03rd week of 2011 patent applcation highlights part 55 |
Patent application number | Title | Published |
20110016224 | METHOD FOR DYNAMIC RATE ADAPTATION BASED ON SELECTIVE PASSIVE NETWORK MONITORING - A method for managing a session over a network that involves multiple end points obtaining services via an application server, the method involving: after the end points have registered with the application server for the session, establishing initial policies for network traffic flows for each end point participating in the session; after establishing the initial policies, determining information about the network traffic flows for at least some of the multiple end points participating in the session; from the information determined about the network traffic flows, identifying which of the multiple end points is functioning as a host server for the session; and after identifying which of the multiple end points is functioning as the host server, establishing new policies for network traffic flows for the multiple end points, wherein under the new policies fewer network resources are reserved for each of the multiple end points other than and as compared to the end point functioning as the host server. | 2011-01-20 |
20110016225 | DIGITAL CONTENT DISTRIBUTION SYSTEM AND METHOD - One embodiment of the present invention sets forth a technique for selecting a content distribution network (CDN) comprising at least one content server, from a plurality of CDNs, and a playing digital content file from the CDN on a content player. Selecting the CDN is based on a rank order of CDNs, an assigned weight value for each CDN, and a bandwidth measured between the content player and each CDN. Advantageously, a given content player may select a CDN based on prevailing network and CDN loading conditions, thereby increasing overall robustness and reliability when downloading digital content file from a CDN. | 2011-01-20 |
20110016226 | Methods and Apparatus for Updating Index Information While Adding and Updating Documents in a Distributed Network - Systems and methods are described herein for updating documents in a distributed network. When a new document needs to be added to the network, or when changes are to be made to an existing document, keywords are extracted from the document and used to generate update messages for each keyword. The nodes responsible for each keyword are determined. The individual update messages are consolidated into a composite update messages that is sent to a first node in the network. The first node extracts those portions of the composite message associated with it, and forwards the composite message to a second node in the network. | 2011-01-20 |
20110016227 | METHOD, NODE, AND SYSTEM FOR NOTIFYING PROXY UPDATE IN WMN - Embodiments of the present invention disclose a method and node for notifying proxy update in a WMN and a WMN for notifying proxy update. By constructing the proxy update add message, where the proxy update add message includes the address of terminal, the current proxy node address after terminal switching and the destination node address of the terminal, and taking the address of the original proxy node before terminal switching as the address of the destination node, and sending the proxy update add message constructed to the original proxy node, where the proxy update add message is used for updating proxy information of the terminal in the proxy information table of the original proxy node to be the current proxy node address. It makes sure that packets received by the original proxy node which should be sent to the terminal could be received by the terminal, and packet loss rate during terminal switching could be reduced. | 2011-01-20 |
20110016228 | APPARATUS, METHOD AND ARTICLE TO PROVIDE ELECTRONIC ACCESS TO INFORMATION ACROSS DISPARATE SYSTEMS IN NETWORKED ENVIRONMENTS - An intermediary system may mediate between two or more end user systems to provide access to electronic information in a format desired by one end user where the other end user employs an at least partially incompatible format. The intermediary system employs an intermediary translation table to identify electronic information that requires translation, and to cause the translation of the electronic information into the desired format. The intermediary system advantageously employs a many-to-many approach, allowing end users to take advantage of mappings created by other end users. The approach advantageously places the burden of defining or creating mappings on the end user desiring access to the electronic information of another end user. | 2011-01-20 |
20110016229 | METHODS AND APPARATUS FOR PROVIDING DATA DISTRIBUTION THAT SUPPORTS AUDITING - The invention is directed to techniques for providing data distribution that supports auditing. Accordingly, a data communications device receives data from a data provider, the data containing label information. The data communications device filters the data based on the label information contained in the data. Next, the data communications device associates token information with the data whereby the token information enables later audits of transmission of the data traveling through the data communications device. Finally, the data communications device transmits the data and the token information toward a data receiver. Filtering of the data results in certain data being removed and/or directed to a specific data receiver based on labels within the data. The data communications device also inserts a signature into the token in order to identify the data communications device transmitting the data in a manner that cannot be forged. | 2011-01-20 |
20110016230 | DATA TRANSFER SYSTEM AND METHOD - A method is disclosed of data transfer between a source computer and multiple target computers. The method includes: transmitting a multi-media formatted transmission from the source computer over a first network to a server configured to receive the multi-media formatted transmission in more than one protocol; converting the multi-media formatted transmission into a data stream in an Internet format by extracting the data stream from the multi-media formatted transmission; transmitting the data stream in the Internet format over a second network to the target computers, the target computers each configured to receive the data stream in a finite set of protocols over the second network, the finite set of protocols including Internet protocols but excluding multi-media protocols; and extracting data from the data stream and reformatting the extracted data into a multi-media format at each target computer, wherein each target computer is able to reformat the extracted data into different multi-media formats, since the reformatting is occurring at each target computer individually. | 2011-01-20 |
20110016231 | Methods and Apparatus for Transcoding Metadata - Methods and apparatus for transcoding metadata are disclosed. An example method disclosed herein to meter media content presented by a media consumption device comprises detecting at a metering device first metadata accompanying the media content presented by the media consumption device, receiving from a transcoder at the metering device second metadata associated with the media content presented by the media consumption device, the second metadata comprising third metadata that has been transcoded to form the second metadata, and processing the first metadata and the second metadata to meter the media content presented by the media consumption device. | 2011-01-20 |
20110016232 | TIME STAMPING APPARATUS AND METHOD FOR NETWORK TIMING SYNCHRONIZATION - A time stamping apparatus and method for network timing synchronization are provided. A receiving apparatus receives data from a transmitting apparatus, generates a synchronization pulse signal synchronized with a local clock of the transmitting apparatus based on the received data, wherein the received data include information regarding the transmission time of the data, measured using the local clock of the transmitting apparatus, and the receiving apparatus measures the reception time of the data using the synchronization pulse signal. Therefore, accurate network timing synchronization may be achieved. | 2011-01-20 |
20110016233 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR INSERTING A GAP IN INFORMATION SENT FROM A DRIVE TO A HOST DEVICE - A system, method, and computer program product are provided for inserting a gap in information sent from a drive to a host device. In operation, one or more commands are received at a drive from a host device. Additionally, information is queued to send to the host device. Furthermore, a gap is inserted in the information to send to the host device such that the host device is capable of sending additional commands to the drive. | 2011-01-20 |
20110016234 | CONTROL SYSTEM AND USER INTERFACE FOR NETWORK OF INPUT DEVICES - Apparatus, methods, and systems for centrally and uniformly controlling the operation of a variety of devices, such as communication, consumer electronic, audio-video, analog, digital, 1394, and the like, over a variety of protocols within a network system and, more particularly, a control system and uniform user interface for centrally controlling these devices in a manner that appears seamless and transparent to the user. In a preferred embodiment, a command center or hub of a network system includes a context and connection permutation sensitive control system that enables centralized and seamless integrated control of all types of input devices. The control system preferably includes a versatile icon based graphical user interface that provides a uniform, on-screen centralized control system for the network system. The user interface, which includes a visual recognition system, enables the user to transparently control multiple input devices over a variety of protocols while operating on a single control layer of an input command device. In an alternative embodiment, the control system also enables gated signal pass-through control while avoiding signal jamming. | 2011-01-20 |
20110016235 | SYSTEM AND METHOD FOR TRANSFORMING PCIE SR-IOV FUNCTIONS TO APPEAR AS LEGACY FUNCTIONS - A system for transforming a single root input/output virtualization (SR-IOV) function to appear as a legacy function, and a corresponding method includes a switch platform coupled between a legacy host and a SR-IOV-enabled device. The switch platform includes a processor programmed to discern configuration cycles by type and to process the configuration cycles, and one or more local registers that store data related to the configuration cycles. | 2011-01-20 |
20110016236 | APPARATUS AND METHOD FOR PRODUCING IDENTIFIERS REGARDLESS OF MIXED DEVICE TYPE IN A SERIAL INTERCONNECTION - A plurality of memory devices of mixed type (e.g., DRAMs, SRAMs, MRAMs, and NAND-, NOR- and AND-type Flash memories) is serially interconnected. Each device has device type information on its device type. A specific device type (DT) and a device identifier (ID) contained in a serial input (SI) as a packet are fed to one device of the serial interconnection. The device determines whether the fed DT matches the DT of the device. In a case of match, a calculator included in the device performs calculation to generate an ID accompanying the fed DT for another device and the fed ID is latched in a register of the device. In a case of no match, the ID generation is skipped and no ID is generated for another device. The DT is combined with the generated or the received ID depending on the device type match determination. The combined DT and ID is as a packet transferred to a next device. Such a device type match determination and ID generation or skip are performed in all devices of the serial interconnection. With reference to device type provided to the interconnected devices, IDs are sequentially generated. The SI containing the DT, the ID and an ID generation command is transmitted in a packet basis to a next device. A memory controller can recognize the total number of one DT, in response to the ID received from the last device. In a case of a “don't care” DT is provided to the interconnected devices, IDs are sequentially generated and the total number of the interconnected devices is recognized, regardless of the differences in DTs of the devices. | 2011-01-20 |
20110016237 | Scales and method for its configuration - The invention relates to a method for configuring the interaction between a balance and input and output devices communicating therewith, comprising a user module for controlling the output devices and interrogating input devices, wherein the interaction functionalities of the balance are defined by the user module. The profile module is automatically coupled to the user module depending data received by the user module. The invention further relates to a balance wherein the above method is used. | 2011-01-20 |
20110016238 | Data Access Apparatus - A data access apparatus includes a detector detects a unit region in a vacant state, out of a plurality of unit regions forming a data recording region, by referring to a plurality of parameter values respectively corresponding to the plurality of unit regions. A determiner determines whether or not a data value of the unit region detected by the detector indicates a predetermined value when the data recording region is a region in which there is a restriction on the number of recording instances. A permitter permits an access process to the data recording region corresponding to an affirmative determined result of the determiner. A first changer changes the parameter value corresponding to the unit region detected by the detector, out of the plurality of parameter values, corresponding to a negative determined result of the determiner. A restarter restarts the detector after the change process of the first changer. | 2011-01-20 |
20110016239 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR REDUCING A RATE OF DATA TRANSFER TO AT LEAST A PORTION OF MEMORY - A system, method, and computer program product are provided for reducing a rate of data transfer to at least a portion of memory. In operation, a rate of degradation of at least a portion of memory associated with a drive is determined. Furthermore, a rate of data transfer to the at least a portion of the memory is reduced, based on the determined rate of degradation. | 2011-01-20 |
20110016240 | Measuring and Analyzing Behavioral and Mood Characteristics in Order to Verify the Authenticity of Computer Users Works - Disclosed is a method of either verifying or rejecting the authenticity of a work submitted through use of a computer. This method involves examining the behavioral and mood biometric characteristics of the person(s) using the computer on which the work was created, while the work was being created. In a specific embodiment, this can be used to detect outsourcing and plagiarism in an online education class. | 2011-01-20 |
20110016241 | UNIVERSAL SERIAL BUS DEVICE - A universal serial bus (USB) device includes a USB interface, a storage unit storing driving programs of the USB device, and a microprocessor unit storing function programs of the USB device. When the USB device is connected to a computer via the USB interface, the microprocessor unit transfers the driving programs to the computer, and the microprocessor unit executes function programs of the USB device, to allow the USB device to communicate with the computer. | 2011-01-20 |
20110016242 | DATA PROCESSING APPARATUS AND DATA PROCESSING METHOD - A data processing apparatus includes a data input unit configured to input data to a ring bus, a data output unit configured to output the data input by the input unit, a first communication processing unit configured to control input of the data by the data input unit to the ring bus and to control output of the data by the data output unit, a plurality of data processing units configured to perform data processing, a plurality of second communication processing units configured to control transmission and reception of the data between the plurality of data processing units and the ring bus, and a control unit configured to independently perform initialization on the plurality of second communication processing units or the plurality of data processing units. | 2011-01-20 |
20110016243 | METHOD AND DEVICE OF LOAD-SHARING IN IRF STACK - The present invention provides a method and device of load-sharing in an IRF stack. The method includes: the Master device checking a congestion state of the main path, obtaining a path for forwarding service flow according the congestion state of the main path, where the path is the main path or a backup path, and forwarding the service flow to the egress device through the main path or the backup bath to implement the load-sharing in the IRF stack. In the embodiments of the present invention, by checking the congestion states of main path and the backup path in real-time, the load-sharing of the IRF stack is implemented. When new service flow is added, the data may be forwarded through another path, which can improve the efficiency of member devices in the IRF stack and solve the problem of forwarding bottleneck to which the member devices face. | 2011-01-20 |
20110016244 | INFORMATION PROCESSING DEVICE AND PROCESSOR - A semiconductor device including: a first slave device; a first master device outputting a first request control signal and a first access address signal; a second master device outputting a second request control signal and a second access address signal; a system bus connected to the first slave device, the first master device and the second master device, and selecting and outputting either the first request control signal or the second request control signal when the first request control signal is outputted from the first master device and the second request control signal is outputted from the second master device; and a range setting register holding an address range of which an access of the first master device is permitted, wherein the system bus blocks the first request control signal if the first access address signal is out of the address range. | 2011-01-20 |
20110016245 | Method and System for Addressing a Plurality of Ethernet Controllers Integrated into a Single Chip Which Utilizes a Single Bus Interface - A method for processing network data is disclosed and may include receiving data via a single bus interface to which each of a plurality of Ethernet controllers are coupled, where the Ethernet controllers are integrated within a single chip. A particular one of the integrated Ethernet controllers may be identified based on information within the received data. The particular one of the integrated Ethernet controllers may be granted access to a shared resource within the single chip. The access to the shared resource may be granted using at least one semaphore register within the shared resource. The particular one of the integrated Ethernet controllers may be granted access to the single bus interface. The information may include a bus identifier, a bus device identifier and/or a bus function identifier. The shared resource may include a nonvolatile memory (NVM). | 2011-01-20 |
20110016246 | INFORMATION PROCESSING APPARATUS, INTERRUPT CONTROL DEVICE AND INTERRUPT CONTROL METHOD - An information processing device in which interrupts are generated when some events are occurred. The information processing device includes: an interrupt generating unit to generate an interrupt; an interrupt control unit to receive the generated interrupt, count an interrupt reception count per unit time, notify of the interrupt and delay, if the counted interrupt reception count per unit time exceeds a predetermined value, the interrupt notification; and an interrupt processing unit to process the notified interrupt. | 2011-01-20 |
20110016247 | MULTIPROCESSOR SYSTEM AND MULTIPROCESSOR SYSTEM INTERRUPT CONTROL METHOD - A multiprocessor system, which improves processing efficiency of an entire system while concurrently securing appropriate interrupt responsivity according to interrupt priority, includes a plurality of processors each including a register, a plurality of I/O devices, and an interrupt generation device. A multiprocessor system interrupt control method includes: setting, for the register, interrupt permissibility indicating permissibility for an interrupt to be permitted by a corresponding processor; receiving an interrupt request from one of the I/O devices, using the interrupt generation device having a memory which holds the interrupt priority indicating the priority for the interrupt from each I/O device, and notifying the interrupt request from I/O device and the interrupt priority to the plurality of processors; and causing one of the processors that includes the register holding interrupt permissibility lower than the interrupt priority to accept the interrupt request. | 2011-01-20 |
20110016248 | INSERTION/REMOVAL DETECTOR - With an external memory to be inserted and removed through an adapter, insertion and removal of the external memory are reliably detected and data destruction with insertion or removal is prevented. A detector includes a card detection section ( | 2011-01-20 |
20110016249 | CRADLE FOR PORTABLE CONTENT PLAYBACK APPARATUS AND AMPLIFYING DEVICE TO WHICH THE SAME CRADLE IS CONNECTED - A cradle comprises a first connecting unit to which a portable content playback apparatus is connectable; a second connecting unit to which a computer is connectable; an output unit that outputs content data; a controller that controls the portable content playback apparatus; a hub that is connected to the second connecting unit, a first switch, and a second switch; the first switch that switches between connection of the first connecting unit to the controller and connection of the first connecting unit to the hub; the second switch that switches between connection of the output unit to the controller and connection of the output unit to the hub; and a switch control unit that controls switching of the first switch and the second switch. | 2011-01-20 |
20110016250 | SYSTEM AND METHOD UTILIZING DISTRIBUTED BYTE-WISE BUFFERS ON A MEMORY MODULE - A memory system and method utilizing one or more memory modules is provided. The memory module includes a plurality of memory devices and a controller configured to receive control information from a system memory controller and to produce module control signals. The memory module further includes a plurality of circuits, for example byte-wise buffers, which are configured to selectively isolate the plurality of memory devices from the system memory controller. The circuits are operable, in response to the module control signals, to drive write data from the system memory controller to the plurality of memory devices and to merge read data from the plurality of memory devices to the system memory controller. The circuits are distributed at corresponding positions separate from one another. | 2011-01-20 |
20110016251 | MULTI-PROCESSOR SYSTEM AND DYNAMIC POWER SAVING METHOD THEREOF - A multi-processor system and a dynamic power saving method thereof are provided. The multi-processor system includes a plurality of processors and a chipset. Each of the processors has a plurality of standard bus request pins and a specific bus request pin, and the standard bus request pins of each processor are alternately connected to the standard bus request pins of other processors respectively. The chipset is coupled to the specific bus request pins of the processors for detecting a control request signal on the specific bus request pins. When the chipset detects the control request signal, the chipset turns on an input buffer connected with the processors so that the processors can access data through the input buffer. When the chipset does not detect the control request signal, the chipset turns off the input buffer. | 2011-01-20 |
20110016252 | Multiple Minicard Interface System and Method Thereof - A system includes a minicard socket, a controller, a south bridge, and a differential multiplexer. The minicard socket is configured to receive a plurality of types of minicards. The controller is in communication with the minicard socket, and is configured to determine which one of the plurality of types of minicards is received within the minicard socket. The south bridge is configured to communicate with the minicard received within the minicard socket. The differential multiplexer is in communication with the controller and with the minicard socket. The differential multiplexer configured to switch the south bridge and the minicard socket between communicating over a plurality of buses based on the type of minicard received within the minicard socket. | 2011-01-20 |
20110016253 | Auto-function USB port - An auto-function port located within a host computing machine or an external peripheral device, wherein the auto-function port is identified by the host computing machine through a unique product and vendor identification associated with an internal USB hub controller, thereby allowing for execution of an automated function by the host computing machine upon connection of a USB device with the auto-function port depending on the software configuration of the host computing machine and the type of USB device. | 2011-01-20 |
20110016254 | SHARING OF HOST BUS ADAPTER CONTEXT - A system comprises a first host bus adapter (HBA) that uses a first context to facilitate the transmission of packets through a logical connection through the first HBA. The system also comprises a second HBA and memory in which the first context is stored. The memory is accessible by both of the first and second HBAs. Upon receiving a packet associated with the logical connection, the second HBA accesses the memory to use the first context to process the packet in accordance with the first context. | 2011-01-20 |
20110016255 | COMPUTER STSTEM - A computer system includes a host computer and a monitor connected to the host computer via an integrated digital video interface (DVI-I) connection, and a signal switching circuit. The DVI-I supports both digital/analog signals and generating a hot plug detection signal to identify an/a analog or digital display mode of the monitor. The signal switching circuit is capable of connecting the DVI-I to analog system management bus (SMBUS) if the monitor is in the analog display mode, and connecting the DVI-I to digital SMBUS if the monitor is in the digital display mode. | 2011-01-20 |
20110016256 | USB PORTABLE DEVICE - A USB portable device includes an activating USB peripheral, a storing USB peripheral, and a controlling USB peripheral. If the USB portable device is connected to a host apparatus, the activating USB peripheral is recognized as a readable device and a switching program in the recognized readable device is read in the host apparatus and is executed. Consequently, a switching instruction is received from the host apparatus, the readable device is unmounted, and the storing USB peripheral is recognized as the readable device. | 2011-01-20 |
20110016257 | DISK SUBSYSTEM - A protocol controller disposed between switches in a fiber channel fabric switch circuit and disk drive units for converting a protocol to enable one-to-one connectivity established between controllers and disk drive units. | 2011-01-20 |
20110016258 | Routing Data Units Between Different Address Domains - Methods for routing data units and PCI Express switches are disclosed. A plurality of devices may be coupled to a corresponding plurality of physical interfaces, each physical interface having a respective configurable status and a respective address domain, wherein in a first status the interface is transparent, and in a second status the interface is non-transparent. The status of each of the plurality of physical interfaces may be set as transparent or non-transparent. Data units may be switched between the physical interfaces using mapped address input/output, switching data units including masking the address domain for the interfaces configured as non-transparent. | 2011-01-20 |
20110016259 | Information processing device, data transfer circuit, and control method of information processing device - Cross bar control circuits are connected to each other by two buses, which are a broadcast bus for transmitting a broadcast packet from a system board to all system boards other than the system board and a point-to-point bus for transmitting a unicast packet from a system board to another system board. When unicast packets passing through the point-to-point bus are too many, the unicast packets are output by using the broadcast bus in addition to the point-to-point bus if the broadcast bus is not used. In this way, the unicast packets can be output quickly and efficiently, so that use efficiency of the broadcast bus and the point-to-point bus can be increased as a whole. | 2011-01-20 |
20110016260 | MANAGING BACKUP DEVICE METADATA IN A HIGH AVAILABILITY DISK SUBSYSTEM - A system includes a data storage device, a controller coupled with the data storage device, a backup device coupled with the controller for backing up a modified portion of data and volatile memory metadata stored by the controller, and a backup power source for powering the controller. The controller includes a pre-specified region of volatile memory for storing backup device metadata for managing a modified portion of data, the metadata comprising one or more intents corresponding to modified data written back to the data storage device. The controller is configured to invalidate the one or more intents. During a restore operation, the controller is configured to store the backup device metadata in the pre-specified region of volatile memory when a charge on the backup power source is at least a minimum threshold charge and to store the updated backup device metadata in the backup device during an interruption of power. | 2011-01-20 |
20110016261 | PARALLEL PROCESSING ARCHITECTURE OF FLASH MEMORY AND METHOD THEREOF - A parallel processing architecture of flash memory and method thereof are described. A processing unit classifies a plurality of commands to generate a first command group and a second command group respectively. The processing unit executes the first command group and the second command group. A first control unit performs the first command group to access the data stored in the first memory unit, and a second control unit simultaneously performs the second command group to access the data stored in the second memory unit for processing the data stored in the first and the second memory units in parallel. | 2011-01-20 |
20110016262 | STORAGE AND METHOD FOR PERFORMING DATA BACKUP USING THE STORAGE - A method for performing data backup using a storage device starts a backup battery when an electronic device is powered off, reads data from a memory of the electronic device by a system on chip (SoC) of the storage device, and writes the data into a field programmable gate array (FPGA) of the storage device. The method further encodes the data by the FPGA, and stores the encoded data into a flash memory of the storage device. | 2011-01-20 |
20110016263 | METHOD FOR PERFORMING DATA PATTERN MANAGEMENT REGARDING DATA ACCESSED BY A CONTROLLER OF A FLASH MEMORY, AND ASSOCIATED MEMORY DEVICE AND CONTROLLER THEREOF - A method for performing data pattern management regarding data accessed by a controller of a Flash memory includes: when the controller receives a write command, generating a first random function, where the write command is utilized for instructing the controller to write the data into the Flash memory; and adjusting a plurality of bits of the data bit by bit to generate a pseudo-random bit sequence, and writing the pseudo-random bit sequence into the Flash memory to represent the data, whereby data pattern distribution of the data is adjusted. An associated memory device and the controller thereof are also provided, where the controller includes: a ROM arranged to store a program code; a microprocessor arranged to execute the program code to control the access to the Flash memory and manage a plurality of blocks; and a randomizer arranged to generate a random function. The controller can perform data pattern management. | 2011-01-20 |
20110016264 | METHOD AND APPARATUS FOR CACHE CONTROL IN A DATA STORAGE DEVICE - According to one embodiment, a data storage device is provided, which has a cache controller that performs cache control, by using a buffer memory divided into segments, which are managed. The cache controller performs sequential hit judge on each segment, in accordance with the requested access range designated by a read or write command coming from a host system. The cache controller updates the hit upper-limit LBA set for each segment if the result of the hit judge is a mishit. | 2011-01-20 |
20110016265 | STORAGE DEVICE AND DATA PROCESS METHOD - A storage device includes a flash memory, a temporary storage unit, and a control unit. The flash memory includes a number of memory blocks, each of which has a number of pages. The temporary storage unit receives and stores a number of written commands transferred from a host system. Each written command is corresponding to user information. The control unit is coupled with the temporary storage unit and the flash memory, and adjusts executing sequence of the written commands according to a volume of the user information and unused pages in the memory block. | 2011-01-20 |
20110016266 | SEMICONDUCTOR DEVICE - On a single semiconductor package PK | 2011-01-20 |
20110016267 | Low-Power USB Flash Card Reader Using Bulk-Pipe Streaming with UAS Command Re-Ordering and Channel Separation - A flash-card reader improves transmission efficiency by using bulk streaming of multiple pipes. A bulk data-out pipe carries host write data to the card reader and can operate in parallel with a bulk data-in pipe that carries host read data that was read from a flash card attached to the card reader. Status packets do not block data packets since the he status packets are buffered through a separate status pipe, and commands are buffered through a command pipe. Flash data from multiple flash cards are interleaved as separate endpoints that share the bulk data-in pipe. A data in/out streaming state machine controls streaming bulk data through the bulk data-in and data-out pipes, while a status streaming state machine controls streaming status packets through the status pipe. Transaction overhead is reduced using bulk streaming where packets for several commands are combined into the same bulk streams. | 2011-01-20 |
20110016268 | PHASE CHANGE MEMORY IN A DUAL INLINE MEMORY MODULE - Subject matter disclosed herein relates to management of a memory device. | 2011-01-20 |
20110016269 | SYSTEM AND METHOD OF INCREASING ADDRESSABLE MEMORY SPACE ON A MEMORY BOARD - A load-reducing memory module includes a plurality of memory components such as DRAMs. The memory components are organized into sets or ranks such that they can be accessed simultaneously for the full data bit-width of the memory module. A plurality of load reducing switching circuits is used to drive data bits from a memory controller to the plurality of memory components. The load reducing switching circuits are also used to multiplex the data lines from the memory components and drive the data bits to the memory controller. | 2011-01-20 |
20110016270 | RAPID STARTUP COMPUTER SYSTEM AND METHOD - A computer system includes a north bridge chipset, a south bridge chipset, a memory, and a rapid startup apparatus. The rapid startup apparatus includes a DRAM module to install application programs or operation system programs, a battery, a control chip to control data reading and writing for the DRAM module, a PCI-E interface, and a switch circuit. The application programs or the operation system programs are loaded into the memory via the PCI-E interface, the south bridge chipset, and the north bridge chipset in series. The switch circuit processes voltage of the battery or the PCI-E interface and supply power to the DRAM module. | 2011-01-20 |
20110016271 | Techniques For Managing Data In A Write Cache Of A Storage Controller - A technique for limiting an amount of write data stored in a cache memory includes determining a usable region of a non-volatile storage (NVS), determining an amount of write data in a current write request for the cache memory, and determining a failure boundary associated with the current write request. A count of the write data associated with the failure boundary is maintained. The current write request for the cache memory is rejected when a sum of the count of the write data associated with the failure boundary and the write data in the current write request exceeds a determined percentage of the usable region of the NVS. | 2011-01-20 |
20110016272 | VIRTUALIZED DATA STORAGE IN A NETWORK COMPUTING ENVIRONMENT - Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device. | 2011-01-20 |
20110016273 | STORAGE MANAGEMENT METHOD AND SERVER - When the application I/O performance problem is solved, the I/O amount from the application is increased. In the conventional technique, no consideration has been taken on the affect of the increase of the application I/O performance to other applications. A resource whose I/O load is reduced by setting modification of a storage subsystem is specified and the application using this resource is specified as an application whose I/O processing amount may be increased. Furthermore, the resource used by the specified application and another application using this resource are specified as a resource and an application whose I/O processing performance may be lowered by the setting modification. | 2011-01-20 |
20110016274 | PORTABLE ELECTRONIC DEVICE, SMARTCARD AND CONTROL METHOD FOR PORTABLE ELECTRONIC DEVICE - A smartcard includes a write unit that writes data to be written to a data memory according to a write command supplied from an external device, a determining unit that determines whether important data is contained in the data to be written specified by the write command supplied from the external device, a calculating unit that calculates a head address of the important data in the data memory based on data length from a head of the data to be written to a head of the important data and an address on the data memory at which a process of writing the data to be written is started when the determining unit determines that important data is contained in the data to be written, and a position table that stores information indicating a head address of the important data in correspondence to information indicating the important data. | 2011-01-20 |
20110016275 | MOBILE COMMUNICATION DEVICE AND METHOD FOR IMPLEMENTING MIFARE MEMORY MULTIPLE SECTORS MECHANISMS - A mobile communication device ( | 2011-01-20 |
20110016276 | SYSTEM AND METHOD FOR CACHE MANAGEMENT - Aspects of the invention relate to improvements to the Least Recently Used (LRU) cache replacement method. Weighted LRU (WLRU) and Compact Weighted LRU (CWLRU) are CPU cache replacement methods that have superior hit rates to LRU replacement for programs with poor locality, such as network protocols and applications. WLRU assigns weights to cache lines and makes replacement decision by comparing weights. When a cache line is first brought into the cache, it is assigned an initial weight. Weights of cache lines in WLRU increase when hit and decrease when not hit. Weights in WLRU also have upper limits, and the weight of a cache line never increases beyond the upper limit. CWLRU is a more space-efficient implementation of WLRU. Compared to WLRU, CWLRU uses fewer bits per cache line to store the weight. | 2011-01-20 |
20110016277 | Method for Performing Cache Coherency in a Computer System - In a computing system, cache coherency is performed by selecting one of a plurality of coherency protocols for a first memory transaction. Each of the plurality of coherency protocols has a unique set of cache states that may be applied to cached data for the first memory transaction. Cache coherency is performed on appropriate caches in the computing system by applying the set of cache states of the selected one of the plurality of coherency protocols. | 2011-01-20 |
20110016278 | Independent Threading of Memory Devices Disposed on Memory Modules - A memory module includes a substrate having signal lines thereon that form a control path and a plurality of data paths. A plurality of memory devices are mounted on the substrate. Each memory device is coupled to the control path and to a distinct data path. The memory module includes control circuitry to enable each memory device to process a distinct respective memory access command in a succession of memory access commands and to output data on the distinct data path in response to the processed memory access command. | 2011-01-20 |
20110016279 | SIMULTANEOUS READ AND WRITE DATA TRANSFER - A controller for an arrangement of memory devices may issue a write command without waiting for the receipt of a previously issued read command. An addressed memory device may read data out onto the data bus according to a read command while, simultaneously, writing data according to a write command received subsequent to the read command. | 2011-01-20 |
20110016280 | COPY PROTECTION OF SOFTWARE AND/OR DATA - Autorun functionality is incorporated into an integrated circuit memory device such as any USB peripheral, which has a memory component interfaced to a USB microcontroller. This provides autorun of one or more executables or application installers from a memory component with a USB interface without an intermediate hardware-based autorun feature. USB peripheral devices internally include a USB microcontroller that performs the functionality associated with identifying the device to a host computing device, such as a personal computer. Autorun firmware is embedded into the USB microcontroller. The autorun firmware enables autorun of an installable or executable application stored on the memory component of the USB device. The firmware acts as bridge component translating all commands and interactions between a host PC and the memory component. | 2011-01-20 |
20110016281 | Line allocation in multi-level hierarchical data stores - A storage apparatus for storing data is disclosed. The storage apparatus comprises: a plurality of stores having storage locations for storing data items, including a level one store and a level two store the storage apparatus having a hierarchy such that in response to an access request for accessing a data item the level one store is accessed and in response to detecting that the item is not stored in the level one store the level two store is accessed. The storage apparatus is configured to store a copy of at least some items in both of the one level one store and the level two store, the storage apparatus comprising a plurality of indicator storage elements associated with a corresponding plurality of storage locations of the level two store, a set value of an indicator stored in one of the indicator storage elements indicating that the corresponding stored data item is also stored in the level one store. The storage apparatus is configured such that in response to a request to allocate a storage location in the level two store, storage locations having a set indicator associated with them are not selected for eviction. | 2011-01-20 |
20110016282 | SYNCHRONOUS MEMORY READ DATA CAPTURE - A method of snap-shot data training to determine the optimum timing of the DQS enable signal in a single read operation is provided. This is accomplished by first writing a Gray code count sequence into the memory and then reading it back in a single burst. The controller samples the read burst at a fixed interval from the time the command was issued to determine the loop-around delay. A simple truth table lookup determines the optimum DQS enable timing for normal reads. Advantageously, during normal read operations, the first positive edge of the enabled DQS signal is used to sample a counter that is enabled every time a command is issued. If the counter sample changes, indicating timing drift has occurred, the DQS enable signal can be adjusted to compensate for the drift and maintain a position centered in the DQS preamble. This technique can also be applied to a system that uses the iterative approach to determining DQS enable timing on power up. Another embodiment of the invention is a simple, low latency clock domain crossing circuit based on the DQS latched sample of the counter. | 2011-01-20 |
20110016283 | METHOD AND SYSTEM FOR CONFIGURING A STORAGE ARRAY - There is provided a system and method of configuring a storage array. An exemplary method includes generating information within a storage array controller, the information corresponding to a menu of user options. The exemplary method also includes sending the information from the array controller to a user interface module. The exemplary method also includes sending user instructions comprising a selected menu option from the user interface module to the array controller. The exemplary method also includes executing a configuration task associated with the selected menu option. | 2011-01-20 |
20110016284 | Memory Management in Network Processors - System and method for storing information units is provided. The system includes a memory comprising a plurality of contiguous memory segments, a local memory storing a plurality of pointers, each pointer pointing to one contiguous memory segment, a receiving unit configured to arrange incoming information units into queues and memory control logic configured to allocate pointers to the queues and configured to cause the incoming information units to be written into contiguous memory segments. The incoming information units form at least one queue and wherein pointers form a linked list of pointers if the information units are written into more than one contiguous memory segment. | 2011-01-20 |
20110016285 | Apparatus and method for scratch pad memory management - Disclosed is a scratch pad memory management device and a method thereof. The scratch pad memory management device divides a scratch pad memory into a plurality of unit blocks, maintains a memory allocation table corresponding to indices of the plurality of unit blocks in a main memory, and manages the scratch pad memory. | 2011-01-20 |
20110016286 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND COMPUTER READABLE MEDIUM - An information processing apparatus includes: a memory that stores a process identifier for identifying a process uniquely, a virtual address which is an address of a memory space available in the process, a physical address corresponding to the virtual address, and a continuous memory capacity assigned to the process so as to be associated with each other; and a memory capacity setting section that, when changing a process to an executable state, sets the continuous memory capacity to be stored in the memory. The memory capacity setting section determines the continuous memory capacity based on a memory capacity that the process requires; a memory capacity of an unused continuous region in a physical memory; and a memory capacity based on restriction of memory size dependent on a central processing unit in a computer. | 2011-01-20 |
20110016287 | METHOD FOR IMPLEMENTING ON DEMAND CONFIGURATION CHANGES - A method for implementing on-demand configuration of a logical volume, wherein the method monitors the amount of available storage capacity of the logical storage volume and determines whether the available storage capacity exceeds a predetermined threshold, such as a percentage of available logical storage space. If the method determines that the storage capacity of the logical storage volume is nearing full capacity, the method determines whether configured physical storage space is available. If the method determines that configured physical storage space is available, the method then reconfigures the logical storage volume to include the configured physical storage space. If configured physical storage space is not available, the method locates unconfigured physical storage space, configures the available physical storage space, and reconfigures the logical volume using the configured physical storage space. | 2011-01-20 |
20110016288 | Serial Flash Memory and Address Transmission Method Thereof - A serial flash memory and an address transmission method thereof. The serial flash memory selectively addresses a first memory space according to a first address length or addresses a second memory space according to a second address length longer than the first address length. If the first memory space is addressed according to the first address length, a first memory address is completely received within an address time duration so that data corresponding to the first memory address is initially outputted from a starting clock. In the address transmission method, if the second memory space is addressed according to the second address length, a portion of a second memory address is received within the address time duration. The other portion of the second memory address is received within a waiting time duration so that data corresponding to the second memory address is initially outputted from the starting clock. | 2011-01-20 |
20110016289 | Apparatus and Method for Profiling Software Performance on a Processor with Non-Unique Virtual Addresses - A system includes a processor with a memory map specifying a user mode region with virtual address translation by a memory management unit and a kernel mode region with direct virtual address translation. The processor executes an application in the user mode region where virtual addresses are not unique. A probe receives trace information from the processor. A host system receives the trace information from the probe. The host system includes a data structure associating a process name, a process identification and a set of instruction counters. Each instruction counter is incremented upon the processing of a designated virtual address within the trace information. A profiling module processes information associated with the process name and set of instruction counters to identify a performance problem in the application. | 2011-01-20 |
20110016290 | Method and Apparatus for Supporting Address Translation in a Multiprocessor Virtual Machine Environment - In one embodiment, a method includes receiving control of a first processor transitioned from a virtual machine due to a privileged event pertaining to a translation-lookaside buffer, and determining which entries in a guest translation data structure were modified by the virtual machine. The determination is made based on metadata extracted from a shadow translation data structure maintained by a virtual machine monitor and attributes associated with entries in the shadow translation data structure. The metadata includes an active entry list identifying mappings that map pages used by a guest operating system in forming the guest translation data structure. The method further includes synchronizing entries in the shadow translation data structure that correspond to the modified entries in the guest translation data structure with the modified entries in the guest translation data structure, and determining which entries to keep in the active entry list, based at least in part on attributes associated with corresponding entries in the shadow translation data structure identifying which of the plurality of processors owns each entry in the active entry list. | 2011-01-20 |
20110016291 | Serial Memory Interface for Extended Address Space - An integrated circuit memory device has a memory array and control logic with at least a first addressing mode in which the instruction includes a first instruction code and an address of a first length; and a second addressing mode in which the instruction includes the first instruction code and an address of a second length. The first length of the address is different from the second length of the address. | 2011-01-20 |
20110016292 | OUT-OF-ORDER EXECUTION IN-ORDER RETIRE MICROPROCESSOR WITH BRANCH INFORMATION TABLE TO ENJOY REDUCED REORDER BUFFER SIZE - An out-of-order execution in-order retire microprocessor includes a branch information table comprising N entries. Each of the N entries stores information associated with a branch instruction. The microprocessor also includes a reorder buffer comprising M entries. Each of the M entries stores information associated with an unretired instruction within the microprocessor. Each of the M entries includes a field that indicates whether the unretired instruction is a branch instruction and, if so, a tag identifying one of the N entries in the branch information table storing information associated with the branch instruction. N is significantly less than M such that the overall die space and power consumption is reduced over a processor in which each reorder buffer entry stores the branch information. | 2011-01-20 |
20110016293 | DEVICE AND METHOD FOR THE DISTRIBUTED EXECUTION OF DIGITAL DATA PROCESSING OPERATIONS - This device ( | 2011-01-20 |
20110016294 | TECHNIQUE FOR REPLAYING OPERATIONS USING REPLAY LOOK-AHEAD INSTRUCTIONS - A technique for reliably replaying operations in electronic-design-automation (EDA) software is described. In this technique, the EDA software stores operations performed by a user during a design session, as well as any replay look-ahead instructions, in a log file. When repeating the first operation, the replay look-ahead instruction ensures that the same state is obtained in the EDA environment as was previously obtained. For example, if an interrupt occurred when the first operation was previously performed, the replay look-ahead instruction may specify when the interrupt occurred during the performance of the operation so that the effect of the interrupt may be simulated when replaying the first operation. Alternatively, if a blocking user-interface request occurred when the first operation was previously performed (such as a mandatory query), the replay look-ahead instruction may include one or more events associated with the user answer to the blocking user-interface request so that the same user answer may be provided when replaying the first operation. | 2011-01-20 |
20110016295 | PROGRAMMABLE EXCEPTION PROCESSING LATENCY - A digital processor with programmable exception processing latency, may have a central processing unit (CPU) of a digital processor, an exception controller coupled with said CPU, and a control register coupled with said CPU, wherein the control register is operable to set the operation mode of said CPU in at least one of two modes, wherein in the first mode the CPU has a fixed exception processing latency time, and in a second mode the CPU has a variable exception processing latency time. | 2011-01-20 |
20110016296 | APPARATUS AND METHOD FOR EXECUTING FAST BIT SCAN FORWARD/REVERSE (BSR/BSF) INSTRUCTIONS - An apparatus executes a bit scan instruction that specifies an N-byte input operand. A first encoder forward bit scan encodes each input byte to generate N first bit vectors. A zero detector zero-detects each input byte to generate a second bit vector. A second encoder forward bit scan encodes the second bit vector to generate a third bit vector. An N:1 multiplexor, controlled by the third bit vector, selects one of the N first bit vectors to output a fourth bit vector. The apparatus concatenates the third and fourth bit vectors into a fifth bit vector that indicates the bit index of the least significant set bit of the input operand. A third encoder forward bit scan encodes a bit-reversed version of each input by to generate N sixth bit vectors. A fourth encoder forward bit scan encodes a bit-reversed version of the second bit vector to generate a seventh bit vector. A second N:1 multiplexor, controlled by the seventh bit vector, selects one of the N sixth bit vectors to output an eighth bit vector. Selection logic selects a concatenation of the third and fourth bit vectors into the fifth bit vector if an input indicates forward bit scan, and the selection logic selects an inverted version of a concatenation of the seventh and eighth bit vectors into the fifth bit vector if the input indicates reverse bit scan. | 2011-01-20 |
20110016297 | MANAGED DATA REGION FOR SERVER MANAGEMENT - Some aspects include reception of a command from one of a chassis management module and a BIOS specifying a data region to be updated and a locking policy, determination of whether the data region is locked, implementation of the locking policy and returning of a session lock handle if it is determined that the data region is not locked, reception, from the one of the chassis management module and the BIOS, of data for updating the data region, the session lock handle, and an offset, determination that the session lock handle is associated with the data region, writing of the data to the data region at the offset, reception of a request for data of the updated data region from the other one of the chassis management module and the BIOS, determination of whether the updated data region is locked, and if it is determined that the updated data region is not locked, providing of the data of the updated data region to the other one of the chassis management module and the BIOS. | 2011-01-20 |
20110016298 | Configuration File - A method for configuring a machine including launching an administrative safe mode on the machine when a secured configuration file is detected on a removable storage medium and extracting metadata from the secured configuration file to populate one or more settings fields on the machine that the secured configuration file identifies to configure. | 2011-01-20 |
20110016299 | MULTI-ENVIRONMENT OPERATING SYSTEM - Various embodiments of the present invention provide a mobile computing device that operates multiple, co-existing and independent operating system environments on a common kernel. A booting process for initiating a multiple operating system environment is also provided. Additionally, various embodiments of the present invention include processes for managing a switch between one operating system environment to a second operating system environment. | 2011-01-20 |
20110016300 | APPARATUS AND METHOD FOR FAST BOOTING COMPUTER SYSTEM - An apparatus and method for fast booting a computer system are provided. When a system power-off is requested in a computer system such as a desktop of notebook computer, a boot code comprising a BIOS code or the BIOS code and an OS kernel code is written to a specific area of a RAM, and then the computer system is turned off while continuously supplying power to the specific area of the RAM. When a system power-on is requested, the boot code written to the specific area of the RAM is executed to fast boot the computer system, thus effectively reducing a user's standby time until the completion of the system boot process. | 2011-01-20 |
20110016301 | SYSTEM AND METHOD FOR INITIATING A MULTI-ENVIRONMENT OPERATING SYSTEM - Various embodiments of the present invention provide a mobile computing device that operates multiple, co-existing and independent operating system environments on a common kernel. A booting process for initiating a multiple operating system environment is also provided. Additionally, various embodiments of the present invention include processes for managing a switch between one operating system environment to a second operating system environment. | 2011-01-20 |
20110016302 | INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND DATA RESCUE METHOD - According to one embodiment of an information processing apparatus includes: a storage medium including, a first partition that stores a first operating system and data, and a second partition that stores a second operating system and a data rescue program; a switch that allows a user to enter a command for booting the second operating system; and a boot control section that boots the second operating system when the command is entered. The data rescue program is executed when the second operating system is booted, and performs at least one of recovering and backing up the data stored in the first partition. | 2011-01-20 |
20110016303 | INFORMATION DEVICE, STORAGE MEDIUM AND INITIAL STATE RESTORATION METHOD - An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to restore the first program on the first partition to a predetermined state, a boot block which causes system activation from one of the first partition and the second partition, and an active-partition switching program which indicates, to the boot block, one of the first and second partitions. An input/output system activates the active-partition switching program when a specific operation is performed. The active-partition switching program indicates to the boot block that system activation is to be executed from the second partition. | 2011-01-20 |
20110016304 | PASSIVE ACTIVATION OF BOOTLOADER NETWORK FEATURES - Consistent with embodiments of the present invention, systems and methods are disclosed for operating an override boot sequence. In some embodiments, a system may be disclosed comprising a computing device; client software configured to boot the computing device to a normal state; a first memory associated with the computing device, wherein the client software is stored on the first memory; and a network interface in communication with a server. The server may be configured to transmit a sentry packet to the computing device. A bootloader program may be associated with the computing device, wherein the bootloader device may be configured to open the network interface port associated with the serve and monitor for the presence of the sentry packet. The bootloader program may be further configured to download a software application across the network and execute the software application instead of the client software. | 2011-01-20 |
20110016305 | SYSTEM AND METHOD FOR TRANSFORMING INFORMATION - A method for transforming information, comprising the steps of encoding two or more original messages into a single encoded information and decoding the single encoded information using multiple different decoding schemes to recover the two or more original messages. | 2011-01-20 |
20110016306 | MEDICAL IMAGE DISPLAY SYSTEM AND MEDICAL IMAGE COMMUNICATION METHOD - A medical image display system according to an embodiment including a server that provides medical image display data and display/clinical applications and a terminal device that can access the server by way of a network, the system, configuring the medical image display data so that pieces of image display information of a plurality of types including medical image information and interface information for user operation are arranged in a multilayered manner; transmitting the pieces of image display information of a plurality of types to the terminal device from the server, assigning them to communication protocols of different types; synthetically combining and displaying the pieces of image display information of a plurality of types transmitted from the server with use of the terminal device; and generating operator information by utilizing the interface information for user operation displayed on the terminal device, and transmitting the operator information to the server by way of the network. | 2011-01-20 |
20110016307 | Authorization, authentication and accounting protocols in multicast content distribution networks - An end user computer is assigned a multicast content distribution group by a network service intelligence platform. The network service intelligence platform authenticates a token sent by the user and signed by a third part content controller, and provides the user with credentials for joining the group. The credentials include an authorization key as well as identifications of the user and the requested content. The credentials are encrypted and authenticated by the third party content controller. The user includes the encrypted and authenticated credentials in a join request sent to a network resource, such as an edge router. After verifying the credentials, the network resource adds the end user computer to the multicast group. | 2011-01-20 |
20110016308 | ENCRYPTED DOCUMENT TRANSMISSION - Apparatuses, systems and methods are provided for secure transmission of data. | 2011-01-20 |
20110016309 | CRYPTOGRAPHIC COMMUNICATION SYSTEM AND GATEWAY DEVICE - A GW (PDG) at the termination of remote access is installed in the 3GPP system. After an IPSec tunnel between a terminal and the GW is opened, an IPSec tunnel between a VPN client and the corporate network GW is opened, whereby the data from the terminal is transferred via two tunnels between the terminal and the GW and between the VPN client and the corporate network GW to the corporate network. Also, the GW checks if the destination network uses the global address from the destination IP address of a message received from the terminal making the remote VPN access. If the global address is required, the source IP address of the message received from the terminal is translated from the private address for use within the corporate network to which the terminal is allocated to the global address to transfer the message. | 2011-01-20 |
20110016310 | SECURE SERIAL INTERFACE WITH TRUSTED PLATFORM MODULE - A secure system having a Trusted Platform Module coupled between a peripheral device and a host. In operation, the Trusted Platform Module is provided to control communication between the peripheral device and the host. | 2011-01-20 |
20110016311 | METHOD FOR PREVENTING LAUNDERING AND REPACKAGING OF MULTIMEDIA CONTENT IN CONTENT DISTRIBUTION SYSTEMS - A method for distributing content in a content distribution system is disclosed which comprises the steps of: encrypting at a Content Packager a content using a content encryption key to generate an encrypted content; sending the content encryption key to a Licensing Authority; receiving from the Licensing Authority a distribution key containing an encryption of the content decryption key (K | 2011-01-20 |
20110016312 | SYSTEM AND METHOD FOR ACCESSING HOST COMPUTER VIA REMOTE COMPUTER - In a peer-to-peer fashion, various host computers communicate with various remote computers using the Internet so that user inputs from the remote computers are transferred to the host computers as if the user inputs occurred locally, and information generated by the host computers is displayed on the remote computers. Thus, a remote computer is able to access all of the information and application programs on the host computer. | 2011-01-20 |
20110016313 | HEADER COMPRESSION FOR TUNNELED IPsec PACKET - Aspects describe compressing the concatenation of IP headers, UDP headers, ESP headers, and potentially other headers inside the ESP header. The multiple headers are regarded as one header chain and compressed as a single header chain. The compression can utilize a robust header compression (ROHC) framework. The ROHC ESP profile can be utilized as a basis for compression of ESP/UDP/IP headers with the addition of static chains and dynamic chains for multiple layer transport and application layer headers. Static chains include UDP static header fields either between static IP header fields and static IP header fields or between static IP header fields and static ESP header fields. Dynamic chains include UDP dynamic header fields either between dynamic IP header fields and dynamic ESP header fields or between static IP header fields and static IP header fields. | 2011-01-20 |
20110016314 | METHODS AND ENTITIES USING IPSec ESP TO SUPPORT SECURITY FUNCTIONALITY FOR UDP-BASED OMA ENABLES - Methods in OMA SEC_CF for providing security services to traffic over UDP between a client and a server and the relevant entities are provided. A pre-shared key is pre-shared between the client and the server. A pair of IPSec ESP SAs between the client and the server is established without shared key negotiation, wherein traffic data cryptographic algorithms are determined. Traffic data security keys are derived from the pre-shared key via the determined traffic data cryptographic algorithms. Then, data of the traffic can be provided with security services with the traffic data security keys through use of IPSec ESP. | 2011-01-20 |
20110016315 | METHOD AND SYSTEM FOR MULTIMEDIA TAGS - A multimedia data construct called a tag (FIG. | 2011-01-20 |
20110016316 | AUTHENTICATED ADVERSARIAL ROUTING - A routing protocol is used to transmit messages from a sender to a receiver over a network of nodes, where adversaries can control links between the nodes and can also control the behavior of a large number of nodes. Various techniques can be used, along or in combination, to combat these effects. In one approach, certain trigger conditions are identified, the occurrence of which signals malicious behavior within the network. When signaled, the sender requests status reports from the intermediate nodes in an effort to determine which nodes are malicious. The information for the status reports is generated by nodes as packets are passed from one node to the next. | 2011-01-20 |
20110016317 | Key storage device, biometric authentication device, biometric authentication system, key management method, biometric authentication method, and program - Provided is a key storage device including a receiving unit for receiving package data that includes a template key for decrypting an encrypted template and an authentication key that is used for authentication performed with a terminal that uses the template key and the package data being in a data format that allows restoration only by the key storage device, a key information storage unit for restoring the template key and the authentication key, and for storing the template key and the authentication key in a tamper resistant non-volatile memory, a authentication unit for performing, in case a request for use of the template key is received from the terminal, authentication with the terminal by using authentication information that is based on the authentication key, and a key state management unit for placing, in case the authentication succeeds, the template key in a state usable by the terminal. | 2011-01-20 |
20110016318 | TECHNIQUES FOR SECURING SUPPLY CHAIN ELECTRONIC TRANSACTIONS - Techniques for authenticating the identity of shippers and receivers of goods at each point along a supply chain. A central hub repository issues shippers and receivers a pair of public and private keys for encrypting communications between the shippers and receivers and the hub repository and for authenticating the identity of shippers and receivers. The hub repository may also maintain a log of all transactions between shippers and receivers to provide an audit trail that may be used to track the progress of goods along a supply chain. | 2011-01-20 |
20110016319 | METHOD FOR RESTRICTING ACCESS TO MEDIA DATA GENERATED BY A CAMERA - A method for restricting access to media data generated by a camera comprising: setting a non-public initial user key, KICU, in the camera, providing a user client with the initial user key, KICU, establishing an authenticated relation between the user client and the camera by sending an authentication message including information based on the initial user key, KICU, from the user client to the camera, checking if an operational user key (K | 2011-01-20 |
20110016320 | METHOD FOR AUTHENTICATION AND SIGNATURE OF A USER IN AN APPLICATION SERVICE, USING A MOBILE TELEPHONE AS A SECOND FACTOR IN ADDITION TO AND INDEPENDENTLY OF A FIRST FACTOR - The invention relates to a method for the two-factor authentication of a user in an application service running on an application server. The first authentication factor is a PIN authentication code known only by the user and the application service, and the second authentication factor is the mobile communication terminal of the user on which is installed a reliability application obtained from a reliable third party or certified by the same. The reliability application is capable of generating, using the PIN authentication code and a secret key shared only with the reliable third party, a single use authentication code for each authentication of the user in the application service. | 2011-01-20 |
20110016321 | Automated Security Provisioning Protocol for Wide Area Network Communication Devices in Open Device Environment - An automated security provisioning protocol is provided for wide area network communication devices in an open device environment, such as cellular communication devices in a machine-to-machine (M2M) environment. For example, a method for performing a security provisioning protocol between a first communication device and a second communication device over at least one wide area communication network comprises the following steps from the perspective of the first communication device. The first communication device automatically uses access information not previously provisioned in the wide area communication network to gain access to the wide area communication network for an initial purpose of communicating with the second communication device. The first communication device, upon gaining access to the wide area communication network, automatically performs an authenticated key exchange operation with the second communication device over the wide area communication network and establishes a secure communication key as a result of the authenticated key exchange operation for subsequent use by the first communication device for secure communications. The wide area communication network is operated by a first entity and the second communication device is operated by a second entity. | 2011-01-20 |
20110016322 | SYSTEM AND METHOD FOR EXCHANGING KEY GENERATION PARAMETERS FOR SECURE COMMUNICATIONS - A communication system exchanges key generation parameters for secure communications. An internet service and communications device of a user are in communication with each other. The internet service includes an account authentication mechanism for a user and includes a database having stored cryptographic keys and key generation parameters. A device client operates on the communications device and initiates a request to the internet service that authenticates the user and establishes a secure communications channel between the internet service and communications device and determine key generation parameters based on an authenticated user identifier and transmits the key generation parameters for initiating key generation and securely establishing a cryptographic key between the internet service and communications device. | 2011-01-20 |
20110016323 | REMOTE SECURE AUTHORIZATION - The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token. This allows the enterprise network token to gain secure access to the temporary key of the client token, thereby allowing the enterprise network token to securely provision the remote client token with the appropriate enterprise Network Keys. | 2011-01-20 |