computer system are provided. A trigger event is detected in the computer system. The computer system is configured to detect both a kernel panic and a system hang and to execute memory dump if either of the kernel panic or the system hang is detected. The memory dump is executed in the computer system in response to the detecting of the trigger event. The executing of the memory dump includes storing a current context of the computer system in a portion of a memory device. The current context is stored without reserving the portion prior to the detecting of the trigger event. The computer system is restarted and a bootstrap program is executed, where a running space of the bootstrap program is restricted to the portion of the memory device. The bootstrap program is used to upload the current context to a host device. | 2013-10-31 |
20130290790 | INFORMATION PROCESSING APPARATUS HAVING MEMORY DUMP FUNCTION, MEMORY DUMP METHOD, AND RECORDING MEDIUM - An information processing apparatus that executes an operating system, the apparatus including a panic process unit configured to stop the operating system when the operating system has detected an error, a mapping process unit configured to assign, to the operating system stopped by the panic process unit, a second memory area which is other than a first memory area being used by a kernel of the operating system before stop or by a hypervisor that controls the operating system before stop of the operating system, a reactivation process unit configured to reactivate the operating system by using the second memory area as a usage area, and a memory dump process unit configured to read data in the first memory area, and to write the data to a dump file after the operating system is reactivated. | 2013-10-31 |
20130290791 | Mapping a Network Fault - A method of mapping a network fault is provided. Information is received concerning geographical coordinates of terminal network elements and their association with shared network components. A performance parameter is transmitted via upstream network communications from the terminal network elements is monitored. Terminal network elements from which the monitored performance parameter are unacceptable relative to a predetermined threshold for the performance parameter are identified, and a cluster of terminal network elements estimated to be subject to a common network fault is defined. The cluster includes terminal network elements that are identified as reporting an unacceptable performance parameter, as being within a predetermined geographic distance from each other, and as being associated with a common shared network component. A geographic map is populated with a single cluster alarm and includes an identification of the terminal network elements within the cluster. An electronic device and non-transitory computer readable storage medium are provided. | 2013-10-31 |
20130290792 | CRYPTOGRAPHIC PROCESSING WITH RANDOM NUMBER GENERATOR CHECKING - Embodiments of an electronic circuit comprise a module, such as a security module, configured to perform cryptographic processing for a predetermined security protocol that includes random number checking. The security module is controlled by a descriptor that includes instructions that cause the security module to access a generated random number, compare the generated random number to a random number stored during a previous execution of the descriptor, and generate an error signal when the generated random number and the previous execution random number are equal. | 2013-10-31 |
20130290793 | MANAGING UNRELIABLE MEMORY IN DATA STORAGE SYSTEMS - A data storage system configured to manage unreliable memory units is disclosed. In one embodiment, the data storage system maintains an unreliable memory unit list designating memory units in a non-volatile memory array as reliable or unreliable. The unreliable memory unit list facilitates management of unreliable memory at a granularity level finer than the granularity of a block of memory. The data storage system can add entries to the unreliable memory unit list as unreliable memory units are discovered. Further, the data storage system can continue to perform memory access operations directed to reliable memory units in blocks containing other memory units determined to be unreliable. As a result, the operational life of the data storage system is extended. | 2013-10-31 |
20130290794 | SYSTEM AND METHOD FOR DEFINITION, CREATION, MANAGEMENT, TRANSMISSION, AND MONITORING OF ERRORS IN SOA ENVIRONMENT - A computer-implemented system and method for the definition, creation, management, transmission, and monitoring of errors in a SOA environment. An example embodiment includes: defining a common standard error data structure; automatically generating a unique identifier (ID) for each new error data instance; allowing customization of error data structure through extensions; creation and management of error instances that conform to this structure; ability to group errors across various dimensions; introducing the concept of an error library, the error library including a plurality of localizable error bundles, each of the error bundles including a plurality of error data instances for a particular domain, along with the associated metadata; automatically creating runtime artifacts for each error; ability to transmit errors either as faults or as part of the normal response payload; automatic error metric collection based on various error categories, and finally, tooling to help manage error libraries and reporting errors. | 2013-10-31 |
20130290795 | Test Scheduling With Pattern-Independent Test Access Mechanism - Disclosed are representative embodiments of methods, apparatus, and systems for test scheduling for testing a plurality of cores in a system on circuit. Test data are encoded to derive compressed test patterns that require small numbers of core input channels. Core input/output channel requirement information for each of the compressed test patterns is determined accordingly. The compressed patterns are grouped into test pattern classes. The formation of the test pattern classes is followed by allocation circuit input and output channels and test application time slots that may comprise merging complementary test pattern classes into clusters that can work with a particular test access mechanism. The test access mechanism may be designed independent of the test data. | 2013-10-31 |
20130290796 | TEST PATTERN GENERATION APPARATUS, TEST PROGRAM GENERATION APPARATUS, GENERATION METHOD, PROGRAM, AND TEST APPARATUS - A test pattern generating apparatus that generates a test pattern to be communicated with a device under test having a plurality of terminals, the test pattern generating apparatus comprising a primitive generating section that generates a cycle primitive indicating a signal pattern to be communicated with each of the terminals during a base cycle, based on instructions from a user; a device cycle generating section that generates a device cycle indicating signal patterns of a plurality of base cycles, by arranging a plurality of the cycle primitives based on instructions from the user; and a sequence generating section that generates a sequence of the test pattern to be supplied to the device under test, by arranging a plurality of the device cycles based on instructions from the user. | 2013-10-31 |
20130290797 | NON-VOLATILE MEMORY (NVM) RESET SEQUENCE WITH BUILT-IN READ CHECK - A new, robust non-volatile memory (NVM) reset sequence is provided in accordance with at least one embodiment, which, after reading a Test NVM portion and overwriting NVM configuration registers' default values with the values read from the Test NVM portion, does a read integrity check. If the read integrity check passes, a reset process will conclude. Otherwise, if the read integrity check fails, the reset process will re-try reading the Test NVM and overwriting the NVM configuration registers' default values. If the read integrity check still fails after a maximum number of re-tries, a fail flag will be set, and the predetermined “safe” default values will be reloaded to the NVM configuration registers, thereby assuring that the NVM device is operational. | 2013-10-31 |
20130290798 | Systems and Methods for Short Media Defect Detection Using Non-Binary Coded Information - Various embodiments of the present invention provide systems and methods for media defect detection. | 2013-10-31 |
20130290799 | SCAN TEST CIRCUITRY WITH SELECTABLE TRANSITION LAUNCH MODE - An integrated circuit comprises scan test circuitry and additional circuitry subject to testing utilizing the scan test circuitry. The scan test circuitry comprises at least one scan chain having scan cells. The scan test circuitry further comprises transition launch mode selection circuitry configured to provide independent selection between multiple transition launch modes for each of a plurality of clock domains of the integrated circuit. The multiple transition launch modes may include, for example, at least a launch-on-shift mode and a launch-on-capture mode. These transition launch modes provide different manners of launching a given signal transition via at least one of the scan cells in a corresponding one of the clock domains. The transition launch mode selection circuitry may be configured to generate from a common shift enable signal multiple independently controllable shift enable signals for respective ones of the clock domains of the integrated circuit. | 2013-10-31 |
20130290800 | ADAPTING SCAN-BIST ARCHITECTURES FOR LOW POWER OPERATION - Testing of integrated circuits is achieved by a test architecture utilizing a scan frame input shift register, a scan frame output shift register, a test controller, and a test interface comprising a scan input, a scan clock, a test enable, and a scan output. Scan frames input to the scan frame input shift register contain a test stimulus data section and a test command section. Scan frames output from the scan frame output shift register contain a test response data section and, optionally, a section for outputting other data. The command section of the input scan frame controls the test architecture to execute a desired test operation. | 2013-10-31 |
20130290801 | SCAN RESPONSE REUSE METHOD AND APPARATUS - The disclosure describes a novel method and apparatus for allowing response data output from the scan outputs of a circuit under test to be formatted and applied as stimulus data input to the scan inputs of the circuit under test. Also the disclosure described a novel method and apparatus for allowing the response data output from the scan outputs of a circuit under test to be formatted and used as expected data to compare against the response data output from the circuit under test. Additional embodiments are also provided and described in the disclosure. | 2013-10-31 |