13th week of 2010 patent applcation highlights part 55 |
Patent application number | Title | Published |
20100082936 | Cache Mapping for Solid State Drives - An approach is provided that loads software files, such as an operating system, on a hybrid storage device. The hybrid storage device is a device that includes a nonvolatile storage device and a nonvolatile memory cache. The nonvolatile memory cache has less storage capacity than the nonvolatile storage device. The nonvolatile memory cache is preset (“pinned”) to data corresponding to an initial set of address ranges of the nonvolatile storage device, such as all or part of the operating system that was loaded onto the nonvolatile storage device. A system usage metric is initialized along with a threshold value. The nonvolatile memory cache remains pinned to the initial set of address ranges until the system usage metric reaches the threshold value. When the system usage metric reaches the threshold value, then a caching algorithm is used to determine what data should be cached to the nonvolatile memory cache. | 2010-04-01 |
20100082937 | DATA GENERATING DEVICE, SCANNER AND COMPUTER PROGRAM - A data generating device may comprise a data identifying unit, a number identifying unit and a hyperlink structuring unit. The data identifying unit may be configured to identify the data of the contents table page and/or the index page included in a set of data including data of a contents table page and/or an index page, and data of a plurality of normal pages, data of each normal page including a page number. The number identifying unit may be configured to identify a number included in the data of the contents table page and/or the index page identified by the data identifying unit, and to identify a specific position at which the identified number is located in the data of the contents table page and/or the index page. The hyperlink structuring unit may be configured to generate data of hyperlink structure from the set of data by generating a hyperlink, at a position corresponding to the specific position of the number identified by the number identifying unit, that links to data of a normal page including a page number that coincides with the number identified by the number identifying unit. | 2010-04-01 |
20100082938 | DELEGATED VIRTUALIZATION ACROSS PHYSICAL PARTITIONS OF A MULTI-CORE PROCESSOR (MCP) - This disclosure describes an apparatus, computer architecture, method, operating system, compiler, and application program products for MPEs as well as virtualization across physical boundaries that define physical partitions in a symmetric MCP. Among other things, the disclosure is applied to a generic microprocessor architecture with a set (e.g., one or more) of controlling/main processing elements (e.g., MPEs) and a set of groups of sub-processing elements (e.g., SPEs). The arrangement also enables MPEs to delegate functionality to one or more groups of SPEs such that those group(s) of SPEs may act as pseudo MPEs. Such delegation may occur across the physical boundaries. Regardless, the pseudo MPEs may utilize pseudo virtualized control threads to control the behavior of other groups of SPEs also across physical boundaries. | 2010-04-01 |
20100082939 | TECHNIQUES FOR EFFICIENT IMPLEMENTATION OF BROWNIAN BRIDGE ALGORITHM ON SIMD PLATFORMS - Methods and apparatus for implementing Brownian Bridge algorithm on Single Instruction Multiple Data (SIMD) computing platforms are described. In one embodiment, a memory stores a plurality of data corresponding to an SIMD (Single Instruction, Multiple Data) instruction. A processor may include a plurality of SIMD lanes. Each of the plurality of the SIMD lanes may process one of the plurality of data stored in the memory in accordance with the SIMD instruction. Other embodiments are also described. | 2010-04-01 |
20100082940 | INFORMATION PROCESSOR - An information processor controls accesses to a cache memory from application software programs differing in range of addresses, accesses to which are authorized. The cache memory blocks an access to an unauthorized address. In the information processor, an ID is assigned to each application software program, and the tag field of the cache memory is extended. Further, in performing “Cache Fill” (i.e. reading main memory data into the cache memory), the ID is recorded. At the time of making a cache hit judgment, the access control is performed by comparing the extended tag field with ID of an application software program group of an access requester. | 2010-04-01 |
20100082941 | DELEGATED VIRTUALIZATION IN A MULTI-CORE PROCESSOR (MCP) - The disclosure is applied to a generic microprocessor architecture with a set (e.g., one or more) of controlling elements (e.g., MPEs) and a set of groups of sub-processing elements (e.g., SPEs). Under this arrangement, MPEs and SPEs are organized in a way that a smaller number MPEs control the behavior of a group of SPEs using program code embodied as a set of virtualized control threads. The arrangement also enables MPEs delegate functionality to one or more groups of SPEs such that those group(s) of SPEs will act as pseudo MPEs. The pseudo MPEs will utilize pseudo virtualized control threads to control the behavior of other groups of SPEs. In a typical embodiment, the apparatus includes a MCP coupled to a power supply coupled with cores to provide a supply voltage to each core (or core group) and controlling-digital elements and multiple instances of sub-processing elements. | 2010-04-01 |
20100082942 | VIRTUALIZATION ACROSS PHYSICAL PARTITIONS OF A MULTI-CORE PROCESSOR (MCP) - Among other things, the disclosure is applied to a generic microprocessor architecture with a set (e.g., one or more) of controlling/main processing elements (e.g., MPEs) and a set of groups of sub-processing elements (e.g., SPEs). Under this arrangement, MPEs and SPEs are organized in a way that a smaller number MPEs control the behavior of a group of SPEs using program code embodied as a set of virtualized control threads. The apparatus includes a MCP coupled to a power supply coupled with cores to provide a supply voltage to each core (or core group) and controlling-digital elements and multiple instances of sub-processing elements. In accordance with these features, virtualized control threads can traverse the physical boundaries of the MCP to control SPE(s) (e.g., logical partitions having one or more SPEs) in a different physical partition (e.g., different from the physical partition from which the virtualized control threads originated. | 2010-04-01 |
20100082943 | DYNAMIC RECONFIGURATION SUPPORT APPARATUS, DYNAMIC RECONFIGURATION SUPPORT METHOD, AND COMPUTER PRODUCT - An apparatus controls a circuit having rewritable processor elements and includes an acquiring unit that acquires information concerning a first task under execution by the circuit; a reading unit that, when the information concerning the first task is acquired, reads from a memory, a completion time of the first task; a first calculating unit that calculates a deadline time using the read completion time; an identifying unit that refers to scheduling information in the memory and identifies for a second task, the quantity of processor elements to be rewritten by the deadline time; a second calculating unit that divides the identified quantity of the processor elements by the deadline time to calculate the quantity of processor elements to be rewritten per unit time; and an executing unit that causes the circuit to rewrite the processor elements for the second task, in the quantity per unit time calculated. | 2010-04-01 |
20100082944 | Multi-thread processor - In an exemplary aspect, the present invention provides a multi-thread processor including a plurality of hardware threads each of which generates an independent instruction flow, a thread scheduler that outputs a thread selection signal in accordance with a first or second schedule, the thread selection signal designating a hardware thread to be executed in a next execution cycle among the plurality of hardware threads, a first selector that selects one of the plurality of hardware threads according to the thread selection signal and outputs an instruction generated by the selected hardware thread, and an execution pipeline that executes an instruction output from the first selector, wherein when the multi-thread processor is in a first state, the thread scheduler selects the first schedule, and when the multi-thread processor is in a second state, the thread scheduler selects the second schedule. | 2010-04-01 |
20100082945 | Multi-thread processor and its hardware thread scheduling method - A multi-thread processor in accordance with an exemplary aspect of the present invention includes a plurality of hardware threads each of which generates an independent instruction flow, a thread scheduler that outputs a thread selection signal TSEL designating a hardware thread to be executed in a next execution cycle, a first selector that outputs an instruction generated by a hardware thread selected according to the thread selection signal, and an execution pipeline that executes an instruction output from the first selector, wherein the thread scheduler specifies execution of at least one hardware thread selected in a fixed manner in a predetermined first execution period, and specifies execution of an arbitrary hardware thread in a second execution period. | 2010-04-01 |
20100082946 | Microcomputer and its instruction execution method - A microcomputer in accordance with an exemplary embodiment of the preset invention include an instruction decoder | 2010-04-01 |
20100082947 | VERY-LONG INSTRUCTION WORD ARCHITECTURE WITH MULTIPLE PROCESSING UNITS - A processor may include a plurality of processing units for processing instructions, where each processing unit is associated with a discrete instruction queue. Data is read from a data queue selected by each instruction, and a sequencer manages distribution of instructions to the plurality of discrete instruction queues. | 2010-04-01 |
20100082948 | CHANNEL COMMAND WORD PRE-FETCHING APPARATUS - In a CCW fetching section, for each input/output device being a control objective, a result prediction table in which prediction values of status values to be returned from an input/output device as execution results of CCW commands, is referred to. Then, based on the prediction values, commands being pre-fetching objectives are pre-fetched from a CCW program stored in a memory, and transmitted to a CCW executing section. On the other hand, in the CCW executing section, the pre-fetched commands are sequentially executed, and the actual status values as the execution results are received from the input/output device. Then, when the received actual status values are not same as the predicted status values, success or failure in prediction is notified to the CCW fetching section, and also, the result prediction table is updated in the CCW fetching section. | 2010-04-01 |
20100082949 | APPARATUS, COMPUTER PROGRAM PRODUCT AND ASSOCIATED METHODOLOGY FOR VIDEO ANALYTICS - A processor and associated methodology employ a SIMD architecture and instruction set to efficiently perform video analytics operation on images. The processor contains a group of SIMD instructions used by the method to implement video analytic filters that avoid bit expansion of the pixels to be filtered. The filters hold the number of bits representing a pixel constant throughout the entire operation, conserving processor capacity and throughput when performing video analytics. | 2010-04-01 |
20100082950 | Dynamically reconfiguring platform settings - In one embodiment, a system may receive a pattern from an analysis engine, where the pattern includes information regarding a corrective action to be taken on a configuration setting of a processor, configure a performance monitor based on the pattern, collect performance monitoring information during program operation, analyze the information during the program operation, and dynamically implement the corrective action during the program operation based on the analysis. Other embodiments are described and claimed. | 2010-04-01 |
20100082951 | MULTI-THREADED PARALLEL PROCESSOR METHODS AND APPARATUS - A processor system may implement multiple contexts on one or more processors having a local memory. Code and/or data for first and second contexts may be respectively stored simultaneously in first and second regions of a processor's local memory, storing code and/or data for a second context in a second region of the local memory, the secondary processor may execute the first context while the second context waits. Code and/or data for the first context may be transferred from the first region to the second and code and/or data for the second context may be transferred from the second region to the first, and the processor may execute the second context during a pause or stoppage of execution of the first context. Alternatively, the code and/or data for the second context may be transferred to another processor's local memory. | 2010-04-01 |
20100082952 | PROCESSOR - When two threads (strands), for example, are executed in parallel in a processor in a simultaneous multi-thread (SMT) system, entries of a branch reservation station of an instruction control device are separately used in a strand | 2010-04-01 |
20100082953 | RECOVERY APPARATUS FOR SOLVING BRANCH MIS-PREDICTION AND METHOD AND CENTRAL PROCESSING UNIT THEREOF - A recovery apparatus for solving a branch mis-prediction, and a method and a central processing unit (CPU) thereof are provided. The recovery apparatus includes an instruction buffer, at least one circular instruction buffer, and a decoding and pairing circuit. The decoding and pairing circuit is coupled to the instruction buffer and the circular instruction buffer. The instruction buffer stores a plurality of instructions, and the circular instruction buffer stores a recovery instruction queue corresponding to the instructions, wherein the recovery instruction queue includes a plurality of recovery instructions. The decoding and pairing circuit decodes and pairs the instructions and the recovery instructions. When the branch mis-prediction occurs, the decoding and pairing circuit outputs the recovery instructions to an instruction execution and processing circuit which is externally connected to the decoding and pairing circuit. | 2010-04-01 |
20100082954 | CONFIGURATION RULE PROTOTYPING TOOL - A system for automatically creating configuration rule build files. One or more feature inputs are received according to requirements for a specific product by a configuration rule prototyping tool. The one or more feature inputs are source data. A selection of a function from a list of functions defined for the configuration rule prototyping tool and a selection of one or more build types is received by the configuration rule prototyping tool. A configuration rule build process is performed by the configuration rule prototyping tool based on the function and the one or more build types selected to format the source data into a desired format. The formatted source data is transferred to a configurable transformation macro. Configuration rule build files are automatically created by the configurable transformation macro for the specific product. Then, the configuration rule build files are outputted for use by a test client. | 2010-04-01 |
20100082955 | VERIFICATION OF CHIPSET FIRMWARE UPDATES - In general, in one aspect, the disclosure describes an apparatus that includes updatable non-volatile memory to store firmware and non-updateable non-volatile memory to store an interrupt sequence. The apparatus includes a chip interface to receive an interrupt instruction from management firmware. Receipt of the interrupt instruction controls access to and initiation of the interrupt sequence. After initiation of the interrupt sequence the apparatus may receive a firmware update and/or validate the firmware is from a valid source. The validation of the firmware may include utilizing the management firmware to verify the cryptographic signature for the firmware. | 2010-04-01 |
20100082956 | BIOS PARAMETER ERASING METHOD AND APPARATUS APPLIED TO COMPUTER SYSTEM - A computer system includes a triggering device; and a motherboard, connected to the triggering device, further comprising: a memory stored with a setting parameter of a basic-input-output-system; and a counter connected between the triggering device and the memory; wherein an erasing signal, for erasing the memory, is outputted to the memory from the counter according to a triggering signal outputted from the triggering device while a boosting procedure cannot be successfully executed by the computer system. | 2010-04-01 |
20100082957 | INFORMATION PROCESSING DEVICE - An information processing device includes: a processing circuit that processes information; a management circuit that is independent of the processing circuit and that performs status management of hardware including the processing circuit; and a memory into which the management circuit stores setting information of the management circuit and from which the management circuit extracts setting information of the management circuit, the memory being physically connectable to and removable from the management circuit. | 2010-04-01 |
20100082958 | METHOD FOR IMPLEMENTING PRODUCTION PROCESSES AND SYSTEM FOR EXECUTING THE METHOD - A method for implementing production processes includes a step of programming a state machine for each production process. The programming step includes a definition of a plurality of states and a definition of a plurality of transitions between states, corresponding to possible actions which the corresponding production process may execute. The programming step further includes the steps of detecting whether or not one or more states to be defined for a state machine have already been defined for state machines already programmed for other production processes, and executing the definition of states only for states not detected in the detecting step. | 2010-04-01 |
20100082959 | FILE UPDATE SYSTEM AND BOOT MANAGEMENT SYSTEM OF MOBILE COMMUNICATION TERMINAL, METHOD OF UPDATING FILE IN MOBILE COMMUNICATION TERMINAL, AND METHOD OF BOOTING MOBILE COMMUNICATION TERMINAL - Disclosed are a file update system of a mobile communication terminal which is capable of recovering Same Owner ID Error caused by damage of a file header in an EFS (Embedded File System) area of the mobile communication terminal, a boot management system of a mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal, a method of updating a file in the mobile communication terminal, and a method of booting the mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal. | 2010-04-01 |
20100082960 | PROTECTED NETWORK BOOT OF OPERATING SYSTEM - Methods and apparatus are disclosed to protect an operating system booted by a client computing device and provided by a server computing device. One such method includes requesting a trusted platform module of the client computing device to unseal a sealed encryption key, and receiving an encrypted operating system via a network in response to initiating a boot process of the client computing device. The illustrative method also includes decrypting the encrypted operating system received via the network using an unsealed encryption key obtained in response to requesting the trusted platform module to unseal the sealed encryption key, and executing the decrypted operating system. | 2010-04-01 |
20100082961 | Apparatus and method to harden computer system - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 2010-04-01 |
20100082962 | Flash memory device for booting a computing device including embedded general purpose operating system - Methods and apparatus involve booting a computing device from a flash device. The flash device has memory partitions, including a read-only and a read/write partition. The read-only includes an operating system for use by the computing device and defines an initial system state. The read/write is configured to store a delta from the initial system state. Upon booting the computing device subsequent to an initial boot, the delta and the initial system state together define the whole system state. In other features, a write engine from the read-only partition tracks changes to the initial system state and writes some, but not all of the changes back to the read/write partition thereby minimizing a number of writes to the flash memory. In this manner, the speed of the flash memory can be used to quickly boot/reboot a computing device, while avoiding the wear limits associated with writing to flash devices. | 2010-04-01 |
20100082963 | Embedded system that automatically updates its software and the method thereof - An embedded system that automatically updates its software and the method thereof are provided. A boot code in the boot module determines whether the operating system (OS) image file is abnormal. The determination result determines whether the embedded system automatically updates its software. This solves the problem that the user cannot update the software in the embedded system. This helps reducing the manpower and cost for updating software in the conventional embedded system. It also enhances the usage convenience and market competition thereof. | 2010-04-01 |
20100082964 | METHOD OF CONFIGURING COMPUTERS WITH EXPANSION CARDS - A method of configuring a computer with an expansion card to process a basic input output system (BIOS) program thereof, includes performing an expansion card detecting program to detect and identify the expansion card by reading signals from an identifying finger of the expansion card, and loading a configuration program associated with the detected expansion card of the BIOS program. | 2010-04-01 |
20100082965 | INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS - According to an aspect of the present invention, there is provided an information processing apparatus configured to be operated by an operating system, including: a display device; a BIOS-ROM configured to store a BIOS program to be executed before starting the operating system; a memory configured to store image data to be displayed on the display device before starting the operating system during an execution of the BIOS program; a processor configured to execute a compression determination program configured to determine whether the image data are stored in the memory in a compression state or in a non-compression state and an expansion program configured to expand the image data stored in the compression state through an execution of the determination program; and a display controller configured to display, on the display device, the expanded image data. | 2010-04-01 |
20100082966 | METHOD FOR COMPUTER STARTUP PROTECTION AND SYSTEM THEREOF - A method for computer startup protection, wherein the method includes steps that a computer powers up, and loads and executes a dynamic password computer startup protection program; the dynamic password computer startup protection program receives a password entered by a user; the password is obtained by the user via sending a dynamic password generating command to a dynamic password device; then the dynamic password computer startup protection program determines whether the password is valid, if so, the dynamic password computer startup protection program loads a computer startup program of the computer; otherwise the dynamic password computer startup protection program does not load the computer startup program of the computer. A system includes a computer and a dynamic password generating device. | 2010-04-01 |
20100082967 | METHOD FOR DETECTING MEMORY TRAINING RESULT AND COMPUTER SYSTEM USING SUCH METHOD - A method for detecting a memory training result includes the following steps. Firstly, a computer system is booted. Then, a memory training program included in a basic input output system of the computer system is executed, thereby obtaining a plurality of reading time parameters and a plurality of writing time parameters. Afterwards, the reading time parameters and the writing time parameters are recorded into a non-volatile memory. The computer system includes a central processing unit, a memory device, a chipset, a basic input output system, and a non-volatile memory. The memory device includes a memory module. The chipset is connected to the memory module and the central processing unit, and includes a memory controller. The basic input output system is connected to the chipset and includes a memory training program. The non-volatile memory is connected to the chipset. | 2010-04-01 |
20100082968 | PROCESSOR BOOT SECURITY DEVICE AND METHODS THEREOF - A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and comparing the boot source to an expected source. If the boot source is not the expected source, access to the network authentication information is inhibited, such as by disabling access to the portion of memory that stores the authentication information. Further, if the boot source is the expected source, boot code authentication information is retrieved from memory and verified during the boot sequence. If the device authentication information is not authenticated, access to the network authentication information is inhibited. Accordingly, access to the network authentication information is allowed only if the data processing device is booted from an expected source, and only if the boot code is authenticated, thereby reducing the likelihood of unauthorized access to the network authentication information. | 2010-04-01 |
20100082969 | EMBEDDED DEVICE FOR IMPLEMENTING A BOOT PROCESS ON A HOST - An embedded device, for implementing a boot process on a host, is provided. This embedded device includes servers supporting various industry-standard Internet protocols and services related to the boot process. This embedded device also includes a storage medium that stores boot options for multiple Operating Systems (OSs). | 2010-04-01 |
20100082970 | Method and System for Ensuring Sequential Playback of Digital Media - Techniques for ensuring that media playback proceeds sequentially through media content of a digital media asset are disclosed. In one embodiment, distinct portions (e.g., segments) of a digital media asset can be separately encrypted such that on playback decoded data being output from at least one prior portion can be used to derive a cryptographic key that is used in decrypting a subsequent portion of the digital media asset. | 2010-04-01 |
20100082971 | APPLYING DIGITAL RIGHTS TO NEWLY CREATED ELECTRONIC DOCUMENTS - A routing computer is connected to one or more multi-function peripherals (MFPs) on a network. A routing manager located in the routing computer contains user information for users that operate one or more of the MFPs connected on the network. Based on a set of user preferences and or default settings, document data scanned by or received via facsimile for a particular user is sent from one of the MFPs to the routing computer. The routing manager then applies rights management and optional encryption to the destination document created from the document data and sends the destination document to a folder or to one or more individuals via electronic mail. As a result, rights management policy may be applied to newly created documents automatically and before the documents are accessible to users in network storage or by email. | 2010-04-01 |
20100082972 | Method to allow targeted advertising on mobile phones while maintaining subscriber privacy - An apparatus in one example has: a trusted advertising server operatively coupled to at least one terminal of a subscriber; and a trusted database having respectively at least one profile for the at least one terminal; wherein the trusted advertising server effects sending of one or more advertisements to the terminal based on the profile of the terminal without revealing an identity of the subscriber. The trusted advertising server has a trusted role and an advertising role. The trusted role is to securely maintain the at least one profile, and the advertising role is to receive target demographics for a particular advertiser or advertising broker, to match advertisements to the at least one terminal based on the respective profile in the trusted database, and to deliver the selected advertisements to the at least one terminal based on the respective profile in the trusted database. | 2010-04-01 |
20100082973 | Direct anonymous attestation scheme with outsourcing capability - A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key from an issuer while joining a group. Moreover, the TPM can outsource most of the computation involved in generating a signature to a host computer. | 2010-04-01 |
20100082974 | PARALLEL DOCUMENT PROCESSING - Documents distributed in parallel are processed. One or more digital document packages are received, where each digital document package includes a content portion and an identity-verification code (IVC) verifying an identity of a source from which the digital document package is received. Each IVC may be a private-key encryption of a content-verification code hashed from the content portion of each digital document package. A master digital document package is created, which includes a master content portion equivalent to the content portion in each unmodified digital document package, and one or more different IVCs, each IVC obtained from a digital document package received from a different source. | 2010-04-01 |
20100082975 | METHOD AND APPARATUS FOR EXTERNAL ORGANIZATION PATH LENGTH VALIDATION WITHIN A PUBLIC KEY INFRASTRUCTURE (PKI) - A method and apparatus for external organization (EO) path length (EOPL) validation are provided. A relying party node (RPN) stores a current EO path length constraint (EOPLC) value, and an EOPL counter that maintains a count of an actual external organization path length. The RPN obtains a chain of certificates that link a subject node (SN) to its trust anchor, and processes the certificates in the chain. When a certificate has a lower EOPLC than the current EOPLC value, the RPN replaces the current EOPLC value with the lower EOPLC. When the certificate currently being evaluated includes an enabled EO flag, the RPN increments the EOPL counter by one. The EOPL validation fails when the EOPL counter is greater than the current EOPLC value, and is successful when the last remaining certificate in the chain is processed without having the EOPL counter exceed the current EOPLC value. | 2010-04-01 |
20100082976 | SYSTEM AND METHOD FOR RETRIEVING RELATED CERTIFICATES - A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed to perform certificate searches by querying one or more certificate servers for all certificate authority (CA) certificates and cross-certificates on the certificate servers. In another embodiment, all certificates related to an identified certificate are retrieved from the certificate servers automatically by the certificate synchronization application, where the related certificates comprise at least one of one or more CA certificates and one or more cross-certificates. Embodiments of the invention facilitate at least partial automation of the downloading and establishment of certificate chains, thereby minimizing the need for users to manually search for individual certificates. | 2010-04-01 |
20100082977 | SIP Signaling Without Constant Re-Authentication - A proxy server causes an authentication authority to authenticate a client in response to a first Session Initiation Protocol (SIP) request of the client on a connection. It does not cause the client to be authenticated in response subsequent requests on the connection as long as the underlying connection is not broken, the subsequent requests are on behalf of the same client, the client has not been removed from the system, the client's password has not changed, a “safety net” timer has not expired, or any other policy that the server chooses to enforce. This eliminates the overhead of constant re-authentication in response to each SIP request. | 2010-04-01 |
20100082978 | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor - A wireless communication device to be wirelessly connected to a wireless network is provided. The wireless communication device includes an encryption examiner to examine as to whether communication in the wireless network is encrypted, a password obtainer to obtain a password designated by a user for connecting the wireless communication device to the wireless network if the encryption examiner determines that the communication in the wireless network is encrypted, and a wireless connector to connect the wireless communication device to the wireless network with the use of the obtained password. The wireless connector sequentially selects one set from a plurality of sets, and sequentially attempts to connect the wireless communication device to the wireless network with the use of the sequentially selected one set. Each set of the plurality of sets has an authorization method and an encryption method. | 2010-04-01 |
20100082979 | METHOD FOR THE PROVISION OF A NETWORK SERVICE - Methods and systems provide for sharing information between computer networks in which the information to be shared is required at one location (e.g. for the provision of a data-processing service) but is only available at a separate location. The information may be deliberately absent (e.g. for privacy reasons) or may be unavailable as an artifact of the computer network(s) involved. For the provision of a data-processing service, where several different devices on one network may service contiguous requests from a client device on another network according to a load-balancing strategy, data is propagated once only through the service network. Network communication software is subsequently amended to provide the minimal information necessary for a device on the service network to retrieve the information pertinent to the client device and necessary for its service. Therefore, a web-based single sign-on scheme can operate over HTTP to authorize data-processing services, such as web-filtering services. | 2010-04-01 |
20100082980 | METHOD TO CONNECT WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION DEVICE, AND COMPUTER USABLE MEDIUM THEREFOR - A method to connect a wireless communication device to an intended wireless network is provided. The method includes a first step, in which options of authorization methods are presented to be selectable to a user, a second step, in which a first authorization method is automatically selected if an option of a third authorization item is selected, a third step, in which options of encryption methods corresponding to the selected first authorization method are presented to be selectable to the user, a fourth step, in which a first encryption method is automatically selected if a third encryption item is selected, and a fifth step, in which establishment of the connection is attempted by use of the selected first authorization method and the selected first encryption method. | 2010-04-01 |
20100082981 | ELECTRONIC BUSINESS POSTAL SYSTEM - An electronic business postal system collects, clears and delivers electronic business mail through a closed access, secure messaging system. A collection subsystem consists of access portals that are associated with secured system nodes. The access portals provide authenticated users access to the system to send and retrieve electronic business mail that includes postal system electronic delivery addresses, physical delivery addresses, or both. Secured message servers that are associated with the respective access portals process the electronic business mail into uniquely identified messages for delivery over the system nodes and also process received messages to provide the corresponding electronic business mail to the intended recipients through associated access portals. A delivery subsystem directs the messages through the system nodes associated with the senders' access portals to the system nodes associated with the recipients' access portals. A clearance subsystem confirms the integrity of both the messages and their delivery and ensures that each message is delivered once and intact. | 2010-04-01 |
20100082982 | Service control system and service control method - In a safety determining system, an information processing apparatus performs authentication of biometrical information and gathers corresponding environment information (apparatus information, software, peripheral devices, location information). Then, the information processing apparatus sends the gathered environment information and service information of a target service to a central server. Based on the environment information, the service information, and information stored in an environment information DB, the central server determines whether it is safe to provide a service to the information processing apparatus. Based on that determination result, a service terminal provides a service to the information processing apparatus. | 2010-04-01 |
20100082983 | SECURE DEVICE ASSOCIATION - Secure device association is generally described. In one example, a secure device association system comprises a first device comprising a mechanical actuator and a second device comprising a microphone, the mechanical actuator of the first device and the microphone of the second device to form an out-of-band (OOB) channel for secure association between the first device and the second device. | 2010-04-01 |
20100082984 | Protocol-Independent Remote Attestation And Sealing - Messages, including messages in conformance with various protocols, can be hashed and the hash values added to an event log and provided to a Trusted Platform Module (TPM), which can extend one or more Platform Configuration Registers (PCRs) with the hash value, much as it would with the hash of a component that was installed or executed on the computing device with the TPM. Subsequently, the TPM can sign one or more of the PCRs and the signed PCRs can be transmitted, together with the event log and a copy of the messages. The recipient can verify the sender based on the signed PCRs, can confirm that the signed PCRs match the event log, and can verify the hash of the message in the event log by independently hashing it. In another embodiment, an intermediate hashing of the message can avoid transmission of potentially malicious executable instructions within a message. | 2010-04-01 |
20100082985 | Methods for integrating security in network communications and systems thereof - A method, computer readable medium, and system for integrating security in network communications includes generating a private key and a public key by encrypting the private key with a first encryption. The generated private key and public key are provided in an initial response to an initial request over the secure connection. At least one additional received request is validated based on the public key and a requesting signature signed using the key received with the at least one additional request. An additional response with a responding signature signed using the private key is provided in response to the validated additional request. | 2010-04-01 |
20100082986 | CERTIFICATE-BASED ENCRYPTION AND PUBLIC KEY INFRASTRUCTURE - The present invention provides methods for sending a digital message from a sender to a recipient in a public-key based cryptosystem comprising an authorizer. The authorizer can be a single entity or comprise a hierarchical or distributed entity. The present invention allows communication of messages by an efficient protocol, not involving key status queries or key escrow, where a message recipient can decrypt a message from a message sender only if the recipient possesses up-to-date authority from the authorizer. The invention allows such communication in a system comprising a large number (e.g. millions) of users. | 2010-04-01 |
20100082987 | TRANSPARENT TRUST VALIDATION OF AN UNKNOWN PLATFORM - A transparent trust validation of an unknown platform can be performed by communicationally coupling it to a trusted device, such as a portable peripheral device carried by a user, or one or more remote computing devices. Information from the unknown platform can be obtained by boot code copied to it from the trusted device and such information can be validated by the trusted device. The trusted device can then provide an encrypted version of decryption key to the boot code which can request the Trusted Platform Module (TPM) of the unknown platform to decrypt and return the decryption key. If the information originally obtained from the unknown platform and validated by the trusted device was authentic, the TPM will be able to provide the decryption key to the boot code, enabling it to decrypt an encrypted volume comprising applications, operating systems or other components. | 2010-04-01 |
20100082988 | WIRELESS SENSOR NETWORK KEY DISTRIBUTION - When installing and maintaining a wireless sensor network in a medical or factory environment, distribution of keying material to sensor nodes ( | 2010-04-01 |
20100082989 | Storing Composite Services on Untrusted Hosts - A method of storing a composite service on an untrusted host without enabling the untrusted host to access resources called by the composite service is described. In an embodiment, the delegator provides a delegatee with credentials to enable verification of the composite service and to enable access to the resources. The credential which is provided to enable access to the resources may be a credential which can be used to decrypt access credentials for each of the resources. These access credentials are stored in encrypted form in a credential store. The delegatee downloads the composite service and the encrypted access credentials and executes the composite service once it has been verified. | 2010-04-01 |
20100082990 | ESTABLISHMENT OF A RELATIONSHIP BETWEEN WIRELESS DEVICES - Embodiments related to the establishment of a relationship between wireless devices are disclosed. In one disclosed embodiment, a wireless device includes an image capture device, a wireless transmitter and receiver, a logic subsystem, and memory comprising instructions executable by the logic subsystem to capture a first image via the image capture device, identify authentication features of the first image, and receive authentication data from a remote media device via the wireless receiver that comprises authentication features of a second image. The instruction further cause the logic subsystem to compare the authentication features of the second image to the authentication features of the first image to establish a trusted relationship with the remote media device if the authentication features of the second image exhibit a pre-determined relationship to the authentication features of the first image. | 2010-04-01 |
20100082991 | TRUSTED KEY MANAGEMENT FOR VIRTUALIZED PLATFORMS - To provide a secure service to an application virtual machine running in a first domain of a virtualized computing platform, a second domain is arranged to run a corresponding service driver exclusively for the application virtual machine. As part of the secure service, the service driver effects a key-based cryptographic operation; to do so, the service driver has to obtain the appropriate key from a key manager. The key manager is arranged to store the key and to release it to the service driver only upon receiving evidence of its identity and being satisfied of compliance with release policies associated with the key. These policies include receipt of valid integrity metrics, signed by trusted-device functionality of the virtualized computing platform, for the service driver and the code on which it depends. | 2010-04-01 |
20100082992 | Cryptographic Applications of Efficiently Evaluating Large Degree Isogenies - Techniques are disclosed for representing and evaluating large prime degree isogenies for use in cryptographic signature and encryption schemes. An isogeny of prime degree 1 may be represented as an ideal in the form (1, A*alpha+B), where 1 comprises the degree of a prime number, the prime number is split into integers a and b, and alpha is a known endomorphism. For a given degree 1, integers a and b define a unique isogeny, allowing the isogeny to be stored with 3 log(1) bits of information. Techniques are also disclosed to evaluate the isogeny at a given point by decomposing the isogeny into an integer and a plurality of smaller degree isogenies, evaluating the smaller degree isogenies at the point with traditional means, and multiplying the results of the evaluations together and with the integer. | 2010-04-01 |
20100082993 | COMPUTER-IMPLEMENTED METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR GENERATING AND VERIFYING SIGNATURES - The present description refers in particular to a computer-implemented method, a computer program product, and a computer system for automatically generating a digital signature for a message, the message being representable in a hierarchical tree structure and to a computer-implemented method, a computer program product, and a computer system for automatically verifying a digital signature of a message, the message being representable in a hierarchical tree structure. The computer-implemented method for automatically generating a digital signature for a message, the message being representable in a hierarchical tree structure may comprise:
| 2010-04-01 |
20100082994 | Method and apparatus for implementing electronic seal - A method for implementing electronic seal is disclosed. The method includes: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external portable apparatus; performing a Hash conversion to a file to be sealed and the seal data of the electronic seal to generate a data digest, wherein the file to be sealed is a layout file; sealing, in the portable apparatus, the data digest using the private key of the sealer and the electronic signature program to generate an electronic signature result; and combining the file to be sealed, the seal data of the electronic seal, the digital certificate and the electronic signature result to generate a seal combination file. | 2010-04-01 |
20100082995 | Methods to communicate a timestamp to a storage system - Embodiments of methods to communicate a timestamp to a storage system are generally described herein. Other embodiments may be described and claimed. | 2010-04-01 |
20100082996 | METHOD, APPARATUS AND ARTICLE FOR OFF-LINE CERTIFICATION IN MOBILE APPLICATIONS - A tamper-resistant certification device receives a certified digital time stamp from a trusted third party, resets a time function and produces a time stamp receipt in an on-line mode; The tamper-resistant certification device receives a digital file from a mobile computing device, and produces a certified digitally signed digital file including a copy of the digital file, time stamp receipt and temporal offset in an off-line mode to evidence the content of the digital file within a defined tolerance of a day and/or time. A processor may be portioned into tamper and non-tamper resistant portions. | 2010-04-01 |
20100082997 | SECURE DATA UTILIZATION - A system, comprising an external memory operative to store data therein, the data including a plurality of sections, each of the sections being associated with a signature, and an internal memory operationally connected to the external memory, and a processor arrangement operationally connected to the internal memory, the processor arrangement including a transfer module to transfer one section from the external to the internal memory, an authentication module to authenticate the signature of the section transferred from the external memory, a validity status module to identify the section as valid if the signature is authentic, and an execution module to utilize the section of the data only if the section is valid, wherein the validity status module is operative to invalidate the section, if the content of the section is changed while stored in the internal memory. Related apparatus and methods are also described. | 2010-04-01 |
20100082998 | ACTIVE HIP - Computing services that unwanted entities may wish to access for improper, and potentially illegal, use can be more effectively protected by using Active HIP systems and methodologies. An Active HIP involves dynamically swapping one random HIP challenge, e.g., but not limited to, image, for a second random HIP challenge, e.g., but not limited to, image. An Active HIP can also, or otherwise, involve stitching together, or otherwise collecting and including, within Active HIP software, i.e., a HIP web page, to be executed by a computing device of a user seeking access to a HIP-protected computing service x number of software executables randomly selected from a pool of y number of software executables. The x number of software executables, when run, generates a random Active HIP key. If the generated Active HIP key accompanies a correct user response to the valid HIP challenge the system and/or methodology can assume with a degree of certainty that the current user is a legitimate human user and allow the current user access to the requested computing service. | 2010-04-01 |
20100082999 | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor - A wireless communication device to be wirelessly connected to a wireless network is provided. The wireless communication device includes a password obtainer to obtain a password designated by a user for connecting the wireless communication device to the wireless network, and a wireless connector to connect the wireless communication device to the wireless network with the use of the obtained password. The wireless connector sequentially selects one set from two or more sets, and sequentially attempts to connect the wireless communication device to the wireless network with the use of the sequentially selected one set. Each set of the two or more sets has an authorization method and an encryption method. | 2010-04-01 |
20100083000 | Fingerprint Sensor Device and System with Verification Token and Methods of Using - A method and system of verification is provided for sensing a fingerprint. The present invention offers a secure authentication method and system based on a user's fingerprint data to grant the access to information at a remote location. A biometric input corresponding to the fingerprint is provided by a user and the biometric input is than validated. Based on the validation, a token is transmitted to a remote location. The method and system can be further enhanced by additional security comprising receiving a request based on the authentication of the user information and transmitting, to a second remote location, a token based on the biometric input in response to the request. | 2010-04-01 |
20100083001 | Auditor Assisted Extraction And Verification Of Client Data Returned From A Storage Provided While Hiding Client Data From The Auditor - Various approaches for extracting client's data from a storage provider are presented. In one approach, an auditor is initialized with a verification data set that confirms that an initial version of a data set stored by the storage provider is intact. The auditor extracts a second version of the data set from the storage provider; the second version hides information specified by the data set from the auditor. The auditor determines whether the second version matches the initial version. The second version is returned to the client if the initial version matches the second version. The auditor is prevented from recovering the information specified by the data set using the state information, and the client need not store any state information related to the initial and second versions needed to recover the information specified by the data set. If the initial version does not match the second version, the auditor outputs data indicative of data corruption. | 2010-04-01 |
20100083002 | Method and System for Secure Booting Unified Extensible Firmware Interface Executables - A method and computing device for secure booting of unified extensible firmware interface executables includes generating a platform private key, signing a third party credential, storing the signed third party credential in a database located in a trusted platform module, and executing a unified extensible firmware interface executable only if an associated signed third party credential is stored in the trusted platform module. | 2010-04-01 |
20100083003 | METHOD AND APPARATUS FOR NON-REDUNDANT ENCRYPTED STORAGE - For secure non-redundant storage of data, to store a data blocklet (sub-block), one takes a hash of each blocklet. The hash value is used as a key to encrypt the blocklet data. The key is then hashed to encrypt it and the hashed key used in the blocklet index to identify the blocklet. The blocklet index entry also conventionally includes the address of that encrypted blocklet. Unless one has a file representation which is a vector of the hash values, one cannot obtain direct information about the original blocklet from the blocklet index or the blocklet storage. To retrieve data, each original blocklet hash is hashed again to generate the index entry. Once the encrypted blocklet is located via the index, the same key (original hash) is used to decrypt the blocklet back to its original form and a file is assembled as a sequence of its blocklets. | 2010-04-01 |
20100083004 | Managing Associations Between Keys And Values - Provided are, among other things, systems, methods and techniques for managing associations between keys and values within a computer processing system. In one exemplary implementation, requests to store associations between keys and data values corresponding to the keys are input, and the associations are stored in entry nodes within a data structure represented as a hash-based directed acyclic graph (HDAG). Upon receipt of a data value request and accompanying request key, together with satisfaction of any additional access criterion, a return data value corresponding to the request key automatically is provided, the return data value having been generated based on at least one of the associations that involve the request key. | 2010-04-01 |
20100083005 | Encryption device and encryption method - Even if failure, or the like, occurs during the encryption process, the encryption process is surely resumed. A flag changing unit changes an encryption flag of one disk to being encrypted after an encryption request is received and before the encryption of the data stored on the one disk is started. The flag changing unit changes the encryption flag of the one disk to having been encrypted and changes the encryption flag of the other disk to being encrypted before copying the encrypted data from the one disk to the other disk is started. The flag changing unit changes the encryption flag of the other disk to having been encrypted after copying to the other disk is completed. | 2010-04-01 |
20100083006 | MEMORY CONTROLLER, NONVOLATILE MEMORY DEVICE, NONVOLATILE MEMORY SYSTEM, AND ACCESS DEVICE - A memory controller receives an application identifier for identifying an application from an outside, an application, reference data to be referenced by the application, and a signature for the application and writes the application and the reference data. After receiving the application identifier from the outside, the memory controller accesses memory means which manages the application identifier and the application management state and reads out the management state of the target application. According to the management state, necessary data is decided. Since the judgment result is informed to the outside, there is no need of receiving applications more than necessary and it is possible to reduce the load on the signature process and the application reception process. | 2010-04-01 |
20100083007 | PROCESSOR PERFORMANCE DURING POWER SUPPLY FAILURE - A method, system, and computer usable program product for improving processor performance during power supply failure are provided in the illustrative embodiments. A throttled condition of a processor is detected in a data processing system. A voltage of the electrical power being provided to the processor is reduced. The processor is un-throttled. Additionally, a frequency of electrical power being provided to the processor may also be reduced. A determination is made whether a condition that caused the throttling has been corrected. In response to the condition having been corrected, the frequency is returned to normal frequency and the voltage is returned to normal voltage. The reducing the frequency operation and reducing the voltage operation may each be performed by distinct components communicating over a data network external to the data processing system. | 2010-04-01 |
20100083008 | BATTERY MANAGEMENT FOR OPTIMIZING BATTERY AND SERVICE LIFE - The provision of a mode in silver zinc batteries where a user can access extra capacity as an emergency reserve for times when extra capacity is needed. While this temporarily increases capacity, it does not detrimentally affect cycle life over the longer term, and it permits a silver zinc battery to essentially mimic the long term capacity and cycle life characteristics of a lithium ion battery while still affording inherent advantages associated with silver zinc batteries. In a variant embodiment, this ability to temporarily increase capacity is optimally employed at the end of a battery life cycle in a controlled “roll-off” that accords additional cycles of battery service life. In another variant embodiment, the general capability to control capacity is employed to gradually decrease the available capacity of a battery over the life of the battery, to thereby extend the battery service life. | 2010-04-01 |
20100083009 | POWER MANAGEMENT FOR PROCESSING UNIT - Methods, apparatuses, and systems for managing power of a processing unit are described herein. Some embodiments include determining a voltage variation of a subset of current components of a current consumed by a processing unit. Other embodiments include detecting architectural events on a processing core of the processing unit and instituting various actions to reduce an input rate of instructions to the core. Other embodiments may be described and claimed. | 2010-04-01 |
20100083010 | Power Management For Clusters Of Computers - Power management for clusters of computers, a cluster including a configuration of computers operating in a power management domain, one or more of the computers of the cluster having a power requirement that differs from power requirements of other computers in the cluster, data processing operations on the cluster effecting a processing load on the computers in the cluster, including selecting, from a plurality of configurations of computers capable of supporting a plurality of processing loads at a plurality of power levels, a configuration of computers capable of supporting the processing load at a lowest power level, the lowest power level defined by comparison among configurations capable of supporting the processing load; and reconfiguring the cluster according to the selected configuration. | 2010-04-01 |
20100083011 | INFORMATION PROCESSING DEVICE - In a configuration provided with, for example, sixty four pieces of processor cores, an on-chip-memory, a bus commonly connected thereto, and others, the processor cores are operated by a power supply with low voltage and a clock with low frequency, and the bus is operated by a power supply with high voltage and a clock with high frequency. Each of the processor cores is provided with a bus interface and a frequency divider in order to absorb a power supply voltage difference and a frequency difference between the bus and each of them. The frequency divider generates the clock with low frequency from the clock with high frequency, and the bus interface is provided with a level shifting function, a data width converting function, a hand shaking function between the bus and the bus interface, and the like. | 2010-04-01 |
20100083012 | Inductive Signal Transfer System for Computing Devices - At least two devices are provided that can each form part of a system to inductively exchange power and data. One device is capable of inductively transmitting a power signal to a second device, and to receive feedback from the second device in order to regulate the power signal. | 2010-04-01 |
20100083013 | Various Methods and Apparatuses for Power States in a Controller - Various methods, apparatuses, and systems are described in which a chipset controller has circuitry to control communications with a peripheral device in a computing device. The chipset controller has logic configured 1) to detect a plug-in event when the peripheral device connects to the chipset controller and 2) to transition the chipset controller from a low power consumption state to a higher power consumption state based on the logic detecting the plug-in event. | 2010-04-01 |
20100083014 | Data Transmitter - According to one embodiment, a data transmitter includes a radio receiver, a power distributor, a storage module, a radio transmitter, and a power supply. The radio receiver receives a radio signal from an external device. The power distributor distributes power from the radio signal received by the radio receiver. The storage module stores information and is supplied with the power distributed by the power distributor to be readable when no power is supplied from a main power supply. The main power supply supplies power to the entire data transmitter. The radio transmitter is supplied with the power distributed by the power distributor and transmits the information read from the storage module as a radio signal to the external device. The power supply is capable of switching power to be supplied between the power distributed by the power distributor and the power supplied from the main power supply. | 2010-04-01 |
20100083015 | VIRTUAL PC MANAGEMENT METHOD, VIRTUAL PC MANAGEMENT SYSTEM, AND VIRTUAL PC MANAGEMENT PROGRAM - The virtual PC management system includes: a unit which acquires a power on/off state of a virtual machine from a computer via the network and stores it in a storage; a unit which acquires a power on/off state of a computer from the computer via the network and stores it into the storage; a unit which receives a start-of-use request for a virtual machine from the client machine and searches stored data of the storage unit for a computer which is in a power-on state and to which a virtual machine is not allocated, as an allocation candidate; a unit which allocates the virtual machine in accordance with the start-of-use request to the computer of the allocation candidate; and a unit which notifies, via the network, the computer of the allocation candidate of an instruction to turn on the power of the virtual machine. | 2010-04-01 |
20100083016 | COMMUNICATION DEVICE THAT ENTERS ACTIVE MODE WHEN UPDATED FEED IS ACQUIRED - A communication device is communicable with a server that distributes a content item and a content summary. The communication device acquires the content summary from the server at fixed intervals. When an updated content summary is acquired while a display unit of the communication device is in a sleep mode, then the display unit enters an active mode. | 2010-04-01 |
20100083017 | ENERGY-EFFICIENT TRANSITIONING AMONG DEVICE OPERATING MODES - Methods and devices are provided for managing the transitions between operating modes in a data device. In an illustrative example, a method includes storing, in a control system for a device, a value for a first interval of time. The value indicates a minimum interval of time required for the device to remain in a lower power operating mode to provide energy savings at least equal to an energy cost associated with transitioning between the lower power operating mode and a higher power operating mode. The method further includes receiving a signal that instructs the device to transition from the lower power operating mode to the higher power operating mode. The method also includes ensuring that the device has remained in the lower power operating mode for at least as long as the first interval of time before it transitions to the higher power operating mode. | 2010-04-01 |
20100083018 | FAN SPEED CONTROL OF SILICON BASED DEVICES IN LOW POWER MODE TO REDUCE PLATFORM POWER - In general, in one aspect, the disclosure describes running a cooling fan within a computer at low speed while the computer is in low temperature operations (e.g., idle). The operation of the cooling fan may reduce processor (CPU) temperature enough to decrease processor leakage power, offsetting the power consumption of the fan, and possibly resulting in a net system power reduction. The benefit at the platform level increases further when considering the low efficiency of voltage regulation (VR) in this lower power regime, and potentially reductions in other components (e.g., graphics processor). The optimal fan speed is the speed at which the overall system power is reduced the most (e.g., processor power savings is greater than fan power utilized). The optimal temperature may be determined dynamically during operation or may be determined in manufacturing and applied statically during operation. | 2010-04-01 |
20100083019 | MULTIPROCESSOR SYSTEM AND CONTROL METHOD THEREOF, AND COMPUTER-READABLE MEDIUM - A multiprocessor system configured to share processes by a main system having a first processor and a subsystem having a second processor, comprises a first shared memory configured to receive accesses from the main system and the subsystem, a second memory configured to receive access from the subsystem at a power saving mode, a stop unit configured to stop accesses from the main system and the subsystem to the first shared memory when the subsystem enters the power saving mode, and a switching unit configured to switch an access destination of the subsystem from the first shared memory to the second memory when the subsystem enters the power saving mode. | 2010-04-01 |
20100083020 | INFORMATION PROCESSING SYSTEM AND CONTROL METHOD THEREOF - An information processing system comprising a main system which executes an application, and a subsystem which controls communication with an external apparatus, the information processing system having a power saving mode in which power consumption of the information processing system is reduced, the main system including a power control unit configured to control power consumption of the subsystem, the subsystem including a first communication processing unit configured to communicate with the external apparatus, a second communication processing unit configured to communicate with the external apparatus, and a control unit for the subsystem, wherein when the information processing system shifts to the power saving mode, the power control unit controls power consumption of the subsystem in the power saving mode in accordance with a type of instruction sent from the external apparatus to accept cancellation of the power saving mode. | 2010-04-01 |
20100083021 | Voltage stabilization for clock signal frequency locking - A processor, system, and method are disclosed. In an embodiment, the processor includes a first site and a second site. There is a link to transmit a voltage stabilization signal from the second site to the first site. In the first site voltage correction logic can dynamically modify a voltage supplied to the first site and second site. In the second site there is logic to assert the voltage stabilization signal. After asserting the voltage stabilization signal, the second site is granted at least a window of time in which the supplied voltage to the second site does not change. | 2010-04-01 |
20100083022 | SYSTEM AND METHOD FOR POWER OVER ETHERNET CONFIGURATION FOR A POWER SOURCING EQUIPMENT USING A NETWORK PROFILE - A system and method for power over Ethernet (PoE) configuration for a power sourcing equipment using a network profile. Various types of PSE profile information can be stored in a network database. Upon startup or other configuration setting state, a PSE can retrieve the profile information from the network database and configure its operation based upon such retrieval. Remote configuration of the PSE is thereby enabled. | 2010-04-01 |
20100083023 | NEGOTIATION BETWEEN MULTIPLE PROCESSING UNITS FOR SWITCH MITIGATION - A method for maintaining data and clock line synchronization, which may include a clock line that may be driven high after a clock line falling edge to mitigate a clock error. Additionally, the clock error may be mitigated by maintaining a saturated state of a device. Furthermore, a register may be connected to a microcontroller and/or a graphical processing unit to negotiate control of a switch and a bus. | 2010-04-01 |
20100083024 | Electronics Device Having Timekeeping Function and Computer-Readable Record Medium Storing Program for Timekeeping Function - An electronics device comprising a time information acquisition unit which acquires time information representing present time from an external device, an update unit which updates reference time stored in a reference time storage unit to time represented by the latest time information acquired by the time information acquisition unit each time the time information is acquired, a counter circuit which is formed by hardware and updates its count value at fixed cycles, an elapsed time measurement unit which measures an elapsed time since the update of the reference time by use of the counter circuit, a present time calculation unit which calculates present time by adding the elapsed time to the reference time stored in the reference time storage unit, and a response unit which makes the present time calculation unit calculate the present time and outputs the calculated present time if a present time output request is issued. | 2010-04-01 |
20100083025 | Clock Device and Computer-Readable Record Medium Storing Program for Implementing the Same - A clock device comprises a time information acquisition unit which acquires time information representing present time from an external device at preset time intervals, a time correction unit which corrects time of an internal clock based on the time information, an error calculation unit which calculates an error of the time of the internal clock based on the present time represented by the time information, and a setting change unit which changes the set value of the time interval based on the error. The setting change unit updates the set value to m times the set value when the error is smaller than a first threshold value, while updating the set value to n times the set value when the error is larger than a second threshold value larger than the first threshold value (m, n: positive values satisfying m>1, n<1 and m·n≠1). | 2010-04-01 |
20100083026 | INTER-PROCESSOR COMMUNICATION CHANNEL INCLUDING POWER-DOWN FUNCTIONALITY - Apparatuses and methods are disclosed for implementing an inter-processor communication channel including power-down functionality. In one embodiment, the apparatus may comprise a first integrated circuit (IC), a second IC coupled to the first IC via a communication interface, wherein the first IC is in one or more low power states and unable to monitor the communication interface. The apparatus may further comprise an inter-processor communication (IPC) channel coupled between the first and second ICs, wherein the IPC channel is separate from the communication interface and wherein the second IC generates at least one advisory signal to the first IC via the IPC channel. | 2010-04-01 |
20100083027 | SERIAL-CONNECTED MEMORY SYSTEM WITH OUTPUT DELAY ADJUSTMENT - Systems and methods for performing output delay adjustment are provided for application in serial-connected devices operating as slave devices. A master device provides a clock to the first slave device, and each slave device passes the clock to the next slave device in turn, and the last slave device returns the clock to the master device. The master device compares the outgoing clock to the returned clock and determines if an output delay adjustment is needed. If so, the master device generates and outputs commands for the slave devices to perform output delay adjustment. The slave devices apply the output delay to the clock signal, but may also apply the delay to other output signals. Each of the slave devices has a circuit for performing output delay adjustment. In some implementations, each slave device is a memory device, and the master device is a memory controller. | 2010-04-01 |
20100083028 | SERIAL-CONNECTED MEMORY SYSTEM WITH DUTY CYCLE CORRECTION - Systems and methods for correcting clock duty cycle are provided for application in serial-connected devices operating as slave devices. A master device provides a clock to the first slave device, and each slave device passes the clock to the next slave device in turn, and the last slave device returns the clock to the master device. The master device compares the outgoing clock to the returned clock and determines if a duty cycle correction is needed. If so, the master device generates and outputs commands for the slave devices to perform duty cycle adjustment. Each of the slave devices has a circuit for performing duty cycle adjustment. In some implementations, each slave device is a memory device, and the master device is a memory controller. | 2010-04-01 |
20100083029 | Self-Optimizing Algorithm for Real-Time Problem Resolution Using Historical Data - A self-optimizing algorithm for real-time problem resolution using historical data. Upon receiving failure symptom characteristics for a product or process failure, the algorithm queries historical failure data to locate historical failure symptoms and corrective actions matching the failure symptom characteristics. If a total number of the historical corrective actions identified meets a minimum match threshold, the algorithm selectively prunes a failure symptom characteristic having the lowest priority level to form an adjusted search query. The algorithm may repeat the querying, identifying, and determining steps using the adjusted search query until the total number of historical corrective actions identified meets the minimum match threshold. Once the threshold is met, the algorithm sorts the historical corrective actions to form a list of recommended corrective actions for the failure symptom characteristics and provides the list of recommended corrective actions to an end user. | 2010-04-01 |
20100083030 | REPAIRING HIGH-SPEED SERIAL LINKS - A method and system for repairing high speed serial links is provided. The system includes a first electronic components, connected to at least a second electronic component via at least one link. At least one of the first or second electronic components has a link controller. The link controller is configured to repair serial links by detecting a link error and mapping out individual lanes of a link where the link error is detected. The link controller resumes operation, i.e., transmission of data and continues to monitor the lanes for errors. If and when additional link errors occur, the link controller identifies the lanes in which the link error occurs and deactivates those lanes. The deactivated lane(s) can not be used in further transmissions which, in turn, reduces the occurrence of intermittent link errors. | 2010-04-01 |
20100083031 | METHOD FOR QUEUING MESSAGE AND PROGRAM RECORDING MEDIUM THEREOF - According to an aspect of the embodiment, a message queuing unit of the message processing apparatus stores received messages. A message reception control unit receives a notification of destinations of messages, extracts only the messages for current processes based on a process control table recording current or standby of processes, and transmits the messages to corresponding applications as current processes. On the other hand, the message reception control unit does not transmit the messages to the applications as standby processes. | 2010-04-01 |
20100083032 | CONNECTION BROKER ASSIGNMENT STATUS REPORTING - In one embodiment a computing system comprises one or more processors, a display device coupled to the computing system, and a memory module communicatively connected to the one or more processors. The memory module comprises logic to receive, in a connection server, a service request from a user via a remote connection client; in response to the service request, instantiate a remote computing protocol in a computing resource, monitor a connection state between the remote connection client and the computing resource; and in response to a change in the connection state between the remote connection client and the computing resource, generate a connection state message, and transfer the connection state message to the remote connection client. | 2010-04-01 |
20100083033 | DEVICE AND METHOD FOR AUTOMATICALLY DETERMINING A NETWORK ELEMENT FOR REPLACING A FAILING NETWORK ELEMENT - A device (D), intended for working for at least one network (N), comprises i) an ontology agent (OA) storing at least one ontology defining representations of network elements and relations between these network elements, and ii) a processing means (PM) arranged, when a status of a network element indicates that the latter is failing, for accessing to the ontology agent (OA) to get the representation of the failing network element and relations between this failing network element and at least one other network element, then for determining for each of these other network elements a parameter value representative of a functional likeness with the failing network element from their respective ontology representations, and for determining amongst the other network elements the one offering the parameter value representative of the greatest functional likeness in order to propose to replace the failing network element with this determined network element. | 2010-04-01 |
20100083034 | INFORMATION PROCESSING APPARATUS AND CONFIGURATION CONTROL METHOD - An information processing apparatus for providing a plurality of services by a plurality of software programs, includes: a plurality of hardware resources; a storage unit that stores priorities of the services; a processor that controls configuration of the hardware resources in accordance with a process including: partitioning the plurality of hardware resources into a plurality of groups each of which executes each of the software programs; determining, upon detecting a failure in at least one of the hardware resources in at least one of the groups, another hardware resource which belongs to another group for executing another software programs on the basis of the priorities of services provided by the software programs in reference to the storage unit; and assigning the another hardware resource to the group which includes the one of the hardware resources having the failure so as to renew configuration of the hardware resources. | 2010-04-01 |
20100083035 | METHOD FOR WIRELESS COMMUNICATION IN WIRELESS SENSOR NETWORK ENVIRONMENT - Provided is a wireless communication method in a wireless sensor network environment. The method overhears a packet transmitted from a source sensor node to a destination sink node and determines whether the destination sink node receives the packet. A transmission node selected by using local information among a plurality of neighboring sensor nodes transmits the overheard packet to the destination sink node when the packet is not received. | 2010-04-01 |