Patent application number | Description | Published |
20090132827 | DEBUGGING PORT SECURITY INTERFACE - The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted. | 05-21-2009 |
20090132874 | SYSTEM AND METHOD FOR TESTING A DATA STORAGE DEVICE WITHOUT REVEALING MEMORY CONTENT - A system and method for testing a data storage device without revealing memory content. To control the individual bits of the memory during testing each value is written into the memory according to the equation | 05-21-2009 |
20100005232 | MEMORY CONTROLLER INTERFACE - A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and SRAM memory devices to instead operate using NAND flash and SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor. | 01-07-2010 |
20100119065 | METHOD AND SYSTEM FOR SECURING DATA UTILIZING REDUNDANT SECURE KEY STORAGE - A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available. | 05-13-2010 |
20100119066 | METHOD AND SYSTEM FOR SECURING DATA UTILIZING REDUNDANT SECURE KEY STORAGE - A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available. | 05-13-2010 |
20120072651 | MEMORY CONTROLLER INTERFACE - A memory controller interface, mobile device and method are provided. The memory controller interface can allow a processor designed and configured to operate with NOR flash and static random access memory SRAM devices to instead operate using NAND flash and synchronous dynamic random access memory SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor. Boot code is stored in memory accessible to the processor and is read out of the memory for execution. The boot code is scanned for a predetermined signature, and if the predetermined signature is found, a portion of the memory is write-protected. | 03-22-2012 |
20120278630 | DEBUGGING PORT SECURITY INTERFACE - The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted. | 11-01-2012 |
20130028414 | METHOD AND SYSTEM FOR SECURING DATA UTILIZING REDUNDANT SECURE KEY STORAGE - A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available. | 01-31-2013 |
20140013124 | ON-CHIP STORAGE, CREATION, AND MANIPULATION OF AN ENCRYPTION KEY - A system and method for encrypting data provides for retrievial of an encryption key; identification of the address in memory of a first portion of the data to be encrypted; derivation of a first unique key from the encryption key and the address of the first portion of data; encryption of the first portion of data using the first unique key; identification of the address in memory of a second portion of data to be encrypted; derivation of a second unique key from the encryption key and the address of the second portion of data; and encryption of the second portion of data using the second unique key. | 01-09-2014 |
Patent application number | Description | Published |
20130273921 | METHOD AND APPARATUS FOR DETERMINING INCORRECT ANTENNA CONFIGURATION WITHIN A CELLULAR COMMUNICATION NETWORK - A system and method of determining incorrect antenna configuration within a cellular communication network. The method comprises obtaining crowd-sourced data comprising at least one geographical characteristic for a coverage area of at least one cell sector of the cellular communication system, verifying whether the at least one crowd-sourced geographical characteristic for the coverage area of the at least one cell sector is consistent with network configuration data for the at least one cell sector, and identifying a potentially incorrect antenna configuration for the at least one cell sector if the at least one crowd-sourced geographical characteristic for the coverage area of the at least one cell sector is inconsistent with the network configuration data therefor. | 10-17-2013 |
20140287739 | METHOD AND APPARATUS FOR MANAGING CALL DATA - A data management system and method of managing call data for at least one radio network element within a cellular communication network. The method comprises receiving geolocation associated call data for at least one call within the at least one cellular communication network, arranging the received geolocation associated call data for the call into at least one call data record, and writing the at least one call data record to at least one data storage device, The geolocation associated call data for the at least one call comprises at least two spatial coordinate values for an at least two dimensional spatial reference, and the method comprises indexing the at least one call data record within the at least one data storage device using a single dimensional coordinate value. | 09-25-2014 |
20140287740 | METHOD AND APPARATUS FOR MANAGING CALL DATA - A data management system method of managing call data for at least one radio network element within a cellular communication network. The method comprises receiving call data for at least one call from the at least one radio network element within the cellular communication network, arranging the received call data into call data records, assembling the call data records into at least one data block, and writing the at least one data block to at least one data storage device. The method further comprises, upon receipt of a call data query, retrieving call data records from the at least one data storage device on a per data block basis. | 09-25-2014 |
20140287741 | METHOD AND APPARATUS FOR MANAGING CALL DATA - A data management system and method of managing call data for at least one radio network element within a cellular communication network. The method comprising receiving call data for at least one call from the at least one radio network element within the cellular communication network, arranging the received call data into call data records of a non-fixed size, and writing the call data records to at least one data storage device such that the call data records are stored adjacent one another. | 09-25-2014 |
20150161148 | METHOD AND APPARATUS FOR MANAGING DATA - A method of managing data for at least one wireless communication network and a data management system for implementing such a method are provided. The method comprises determining at least one free space metric for at least one data storage device and comparing the at least one determined free space metric for the at least one data storage device to at least one threshold value. If the at least one determined free space metric for the at least one data storage device exceeds the at least one threshold value, the method further comprises identifying data object groups represented by data objects stored within the at least one data storage device, determining a retention priority value for each identified data object group, determining at least one data object group for which to retire data objects based at least partly on the determined retention priority values, and retiring data objects within the determined at least one data object group from the at least one data storage device. | 06-11-2015 |
20150163696 | METHOD AND APPARATUS FOR ENABLING NEAR REAL TIME DATA ANALYSIS - A method and apparatus for enabling near real time analysis of data for a wireless communication network using dynamic allocation backend processing resources. The method comprises, at each of a plurality of distributed components of a data processing system, receiving data from at least one network element of the cellular communication network, parsing the received data to extract a subset of the received data, and forwarding the extracted subset of data to the dynamic allocation backend processing resources for analytical processing of the extracted subset of data for the wireless communication network. | 06-11-2015 |
20150163721 | METHOD AND APPARATUS FOR PROCESSING DATA - A method of processing data for at least one wireless communication network and a data processing system for implementing such a method are provided. The method comprises determining geolocation information for data segments received at a plurality of distributed components of a data processing system, the data segments being received from at least one network element of the wireless communication network, and forwarding the data segments to backend processing resources based at least partly on their respective geolocation information. | 06-11-2015 |
Patent application number | Description | Published |
20120194831 | CONVERSION ARRAYS FOR PRINT IMAGE DATA TRANSFORMATION - Systems and methods for using conversion arrays to transform image in print jobs to different color depths. In one embodiment, the system stores a plurality of conversion arrays for converting images of print jobs encoded according to a page description language. The system receives a print job encoded according to the page description language, locates an image in the encoded print job, and identifies an existing color depth of the image, a pel color range, and a desired output color depth for the image. The system further selects a conversion array from the memory based on at least one of the existing color depth of the image, the pel color range, and the desired output color depth, and converts the image from the existing color depth of the image to the desired output color depth using the conversion array. The system further transmits the converted image for printing. | 08-02-2012 |
20120314240 | SERIAL RASTER IMAGE PROCESSORS USED FOR ERROR CORRECTION IN A PARALLEL RASTER IMAGE PROCESSOR ENVIRONMENT - Systems and methods are provided for error correction in a parallel RIP environment. The system is operable to receive a print job comprising logical pages, to separate the logical pages into segments, to distribute the segments to parallel RIPs for interpretation and rasterization, and to transmit the segments to a serial RIP for interpretation. The system is further operable to determine that a parallel RIP has encountered a dependency error that prevents the parallel RIP from rasterizing one of the segments, and to instruct the serial RIP to rasterize the one segment responsive to detecting the dependency error. | 12-13-2012 |
20130021623 | PROCESSING MULTI-PAGE SEGMENTS IN A PARALLEL RIP ENVIRONMENT WITH A SERIAL RIP - Systems and methods are provided for error correction in a parallel RIP environment. The system comprises parallel RIPs and a serial RIP. The system receives a print job comprising logical pages, separates the print job into segments of logical pages, and distributes the segments to the parallel RIPs for interpretation and rasterization. The system further determines that a parallel RIP has encountered an error indicating that a segment includes multiple logical pages, and instructs the serial RIP to rasterize the segment responsive to detecting the error. | 01-24-2013 |