08th week of 2010 patent applcation highlights part 69 |
Patent application number | Title | Published |
20100049923 | DEVICE AND METHOD TO PROCESS OFDM-BASED SYMBOLS IN WIRELESS NETWORK - A device and a method to efficiently process the symbols coded in OFDM according to the various protocols available. This is achieved through a device to process OFDM-based symbols comprising a base band input data and a base band output data, and comprising at least two programmable execution units connected to at least one working memory, this device being characterized in that, the programmable execution units (EU) are connected to the memory (M- | 2010-02-25 |
20100049924 | OFFSITE MANAGEMENT USING DISK BASED TAPE LIBRARY AND VAULT SYSTEM - A method for archiving data from a first disk-based storage device to a second disk-based storage device includes moving an emulated tape from a first element to a second element simulatively without actually moving data associated with the emulated tape. The data associated with the emulated tape is transmitted from the first disk-based storage device to the second disk-based storage device via a communication link. The data associated with the emulated tape is removed from the first disk-based storage device. | 2010-02-25 |
20100049925 | EXECUTING HOST DATA TRANSFER OPERATIONS DURING SETUP OF COPY SERVICES OPERATIONS - Host input/output (I/O) operations are performed via a file stored in a non-volatile storage coupled to a storage controller while data structures are being generated in the storage controller to copy data from source logical volumes to target logical volumes. The source logical volumes and the target logical volumes are logical representations of physical storage maintained in a plurality of direct access storage devices. The contents of the file are transferred from the non-volatile storage to one or more of the plurality of direct access storage devices, after the data structures have been generated, wherein the host I/O operations are performed via the file while the contents of the file are being transferred to the one or more of the plurality of direct access storage devices. The host I/O operations to the plurality of direct access storage devices are resumed, in response to transferring entire contents of the file to the one or more of the plurality of direct access storage devices. | 2010-02-25 |
20100049926 | ENHANCEMENT OF DATA MIRRORING TO PROVIDE PARALLEL PROCESSING OF OVERLAPPING WRITES - A storage unit adapted for use in a processing system, includes: a journal for managing execution of incomplete writing of data for at least two segments of data, wherein a designated storage location for the first write of data overlaps a least a portion of a designated storage location for the second write of data, wherein the journal includes a reference table for tracking incomplete writes of data; and, the journal includes machine executable instructions stored within machine readable media for performing the managing by: monitoring writes of data to identify incomplete writes of data sharing at least one designated storage location of a primary media; reading the associated writes of data into the reference table; sequencing the associated writes of data in the reference table; and writing the data in the reference table in sequence order to each designated storage location of the primary media and associated secondary media. | 2010-02-25 |
20100049927 | ENHANCEMENT OF DATA MIRRORING TO PROVIDE PARALLEL PROCESSING OF OVERLAPPING WRITES - A storage unit including redundant storage includes: a primary storage unit and a journal for managing execution of incomplete writing of data for at least two overlapping data segments, a reference table for tracking incomplete writes of data; and includes instructions for managing data by: monitoring writes of data to identify incomplete writes of data sharing at least one designated storage location of a primary media; reading the associated writes of data into the table; sequencing the associated writes of data; writing data in sequence order to each designated storage location of the primary media and providing the data in sequence order to secondary media with a sequence number; and at least one secondary storage unit including a duplicate record of data comprised within the primary media, each secondary storage unit equipped for ensuring recent data is not overwritten with prior data by controlling writes according to the sequence number. | 2010-02-25 |
20100049928 | COMMAND SEQUENCE NUMBERING APPARATUS AND METHOD - A method, system, and computer program product to preserve data integrity in a mirror and copy environment is disclosed herein. In one embodiment, a method may include receiving a write command and data from a host device. The method may further include writing the data to a primary storage device and attaching a primary sequence number associated with the primary storage device to the write command, thereby providing a numbered write command with a command sequence number. The numbered write command may then be transmitted to a secondary storage device. The method may further include comparing the command sequence number to a secondary sequence number associated with the secondary storage device. If the command sequence number matches the secondary sequence number, then the command may be executed. Otherwise, it may be ignored. | 2010-02-25 |
20100049929 | Efficient Management of Archival Images of Virtual Machines Having Incremental Snapshots - In one embodiment, a backup application is disclosed which is configured to detect that one or more incremental virtual disk files are provided in a virtual machine image. The backup application may invoke a merge function in the virtual machine monitor, and may merge the incremental virtual disk files into the base virtual disk file. Redundant data is thus eliminated, and may reduce the amount of archive media needed to store the backed-up virtual machine image. | 2010-02-25 |
20100049930 | Managing Backups Using Virtual Machines - One embodiment is a method for providing incremental backups for a source computing machine, the method including: (a) creating a first backup snapshot including a virtual machine (VM) snapshot of an initial copy of a source computing machine volume, wherein said VM snapshot includes a timestamp and a first redo log file; (b) reconfiguring and customizing said first backup snapshot to create a first bootable VM, writing changes associated with said reconfiguring and customizing into said first redo log file, then creating a first bootable snapshot including a VM snapshot of said first bootable VM, wherein said VM snapshot of said first bootable VM includes a timestamp for said first bootable VM and a redo log file; (c) performing an incremental update of said first backup snapshot or a subsequent backup snapshot, then creating a subsequent backup snapshot including a VM snapshot of said incremental update, wherein said VM snapshot of said incremental update includes a timestamp for said incremental update and a redo log file; and (d) reconfiguring and customizing said subsequent backup snapshot to create a subsequent bootable VM, then creating a subsequent bootable snapshot including a VM snapshot of said subsequent bootable VM, wherein said VM snapshot of said subsequent bootable VM includes a timestamp for said subsequent bootable VM and a redo log file. | 2010-02-25 |
20100049931 | Copying Logical Disk Mappings Between Arrays - In one embodiment, a storage controller comprises a first port that provides an interface to a host computer, a second port that provides an interface to a storage device, a processor, and a memory module communicatively connected to the processor and comprising logic instructions stored on a computer readable storage medium which, when executed by the processor, configure the processor to copy a logical disk mapping from a first storage array managed by a source storage controller to a second storage array managed by a destination storage controller by performing operations comprising obtaining, in the source storage controller, an object identifier listing for use with the logical disk mappings in the destination storage controller, copying, in the source storage controller, contents of logical disk mappings for use in the first storage array from a first storage container to a second storage container, and replacing, in the source storage controller, object identifiers associated with the logical disk mappings in the first storage array with object identifiers from the object identifier listing received in the first storage controller. | 2010-02-25 |
20100049932 | METHOD AND APPARATUS FOR AUTOMATIC SNAPSHOT - A method for automatic snapshot includes obtaining the amount of data written into a source Logical Unit Number (LUN) and performing increment accumulation; and taking a snapshot when a value of the increment accumulation exceeds the upper limit value. An apparatus for automatic snapshot is disclosed. In one embodiment of the invention, snapshots are taken according to the size of a data variable, only two characterizing parameters, an upper limit value and an increment value need to be added, and the determination logic is clear and concise. Thus, system efficiency or resource overload is not affected, the pertinence is strengthened, the resource usage is increased, and the adaptability is strengthened. Furthermore, stored data may be automatically protected with snapshot, and data safety and reliability are greatly improved. | 2010-02-25 |
20100049933 | REMOTE COPY SYSTEM - Even when a host does not give a write time to write data, consistency can be kept among data stored in secondary storage systems. The present system has plural primary storage systems each having a source volume and plural secondary storage systems each having a target volume. Once data is received from a host, each of the plural storage systems creates write-data management information having sequential numbers and reference information and sends, to one of the primary storage systems, the data, sequential number and reference information. Each of the secondary storage systems records reference information corresponding to the largest sequential number among serial sequential numbers and stores, in a target volume in an order of sequential numbers, data corresponding to reference information having a value smaller than the reference information based on the smallest value reference information among reference information recorded in each of the plural secondary storage systems. | 2010-02-25 |
20100049934 | STORAGE MANAGEMENT APPARATUS, A STORAGE MANAGEMENT METHOD AND A STORAGE MANAGEMENT PROGRAM - A purpose is to perform migration considering an I/O load that will be generated during the migration. To migrate data from one array group to another array group, a bandwidth that is available for use between the movement source array group and the movement destination array group is calculated, a volume whose write I/O amount is smaller than the calculated bandwidth is selected wherein the write I/O amount is the information transmission amount of information that is written, and data is migrated from the selected volume to the movement destination array group. | 2010-02-25 |
20100049935 | MANAGEMENT OF VERY LARGE STREAMING DATA SETS FOR EFFICIENT WRITES AND READS TO AND FROM PERSISTENT STORAGE - A method to produce a reverse skip list data structure in a computer readable medium, comprising: inputting streamed data to packets created in a temporary memory so as to create a sequence of packets; upon completion of creation of a packet in the stream, transferring the completed packet from the temporary memory to persistent memory; providing each of a plurality of respective packets with a respective pointer that skips over at least one other packet in the packet sequence and that indicates a location in persistent memory of a different respective packet in the packet sequence that was transferred to persistent memory prior to such providing of the respective pointer. | 2010-02-25 |
20100049936 | MEMORY ACCESS CONTROL DEVICE AND CONTROL METHOD THEREOF - A memory access control apparatus includes a plurality of memory access request generating modules and an arbitrator. When one of the memory access request generating modules receives a second memory access event while a memory device is performing a first memory access operation according to a first memory access request in response to a first memory access event, the memory access request generating module outputs a second memory access request corresponding to the second memory access event to the memory device after a delay time. The arbitrator is implemented for arbitrating memory access requests respectively outputted from the memory accessing request generating modules. | 2010-02-25 |
20100049937 | VOLUME RECORD DATA SET OPTIMIZATION APPARATUS AND METHOD - A method, apparatus, and computer program product for optimizing the organization of volume records stored in a volume record data set is disclosed herein. In certain embodiments, a method may include monitoring a volume comprising multiple data sets. Each data set may have associated therewith a volume record stored in a volume record data set. The method may further include tracking read and write operations to each of the data sets over a period of time. A count value may be stored in the volume record of each data set. The count value may be increased each time a read operation is performed to the associated data set. The count value may be decreased each time a write operation is performed to the associated data set. The volume records in the volume record data set may then be reorganized according to the size of the count values. | 2010-02-25 |
20100049938 | MEMORY MANAGEMENT METHOD, AND MEMORY MANAGEMENT APPARATUS - When a program execution unit of a computer executes a creation instruction of objects utilized by an execution target program in process of executing the execution target program, the program execution unit disposes a created object in an internal heap when a life period of the created object is not contained within life period of objects for root class and gets average value of life time corresponding to set of objects to which the created object belongs with reference to memory allocation information table to dispose the created object as a long-life object in an external heap when the gotten average value of life time is equal to or larger than a predetermined value. Accordingly, life time of objects is measured and long-life objects are not managed by GC, so that program utilizing objects can be executed at high speed. | 2010-02-25 |
20100049939 | METHOD FOR ADDRESS COMPARISON AND A DEVICE HAVING ADDRESS COMPARISON CAPABILITIES - A method for address comparison, the method includes: (i) receiving an input address; (ii) determining whether the input address is within a memory segment out of a group of memory segments by comparing, in parallel, the input address to memory segment boundaries of each memory segment of the group; (iii) wherein a comparison between the input address and a memory segment boundary comprises: (a) applying a XOR operation on bits of a most significant portion of the input address and corresponding bits of a most significant portion of the memory segment boundary; (b) ignoring bits of a least significant portion of the input address and corresponding bits of a least significant portion of the memory segment boundary; and (c) comparing, by utilizing a set of full comparators, between bits of an intermediate portion of the input address and corresponding bits of an intermediate portion of the memory segment boundary; wherein a location of bits that form the intermediate portion of the input address and of the memory segment boundary is selected in response to an alignment restriction imposed on the memory segment, to a size of the memory segment and in response to a boundary restriction imposed on the memory segment. | 2010-02-25 |
20100049940 | Memory Controller for Non-Homogeneous Memory System - A memory controller includes at least one interface adapted to be coupled to one or more first memory devices of a first memory type having a first set of attributes, and to one or more second memory devices of a second memory type having a second set of attributes. The first and second sets of attributes have at least one differing attribute. The controller also includes interface logic configured to direct memory transactions having a predefined first characteristic to the first memory devices and to direct memory transactions having a predefined second characteristic to the second memory devices. Pages having a usage characteristic of large volumes of write operations may be mapped to the one or more first memory devices, while pages having a read-only or read-mostly usage characteristic may be mapped to the one or more second memory devices. | 2010-02-25 |
20100049941 | System And Method For Parallel Processing Using A Type I Howard Cascade - A method using for performing a scatter-type data distribution among a cluster of computational devices. A number of nodes (equal to a value Cg, the number of tree generator channels) are initially generated, each connected to an initial generator, to create respective initial root nodes of an initial tree structure. Data is transmitted from the initial generator to each of the initial root nodes. Cg root nodes, each connected to a respective new generator, are generated to create respective roots of Cg newly generated tree structures. Each of the tree structures is expanded by generating Ct (the number of communication channels per node in each tree structure) new nodes connected to each node generated in each previous step. Data is then transmitted to each of the new nodes from an immediately preceding one of the nodes, and from each new generator to an associated root node. | 2010-02-25 |
20100049942 | DRAGONFLY PROCESSOR INTERCONNECT NETWORK - A multiprocessor computer system comprises a dragonfly processor interconnect network that comprises a plurality of processor nodes, a plurality of routers, each router directly coupled to a plurality of terminal nodes, the routers coupled to one another and arranged into a group, and a plurality of groups of routers, such that each group is connected to each other group via at least one direct connection. | 2010-02-25 |
20100049943 | Programmable control pipeline architecture and pipeline processing system thereof - The present invention provides a control pipeline architecture and a pipeline processing system thereof, which is applicable to digital and analog integrated circuit (IC) design flow for convenient hardware implementation. In which, a closed loop control pipeline architecture includes a plurality of control units, and each of the control units connected in series connection with one another to form a closed loop architecture to link an output of one control unit to an input of one next control unit; and an open loop control pipeline architecture included a plurality of control units, each of the control units connected in series connection with one another to form an open loop architecture to link an output of one control unit to an input of one next control unit. | 2010-02-25 |
20100049944 | Processor integrated circuit and product development method using the processing integrated circuit - A processor integrated circuit according to the present invention comprises low-speed and high-speed computing units ( | 2010-02-25 |
20100049945 | Crypto-engine for cryptographic processing of data - A crypto-engine for cryptographic processing has an arithmetic unit and an interface controller for managing communications between the arithmetic unit and a host processor. The arithmetic unit has a memory unit for storing and loading data and arithmetic units for performing arithmetic operations on the data. The memory and arithmetic units are controlled by an arithmetic controller. | 2010-02-25 |
20100049946 | PROCESSOR, COMPUTER READABLE RECORDING MEDIUM, AND STORAGE DEVICE - A processor includes: a first storage part that stores instructions of a program including sets of instruction groups, which sets are hierarchically structured; a second storage part that stores an address value of the first storage part in which an instruction to be read next is stored; a third storage part that includes storage areas respectively corresponding to hierarchical levels of the program; and a control part that executes, when an instruction read from the first storage part is a call instruction that calls a different one of the sets of instruction groups, a control to store the address value in the second storage part in one of the storage areas of the third storage part that corresponds to one of the hierarchical levels with which the different one of the sets of instruction groups being executed is associated. | 2010-02-25 |
20100049947 | PROCESSOR AND EARLY-LOAD METHOD THEREOF - A processor and an early-load method thereof are provided. In the early-load method, an instruction is fetched and determined in an instruction fetch stage to obtain a determination result. Whether to early-load an early-loaded data corresponding to the instruction is determined according to the determination result. A target data is fetched according to the instruction in an instruction execution stage if the early-loaded data is not loaded correctly. The early-loaded data is served as the target data if the early-loaded data is loaded correctly. | 2010-02-25 |
20100049948 | Serial flash semiconductor memory - A serial flash memory is provided with multiple configurable pins, at least one of which is selectively configurable for use in either single-bit serial data transfers or multiple-bit serial data transfers. In single-bit serial mode, data transfer is bit-by-bit through a pin. In multiple-bit serial mode, a number of sequential bits are transferred at a time through respective pins. The serial flash memory may have 16 or fewer pins, and even 8 or fewer pins, so that low pin count packaging such as the 8-pin or 16-pin SOIC package and the 8-contact MLP/QFN/SON package may be used. The availability of the single-bit serial type protocol enables compatibility with a number of existing systems, while the availability of the multiple-bit serial type protocol enables the serial flash memory to provide data transfer rates, in systems that can support them, that are significantly faster than available with standard serial flash memories. | 2010-02-25 |
20100049949 | PARALLEL PROGRAM EXECUTION OF COMMAND BLOCKS USING FIXED BACKJUMP ADDRESSES - The invention relates to a method for executing instructions in a processor, according to which an instruction to be executed of a program memory is addressed by a program control unit by means of a program counter reading of a program counter that operates in said unit. The addressed instruction is then read out, decoded and executed by the program control unit. The program control unit additionally stores the current program counter reading and the number of successive instructions when a jump instruction occurs in the form of a block instruction, according to which a specific number of instructions are to be executed successively, thus defining the return address after execution. After the last instruction of the instruction block to be executed, the program counter resumes the counting operation from the stored program counter reading. | 2010-02-25 |
20100049950 | RUNNING-SUM INSTRUCTIONS FOR PROCESSING VECTORS - The described embodiments provide a processor for generating a result vector with summed values from a first input vector. During operation, the processor receives the first input vector, a second input vector, and a control vector. When generating the result vector, the processor first captures a base value from a key element in the second input vector. The processor then writes the sum of the base value and values from relevant elements in the first input vector into selected elements in the result vector. In addition, a predicate vector can be used to control the values that are written to the result vector. | 2010-02-25 |
20100049951 | RUNNING-AND, RUNNING-OR, RUNNING-XOR, AND RUNNING-MULTIPLY INSTRUCTIONS FOR PROCESSING VECTORS - The described embodiments provide a processor for generating a result vector with shifted values. During operation, the processor receives a first input vector, a second input vector, and a control vector. When generating the result vector, the processor first captures a base value from a key element position in the second input vector. The processor then writes the product of the base value and values from relevant elements in the first input vector into selected elements in the result vector. In addition, a predicate vector can be used to control the values that are written to the result vector. | 2010-02-25 |
20100049952 | MICROPROCESSOR THAT PERFORMS STORE FORWARDING BASED ON COMPARISON OF HASHED ADDRESS BITS - An apparatus for decreasing the likelihood of incorrectly forwarding store data includes a hash generator, which hashes J address bits to K hashed bits. The J address bits are a memory address specified by a load/store instruction, where K is an integer greater than zero and J is an integer greater than K. The apparatus also includes a comparator, which outputs a first value if L address bits specified by the load instruction match L address bits specified by the store instruction and K hashed bits of the load instruction match corresponding K hashed bits of the store instruction, and otherwise to output a second value, where L is greater than zero. The apparatus also includes forwarding logic, which forwards data from the store instruction to the load instruction if the comparator outputs the first value and foregoes forwarding the data when the comparator outputs the second value. | 2010-02-25 |
20100049953 | DATA CACHE RECEIVE FLOP BYPASS - A microprocessor includes an N-way cache and a logic block that selectively enables and disables the N-way cache for at least one clock cycle if a first register load instructions and a second register load instruction, following the first register load instruction, are detected as pointing to the same index line in which the requested data is stored. The logic block further provides a disabling signal to the N-way cache for at least one clock cycle if the first and second instructions are detected as pointing to the same cache way. | 2010-02-25 |
20100049954 | METHOD FOR SPECULATIVE EXECUTION OF INSTRUCTIONS AND A DEVICE HAVING SPECULATIVE EXECUTION CAPABILITIES - A method for speculative execution of instructions, the method includes: decoding a compare instruction; speculatively executing, in a continuous manner, conditional instructions that are conditioned by a condition that is related to a resolution of the compare instruction and are decoded during a speculation window that starts at the decoding of the compare instruction and ends when the compare instruction is resolved; and stalling an execution of a non-conditional instruction that is dependent upon an outcome of at least one of the conditional instructions, until the speculation window ends. | 2010-02-25 |
20100049955 | DEBUG INSTRUCTION FOR USE IN A MULTI-THREADED DATA PROCESSING SYSTEM - For use in a data processing system comprising a processor configured to execute a first set of instructions corresponding to a first thread and a second set of instructions corresponding to a second thread, a method is provided. The method comprises in response to execution of a debug related instruction by the first thread while executing the first set of instructions, generating a debug event for processing by the second thread, wherein processing the debug event comprises causing a halting operation related to the processor. | 2010-02-25 |
20100049956 | DEBUG INSTRUCTION FOR USE IN A MULTI-THREADED DATA PROCESSING SYSTEM - For use in a data processing system comprising a processor configured to execute a first set of instructions corresponding to a first thread and a second set of instructions corresponding to a second thread, a method is provided. The method comprises in response to execution of a debug instruction by the first thread while executing the first set of instructions, generating a debug event for processing by the second thread. | 2010-02-25 |
20100049957 | RECOVERING A SUBORDINATE STRAND FROM A BRANCH MISPREDICTION USING STATE INFORMATION FROM A PRIMARY STRAND - Embodiments of the present invention provide a system that executes program code in a processor. The system starts by executing the program code in a normal mode using a primary strand while concurrently executing the program code ahead of the primary strand using a subordinate strand in a scout mode. Upon resolving a branch using the subordinate strand, the system records a resolution for the branch in a speculative branch resolution table. Upon subsequently encountering the branch using the primary strand, the system uses the recorded resolution from the speculative branch resolution table to predict a resolution for the branch for the primary strand. Upon determining that the resolution of the branch was mispredicted for the primary strand, the system determines that the subordinate strand mispredicted the branch. The system then recovers the subordinate strand to the branch and restarts the subordinate strand executing the program code. | 2010-02-25 |
20100049958 | METHOD FOR EXECUTING AN INSTRUCTION LOOPS AND A DEVICE HAVING INSTRUCTION LOOP EXECUTION CAPABILITIES - A method for managing a hardware instruction loop, the method includes: (i) detecting, by a branch prediction unit, an instruction loop; wherein a size of the instruction loop exceeds a size of a storage space allocated in a fetch unit for storing fetched instructions; (ii) requesting from the fetch unit to fetch instructions of the instruction loop that follow the first instructions of the instruction loop; and (iii) selecting, during iterations of the instruction loop, whether to provide to a dispatch unit one of the first instructions of the instruction loop or another instruction that is fetched by the fetch unit; wherein the first instructions of the instruction loop are stored at the dispatch unit. | 2010-02-25 |
20100049959 | METHOD AND SYSTEM FOR CONFIGURATION OF COMPONENTIZED SOFTWARE APPLICATIONS - A method and system for centrally managing configuration of software application components, is provided. One implementation involves creating configuration metadata for each component of the application; providing a specific configuration for a component; checking validity of the specific configuration using the metadata for said component; and monitoring the application component configuration for consistency with said specific configuration. | 2010-02-25 |
20100049960 | OPERATING SYSTEM STARTUP CONTROL METHOD AND INFORMATION PROCESSING APPARATUS - An operating system startup control method includes the steps of continuing an operation of a program loader for a specific processor among program loaders for the other processors that are started up by turning on of the power supply to the plural processors, while terminating the program loaders for the other processors; starting up an OS bridge that manages a hardware resource shared by the plural processor, using the program loader and starting up an operating system corresponding to the specific processor and another operating system corresponding to the other processors, using the OS bridge that is started up. | 2010-02-25 |
20100049961 | UPDATE METHOD FOR BASIC INPUT/OUTPUT SYSTEM AND UPDATE SYSTEM THEREOF - An update method for a basic input/output system (BIOS) and an update system thereof are provided. Firstly, a program code of a boot block included in a main BIOS block is executed to detect whether the main BIOS block is crashed. A program code of the BIOS is stored in the main BIOS block. A BIOS image file is searched from a storage device when the main BIOS block is crashed, which includes a program code of a graphical user interface (GUI) and a plurality of update files. The program code of the GUI is executed to display graphic updating information of the BIOS. One of the update files is selected by a control command to update the main BIOS block. Therefore, the needed update file can be selected to update the BIOS by graphically display the updating information of the bios, thereby improving the update efficiency and usage convenience. | 2010-02-25 |
20100049962 | METHOD FOR LOADING AND UPDATING CENTRAL PROCESSING UNIT MICROCODE INTO BASIC INPUT/OUTPUT SYSTEM - The present invention relates to a method for loading a central processing unit microcode into a basic input/output system and a method for updating the central processing unit microcode of the basic input/output system. A system management interrupt instruction is applied to inform the basic input/output system an address and a length of the central processing unit microcode. Then, the basic input/output system performs an interrupt instruction to load the central processing unit microcode to a specific block of the basic input/output system. | 2010-02-25 |
20100049963 | Multicore Processor and Method of Use That Adapts Core Functions Based on Workload Execution - A processor has multiple cores with each core having an associated function to support processor operations. The functions performed by the cores are selectively altered to improve processor operations by balancing the resources applied for each function. For example, each core comprises a field programmable array that is selectively and dynamically programmed to perform a function, such as a floating point function or a fixed point function, based on the number of operations that use each function. As another example, a processor is built with a greater number of cores than can be simultaneously powered, each core associated with a function, so that cores having functions with lower utilization are selectively powered down. | 2010-02-25 |
20100049964 | Method and Apparatus for Integrating Precise Time Protocol and Media Access Control Security in Network Elements - A system includes a medium access control (MAC) module and a precise time protocol (PTP) module. The MAC module is configured to generate an identifier for a PTP frame, generate an encrypted PTP frame by encrypting the PTP frame, and output the identifier. The PTP module is configured to receive the identifier, identify the encrypted PTP frame based on the identifier in response to the encrypted PTP frame being output from the MAC module, and time stamp the encrypted PTP frame prior to the encrypted PTP frame being transmitted. | 2010-02-25 |
20100049965 | METHOD AND APPARATUS FOR PROTECTING PERSONAL INFORMATION IN A HOME NETWORK - A method for protecting personal information in a home network is provided, in which a controlled device receives a subscribe request for a service of the controlled device, from a control point, and accepts the subscribe request. The controlled device receives information about the control point from the control point, and performs event delivery to the control point according to a policy that is set based on the information about the control point, when an event occurs in the controlled device. | 2010-02-25 |
20100049966 | SECRET INFORMATION DELIVERY SYSTEM AND SECRET INFORMATION DELIVERY METHOD - To prevent information leakage at the time of transferring secret information data stored by using secret sharing scheme to the outside. | 2010-02-25 |
20100049967 | METHOD AND NETWORK FOR ENSURING SECURE FORWARDING OF MESSAGES - The method and network ensure secure forwarding of a message in a telecommunication network that has at least one first terminal and another terminal. The first terminal moves from a first address to a second address. A secure connection between the first address of the first terminal and the other terminal defining at least the addresses of the two terminals is established. When the first terminal moves from the first address to a second address, the connection is changed to be between the second address and to the other terminal by means of a request from the first terminal and preferably a reply back to the first terminal. | 2010-02-25 |
20100049968 | COMPUTER NETWORK - A computer network is disclosed in which a group of computers co-operate to perform a distributed application. In order to ensure that only members of that group of computers are able to carry out certain operations, messages sent in the performance of the distributed application are checked by the recipient for the presence of a group membership token. The inclusion of a group membership token is controlled by one or more group membership handlers which intercept messages from local components and only include a group membership token with the message if they list the sending local component as being entitled to include the group membership token in the message. Furthermore, by operating the group membership token on a separate machine, or preferably a separate virtual machine from the local component, security is further improved. In the most preferred embodiments, the group token handler and/or the local component are hosted on virtual machines which provide virtualised cryptographic functionality. | 2010-02-25 |
20100049969 | System and method for providing security in mobile WiMAX network system - A system for providing security in a mobile Microwave Access (WiMAX) network system is constructed with a licensed certification authority providing a certificate and a first encryption module storing the certificate provided by the licensed certification authority, encrypting a traffic encryption key and a message generated by the first encryption module with the stored certificate, and transmitting the encrypted traffic encryption key and message to a destination. When receiving a message encrypted with a traffic encryption key, the first encryption module decrypts the received message with the traffic encryption key generated by the first encryption module and processes the message. The system is further constructed with a second encryption module. When receiving the message encrypted with the certificate from the first encryption module, the second encryption module decrypts the received message with the certificate provided by the licensed certification authority to detect the traffic encryption key, and encrypts a message with the detected traffic encryption key to transmit the encrypted message. | 2010-02-25 |
20100049970 | METHODS AND SYSTEMS FOR SECURE COMMUNICATIONS USING A LOCAL CERTIFICATION AUTHORITY - A local network traffic processor and an application are resident on a common computer system. The application is configured to trust a server certificate issued by a local network traffic processor, the local network traffic processor operatively being paired with a remote network traffic processor. A proxy server certificate, generated using identification information of a server associated with the remote network traffic processor and signed by the local certification authority, is used to establish a secure session between a local network traffic processor and the application. | 2010-02-25 |
20100049971 | Apparatus and Method for Using Secure Removable Media (SRM) in Digital Rights Management - An apparatus and a method for using a Secure Removable Media (SRM) in Digital Rights Management (DRM) are provided. The method for using the SRM in Digital Rights Management (DRM) includes determining, at a plurality of content service providers, an SRM usage rule and providing the determination to a trust authority using an eXtensible Markup Language (XML); receiving messages comprising the SRM usage rule from the content service providers and sending the messages to an apparatus together with an electronic signature; and receiving the messages comprising the SRM usage rule and changing an operation of the apparatus according to requirements of at least one content service provider. Thus, various content business models can be realized. | 2010-02-25 |
20100049972 | Apparatus and method for using contents information in digital rights management - An apparatus and method for determining contents information corresponding to a Rights Object (RO) by transmitting information on contents together when the RO is moved from a mobile device to a memory card or a smart card or when the RO is moved from the memory card or the smart card to the mobile device are provided. The apparatus includes a meta information manager for determining information on contents corresponding to the RO when the RO is moved, and for generating meta information containing the determined contents information, and a controller for providing control to transmit the RO and the meta information generated by the meta information manager to a portable storage device. Accordingly, the conventional problem can be solved in which information on contents cannot be determined by using a Contents IDentifier (CID) if the RO does not exist together with the contents. | 2010-02-25 |
20100049973 | METHOD, APPARATUS, AND SYSTEM FOR SENDING AND RECEIVING SECURITY POLICY OF MULTICAST SESSIONS - A method, apparatus, and system for sending and receiving a security policy of multicast sessions are provided. The method for sending the security policy of multicast sessions includes: after a Datagram Transport Layer Security (DTLS) session is set up between a sender and a receiver, receiving a security policy request from the receiver, constructing a security policy response according to a security policy, multiplexing the security policy response and Secure Real-Time Transport Protocol (SRTP) multicast session data, and sending the multiplexed data to the receiver. | 2010-02-25 |
20100049974 | METHOD AND APPARATUS FOR VERIFICATION OF INFORMATION ACCESS IN ICT SYSTEMS HAVING MULTIPLE SECURITY DIMENSIONS AND MULTIPLE SECURITY LEVELS - We describe a model for multilevel information security. Information security is defined as combinations of confidentiality, integrity and availability. These three aspects are regarded as properties of a generic information object, and are treated as mutually independent. Each aspect is represented by an axis in an n-dimensional vector space, where n is the number of independent security aspects of interest. The model can ensure directed information flow along an arbitrary number of axes simultaneously. An information object is assigned a security label denoting the security level along an arbitrary number of axes. The model is role based. A role is assigned an access label along the same axes. Verification of a role's access to information is performed by comparing access label with security label. Since the aspects represented by each axis are mutually independent, each axis may be treated by itself. This enables a very efficient algorithm for verification of access. The model will therefore be suited for systems having low processing capacity. Based on this model, we describe a method and an apparatus to ensure confidentiality, integrity and availability for information from peripheral equipment in communications networks. Such peripheral equipment may be, but is not limited to personal terminals for rescue personnel, soldiers etc, sensors (detectors) for smoke, gases, motion, intrusion etc. The invention supports decision support systems in that the information has known confidentiality, integrity and availability even from inexpensive sensors, which do not include a processor or the like. The invention differs from prior art in that it, among other features: —Treats an arbitrary number of mutually independent aspects of information security, —Assumes that confidentiality, integrity and availability are mutually independent variables, —On this basis can verify access to information by means of simple binary operations, by a simple logic gate circuit or by a processor. | 2010-02-25 |
20100049975 | Method and apparatus for secure online transactions - Phishing attacks succeed by exploiting a user's inability to distinguish legitimate websites from spoofed websites. Most prior work focuses on assisting the user in making this distinction; however, users must make the right security decision every time. Unfortunately, humans are ill-suited for performing the security checks necessary for secure site identification, and a single mistake may result in a total compromise of the user's online account. Fundamentally, users should be authenticated using information that they cannot readily reveal to malicious parties. Placing less reliance on the user during the authentication process enhances security and eliminates many forms of fraud. We disclose using a trusted device to perform mutual authentication that eliminates reliance on perfect user behavior, thwarts Man-in-the-Middle attacks after setup, and protects a user's account even in the presence of keyloggers and most forms of spyware. | 2010-02-25 |
20100049976 | ADAPTIVE DATA VERIFICATION FOR RESOURCE-CONSTRAINED SYSTEMS - A system and method for adaptively verifying data in resource constrain systems. The adaptive data verification mechanism employs the proper mode of verification adaptively to balance cost/performance requirements plus security requirements. The algorithm uses a belief level for the validity of a received message, and assigns the belief level to a scale between a bona fide message at one end of the scale and a malicious message at an opposite end of the scale. Depending where on the scale the belief level falls determines which validation mode will be used to authenticate the message. In an alternate embodiment, the belief level relative to a scale and the amount of data waiting to be processed in a buffer are both used to determine which mode will be used to validate the message. | 2010-02-25 |
20100049977 | ELECTRONIC APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - The present invention relates to an electronic apparatus, an information processing method, and a program that allow a provision server of an application to be capable of easily causing an electronic apparatus having an IC chip to manage data. When a service-issuing command transmitted from a service-issuing terminal | 2010-02-25 |
20100049978 | CLIENT DEVICE, MAIL SYSTEM, PROGRAM, AND RECORDING MEDIUM - A mail system having high security is realized by mounting TCP2 for mail communication between client apparatuses. The present invention relates to a mail communication system which is connected to a network and exchanges mails between client apparatuses provided with the existing mailers, and each client apparatus is mounted with a TCP2 driver. A TCP2 driver | 2010-02-25 |
20100049979 | SYSTEM AND METHOD FOR SENDING ENCRYPTED MESSAGES TO A DISTRIBUTION LIST - A system and method for sending encrypted messages to a distribution list that facilitates the sending of such messages only to individuals or other entities associated with the distribution list that will be able to read the message. In one embodiment, the method comprises the steps of: identifying a distribution list address in a message; determining one or more member addresses associated with the distribution list address; for each member address, determining if a public key for a member identified by the respective member address is available on the computing device; encrypting the message to each member identified by the one or more member addresses for which a public key for the respective member is available on the computing device; sending the encrypted message to the distribution list address if each of the one or more member addresses associated with the distribution list identifies a member for which a public key is available on the computing device; and sending the message to each of the one or more member addresses that identifies a member for which a public key is available on the computing device otherwise. | 2010-02-25 |
20100049980 | METHODS AND SYSTEMS FOR BOOTSTRAPPING SECURITY KEY INFORMATION USING SESSION INITIATION PROTOCOL - Methods, systems and communication nodes for bootstrapping key establishment to exchange encryption keys between a terminal-based client and an application server using Session Initiation Protocol (SIP) signaling are described. | 2010-02-25 |
20100049981 | SECURE MEDIA PERIPHERAL ASSOCIATION IN A MEDIA EXCHANGE NETWORK - A method for establishing secure access to a media peripheral in a home via a node in a communication network may include acquiring by the node, security data associated with the media peripheral. The method may include searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral. The method may further include communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when the previously acquired security data is not found. The node may utilize the acquired security data associated with the media peripheral and the previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network, when the previously acquired security data is found. | 2010-02-25 |
20100049982 | DNSSEC BASE ROLLOUT - The invention relates to a method for accessing via a first device a predetermined piece of information duplicated in several server devices, each server device implementing a sub-assembly of safety mechanisms from a predetermined set of safety mechanisms in order to provide a predetermined safety level for accessing the predetermined piece of information, wherein said method comprises the following steps: a) transmission ( | 2010-02-25 |
20100049983 | METHOD OF AUTHENTICATING DIGITAL SIGNATURE - A method of authenticating a digital signature is provided. The method includes sending a request from a first entity to a second entity, at least some of the request being digitally signed with a base key by the first entity, receiving, at the first entity, a digital signature and a bit-pattern from the second entity, the digital signature having been generated by the second entity using a variant key to digitally sign at least part of data indicative of a value stored in the second entity which is to be authenticated, the variant key being based on the result of applying a one way function to the base key and the bit-pattern, receiving the data at the first entity, generating, at the first entity, the variant key from the bit-pattern and the base key, and authenticating, at the first entity, the digital signature using the generated variant key. Only the first entity includes the base key and the second entity includes the variant key and the bit-pattern. | 2010-02-25 |
20100049984 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM AND INFORMATION PROCESSING SYSTEM - An information processing apparatus according to the present application includes a first application allowed to access the IC chip, including an IC chip in which predetermined data is recorded, an IC chip reading unit that reads the data recorded in the IC chip, and a signature data generation unit that generates signature data by performing encryption processing on the recorded data read by the IC chip reading unit and a second application not allowed to access the IC chip, including a server access unit that requests acquisition of content from an information providing server by receiving the signature data and the recorded data from the first application and transmitting the signature data and the recorded data to the information providing server that provides predetermined content. | 2010-02-25 |
20100049985 | DISTRIBUTED FREQUENCY DATA COLLECTION VIA DNS NETWORKING - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 2010-02-25 |
20100049986 | HASH VALUE GENERATOR - To achieve high safety, large-sized nonlinear permutation is employed; however, the larger permutation processing is, the more the period of time required for the processing is, which hence is not efficient. There is provided a hash value generation method or a hash value generator which has the following aspects and which is highly safe and is capable of executing processing at a high speed.
| 2010-02-25 |
20100049987 | METHOD AND ARRANGEMENT FOR SECURE USER AUTHENTICATION BASED ON A BIOMETRIC DATA DETECTION DEVICE - An arrangement for secure user authentication includes a computer or telecommunication terminal with a smartcard and a device. The smartcard is adapted to securely store biometric information relating to at least one user and the device is adapted to detect biometric data of users. The smartcard and the device include a radio interface for communicating together and a module for exchanging biometric information between each other. In this way, tampering of the transferred biometric information is difficult. In order to increase the security, one or more of the following measures may be used: a secure communication channel between the device and the smartcard, a direct (preferably short range) communication channel between the device and the smartcard and encryption and decryption of biometric information transferred between the device and the smartcard. | 2010-02-25 |
20100049988 | METHOD FOR ACCESS TO A PORTABLE MEMORY DATA SUPPORT WITH AUXILIARY MODULE AND PORTABLE MEMORY DATA SUPPORT - A method, a memory data carrier ( | 2010-02-25 |
20100049989 | Digital content management method and apparatus for mobile terminal - A mobile terminal includes an apparatus configured to perform content management method. When a DRM content that is not playable owing to license expiration is found during the content playback mode, the non-playable DRM content can be removed, moved to a pre-specified folder, or license-renewed according to settings. The content management method includes: playing back a content selected from a given content list during a content playback mode; finding, during the content playback mode, an expired DRM content that is not playable owing to license expiration; determining, when an expired DRM content is found, a handling option for the expired DRM content; and performing one of deleting the expired DRM content, moving the expired DRM content, and renewing the license associated with the expired DRM content, according to the determined handling option. | 2010-02-25 |
20100049990 | STORAGE DEVICE AND RECORDING AND REPRODUCING SYSTEM - A storage device includes a decryption section, non-volatile memory, and an encryption section. The decryption section decrypts externally input encrypted data. The non-volatile memory records data decrypted by the decryption section. The encryption section encrypts and outputs decrypted data read out from the non-volatile memory. | 2010-02-25 |
20100049991 | SAFE SELF-DESTRUCTION OF DATA - A method for securing data includes encrypting the data and storing a key ( | 2010-02-25 |
20100049992 | APPLICATION EXECUTING DEVICE, MANAGING METHOD, AND PROGRAM - A BD-ROM stores a disc root certificate | 2010-02-25 |
20100049993 | SYSTEMS AND METHODS FOR LOCKING AND EXPORTING THE LOCKING OF A REMOVABLE MEMORY DEVICE - A device and method is provided for commonly and securely allowing, as access control on a memory card, a plurality of information processing apparatuses to lock/unlock the memory. On the basis of a lock command input from an information processing apparatus serving as a host, such as a PC, an information storage device, such as a memory card, determines whether (a) a standard lock key set serving as a key set prohibiting output or (b) an export lock key set serving as a key set permitting output is detected and stores corresponding key set information. Only when the export lock key set is detected, output is permitted provided that predetermined verification succeeds. | 2010-02-25 |
20100049994 | Universal Ethernet Power Adapter - A power apparatus enables communication on a network. The power apparatus comprises a power adapter and a power injector coupled to the power adapter. An Ethernet output terminal is coupled to the power injector which enables power management and universal connection to the power adapter. | 2010-02-25 |
20100049995 | Enhanced Thermal Management for Improved Module Reliability - Mitigating effects of delamination of components in the data processing system is provided. A signal is received from one or more sensors in the data processing system. A determination is made as to whether the signal indicates that one threshold in a plurality of thresholds has been reached or exceeded. Responsive to the signal indicating that one threshold in the plurality of thresholds has been reached or exceeded, a determination is made as to whether the one threshold is a low temperature threshold or a high temperature threshold. Responsive to the one threshold being a low temperature threshold, one of a plurality of actions is initiated to increase a temperature of the data processing system thereby mitigating effects of delamination of the components in the data processing system. | 2010-02-25 |
20100049996 | LOAD DETECTING SYSTEM AND METHOD - A load detecting system includes a chipset connected to a hardware unit and an interrupt controller connected to the chipset. A maximum voltage value and a minimum voltage value of the hardware unit are stored in the chipset. The chipset is configured to detect a voltage signal of the hardware, and compare the voltage signal to the maximum voltage and the minimum voltage values to output an interrupt signal to the interrupt controller correspondingly. The interrupt controller is configured to adjust work frequency of the hardware unit according to the interrupt signal. | 2010-02-25 |
20100049997 | COMPUTER SYSTEM CAPABLE OF DYNAMICALLY MODULATING CORE-VOLTAGE AND CLOCK FREQUENCY OF CPU - A computer system capable of dynamically modulating a core-voltage and a clock frequency of a CPU is provided. The computer system includes a CPU capable of receiving a voltage and then generating a feedback voltage; a PWM controller capable of modulating and outputting the voltage in response to a compensated-feedback voltage, and capable of monitoring a real-time load of CPU and then generating a power monitor signal; an embedded controller for determining a power consumption of the CPU in response to the power monitor signal and then generating a control signal and a system interrupt notify signal; a voltage modulation unit capable of generating a compensate voltage in response to the control signal; a clock-frequency generator for generating a clock with a first frequency to the central processing unit; and, a BIOS for modulating the first frequency of the clock based on the system interrupt notify signal; wherein the compensated-feedback voltage is equal to the feedback voltage added to the compensate voltage. | 2010-02-25 |
20100049998 | METHOD AND APPARATUS FOR CHANGING POWER CLASS FOR A POWERED DEVICE - A method and apparatus for changing power class for a powered device are provided. During operation, a powered device, such as an IP telephone, receives power from a power source via a PoE device. In the event that the powered device detects connection to a second powered device, such as an IP telephone module, the powered device transmits a classification signal to the power source. Based upon the classification signal, the power source performs a powered device classification procedure to reclassify the powered device, such as according to an IEEE 802.3af standard, and provide an increase amount of power to the powered device. The powered device, in turn, provides a portion of the power to the modular device. The modular powered device, therefore, receives power directly from the first powered device and does not require additional equipment in order to operate. | 2010-02-25 |
20100049999 | System Software For Managing Power Allocation To Ethernet Ports In The Absence of Mutually Exclusive Detection And Powering Cycles In Hardware - A method of allocating power to ports in an Ethernet switch, including: ( | 2010-02-25 |
20100050000 | Network Element Power Management - A method and apparatus for power management of a network element. In one embodiment of the invention, a networking card configuration request is received for a type of networking card irrespective of a networking card of that type being inserted into the network element. The network element does not enable networking cards unless they are successfully configured and inserted. The amount of power that the networking card consumes is determined without reading a power consumption value from that card. If it is determined that allowing that type of networking card to be configured would exceed the power capacity of the network element, the configuration request is denied and the networking card, if or when inserted remains disabled and is not powered up. However, if allowing that type of networking card to be configured would not exceed the power capacity, the configuration request is accepted, the amount of power that type of networking card consumes is allocated, and the card will be enabled when inserted. | 2010-02-25 |
20100050001 | Peer-to-Peer Communications - In a multiple-access network, network access terminals conduct peer-to-peer communications on reverse link channels of the network. | 2010-02-25 |
20100050002 | Energy-Saving System for Electronic Apparatus - The present invention discloses an energy-saving system for electronic apparatus, comprising an electronic device and a remote controller. The electronic device includes a power supply module, a microprocessor module and a power-saving module. The microprocessor module is electrically connected to the power supply module. The power-saving module is electrically connected to a power source, the microprocessor module and the power supply module. The remote controller transfers a remote control signal to the power-saving module. Herein, upon receipt of the remote control signal, the power-saving module electrically disconnects the power supply module so as to stop electrical energy supply to the power supply module. Herein the power-saving module consumes 0.08 to 0.12 Watts of electrical energy. Therefore, the energy-saving system for electronic apparatus according to the present invention consumes simply about 0.1 Watts of electrical energy in standby mode, thereby achieving the effect of power-saving. | 2010-02-25 |
20100050003 | MONITOR POWER MANAGEMENT - A method of performing power down of a computer monitor when a video signal is no longer present and apparatus which performs the method schedules an automatic power conservation mode after a given period of time unless an inhibiting power sustain command embedded in the video signal is received. The power sustain command is placed in the regular video signal at a regular interval. The frequency of the command may be made shorter than the power-off timeout in order to maintain the power-on state of the monitor. Multiple time lapse thresholds may be set to permit multiple power conservation modes. This method may be implemented without making hardware changes in retrofitting a monitor. | 2010-02-25 |
20100050004 | INTRODUCING SELECTIVE ENERGY EFFICIENCY IN A VIRTUAL ENVIRONMENT - In some embodiments, a method comprises hosting a virtual universe in which one or more avatars interact with one or more virtual objects. The method can also include presenting energy conservation options that reduce amounts of power consumed in rendering the avatars and virtual objects in the virtual universe, detecting a selection of the energy conservation options, and configuring logic for rendering the avatars and virtual objects according to the selected energy conservation options. The method can also comprise rendering, according to the selection of energy conservation options, the avatars and virtual objects in the virtual universe. | 2010-02-25 |
20100050005 | Display Device and Display Method - A display device includes: a display module; a storage module storing state setting information indicating whether setting of a power consumption state of the display module has been completed; an information readout module reading out the state setting information from the storage module at startup of the display module; a decision module deciding to set the power consumption state of the display module when the readout state setting information indicates non-setting; a display instruction module causing the display module to display a screen for setting the power consumption state in response to the decision to set the power consumption state; an input module inputting information for setting the power consumption state based on the screen displayed in the display module; and a state setting module setting the power consumption state based on the information inputted by the input module. | 2010-02-25 |
20100050006 | Communication apparatus, power supply control method, display apparatus, communication method, and computer program product - The detecting unit detects a disconnection of communications that have been established with a display apparatus. When the disconnection of the communications is detected, the message generating unit generates a confirmation message that confirms whether the communications should be reestablished. The transmitting unit transmits the confirmation message to the display apparatus. The receiving unit receives a reply message that indicates whether the communications should be reestablished from the display apparatus. The main power supply controlling unit shuts down the main power supply when the reply message indicates that the communications should not be reestablished, or when no reply message is received. | 2010-02-25 |
20100050007 | SOLID STATE DISK AND METHOD OF MANAGING POWER SUPPLY THEREOF AND TERMINAL INCLUDING THE SAME - A solid state disk and a method for managing power supply of the solid state disk and a terminal including the solid state disk. The solid state disk includes at least one data storage module for storing data, a management module for controlling data operation for said data storage module, controlling said data storage module as an operating power supply state when said data storage module is performing the data operation, and controlling said data storage module as a non-operating power supply state at other times. The data storage module may be enabled as the operating power supply state only when the data operation is performed for a certain data storage module, and the data storage module may be set as the non-operating power supply state when it is in the idle state or after the data operation is completed. Thus, the power consumption of the solid state disk is effectively saved, and the duration of the notebook computer which applies the solid state disk is prolonged. | 2010-02-25 |
20100050008 | Estimating Power Consumption in a Computing Environment - A method for determining power consumption in a data storage system is provided. The method comprises determining data access patterns for at least a first storage device in a storage system based on operations performed by the first storage device; and calculating power consumption for the storage system by interpolating costs associated with the operations performed by the first storage device, wherein the cost associated with each operation is determined based on: (1) various levels of activities for the first storage device and a mix of workload characteristics, and (2) predetermined power consumption measurements obtained from one or more benchmarks for same operations performed by a second storage device in a test environment. | 2010-02-25 |
20100050009 | BATTERY VOLTAGE SAF AVOIDANCE ALGORITHM FOR A WIRELESS HANDHELD DEVICE - A method and system for power source management of a portable device, A power source used to supply electrical energy for a portable device should ideally operate with a constant terminal voltage. However, the terminal voltage of a cell or group of cells used as a source of electrical energy can be expected to reduce in amplitude over its operational lifetime. Near the end of operational lifetime, the terminal voltage of such a source can be expected to decrease rapidly. Furthermore, the source terminal voltage will also exhibit significant variations in amplitude in response to changes in electric current demands on the source. Such source voltage variations can impair or even prevent proper operation of the electronic circuits within the portable device. Power management for proper operation of a portable device is necessary to ensure proper device operation and to prevent loss of data. The present method and system controls portable device operation by periodic determination of average source terminal voltage which is faster and simpler than continuous monitoring used with present systems. Comparison of the periodic average source terminal voltage with stored operational voltage limits allows either temporary or permanent curtailment of certain device operations. Such action can be used to prevent any loss of device data. Further, the present method offers the advantage of identifying momentary fluctuations in source terminal voltage caused by temporary demands in source current levels. Thus, continuous monitoring and prior knowledge of source load demands and equipment as required by present methods are eliminated. | 2010-02-25 |
20100050010 | Data-Width Translation Between Variable-Width and Fixed-Width Data Ports - Described are memory modules that support dynamic point-to-point extensibility using fixed-width memory die. The memory modules include data-width translators that allow the modules to vary the effective width of their external memory interfaces without varying the width of the internal memory interfaces extending between the translators and associated fixed-width dies. The data-width translators use a data-mask signal to selectively prevent memory accesses to subsets of physical addresses. This data masking divides the physical address locations into two or more temporal subsets of the physical address locations, effectively increasing the number of uniquely addressable locations in a given module. Reading temporal addresses in write order can introduce undesirable read latency. Some embodiments reorder read data to reduce this latency. | 2010-02-25 |
20100050011 | FAILURE RECOVERY METHOD - The reliability is improved at a low cost even in a virtualized server environment. The number of spare servers is reduced for improving the reliability and for saving a licensing fee for software on the spare servers. A server system comprises a plurality of physical servers on which a plurality of virtual servers run, a single standby server, a module for detecting an active virtual server, and a module for switching the correspondence of boot disks of virtualization modules for controlling virtual servers to the physical servers. When a physical server fails, the boot disk of the associated virtualization module is connected to a spare server to automatically activate on the spare server those virtual servers which have been active upon occurrence of the failure. | 2010-02-25 |
20100050012 | COMPUTER SYSTEM, STORAGE SYSTEM AND CONFIGURATION MANAGEMENT METHOD - Maintenance storage system by storage system is enabled, and the removal or replacement of a storage system is enabled while continuing the operation of a system. | 2010-02-25 |
20100050013 | VIRTUAL DISK DRIVE SYSTEM AND METHOD - A disk drive system and method capable of dynamically allocating data is provided. The disk drive system may include a RAID subsystem having a pool of storage, for example a page pool of storage that maintains a free list of RAIDs, or a matrix of disk storage blocks that maintain a null list of RAIDs, and a disk manager having at least one disk storage system controller. The RAID subsystem and disk manager dynamically allocate data across the pool of storage and a plurality of disk drives based on RAID-to-disk mapping. The RAID subsystem and disk manager determine whether additional disk drives are required, and a notification is sent if the additional disk drives are required. Dynamic data allocation and data progression allow a user to acquire a disk drive later in time when it is needed. Dynamic data allocation also allows efficient data storage of snapshots/point-in-time copies of virtual volume pool of storage, instant data replay and data instant fusion for data backup, recovery etc., remote data storage, and data progression, etc. | 2010-02-25 |
20100050014 | DUAL INDEPENDENT NON VOLATILE MEMORY SYSTEMS - Disclosed is a method, system, and computer readable medium for restoring a failed non-volatile memory (NVM) system in a wireless device having a primary NVM system and a secondary NVM system. The method does not require a reboot of the wireless device. A NVM manager application detects a failure in either of the NVM systems and determines which NVM system has failed. If the primary NVM system has failed then the NVM manger switches the wireless device to operate using the secondary NVM system, restores the primary NVM system using data from the secondary NVM system, then switches the wireless device back to the primary NVM system once it has been restored. If the secondary NVM system has failed then the NVM manager restores the secondary NVM system using data from the primary NVM system. | 2010-02-25 |
20100050015 | TRIPLE PARITY TECHNIQUE FOR ENABLING EFFICIENT RECOVERY FROM TRIPLE FAILURES IN A STORAGE ARRAY - A method for recovering from three failed data storage devices is disclosed. A plurality of data storage devices hold data, and a row parity storage device holds row parity for them. The data storage devices and the row parity storage device form a set of storage devices. A diagonal parity storage device and an anti-diagonal parity storage device hold parity computed diagonally over the set of storage devices. In the event of a failure of three data storage devices of the set of storage devices, a first failed storage device is chosen for first restoration. A missing block of the first failed storage device is computed by using the remaining set of storage devices, and the diagonal parity storage device, and the anti-diagonal parity storage device. The remaining two failed storage devices are restored by a diagonal parity restoration technique. | 2010-02-25 |
20100050016 | PREVENTING WRITE CORRUPTION IN A RAID ARRAY - A method and related computer program product of preventing write corruption in a redundant array in a computer system, comprising detecting a write failure from a calling application to at least one disk of the redundant array, writing failure information to non-volatile storage; returning an I/O error to the calling application; reading the failure information from the non-volatile storage during the next system reboot; and reconfiguring the array to eliminate the failed disk. | 2010-02-25 |
20100050017 | Intelligent Field Oil and Gas Field Data Acquisition, Delivery, Control, and Retention Based Apparatus, Program Product and Related Methods - An apparatus, program product, and methods for data management, are provided. An exemplary apparatus includes one or more PDHMS surface units each having a serial interface to provide a continuous real-time data stream of captured data, a data storage medium for storing collected downhole process data during a downstream communication link failure, a controller configured to cause the PDHMS surface unit to store recovery data during the downstream communication failure, and a broadband interface to provide recovery file transmission of recovery data stored during the downstream communication link failure. The apparatus can also include a RTU configured to collect the continuous real-time data collected by the PDHMS surface unit and to transmit the collected data to a SCADA system, which can function as a time synchronization master for the RTU and PDHMS surface units, and which can forward the collected data to other systems. | 2010-02-25 |
20100050018 | SATA primitive prediction and correction - A method of correcting corrupted primitives transmitted between a serial advanced technology attachment (SATA) host and a SATA device includes analyzing a current state, a previously transmitted primitive, or a previously received primitive; selecting at least one candidate primitive according to at least one of the current state, the previously transmitted primitive and the previously received primitive; predicting the identity of a current primitive according to at least one candidate primitive and a received current primitive; and replacing the corrupted primitive with the predicted primitive when the predicted primitive is different from the current primitive. | 2010-02-25 |
20100050019 | TEST ACCESS PORT - Briefly, descriptions of embodiments in accordance with the invention, a test access port for a multi-core processor. | 2010-02-25 |
20100050020 | INDUSTRIAL AUTOMATION AND INFORMATION SOLUTIONS HAVING INDUSTRY SPECIFIC MODALITIES - The innovation relates to a system and/or methodology for the configuration and creation of industrial automation designs. The system providing for the generation of functional specifications, software and hardware designs, as well as testing and testing schemas. Additionally, the innovation provides a user interface for modification of the designs and specifications. | 2010-02-25 |
20100050021 | ERROR CODE HANDLING IN A STORAGE SUBSYSTEM - Disclosed is a computer implemented method and apparatus for making ownership changes to a storage subsystem. The host sends the first ownership change command to the storage subsystem then determines whether the storage subsystem responded with an error message. Upon responding to a determination that the storage subsystem responded with the error message, the host determines whether the storage subsystem indicated an error associated with an ownership change. In response to a determination that the storage subsystem indicated an error associated with an ownership change, the host sends a discover ownership message to the storage subsystem. Upon receiving a list of logical unit number associations from the storage subsystem, the host responds to receiving a list of logical unit number associations. The host performs a second ownership command to determine whether the list of logical unit number associations matches an ownership defined in the ownership change command. The host responds to a determination that the list of logical unit number associations matches an ownership defined in the ownership change command by aborting ownership changes. | 2010-02-25 |
20100050022 | COMPUTER SYSTEM AND METHOD FOR PERFORMING FAILURE DETECTING PROCESSING FOR A LOGICAL PATH - Provided is a computer system including at least one host computer; and at least one storage system, characterized in that: the storage system has a disk drive and a disk controller, and provides a storage area of the disk drive as at least one logical unit; upon detecting a failure in a logical path serving as an access route from the host computer to the logical unit, the host computer specifies logical paths for accessing the same logical unit that is connected to the logical path where the failure is detected; the host computer executes failure detecting processing for the specified logical paths to judge whether the specified logical paths are normal or not; the host computer selects normal logical paths out of the specified logical paths; and the host computer accesses the logical unit via the normal logical paths selected. | 2010-02-25 |