49th week of 2008 patent applcation highlights part 63 |
Patent application number | Title | Published |
20080301419 | Process model control flow with multiple synchronizations - Activations of a plurality of incoming branches may be detected at a synchronization point having a plurality of outgoing branches. A first synchronization may be executed after a first number of activations is detected, and at least one of a plurality of outgoing branches from the synchronization point may be activated, based on the first synchronization. A second synchronization may be executed after a second number of activations is detected, and at least a second one of the plurality of outgoing branches from the synchronization point may be activated, based on the second synchronization. | 2008-12-04 |
20080301420 | Branch prediction control device having return address stack and method of branch prediction - A branch prediction control device, in an information processing unit which performs a pipeline process, generates a branch prediction address used for verification of an instruction being speculatively executed. The branch prediction control device includes a first return address storage unit storing the prediction return address, a second return address storage unit storing a return address to be generated depending on an execution result of the call instruction, and a branch prediction address storage unit sending a stored prediction return address as a branch prediction address and storing the sent branch prediction address. When the branch prediction address differs from a return address, which is generated after executing a branch instruction or a return instruction, contents stored in the second return address storage unit are copied to the first return address storage unit. | 2008-12-04 |
20080301421 | Method of speeding up execution of repeatable commands and microcontroller able to speed up execution of repeatable commands - A method to speed up the execution of repeatable commands and a microcontroller able to speed up the execution of repeatable commands are disclosed. When the microcontroller is to execute repeatable commands in a program, it temporarily stores repeatable commands to a storage unit. If the execution of the repeatable command loop continues, then the repeatable command loop is retrieved from the storage unit and executed at higher clock cycle frequency. At the start and end of the repeatable command loop are respectively defined by a starting point and an end point for determining whether the repeatable command loop should continue to execute. The microcontroller thereby speeds up the execution of the repeatable command and the performance thereof. | 2008-12-04 |
20080301422 | Method and Apparatus for Remote BIOS Configuration Control - Apparatus and methods for remotely configuring a computer BIOS of a testing computer system are provided. In one aspect, a method of testing is provided that includes establishing an interface between a first computer system and a second computer system. The second computer system includes a computer readable storage device that has a BIOS and a first set of BIOS configuration settings. The first set of BIOS configuration settings is adapted to a first device under test. At least one instruction is sent from the first computer system to the second computer system to enable the second computer system to select a second set of BIOS configuration settings adapted to a second device under test having different electronic characteristics than the first device under test. An electrical test is performed on the second device under test using the second computer system and the second set of BIOS configuration settings. | 2008-12-04 |
20080301423 | INFORMATION PROCESSING DEVICE AND ACTIVATION CONTROL METHOD - According to one embodiment, an information processing device includes a receiving section configured to receive a trigger signal from a device connected thereto, a verifying section configured to verify the trigger signal when the receiving section receives the trigger signal, and an activating section configured to activate the system when the verification of the trigger signal is successfully made by the verifying section. | 2008-12-04 |
20080301424 | Intelligent Boot Services - An information handling system is provided with an intelligent boot service which addresses and resolves unbootable system scenarios. The intelligent boot service detects and corrects adverse events before booting into the operating system. The intelligent boot service architecture is extensible to add newer events and is extensible to include extensible firmware interface (EFI) technology. | 2008-12-04 |
20080301425 | Method And System To Support ISCSI Boot Through Management Controllers - An information handling system includes a host including a central processing unit, a management controller enabled to communicate with the host, a network interface resource in communication with the host and operable to enable the information handling system to communicate via an external network, and a target system in communication with the host through the network interface resource. The management controller comprises an iSCSI initiator operable to generate a request to the target system for an initial OS image. | 2008-12-04 |
20080301426 | ROOTKIT DETECTION - Embodiments of the present invention address deficiencies of the art in respect to rootkit detection and provide a method, system and computer program product for external rootkit detection and remediation. In one embodiment of the invention, an external rootkit detection tool can be provided. The tool can include external static memory with an input/output (I/O) port interface to an external I/O port on a target computing platform. The tool further can include a boot image disposed in the external static memory, and rootkit detection and remediation logic disposed in the external static memory and referenced by the boot image. In one aspect of the embodiment, the external static memory can include a universal serial bus (USB) key and, correspondingly, the I/O port can include an external USB port. | 2008-12-04 |
20080301427 | BASIC INPUT/OUTPUT SYSTEM MEMORY SIMULATION MODULE - A basic input/output system (BIOS) memory simulation module includes a first transmission interface unit adapted to receive an updated BIOS data from an external source, a second transmission interface unit adapted to be connected electrically to a computer under test, a memory unit, and a control unit connected electrically to the first transmission interface unit, the second transmission interface unit and the memory unit. The control unit is operable to store the updated BIOS data from the first transmission interface unit into the memory unit, and to output the updated BIOS data stored in the memory unit to the computer under test via the second transmission interface unit. | 2008-12-04 |
20080301428 | INFORMATION PROCESSING APPARATUS AND START-UP CONTROL METHOD - According to one embodiment, if start-up of an application is abnormal after starting up the application, the information processing apparatus reports the fact to the basic input/output system (BIOS), and the BIOS locks a system. | 2008-12-04 |
20080301429 | Dual Cryptographic Keying - A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache. | 2008-12-04 |
20080301430 | Interoperable Systems and Methods for Peer-to-Peer Service Orchestration - Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs. | 2008-12-04 |
20080301431 | TEXT SECURITY METHOD - Disclosed herein is a text security method. The text security method encrypts both a font and a text constituting a text document in the same manner so that the encrypted text can be correctly viewed only when the encrypted font is provided. The text is encrypted by changing, in a regular manner, positions of intrinsic character images or intrinsic codes of the text within different code areas, and the font is encrypted by changing, in the same regular manner, positions of intrinsic character images or intrinsic codes of glyphs of the font corresponding to the text within different font areas. | 2008-12-04 |
20080301432 | Direct mail decoder product - A direct mail decoder device is provided having a mailable carrier, an integral information panel, and an integral decoder. The carrier has a first side and a second side, and contact specific data, such as name and address information, on one of the first and second sides. The information panel is located on one of the first and second sides of the carrier, and contains encrypted information. The decoder is provided to decode the encrypted information. | 2008-12-04 |
20080301433 | Secure Communications - The subject matter of this specification can be embodied in, among other things, an apparatus that includes a verification module to provide information used to identify a user of the apparatus, a memory for storing information used for securing communications transmitted to a remote device, a processing unit for generating a secured communication based on the stored information, and an interface to communicate with a peripheral interface of a host device. The host device configured to transmit the secured communication to the remote device without accessing content of the secured communication. | 2008-12-04 |
20080301434 | METHOD AND APPARATUS FOR COMBINING INTERNET PROTOCOL AUTHENTICATION AND MOBILITY SIGNALING - Methods and apparatuses for combining internet protocol layer authentication and mobility signaling are disclosed. Various embodiments for providing authentication and mobility signaling when a mobile node moves from a 3GPP access network to a non 3GPP access network and vice versa are described. | 2008-12-04 |
20080301435 | Peer-to-peer security authentication protocol - A salt transmitted by a second node is received at a first node. The received salt is used to decrypt encrypted data. Optionally, authorization to access a service provided by the second node is received by the first node. In some cases the service includes access to one or more files. | 2008-12-04 |
20080301436 | METHOD AND APPARATUS FOR PERFORMING AUTHENTICATION BETWEEN CLIENTS USING SESSION KEY SHARED WITH SERVER - Provided is a method and apparatus for performing authentication between clients that complete authentication with a server. The method includes receiving first authentication information generated using the second session key from the server; receiving second authentication information generated using the second session key from the second client; and determining whether the authentication with the second client is successful using the first authentication information and the second authentication information. | 2008-12-04 |
20080301437 | Method of Controlling Access to a Scrambled Content - A method for access control to a digital scrambled content distributed to a set of installed reception terminals including one master terminal and at least one slave terminal dependent on the master terminal. In the method the slave terminal systematically or occasionally returns at least one item of information about the access condition to the master terminal through a point-to-point link, to enable the master terminal to control access of the slave terminal to the content. | 2008-12-04 |
20080301438 | Peer-to-peer smime mechanism - A method and apparatus for sending a self-asserted certificate is described. In one embodiment, a mail client of a sender is configured to generate a public and private key pair, to create a self-signed certificate, and to form an introduction message addressed to a recipient to enable use of the self-signed certificate prior to corresponding with the recipient. A mail client of a recipient is configured to display an indicator of a receipt of the introduction message from the sender. The indicator comprises a user interface query to the recipient to verify and accept the sender-signed certificate in response to receiving the introduction message from the sender. | 2008-12-04 |
20080301439 | Validation Server, Program and Verification Method - A technique of managing public keys updated by a certificate authority and a plurality of hash algorithms is provided. | 2008-12-04 |
20080301440 | Updateable Secure Kernel Extensions - A method, computer program product, and data processing system for providing an updateable encrypted operating kernel are disclosed. In a preferred embodiment, secure initialization hardware decrypts a minimal secure kernel containing sensitive portions of data and/or code into a portion of the processor-accessible memory space, from which the kernel is executed. Most system software functions are not directly supported by the secure kernel but are provided by dynamically loaded kernel extensions that are encrypted with a public key so that they can only be decrypted with a private key possessed by the secure kernel. The public/private key pair is processor-specific. Before passing control to a kernel extension the secure kernel deletes a subset of its sensitive portions, retaining only those sensitive portions needed to perform the task(s) delegated to the kernel extension. Which sensitive portions are retained is determined by a cryptographic key with which the kernel extension is signed. | 2008-12-04 |
20080301441 | Secure Channel For Image Transmission - Systems, devices, and methods for establishing a secure session for the transmission of data from an input device to a remote server device is disclosed. The input device may be an electronic check scanner attached to a banking customer's home personal computer. The customer may visit a bank's Internet website using the web browser or other application on their personal computer, and then submit scanned images of check to the bank. The bank, however, to ensure security and prevent fraud, may wish to establish a secure session between the devices and components in the system before the image data may be scanned and transmitted. | 2008-12-04 |
20080301442 | Method and Apparatus for Local Area Networks - A mechanism for segregating traffic amongst STAs that are associated with a bridge, referred to herein as the personal virtual bridged local area network (personal VLAN), is based upon the use of a VLAN to segregate traffic. The IEEE 802.1Q-1998 (virtual bridged LANs) protocol provides a mechanism that is extended by the invention to partition a LAN segment logically into multiple VLANs. In the preferred embodiment, a VLAN bridge forwards unicast and group frames only to those ports that serve the VLAN to which the frames belong. One embodiment of the invention extends the standard VLAN bridge model to provide a mechanism that is suitable for use within an AP. In a preferred embodiment, the Personal VLAN bridge extends the standard VLAN bridge in at least any of the following ways: VLAN discovery in which a personal VLAN bridge provides a protocol for VLAN discovery; VLAN extension in which a Personal VLAN allows a station to create a new port that serves a new VLAN, or to join an existing VLAN via an authentication protocol; Logical ports in which a Personal VLAN bridge can maintain more than one logical port per physical port, and bridges between ports of any kind; and cryptographic VLAN separation. | 2008-12-04 |
20080301443 | MOBILITY DEVICE PLATFORM - A mobility device platform allowing for secure mobile computing is provided. In an illustrative implementation, an exemplary mobility device platform comprises a mobility device operable to communicate with at least one computing environment through a communications interface and wherein the mobility device is operable to process and store secure web services, a communications network operable to communicate data and computing applications using web services, and a mobility device management server operable to generate, process, store, communicate and encrypt web services to the mobility device. Further, the mobility device management server is operable to perform one or more mobility device management functions to provide encryption keys to cooperating mobility devices and to authenticate and verify cooperating mobility devices requesting web services from the mobility device management server. The mobility device management server and mobility device may further operate to perform authentication and verification using user identification and password information. | 2008-12-04 |
20080301444 | Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message - An apparatus and method for providing a service that securely and easily shares personal information using a signed callback uniform resource locator (URL) message in a mobile terminal environment are provided. The mobile terminal providing a personal information sharing service using a signed URL message includes; a personal information sharing service module which receives a message that includes a first callback URL and a personal information sharing request and is signed using a private key of a server, and creates a second callback URL by adding a user response result in response to the personal information sharing request to the first callback URL; and an authentication module which verifies a signature of the message using a public key of the server, and signs the second callback URL using a user private key. | 2008-12-04 |
20080301445 | HIDDEN LINK DYNAMIC KEY MANAGER FOR USE IN COMPUTER SYSTEMS WITH DATABASE STRUCTURE FOR STORAGE OF ENCRYPTED DATA AND METHOD FOR STORAGE AND RETRIEVAL OF ENCRYPTED DATA - A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module. | 2008-12-04 |
20080301446 | AUTHORIZING CUSTOMER PREMISE EQUIPMENT INTO A NETWORK - Systems and methods for authorizing customer premise equipment into a network. A publicly available network membership key can be provided to enable initial connection to the network. Unique network membership keys associated with various customer premise equipment can be provided to enable service level access to the network and/or authorization into a sub-cell associated with the network. | 2008-12-04 |
20080301447 | SECURE OFFLINE ACTIVATION PROCESS FOR LICENSED SOFTWARE APPLICATION PROGRAMS - A computer readable medium for activating a software application for execution on a designated computer, where the computer readable medium has stored thereon computer executable instructions for performing the following steps: computing an installation identifier reflective of the software application and the designated computer; receiving an activation code generated in accordance with the installation identifier and a blinding factor value; computing a first verification code as a function of the installation identifier; computing a trial blinding factor value; computing a decryption key as a function of the trial blinding factor value and the activation code; using the decryption key to decrypt a second verification code; verifying that the first verification code matches the second verification code; and, activating the software application for execution on the designated computer. | 2008-12-04 |
20080301448 | Security Against Corruption for Networked Storage - Systems and methods for security against corruption for networked storage are described. In one aspect, a destination device receives a linear combination of packets. The linear combination of packets represents digitally signed blocks of content and public information used to digitally sign segmented blocks of content. The destination device recombines the linear combination of packets to compute new valid signatures as linear combinations of received homomorphic digital signatures. The new valid signatures are for verifying by a requesting computing device recovering data associated with at least a subset of the linear combination of packets, integrity of the at least a subset. This provides the requesting node with security against corruption of data in networked storage. | 2008-12-04 |
20080301449 | Signature Apparatus, Verifying Apparatus, Proving Apparatus, Encrypting Apparatus, and Decrypting Apparatus - Provided are a signature apparatus, a verifying apparatus, a proving apparatus, an encrypting apparatus, and a decrypting apparatus capable of efficiently reducing a signature text counterfeit problem to a discrete logarithm problem. The commitment is a hash value of a set of a value to be committed. Data including a pair of elements of a cyclic group associated with a discrete logarithm problem is used as a public key, and a discrete logarithm of an order of the pair is used as a secret key. Accordingly, it is possible to summarize secret information of an attacker from the commitment without rewinding the attacker and to ensure a higher safety than that of a Schnorr signature scheme. In addition, one-time power residue calculation is performed in each of the signature and verification calculations, so that it is possible to lower an amount of calculation in the signature and verification calculations. | 2008-12-04 |
20080301450 | Modular signature verification architecture - It is difficult to provide a mechanism that is able to verify electronic signatures of different types in a simple and cost-effective manner. This is achieved by using a signature verification engine with an interface enabling signature modules to be removably plugged in. Each signature module has information about a particular signature type and functionality for verifying signatures of that type. The signature verification engine receives requests to verify signatures. It identifies a suitable signature module and works with that module to verify the signature. An enterprise who acquires equipment incorporating the signature verification engine is able to plug in its own signature module giving versatility whilst retaining security. | 2008-12-04 |
20080301451 | Verifying authenticity of an attribute value signature - A method and apparatus for verifying authenticity of a digital signature for an attribute value. In one embodiment, the method includes receiving a message including an attribute value of an attribute from a Lightweight Directory Access Protocol (LDAP) repository entry and a digital signature, and verifying that the digital signature authenticates the attribute value. | 2008-12-04 |
20080301452 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 2008-12-04 |
20080301453 | OFFICE MACHINE HAVING IDENTIFICATION UNIT AND DOCUMENT MANAGEMENT SYSTEM INCLUDING SUCH OFFICE MACHINE - The present invention relates to an office machine having an identity verification unit and a document management system including such an office machine. The office machine includes a processor and an identity verification unit. The processor is used for controlling operations of the office machine. The identity verification unit is included in the processor for verifying identity information of a user when an electronic document sent from the user is received by the office machine. The electronic document is verified according to an asymmetric cryptosystem, thereby ensuring security and user authenticity of the electronic document. | 2008-12-04 |
20080301454 | Information Management System - An information management system is described comprising one or more workstations running applications which allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or has just received from the network, and which determines an appropriate action to take regarding that data. The analyzer may consult policy data containing a supervisor-defined policy to govern the workstations in order to determine what action to take. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage and record keeping; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission is valid; determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made; and controlling the transmission of messages, such as e-mails according to a policy. | 2008-12-04 |
20080301455 | Authentication System And Authentication Object Device - To provide an authentication system for improving security, using fewer encryption keys. An authentication requesting device ( | 2008-12-04 |
20080301456 | Efficient Secure Forensic Watermarking - The invention relates to a watermark generation method for generating watermarks to be embedded in digital media, where said watermark is generated by combining at least two watermark patterns from a set of watermark patterns. The set of watermark patterns are divided into at least two subsets of watermark patterns, and the subsets are hierarchically related and the watermark patterns in said watermark are directly related watermark patterns. Directly related means that the watermark patterns are related like parent and child in a hierarchical structure e.g. a tree structure. Further, the invention relates to an apparatus adapted to generate watermarks to be embedded in media. | 2008-12-04 |
20080301457 | Authentication system and apparatus - When a document creation unit | 2008-12-04 |
20080301458 | Power Analysis Attack Countermeasure for the ECDSA - Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECDSA vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long term cryptographic key. By modifying the sequence of operations involved in the determination of the signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long term cryptographic key. | 2008-12-04 |
20080301459 | Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm - Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key. | 2008-12-04 |
20080301460 | REMOTE PROVISION OF CONSISTENT ONE-TIME PASSWORD FUNCTIONALITY FOR DISPARATE ON-LINE RESOURCES - Consistent one-time password (OTP) functionality is provided from a presentation server to secure various on-line resources. A seed file can be provided to or created by a service provider for execution as part of a hosted page displayed at a client to a user. A presentation server receives a call from the seed file. A user interface widget can be initialized at the presentation server in response to the call from the seed file. The widget can be displayed as part of the remotely hosted Web page so that the user perceives the UI widget to be embedded in the page as viewed on the client computer system. Security for the interaction between the servers can be provided through use of security assertion markup language (SAML). | 2008-12-04 |
20080301461 | REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES - The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKI private keys such as PKI-enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In other words a digital connection that would allow an application to submit data to the card for signing by the card's private key and that would allow retrieving the entire resulting signature from the card is not required. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader. | 2008-12-04 |
20080301462 | SYSTEM FOR PROTECTING A USER'S PASSWORD - The present invention relates to a system for protecting a password. A system for providing a protectable password including a storage device, an input mechanism for entering a protectable password in any position and a password validation engine coupled to the storage device and to the input mechanism for analyzing the string of characters and keystrokes to find the protectable password and for validating the apparent password if the protectable password and the random pattern are determined to be present in any position in the string of characters and keystrokes of the apparent password, is provided. | 2008-12-04 |
20080301463 | Method for Documenting Property or Possession and Transfer of Property or Possession of a Merchandise - In order to provide a method wherein, by using a storage medium arranged on goods, it is possible to distinctly register a conveyance of ownership or title on this storage medium, and wherein only the current owner or proprietor and possibly also an independent verifying agency has access to the storage medium, the following method is proposed: | 2008-12-04 |
20080301464 | Two-dimensional bar code for ID card - A method and apparatus for an identity card having improved security features. The identity card can have a two-dimensional bar code or similar encoding of data allowing for verification of the authenticity of the identity card. The two-dimensional bar code can store security data such as codes or image data that can be decoded and cross-checked against the visible user data to ensure that the card has not been improperly modified. | 2008-12-04 |
20080301465 | PROTECTION OF SOFTWARE TRANSMITTED OVER AN UNPROTECTED INTERFACE - The same level of protection and ability to associate rights to media content available with a stand alone media player is provided with a software media player. In an example configuration, a peripheral device comprising an optical disc drive capable of reading HD DVD media, and comprising a flash memory microcontroller with cryptographic capabilities, is coupled to a host game console via a universal serial bus (USB) interface. Media content from the peripheral device is rendered on the host game console. Software protection and management are provided utilizing various cryptographic keys and protocols. Software protection and management meets the prescribed rules of the Advanced Access Content System (AACS) license agreement with respect to consumer electronics players while allowing the playback of media content (e.g., movies) to be performed by software. | 2008-12-04 |
20080301466 | METHODS FOR PROGRAM VERIFICATION AND APPARATUSES USING THE SAME - An embodiment of an apparatus for downloading and/or executing programs from a tool resident on a computer host is disclosed. The apparatus comprises an external flash memory storing a program, and a processor for validating the tool when detecting that the computer host connects to the apparatus. The processor permits the computer host to update the program of the external flash memory after determining that the tool has been successfully verified. | 2008-12-04 |
20080301467 | Memory Security Device - Embodiments of the systems and methods presented herein may provide memory security in a semiconductor device or a computing system using an address encryption section operable to encrypt a write address or a read address, a data encrypting section operable to encrypt data to be written, a write section operable to write encrypted data at an encrypted write address corresponding to a memory, a read section operable to read encrypted data from the encrypted read address corresponding to the memory and a data decryption section operable to decrypt the read encrypted data to obtain read data corresponding to the read address. | 2008-12-04 |
20080301468 | Cryptographic Secure Program Overlays - A method, computer program product, and data processing system for executing larger-than-physical-memory applications while protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault or page fault detection are disclosed. Large applications are accommodated by providing a mechanism for secure program overlays, in which a single large application is broken into two or more smaller applications (overlays) that can be executed from the same memory space by overwriting one of the smaller applications with another of the smaller applications when the latter needs to be executed. So that the data may be shared among these smaller applications, each of the applications contains embedded cryptographic keys, which may be used to encrypt or decrypt information to be stored persistently while control is transferred from one application to the other. | 2008-12-04 |
20080301469 | Cryptographically-enabled Privileged Mode Execution - A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault detection. In a preferred embodiment, secure initialization hardware loads the sensitive code from a storage location accessible only to the secure initialization hardware itself and decrypts the sensitive code into a portion of the processor-accessible memory space, from which the code is executed. Once execution of the sensitive code has completed, all or at least a portion of the code is deleted before passing control to application software. If the application software needs to cause the sensitive code to be executed, the secure initialization hardware is activated to reload/decrypt a fresh copy of the sensitive code into the memory space and cause the code to be executed. Before control is returned to the application software, the sensitive code is again deleted to prevent unauthorized access. | 2008-12-04 |
20080301470 | TECHNIQUES FOR SECURING CONTENT IN AN UNTRUSTED ENVIRONMENT - Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. The first key is used to decrypt the encrypted version of the content encryption/decryption key. The content delivery service is unaware of the content encryption/decryption key and the first key; and the content held by the content delivery service is encrypted with the content encryption/decryption key. Principals securely share, create, manage, and retrieve the encrypted versions of the content encryption/decryption key and the first key from the content delivery service using secure communications. The encrypted content is obtainable via insecure communications from the content delivery service. | 2008-12-04 |
20080301471 | Systems and methods in electronic evidence management for creating and maintaining a chain of custody - Systems and methods are provided for electronic evidence management for creating and maintaining a chain of custody. The exemplary systems and methods comprise storing captured electronic evidence in a repository, and recording one or more interactions with the stored electronic evidence in one or more chain of custody logs, wherein at least one chain of custody logs is encrypted and at least one chain of custody logs is unencrypted. The exemplary systems and methods further comprise monitoring the one or more chain of custody logs for unauthorized alterations to the recorded interactions with the stored electronic evidence. | 2008-12-04 |
20080301472 | METHOD OF ENCRYPTING AND STORING DIGITAL CONTENT USING FIRMWARE REGIONAL CODE AND APPARATUS THEREFOR - A method of processing digital content performed by an apparatus for storing digital content. In the method, a hardware regional code extracted from a memory of a content storage device is compared with a firmware regional code extracted from firmware, and the digital content is selectively encrypted and stored according to a corresponding regional code only when the hardware regional code matches the firmware regional code. | 2008-12-04 |
20080301473 | METHOD AND SYSTEM FOR HYPERVISOR BASED POWER MANAGEMENT - A method of hypervisor based power management, includes: allocating resources to a plurality of partitions defined within a virtual machine environment; monitoring performance of the plurality of partitions with respect to a service level agreement (SLA); tracking power consumption in the plurality of partitions; scaling power consumption rates of the plurality of partitions based on the allocated resources, wherein the power consumption rate of physical resources is scaled by adjusting resource allocations to each partition; identifying partitions that are sources of excessive power consumption based on the SLA; and adjusting the allocation of resources based on the power consumption of the plurality of partitions, the performance of the plurality of partitions, and the SLA. | 2008-12-04 |
20080301474 | Performance Analysis Based System Level Power Management - A multiprocessor system-on-chip | 2008-12-04 |
20080301475 | PERFORMANCE CONSERVING METHOD FOR REDUCING POWER CONSUMPTION IN A SERVER SYSTEM - A method for managing power in a data processing system having multiple components includes determining a power budget for the system. Activity levels during a forthcoming time interval are then predicted for each of the components. Using the predicted activity levels, the power budget is allocated among the system components. An activity limit is then established for each component based on its corresponding portion of the power budget. The activity of a component is then monitored and, if the component's activity exceeds the component's corresponding activity limit, constrained. Determining the predicted level of activity may include determining a predicted number of instructions dispatched by a processor component or a predicted number of memory requests serviced for a system memory component. Allocating the power budget includes allocating each component its corresponding standby power and a share of the system power available for dynamic powering based on the expected levels of activity. | 2008-12-04 |
20080301476 | Power supply and method of controlling same - A power supply supplying electric power through parallel operation of power supply units is disclosed. Each of the power supply units includes a transformer; a stopped state latch part configured to latch a control signal for controlling outputting of the power supply unit in a predetermined stopped state to stop the outputting, after passage of a first time in response to detection of an overcurrent on a primary side of the transformer; and an outputting restriction part configured to set the control signal in a predetermined restricted state to restrict the outputting of the power supply unit without stopping the outputting, after passage of a second time in response to detection of an overcurrent on a secondary side of the transformer. The second time is shorter than the first time. | 2008-12-04 |
20080301477 | Power Saving in Signal Processing in Receivers - A method of receiving a signal in bursts comprising frames each including payload data and error correction data received in separate time periods, the bursts being separated by time intervals during which power is saved by disabling at least some signal processing components of the receiver, Signal processing components of the receiver are disabled to save power before all the error correction data for all the frames in the burst is received. | 2008-12-04 |
20080301478 | Electronic Device and Method for Controlling Current - An electronic device comprises a voltage regulator supplying a current to a load such as a micro-controller unit. The load controls the current provided to the load from the voltage regulator. Preferably, the load controls the level of current supplied to the load upon start-up, thereby avoiding power surges being drawn by the load. | 2008-12-04 |
20080301479 | METHOD AND SYSTEM FOR MANAGING DATA CENTER POWER USAGE BASED ON SERVICE COMMITMENTS - A method of managing data center power usage based on service commitments. A power and capacity management utility measures performance characteristics of applications hosted by a data center that include power consumption and transaction processing time. When the performance characteristics are above (or below) a first pre-defined target range, the utility decreases (or increases, respectively) a clock rate and processor voltage of one or more active servers. When the performance characteristics are within the first target range and the clock speed is above (or below) a second pre-defined target range, the utility activates (or deactivates, respectively) one or more inactive (or active, respectively) servers. When the size of an inactive server pool is above a third pre-defined target range, the utility moves inactive servers to an unallocated server pool. When the size of the inactive server pool is below the third target range, the utility allocates additional servers. | 2008-12-04 |
20080301480 | COMPUTER SYSTEM AND METHOD FOR CONTROLLING A PROCESSOR THEREOF - A computer system and a method for controlling a processor thereof are provided. A processor management unit (PMU) is programmed by the processor itself or by another processor according to a change of the operating condition of the processor. Then, a notification signal is sent to the PMU by the processor when the processor is entering a standby mode. Upon receiving the notification signal, the PMU adjusts the operating condition of the processor according to the change. Finally, a completion signal is sent by the PMU to the processor after the change of the operating condition of the processor is stabilized. Therefore, the unpredictable behavior caused by premature awakening of the processor during the adjustment of the operating condition can be avoided. | 2008-12-04 |
20080301481 | POWER CONTROL SYSTEM FOR CAR COMPUTER - A power control system for car computer includes a power switching circuit located between a power input terminal of a computer host and an external power source, such that the computer host outputs a keep-power-on signal when a key power is supplied thereto; a power ON/OFF circuit receiving the keep-power-on signal to thereby connect the external power source to the computer host; a key power detection circuit for constantly detecting whether the key power is ON, so that the computer host outputs a shut-down signal when the key power is OFF; a computer shut-down circuit for receiving the shut-down signal from the computer host and thereby driving the computer host to execute shut-down procedures; and a power OFF circuit for sensing an OFF state of the key power and outputting a control signal to drive the power ON/OFF circuit to disconnect the external power source from the computer host. | 2008-12-04 |
20080301482 | Method and apparatus for connecting multiple multimode processors - A computer array | 2008-12-04 |
20080301483 | Surge-Protected Peripheral Devices - A computing system including: a host system; at least one device, mechanically connected to the host system, each device having an active state and an inactive state, wherein each device is conductively disconnected from the host system when the inactive state is enabled; and a mechanism for the host system to switch each device between the active state and the inactive state Preferably, at least one device is connected to the host system via a connector. Preferably, the device is hard-wired to the host system. Preferably, some wires of at least one device are isolated from the host system via a mechanical contactor. Preferably, some wires of at least one device are isolated from the host system via an optical isolator. Preferably, the system further includes: a switching battery; and a mechanism for charging the battery when at least one device is disconnected from the host system. | 2008-12-04 |
20080301484 | INFORMATION PROCESSING DEVICE - An information processing device, such as cellular phone, includes a first timer set for executing count processing applied to a preassigned first processing, a second timer set for executing count processing applied to the preassigned first processing, a display state determination unit configured to determine a display state of a display unit, and a timer switching unit configured to select and set the first timer for the preassigned first processing at a time when the display state determination unit determines that the display unit is in an “ON” state and to select and set the second timer for the preassigned first processing at a time when the display state determination unit determines that the display unit is in an “OFF” state. | 2008-12-04 |
20080301485 | REGISTER WITH PROCESS, SUPPLY VOLTAGE AND TEMPERATURE VARIATION INDEPENDENT PROPAGATION DELAY PATH - The digital data register has a plurality of parallel matched data paths, each data path having a data input for receiving a digital data input signal (CA/CNTRL), an output driver with a data output providing a digital data output signal (Q_CA/CNTRL) for application to an associated memory module and a flip-flop (FF1) arranged between the data input and the data output. The data register further comprises a clock input for receiving a clock input signal (CLK), a clock output for providing an output clock signal (Q_CLKn, Q_NCLKn) to the memory modules, a phase locked loop (PLL) with a clock input (REF), a feedback input (FB), a feedback output providing a feedback output signal (Q_NFB) and a clock output providing a clock output signal (Q_CLK, QNCLK). In addition a flip-flop (FF1 DELAY) and output driver replica are matched with the flip-flop and output driver of the data paths. the flip-flops (FF1) of the data paths and the flip-flop (FF1 DELAY) of the replica are clocked by the feedback signal applied to the feedback input (FB) of the phase locked loop (PLL). The phase locked loop (PLL) includes a phase aligner with a phase interpolator. The phase interpolator has an output that provides the output clock signal (Q_CLKn, Q_NCLKn) to the memory modules through a flip-flop (FF1 DELAY) and output driver matched with the flip-flop and output driver of the data paths. A phase frequency detector (PFD) has a first input (REF) coupled to the output of the output driver replica and a second input (SYS) coupled to the clock output. The phase interpolator is controlled by the output of the phase frequency detector (PFD). The proposed data register satisfies the three requirements of: (i) setup and hold timing on the pre-register side, (ii) clock centering on the post-register side, and (iii) constant propagation delay time (tpd) over PVT variations from the clock input to the data output. | 2008-12-04 |
20080301486 | Customization conflict detection and resolution - A computer-implemented method is disclosed for managing customization conflicts. The method includes receiving an indication of a conflict. The conflict is indicative of an error created by a customization of a core application. A customization correction is identified as a remedy for the customization conflict. The customization correction is transmitted over a network to a party affiliated with a system affected by the customization conflict. | 2008-12-04 |
20080301487 | VIRTUAL COMPUTER SYSTEM AND CONTROL METHOD THEREOF - When a failure occurs in an LPAR on a physical computer under an SAN environment, a destination LPAR is set in another physical computer to enable migrating of the LPAR and setting change of a security function on the RAID apparatus side is not necessary. When a failure occurs in an LPAR generated on a physical computer under an SAN environment, configuration information including a unique ID (WWN) of the LPAR where the failure occurs is read, a destination LPAR is generated on another physical computer, and the read configuration information of the LPAR is set to the destination LPAR, thereby enabling migrating of the LPAR when the failure occurs, under the control of a management server. | 2008-12-04 |
20080301488 | INTELLIGENT CONFIGURATION FOR RESTARTING FAILED APPLICATION SERVER INSTANCES - An improved solution for intelligent configuration for restarting failed application server instances is provided. In an embodiment of the invention, a method for restarting a failed application server instance includes: receiving a notice of a failure of an application server instance; obtaining a cause of the failure; automatically applying at least one configuration change to the application server instance based on the cause; and recovering the application server instance. | 2008-12-04 |
20080301489 | MULTI-AGENT HOT-STANDBY SYSTEM AND FAILOVER METHOD FOR THE SAME - The present invention discloses a multi-agent hot-standby system and a failover method for the same, which utilize a plurality of cascaded standby servers to monitor and detect a plurality of application servers, wherein a standby server is parallel connected with all the application servers, and the cascaded standby servers monitor each other. When one application server malfunctions and sends an abnormal heartbeat signal to the standby server directly connected thereto, the standby server immediately replaces the malfunctioning application server. At the same time, another standby server cascaded to the original standby server immediately replaces the original standby server and succeeds to detect and monitor all the application servers. Thereby, the multi-agent hot-standby system and the failover method for the same of the present invention can exempt the programs and tasks executed in application servers from interruption. Further, the present invention can enable a server system to tolerate more faults with less standby servers used. | 2008-12-04 |
20080301490 | QUORUM-BASED POWER-DOWN OF UNRESPONSIVE SERVERS IN A COMPUTER CLUSTER - A quorum-based server power-down mechanism allows a manager in a computer cluster to power-down unresponsive servers in a manner that assures that an unresponsive server does not become responsive again. In order for a manager in a cluster to power down servers in the cluster, the cluster must have quorum, meaning that a majority of the computers in the cluster must be responsive. If the cluster has quorum, and if the manager server did not fail, the manager causes the failed server(s) to be powered down. If the manager server did fail, the new manager causes all unresponsive servers in the cluster to be powered down. If the power-down is successful, the resources on the failed server(s) may be failed over to other servers in the cluster that were not powered down. If the power-down is not successful, the cluster is disabled. | 2008-12-04 |
20080301491 | QUORUM-BASED POWER-DOWN OF UNRESPONSIVE SERVERS IN A COMPUTER CLUSTER - A quorum-based server power-down mechanism allows a manager in a computer cluster to power-down unresponsive servers in a manner that assures that an unresponsive server does not become responsive again. In order for a manager in a cluster to power down servers in the cluster, the cluster must have quorum, meaning that a majority of the computers in the cluster must be responsive. If the cluster has quorum, and if the manager server did not fail, the manager causes the failed server(s) to be powered down. If the manager server did fail, the new manager causes all unresponsive servers in the cluster to be powered down. If the power-down is successful, the resources on the failed server(s) may be failed over to other servers in the cluster that were not powered down. If the power-down is not successful, the cluster is disabled. | 2008-12-04 |
20080301492 | STORAGE SYSTEM AND METHOD FOR COPYING DATA TO PLURALITY OF SITES - A storage system of the present invention carries out remote copying among a plurality of sites, detects a new copy path when a failure occurs, and resumes remote copying. The storage system comprises a plurality of sites. Each site comprises a host and a storage controller. The controller of each site comprises a copy controller, a failure detector, a candidate detector, and a resume controller. The failure detector detects a failure that occurs in a remote copy configuration. The candidate detector detects a candidate for a copy path. The resume controller resumes remote copying using any one copy path from among copy path candidates detected in the respective sites. | 2008-12-04 |
20080301493 | STORAGE SYSTEM AND STORAGE SYSTEM MANAGEMENT METHOD - A management server in a storage system manages a table that stores, as a change history, at least configuration change and a change time for plural volumes; acquires specification of a recovery-target volume and of a recovery time, and acquires, from the table, information on the specified volume and the specified recovery time; shows, in a user interface, a point of difference between a current configuration of the specified volume and a configuration of the specified volume as of at the specified time in a manner distinguishing it from the other parts in display based on the acquired information and current information on the specified volume; and recovers the specified volume to its state as of at the specified time based on backup data and journal data after acquisition of an instruction to recover the specified volume to its state as of at the specified time based on the display. | 2008-12-04 |
20080301494 | Remote Copy Synchronization in Disaster Recovery Computer Systems - A method, storage system, and machine-readable medium for resynchronizing data stored among a first storage element and a second storage element of a remote copy pair of storage elements is disclosed. According to one embodiment, a method is provided which includes detecting a reestablishment of a remote copy relationship between the first and second storage elements and performing a resynchronization operation in response to this detection. Performing the resynchronization operation comprises transmitting data of a second change record associated with the second storage element to the first storage element, combining the second change record with a first change record associated with the first storage element, identifying a data segment of the second storage element utilizing the combined change record, and overwriting data of the first storage element with data of the identified data segment. | 2008-12-04 |
20080301495 | REASSIGNING STORAGE VOLUMES FROM A FAILED PROCESSING SYSTEM TO A SURVIVING PROCESSING SYSTEM - Provided are a method, system, and program for reassigning storage volumes from a failed processing system to a surviving processing system. A first processing system detects a failure of a second processing system. The first processing system determines device groups of storage devices managed by the failed second processing system and determines for each determined device group, hosts that connect to storage devices in the device group. The first processing system sends, for each device group, a unit check to each determined host indicating failure of each device group through one storage device in the device group to which the determined host connects. The determined hosts execute instructions to terminate any I/O operations in progress on the storage devices in the device group in response to the unit check indicating failure of one storage device in the device group and issue, a command to one storage device for the device group to end the busy condition. | 2008-12-04 |
20080301496 | Data processor, data processing program, and data processing system - A related data storing unit stores a plurality of sets of related data related to a plurality of controlling units. An operation storing unit stores operation detail of each of the plurality of controlling units as an operation log. A identification data recording unit records a plurality of sets of identification data in the operation log. An abnormality data recording unit records abnormality data in the operation log. A data acquiring unit acquires an abnormality data and one of the identification data. A related data acquiring unit identifies one of the related data corresponding to the one of identification data acquired by the data acquiring unit and acquires the one of related data from the related data storing unit. A resolution data storing unit stores first resolution data to resolve the abnormality occurring in the one of control targets in association with the one of related data acquired by the related data acquiring unit and the abnormality data acquired by the data acquiring unit. A resolution data acquiring unit acquires the first resolution data corresponding to the one of the control targets in which the abnormality occurred using the one of related data acquired by the related data acquiring unit and the abnormality data acquired by the data acquiring unit. | 2008-12-04 |
20080301497 | Testing Apparatus, System, and Method for Testing at Least One Device with a Connection Interface - A system, a testing apparatus, and a method for testing at least one device with a connection interface are provided. The system comprises a host, a testing apparatus, and a power supply. The testing apparatus further comprises a microprocessor and at least one current limit module. The host sending a test signal. The power supply provides a voltage to the testing apparatus. The at least one current limit module of the testing apparatus, which is electrically connected to the microprocessor, the at least one device, and the power supply, provides the voltage to the at least one device. When the current passing through the at least one device is greater than the predetermined value, the at least one current limit module of the testing apparatus stops providing the voltage to the at least one device and sends an over current signal to the host via the microprocessor. | 2008-12-04 |
20080301498 | Control device and control method - A control device and a control method for increasing stability of micro controller system are described. The control device comprises a system error detection unit a memory unit, a data error detection unit, an error signal processing unit and a system resetting unit. When the system is error or the data transferred from the memory unit has error, the system error detection unit or the data error detection unit outputs an error signal to the error signal processing unit, and then the error signal processing unit corrects the error data or commands the system resetting unit to reset the system by the error signal for increasing the system stability. | 2008-12-04 |
20080301499 | Method and system for determining a corrective action - A computer-implemented method is provided for determining a corrective action. The method may include obtaining diagnostic data and calculating, using the diagnostic data, a prognostic. The method may also include retrieving, when the prognostic is above an alarm level, historical records and calculating a Bayesian posterior probability using the diagnostic data and the historical records. Further, the method may include calculating a prognostic prescience metric using the diagnostic data and the historical records and determining, based on the Bayesian posterior probability and the prognostic prescience metric, the corrective action. | 2008-12-04 |
20080301500 | System and Method for Identifying and Manipulating Logic Analyzer Data from Multiple Clock Domains - A system and method for identifying and manipulating logic analyzer data from multiple clock domains is presented. A logic analyzer receives debug data and determines whether the debug data is a full frequency data type, a half frequency data type, or a crossed data type. Once determined, the logic analyzer reconstructs the debug data such that debug condition-matching logic may process the reconstructed data in a full frequency domain. For half frequency data types, the logic analyzer adds masked data values to the data in order to reconstruct the data into to the full frequency domain before processing the data. For crossed data types, the logic analyzer reconstructs the data into its original format before processing the data in a full frequency domain. | 2008-12-04 |
20080301501 | Analyzing Problem Signatures - A method of analyzing problem data from a computer application is disclosed. The method evaluates a memory dump, identifying call stacks within the memory dump that are related to application failures, creates a hash of the identified call stack and adds the hash to a database. The database may then be evaluated to look for trends in the error data such as whether the same call stack is causing problems. | 2008-12-04 |
20080301502 | SYSTEM CRASH ANALYSIS USING PATH TRACING TECHNOLOGIES - Technologies, systems and methods for code path analysis of an executable including: generating call graphs and control flow graphs of selected functions in the executable, and instrumenting the selected functions to provide for logging of path trace information for the selected functions upon execution of the instrumented executable, the path trace information usable for efficient system crash analysis and debugging. A stack trace from a crash dump may be utilized in the selection of the functions to analyze. | 2008-12-04 |
20080301503 | HIGH FREQUENCY DIVIDER STATE CORRECTION CIRCUIT - The present invention provides for a self-correcting state circuit. A first flip flop is configured to receive a clock input and a first data input, and to generate a first output in response to the clock input and the first data input. A second flip flop is coupled to the first flip flop and configured to receive the clock input and to receive the first output as a second data input, and to generate a second output in response to the clock input and the first output. A first correction circuit is coupled to the second flip flop and configured to generate a corrected output. A third flip flop is coupled to the first correction circuit and configured to receive the clock input and to receive the corrected output as a third data input, and to generate a third output in response to the clock input and the third data input. | 2008-12-04 |
20080301504 | Method and Apparatus to Anticipate Memory Exhaustion in an Open Services Gateway Initiative Environment - A computer implemented method, computer program product, and data processing system for predicting a future status of a memory leak. A first set of data including memory consumption data is received at a software bundle. The software bundle is operating in an open services gateway initiative environment. Responsive to a determination that a memory leak exists, the first set of data is analyzed to predict a future status of the memory leak. The future status is stored, as stored data, in a storage device. | 2008-12-04 |
20080301505 | COMPUTER PERFORMANCE MONITORING METHOD AND SYSTEM - A monitoring method and system. The method includes receiving by a software application within a computing system, data comprising a first data point associated with an operating parameter for a characteristic associated with the computing system. The software application converts the data point into a mathematical value and associates the mathematical value with a scaled value. The software application associates the scaled value with a first timbre and a harmonic interval and generates a first musical note value from the scaled value. The first musical note value is transmitted to an amplifier device within the computing system. The amplifier device generates a first audible musical note from the first musical note value and presents the first audible musical note to a user of the computing system. | 2008-12-04 |
20080301506 | SYSTEM DIAGNOSTICS WITH DYNAMIC CONTEXTUAL INFORMATION OF EVENTS - A network device and a method for monitoring operational messages is described. The method comprises monitoring an occurrence of an operational message of the network device, and storing dynamic context information at the time that the operational message occurred. The stored dynamic context information is then associated with the operational message. The operational message (e.g., a syslog message) may be stored together with the dynamic context information in a metalog memory and may comprise a snapshot of a procedure stack, the procedure stack including information indicative of a sequence of procedure invocations. | 2008-12-04 |
20080301507 | System and Method for Repairing a Memory - A method and system for repairing a memory. A test and repair wrapper is operable to be integrated with input/output (I/O) circuitry of a memory instance to form a wrapper I/O (WIO) block that is operable to receive test and repair information from a built-in self-test and repair (BISTR) processor. Logic circuitry associated with the WIO block is operable generate a current error signal that is used locally by the BISTR processor for providing a repair enable control signal in order to repair a faulty memory portion using a redundant memory portion without having to access a post-processing environment for repair signature generation. | 2008-12-04 |
20080301508 | SEMICONDUCTOR MEMORY DEFECT ANALYSIS METHOD AND DEFECT ANALYSIS SYSTEM - A defect analysis method for semiconductor memory includes: reading out an address bit map corresponding to an input kind of the memory macro from a database which stores address bit maps respectively corresponding to memory macro kinds; inputting size information of the memory macro; translating a logical address of a defective cell of the memory macro detected on the basis of results of an electric test measured by using a tester to a physical address of a memory macro in a standard disposition by using the input size information and the address bit map read out, of the memory macro, and generating a fail bit map in the standard disposition; inputting disposition information of the memory macro; and translating a physical address of the fail bit map in the standard disposition to a physical address of the memory macro by using the input disposition information of the memory macro, and generating a fail bit map of the memory macro. | 2008-12-04 |
20080301509 | METHOD AND APPARATUS FOR TESTING INTEGRATED CIRCUITS BY EMPLOYING TEST VECTOR PATTERNS THAT SATISFY PASSBAND REQUIREMENTS IMPOSED BY COMMUNICATION CHANNELS - Embodiments of an apparatus and method for high-speed testing of a device under test are described herein, where the device under test is coupled to a tester via a limited passband communication channel. A plurality of test vector patterns is generated having characteristics such that when a given test vector pattern is transmitted electrically at a transmission rate via the communication channel, the test vector pattern has a frequency content that is less than the frequency content of a high frequency test vector pattern if the high frequency test vector pattern were to be transmitted electrically at the transmission rate via the communication channel, and such that the frequency content of each test vector pattern when transmitted electrically at the transmission rate via the communication channel falls within the passband associated with the communication channel. | 2008-12-04 |
20080301510 | Dynamically Reconfigurable Shared Scan-In Test Architecture - A low overhead dynamically reconfigurable shared scan-in test architecture is provided. This test architecture advantageously allows for changing scan inputs during the scan operation on a per shift basis. The flexibility of reconfiguring the scan input to scan chain mapping every shift cycle can advantageously reduce both test data volume and test application time. | 2008-12-04 |
20080301511 | INTEGRATED CIRCUIT WITH CONTINUOUS TESTING OF REPETITIVE FUNCTIONAL BLOCKS - A method of continuous testing of repetitive functional blocks provided on an integrated circuit (IC) which includes selecting one of the repetitive functional blocks at a time for testing, substituting a test repetitive functional block for a selected repetitive functional block, and testing the selected repetitive functional block during normal functional mode of the IC. An IC which includes repetitive functional blocks for performing corresponding functional block operations during normal functional mode of the IC, and a test system which performs continuous testing of each repetitive functional block while the functional block operations are performed during normal functional mode of the IC. One block may be tested during normal operation for each IC reset event without transferring or copying state information. Multiple blocks may be tested one at a time during normal operation by transferring state information between a selected block and a test block. | 2008-12-04 |
20080301512 | SEMICONDUCTOR TEST SYSTEM - A semiconductor test system includes: pin electronics (“PE”) cards each being operable to: a) apply a test pattern to device under tests (“DUTs”) each connected to the PE cards; b) capture patterns outputted in response to the test pattern from the DUTs; c) compare the patterns with an expected value pattern; and d) determine whether or not the patterns correspond with the expected value pattern, and a fail control card being operable to: e) aggregate fail information about the DUTs inputted through the PE cards every the DUTs; and f) transfer the fail information to the PE cards. | 2008-12-04 |
20080301513 | METHODS AND APPARATUS TO REDUCE ERRORS DURING A RE-TRANSMISSION - Methods and apparatus to reduce errors during a re-transmission performed by a communication module are disclosed. An example method includes detecting an error in received data, predicting a time interval that is expected to be substantially error-free, and transmitting a re-transmission request message for the data based on the time interval. | 2008-12-04 |
20080301514 | Realization Method for Harq in Multiple Frequency Points Cell - The present invention relates to a method for realizing HARQ in multi-carrier cell, comprising: when distributing high-speed shared resource for UE, Node B distributes the high-speed downlink packet service to N frequencies, and reports the information of the established physical channel, including the frequency information, to RNC and said UE; after Node B establishes the high-speed shared resource for said UE at N frequencies, it establishes N HARQ sub-entities on the HARQ entity built for said UE, each sub-entity independently processes the high-speed downlink packet service at one frequency; correspondingly, said UE also establishes N HARQ sub-entities on the HARQ entity; Node B configures parameters for each HARQ sub-entity and notifies the configuration information to RNC and said UE through upper-level signaling; Node B and UE complete their configuration for each sub-entity of HARQ entity according to the information, and realize the HARQ function in the service. The present invention can realize HARQ function on multiple frequencies simultaneously and is compatible with current protocol in TD-SCDMA system that utilizes multi-carrier HSDPA technique. | 2008-12-04 |
20080301515 | Method and a Transmitter/Receiver for Reduced Signaling in a Retransmission System Using Hybrid Automatic Repeat - The present invention relates to a transmitter and a receiver for a mobile communication system. The basic idea of the present invention is to target the number of HARQ transmissions that is required to be able to decode the transmitted data successfully and to only transmit HARQ feedback information if the decoding result differs from an expected result, wherein the expected result is based on the targeted number of required HARQ transmissions. | 2008-12-04 |
20080301516 | METHOD AND DEVICE FOR RETRANSMITTING DATA - A method and device for retransmitting data is provided. A receiving end receives a data unit, and checks whether a Negative Acknowledgement NACK->Acknowledgement, ACK, error occurs. If the NACK->ACK error occurs, the receiving end transmits an Automatic Repeat Request ARQ request message to a transmitting end, for requesting the transmitting end to perform an ARQ retransmission. Therefore, by adopting the technical solutions of the embodiment of the invention, Hybrid Automatic Repeat Request HARQ NACK->ACK errors are avoided from being missed, the complexity of ARQ operation is lowered, and the ARQ retransmission feedback time is reduced. | 2008-12-04 |
20080301517 | SYSTEMS AND METHODS FOR LDPC DECODING WITH POST PROCESSING - Various embodiments of the present invention provide systems and methods for decoding encoded information. For example, a method for post processing error correction in a decoder system is disclosed. The method includes receiving and iteratively decoding a soft input to generate a hard output associated with the soft input. The method further includes post processing when a plurality of parity checks fail. At least one bit of the hard output is identified as being potentially incorrect. The identified bit is modified, and the plurality of parity checks is thereafter repeated. | 2008-12-04 |
20080301518 | LDPC Check Matrix Generation Method, Check Matrix Generator, and Code Retransmission Method - A check matrix generation method for generating a check matrix H | 2008-12-04 |