11th week of 2010 patent applcation highlights part 64 |
Patent application number | Title | Published |
20100070713 | DEVICE AND METHOD FOR FETCHING INSTRUCTIONS - A device and a method for fetching instructions. The device includes a processor adapted to execute instructions; a high level memory unit adapted to store instructions; a direct memory access (DMA) controller that is controlled by the processor; an instruction cache that includes a first input port and a second input port; wherein the instruction cache is adapted to provide instructions to the processor in response to read requests that are generated by the processor and received via the first input port; wherein the instruction cache is further adapted to fetch instructions from a high level memory unit in response to read requests, generated by the DMA controller and received via the second input port. | 2010-03-18 |
20100070714 | Network On Chip With Caching Restrictions For Pages Of Computer Memory - A network on chip (‘NOC’) that includes integrated processor (‘IP’) blocks, routers, memory communications controllers, and network interface controllers, each IP block adapted to a router through a memory communications controller and a network interface controller, a multiplicity of computer processors, each computer processor implementing a plurality of hardware threads of execution; and computer memory, the computer memory organized in pages and operatively coupled to one or more of the computer processors, the computer memory including a set associative cache, the cache comprising cache ways organized in sets, the cache being shared among the hardware threads of execution, each page of computer memory restricted for caching by one replacement vector of a class of replacement vectors to particular ways of the cache, each page of memory further restricted for caching by one or more bits of a replacement vector classification to particular sets of ways of the cache. | 2010-03-18 |
20100070715 | APPARATUS, SYSTEM AND METHOD FOR STORAGE CACHE DEDUPLICATION - An apparatus, system, and method are disclosed for deduplicating storage cache data. A storage cache partition table has at least one entry associating a specified storage address range with one or more specified storage partitions. A deduplication module creates an entry in the storage cache partition table wherein the specified storage partitions contain identical data to one another within the specified storage address range thus requiring only one copy of the identical data to be cached in a storage cache. A read module accepts a storage address within a storage partition of a storage subsystem, to locate an entry wherein the specified storage address range contains the storage address, and to determine whether the storage partition is among the one or more specified storage partitions if such an entry is found. | 2010-03-18 |
20100070716 | PROCESSOR AND PREFETCH SUPPORT PROGRAM - A processor loads a program from a main memory, detects a register updating instruction, and registers the address of the register updating instruction in a register-producer table storing unit. Moreover, the processor loads the program to detect a memory access instruction, compares a register number utilized by the detected memory access instruction with a register-producer table to specify an address generation instruction, and rewrites an instruction corresponding to the address generation instruction. | 2010-03-18 |
20100070717 | Techniques for Cache Injection in a Processor System Responsive to a Specific Instruction Sequence - A technique for performing cache injection includes monitoring an instruction stream for a specific instruction sequence. Addresses on a bus are then monitored, at a cache, in response to detecting the specific instruction sequence a determined number of times. Ownership of input/output data on the bus is then acquired by the cache when an address on the bus (that is associated with the input/output data) corresponds to an address of a data block stored in the cache. | 2010-03-18 |
20100070718 | Memory management in a shared memory system - Methods, systems and computer program products to maintain cache coherency, in a System On Chip (SOC) which is part of a distributed shared memory system are described. A local SOC unit that includes a local controller and an on-chip memory is provided. In response to receiving a request from a remote controller of a remote SOC to access a memory location, the local controller determines whether the local SOC has exclusive ownership of the requested memory location, sends data from the memory location if the local SOC has exclusive ownership of the memory location and stores an entry in the on-chip memory that identifies the remote SOC as having requested data from the memory location. The entry specifies whether the request from the remote SOC is for exclusive ownership of the memory location. The entry also includes a field that identifies the remote SOC as the requester. The requested memory location may be external or internal to the local SOC unit. | 2010-03-18 |
20100070719 | SLAVE AND A MASTER DEVICE, A SYSTEM INCORPORATING THE DEVICES, AND A METHOD OF OPERATING THE SLAVE DEVICE - The electronic slave device ( | 2010-03-18 |
20100070720 | MEMORY ACCESS METHOD - The memory access method of the present invention comprises preparing upper addresses separately from the address width of the Pseudo SRAM ( | 2010-03-18 |
20100070721 | BUFFER SNAPSHOTS FROM UNMODIFIABLE DATA PIECE TABLES - A snapshots data structure provides compilers and other tools with snapshots of a buffer at different points in time. Snapshot heads identify trees within a directed acyclic graph (DAG) of nodes. Leaf nodes of a given tree collectively hold data elements representing information that was resident in the buffer at a particular point in time regardless of subsequent editing of the buffer. During buffer editing operations a new tree is created in the DAG with leaf nodes holding data elements that match one-to-one a subsequence of data elements held by leaf nodes of an existing tree. | 2010-03-18 |
20100070722 | Method and apparatus for storage migration - Embodiments of the invention provide a method and apparatus for storage subsystem migration without re-configuration of the I/O path. In one embodiment, a computer system comprises a first storage subsystem, a second storage subsystem, and a computer device connected via a network. The first storage subsystem has a first port name for a first port through which a first volume in the first storage subsystem has I/O connection with the computer device. The second storage subsystem defines a first virtual volume which is associated with the first volume, and a first virtual port having a first virtual port name that is identical to the first port name. After activation of the first virtual port, the computer device switches I/O connection for the first volume from the first storage subsystem to the second storage subsystem via the network using the first virtual port name on the second storage subsystem. | 2010-03-18 |
20100070723 | STORAGE AREA MANAGEMENT METHOD FOR CREATING COPY PAIR - Provided is a storage area management method used in a computer system which includes host computers, storage systems and a management computer, the method including: a step of retrieving at least one candidate logical volume for creating the primary logical volume from a plurality of storage device groups of the storage systems; a step of judging whether the retrieved at least one candidate logical volume on a primary side satisfies a condition of the primary logical volume; a step of retrieving at least one candidate logical volume for creating the secondary logical volume from the plurality of storage device groups; a step of judging whether the retrieved at least one candidate logical volume on a secondary side satisfies a condition of the secondary logical volume; and a step of creating a copy pair based on results of retrieving and results of judging. | 2010-03-18 |
20100070724 | Storage system and method for operating storage system - In acquiring a snapshot, when data in a P-VOL is updated, it is determined whether the same data as target data to be stored in a certain second storage area specified by a certain second address of a D-VOL is already stored in a different second storage area specified by a different second address of the D-VOL, the target data being the differential data generated by the update. When the same data as the target data is stored, the target data is not newly stored in the D-VOL, and the different second address, specifying the different second storage area where the same data is stored, is registered in a snapshot management table (CoW table), in association with a certain first address specifying a certain first storage area where the data from which the target data has been generated is stored. | 2010-03-18 |
20100070725 | SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA - Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication. | 2010-03-18 |
20100070726 | USING A SNAPSHOT AS A DATA SOURCE - A system and method for using a snapshot as a data source is described. In some cases, the system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. | 2010-03-18 |
20100070727 | Transactional Memory System - A transactional memory system is described for reporting memory access violations which occur when memory accesses made from instructions within a transaction conflict with memory accesses to the same memory location made from a non-transactional instruction. In an embodiment this is achieved by creating two mappings of a physical heap being used by a thread. The thread (which may be part of a multi-threaded process) comprises instructions for both transactional and non-transactional accesses to the physical heap which may execute concurrently as part of that thread. One of the mappings is used for non-transactional memory accesses to the physical heap. The other mapping is used for transactional memory accesses to the physical heap. Access permissions associated with the mappings are controlled to enable attempted memory access violations to be detected and reported. | 2010-03-18 |
20100070728 | METHOD AND APPARATUS FOR AUTHENTICATING USER ACCESS TO DISK DRIVE - A disk apparatus is configured to be connected to a host device, and has a security program for preventing unauthorized user access to the disk apparatus. A disk medium stores a boot program for executing a boot process of the disk apparatus, and a security program storage device stores the security program. A processor is provided for retrieving the security program from the storage device and enabling the host device to execute the security program. The boot program is executed by the host device when the host device determines from executing the security system that the disk apparatus may be accessed by the user. | 2010-03-18 |
20100070729 | SYSTEM AND METHOD OF MANAGING METADATA - In a particular embodiment, a controller is adapted to control read/write access to a storage media including a pre-allocated area having multiple meta-blocks. The controller includes logic adapted to control the multiple meta-blocks as a first in first out (FIFO) circular queue. The logic selects one or more meta-blocks from the multiple meta-blocks based on an order associated with the FIFO circular queue and selectively writes a logical block address (LBA) mapping table to the selected one or more meta-blocks. | 2010-03-18 |
20100070730 | MINIMIZING MEMORY ACCESS CONFLICTS OF PROCESS COMMUNICATION CHANNELS - A system and method for minimizing cache conflicts and synchronization support for generated parallel tasks within a compiler framework. A compiler comprises library functions to generate a queue for parallel applications and divides it into windows. A window may be sized to fit within a first-level cache of a processor. Application code with producer and consumer patterns within a loop construct has these patterns split into producer and consumer tasks. Within a producer task loop, a function call is placed for a push operation that modifies a memory location within a producer sliding window without a check for concurrent accesses. A consumer task loop has a similar function call. At the time a producer or consumer task is ready to move, or slide, to an adjacent window, its corresponding function call determines if the adjacent window is available. | 2010-03-18 |
20100070731 | STORAGE SYSTEM HAVING ALLOCATION-ON-USE VOLUME AND POWER SAVING FUNCTION - A storage system includes physical memory devices, pool volumes, including real areas, an allocation-on-use (AOU) volume including virtual areas, and a controller allocating a non-allocated real area in a pool including the pool volumes to a virtual area corresponding to an address specified by a writing command when no real area is allocated to the virtual area, and writing data corresponding to the received writing command to the allocated real area. The controller moves data stored in all the real areas in a first pool volume allocated to the AOU volume to a second pool volume, and changes a power consuming status of the physical memory device constituting the first pool volume to a power saving mode after the data has been moved. | 2010-03-18 |
20100070732 | APPARATUS AND METHOD FOR PROVISIONING STORAGE TO A SHARED FILE SYSTEM IN A STORAGE AREA NETWORK - A provisioning apparatus for provisioning a storage volume to a shared file system in a storage area network, wherein the storage area network comprises a plurality of server nodes and a plurality of storage devices, wherein each server node comprises a shared file system operable for sharing by each of the plurality of server nodes and each server node is operable for communicating with each of the plurality of storage devices, the apparatus comprising: a creator component creates a new storage volume; a messenger component instructs the server nodes to detect the new storage volume and to allocate a device name; an instructor component instructs the shared file system to assign the storage volume to the shared file system; an instructor component associates the device name with the shared file system; a receiver component receives a unique identifier for the storage volume and the device name; and a builder component for determines a relationship between the unique identifier and the device name, storing the relationship in the provisioning apparatus. | 2010-03-18 |
20100070733 | SYSTEM AND METHOD OF ALLOCATING MEMORY LOCATIONS - In a particular embodiment, a controller is adapted to allocate each memory segment location of a plurality of memory segment locations of a storage media to store data blocks having a particular data block size. Each memory segment location includes one or more storage blocks of the particular data block size. The controller is adapted to write a data block to one or more selected storage blocks of a selected memory segment location based on a size of the data block and an allocated data block size associated with the selected memory segment location. | 2010-03-18 |
20100070734 | Resource Reclamation in Data Storage - Managing resource reclamation in data storage systems is provided. A volume deletion metadata recorder records metadata for one or more deleted volumes. A policy engine, responsive to a predetermined policy rule, applies the policy rule to the metadata. The policy engine initiates policy-controlled data storage space reclamation for the one or more deleted volumes. A volume reclaimer, responsive to the policy engine, reclaims data storage space from the one or more deleted volumes. A resource allocator allocates the data storage space to satisfy a minimum requirement for available zeroed extents that comprise a minimum requirement to satisfy needs of late allocated storage volumes. | 2010-03-18 |
20100070735 | EMBEDDED MAPPING INFORMATION FOR MEMORY DEVICES - Memory modules and methods of operating memory modules embed mapping information within blocks of memory cells to which the mapping information pertains. In particular, when a page is written for a logical data block, that page includes a snapshot of the current mapping information for that logical data block. In this manner, the last valid physical page of a logical data block will contain a physical/logical mapping of that block. Thus, instead of scanning every valid page of the memory device to rebuild the mapping information, the memory module may scan only for the last valid physical page of each logical data block. Once the last valid physical page is discovered for a logical data block, the latest mapping information for that logical data block may be read from that page. | 2010-03-18 |
20100070736 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing system includes: a data processing unit that executes verification processing for a content recorded in a disk and reproduces the disk-recorded content under a condition that the verification succeeds, wherein the data processing unit randomly selects hash units, which are objects of collation, from among a plurality of hash units formed with component data items of the content, reads the selected hash units sequentially from the disk, calculates hash values, and collates the calculated hash values with collation hash values; and the data processing unit executes reading sequence determination processing so as to determine a reading sequence in which the selected hash units are sorted according to recording positions in a disk, and reads the selected hash units according to the determined reading sequence. | 2010-03-18 |
20100070737 | ADDRESS GENERATION - Address generation by an integrated circuit is described. An aspect relates generally to an address generator which has first and second processing units. The second processing unit is coupled to receive a stage output from the first processing unit and configured to provide an address output. The stage output is in a first range, and the address output is in a second range. The first range is from −K to −1 for K a block size, and the second range is from 0 to K-1. | 2010-03-18 |
20100070738 | FLEXIBLE RESULTS PIPELINE FOR PROCESSING ELEMENT - A flexible results pipeline for a processing element of a parallel processor is described. A plurality of result registers are selectively connected to each other, to processing logic of the processing element and to a neighbourhood connection register configured to receive data from and send data to other processing elements. The connections between the result registers and between the result registers and the neighbourhood connection register are selectively configurable by applied control signals. | 2010-03-18 |
20100070739 | Multiprocessor system and control method thereof - A multiprocessor system according to an embodiment comprises a plurality of processors, an execution control unit to control processing by the plurality of processors and data transfer between the plurality of processors; and an internal data storage unit to store data dependence information indicating status of the data transfer. If control flow of processing by a processor is fixed after a preceding data transfer is registered for execution and another data transfer to a similar destination as the preceding data transfer is necessary, the execution control unit cancels the preceding data transfer based on the data dependence information. | 2010-03-18 |
20100070740 | System and Method for Dynamic Dependence-Based Parallel Execution of Computer Software - A method of dynamic parallelization in a multi-processor identifies potentially independent computational operations, such as functions and methods, with a serializer that assigns a computational operation to a serialization set and a processor based on assessment of the data that the computational operation will be accessing upon execution. | 2010-03-18 |
20100070741 | MICROPROCESSOR WITH FUSED STORE ADDRESS/STORE DATA MICROINSTRUCTION - A microprocessor includes an instruction translator that translates a store macroinstruction into exactly one fused store microinstruction. The store macroinstruction in the microprocessor's macroarchitecture macroinstruction set instructs the microprocessor to store data from a general purpose register of the microprocessor to a memory location. The fused store microinstruction is an instruction in the microprocessor's microarchitecture microinstruction set. A reorder buffer (ROB) receives the fused store microinstruction from the instruction translator into exactly one of its plurality of entries. An instruction dispatcher dispatches for execution a store address microinstruction and a store data microinstruction to different respective execution units of the microprocessor in response to receiving the fused store microinstruction. Neither the store address microinstruction nor the store data microinstruction occupy any of the ROB entries. The ROB retires the fused store microinstruction after being notified that both the store address microinstruction and the store data microinstruction have been executed. | 2010-03-18 |
20100070742 | EMBEDDED-DRAM DSP ARCHITECTURE HAVING IMPROVED INSTRUCTION SET - An embedded-DRAM processor architecture includes a DRAM array, a set of register files, set of functional units, and a data assembly unit. The data assembly unit includes a set of row-address registers and is responsive to commands to activate and deactivate DRAM rows and to control the movement of data throughout the system. A pipelined data assembly approach allowing the functional units to perform register-to-register operations, and allowing the data assembly unit to perform all load/store operations using wide data busses. Data masking and switching hardware allows individual data words or groups of words to be transferred between the registers and memory. Other aspects of the disclosure include a memory and logic structure and an associated method to extract data blocks from memory to accelerate, for example, operations related to image compression and decompression. | 2010-03-18 |
20100070743 | SECURE UPDATE OF BOOT IMAGE WITHOUT KNOWLEDGE OF SECURE KEY - Techniques for securely updating a boot image without knowledge of a secure key used to encrypt the boot image. | 2010-03-18 |
20100070744 | BOOT DRIVE SELECTION - A boot drive of a computing system is identified during at least two runtime environment of the computer system. The computer system includes at least two storage devices. An indicia is created on a selected storage device. The at least two storage devices are scanned for the indicia during a subsequent runtime environment of the computer system after the first runtime environment. | 2010-03-18 |
20100070745 | COMPUTER SYSTEM AND METHOD FOR BOOTING UNDER LOW TEMPERATURE STATE - A method for booting a computer system under a low temperature state is disclosed. When a trigger signal of a pressed power button on the computer system is detected, a hard disk temperature will be obtained via a temperature sensor to determine whether the hard disk temperature is less than a first predetermined temperature. If the hard disk temperature is less than the first predetermined temperature, a heater is activated to heat the hard disk and a low temperature event will be set. Next, if the hard disk temperature has reached or is greater than the second predetermined temperature, the computer system will be under activation. Then before a loading component of the computer system is activated, the low temperature event will be read. Therefore, output loading of the loading component is decreased to activate an system component of the computer system with a low loading state. | 2010-03-18 |
20100070746 | METHOD FOR BOOTING SYSTEM UNDER LOW TEMPERATURE STATE AND COMPUTER DEVICE USING THE SAME - A method for booting a computer device under a low temperature state is provided. A trigger signal is detected when a power button is pressed. A hard disk temperature of a hard disk is obtained via a temperature sensor to determine whether the hard disk temperature is less than a first predetermined temperature. If so, a heater is activated to heat the hard disk until the hard disk temperature is greater than the first predetermined temperature. If the hard disk temperature is greater than the first predetermined temperature, the heater is turned off and afterwards a voltage of a battery cell is checked if the voltage has reached a predetermined voltage. If the voltage of the battery cell has reached the predetermined voltage, a system component of a computer device is activated. | 2010-03-18 |
20100070747 | MANAGING CACHE DATA AND METADATA - Embodiments of the invention provide techniques for managing cache metadata providing a mapping between addresses on a storage medium (e.g., disk storage) and corresponding addresses on a cache device at data items are stored. In some embodiments, cache metadata may be stored in a hierarchical data structure comprising a plurality of hierarchy levels. Only a subset of the plurality of hierarchy levels may be loaded to memory, thereby reducing the memory “footprint” of cache metadata and expediting the process of restoring the cache metadata during startup operations. Startup may be further expedited by using cache metadata to perform operations associated with reboot. Thereafter, as requests to read data items on the storage medium are processed using cache metadata to identify addresses at which the data items are stored in cache, the identified addresses may be stored in memory. When the computer is later shut down, instead of having to transfer the entirety of the cache metadata from memory to storage, only the subset of the plurality of hierarchy levels and/or the identified addresses previously loaded to memory may be transferred (e.g., to the cache device), thereby expediting the shutdown of the computer. | 2010-03-18 |
20100070748 | Device and methods for simulating controller area network signals - The invention relates to a device of generating simulation signals for Controller Area Network (CAN). The device in this invention simulates CAN data streams normally generated by electronic control units (ECUs) in automobiles, vehicles, boats, etc. without the presence of these ECUs. The device in this invention has a visual display of simulated signals' values. In addition, this invention reveals a remote terminal method and software. The remote terminal software in this invention can control the simulated signal via graphic user interfaces. The remote terminal software in this invention also displays the precise values of simulated signals via graphic user interfaces. Furthermore, this invention presents an advantageous method using a license identification management technique to change the functionality and features of the simulation device without any hardware modifications and without sending the device back to the device manufacturer. | 2010-03-18 |
20100070749 | Embedded Electronic Device and Booting Method Thereof - An embedded electronic device and a booting method thereof are provided. The embedded electronic device, for downloading an initiation image from one of a plurality of initiation image source devices according to at least one option pin, comprises a boot memory, for storing a boot code and a plurality of initiation image source sequence tables; a microprocessor, for executing the boot code and downloading the initiation image according to one of the initiation image source sequence tables; a register, for storing a status of the at least one option pin; and a bus, coupled to the boot memory, the microprocessor and the register, for transmitting data between the boot memory, the microprocessor and the register; wherein the initiation image source sequence table is selected according to the status stored in the register, and the sequence of the initiation image source devices accessed by the microprocessor is determined according to the initiation image source sequence table. | 2010-03-18 |
20100070750 | IMAGE PROCESSING APPARATUS AND PROGRAM STARTING UP METHOD - An image processing apparatus has first through n-th pluralities of programs which, when executed by a computer processor, perform respectively first through n-th functions of the image processing apparatus, where n denotes an integer more than 1, and starts up, on a function-by-function basis, the first through n-th pluralities of programs respectively corresponding to the first through n-th functions. The image processing apparatus starts up, in a predetermined sequence, respective programs included in any one plurality of programs among the first through n-th pluralities of programs to a state in which the plurality of programs performs a corresponding function. | 2010-03-18 |
20100070751 | Preloader - This disclosure describes techniques and/or apparatuses for reducing the total time used to boot up a computer and load applications onto the computer. | 2010-03-18 |
20100070752 | Stable Active X Linux based operating environment - An engine, system and method of providing a stable ActiveX Linux-based operating system. The engine, system and method include a plurality of computing hardware, capabilities for booting the plurality of computing hardware using a Linux operating system, and capabilities for accessing, via a scripting compatibility layer that ports non-native applications to the Linux operating system, of an ActiveX enabled web browser that is non-native to the Linux operating system. | 2010-03-18 |
20100070753 | ENHANCED DISTRIBUTION OF DIGITAL CONTENT - The enhanced distribution of digital content, in which a digital content distribution process is dynamically modeled, the digital content distribution process is invoked, and a serviced digital copy is provided to a recipient. Invoking the digital content distribution process further includes ingesting digital content, further including storing a digital master of the digital content in a digital vault, and servicing the digital copy of the stored digital master based on a servicing request received from the recipient. | 2010-03-18 |
20100070754 | PAYMENT ENCRYPTION ACCELERATOR - Embodiments of the invention provide a system for encrypting web session data which may include a session management module adapted to receive data from a web application module and provide a token that represents the data in encrypted form to the web application, wherein the web application is adapted to use the token to represent the data. The system may also include a tokenizer module communicably coupled to the session management module, wherein the tokenizer module is adapted to receive the data and generate the token. Further, the system may include a database communicably coupled to the session management module, wherein the database is adapted to receive the token and the data, associate the token with the data, and store the token and the data. | 2010-03-18 |
20100070755 | METHOD AND DEVICE FOR CONFIRMING AUTHENTICITY OF A PUBLIC KEY INFRASTRUCTURE (PKI) TRANSACTION EVENT - A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a communication network enables improved network security. According to some embodiments, the method includes establishing at a PKI event logging (PEL) server a process to achieve secure communications with the relying node (step | 2010-03-18 |
20100070756 | DEVICE AND METHOD FOR DIGITAL PROCESSING MANAGEMENT OF CONTENT SO AS TO ENABLE AN IMPOSED WORK FLOW - A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing. | 2010-03-18 |
20100070757 | SYSTEM AND METHOD TO AUTHENTICATE A USER UTILIZING A TIME-VARYING AUXILIARY CODE - A system and method to authenticate a user utilizing a time-varying auxiliary code. The code may be appended to a fixed password, but that is not required. The code is generated by a central electronic authentication system. The user retrieves it manually using a fungible communications device such as a telephone or a computer connected to the Internet. The user must learn the code because he inputs it manually, thereby authenticating himself. The present invention performs the same function as inventions with tokens, that is, it provides an extension to the PIN or password, but it eliminates the token and the synchronization required with such a token. | 2010-03-18 |
20100070758 | Group Formation Using Anonymous Broadcast Information - A number of devices co-located at a geographic location can broadcast and receive tokens. Tokens can be exchanged using a communication link having limited communication range. Tokens that are received by a device can be stored locally on the device and/or transmitted to a trusted service operating remotely on a network. In some implementations, the tokens can be stored with corresponding timestamps to assist a trusted service in matching or otherwise correlating the tokens with other tokens provided by other devices. The trusted service can perform an analysis on the tokens and timestamps to identify devices that were co-located at the geographic location at or around a contact time which can be defined by the timestamps. A group can be created based on results of the analysis. Users can be identified as members of the group and invited to join the group. | 2010-03-18 |
20100070759 | METHOD AND SYSTEM FOR AUTHENTICATING A USER BY MEANS OF A MOBILE DEVICE - The invention relates to a method for authenticating a user of a mobile device ( | 2010-03-18 |
20100070760 | TICKET-BASED SPECTRUM AUTHORIZATION AND ACCESS CONTROL - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 2010-03-18 |
20100070761 | RELIABLE AUTHENTICATION OF MESSAGE SENDER'S IDENTITY - A method is provided in a telecommunications network for authenticating a sender ( | 2010-03-18 |
20100070762 | Apparatus, System and Method for Detecting a Loss of Key Stream Synchronization in a Communication System - An apparatus, system and method provides an out-of-synchronization detection by using a network layer checksum. A process operating at an upper layer verifies that a checksum embedded in a network layer header is correct before encrypting and transmitting a data packet containing the header and a payload. The data packet is received through a wireless communication channel at a receiver and decrypted. A calculated checksum is calculated on the received payload at the receiver and compared to the received checksum embedded in the header. A key stream used at the receiver for decrypting the received encrypted data packets is determined to be out of synchronization with a key stream used at the transmitter to encrypt the data packets if the calculated checksum is not equal to the network layer checksum. | 2010-03-18 |
20100070763 | DECLARATIVE DATA SECURITY FOR A RAPID APPLICATION DEVELOPMENT TOOL COMPONENT - A security privilege view object instance. The security privilege view object instance provides security at the view object instance level, permitting multiple application modules to utilize a single entity object with different data privileges. In an embodiment, a view object implementation method is overridden to add selected security filters at instantiation of a view object instance. | 2010-03-18 |
20100070764 | TRANSFER DATA MANAGEMENT SYSTEM FOR INTERNET BACKUP - Erroneous deletion of data due to a collision of digest information during data de-duplication using digest information is prevented. When backup data is stored on a backup server | 2010-03-18 |
20100070765 | SECURE AND RECOVERABLE DATABASE FOR ON-LINE VALUE-BEARING ITEM SYSTEM - An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a secure database is disclosed. The secure database includes account balances and other information for all of the on-line value-bearing item system customers and is capable of preventing access by unauthorized users. Also, a secure communication network is in operation to prevent unauthorized access to the users' data stored in the database. | 2010-03-18 |
20100070766 | Authentication Method, Client, Server And System - An authentication method, which includes: a server sends a challenge to a client; the client obtains a first key performs a transformation on the first key utilizing a local hash function to obtain a third key, encrypts the first key and the challenge utilizing the third key to obtain a ciphertext, and sends the ciphertext to the server; the server decrypts the ciphertext utilizing a second key stored locally, obtains a decrypted first key and a decrypted challenge if the second key is the same as the third key, performs a transformation on the decrypted first key utilizing a local hash function to obtain a fourth key, the client passes the authentication if the decrypted challenge and the fourth key are respectively the same as the challenge sent by the server and the second key stored locally by the server. | 2010-03-18 |
20100070767 | Method and system of secured direct link set-up (DLS) for wireless networks - Method and system of secured direct link set-up (DLS) for wireless networks. In accordance with aspects of the method, techniques are disclosed for setting up computationally secure direct links between stations in a wireless network in a manner that is computationally secure. A direct link comprising a new communication session is set up between first and second stations in a wireless local area network (WLAN) hosted by an access point (AP), the direct link comprising a new communication session. The AP generates a unique session key for the new communication session and transfers secured copies of the session key to each of the first and second stations in a manner under which only the first and second stations can obtain the session key. A security mechanism is then implemented on the unsecured direct link to secure the direct link between the first and second stations using a secure session key derived from the session key. | 2010-03-18 |
20100070768 | KEY EXCHANGE DEVICE, KEY EXCHANGE PROCESSING SYSTEM, KEY EXCHANGE METHOD, AND PROGRAM - A key exchange apparatus according to the present invention includes storage | 2010-03-18 |
20100070769 | LOG ACQUISITION SYSTEM, LOG COLLECTION TERMINAL, LOG ACQUISITION TERMINAL, AND LOG ACQUISITION METHOD AND PROGRAM USING THE SAME SYSTEM AND TERMINALS - In a log acquisition system comprising a log collection terminal for collecting log data and a log acquisition terminal for acquiring the log data collected by the log collection terminal from the log collection terminal, the log collection terminal stores a common key between the log collection terminal and the log acquisition terminal in a hardware security module inherently mounted in the log collection terminal, encrypts the collected log data as encrypted log data using the stored common key, and stores the encrypted log data, and the log acquisition terminal stores the common key in a hardware security module inherently mounted in the log acquisition terminal, acquires the encrypted log data from the log collection terminal, and decrypts the acquired encrypted log data with the common key. | 2010-03-18 |
20100070770 | SYSTEMS AND METHODS, APPARATUS, AND COMPUTER READABLE MEDIA FOR INTERCEPTING AND MODIFYING HMAC SIGNED MESSAGES - Systems, methods, apparatus and computer-executable instructions stored on computer-readable media for communicating a modified hash message authentication code (HMAC) signed message between two endpoints are provided. The HMAC signature of the message may include a plurality of components. In some cases, the HMAC signature is a Server Message Block (SMB) signature. The first and/or second endpoint may be a client, server, or host. Some embodiments of the present application utilize a proxy, such as a CIFS proxy. In one embodiment, HMAC signature information sent from the first endpoint to the second endpoint may be intercepted. A value for a component of the HMAC signature may be determined by, for example, using the intercepted HMAC signature information. The intercepted message may be modified, resigned using the intercepted HMAC signature information, and transmitted to a receiving endpoint. | 2010-03-18 |
20100070771 | AUTHENTICATION OF ACCESS POINTS IN WIRELESS LOCAL AREA NETWORKS - A method is provided for authenticating an identity of an operator ( | 2010-03-18 |
20100070772 | NAVIGATION APPARATUS AND INFORMATION DISTRIBUTION SYSTEM - A CPU of a navigation apparatus stores public keys to which priorities are set and which are published by an information distribution center in a public key storage section. The CPU of the navigation apparatus extracts an electronic signature of distribution data which is distributed from the information distribution center and verifies the electronic signature by using only ‘valid’ public keys among the public keys in order of the priorities. The CPU of the navigation apparatus determines that the distribution data is valid information which is distributed from the information distribution center when the electronic signature passes verification. | 2010-03-18 |
20100070773 | Digital contents receiving apparatus - A television set is capable of receiving both broadcast program from television station and corresponding digital file of the same contents from a server station through internet. The television set keeps information of time limit for the server station to surely provide the file. The television set automatically downloads the file when the time limit comes close or the time limit information is failed to be kept. The television set keeps URL for the moving image program enjoyed upon turning-off of the television set until the next turning-on for instantly enjoying the moving image content provided at the URL. User who turning-on the television set or changing the channel with any program not in mind to feel interest in the program on display by chance can enjoy the program from the beginning by means of downloading corresponding digital file of the same contents through internet by an automatic link. | 2010-03-18 |
20100070774 | INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION - Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs. | 2010-03-18 |
20100070775 | METHOD AND SYSTEM FOR DETECTING MODIFIED PAGES - A method for validating program execution. The method involves identifying a program from a second computer system, obtaining, by a first computer system, a first copy of a page for a file of the program from a second computer system, calculating a hash value for the first copy, storing the first copy in a local memory of the first computer system, storing the hash value for the first copy, and executing the program on the first computer system, where the first copy is removed from the local memory during execution of the program. The method further involves obtaining a second copy of the page from the second computer system, calculating a hash for the second copy, determining whether the hash value for the first copy is equal to the hash value for the second copy, and performing an appropriate action in response to the determination. | 2010-03-18 |
20100070776 | Logging system events - Provided is computer implemented method for logging system events, comprising:
| 2010-03-18 |
20100070777 | SEMICONDUCTOR DEVICE IDENTIFIER GENERATION METHOD AND SEMICONDUCTOR DEVICE | 2010-03-18 |
20100070778 | SECURE FILE ENCRYPTION - A technique for secure file encryption first choose a file encryption key randomly among a set of file encryption keys and encrypts a file using the chosen file encryption key based on a set of encryption rules. The file encryption key can then be encrypted via a directory master secret (DMS) key for an extra layer of security so that an intruder cannot decrypt the encrypted file even if the intruder gains access to the DMS-encrypted file encryption key. Finally, the DMS-encrypted file encryption key can be stored in a metadata associated with the file. | 2010-03-18 |
20100070779 | INTEGRITY OF CIPHERED DATA - A method for protecting the integrity of data ciphered by a ciphering algorithm providing at least an intermediary state meant to be identical in ciphering and in deciphering, this intermediary state being sampled during the ciphering to generate a signature. | 2010-03-18 |
20100070780 | QUANTUM PROGRAM CONCEALING DEVICE AND QUANTUM PROGRAM CONCEALING METHOD - An object of the present invention is to enable an authorized user to execute a quantum program, without letting the authorized user know the operation contents of the quantum program. | 2010-03-18 |
20100070781 | METHOD AND SYSTEM FOR BOOTSTRAPPING A TRUSTED SERVER HAVING REDUNDANT TRUSTED PLATFORM MODULES - Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret data at rest that is used to bootstrap a system trusted platform module. A hypervisor requests each trusted platform module to encrypt a copy of the secret data, thereby generating multiple versions of encrypted secret data values, which are then stored within a non-volatile memory within the trusted platform. At some later point in time, the encrypted secret data values are retrieved, decrypted by the trusted platform module that performed the previous encryption, and then compared to each other. If any of the decrypted values do not match a quorum of values from the comparison operation, then a corresponding trusted platform module for a non-matching decrypted value is designated as defective because it has not been able to correctly decrypt a value that it previously encrypted. | 2010-03-18 |
20100070782 | APPARATUS AND METHOD FOR OPERATING A COMPUTING PLATFORM WITHOUT A BATTERY PACK - An application control engine computing platform having a shut-down mechanism that permits the platform to adequately start up and operate upon return of power after a power interruption, without a need of a battery pack. The mechanism may target the saving of control object runtime values and operational settings of those objects, rather than the saving of the complete set of objects, and all unsaved alarm and history records upon a power interruption. | 2010-03-18 |
20100070783 | ELECTRONIC DEVICE AND POWER CONTROL METHOD - An electronic device capable of controlling a power state of an external device from a first power state (ex. “Standby”) to a second power state (ex. “ON”) includes a determination unit operable to determine whether information indicating linkage is stored in a storage unit when it is detected that communication between the electronic device and the external device is enabled, and a transmitting unit operable to transmit a control signal for controlling power state of the external device. When the information indicating linkage is not stored in the storage unit, the transmitting unit stores the information indicating linkage and transmits the control signal for controlling power state of the external device to the second power state to the external device. When the information indicating linkage is stored in the storage unit, the transmitting unit refrains from transmitting the control signal to the external device. | 2010-03-18 |
20100070784 | Reducing Power Consumption in a Server Cluster - A method of reducing power consumption of a server cluster of host systems with virtual machines executing on the host systems is disclosed. The method includes recommending host system power-on when there is a host system whose utilization is above a target utilization, and recommending host system power-off when there is a host system whose utilization is below the target utilization. Recommending host system power-on includes calculating impact of powering on a standby host system with respect to reducing the number of highly-utilized host systems in the server cluster. The impact of powering on is calculated by simulating moving some virtual machines from highly utilized host systems to the standby host system being recommended to be powered on. Recommending host system power-off includes calculating impact of powering off a host system with respect to decreasing the number of less-utilized host systems in the server cluster. The impact of powering off is calculated by simulating moving all virtual machines from the host system, which is being recommended to be powered-off, to less-utilized host systems. | 2010-03-18 |
20100070785 | EAS POWER MANAGEMENT SYSTEM - A system and method for managing the power consumption of power-consuming devices. A remote device manager transmits power save schedules to a local device manager over a communication network such as the internet. The local device manager transmits power save commands to one or more devices in a location such as a store, over a dedicated local communication network. The commands instruct one or more devices to activate or de-activate its power save mode according to the power save schedules. The commands could be dependent upon one or more trigger events. | 2010-03-18 |
20100070786 | ADAPTIVE METHOD FOR SYSTEM RE-ACQUISITION IN POWER SAVING MODE OPERATION IN A MOBILE WIMAX SYSTEM - Methods and apparatus for re-acquiring a WiMAX network after a relatively long power saving mode (e.g., sleep or idle mode) using a “pre-wakeup” scheme are provided. According to this pre-wakeup scheme, a mobile station (MS) may power up receiving circuitry to search for the current channel or, if unsuccessful, a neighbor channel. After a successful network search during sleep mode, the MS may return to sleep for the remainder of the sleep window until the circuitry is powered up a second time to wakeup and then listen for an expected message. By pre-waking up and searching before waking up for the expected message, the MS may counteract the effects of the potential error in the local oscillator frequency accumulated during the long sleep mode. In this manner, the message miss rate may be reduced, thereby saving power and extending the time in which the MS may operate between battery rechargings. | 2010-03-18 |
20100070787 | POWER CAP LOWER BOUND EXPLORATION IN A SERVER ENVIRONMENT - Disclosed is a computer implemented method, computer program product, and apparatus for determining a safe lower bound for a commonly powered data processing system. A power management module operates the data processing system using at least one nominal operating parameter during an exploration periodicity, with the at least one nominal operating parameter being clock speed. The power management module determines whether a calibration period is occurring. The power management module calibrates the data processing system up to a measurement interval duration expiration. The power management module may repeat operating the data processing system using the at least one nominal operating parameter. | 2010-03-18 |
20100070788 | OPTIMIZED COMPENSATION IN A VOLTAGE REGULATOR - Multiple components of a computer system may be capable of entering wake and sleep states. The power consumption of a processor during wake state may draw significant amount of current. In order to keep power consumption of a voltage regulator low, a two-phase voltage regulator may be used during wake state. During sleep state, since power consumption is lower, the two-phase voltage regulator may be operated in a single-phase mode to further reduce voltage regulator power consumption. | 2010-03-18 |
20100070789 | Storage control device - The storage control device of the present invention reduces power consumption by stopping the flow of power to enclosures that are not being accessed. A plurality of additional enclosures are connected to a base enclosure by means of a daisy-chain connection. The respective additional enclosures are divided into three levels, namely a low usage frequency level, a medium usage frequency level, and a high usage frequency level depending on the connection distance of the additional enclosures from the base enclosure. Drives that have not been accessed for a predetermined time are spun down. When all the drives in the enclosure are in the spindown state, the supply of power from the power supply to the respective drives is stopped. Further, when the flow of power to an additional enclosure located below the enclosure itself has stopped, the switch of the latter enclosure is turned OFF and the flow of power to the additional enclosure is stopped. | 2010-03-18 |
20100070790 | POWER MANAGEMENT METHOD - A method of managing IT resources when an IT resource managed by a coordinator is subject to a power-off request is provided. The method includes, in an event a sufficient quantity of resource statistics is present, analyzing resource statistics and operational policies to determine whether execution of the power-off request is currently, futuristically or potentially futuristically achievable with a threshold efficiency, and, in an event the power-off request is currently, futuristically or potentially futuristically achievable with the threshold efficiency, executing the power-off request, identifying a first time when the power-off request is achievable, instituting a first delay until then and, subsequently, executing the power-off request, and identifying a second time when the power-off request is potentially achievable, instituting a second delay until then and, subsequently, returning control to the analyzing operation, respectively. | 2010-03-18 |
20100070791 | POWER SUPPLY MONITORING METHOD AND SYSTEM - A device having a power supply monitoring capabilities, the device includes: a power supply unit; at least one real time clock generator counter adapted to receive a supply voltage from the power supply unit; a fixed value storage circuit that is un-accessible to software executed by a processor; wherein the fixed value storage circuit stores a fixed value; wherein the fixed value includes multiple bits; a volatile storage unit, being accessible to the processor; wherein the volatile storage unit is adapted to: (i) store a reset value after being reset; (ii) receive the fixed value during an initialization state; and (iii) store the fixed value until being reset; wherein the volatile storage unit is designed such that there is a low probability that the reset value equals the fixed value; and a comparator adapted to provide a tamper indication if the fixed value stored at the fixed value storage circuit differs from a value stored at the volatile storage unit. | 2010-03-18 |
20100070792 | SYSTEM AND METHOD FOR TESTING OVERCLOCKING CAPABILITY OF CPU - A test system for overclocking capability of a central processing unit (CPU) includes a basic input and output system (BIOS), a frequency generator, and a watchdog timer. The BIOS includes an input module, a watchdog control module, and a frequency increasing module. The input module inputs an initial frequency of a CPU to the frequency generator to adjust a real-time frequency of the CPU. The watchdog control module sends a counter signal to the watchdog timer in a preset time interval. The watchdog timer receives the counter signal. If the watchdog timer does not receive the counter signal within the preset time, the watchdog timer outputs a reset signal to restart the computer. The frequency increasing module adds a preset increment to the real-time frequency to obtain a newly adjusted frequency, and provides the newly adjusted frequency to the frequency generator to adjust the real-time frequency. | 2010-03-18 |
20100070793 | Clock supply device - Provided is a clock supply device that variably adjusts a frequency of a clock supplied to each module, as needed. The clock supply device includes a clock output unit that switches between clocks having different frequencies and output the clocks; a clock distribution unit that distributes and supplies the clocks from the clock output unit to the plurality of modules; and a clock switching control unit that causes the frequencies of the clocks from the clock output unit to be switched. The clock switching control unit includes a clock request pattern determination unit. The clock request pattern determination unit outputs a control signal for decreasing a clock frequency to a slow frequency, to the clock output unit, when a pattern of a clock request signal output from a monitoring target module satisfies a predetermined condition pattern. | 2010-03-18 |
20100070794 | METHOD OF NOTIFYING STATUS INFORMATION AND IMAGE FORMING APPARATUS USING THE SAME - A method of notifying status information and an image forming apparatus using the same. The method of notifying status information includes setting a display attribute of status information of the image forming apparatus, if status information of the image forming apparatus is updated, generating status notification information in a first format or a second format according to whether a display attribute is set for the updated status information, and transmitting the generated status notification information. Accordingly, a user is notified of error occurrence in a manner as he/she wishes. | 2010-03-18 |
20100070795 | SUPPORTING APPARATUS AND SUPPORTING METHOD - A supporting apparatus includes a configuration-information storage unit having stored therein dependencies among devices in association with a list of the devices. When information about a device where a failure has occurred is input, a dependency among devices including the faulty device is obtained from the configuration-information storage unit. Based on the obtained dependency among devices including the faulty device and information about the faulty device, learning data with the dependency and a cause of failure being associated with each other is created. Then, based on the created learning data, a solution procedure indicative of a procedure for specifying the cause of failure is generated by using, for example, algorithm ID3. | 2010-03-18 |
20100070796 | STORAGE UTILIZATION TO IMPROVE RELIABILITY USING IMPENDING FAILURE TRIGGERS - Disclosed is a method of improving storage reliability comprising receiving an indicator of an impending failure of a first storage device in a RAID group. In response to the indicator, writing data to the first storage device is ceased. A first block of data directed to be written on the first storage device is written to a memory device. Data stored on the first storage device is copied to a second storage device. The first block of data is copied from the memory device to the second storage device. The RAID group is operated with the second storage device functioning in place of the first storage device. Data is read from said second storage device. | 2010-03-18 |
20100070797 | Data processing systems and methods to ensure the consistency of data - Data processing systems and methods are provided for correcting data inconsistencies within one or more databases and/or data repositories. In accordance with one implementation, a correction module is selected from a set of correction modules, and the selected correction module is configured to correct data inconsistencies of a solvable data inconsistency type. Data having an data inconsistency of the solvable data inconsistency type is identified within one or more databases or data repositories. If the selected correction module is unassociated with an obstacle data inconsistency type, or if the identified data not include an inconsistency of the obstacle data inconsistency type, then the correction module corrects the data inconsistency within the identified data. | 2010-03-18 |
20100070798 | Maintenance Operations for Multi-Level Data Storage Cells - Systems and methods, including computer software, for reading data from a flash memory cell involve detecting voltages from a group of memory cells. The group of memory cells have associated metadata for error detection, and each memory cell stores a voltage representing a data value selected from a plurality of possible data values. Each possible data value corresponds to one range of multiple non-overlapping ranges of analog voltages. Memory cells having uncertain data values are identified based on the detected voltages. Alternative data values for the memory cells having the uncertain data values are determined. A combination of alternative data values is selected, and an error detection test is performed using the metadata associated with the memory cells and the selected combination of alternative data values. | 2010-03-18 |
20100070799 | DYNAMIC CELL BIT RESOLUTION - A system and method, including computer software, is used to write to a flash memory device that includes multiple memory cells. One or more of the memory cells are written at a first resolution corresponding to a first number of bits of data. A signal to write at a second resolution corresponding to a second number of bits of data is received. One or more of the memory cells are written at the second resolution. | 2010-03-18 |
20100070800 | AUTOMATIC HARDWARE-BASED RECOVERY OF A COMPROMISED COMPUTER - In general, techniques are described for hardware-based detection and automatic restoration of a computing device from a compromised state. Moreover, the techniques provide for automatic, hardware-based restoration of selective software components from a trusted repository. The hardware-based detection and automatic restoration techniques may be integrated within a boot sequence of a computing device so as to efficiently and cleanly replace only any infected software component. | 2010-03-18 |
20100070801 | MAINTENANCE OPERATIONS FOR MULTI-LEVEL DATA STORAGE CELLS - Systems and methods, including computer software, for reading data from a flash memory cell involve detecting voltages from a group of memory cells. The group of memory cells have associated metadata for error detection, and each memory cell stores a voltage representing a data value selected from a plurality of possible data values. Each possible data value corresponds to one range of multiple non-overlapping ranges of analog voltages. Memory cells having uncertain data values are identified based on the detected voltages. Alternative data values for the memory cells having the uncertain data values are determined. A combination of alternative data values is selected, and an error detection test is performed using the metadata associated with the memory cells and the selected combination of alternative data values. | 2010-03-18 |
20100070802 | SEMICONDUCTOR INTEGRATED CIRCUIT AND TESTING METHOD THEREFOR - A semiconductor integrated circuit comprises a plurality of cores ( | 2010-03-18 |
20100070803 | Sequencer and test system including the sequencer - A test system | 2010-03-18 |
20100070804 | Method for controlling program execution integrity by verifying execution trace Prints - The inventive method for controlling a program execution integrity by verifying execution trace prints consists in updating the representative print of an execution path and/or data applied for a program execution, comparing the actual print value (dynamically calculated to an expected value (statistically fixed, equal to a value of the print if the program execution is not disturbed) at a determined program spots and in carrying out a particular processing by the program when the actual print differs from the expected value. | 2010-03-18 |
20100070805 | Method and Apparatus for Validating System Properties Exhibited in Execution Traces - The invention includes a method and apparatus for validating system properties exhibited in execution traces. In one embodiment, a method for testing a system under test (SUT) includes determining a system testing result for the SUT using at least one structured term generated by monitoring an execution trace of the SUT using at least one parameterized pattern. A test procedure is executed for the SUT. The test procedure has at least one parameterized pattern associated therewith. An execution trace generated during execution of the test procedure is parsed, where the execution trace includes unstructured information and the execution trace is parsed using the at least one parameterized pattern to identify at least one matching pattern. A system testing result for the SUT is determined using at least one structured term that is generated using the at least one matching pattern. In this manner, behavior of the system under test during the test procedure may be validated. | 2010-03-18 |
20100070806 | TECHNOLOGIES FOR DETECTING ERRONEOUS RESUMPTIONS IN A CONTINUATION BASED RUNTIME - Technologies for enabling a continuation based runtime to accept or reject external stimulus and, in addition, to determine if an external stimulus may be valid for processing at a later point in execution. | 2010-03-18 |
20100070807 | SYSTEM AND METHOD FOR MANAGING SERVER PERFORMANCE DEGRADATION IN A VIRTUAL UNIVERSE - A system and method for managing server performance degradation in a virtual universe environment having avatars has a server load detection unit for detecting server load and a failure notification unit for notifying the avatars of imminent server failure. The server load detection unit measures the wall time of the server for determining performance. A memory stores acceptable performance parameters so that if the server is performing unacceptably, the failure notification unit may notify the avatars. | 2010-03-18 |
20100070808 | METHOD AND APPARATUS FOR REDUCING POSITRON EMISSION TOMOGRAPHY (PET) EVENT LOSSES BY EFFECTIVE BANDWIDTH UTILIZATION - An event data transmission scheme is provided for reducing positron emission tomography event losses. The event data transmission scheme employs a more effective use of available data bandwidth. Each of a plurality of detector data slots is connected directly to a data aggregation control interface, and the control interface is connected to a coincidence processor. | 2010-03-18 |
20100070809 | REPAIR BITS FOR A LOW VOLTAGE CACHE - A method and apparatus for repairing cache memories/arrays is described herein. A cache includes a plurality of lines and logically viewable in columns. A repair cache coupled to the cache includes a repair bit mapped to each logically viewable column. A repair module determines a bad bit to be repaired within a column based on any individual or combination of factors, such as the number of errors per line of the cache, the number of errors correctable per line of the cache due to error correction code (ECC), the failure rate of bits, or other considerations. The bad bit is transparently repaired by the repair bit mapped to the column including the bad bit, upon an access to a cache line including the bad bit. | 2010-03-18 |
20100070810 | ADAPTING SCAN ARCHITECTURES FOR LOW POWER OPERATION - Scan architectures are commonly used to test digital circuitry in integrated circuits. The present disclosure describes a method of adapting conventional scan architectures into a low power scan architecture. The low power scan architecture maintains the test time of conventional scan architectures, while requiring significantly less operational power than conventional scan architectures. The low power scan architecture is advantageous to IC/die manufacturers since it allows a larger number of circuits (such as DSP or CPU core circuits) embedded in an IC/die to be tested in parallel without consuming too much power within the IC/die. Since the low power scan architecture reduces test power consumption, it is possible to simultaneously test more die on a wafer than previously possible using conventional scan architectures. This allows wafer test times to be reduced which reduces the manufacturing cost of each die on the wafer. | 2010-03-18 |
20100070811 | CIRCUIT ARRANGEMENT - The invention relates to a circuit arrangement, comprising: a functional circuit with m (m=1, 2, . . . ) data inputs and n (n=1, 2, . . . ) data outputs for processing at least one m-dimensional binary data input (x | 2010-03-18 |
20100070812 | AUDIO DATA INTERPOLATING DEVICE AND AUDIO DATA INTERPOLATING METHOD - An audio data interpolating device includes: a reception module configured to receive content data; an extraction module configured to extract first audio data and second audio data corresponding to the first audio data from the content data; an interpolation data detection module configured to detect error data in the first audio data and detect interpolation data corresponding to the error data from the second audio data; and an output module configured to output the first audio data and output the interpolation data in place of the error data included in the first audio data. | 2010-03-18 |