Patent application number | Description | Published |
20110018623 | INTEGRATED CIRCUIT PACKAGE - An integrated circuit combination, comprising first and second integrated circuit dies with respective first and second control register banks, and a path for external control data, within said combination, coupling a first data interface on said first die, which receives the external control data, to the first and second control register banks. | 01-27-2011 |
20110022826 | POWER MANAGEMENT APPARATUS AND METHODS - Apparatus and method for power management and especially to power management integrated circuits (PMICs). In one aspect, the invention relates to a PMIC having an internal non-volatile memory (NVM) for storing boot settings for the PMIC. The PMIC also has control circuitry for detecting whether a source of boot settings is available, such as an NVM external to the PMIC, and, if so, using any settings stored in the external source in preference to the relevant settings stored in the internal NVM. The external settings can thus override any internal settings, which is useful for fault diagnosis and/or development. In one aspect the PMIC may have programming circuitry for automatically programming boot settings from an external source into the internal NVM. | 01-27-2011 |
20110022859 | POWER MANAGEMENT APPARATUS AND METHODS - Power management integrated circuits (PMICs) and related methods. In one aspect a PMIC which is operable to provide a plurality of PMIC power states is arranged to provide a predetermined delay before a power state transition. The delay is applied after receipt by the PMIC control circuitry of a power state transition command. Applying a delay allows time for the system powered by the PMIC to perform any necessary shut-down procedures and terminate active processes before power is removed, preventing corruption of the system. The delay is preferably configurable. The PMIC may also be arranged to control power converters which are external to the PMIC. In another aspect the PMIC has translation circuitry for providing the control settings of one power block, e.g. power converter, with any necessary modifications to be used by another power block. This means that only one set of control settings needs to be updated to change the output of both power blocks simultaneously. | 01-27-2011 |
20110276975 | AUDIO DEVICE - An audio device is provided that is arranged for communication of data and signalling with a controller, signalling from the device to the controller being made in discrete time slots, the device comprising: a plurality of nodes, each assigned a priority value and each having one or more unsolicited response sources capable of generating an unsolicited response for transmission to the controller, wherein unsolicited responses generated from a particular node are assigned the priority value of that node; and unsolicited response management means operable to hold unsolicited responses generated by the plurality of nodes that are awaiting transmission to the controller, wherein when two or more unsolicited responses are awaiting transmission to the controller in the unsolicited response management means, the device is arranged to transmit the unsolicited response with the highest assigned priority value first, in the next free time slot. | 11-10-2011 |
Patent application number | Description | Published |
20100064347 | METHODS AND SYSTEMS FOR PROTECT AGENTS USING DISTRIBUTED LIGHTWEIGHT FINGERPRINTS - The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of lightweight fingerprint databases (LFD) to maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the LFD is stored locally at the site of each protect agent such that the organization's secure information can be protected even when a protect agent is disconnected from the network. Methods and systems to compress fingerprints to achieve the lightweight fingerprint databases are also provided. In one embodiment, a combined approach, utilizing both the local lightweight fingerprint database and a remote fingerprint server comprising registered fingerprints is used to achieve overall protection of the organization's secure information. | 03-11-2010 |
20100064372 | METHODS AND SYSTEMS TO IMPLEMENT FINGERPRINT LOOKUPS ACROSS REMOTE AGENTS - The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of fingerprint servers to remotely maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the protect agents transmit fingerprints associated with the user's information to the fingerprint server utilizing a local network or the public internet. The protect agents then receive a comparison analysis from the fingerprint servers and execute appropriate security action based on the analysis. In one embodiment, a combination of the local network and public internet is utilized to achieve remote agent lookups. | 03-11-2010 |
20100124354 | METHODS AND SYSTEMS FOR IMAGE FINGERPRINTING - The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment, methods and systems to generate image fingerprints are provided. The fingerprints are generated for each feature point of an image data. Because the fingerprints take into account the neighborhood features around each feature point, the image fingerprints are robust against derivate images where the original image may have been altered. Methods and systems to maintain a fingerprint database for an organization's secure image data is also provided. In one embodiment, client fingerprints are generated for image data that a user intends to transmit outside of the organization. In some embodiments, suitable security actions are initiated if any of the client fingerprints match any of the fingerprints in the fingerprint database. | 05-20-2010 |
20100299727 | METHODS AND SYSTEMS FOR EXACT DATA MATCH FILTERING - A technique for efficiently preventing exact data words (“entities”) from unauthorized disclosure is disclosed. Protect agents installed at various egress points identify candidate entities from digital information desired to be disclosed by a user. The candidate entities are compared against registered entities stored in a lightweight entity database (LWED). If a candidate entity matches against a registered entity in the LWED, the protect agent initiates a security action. Alternately, the protect agent transmits the matching candidate entity to a global entity database (GED) server to receive additional confirmation on whether the candidate entity matches a registered entity. In some instances, the protect agent also receives (from the GED server) metadata information associated with the matching candidate entity. The protect agent utilizes the metadata information to initiate suitable security actions. | 11-25-2010 |
20130064418 | METHODS AND SYSTEMS FOR IMAGE FINGERPRINTING - The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment, methods and systems to generate image fingerprints are provided. The fingerprints are generated for each feature point of an image data. Because the fingerprints take into account the neighborhood features around each feature point, the image fingerprints are robust against derivative images where the original image may have been altered. Methods and systems to maintain a fingerprint database for an organization's secure image data is also provided. In one embodiment, client fingerprints are generated for image data that a user intends to transmit outside of the organization. In some embodiments, suitable security actions are initiated if any of the client fingerprints match any of the fingerprints in the fingerprint database. | 03-14-2013 |
20150286831 | METHODS AND SYSTEMS FOR PREVENTING TRANSMISSION OF SENSITIVE DATA FROM A REMOTE COMPUTER DEVICE - A technique for preventing selected sets of data words from unauthorized transmission out of the secure perimeter of a computer system is disclosed. A set of security rules is applied to an outgoing data message and if one of the set of rules is triggered, at least a portion of the message is transmitted to a central server that is within the secure perimeter, for scanning by another set of security rules. The central server then sends a security command back to the remote device, which executes the security command before transmitting the outgoing message out of the secure perimeter of the computer system. | 10-08-2015 |
Patent application number | Description | Published |
20130304943 | METHOD FOR BROADCAST PROCESSING WITH REDUCED REDUNDANCY - A method for broadcast forwarding in a SAS topology having a zoned portion of a service delivery system (ZPSDS) is disclosed. The ZPSDS includes at least a first zoning expander and a second zoning expander. The method includes originating a broadcast primitive on the first zoning expander; forwarding solely the broadcast primitive to the second zoning expander from the first zoning expander; initiating a discovery process from the second zoning expander upon receiving the broadcast primitive; and generating a source zone group list upon completion of the discovery process. | 11-14-2013 |
20140136739 | METHODS AND APPARATUS FOR FAST CONTEXT SWITCHING OF SERIAL ADVANCED TECHNOLOGY ATTACHMENT IN ENHANCED SERIAL ATTACHED SCSI EXPANDERS - Methods and apparatus for enabling Fast Context Switching (FCS) operation of an enhanced Serial Attached SCSI (SAS) expander and initiator for switching between one or more concurrently established connections including at least one Serial Advanced Technology Attachment (SATA) target device connection. Features and aspects hereof provide for enhanced logic within a SAS expander and/or initiator to detect the completion of an exchange over a first connection between an initiator device and a SATA target device and to allow switching to another (a second) connection without closing the first connection. | 05-15-2014 |
20140143472 | Method to Facilitate Fast Context Switching for Partial and Extended Path Extension to Remote Expanders - A method, apparatus, and system for switching from an existing target end device to a next target end device in a multi-expander storage topology by using Fast Context Switching. The method enhances Fast Context Switching by allowing Fast Context Switching to reuse or extend part of an existing connection path to an end device directly attached to a remote expander. The method can include reusing or extending at least a partial path of an established connection between an initiator and the existing target end device for a connection between the initiator and the next target end device, whereby the existing target end device and the next target end device are locally attached to different expanders. | 05-22-2014 |
20140188969 | Efficient Algorithm to Bit Matrix Symmetry - An algorithm that maintains the symmetry of a symmetric bit matrix stored in computer memory without having to process all of the elements of a transpose column by considering only the elements changed in a row. The algorithm operates on groups of bits forming rows of the matrix rather than processing the individual bit elements of the matrix. Instead of checking whether each bit needs to be modified, the algorithm toggles only the column bits that are the transpose elements of modified row elements, thereby taking advantage of the existing symmetry to eliminate unnecessary conditional operations. As a result, the algorithm modifies the matrix on a row-by-row basis and makes changes to only those column bits that correspond to modified row elements without having to check the value of the transpose column elements that do not require modification. | 07-03-2014 |
20140244875 | Priority Based Connection Arbitration in a SAS Topology to Facilitate Quality of Service (QoS) in SAS Transport - A method of priority based connection arbitration in a SAS topology is disclosed introducing a PRIORITY field to an SAS open Address Frame (OAF). As the expander arbitrates the multiple OAFs in competition for an Expander Link, it compares the PRIORITY fields of the arbitrating OAFs. The OAF with highest value of PRIORITY is awarded the destination connection path. In case of equal PRIORITY, the next arbitration is based on the value of Arbitration Wait Time (AWT). This priority based arbitration ensures high availability of SAS connection links to the SAS targets with high priority OAFs which in turn will lead to better quality of service for those SAS targets. PRIORITY field in the OAF is set by the SAS targets based on the current OAF priority and also set by directly attached SAS storage expanders through a modification of the OAF during transit through the expander. | 08-28-2014 |
20140258572 | PREEMPTIVE CONNECTION SWITCHING FOR SERIAL ATTACHED SMALL COMPUTER SYSTEM INTERFACE SYSTEMS - Methods and structure for preemptively terminating Serial Attached Small Computer System Interface connections are provided. One exemplary embodiment includes an expander comprising multiple physical links, switching circuitry able to establish connections between end devices coupled with the expander through the physical links, and a connection manager. The connection manager is able to process an Open Address Frame from an end device, and to determine that the Open Address Frame requests a connection through a physical link that is already servicing an established connection. The connection manager is further able to determine that the Open Address Frame requests a higher priority connection than the established connection, and to direct one of the end devices utilizing the established connection to terminate the established connection based on the higher priority. | 09-11-2014 |
20150033074 | DEADLOCK DETECTION AND RECOVERY IN SAS - Systems and methods herein provide for managing devices through a Serial Attached Small Computer System Interface (SAS) expander. The SAS expander includes a processor adapted to detect deadlock conditions in a SAS environment. In one embodiment, the SAS expander is operable to detect an Open Address Frame associated with a connection request from a source device to a destination device. The Open Address Frame includes a source address and a destination address associated with the source device and the destination device, respectively. The expander receives an arbitration in progress status on a partial pathway that is associated with the connection request. The expander is further operable to modify the Open Address Frame to include a deadlock indicator and forward the modified Open Address Frame on the partial pathway. When the modified Open Address Frame is received, the expander initiates pathway recovery upon determination that the deadlock indicator is valid. | 01-29-2015 |
20150039796 | ACQUIRING RESOURCES FROM LOW PRIORITY CONNECTION REQUESTS IN SAS - Systems and methods herein provide for managing connection requests through a Serial Attached Small Computer System Interface (SAS) expander. In one embodiment, the expander receives a low priority open address frame (OAF) that includes a source address and a destination address. The expander also receives a high priority OAF that includes a source address and a destination address. The high priority OAF requires at least a portion of a partial path acquired by the low priority OAF for which connection request arbitration is in progress. The expander determines whether the high OAF source address matches the low OAF destination address, and in response to a determination that the high OAF source address is different than the low OAF destination address, acquires pathway resources from the low priority OAF and forwards the high priority OAF in accordance with its destination address. | 02-05-2015 |
20150195357 | ENHANCING ACTIVE LINK UTILIZATION IN SERIAL ATTACHED SCSI TOPOLOGIES - Methods and systems are provided for enhanced link utilization in attached SCSI (SAS) topologies. A SAS expander may be configured to monitor link utilization within a SAS topology, and may manage connection requests received thereby based on the monitoring of link utilization. The monitoring may comprise determining availability of links for at least one node within the SAS topology with respect to other nodes in the SAS topology. This may be done based on pending connection requests, and/or responses thereto received by the SAS expander. It may also be done based on shared link utilization data. The managing may comprise determining for each received connection request when link unavailability in other nodes within the SAS topology prevents connectivity to a destination node corresponding to the connection request. When this situation occurs, the SAS expander may handle the connection request directly. | 07-09-2015 |
20150227486 | Method to Facilitate Fast Context Switching for Partial and Extended Path Extension to Remote Expanders - A method, apparatus, and system for switching from an existing target end device to a next target end device in a multi-expander storage topology by using Fast Context Switching. The method enhances Fast Context Switching by allowing Fast Context Switching to reuse or extend part of an existing connection path to an end device directly attached to a remote expander. The method can include reusing or extending at least a partial path of an established connection between an initiator and the existing target end device for a connection between the initiator and the next target end device, whereby the existing target end device and the next target end device are locally attached to different expanders. | 08-13-2015 |