45th week of 2012 patent applcation highlights part 56 |
Patent application number | Title | Published |
20120284471 | VIRTUAL MACHINE DISK MIGRATION - A method and an apparatus may be provided for migrating a source virtual machine disk of a virtual machine from a first storage device to a second storage device while the virtual machine is running. The method may include creating a target virtual machine disk in the second storage device, replicating the source virtual machine disk of the first storage device to the target virtual machine disk in the second storage device, detecting variation of the source virtual machine disk, reflecting the detected variation on the replication stored in the target virtual machine disk in the second storage device, and assigning the target virtual machine disk of the second storage device as a designated virtual machine disk for the virtual machine. | 2012-11-08 |
20120284472 | SNAPSHOT BASED REPLICATION - Embodiments of the invention relate to data replication and block allocation in a file system to support write transactions. Regions in a cluster file system are defined to support a block allocation. Blocks in the defined regions are allocated to support the data replication. A pipeline manager is provided to schedule population of the blocks in the allocated region(s) based upon network characteristics. | 2012-11-08 |
20120284473 | MEMORY STORAGE DEVICE AND MEMORY CONTROLLER AND ACCESS METHOD THEREOF - A memory storage device and a memory controller and an access method thereof are provided. The memory storage device includes a rewritable non-volatile memory chip having a plurality of physical blocks. The access method includes configuring a plurality of logical blocks to be mapped to a part of the physical blocks and dividing the logical blocks into at least a first partition and a second partition, wherein the first partition records an auto-execute file. The access method also includes determining whether a trigger signal is existent and sending a media ready message to a host system if the trigger signal is existent, so as to allow the host system to automatically run the auto-execute file and receive a first password. The access method further includes determining whether to provide the logical blocks in the second partition to the host system according to the first password received from the host system. | 2012-11-08 |
20120284474 | ENABLING RECOVERY DURING DATA DEFRAGMENTATION - In defragmentation of data of a data storage system, the data storage system having at least one storage control and data storage, allowing defragmentation of data with respect to the data storage, the defragmentation comprising analysis and data movement. During the defragmentation and before completion of the defragmentation, in response to the data movement reaching a stable state, further defragmentation analysis and data movement is interrupted; making a point-in-time copy of the data subject to the defragmentation; and resuming the defragmentation analysis and data movement. At a further stable state where a new point-in-time copy is made, an earlier point-in-time copy is withdrawn. Should the defragmentation process end prematurely, a backup of the data subject to defragmentation may be recovered from a most recent point-in-time copy. | 2012-11-08 |
20120284475 | Memory On-Demand, Managing Power In Memory - A memory controller for managing data and power in a memory is described. In some implementations, the memory controller is configured to identify a first area of the memory to be operated at a first power level, identify a second area of the memory to be operated at a second power level, transfer data in a region in the second area to a region in the first area, maintain a mapping of an address associated with the region in the second area to an address associated with the region in the first area, operate the first area at the first power level, and operate the second area at the second power level. | 2012-11-08 |
20120284476 | STORAGE CONTROLLER AND STORAGE CONTROL METHOD - A storage controller having a plurality of storage devices and a control circuit providing a plurality of virtual volumes, to each of which a storage area in a plurality of pool volumes provided with the plurality of storage devices can be mapped for writing data in response to a write access sent from an information processing apparatus to a logical area in one of the plurality of virtual volumes, respectively. The control circuit, according to a search of the plurality of pool volumes for a certain storage area in which a certain data pattern is written, releases the certain storage area from mapping to a logical area in the plurality of virtual volumes, so that the control circuit can use the released certain storage area for mapping to a virtual volume of the plurality of virtual volumes as a destination of another write access from the information processing apparatus. | 2012-11-08 |
20120284477 | EXECUTION OF A PERFORM FRAME MANAGEMENT FUNCTION INSTRUCTION - Optimizations are provided for frame management operations, including a clear operation and/or a set storage key operation, requested by pageable guests. The operations are performed, absent host intervention, on frames not resident in host memory. The operations may be specified in an instruction issued by the pageable guests. | 2012-11-08 |
20120284478 | MANAGING STORAGE EXTENTS AND THE OBTAINING OF STORAGE BLOCKS WITHIN THE EXTENTS - Auxiliary storage is segmented into different types of extents (i.e., ranges of storage), including extents with 4K blocks of storage, extents with 1M blocks of storage, empty extents, and mixed extents that include blocks of storage of various sizes (e.g., 4K blocks and 1M blocks). The auxiliary storage, and in particular, the extents and blocks of storage therein, are managed to reduce storage fragmentation and optimize system performance. | 2012-11-08 |
20120284479 | MANAGING LARGE PAGE MEMORY POOLS - Large page memory pools are managed. Thresholds are used to determine if the number of pages in a large page memory pool is to be adjusted. If the number of pages is to be increased, a particular technique is provided for adding additional pages to the pool. Further, if there are too many pages in the pool, one or more pages may be removed. | 2012-11-08 |
20120284480 | MEMORY SYSTEMS, MEMORY CONTROLLERS, MEMORY MODULES AND METHODS FOR INTERFACING WITH MEMORY MODULES - A memory system includes a memory controller and a memory module coupled to the memory controller. One such memory module may include a memory package of a first type and a signal presence detect unit configured to provide configuration data associated with a memory package of a second type to the memory controller. The configuration data may be used to configure the memory controller to interface with the memory package of a first type. | 2012-11-08 |
20120284481 | WIRELESSLY CONFIGURABLE MEMORY DEVICE ADDRESSING - A memory device includes a plurality of memory modules and a memory management module. A memory module of the plurality of memory modules includes a plurality of memory cells and a memory millimeter wave (MMW) transceiver. The memory management module determines a main memory configuration for at least some of the plurality of memory modules. The memory management module also determines physical addresses for the main memory configuration and determines a MMW communication resource table that includes an allocation mapping of one or more MMW communication resources to one or more of the at least some of the plurality of memory modules. | 2012-11-08 |
20120284482 | Label Reuse Method and System for Connected Component Labeling - Embodiments disclosed include methods and systems for reusing labels for connected component labeling including assigning one or more labels to one or more groups of raw data representing one or more regions by designating one or more data structures as containing information about the one or more regions; connecting the one or more labels determined to be related; choosing a root label for the connected one or more labels, the root label determined by locating an earliest data element from the one or more groups of raw data; altering a label list of the one or more labels, the label list altered by flagging the root label to include a region label index; and overwriting one or more region label indexes according to the root label. | 2012-11-08 |
20120284483 | MANAGING ALLOCATION OF MEMORY PAGES - Allocation of pages of memory is managed in computing environments that include multiple sized memory pools. Responsive to a request for a page of memory, one or more memory pools are searched for an available frame of memory to service the request. The search uses a predefined order of search, which includes multiple types of memory pools in a specific order based on the requested size of the page of memory. | 2012-11-08 |
20120284484 | Logical Partition Defragmentation with a Data Processing System - A mechanism, in a data processing system, is provided for logical partition defragmentation. The mechanism gathers resource requirements for a plurality of logical partitions running in a plurality of power domains within one or more servers. The mechanism determines optimal hardware utilization for the plurality of logical partitions. The mechanism migrates one or more of the plurality of logical partitions to run in a subset of the plurality of power domains such that at least one power domain within the plurality of power domains is unused. The mechanism puts the at least one unused power domain in a low power state. | 2012-11-08 |
20120284485 | OPERATING SYSTEM VIRTUAL MEMORY MANAGEMENT FOR HARDWARE TRANSACTIONAL MEMORY - Operating system virtual memory management for hardware transactional memory. A system includes an operating system deciding to unmap a first virtual page. As a result, the operating system removes the mapping of the first virtual page to the first physical page from the virtual memory page table. As a result, the operating system performs an action to discard transactional memory hardware state for at least the first physical page. Embodiments may further suspend hardware transactions in kernel mode. Embodiments may further perform soft page fault handling without aborting a hardware transaction, resuming the hardware transaction upon return to user mode, and even successfully committing the hardware transaction. | 2012-11-08 |
20120284486 | CONTROL OF ON-DIE SYSTEM FABRIC BLOCKS - Methods and apparatus for control of On-Die System Fabric (OSF) blocks are described. In one embodiment, a shadow address corresponding to a physical address may be stored in response to a user-level request and a logic circuitry (e.g., present in an OSF) may determine the physical address from the shadow address. Other embodiments are also disclosed. | 2012-11-08 |
20120284487 | Vector Slot Processor Execution Unit for High Speed Streaming Inputs - A vector slot processor that is capable of supporting multiple signal processing operations for multiple demodulation standards is provided. The vector slot processor includes a plurality of micro execution slot (MES) that performs the multiple signal processing operations on the high speed streaming inputs. Each of the MES includes one or more n-way signal registers that receive the high speed streaming inputs, one or more n-way coefficient registers that store filter coefficients for the multiple signal processing, and one or more n-way Multiply and Accumulate (MAC) units that receive the high speed streaming inputs from the one or more n-way signal registers and filter coefficients from one or more n-way coefficient registers. The one or more n-way MAC units perform a vertical MAC operation and a horizontal multiply and add operation on the high speed streaming inputs. | 2012-11-08 |
20120284488 | Methods and Apparatus for Constant Extension in a Processor - Programs often require constants that cannot be encoded in a native instruction format, such as | 2012-11-08 |
20120284489 | Methods and Apparatus for Constant Extension in a Processor - Programs often require constants that cannot be encoded in a native instruction format, such as 32-bits. To provide an extended constant, an instruction packet is formed with constant extender information and a target instruction. The constant extender information encoded as a constant extender instruction provides a first set of constant bits, such as 26-bits for example, and the target instruction provides a second set of constant bits, such as 6-bits. The first set of constant bits are combined with the second set of constant bits to generate an extended constant for execution of the target instruction. The extended constant may be used as an extended source operand, an extended address for memory access instructions, an extended address for branch type of instructions, and the like. Multiple constant extender instructions may be used together to provide larger constants than can be provided by a single extension instruction. | 2012-11-08 |
20120284490 | WORKING SET PROFILER - A working set profiler can monitor an execution of a program or can monitor a user-specified portion of a program to identify methods executed within the monitored execution and associate memory page accesses with each of the identified methods. Memory page accesses are categorized as shared or exclusive, where a shared page is a page that is accessed by more than one method and where an exclusive page is a page that is accessed by only one method in the monitored portion of the program. A call tree can be constructed and augmented with the collected information regarding memory page accesses. Further, for shared pages, the name of the method with which a particular method shares the page access can be collected. The augmented call tree information can be analyzed and prioritized to identify methods whose elimination would reduce program latency. | 2012-11-08 |
20120284491 | STARTUP/SHUTDOWN SEQUENCE - Linux, UNIX and other operating systems allow for the customization of the boot up process by adding symbolic links and scripts to certain directories in the root filesystem. Such customization is done at the time the system is created or updated via patches. The current disclosure teaches a method to simplify customization, both from the standpoint of installation as well as from the standpoint of the application developer. This abstract is provided as a tool for those searching for patents, and not as a limitation on the scope of the claims. | 2012-11-08 |
20120284492 | COMPUTING SYSTEM WITH HARDWARE SCHEDULED RECONFIGURATION MECHANISM AND METHOD OF OPERATION THEREOF - A method of manufacture of a computing system includes: executing a first application, active and implemented as hardware within a hardware component having of one or more of reconfigurable hardware devices; detecting a trigger event in a first microkernel; generating a first hardware descriptor based on the trigger event, the first hardware descriptor to configure a portion of the hardware component for the first application or a second application; and configuring the portion of the hardware component with the first hardware descriptor while the first application executes concurrently. | 2012-11-08 |
20120284493 | BOOTING FROM A SECONDARY STORAGE DEVICE IN ORDER TO ACCUMULATE DISK DRIVE PERFORMANCE DATA - A computer system is disclosed comprising a disk drive comprising a head stack assembly (HSA), the HSA comprising a spindle motor for rotating at least one disk, and at least one head actuated over the disk. The computer system further comprises a host coupled to the disk drive, wherein the host comprises a microprocessor operable to first boot the host by reading boot data from a secondary storage device. After first booting the host, the microprocessor commands the disk drive to accumulate performance data for the HSA, and after accumulating the performance data, the microprocessor second boots the host by reading boot data from the HSA. | 2012-11-08 |
20120284494 | DYNAMICALLY REDIRECTING BOOT TO ANOTHER OPERATING SYSTEM - Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable storage device is detected to be present. The computing device can be configured to dynamically boot from the portable storage device when the portable storage device is detected, and revert to a programmed boot order in its associated boot module when the portable storage device is not detected. In some embodiments, the operating system is fully encapsulated on the portable storage device, such as the operating system being completely separate from an operating system initially booting the computing device. | 2012-11-08 |
20120284495 | System and Method for Facilitating Booting Using a Plurality of Boot Methods - Systems and methods for reducing problems and disadvantages associated with multiple boot methods are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor and a memory communicatively coupled to the processor. The information handling system also comprises an access controller communicatively coupled to the processor. The access controller is configured to retrieve non-bootable executable instructions and combine the non-bootable executable instructions with a boot loader associated with a boot method to generate a bootable image associated with the boot method. The access controller is further configured to present the bootable image to the information handling system such that the bootable image is configured to be booted by the information handling system using the boot method. | 2012-11-08 |
20120284496 | Memory affinitization in multithreaded environments - Illustrative embodiments include a method, system, and computer program product for estimating boot-time memory requirement of a data processing system. A data processing system identifies, using system configuration information associated with the data processing system, a set of components needed for booting up the data processing system. The data processing system determines a dependency of a component identified in the set of components, the component including a memory estimator program. The data processing system determines an ancestry of the component identified in the set of components. The data processing system receives, using the memory estimator program of the component, a boot-time memory requirement of the component. The data processing system calculates a total boot-time memory requirement. The data processing system determines whether an amount of real memory of the data processing system satisfies the total boot-time memory requirement. | 2012-11-08 |
20120284497 | BOOTING METHOD OF MAIN CHIP - A booting method of a main chip includes the following steps. The main chip searches a current block of a NAND Flash for reading a boot table from a current page of the current block and verifying a boot header of the boot table. When the boot header passes the verification, the main chip checks whether ID of the boot table and ID of the NAND Flash are the same. When the IDs of the boot table and the NAND Flash are the same, the main chip reads a next page of the current block and checks whether data stored in the current page and in the next page is the same. When the data stored in the current page and in the next page is the same, the main chip reads configuration information of the boot table to initialize the NAND Flash and boots. | 2012-11-08 |
20120284498 | FLASH DEVICE AND ASSOCIATED BOOTING METHOD - A flash device and a booting method thereof are provided. The booting method includes following steps: executing a basic boot program stored in a read only memory (ROM) of a flash memory micro-controller; reading a specific flash memory configuration parameter and a revision program from a flash memory; loading a main program stored in the flash memory; and executing the revision program and loading the main program stored in the flash memory when the main program fails to be loaded. | 2012-11-08 |
20120284499 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 2012-11-08 |
20120284500 | ABSTRACTION OF COMPUTER DISK IMAGE CLONING CAPABILITIES FROM BOOTABLE MEDIA - A computer system and computer program product for implementing a method for configuring an improved computing system containing a first computing device. The method includes: creating a logical layer and a physical layer within the first computing device; installing a software operating system (OS) in the logical layer of the first computing device; configuring a first basic input/output system (BIOS) based on installation in the physical layer of the first computing device; relocating all first hardware device drivers for the first hardware devices from an OS image in the logical layer to a first Electrically Erasable Programmable Read-Only Memory (EEPROM) in the physical layer of the first computing device; installing the first BIOS in the physical layer of the first computing device; and loading the first hardware device drivers from the first EEPROM into the first BIOS during a boot phase for the first computing device. | 2012-11-08 |
20120284501 | COMPUTING SYSTEM WITH HARDWARE RECONFIGURATION MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a computing system includes: providing a first cluster having a first kernel unit for managing a first reconfigurable hardware device; analyzing an application descriptor associated with an application; generating a first bitstream based on the application descriptor for loading the first reconfigurable hardware device, the first bitstream for implementing at least a first portion of the application; and implementing a first fragment with the first bitstream in the first cluster. | 2012-11-08 |
20120284502 | COMPUTING SYSTEM WITH HARDWARE RECONFIGURATION MECHANISM AND METHOD OF OPERATION THEREOF - A method for operating a computing system includes: receiving an application-tree for instantiating an application in a reconfigurable hardware device; operating a kernel unit for determining an unoccupied logic-sector within a reconfigurable hardware device; calculating a layout section from the application-tree according to the unoccupied logic-sector for instantiating a fragment circuitry corresponding to the layout section; and determining a system table for connecting the fragment circuitry to other portions of the application to form the application having the fragment circuitry. | 2012-11-08 |
20120284503 | DYNAMIC POWER AND PERFORMANCE CALIBRATION OF DATA PROCESSING SYSTEMS - A method for dynamic power and performance calibration of a data processing system is provided in the illustrative embodiments. A synthesized program loaded in the data processing system is executed responsive to detecting an event in the data processing system. The synthesized program is configured to generate a set of data that is indicative of the data processing system's power-performance characteristics under varying conditions of operation. Using the set of data, a determination is made of a performance limit on an operation of the data processing system under present operating conditions of the data processing system. A parameter of the data processing system is calibrated to operate the data processing system within the performance limit. | 2012-11-08 |
20120284504 | Method and system for the Orange family of stream ciphers and method and system for generating stream ciphers based on the ERINDALE-PLUS hashing function - The present invention introduces the Orange family of stream ciphers. The cipher may involve several elements including splitting with jumping, iterated transformations and padding. The construction of the cipher also involves constantly updated bit strings that may be used as multiple keystreams in transformations of various degrees. The cipher permits parameterizing speed, security and consumed memory. A customization of the cipher allows generating practically unlimited number of stream ciphers with different inner structures and IV parameters. The present invention also presents a transformation of the ERINDALE-PLUS hashing function. The transformed ERINDALE-PLUS hashing is capable simultaneously generate a ciphertext and a secure hash value of a message. | 2012-11-08 |
20120284505 | DNSSEC SIGNING SERVER - Systems and methods for performing DNSSEC signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. The signing server may determine an active KSK and/or an active ZSK for the first data. The first data may then be transmitted by the signing server to a digital signature modules, which may include, for example, a hardware support module, or software signing applications. The signing server may receive a digitally signed version of the first data from the digital signature module, and provide the signed first data to the client application. | 2012-11-08 |
20120284506 | METHODS AND APPARATUS FOR PREVENTING CRIMEWARE ATTACKS - A central server configured to mediate communications including establishing secure online sessions between user-controlled devices and 3 | 2012-11-08 |
20120284507 | PROTECTED AUTHORIZATION - One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a validation server. That is, validation data provided to a client from a validation server may be maintained on the client and at least some of that validation data can be used to subsequently authorize the client when the client attempts to consume data and/or services from the service provider server (e.g., download a song). However, the validation data is maintained on the client and/or provided to the service provider server in a manner that inhibits user tampering. In this manner, numerous requests for validation of the client need not be made from the service provider server to the validation server when a client requests content from the service provider server, while also inhibiting unauthorized consumptions of data by the client. | 2012-11-08 |
20120284508 | VALIDATING A BATCH OF IMPLICIT CERTIFICATES - Methods, systems, and computer programs for validating a batch of implicit certificates are described. Data for a batch of implicit certificates are received and validated. In some aspect, the data include key-pair-validation values that can be used to validate the public and private keys for each implicit certificate. For example, the key-pair-validation values can include a private key, a public key reconstruction value, a public key of the certificate authority, and a hash of the implicit certificate. The key-pair-validation values are either valid or invalid according to a key-pair-validation function. In some cases, modification values are obtained independent of the key-pair-validation values, and the modification values are combined with the key-pair-validation values in a batch-validation function. The batch-validation function is evaluated for the batch of implicit certificates. Evaluating the batch-validation function identifies whether the key-pair-validation data include key-pair-validation values that are invalid according to the key-pair-validation function. | 2012-11-08 |
20120284509 | COMMUNICATION SYSTEM AND METHOD FOR SECURELY COMMUNICATING A MESSAGE BETWEEN CORRESPONDENTS THROUGH AN INTERMEDIARY TERMINAL - A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identity of the pager and attaches a certificate to the message for ongoing transmission. Where the recipient is also a pager, an associated home terminal verifies the transmission and forwards it in a trusted manner without the certificate to the recipient. | 2012-11-08 |
20120284510 | BONDING CONTENTS ON SEPARATE STORAGE MEDIA - Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem arising with this technically applicable possibility is the protection of copyrights bound to disc and supplement data. The present invention describes a technique to ensure a security framework that is able to handle this, by creating a virtual file system (VFS) by merging optical disc data and local storage data based upon a common identifier. | 2012-11-08 |
20120284511 | Method and Apparatus for Transmitting Bulk Emergency Data while Preserving User Privacy - Systems and methods are described for performing bulk transmissions of information (e.g., emergency information, etc.) while preserving user privacy. An example mobile device described herein includes an information aggregation module configured to compile first information associated with the device, the first information including location-related information, an encryption module communicatively coupled to the information aggregation module and configured to encrypt the first information using at least one session key, and a transmitter communicatively coupled to the encryption module and configured to transmit encrypted first information to at least one receiver prior to a triggering event and to transmit the at least one session key to the at least one receiver after the triggering event. | 2012-11-08 |
20120284512 | RURAL SERVICES PLATFORM - A middleware platform is executable by a computer to receive a request for a service, the service provided by a service application in communication with the middleware platform. The middleware platform determines, via a device adaptation component of the middleware platform, capabilities of a device subject to the request. The middleware platform selects an interface having a format that is compatible with the capabilities of the device, and provides the interface to the device in a format corresponding to the capabilities, accesses the service application responsive to the request, processes the request, and returns a response, via the interface, to the device responsive to the processing. | 2012-11-08 |
20120284513 | RENDER SERVICE FOR REMOTE ACCESS TO APPLICATIONS - The present disclosure relates to providing remote access to applications with an increased level of security. A server for providing access to applications is provided, as well as a method therefor, comprising an input channel and an output channel to connect a client with said server, an interface coupled to said input channel and an application, said interface to receive input data from said client via said input channel and to communicate said received input data to the application, and a renderer coupled to said output channel and said application, said renderer to render the output of said application into a data stream to be transferred via the output channel to the client, wherein the input data and the data stream are both encrypted. | 2012-11-08 |
20120284514 | MANAGING DATA FOR AUTHENTICATION DEVICES - Methods, systems, and computer programs for managing authentication data for an authentication device are disclosed. An authentication device may be included, for example, in a mobile device battery so that the battery can be authenticated by a mobile device. In some implementations, encrypted certificate data are stored on an authentication device. The encrypted certificate data are accessed, and unencrypted certificate data are generated by decrypting the encrypted certificate data. The unencrypted certificate data are stored on the authentication device. The unencrypted certificate data enable the authentication device to provide a valid reply message, for example, in response to receiving an interrogation message from an interrogation device. In some implementations, the reply message includes the unencrypted certificate data and a response value generated by the authentication device based on a secret value. | 2012-11-08 |
20120284515 | COPYRIGHT PROTECTION DATA PROCESSING SYSTEM AND REPRODUCTION DEVICE - A content protection data processing system and a playback device determine whether to permit playback of a content recorded in a recording medium, based on a type of the recording medium and a signature type of a signature attached to a program. Additionally, the content protection data processing system and the playback device switch a procedure relating to a digital signature for each signature type of the digital signature, which enables both the protection of the copyright of the content and the efficient manufacturing of commercial ROM media. | 2012-11-08 |
20120284516 | CROSS-DOMAIN COLLABORATIVE SYSTEMS AND METHODS - The present disclosure relates to systems and methods for secure and authentic electronic cross domain collaboration between a plurality of users using a combination of biometric security, a separate and secure network infrastructure, management processes, encrypted electronic storage, and collaborative templates. In an exemplary embodiment, an cross domain collaboration system includes a server including a network interface connected to the Internet, a data store including electronic data storage, and a processor, wherein each of the network interface, the data store and the processor are communicatively coupled, and wherein the network interface, the data store and the processor are collectively configured to: biometrically authenticate a plurality of users, wherein each of the plurality of users comprises a security level and a domain; and enable cross domain collaboration between the plurality of users based on the security level of each of the plurality of users. | 2012-11-08 |
20120284517 | WIRELESS AUTHENTICATION USING BEACON MESSAGES - Systems, methods, and other embodiments associated with wireless authentication using beacon messages are described. According to one embodiment, an access point controller includes a transmitter configured to wirelessly transmit a beacon message. The beacon message is configured to announce to a remote device that a wireless access point is available to provide access to a network. The beacon message includes a security identifier that identifies a public key for the wireless access point. | 2012-11-08 |
20120284518 | METHOD OF ANONYMOUS ENTITY AUTHENTICATION USING GROUP-BASED ANONYMOUS SIGNATURES - Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication between the entities, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA). | 2012-11-08 |
20120284519 | IMPLEMENTING METHOD, SYSTEM OF UNIVERSAL CARD SYSTEM AND SMART CARD - An implementing method, a system of a universal card system and a smart card are disclosed. The smart card receives the creating master control sub-application message from a card-issuing party operation platform, decrypts the message according to a pre-stored encryption key of the card-issuing party sensitive data, obtains the master control sub-application data, and creates a master control sub-application according to the master control sub-application data. An enterprise managing key is included in the master control sub-application data. The smart card receives the creating non-master control sub-application message from an enterprise operation platform, decrypts the creating non-master control sub-application message according to encryption key of the enterprise sensitive data in the enterprise managing key, obtains the non-master control sub-application data, and creates a non-master control sub-application according to the non-master control sub-application data. | 2012-11-08 |
20120284520 | ESTABLISHING SHARED INFORMATION IN A NETWORK - A method for establishing shared information is described. The method includes estimating characteristics of a communication channel between two nodes based on signals transmitted between the nodes. The method also includes transmitting a signal from the first node to the second node, the signal being modulated with a first data sequence according to a first estimated characteristic, and transmitting a signal from the second node to the first node, the signal being modulated with a second data sequence according to a second estimated characteristic. Shared information is formed at each of the first and second nodes based on at least a portion of the first data sequence and at least a portion of the second data sequence. | 2012-11-08 |
20120284521 | BONDING CONTENTS ON SEPARATE STORAGE MEDIA - Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem arising with this technically applicable possibility is the protection of copyrights bound to disc and supplement data. The present invention describes a technique to ensure a security framework that is able to handle this, by creating a virtual file system (VFS) by merging optical disc data and local storage data based upon a common identifier. | 2012-11-08 |
20120284522 | Method and System for Securing Multimedia Data Streamed Over a Network - There is provided a method of securing multimedia data for streaming over a network comprising receiving the multimedia data from a server, transforming the multimedia data into secure multimedia data using a security key associated with the multimedia data, storing the security key associated with the multimedia data, streaming the secure multimedia data to the destination server. The method further comprises receiving decoding solution requests associated with the multimedia data from one or more multimedia players for playing the multimedia data and transmitting the security key associated with the multimedia data to each of the multimedia players. | 2012-11-08 |
20120284523 | MAC Aggregation Resilient To Denial-Of-Service Attacks For Use In A Multi-Node Data Network - An improved MAC aggregation technique is disclosed that yields an aggregate MAC much shorter than the concatenation of constituent MACs while achieving improved resilience to denial-of-service (DoS) attacks. The aggregate MAC is constructed in a manner wherein upon instance of channel impairments or malicious attack (e.g., from a rogue node or man-in-the-middle attacker), only a portion of the aggregate MAC will include corrupted data, at least a portion of the aggregate MAC thereby including valid verifiable data. A source of corruption of the aggregate MAC may be ascertained based on indicia of which constituent MACs are included in the valid portion; and constituent MACs that are wholly included in the valid portion may be declared valid. | 2012-11-08 |
20120284524 | LOW OVERHEAD NONCE CONSTRUCTION FOR MESSAGE SECURITY - A system and method for data encryption/decryption and authentication using a relatively long security sequence number (SSN). The SSN is used both to encrypt data and to compute a message integrity code (MIC). However, the entire SSN need not be transmitted from sender device to receiver device. For example, only the lowest order octet of the SSN is transmitted to the receiver device. The receiver device computes the entire SSN based on the received portion. | 2012-11-08 |
20120284525 | CROSS VALIDATION OF DATA USING MULTIPLE SUBSYSTEMS - A method and apparatus for cross validation of data using multiple subsystems are described. According to one embodiment of the invention, a computer comprises a first subsystem and a second subsystem; and a memory, the memory comprising a first memory region and a second memory region, the first memory region being associated with the first subsystem and a second memory region being associated with the second subsystem; upon start up of the computer, the first subsystem to validate the second memory region and the second subsystem to validate the first memory region. | 2012-11-08 |
20120284526 | PERSONAL IDENTIFICATION NUMBER SECURITY ENHANCEMENT - A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a first many-to-one mapping between a first and a second PIN numeral system. The method also includes determining whether the content of the first data structure is valid, storing the first data structure in the HSM if the first data structure is valid and marking the stored first data structure as inactive. The method further includes activating the first data structure if a second data structure is input into the HSM by a second entity having an activation permission, wherein the first entity is different from the second entity, the first data structure is identical to the second data structure. The method additionally includes converting from the first to the second PIN numeral system responsive to the activated first data structure. | 2012-11-08 |
20120284527 | METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING - Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk. | 2012-11-08 |
20120284528 | MULTI-PURPOSE MULTI-DIMENSIONAL, VARIABLE AND MULTI-KEY E-MAIL AND DATA ENCRYPTION METHOD - A multi-purpose multi-dimensional, variable, and multi-key e-mail and data encryption method is disclosed. The method dynamically encrypts data strings and data files with a set of “n” of keys and dimensions. Keys manipulated and encrypted, prepared keys such as manipulated environmental variables, manipulated date stamps, manipulated user data from a database, using multiple dimensions. | 2012-11-08 |
20120284529 | SYSTEM AND METHOD FOR MANAGEMENT OF ENCRYPTED DATA - A method of using synchronized search and order data structures to access a collection of data comprising organizing the search data structure by encrypted key value, wherein the search data structure contains only references to elements in the collection and their associated encrypted keys, organizing the order data structure by unencrypted key value, wherein the order data structure contains only references to elements in the collection and their associated encrypted keys, exposing a maximum of two pieces of clear text data during operations on the collection, engaging in insert or delete operations, engaging in update operations; engaging in search operations, engaging in sort operations, engaging in merge operations, and reporting the results of those operations to the user. | 2012-11-08 |
20120284530 | CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, KEY DELEGATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, CRYPTOGRAPHIC PROCESSING METHOD, AND CRYPTOGRAPHIC PROCESSING PROGRAM - It is an object of this invention to implement a predicate encryption scheme with delegation capability. A cryptographic process is performed using dual vector spaces (dual distortion vector spaces) of a space V and a space V* paired through a pairing operation. An encryption device generates as a cipher vector a vector in which transmission information is embedded, the cipher vector being the vector of the space V. Using a predetermined vector of the space V* as a key vector, a decryption device performs the pairing operation on the cipher vector generated by the encryption device and the key vector to decrypt the cipher vector and to extract information concerning the transmission information. | 2012-11-08 |
20120284531 | METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM - When data is encrypted and stored for a long time, encryption key(s) and/or algorithm(s) should be updated so as not to be compromised due to malicious attack. To that end, stored encrypted data is converted in the storage system with new set of cryptographic criteria. During this process, read and write requests can be serviced. | 2012-11-08 |
20120284532 | METHOD AND SYSTEM FOR RECOVERING CRYPTOGRAPHIC OPERATIONS AND/OR SECRETS - A computerized system and method for identifying one or more cryptographic operations from software code, comprising: performing processing associated with identifying, one or more cryptographic operations in the software code, the software code being run on a processor; and performing processing associated with identifying a boundary for each cryptographic operation in the software code. | 2012-11-08 |
20120284533 | METHOD AND CIRCUIT FOR CRYPTOGRAPHIC OPERATION - A method of performing a cryptographic operation including: receiving a plurality of binary input values; splitting the binary input values into a plurality of non-binary digits of base r, where r is an integer greater than 2 and not equal to a power of 2; and performing, by a cryptographic block on each of the plurality of non-binary digits, a different modulo r operation to generate at least one output digit) of base r. | 2012-11-08 |
20120284534 | Memory Device and Method for Accessing the Same - A method is provided for accessing a memory device that stores a master key and at least one encrypted data file and that includes a data-key storage portion being encrypted using the master key and having at least one data key. In the method, a control unit is configured to receive a personal identification number (PIN), to determine whether the received PIN is authentic, to obtain the master key from the memory device upon determining that the PIN is authentic, to decrypt the encrypted data-key storage portion using the master key to obtain the at least one data key, and to decrypt the at least one encrypted data file using the data key to obtain a data file. | 2012-11-08 |
20120284535 | INFORMATION PROCESSING APPARATUS CAPABLE OF REDUCING LABOR FOR DATA MANAGEMENT OPERATION, AND DATA MANAGEMENT METHOD AND STORAGE MEDIUM THEREFOR - An information processing apparatus capable of reducing user's labor required for a data management operation by enabling the user to leave the data management operation to a serviceman without lowering the security of user data. User data and serviceman data both stored in a data storage unit are encrypted by an encryption unit with an encryption key generated based on information set in advance in the information processing apparatus and with an encryption key generated based on information input by a serviceman, respectively. These encrypted data are output from an export unit to an auxiliary storage unit. | 2012-11-08 |
20120284536 | Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files - The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data. | 2012-11-08 |
20120284537 | DEVICE POWER MANAGEMENT USING COMPILER INSERTED DEVICE ALERTS - Technologies and implementations for device power management using compiler inserted device alerts are generally disclosed. | 2012-11-08 |
20120284538 | POWER SUPPLY ASSEMBLY FOR A TERMINAL HAVING ETHERNET ENERGY SUPPLY - A power supply assembly for a terminal having Ethernet energy supply, includes a split device with an Ethernet energy supply connection (A | 2012-11-08 |
20120284539 | POWER MANAGEMENT SYSTEM CAPABLE OF SAVING POWER AND OPTIMIZING OPERATING EFFICIENCY OF POWER SUPPLIES FOR PROVIDING POWER WITH BACK-UP OR REDUNDANCY TO PLURAL LOADS - The present invention relates to a power management system comprising at least one power management subsystem. Each power management subsystem comprises a first power module coupled to a first load and comprising at least one first power supply for supplying power to the first load; a second power module coupled to a second load and comprising at least one second power supply, wherein at least one second power supply is retractably installed in the second power module and selectively coupled to the second load; and a pass-through module comprising at least one pass-through unit retractably installed in the second power module to replace with the at least one second power supply and selectively connecting the first power module to the second load for allowing the first power module to supply power to the second load. | 2012-11-08 |
20120284540 | Managing Power Consumption Of A Computer - Methods, computers, and products for managing power consumption of a computer, the computer including a computer processor and managing power consumption of a computer includes: dynamically during operation of the computer, setting, by an in-band power manager in dependence upon performance metrics of the computer processor, a current performance state (‘p-state’) of the computer processor; and providing, by the in-band power manager to an out-of-band power manager, the current p-state of the computer processor. | 2012-11-08 |
20120284541 | POWER DELIVERY IN A HETEROGENEOUS 3-D STACKED APPARATUS - A heterogeneous three-dimensional (3-D) stacked apparatus is provided that includes multiple layers arranged in a stacked configuration with a lower layer configured to receive a board-level voltage and one or more upper layers stacked above the lower layer. The heterogeneous 3-D stacked apparatus also includes multiple tiles per layer, where each tile is designed to receive a separately regulated voltage. The heterogeneous 3-D stacked apparatus additionally includes at least one layer in the one or more upper layers with voltage converters providing the separately regulated voltage converted from the board-level voltage. | 2012-11-08 |
20120284542 | POWER MANAGEMENT FOR SYSTEMS ON A CHIP - A method for controlling a multitasking microprocessor system includes monitoring the multitasking microprocessor system connected to an interconnect, the monitoring comprising monitoring performance of a plurality of processing units forming a producer-consumer system on the interconnect, and issuing commands to the plurality of processing units to provide operations and power distributions to the plurality of processing units such that the performance and power modes are assigned to the plurality of processing units based on the monitoring. | 2012-11-08 |
20120284543 | USER INPUT TRIGGERED DEVICE POWER MANAGEMENT - Techniques for user input triggered device power management are described that enable user inputs and activities to cause selective changes in power states for a device. Power can be boosted to a high power state to improve responsiveness for designated inputs and/or activities. When responsiveness is deemed less important in connection with particular inputs and/or activities, a low power state can be set to reduce energy consumption. In at least some embodiments, selectively switching between power states includes detecting various user inputs at a device and filtering the inputs to select power states associated with the user inputs. The device can then be operated in a selected power state until a transition to a different power state is triggered by occurrence of designated events, such as running of a set time interval, further user input, and/or completion of user activity. | 2012-11-08 |
20120284544 | Storage Device Power Management - Techniques for storage device power management are described that enable coordinated buffer flushing and power management for storage devices. In various embodiments, a power manager can coordinate the flushing of pending or “dirty” data from multiple buffers of a computing device in order to reduce or eliminate interleaved (e.g., uncoordinated) data operations from the multiple buffers that can cause shortened disk idle periods. By so doing, the power manager can selectively manage power states for one or more power-managed storage devices to produce longer idle periods. For example, information regarding the status of multiple buffers can be used in conjunction with analysis of historical I/O patterns to determine appropriate times to spin down a disk or allow the disk to keep spinning. Additionally, user-presence information can be utilized to tune the aggressiveness of buffer coordination and state transitions for power-managed storage devices to improve performance. | 2012-11-08 |
20120284545 | Network Device - A network device may be provided with a PHY layer process unit, a determination unit configured to determine that a link state is a link up state or a link down state, and a first control unit configured to control an electrical power supply for the PHY layer process unit. The first control unit may be configured to stop a continuous electrical power supply for the PHY layer process unit if the determination unit determines that the link state is the link down state during a first period in which the continuous electrical power supply is being performed, perform a temporary electrical power supply for the PHY layer process unit during a second period, and commence the continuous electrical power supply if the temporary electrical power supply is performed during the second period and the determination unit determines that the link state is the link up state. | 2012-11-08 |
20120284546 | USING HISTORIC LOAD PROFILES TO DYNAMICALLY ADJUST OPERATING FREQUENCY AND AVAILABLE POWER TO A HANDHELD MULTIMEDIA DEVICE PROCESSOR CORE - A technique is provided for use in a handheld multimedia device that uses the historical load profile statistics of a particular multimedia stream to dynamically scale the computational power of a computing engine, depending upon the complexity of the multimedia content and thereby reduce the power consumption for computationally less intensive content and consequently reduce the power consumption by a significant amount over a duration of time. | 2012-11-08 |
20120284547 | METHODS AND APPARATUSES FOR OPERATING A DATA PROCESSING SYSTEM - Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption). | 2012-11-08 |
20120284548 | Zero Indication Forwarding for Floating Point Unit Power Reduction - A method and system for reducing power consumption when processing mathematical operations. Power may be reduced in processor hardware devices that receive one or more operands from an execution unit that executes instructions. A circuit detects when at least one operand of multiple operands is a zero operand, prior to the operand being forwarded to an execution component for completing a mathematical operation. When at least one operand is a zero operand or at least one operand is “unordered”, a flag is set that triggers a gating of a clock signal. The gating of the clock signal disables one or more processing stages and/or devices, which perform the mathematical operation. Disabling the stages and/or devices enables computing the correct result of the mathematical operation on a reduced data path. When a device(s) is disabled, the device may be powered off until the device is again required by subsequent operations. | 2012-11-08 |
20120284549 | Logical Partition Defragmentation Within a Data Processing System - A mechanism, in a data processing system, is provided for logical partition defragmentation. The mechanism gathers resource requirements for a plurality of logical partitions running in a plurality of power domains within one or more servers. The mechanism determines optimal hardware utilization for the plurality of logical partitions. The mechanism migrates one or more of the plurality of logical partitions to run in a subset of the plurality of power domains such that at least one power domain within the plurality of power domains is unused. The mechanism puts the at least one unused power domain in a low power state. | 2012-11-08 |
20120284550 | IMAGE FORMING APPARATUS AND METHOD FOR CONTROLLING THE SAME - An image forming apparatus includes first and second memories, and a main controller and a sub-controller. The main controller performs a control operation using the first memory in a normal mode state, the sub-controller is mounted on an engine unit provided in the image forming apparatus to perform an image forming job by driving the engine unit in a normal mode state under the control of the main controller, the main controller transmits a low-power mode change request to the sub-controller if a condition for changing a mode state from the normal mode state to a low-power mode state is satisfied, and the sub-controller copies a low-power service program stored in the first memory into the second memory if the low-power mode change request is received, and performs a low-power service by executing the low-power service program through accessing of the second memory. | 2012-11-08 |
20120284551 | DEEP STANDBY METHOD AND DEVICE FOR EMBEDDED SYSTEM - A deep standby method and device for and embedded system is disclosed, wherein the method mainly includes: a selecting step for selecting an available data swap block from the data swap area of a non-volatile memory as a deep standby block; a writing step for writing the current system data and state of the CPU into the deep standby block, and writing a deep standby flag into the deep standby block; and a shutting down step for making the system off to fall into a deep standby. | 2012-11-08 |
20120284552 | Method, System and Computer Program Product for Reducing Consumption of Battery Power - An information handling system is powered by a battery. In response to determining that a remaining amount of power within the battery has fallen below a first threshold, power consumption of the information handling system is reduced by reducing at least one non-critical operation of the information handling system, while maintaining at least one critical operation of the information handling system. After reducing the at least one non-critical operation, it is increased in response to determining that the remaining amount of power within the battery has risen above a second threshold. | 2012-11-08 |
20120284553 | METHOD, APPARATUS AND SYSTEM FOR REDUCING POWER CONSUMPTION OF SERVICE SYSTEM - A method for reducing power consumption of a service system is disclosed in the present invention. The method includes: determining that a service utilization rate of the service system is smaller than a startup threshold for energy saving; determining, according to a preset condition, a board of the service system, where the board of the service system is required to be powered down; and triggering power-down of the board in the service system. A service system, an energy-saving system and a control system for reducing power consumption of a service system are also disclosed in the present invention. This present invention is capable of effectively reducing power consumption of the service system and achieving good energy-saving effects independent of a CPU. | 2012-11-08 |
20120284554 | DATA PROCESSING DEVICE AND MOBILE DEVICE - A microcomputer is provided having a memory card interface capable of correctly latching data even when a card such as an MMC card is connected thereto. In the microcomputer having an interface with an external device such as a memory card, the interface unit is provided with an output driver connected to an external terminal for outputting a clock signal to output the clock signal and with an equivalent load circuit capable of imparting, to the clock signal extracted from an arbitrary position in a stage previous to the output driver in a clock signal path, delay equivalent to delay resulting from an external load connected to the external terminal in order to generate a clock signal for latching data inputted from the memory card. | 2012-11-08 |
20120284555 | OPTIMIZING DISASTER RECOVERY SYSTEMS DURING TAKEOVER OPERATIONS - Exemplary method, system, and computer program product embodiments for optimizing disaster recovery systems during takeover operations are provided. In one embodiment, by way of example only, a flag is set in a replication grid manager to identify replication grid members to consult in a reconciliation process for resolving intersecting and non-intersecting data amongst the disaster recovery systems for a takeover operation. The replication grid members are consulted for the takeover operation to accommodate a coordination of an ownership synchronization process for cartridges not distributed on-time to the replication grid members. Additional system and computer program product embodiments are disclosed and provide related advantages. | 2012-11-08 |
20120284556 | COORDINATED DISASTER RECOVERY PRODUCTION TAKEOVER OPERATIONS - For coordinated disaster reovery, a reconciliation process is performed for resolving intersecting and non-intersecting data amongst disaster recovery systems for takeover operations. An ownership synchronization process is coordinated for replica cartridges via the reconciliation process at the disaster recovery systems. The disaster recovery systems continue as a replication target for source systems and as a backup target for local backup applications. | 2012-11-08 |
20120284557 | MECHANISM TO ENABLE AND ENSURE FAILOVER INTEGRITY AND HIGH AVAILABILITY OF BATCH PROCESSING - A method, system and computer program product manages a batch processing job by: partitioning the batch processing job for execution in a plurality of batch execution servers from a cluster of computers; designating one computer from the cluster as a primary command server that oversees and coordinates execution of the batch processing job; selecting a second computer from the cluster to serve as a failover command server; storing an object data grid structure in the primary command server; replicating the object grid structure to create and store a replicated object grid structure in the failover command server; in response to the primary command server failing, restarting, by the failover command server, execution of batch processes from the batch processing job in the plurality of batch execution servers utilizing objects within the replicated object grid structure, and executing the batch processes with processing states at the time of the failover. | 2012-11-08 |
20120284558 | APPLICATION RECOVERY IN A FILE SYSTEM - Embodiments of the invention relate to block layout and block allocation in a file system to support transparency of application processing. At least one copy of an application is replicated in a write affinity region of a secondary server, and at least one copy of the application is replicated in a wide striping region across a cluster file system. When the application is subject to failure, application processing is transferred from the failure location to the write affinity copy. At the same time, the failed application is rebuilt using the wide striping replication of the application. Once the application is rebuilt, processing may return to the failed location employing the rebuilt application. | 2012-11-08 |
20120284559 | COORDINATED DISASTER RECOVERY PRODUCTION TAKEOVER OPERATIONS - For coordinated disaster recovery, a reconciliation process is performed for resolving intersecting and non-intersecting data amongst disaster recovery systems for takeover operations. An ownership synchronization process is coordinated for replica cartridges via the reconciliation process at the disaster recovery systems. The disaster recovery systems continue as a replication target for source systems and as a backup target for local backup applications. | 2012-11-08 |
20120284560 | READ XF INSTRUCTION FOR PROCESSING VECTORS - The described embodiments include a processor that handles faults. The processor first receives a first input vector, a control vector, and a predicate vector, each vector comprising a plurality of elements. For each element in the first input vector for which a corresponding element in the control vector and the predicate vector are active, the processor then performs a read operation using an address from the element of the first input vector. When a fault condition is encountered while performing the read operation, the processor determines if the element is a first element where a corresponding element of the control vector is active. If so, the processor handles/processes the fault. Otherwise, the processor masks the fault for the element. | 2012-11-08 |
20120284561 | SYSTEMS, METHODS AND DEVICES FOR CONTROLLING BACKUP POWER PROVIDED TO MEMORY DEVICES AND USED FOR STORING OF SENSITIVE DATA - Power-backup capabilities are provided by implementing a variety of different methods, systems and devices. According to one such implementation, a solid-state memory device is implemented with a primary power source that provides primary power. A secondary power source provides secondary power. A power controller provides the primary power to an operating power circuit. The secondary power is provided by enabling a secondary switch located between the secondary power source and the operating power circuit. A solid-state memory uses power from the operating power circuit as a primary source of power when accessing stored data and retains data in the absence of power being provided by the operating power circuit. A memory controller facilitates access to the stored data. In response to problems with the primary power source, pending writes are completed to the solid-state memory circuit. A timing circuit substantially delays full enablement of the secondary switch. | 2012-11-08 |
20120284562 | Computer Processor Providing Error Recovery with Idempotent Regions - A computer architecture allows for simplified recovery after mis-speculation during speculative execution by controlling speculation to occur within idempotent regions that may be recovered by re-execution of the region without the need for restoring complex state information from checkpoints. A compiler for increasing the size of idempotent regions is also disclosed. | 2012-11-08 |
20120284563 | Hardware/Software Debugging - Debug circuitry is operated in a manner that facilitates debugging one or more hardware and/or software components that are included in a system that includes a system memory. The debug circuitry receives information from one of the hardware and/or software components and/or from the system memory, and ascertains whether the received information includes memory address parameters. If the received information includes memory address parameters, then the memory address parameters are used to retrieve data from the system memory. The retrieved data is supplied at an output port of the debug circuitry. | 2012-11-08 |
20120284564 | Topology Independent Network-Based Automation Infrastructure - An automation process verifies that a test bed includes a set of devices specified by at least one script which are to be executed by the automation process on the test bed. The test bed is locked and the set of devices is allocated to the automation process. Performance data collection and logging for the set of devices is started and the at least one script is executed on the set of devices. After executing the at least one script, the set of devices is de-allocated and the test bed is unlocked. A notification is generated indicating that the at least one script has been executed. | 2012-11-08 |
20120284565 | File System for a Stage Lighting Array System - A file system for a stage lighting system that maintains the different files associated with the stage lighting system. Each of the files that can represent an effect are maintained within the system within a configuration file. The configuration file can be updated on each start of the system so that the system can maintain information indicative of current configuration files. A test mode can also be entered in which a pre-formed show can be tested against the current state of the configuration files. | 2012-11-08 |
20120284566 | END TO END EMAIL MONITOR - A disclosed example method to monitor an email system involves sending a test email to an email server. The email server is to automatically forward the test email to a plurality of email accounts of corresponding domains different from one another and different from the email system. When the test email does not arrive at the plurality of email accounts within a time period, a notification identifying the email server is generated. Other test emails are distinguished from the test email based on checksum values in subject fields of the test email and the other test emails. The other test emails correspond to different ones of a plurality of other email systems being tested for operability. Each checksum uniquely identifies a respective one of the test emails and a respective one of the email systems. | 2012-11-08 |
20120284567 | MODEL-BASED TESTING OF AN APPLICATION PROGRAM UNDER TEST - A method includes receiving a first processing request for an application program under test. The method includes generating a second processing request for a model of the application program, wherein the second processing request is equivalent to said first processing request. The method includes communicating said first and second requests to said application program under test and said model of the application program respectively. The method includes receiving a first response data set from the application program under test and a second response data set from the model of the application program. The method includes comparing said first and second response data sets and generating a success indication if said comparing said first and second response data sets does not identify a difference. The method includes generating an error indication if said comparing said first and second response data sets identifies a difference between the first and second data sets. | 2012-11-08 |
20120284568 | HARDWARE OVERRIDE OF APPLICATION PROGRAMMING INTERFACE PROGRAMMED STATE - A method and system for overriding state information programmed into a processor using an application programming interface (API) avoids introducing error conditions in the processor. An override monitor unit within the processor stores the programmed state for any setting that is overridden so that the programmed state can be restored when the error condition no longer exists. The override monitor unit overrides the programmed state by forcing the setting to a legal value that does not cause an error condition. The processor is able to continue operating without notifying a device driver that an error condition has occurred since the error condition is avoided. | 2012-11-08 |
20120284569 | MONITORING HEAP IN REAL-TIME BY A MOBILE AGENT TO ASSESS PERFORMANCE OF VIRTUAL MACHINE - A method for monitoring a heap in real-time to assess the performance of a virtual machine. A mobile agent is created to be preloaded with boundary settings for each heap metric. Boundary settings are thresholds that are used to diagnose the effectiveness of operation of the heap. The mobile agent is deployed onto an application server to monitor the effectiveness of operation of the heap of a virtual machine within the application server. If a boundary setting for one of the heap metrics is exceeded, then the mobile agent determines whether a non-critical, a critical or a fatal error has occurred. An appropriate response is then performed. By monitoring the heap in real-time, undesirable behavior characteristics of the heap can be detected early thereby allowing remedial actions to be enacted to address such problems before those problems escalate into more serious problems. | 2012-11-08 |
20120284570 | ERROR PROTECTION FOR PIPELINE RESOURCES - At an instruction pipeline of a data processor, pipeline resource conflicts are detected by setting, for each executing instruction, one or more assignment indicators to indicate which pipeline resources are to be utilized for executing the instruction. The instruction pipeline detects a pipeline resource conflict if an instruction is assigned a pipeline resource for which the assignment indicator is set. In addition, for selected pipeline resources, such as registers in a register file, the instruction pipeline can detect a pipeline resource conflict if more than one instruction attempts to access the pipeline resource when the assignment indicator for the resource is set. In response to detecting a pipeline resource conflict, the instruction pipeline is flushed and returned to a checkpointed state, thereby protecting the instruction pipeline from architectural state errors. | 2012-11-08 |