51st week of 2010 patent applcation highlights part 64 |
Patent application number | Title | Published |
20100325402 | DATA PROCESSING DEVICE AND METHOD FOR EXECUTING OBFUSCATED PROGRAMS - A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses in an irregular way, with position dependent address steps between the addresses of logically successive instructions. Preferably pseudo-random address steps are used, for example with address steps that have mutually opposite sign with equal frequency. The data processing device has an instruction flow control unit that updates instruction addresses according the position dependent address steps. The instruction flow control unit may comprise a circuit that contains secret information, which is not normally accessible from the outside, to control the updates. A lookup table may be used for example, with address steps, successor addresses or mapped address values. In an embodiment the mapping of original instruction addresses to target addresses may be visualized by means of a path ( | 2010-12-23 |
20100325403 | Half duplex GPIO firmware debugger - Methods, systems, apparatuses and program products are disclosed for communications such as may be used for debugging computers and similar electronic products at a level suitable for low level firmware. This may find application, for example, in environments after cache initialization around the time of memory bring up or motherboard device enumeration but including durability into and beyond software loading. | 2010-12-23 |
20100325404 | Updating Programmable Logic Devices - Updating programmable logic devices (‘PLDs’) in a symmetric multiprocessing (‘SMP’) computer, each compute node of the SMP computer including a PLD coupled for data communications through a bus adapter, the bus adapter adapted for data communications through a set of one or more input/output (‘I/O’) memory addresses, including configuring the primary compute node with an update of the configuration instructions for the PLDs; assigning, by the PLDs at boot time in an SMP boot, a unique, separate set of one or more I/O addresses to each bus adapter on each compute node; and providing, by the primary compute node during the SMP boot, the update to all compute nodes, writing the update as a data transfer to each of the PLDs through each bus adapter at the unique, separate set of one or more I/O addresses for each bus adapter. | 2010-12-23 |
20100325405 | METHOD OF RUNNING MULTIPLE OPERATING SYSTEMS ON AN X86-BASED COMPUTER - Two or more distinct operating systems (OSs) are loaded simultaneously and run on an x86 computer system. Each OS is booted serially and in such a way that the OS resides in a separate memory footprint than the other OSs by partitioning the memory map. The partition of the memory map includes a low memory region, dedicated memory partitions for storing each OS, and dedicated regions for storing shadows of the low memory region and the ACPI for each OS. Switching between the two or more resident OSs is performed by sleeping the current OS and then resuming the desired OS using the shadow previously stored for the desired OS. None of the resident OSs require any modification in order to run in this fashion. | 2010-12-23 |
20100325406 | COMPUTER SYSTEM AND MANAGEMENT DEVICE - A cloud computing system is provided in order to meet the requirement for efficiently processing a large amount of information, and to meet the requirement for stable performance. This is achieved by a computer system including a user terminal, a plurality of servers connected to the user terminal through a network to provide services to the user terminal, and a management device for managing a server for providing a service to the user terminal. In the computer system, the user terminal transmits the boot information indicating one boot mode among fix boot, first boot, and not-first boot, to the management device. The management device selects a server for providing a service to the user terminal based on the boot information. Then, the selected server provides the service to the user terminal. | 2010-12-23 |
20100325407 | Electronic Digital Device - There is provided an electronic device comprising an FPGA unit (100), a first and a second memory (210, 220) for storing boot data for the FPGA unit and a digital potentiometer (300) for storing a first and a second setting. In the first setting of the potentiometer the first memory (210) is coupled to the FPGA unit (100) and in the second setting of the potentiometer the second memory (220) is coupled to the FPGA unit (100) for booting. | 2010-12-23 |
20100325408 | Method and Apparatus for Maintaining a Partition When Booting Another Partition - In a processing system with a main partition and a sequestered partition, the main partition sends an interrupt to the sequestered partition before calling an operating system (OS) boot loader for the main partition. The sequestered partition may then enter an interrupt handler. After the sequestered partition enters the interrupt handler, an address line of the processing system may be disabled, and the OS boot loader for the non-sequestered partition may be called. The sequestered partition may then determine whether the address line has been re-enabled. The sequestered partition may remain in the interrupt handler until after the address line has been re-enabled. Other embodiments are described and claimed. | 2010-12-23 |
20100325409 | DISPLAY DEVICE TO PROVIDE INFORMATION TO USERS DURING BOOTING PROCEDURE - A display device is provided that may include a memory to store a boot screen data to be provided when booting the display device, an interface unit to receive the stored boot screen data and another boot screen data, and a processor to change the stored boot screen data into the other boot screen data that is received in the interface unit, and to control to outputting the boot screen data when booting according to a boot code that includes a command for outputting the boot screen data. A display unit may output the boot screen data according to control of the processor. | 2010-12-23 |
20100325410 | SYSTEM AND METHOD FOR MANAGEMENT AND INSTALLATION OF OPERATING SYSTEM IMAGES FOR COMPUTERS - Shown is a method and system for provisioning a target computer with an operating system, which calls for booting the target computer in a pre-operating system environment, collecting configuration information for the target computer, and transmitting the configuration information to a predetermined server. The approach shown also provides for searching a database in the server for a pre-existing operating system image corresponding to the configuration information from the target computer. If a corresponding operating system image is found, then the present approach involves transferring the pre-existing operating system image to the target computer and installing the pre-existing operating system image on the target computer. | 2010-12-23 |
20100325411 | Deactivation system and method for a transferable device - Methods and systems for deactivation of one or more applications operating on a transferable device are provided. | 2010-12-23 |
20100325412 | APPARATUS FOR RECONFIGURATION OF A TECHNICAL SYSTEM BASED ON SECURITY ANALYSIS AND A CORRESPONDING TECHNICAL DECISION SUPPORT SYSTEM AND COMPUTER PROGRAM PRODUCT - The invention relates to an apparatus for analyzing and reconfiguring a technical system ( | 2010-12-23 |
20100325413 | DATA HIDING BASED MESSAGES AND ADVERTISEMENTS - A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes. In response to the user selection, a secondary multimedia presentation is presented to the user in response to receiving the user selection, wherein the second multimedia presentation is presented over a second client device which is distinct from the first client device. | 2010-12-23 |
20100325414 | Method and transmitting device for securely creating and sending an electronic message and method and receiving device for securely receiving and processing an electronic message - The subject matter relates to a method for securely creating and sending an electronic message, whereby the message is created using a first application running in a secure operating system, the created message is stored in a storage that can only be accessed by the secure operating system and a virtualizing unit. In a second application executed by the virtualizing unit, the internal storage is analyzed for the presence of a message and, if the message is present, the message is transmitted to a receiver. The subject matter also relates to a method for securely receiving and processing an electronic message, whereby an external storage is analyzed for the presence of a message using a second application and, if the message is present, the message is transmitted to the internal storage. The presence of the message is polled using the first application and, if the message is present, the message is transmitted from the internal storage to the first application for processing. The subject matter further relates to a transmitting device for carrying out the method for securely creating and sending the electronic message and a receiving device for carrying out the method for securely receiving and processing the electronic message. | 2010-12-23 |
20100325415 | Controlling Media Distribution - A method and apparatus for distributing time-controlled media. A media chunk is encrypted using cryptographic materials and sending the encrypted media chunk over a media channel. The cryptographic materials are distributed over a time-guaranteed control channel such that the cryptographic materials are received by a remote receiver node after the remote receiver receives the encrypted media chunk. The receiver node receives the encrypted media chunk over the media channel and stores the encrypted media chunk in a memory at the receiver node. The receiver node also receives the cryptographic materials over the time guaranteed channel, and uses the cryptographic materials to decrypt the encrypted media chunk. In this way, the receiver node cannot render the media chunk until it has received the cryptographic materials. | 2010-12-23 |
20100325416 | Method and Apparatus for Use in a Communications Network - A method is provided for use in a Mobile IP network in which it is determined whether a Mobile Node ( | 2010-12-23 |
20100325417 | RENDERING RIGHTS DELEGATION SYSTEM AND METHOD - Methods and systems for controlling the distribution of digital content are provided. A license holder acquires protected content and an original digital license to the protected content from a content provider system. The license holder in turn delegates all or part of the grants in that original license to other qualified devices or clients. The content remains in its original, protected or encrypted form while it is delivered from the license holder to the client along with a digital sublicense that the client receives from the original license holder, whereupon the content can then be rendered. The original digital license defines or governs the conditions under which such delegation occurs, and includes terms under which such delegation is permitted to continue in order to enforce the intent of the content provider. | 2010-12-23 |
20100325418 | SYSTEMS AND METHODS FOR SSL SESSION CLONING - TRANSFER AND REGENERATION OF SSL SECURITY PARAMETERS ACROSS CORES, HOMOGENOUS SYSTEM OR HETEROGENEOUS SYSTEMS - The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by the first core is non-resumable. Responsive to the indication, the core may set an indicator at a location in memory accessible by each core of the multi-core system, the indicator indicating that the SSL session is non-resumable. A second core of the multi-core system may receive a request to reuse the SSL session. The request may include a session identifier of the SSL session. In addition, the session identifier may identify the first core as an establisher of the SSL session. The second core can identify from encoding of the session identifier whether the second core is not the establisher of the SSL session. Responsive to the identification, the second core may determine whether to resume the SSL session. | 2010-12-23 |
20100325419 | SYSTEMS AND METHODS FOR ENCODING THE CORE IDENTIFIER IN THE SESSION IDENTIFIER - The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by the first core is non-resumable. Responsive to the indication, the core may set an indicator at a location in memory accessible by each core of the multi-core system, the indicator indicating that the SSL session is non-resumable. A second core of the multi-core system may receive a request to reuse the SSL session. The request may include a session identifier of the SSL session. In addition, the session identifier may identify the first core as an establisher of the SSL session. The second core can identify from encoding of the session identifier whether the second core is not the establisher of the SSL session. Responsive to the identification, the second core may determine whether to resume the SSL session. | 2010-12-23 |
20100325420 | SYSTEMS AND METHODS FOR HANDLING SSL SESSION NOT REUSABLE ACROSS MULTIPLE CORES - The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by the first core is non-resumable. Responsive to the indication, the core may set an indicator at a location in memory accessible by each core of the multi-core system, the indicator indicating that the SSL session is non-resumable. A second core of the multi-core system may receive a request to reuse the SSL session. The request may include a session identifier of the SSL session. In addition, the session identifier may identify the first core as an establisher of the SSL session. The second core can identify from encoding of the session identifier whether the second core is not the establisher of the SSL session. Responsive to the identification, the second core may determine whether to resume the SSL session. | 2010-12-23 |
20100325421 | APPARATUS AND METHOD FOR PROVIDING SECURITY SERVICE IN HOME NETWORK - An apparatus and method for providing a security service is provided. The apparatus includes a reception module which receives first data including a first public key and marked with a security ID, the first public key being one of a pair of public keys necessary for providing a security service to a home server and the security ID indicating that the first data needs to be encrypted; a response generation module which generates second data by encrypting part of a response message for the first data; and a transmission module which transmits the second data to a home server in a home network. | 2010-12-23 |
20100325422 | SYSTEM AND METHOD FOR POLICY-DRIVEN FILE SEGMENTATION AND INTER-CLOUD FILE STORAGE AND RETRIEVAL - A file storage system includes one or more document input devices and a processor communicating with both a memory and the one or more document input devices. The processor executes a software application stored on the memory to separate a sensitive portion of a document from an insensitive portion of a document. A first type of cloud storage includes one or more storage devices in operable communication with the one or more document input devices. The first type of cloud storage is configured to store one or both of the separated portions with a level of encryption agreed upon by a user. A second type of cloud storage includes one or more storage devices in operable communication with the one or more document input devices. The second type of cloud storage is configured to store the insensitive portion of a document based on a consent of the user. | 2010-12-23 |
20100325423 | System and Method for Securing an Electronic Communication - A system for securing an electronic communication comprises a gateway server configured to receive and store a device identifier and a network address from a first computing device. The device identifier identifies the first computing device, and the network address is associated with the first computing device. Thereafter, the gateway server receives from a second computing device the network address of the first computing device and an encryption key request. The gateway server derives from the device identifier for the first computing device an encryption key and sends the encryption key to the second computing device. A communication from the second computing device to the first computing device may thereafter be secured using the encryption key. A related method of securing an electronic communication is also disclosed. | 2010-12-23 |
20100325424 | System and Method for Secured Communications - A system for secured communications includes a control center, a network transceiver, an authentication server communicatively coupled between the control center and the network transceiver, and an extended trust device communicatively coupled between the authentication server and a client, the extended trusted device being configured to send a device identifier to the authentication server via the network transceiver, the device identifier being based on a combination of a user-configurable parameter and a non-user-configurable parameter of the extended trust device, wherein the authentication server is configured to determine access privilege of a client to the control center by authenticating the device identifier received from extended trust device. | 2010-12-23 |
20100325425 | METHOD FOR AUTOMATIC WLAN CONNECTION BETWEEN DIGITAL DEVICES AND DIGITAL DEVICE THEREFOR - A method and apparatus for performing an automatic wireless connection with a second digital device by a first digital device is provided. The method includes acquiring, by the first input device, random information used for the wireless connection; checking a status of a Wireless Local Area Network (WLAN); storing the checked status; setting the WLAN to an Ad-hoc mode; setting a Service Set Identifier (SSID) of the WLAN using the random information; setting a security key of the WLAN using the random information; and setting an Internet Protocol (IP) address of the WLAN using the random information. | 2010-12-23 |
20100325426 | PROTECTED SOFTWARE IDENTIFIERS FOR IMPROVING SECURITY IN A COMPUTING DEVICE - A computing device is operated in a manner such that, where application software includes a unique software identifier, this can be taken from an unprotected range (which can be allocated to any application software) or from a protected range (which can only be used by digitally signed software). On installation, the unique software identifiers are checked to ensure they do not clash with any belonging to software already on the device, and that, if they are from the protected range, the software being installed was digitally signed. Checks for ownership of the unique identifiers can also made at the time an application is signed. | 2010-12-23 |
20100325427 | METHOD AND APPARATUS FOR AUTHENTICATING A MOBILE DEVICE - An approach is provided for authenticating a mobile device. A mobile device initiates transmission of a request to an authentication platform for generating a public-key certificate to access a service from the mobile device. The mobile device receives an identity challenge and responds by initiating transmission of a tag specific to the mobile device to the authentication platform. The authentication platform uses the tag to generate a public-key certificate. | 2010-12-23 |
20100325428 | System and Method for Authentication of a Hardware Token - A method for authentication. A computer obtains a random number R generated by a hardware token. The computer forms and returns to the hardware token a signature Ck′(R) formed using the random number R with a computer secret key Ck′. The computer receiving from the hardware token authentication of the signature Ck′(R) that is performed by the hardware token using a computer public key Ck stored in the hardware token. | 2010-12-23 |
20100325429 | SYSTEMS AND METHODS FOR MANAGING CRLS FOR A MULTI-CORE SYSTEM - The present invention is directed towards systems and methods for maintaining Certificate Revocation Lists (CRLs) for client access in a multi-core system. A first core may generate a secondary CRL corresponding to a master CRL maintained by the first core. The CRLs may identify certificates to revoke. The first core can store the secondary CRL to a memory element accessible by the cores. A second core may receive a request to validate a certificate. The second core can provisionally determine, via access to the secondary CRL, whether the certificate is revoked. The second core may also determine not to revoke the certificate. Responsive to the determination, the second core may request the first core to validate the certificate. The first core can determine whether to revoke the certificate based on the master CRL. The first core may send a message to the second core based on the determination. | 2010-12-23 |
20100325430 | GLOBALLY UNIQUE IDENTIFICATION IN COMMUNICATIONS PROTOCOLS AND DATABASES - A globally unique identification system for a communications protocol and database is disclosed. A method for generating the globally unique identification code and for generating a compressed globally unique identification code is also described. The communications protocol permits multiple communications sessions to be sent through a single open port of a firewall. | 2010-12-23 |
20100325431 | Feature-Specific Keys for Executable Code - A method for protecting software from tampering includes steps for processing first compiled software stored in a computer memory to generate a first key part, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed, and the first key part consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, generating an identifier and a second key part for each of the defined second functions, generating a cryptographic key determined from the first key part and the second key part, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device. | 2010-12-23 |
20100325432 | COUNTERFEIT PREVENTION STRATEGY FOR PLUGGABLE MODULES - A method is provided, including (a) upon a standard small form-factor pluggable (SFP) module being inserted into an SFP jack on a network host device, determining if the SFP module is a legacy device or a smart device, (b) upon determining that the SFP module is a legacy device, receiving a magic code from the SFP module and determining if the magic code is a valid magic code, and (c) upon determining that the SFP module is a smart device, performing a smart authentication process with the SFP module. Associated apparatuses and additional methods are also provided. | 2010-12-23 |
20100325433 | LOGIN SYSTEM - A method for secure log on to a server is provided. The method includes: providing a first user name and a first password from a client to the server; determining if the first user name and first password correspond to a registered user; providing a first data set from the server to the client if the outcome of the determination step is positive; providing a second user name and a second password from the client to a trusted third party; determining if the second user name and second password correspond to a user registered at the trusted third party; providing the first data set from the client to the trusted third party if the outcome of the determination step is positive; providing the first data set from the trusted third party to the server; providing a second data set from the server to the trusted third party if the first data set received from the trusted third party corresponds to the first data set provided to the client; providing the second data set from the trusted third party to the client; providing the second data set from the client to the server; log on the client at the server if the second data set received from the client corresponds to the second data set provided to the trusted third party. | 2010-12-23 |
20100325434 | REAL-TIME DELIVERY OF LICENSE FOR PREVIOUSLY STORED ENCRYPTED CONTENT - Content is stored as ClearText by a content provider within a trusted area. Specific content is requested by an end user, preferably via a service provider, and the requested content is encrypted and then delivered over a secure communications channel to a home server system. While the encrypted content is stored on the home server system, the associated encryption keys are stored as a license with the content provider. When a playback device on the home server system is instructed to play back the encrypted content, the encrypted content is streamed from local storage within the home server system while the associated encrypted keys are simultaneously streamed from the content provider to the playback device. | 2010-12-23 |
20100325435 | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same - A two-factor authenticated key exchange method. A subscriber station transmits a value generated by using an identifier and an authentication server's public key to the authentication server through an access point. The authentication server uses the value to detect the subscriber's password, a key stored in a token, and the authentication server's secret key, generate a random number. The subscriber station uses the random number, password, and the key to transmit an encrypted value and the subscriber's authenticator to the authentication server. The authentication server establishes a second value generated by using the password, key, and random number to be a decrypted key to decrypt the encrypted value, authenticate the subscriber's authenticator, and transmits the authentication server's authenticator to the subscriber station. The subscriber station authenticates the authentication server's authenticator by using the key and password. | 2010-12-23 |
20100325436 | METHOD, SYSTEM, AND DEVICE FOR OBTAINING KEYS - A communication system that obtains a key includes: a server that confirms support of Identity Based Encryption (IBE) authentication; the server obtains public parameters and a private key for IBE; and the server receives a PreMasterSecret key encrypted through the IBE, and obtains a plain text of the PreMasterSecret key according to the public parameters and the private key. The system includes a client and a server. The client includes an IBE negotiating module, a public parameter obtaining module, a server identifier obtaining module, and a processing module. The server includes an IBE negotiating module, a public parameter obtaining module, a private key obtaining module, and a processing module. Through combination of the IBE technology and the SSL/TLS technology, the modes of encrypting a PreMasterSecret key in the existing SSL/TLS protocol are diversified, and the use scope of the existing SSL/TLS protocol is extended substantially. | 2010-12-23 |
20100325437 | METHOD AND SYSTEM FOR THE SUPPLY OF DATA, TRANSACTIONS AND ELECTRONIC VOTING - A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided. | 2010-12-23 |
20100325438 | System and Method for Binding a Smartcard and a Smartcard Reader - Systems and methods for binding a smartcard and a smartcard reader are provided. A smartcard is provision to store a first set of credentials for use in traditional transactions such as at a brick and mortar retail store and a second set of credentials for use when performing a transaction using a smartcard reader associated with a user such as an on-line transaction. The user smartcard reader registers with a smartcard issuer server by cryptographically authenticating a secure processor associated with the smartcard reader. As a result of the registration, the secure processor obtains a set of private keys associated with the second set of credentials. When a request for a authorizing a transaction via the user's smartcard reader is received, the smartcard reader cryptographically authenticates itself to the smartcard using a private key associated with a credential to be used to authorize the transaction. | 2010-12-23 |
20100325439 | METHOD AND SYSTEM FOR THE SUPPLY OF DATA, TRANSACTIONS AND ELECTRONIC VOTING - A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided. | 2010-12-23 |
20100325440 | Method and System for Single Sign-on for Multiple Remote Sites of a Computer Network - A system and method links first and second computers of a network to implement a single sign on feature. The first computer generates a link request having a plaintext component and a hashed component. The plaintext component includes an identifier associated with the first network computer and information for locating a resource of the second network computer. The hashed component includes a first hash result formed by applying a hashing function to the plaintext component and a secret known to the first network computer and the second network computer. The second computer authenticates the link request without using a two-way encryption process by generating a second hash result by applying the hashing function to the plaintext component of the link request and the secret and comparing the first hash result with the second hash result. | 2010-12-23 |
20100325441 | PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS - Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access is unlinkable to any previous or future accesses of the user at the RP. Pseudonymous access allows the user to associate the access to a pseudonym previously registered at the RP. A pseudonym system is disclosed. The pseudonym system allows a large number of different and unlinkable pseudonyms to be generated using only a small number of secrets held by the user. The pseudonym system can generate tokens capable of including rich semantics in both a fixed format and a free format. The tokens can be used in obtaining from the IdP, confirmation of access privilege and/or of selective partial disclosure of user characteristics required for access at the RPs. The pseudonym system and associated protocols also support user-enabled linkability between pseudonyms. | 2010-12-23 |
20100325442 | SYSTEM AND METHOD FOR NAMELESS BIOMETRIC AUTHENTICATION AND NON-REPUDIATION VALIDATION - A system, method, and computer program product for authenticating a requestor using a previously-stored biometric print. Records are stored in a database, where each record contains a previously-stored biometric print corresponding to an individual and is disassociated from an identity of the individual. An identifier and a biometric sample are requested from the requestor. The identifier is then used to locate one of the plurality of records corresponding to the requestor. The requestor is authenticated if the biometric sample matches the previously-stored biometric print. | 2010-12-23 |
20100325443 | Differential encryption utilizing trust modes - Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based on network connectivity, attended/unattended status, or a combination thereof. Additional embodiments of the invention incorporate “trust windows” that provide granular and flexible data access as function of the parameters under which sensitive data is accessed. Further embodiments refine the trust windows concept by incorporating dynamic intrusion detection techniques. | 2010-12-23 |
20100325444 | DOCUMENT ENCRYPTING SYSTEM AND METHOD THEREOF - A document encrypting system encrypts data by comparing an ongoing operation with a number of predetermined restricted operations and generating a protection password according to a predetermined operation number and a predetermined computing rule. | 2010-12-23 |
20100325445 | MECHANISM TO HANDLE EVENTS IN A MACHINE WITH ISOLATED EXECUTION - A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution “IsoX” mode may leak data when an event occurs as a result of the event being handled in a traditional manner based on the exception vector. By defining a class of events to be handled in IsoX mode, and switching between a normal memory map and an IsoX memory map dynamically in response to receipt of an event of the class, data security may be maintained in the face of such events. | 2010-12-23 |
20100325446 | Securing Executable Code Integrity Using Auto-Derivative Key - A method for protecting software from tampering includes steps for processing, using a computer, first compiled software stored in a computer memory to generate a cryptographic key, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed by a computer processor, the cryptographic key consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device. | 2010-12-23 |
20100325447 | POWER SUPPLY CONVERTING CIRCUIT - A power supply converting circuit includes a multi-phase pulse-width modulation (PWM) controller, a single-phase PWM controller, some first voltage converting circuits, a second voltage converting circuit, and an electrical switch unit. The multi-phase PWM controller provides some first PWM signals and a second PWM signal. The single-phase PWM controller provides a third PWM signal. The first voltage converting circuits receive the first PWM signals to output a first power supply to a central processing unit (CPU) chipset. The electrical switch unit receives the second and third PWM signals to selectively output the second or third PWM signal to the second voltage converting circuit to output one of the first and second power supplies, such that the second voltage converting circuit selectively outputs one of the first and second power supplies to the CPU chipset. | 2010-12-23 |
20100325448 | Device Incorporating Data Communication Function - A device incorporating a data communication function | 2010-12-23 |
20100325449 | BIDIRECTIONAL INLINE POWER PORT - A method and apparatus for bidirectional provision of inline power over data telecommunications cabling permits power to be received at a local powered device (PD) from remote power sourcing equipment (PSE) via at least one conductor at a first time and power to be provided by the local device to a remote device or another device at a second different time. | 2010-12-23 |
20100325450 | BUS INTERFACE WITH POWER MANAGEMENT FEATURES - Methods and apparatus for providing a bus interface are disclosed. An example bus interface includes a first power supply bus configured to distribute a first power supply voltage to first circuitry during a normal operating mode of the bus interface and power off during a low power operating mode of the bus interface. The example bus interface also includes a second power supply bus configured to distribute the first power supply voltage to second circuitry during the normal operating mode and distribute a second power supply voltage to the second circuitry during the low power operating mode. The example bus interface further includes a selection device coupled with the first power supply bus and the second power supply bus, where the selection device is configured to transition the bus interface between the normal operating mode and the low power operating mode in response to a received signal. | 2010-12-23 |
20100325451 | POWER-SAVING TRIGGER-TYPE CONTROL DEVICE FOR DYNAMICALLY AND INSTANTLY VARYING FREQUENCY AND METHOD THEREOF - The present invention discloses a power-saving trigger-type control device for dynamically and instantly varying frequency and a method thereof. The device comprises a signal control unit having at least two signal input terminals, a counting control unit, and a clock generator. The two signal input terminals respectively receive increment trigger actions and decrement trigger actions and then generate increment trigger signals and decrement trigger signals each counting to the same number as the corresponding trigger actions. The counting control unit counts the increment trigger signals or decrement trigger signals. The clock generator linearly increments or decrements output frequency according to the count of the increment trigger signals or decrement trigger signals. The device of the present invention further has a power controller to regulate output voltage. The present invention can dynamically and instantly vary the frequency/voltage of the system via external control actions in any case to achieve power efficiency. | 2010-12-23 |
20100325452 | AUTOMATIC CLOCK-GATING INSERTION AND PROPAGATION TECHNIQUE - Embodiments of the present invention provide a method and system for clock-gating a circuit. During operation, the system receives a circuit which includes a plurality of clocked memory elements. Next, the system identifies a feedback path from an output of a clocked memory element to an input of the clocked memory element, wherein the feedback path passes through intervening combinational logic, but does not pass through other clocked memory elements in the circuit. Then, the system gates a clock signal to the clocked memory element so that the clock signal is disabled when the feedback path causes a value which appears at the output of the clocked memory element to be appear at the input of the clocked memory element. | 2010-12-23 |
20100325453 | PRIORITIZED WORKLOAD ROUTING IN A DATA CENTER - An approach that manages energy in a data center is provided. In one embodiment, there is an energy management tool, including an analysis component configured to determine an energy profile of each of a plurality of systems within the data center. The energy management tool further comprises a priority component configured to prioritize a routing of a workload to a set of systems from the plurality of systems within the data center having the least amount of energy present based on the energy profile of each of the plurality of systems within the data center. | 2010-12-23 |
20100325454 | Resource and Power Management Using Nested Heterogeneous Hypervisors - A server includes a plurality of processors, at least some of the processors being partitioned into virtual partitions using a virtual partition hypervisor. At least one of the virtual partitions executes a virtual machine hypervisor to implement a plurality of virtual machines within said at least one of said virtual partitions. The server also executes a workload manager application configured to dynamically reallocate the processors among the virtual partitions. | 2010-12-23 |
20100325455 | MEMORY CARD CONTROL DEVICE AND METHOD FOR CONTROLLING THE SAME - A memory card control device includes an insertion unit to which a memory card is inserted, a memory card controller to control writing and reading of data to/from the memory card inserted in the insertion unit, an interface controller to send and receive the data written or read to/from the memory card to/from a host computer, a clock supplier to supply a clock signal to the memory card controller and the interface controller, a memory card detector to detect presence or absence of the memory card inserted in the insertion unit, and a low power consumption mode switching unit to switch the memory card controller and the interface controller to a low power consumption mode in response to the absence of the memory card detected by the memory card detector. | 2010-12-23 |
20100325456 | CONTROLLING THE POWER CONSUMPTION OF A RECEIVING UNIT - An average power consumption of receiving units ( | 2010-12-23 |
20100325457 | Quiescent State Retention Mode for Processor - A quiescent state retention mode (QSRM) permits minimal power consumption and dissipation by an electronic device while idle without producing adverse latencies to users or causing system instability. Upon a call to enter the QSRM, processes may be frozen, clocks may be gated, switching regulators may be placed in low power mode, SDRAM may be placed into self-refresh mode, caches may be flushed, IRQs may be disabled, and the system waits for interrupt to wakeup. In the QSRM, powered components include the switching regulator configured to provide power to the processor is maintained in a low power mode while the SDRAM is placed in self-refresh. | 2010-12-23 |
20100325458 | ELECTRIC DEVICE - An electric device is capable of operating in a normal operation mode and a power save operation mode. The electric device includes a first processor for processing information input externally in the normal operation mode, and a second processor for processing an internal operation of the electric device in the normal operation mode. The second processor consumes power smaller than that of the first processor. In the electric device, power of the first processor is restricted through a restriction process in the power save operation mode. Further, in the power save operation mode, the second processor restricts the internal operation and processes the information input externally. When the second processor detects the information input externally, power of the first processor is released through a restriction releasing process. | 2010-12-23 |
20100325459 | PEER-TO-PEER GROUP OWNER ENHANCED POWER MANAGEMENT - A device includes a peer-to-peer group owner processor. The device also includes a memory coupled to the peer-to-peer group owner processor. At least one client associated with the device is a legacy client, and the peer-to-peer group owner processor enters a listening state after a dozing state. The device consumes less power in the listening state than in an awake state. | 2010-12-23 |
20100325460 | HYBRID OPTIMIZED PERSONAL COMPUTER - An Optimized Personal Computer (OPC) system may be a multi-functional processing unit with ultra-low power consumption and may consist of a single chip having a plurality of processors thereon. Each processor may be specialized for tasks including computing, graphic processing and audio processing. The OPC may be connected to a mother board, a memory unit and an I/O interface. The OPC may be connected to a primary PC (either in an expansion slot or in a drive bay) via a USB connection, for example, and be configured to run continuously and take over certain tasks from the primary PC as needed while the primary PC hibernates. The OPC may also be embedded in a monitor or other peripheral devices. | 2010-12-23 |
20100325461 | STORAGE APPARATUS - A storage apparatus connectable to an external apparatus through a connection line for data communication includes: a storage for storing data; a system controller for controlling data communication with the external apparatus through the connection line so as to allow the external apparatus to access the storage; and a power controller for controlling power supply to the storage, wherein the system controller controls the power controller to initiate supply of a power to the storage after establishing a communication linkage with the external apparatus through the connection line. | 2010-12-23 |
20100325462 | INFORMATION PROCESSING APPARATUS CAPABLE OF BEING INSTRUCTED TO POWER OFF BY A COMMAND FROM EXTERNAL APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An image processing apparatus that is capable of being instructed to power off, by a power switch or a command from an external apparatus, and is capable of executing the restart thereof under appropriate conditions. When power-off is instructed, shutdown is started. Upon completion of the shutdown, if the power switch is on, and at the same time the power-off has been instructed by the power switch of the apparatus, the restart of the apparatus is executed, whereas upon completion of the shutdown, if the power-off has been instructed by a command from the external apparatus, the restart of the apparatus is not executed. | 2010-12-23 |
20100325463 | Method and System for Optimized Power Management for a Network Device Supporting PCI-E and Energy Efficient Ethernet - Aspects of a method and system for optimized power management for a network device supporting PCI-E and energy efficient Ethernet are provided. In this regard, in a network interface controller that supports energy efficient Ethernet, a PCI-E core may be transitioned from a low power PCI-E state to a full power PCI-E state when a PHY core in the network interface controller initiates transition from a low power mode to a full power mode and before the PHY core receives an Ethernet packet. In another embodiment, the PHY core in the network interface controller may be transitioned from a low power mode to a full power mode when the PCI-E core initiates transition from a low power PCI-E state to a full power PCI-E state, and before the PCI-E core receives a command to send an Ethernet packet. | 2010-12-23 |
20100325464 | COMPUTER SYSTEM WITH DELAY CIRCUIT - A computer system includes a power supply capable of generating a power good signal, a delay circuit configured to delay the power good signal, a Super I/O chip configured to receive the delayed power good signal; and a front side bus coupled with a terminal voltage signal. A delay time between the delayed power good signal and the terminal voltage signal is not less than a pre-set time limit. | 2010-12-23 |
20100325465 | POWER MANAGEMENT APPARATUS AND METHOD - An information processing apparatus and method include measuring power consumptions of devices and outputting power consumption data, receiving operational conditions of the devices for measuring the power consumptions of the devices, setting the operational conditions of the devices according to application-setting conditions, and executing an application program to measure reference power consumptions for executing the application program. The information processing apparatus includes a power consumption data-transmitting section transmitting power consumption data, a normalized power consumption-calculating section receiving normalized reference power consumption calculated from reference power consumptions of information processing apparatuses, and calculating normalized power consumption from the normalized reference power consumption and the reference power consumptions. | 2010-12-23 |
20100325466 | DISPLAY PANEL DRIVE CIRCUIT, LIQUID CRYSTAL DISPLAY DEVICE, AND METHOD FOR DRIVING DISPLAY PANEL - In at least one embodiment, a display panel drive circuit including a shift register including unit circuits connected in cascade, each of the unit circuits outputting a signal line selection signal, is configured such that: each of the unit circuits receives a clock signal and either a signal line selection signal outputted from another-stage unit circuit or a start pulse signal; and the clock signal has a rising portion which is caused by activation of the clock signal and which is sloped or a falling portion which is caused by activation of the clock signal and which is sloped. With the configuration, it is possible to realize a display panel drive circuit and a display panel driving method each of which hardly causes a poor gate-on pulse signal (which causes unevenness in electric potential during inactivation, for example. | 2010-12-23 |
20100325467 | MEMORY SYSTEM AND CONTROLLER - A memory system, which is connected to a host device, includes a memory, a host interface which receives a command and an address, which are output from the host device, and a controller which operates in one of a first mode in which the controller converts the address which is received by the host interface and accesses the memory by using the converted address, and a second mode in which the host device directly accesses the memory by using the address which is received by the host interface, the controller controlling switching between the first mode and second mode in accordance with the command. | 2010-12-23 |
20100325468 | Memory Unit Access - A system comprises a control unit and a circuit. The circuit comprises an input clock connection for receiving a clock signal from the control unit, a first output clock connection for providing the clock signal to a first memory unit, a second output clock connection for providing the clock signal to a second memory unit, a control connection for receiving a control signal from the control unit. The circuit further comprises multiplexer circuitry connected to the input clock connection, the first and the second clock connections and the control connection. The multiplexer circuitry is configured to react to the control signal from the control unit by providing the clock signal to the first memory unit or the second memory unit. In other words, a clock signal is multiplexed in such a way that only one memory unit at a time receives the clock signal. An effect of this is that in a system having two or more memory units, unique access is provided to one memory unit at a time. | 2010-12-23 |
20100325469 | CLOCK CONTROL DEVICE, CLOCK CONTROL METHOD, CLOCK CONTROL PROGRAM AND INTEGRATED CIRCUIT - An instruction detecting section ( | 2010-12-23 |
20100325470 | Extended Messaging Platform - A message system, including at least one server configured to receive a message from a originating device for delivery to at least one recipient device via a first delivery channel; and wherein the at least one server is further configured to select an alternate delivery channel in the event that delivery of the message via the first delivery channel cannot be effected, is disclosed. The invention further discloses a method for routing messages including the steps of receiving at a server a message from an originating device for delivery to a to at least one recipient; forwarding the message to the at least one recipient device via a first delivery channel; awaiting receipt of acknowledgement message from said least one recipient device, and in the event that no acknowledgment message is received, the at least one server resends the message to said at least one recipient device via an alternate delivery channel. | 2010-12-23 |
20100325471 | HIGH AVAILABILITY SUPPORT FOR VIRTUAL MACHINES - A computer implemented method, a tangible computer storage medium, and a data processing system provide high availability support for virtual machines in a logical partitioned platform. A monitoring system detect a failure in the virtual machine. Partition management firmware then restarts the virtual machine in a consistency failover image node utilizing a consistency failover image. If a subsequent failure of the virtual machine is detected within a predetermined time, partition management firmware restarts the virtual machine in a boot failover image node utilizing a boot failover image. | 2010-12-23 |
20100325472 | Autonomous System State Tolerance Adjustment for Autonomous Management Systems - In general, the techniques of this invention are directed to determining whether a component failure in a distributed computing system is genuine. In particular, embodiments of this invention analyze monitoring data from other application nodes in a distributed computing system to determine whether the component failure is genuine. If the component failure is not genuine, the embodiments may adjust a fault tolerance parameter that caused the component failure to be perceived. | 2010-12-23 |
20100325473 | REDUCING RECOVERY TIME FOR BUSINESS ORGANIZATIONS IN CASE OF DISASTERS - An aspect of the present invention reduces the recovery time for business organizations in case of disasters. In one embodiment, a disaster recovery system containing a primary site and a backup site (implemented as a cluster) is maintained. Application instances are executed in both the primary site and the backup site, with the number of instances executed on the backup site being fewer than that executed on the primary site. During normal operation, user requests received are processed using only the instances executing in the primary site, while the instances executing in the backup site are used in a standby state. On identifying that a disaster has occurred, the user requests received immediately after identification of the disaster are processed using only the instances executing in the backup site. The cluster at the backup site is then scaled out to add application instances until a desired level/percentage is achieved. | 2010-12-23 |
20100325474 | SYSTEMS AND METHODS FOR FAILOVER BETWEEN MULTI-CORE APPLIANCES - The present disclosure presents systems and methods for maintaining operation of a first multi-core appliance | 2010-12-23 |
20100325475 | Digital Network Quality Control System Utilizing Feedback Controlled Flexible Waveform Shape for the Carrier Signal - A digital network quality control system and method utilizing feedback controlled flexible waveform shape for the carrier signal is provided. The system and method provides self-analysis and feedback to a variable waveform to increase network reliability and speed by modifying the shape of the waveform itself based on a self analysis of the waveform. | 2010-12-23 |
20100325476 | SYSTEM AND METHOD FOR A DISTRIBUTED OBJECT STORE - An improved system and method for flexible object placement and soft-state indexing of objects in a distributed object store is provided. A distributed object store may be provided by a large number of system nodes operably coupled to a network. A system node provided may include an access module for communicating with a client, an index module for building an index of a replicated data object, a data module for storing a data object on a computer readable medium, and a membership and routing module for detecting the configuration of operable nodes in the distributed system. Upon failure of an index node, the failure may be detected at other nodes, including those nodes that store the replicas of the object. These nodes may then send new index rebuilding requests to a different node that may rebuild the index for servicing any access request to the object. | 2010-12-23 |
20100325477 | I/O DEVICE SWITCHING METHOD - An I/O device management table that manages the types of I/O devices connected to an I/O switch is provided, and one or plural unallocated I/O devices are defined and registered as standby I/O devices. When a failure occurs in any of I/O devices, the I/O device management table is used to select an I/O device of the same type as the failed I/O device from the standby I/O devices, and the selected I/O device is allocated to a computer to which the failed I/O device is connected. I/O device management can be eased at failure in a computer including an I/O switch device. | 2010-12-23 |
20100325478 | DISK CONTROLLER AND DISK CONTROL METHOD - A disk controller for controlling disk devices for storing redundant data distributed thereacross, the disk devices providing a logical volume, the disk devices including pool volumes allocatable to one of the logical volume. The disk controller includes a memory for storing information indicating a relationship between the pool volumes and the logical volume; and a processor for performing data reconstruction in accordance with a failure of the disk devices, a process of the data reconstruction, the processor being configured to detect an error in a part of the pool volumes included in the other disk devices when reading data from the pool volumes included in the other disk devices, determine whether the detected pool volume is allocated to the logical volume in reference to the information, and initialize the part of the detected pool volume when the detected pool volume is unallocated to the logical volume. | 2010-12-23 |
20100325479 | PROGRAM FAILURE RECOVERY - A program failure is detected during programming of a memory device. When the program failure is detected, a transfer of the contents of a register of the memory device to a first location of a memory of the memory device is stopped. First data that remains in the register after the program failure is detected is transferred to a second location of the memory. At the second location of the memory, the first data is combined with second data from the first location of the memory that remains in the first location of the memory after the program failure is detected to reconstruct third data that was originally intended to be programmed in the first location before the program failure was detected. | 2010-12-23 |
20100325480 | FAILOVER CONTROL OF DUAL CONTROLLERS IN A REDUNDANT DATA STORAGE SYSTEM - A redundant data storage system is provided comprising a first controller with top-level control of a first memory space and a second controller with top-level control of a second memory space different than the first memory space. The system is adapted for asynchronously reflectively writing state information by the first controller to the second memory space; alternatively the system is adapted for asynchronously reflectively writing state information by the second controller to the first memory space. A method is provided for operating the redundant data storage system by resolving any inconsistency between the existing state information and a modified state information associated with a state information change request, and for switching control in the redundant data storage system between the controllers. | 2010-12-23 |
20100325481 | DEVICE HAVING REDUNDANT CORE AND A METHOD FOR PROVIDING CORE REDUNDANCY - A device and a method for providing core redundancy, the device includes: multiple cores; a core operability unit adapted to indicate an operability of each core out of the multiple cores; and a core control signal unit adapted to provide mapping signals that comprise virtual core to physical core mapping signals and physical core to virtual core mapping signals; wherein each core out of the multiple cores comprises at least one interrupt interface, and a crossbar interface which are responsive to at least one mapping signal. | 2010-12-23 |
20100325482 | METHOD AND APPARATUS FOR BOOTING TO DEBUG IN PORTABLE TERMINAL - A booting method and an apparatus thereof for debugging in a portable terminal are provided. The method includes, when a booting event occurs; stacking a boot loader in a preset boot loader region of a Random Access Memory (RAM), and executing, and stacking an Operating System (OS) in a preset OS region of the RAM, wherein the boot loader region and the OS region of the RAM are set such that they do not overlap each other. | 2010-12-23 |
20100325483 | NON-FAULTING AND FIRST-FAULTING INSTRUCTIONS FOR PROCESSING VECTORS - The described embodiments include a processor that handles faults during execution of a vector instruction. The processor starts by receiving a vector instruction that uses at least one vector of values that includes N elements as an input. In addition, the processor optionally receives a predicate vector that includes N elements. The processor then executes the vector instruction. In the described embodiments, when executing the vector instruction, if the predicate vector is received, for each element in the vector of values for which a corresponding element in the predicate vector is active, otherwise, for each element in the vector of values, the processor performs an operation for the vector instruction for the element in the vector of values. While performing the operation, the processor conditionally masks faults encountered (i.e., faults caused by an illegal operation). | 2010-12-23 |
20100325484 | STORAGE SYSTEM THAT FINDS OCCURRENCE OF POWER SOURCE FAILURE - One or more switches are interposed between a controller portion and a storage device. When transmission of a command to a certain storage device fails, a command is transmitted starting from an upstream side to a downstream side of a path between the controller portion and the switch to which the certain storage device is connected, and when command transmission fails while transmitting a command from a k | 2010-12-23 |
20100325485 | SYSTEMS AND METHODS FOR STATEFUL SESSION FAILOVER BETWEEN MULTI-CORE APPLIANCES - The present disclosure presents systems and methods for maintaining operation of stateful sessions by a secondary multi-core appliance upon failover of a first multi-core appliance. A stateful session failover module of primary appliance may receive session states from each of the cores of the primary appliance. The stateful session failover module may communicate the session states of the cores of the primary appliance to a stateful session failover module of the secondary appliance. The stateful session failover module of the secondary appliance may update each of the cores of the secondary appliance with the session states. Upon failover, cores of the secondary appliance may maintain operation and features of the sessions handled by the primary appliance prior to failover using the received state sessions for each session maintained. | 2010-12-23 |
20100325486 | SYSTEMS AND METHODS FOR PROVIDING REDUNDANCY IN COMMUNICATIONS NETWORKS - A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message. | 2010-12-23 |
20100325487 | METHOD AND SYSTEM FOR AUTOMATICALLY DIAGNOSING FAULTS IN RENDERING DEVICES - A method and system for automatically determining an optimal re-training interval for a fault diagnoser based on online monitoring of the performance of a classifier. The classifier generates a soft measure of membership in association with a class based on a training data. The output of the classifier can be utilized to assign a label to new data and then the members associated with each class can be clustered into one or more core members and potential outliers. A statistical measure can be utilized to determine if the distribution of the outliers is sufficiently different than the core members after enough outliers have been accumulated. If the outliers are different with respect to the core members, then the diagnoser can be re-trained; otherwise, the output of the classifier can be fed to the fault diagnoser. | 2010-12-23 |
20100325488 | FUZZY LOGIC APPROACH IN TEMPORAL FAULT REASONING AND APPLICATION IN AIR HANDLING UNITS - A system that transforms information into fuzzy observable states. These states may be matched against a mapping table which indicates which observable state admits or excludes particular faults. This information may be processed over time when in each time instant the admitted or excluded faults are used for updating the rate for each fault. | 2010-12-23 |
20100325489 | FAULT ANALYSIS APPARATUS, FAULT ANALYSIS METHOD, AND RECORDING MEDIUM - The present invention determines the type of each piece of system information including a plurality of index values indicative of abnormality levels of a monitoring target device, as follows. The system information and identification information for the system information are sequentially received from the monitoring target device configured to sequentially output the system information together with the identification information for the system information. The piece of the received system information is compared with a predetermined determination criterion and thus determined to be of a particular type based on a result of the comparison. The determined type is output in association with the identification information. Input information indicative of a true type is accepted and stored in association with the identification information. The determination criterion is updated based on the piece of the system information and the information indicative of the true type. In the type determination procedure, an index value irrelevant to the abnormality level of the monitoring target device is included in the piece of the system information for comparison with the determination criterion. | 2010-12-23 |
20100325490 | System and method to view crash dump information using a 2-d barcode - In some embodiments, the invention involves a system and method for the generation and use of a compact crash dump that can be viewed and/or captured as a two-dimensional (2-D) high contrast graphical barcode. When an error is detected, machine context and other relevant information is formatted for entry to a barcode generator unit. The a barcode generator unit received formatted text or codes, and outputs a 2-D barcode for visible capture. The barcode image is ultimately transformed into an electronic image which may be sent to an error reporting site, or individual. The error reporting site uses a decoding unit to decode the high contrast graphical image of the 2-D barcode. The resulting decoded information provides an analyst, or automated system with information relevant to debugging the error. Other embodiments are described and claimed. | 2010-12-23 |
20100325491 | MINING A USE CASE MODEL BY ANALYZING ITS DESCRIPTION IN PLAIN LANGUAGE AND ANALYZING TEXTURAL USE CASE MODELS TO IDENTIFY MODELING ERRORS - A system and method for identifying modeling errors in textual use case description analyze an input text describing a use case and create an application model representing the use case, the application model containing information obtained from analyzing the input text describing the use case. The application model may be automatically analyzed using automatic process and one or more errors in the use case and/or reports about the use case may be generated. In one aspect, processing components may be integrated into a user development environment to allow developing use cases and improving them incrementally and/or iteratively as information is identified about the use cases. | 2010-12-23 |
20100325492 | Identification Of Elements Of Currently-Executing Component Script - An apparatus ( | 2010-12-23 |
20100325493 | ROOT CAUSE ANALYSIS METHOD, APPARATUS, AND PROGRAM FOR IT APPARATUSES FROM WHICH EVENT INFORMATION IS NOT OBTAINED - In the system management server, an information processing apparatus that is an event-information acquisition target is registered as a monitored apparatus in configuration information; event information that complies with a rule stored in advance is identified from among a plurality of pieces of event information stored in the system management server; a server apparatus for a network service related to the event information is identified; and a message is displayed which indicates that the cause of the event that occurred in a client information processing apparatus which has generated event information is an event related to the network service, which occurred in the server apparatus. | 2010-12-23 |
20100325494 | INFORMATION PROCESSING APPARATUS, PROCESS VERIFICATION SUPPORT METHOD, AND COMPUTER PRODUCT - An information processing apparatus includes a detecting unit configured to detect an abort signal among signals from a kernel that monitors execution of a process by referring to details concerning the execution; an obtaining unit configured to obtain information that concerns the details concerning the execution of the process and is referred to by the kernel at a detection of the abort signal by the detecting unit; and a storing unit configured to store the information obtained by the obtaining unit into a memory. | 2010-12-23 |
20100325495 | SYSTEMS AND METHOD FOR TRANSACTION STALL DETECTION AND PROPAGATING THE RESULT IN A MULTI-CORE ARCHITECTURE - The present invention is directed towards systems and methods for determining failure in and controlling access to a shared resource in a multi-core system. In some embodiments of a multi-core system, individual cores may share the same resource. Additionally, the resource may occasionally fail or need to be reset, and the period during which the resource is being reset may be non-instantaneous. In an embodiment without coordination between the cores, one core experiencing a failure may reset the resource. During the period in which the resource is resetting, another core may interpret the reset as a failure and reset the resource. As more cores interpret the resets as failures, they will trigger resets, quickly resulting in the resource being constantly reset and unavailable. Thus, in some embodiments, a coordination system may be utilized to determine failure of a shared resource and control resets and access to the shared resource. | 2010-12-23 |
20100325496 | SYSTEM AND METHOD FOR AUTOMATICALLY DEPLOYING A NETWORK DESIGN - A system and method for automatically deploying a network design is provided. Design deployment may be automated by a system that receives a machine-readable network design as an input, validates design topology requirements, and automatically deploys the design over actual hardware elements without manual intervention. Thus, the system and method provided may eliminate errors and streamline network design deployment, which may be particularly useful in a network characterized by a complex design, which may be difficult and tedious to configure manually. | 2010-12-23 |
20100325497 | USING FRACTIONAL SECTORS FOR MAPPING DEFECTS IN DISK DRIVES - Herein described is at least a method and system for processing a read or write operation when one or more defects are mapped using one or more fractional sectors. The method comprises using one or more fractional sectors to map defects and to store data symbols. Furthermore, a first algorithm is used for translating a logical block address into a physical starting location such that one or more fractional sectors may be processed during a read or write operation. A second algorithm is used for temporally processing one or more portions of a track of a disk drive, wherein the one or more portions may comprise one or more defective fractional sectors, non-defective fractional sectors, frame remainders, and servo sectors. The system comprises a memory, a processor, and software resident in said memory. The process executes the software that implements the first and second algorithms. | 2010-12-23 |
20100325498 | MEMORY SYSTEM - A memory system includes a nonvolatile memory, a control circuit that controls the nonvolatile memory, an MPU that controls the control circuit, and an interface circuit that performs communication with a host according to an aspect of the preset invention, wherein the control circuit includes a reading unit that outputs a read enable signal to the nonvolatile memory to read data; a delay unit that delays a signal obtained by returning the read enable signal and outputs the signal as a clock, and a latch unit that latches and outputs the data read from the nonvolatile memory by using the clock output from the delay unit. | 2010-12-23 |
20100325499 | CPU VOLTAGE TESTING SYSTEM AND METHOD THEREOF - A CPU voltage testing system and method uses a parameter storing unit to store a number of VID codes and a plurality of allowable voltage ranges. A number of VID code control signals corresponding to the number of the VID codes are sent to a VID code coding unit to control a voltage converting module to output corresponding voltage signals to a CPU. A voltage collecting unit collects CPU core voltages of the CPU and outputs the collected CPU core voltages to a data processing unit. The data processing unit can determine whether the collected CPU core voltages are within the plurality of allowable voltage ranges via comparing with a number of testing parameters stored in the parameter storing unit. | 2010-12-23 |
20100325500 | Detecting and Recovering from Silent Data Errors in Application Cloning Systems - A method, system, and article for resolving a silent error is disclosed. A primary program copy runs on a primary host, and a secondary program copy runs on a secondary host. The primary and secondary copies communicate to maintain synchronized execution. A third copy of the data is stored on a storage device as a write operations log and maintained in memory on the primary host while the program is running. The primary copy is synchronized with the secondary copy by computing a first checksum of data on the primary host in response to a read operation local to the primary host, computing a second checksum of data on the secondary host in response to a read operation local to the secondary host, and periodically communicating the first checksum to the secondary host, and resolving any discrepancies between the first and second checksum of data reflecting a silent data error. | 2010-12-23 |
20100325501 | DATA PROCESSING METHOD AND DATA PROCESSOR - A data processing method includes checking an error on a first header, and determining whether or not to correct the error on the first header based on an error correction count for an first error correction processing block including the first header. | 2010-12-23 |