30th week of 2014 patent applcation highlights part 63 |
Patent application number | Title | Published |
20140208091 | METHOD AND SYSTEM FOR DYNAMICALLY RESIZING ENCLOSED STORAGE DEVICE PARTITIONS - A computer-implemented method for updating a recovery operating system (OS) stored in a boot partition of a storage device. The method involves booting, via host operating system (OS) boot files stored in the boot partition, a host OS that is stored in a host partition of the storage device, receiving a request to update a recovery OS also stored in the boot partition, determining the recovery OS update requires additional storage space of size Z to be added to the boot partition, decreasing the size of the host partition by the size Z, increasing the size of the boot partition by the size Z, and updating the recovery OS. | 2014-07-24 |
20140208092 | Method For Updating Firmware of a Battery Included in a Rechargeable Battery Module, Portable Electronic Device, and Rechargeable Battery Module - In a method for updating firmware of a battery included in a rechargeable battery module of a portable electronic device, the portable electronic device stores a booting instruction set of the firmware in a battery monitoring unit of the rechargeable battery module, and stores a basic input/output system (BIOS) of the portable electronic device in a non-volatile memory disposed externally of the rechargeable battery module. In response to BIOS update information that includes an updated main instruction set of the firmware, the portable electronic device updates the BIOS, including the main instruction set of the firmware using the BIOS update information. | 2014-07-24 |
20140208093 | ELECTRONIC DEVICE WITH A PLUALITY OF BOOTING MODES - An electronic device with a plurality of booting modes comprises at least a button unit, a control module, a control chip unit, a super I/O unit and a Basic Input/Output System (BIOS). One of the button units outputs a first signal according to a trigger event. The control module includes a buffer unit connected to the button units. The control module sets the buffer unit according to the first signal. The control module outputs a status signal and copies the first signal and outputs the first signal after a delay time. The control chip unit receives the status signal. The super I/O unit receives the first signal outputted from the control module and transmits the first signal to the control chip unit. When the control chip unit receives the status signal and the first signal, the BIOS executes the corresponding booting procedure according to the status signal. | 2014-07-24 |
20140208094 | CONTROL PLANE ENCRYPTION IN IP/MPLS NETWORKS - A method for providing control plane encryption in layer 3 networks is disclosed. The method for providing control plane encryption in layer 3 networks includes for a network having a subset of network elements forming a secured domain; the steps of at a network element which is in the secured domain, encrypting all unencrypted Layer 3 packets as they egress an encryption enable egress interface; unencrypting all encrypted Layer 3 packets as they egress an egress interface is not enabled for encryption; and leaving encrypted all encrypted Layer 3 packets as they egress an encryption enable egress interface. A system and machine readable storage media are also disclosed. | 2014-07-24 |
20140208095 | MANAGED REAL-TIME COMMUNICATIONS BETWEEN USER DEVICES - Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application, a secure session may be established between the application and a remote application. Input from a user of the application may be received, subjected to at least one management policy, and transmitted to the remote application. | 2014-07-24 |
20140208096 | SECURE INTERFACE FOR INVOKING PRIVILEGED OPERATIONS - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order authorize and authenticate requests sent to a virtualization later. The interfaces can be invoked to perform security monitoring, forensic capture, and/or patch software systems at runtime. In addition to the foregoing, other aspects are described in the claims, detailed description, and figures. | 2014-07-24 |
20140208097 | SECURING RESULTS OF PRIVILEGED COMPUTING OPERATIONS - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to secure the results of privileged operations on systems such as the operating system (OS) kernel and/or the hypervisor. The interface allows a public key to be included into a request to perform a privileged operation on a hypervisor and/or kernel. The kernel and/or hypervisor use the key included in the request to encrypt the results of the privileged operation. In some embodiments, the request itself can also be encrypted, such that any intermediate parties are not able to read the parameters and other information of the request. | 2014-07-24 |
20140208098 | METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT OF DOCUMENTS - A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the digital content may be customized for individual recipients by the sender, and may evolve over time. The access rights are enforced according to a time-dependent scheme. A key server is used to arbitrate session keys for the encrypted content, eliminating the requirement to exchange public keys prior to transmission of the digital content. During the entire process of transmitting and receiving e-mail messages and documents, the exchange of cryptographic keys remains totally transparent to the users of the system. Additionally, electronic documents may be digitally signed with authentication of the signature. | 2014-07-24 |
20140208099 | SERVICE PLANE ENCRYPTION IN IP/MPLS NETWORKS - A method for providing service plane encryption in IP/MPLS and GRE networks is disclosed. The method for providing service plane encryption in IP/MPLS and GRE networks includes receiving a first Security Parameter Index with associated first encryption key and associated first authentication key at a first network element supporting the first Service Distribution Point; receiving an instruction at the first network element to encrypt data entering the first Service Distribution point with the first encryption key; receiving an instruction at the first network element to associate a data communication service provided at the first network element to the first Service Distribution Point; providing an encryption label; and providing data associated with the first communication service to the first Service Distribution Point for transmission to the second Service Distribution Point. The method for providing service plane encryption in IP/MPLS and GRE networks provides encryption advantages over systems known in the art by providing capability for selectively encrypting services connected via a data tunnel. | 2014-07-24 |
20140208100 | PROVISIONING AN APP ON A DEVICE AND IMPLEMENTING A KEYSTORE - A keystore is installed on a mobile app where the keystore is created and provisioned on a server, such as an app wrapping server, under the control of an enterprise. A generic (non-provisioned) wrapped app is installed on a device. The app prompts the user to enter a passphrase. When the user does this, an app keystore is created. It has a user section and a table of contents. The keystore files are hashed, creating “first” keystore hash values. The first keystore hash values are stored in the TOC. The TOC is then hashed, creating a TOC hash value. The passphrase entered by the user is then combined with the TOC hash value. This creates a “first” master passphrase for the keystore. The keystore is then transmitted to the device where it is installed in the generic (non-provisioned) wrapped app. | 2014-07-24 |
20140208101 | CONFIDENTIAL COMPUTATION SYSTEM, CONFIDENTIAL COMPUTATION METHOD, AND CONFIDENTIAL COMPUTATION PROGRAM - A client executes processing for data encryption by adding an error vector to plaintext, the error vector being not larger than a predetermined criterion and processing for sending limitation information to a server, the limitation information being formed from a sublattice basis of a lattice generated by a secret key. The server executes processing for receiving the limitation information and storing it in a storage device and in the homomorphic computation processing on the encrypted data received from the client, processing for, when a bit length of ciphertext which is a result of the homomorphic computation processing is equal to or larger than a predetermined value, reducing the bit length of the ciphertext to a value not larger than a predetermined threshold by translating a vector of the ciphertext to an inside of a region formed from the sublattice basis corresponding to the stored limitation information. | 2014-07-24 |
20140208102 | METHOD OF PROTECTING DIGITAL INFORMATION - The method provides encoding digital information by assigning encoding values from a plurality of collectives of encoding values to the message symbols. The collectives are unbound from each other, are selected randomly, and setting a correspondence between the symbols and encoding values of the selected collectives is random. Elements of the encoded message can be further assigned encoding values of further selected collectives. The method can be implemented both in virtual form using Cloud Computing technology and in a physical form, where encryption and decryption blocks are implemented in one environment physically protected against unauthorized access, writing and copying. Performing encoding and decoding in a user-inaccessible environment and providing the user only with the results of encoding and decoding processes prevents unauthorized access thereto from occurring. | 2014-07-24 |
20140208103 | FILE ENCRYPTION, DECRYPTION AND ACCESSVIA NEAR FIELD COMMUNICATION - Methods and devices for NFC-tap file encryption, decryption and access via Near Field Communication (NFC) are disclosed. A user can select an unencrypted file stored in a computing device for encryption. Upon encryption, the file name of the selected file and the encryption key used to encrypt the selected file are transmitted to an NFC-enabled wireless device for storage. The user can select an encrypted file stored in the computing device for access. As the user taps the computing device with the wireless device, the file name of the selected file is transmitted to the wireless device, which in turn transmits a decryption key for decrypting the selected file to the computing device. The computing device decrypts the selected file with the decryption key. The user can now access the decrypted file. | 2014-07-24 |
20140208104 | ID-BASED ENCRYPTION AND SIGNATURE METHOD AND TERMINAL - Provided are an identity (ID)-based encryption and signature method and a terminal that use an ID of a transmitter or a receiver as a part of the filename or the extension of a file transmitted to the receiver by the transmitter. Accordingly, it is possible to enable a user to visually recognize that the file has been provided with security. Also, it is possible to designate an associated program for the extension, and the user can easily decrypt or verify the file through the designated associated program. | 2014-07-24 |
20140208105 | Automated Content Signing for Point-of-Sale Applications in Fuel Dispensing Environments - A system and method for obtaining manufacturer-signed content for use with manufacturer equipment is provided. Content is obtained at a merchant device for executing or presenting on manufacturer equipment. A signature is generated for the content based on a private key. The merchant device transmits the content and signature to a manufacturer server. The manufacturer server decrypts and authenticates the signature based on the private key or a corresponding public key. If authenticated, the manufacturer server re-signs the content with a manufacturer signature that allows the content to be presented or executed on manufacturer equipment. | 2014-07-24 |
20140208106 | Network-Based Service for Secure Electronic Mail Delivery On an Internet Protocol Network - A network is disclosed that includes a message originator computer and a message recipient computer, for secure electronic mail delivery. In accordance with the invention, the network includes a message delivery server that can distinguish between real and phantom messages. In operation, the message originator computer waits a random time and then transmits a first encrypted phantom message to the message delivery server. This message is to spoof an eavesdropper into believing that there is a steady stream of messages being sent from the originator computer. However, the message delivery server recognizes the message as a phantom message and discards it. When the message originator computer receives a user request to transmit a real message to the recipient computer, it waits a random time and then encrypts and transmits the real message to the message delivery server. The message delivery server recognizes the message as a real message and forwards the real message to the recipient computer. Meanwhile, the message originator computer can continue transmitting encrypted phantom messages to the message delivery server. In this manner, an eavesdropper will be tricked into believing that there is a steady stream of messages being sent from the originator computer. | 2014-07-24 |
20140208107 | SYSTEMS AND METHODS FOR IMPLEMENTING APPLICATION CONTROL SECURITY - Systems and methods for implementing application control security are disclosed. In one embodiment, a system includes a first device, a decrypted white-list, and an executable program. The first device may be in electrical communication with a memory containing an encrypted white-list. The encrypted white-list may be decrypted using an identifier of a second device. The executable program may be referenced in the decrypted white-list. | 2014-07-24 |
20140208108 | MEDIATOR UTILIZING ELECTRONIC CONTENT TO ENFORCE POLICIES TO A RESOURCE - Methods, systems and apparatuses for a mediator enforcing policies to a resource utilizing an electronic content, are disclosed. One method includes receiving, by a mediator computing device of a mediator, a second share SK | 2014-07-24 |
20140208109 | METHOD AND SYSTEM FOR PROTECTING MEMORY INFORMATION IN A PLATFORM - A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength. | 2014-07-24 |
20140208110 | INFORMATION PROCESSING APPARATUS, SIGNATURE GENERATION APPARATUS, SIGNATURE VERIFICATION APPARATUS, INFORMATION PROCESSING METHOD, SIGNATURE GENERATION METHOD, AND SIGNATURE VERIFICATION METHOD - Provided is an information processing apparatus including a message generation unit configured to generate a message based on a pair of quadratic multivariate polynomials F=(f | 2014-07-24 |
20140208111 | SECURE VIRTUAL MACHINE MIGRATION - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to enable secure migration of virtual machine instances between multiple host computing devices. The migration is performed by receiving a request to migrate a virtual machine where the request includes public keys for the source host computing and the destination host computing. The source and destination hosts use the public keys to establish an encrypted session and then use the encrypted session to migrate the virtual machine. | 2014-07-24 |
20140208112 | PROVIDING AN ENCRYPTED ACCOUNT CREDENTIAL FROM A FIRST DEVICE TO A SECOND DEVICE - Disclosed is an apparatus, system, and method to decrypt an encrypted account credential at a second device that is received from a first device. The second device may receive a first share of a master key and the encrypted account credential from the first device. The second device may reconstruct the master key with the first share of the master key and a second share of the master key stored at the second device. The second device may decrypt the encrypted account credential with the reconstructed master key. Based upon the decrypted account credential, the second device may be enabled to access an account based upon the decrypted account credential. | 2014-07-24 |
20140208113 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, COMMUNICATION SYSTEM, AND COMPUTER PROGRAM - A measurement to obtain an RTT to a receiving apparatus is performed by a relay apparatus that is disposed between a WAN and a home network and connects these two networks. That an RTT value is equal to or less than the threshold value is set as a content distribution condition from a transmitting apparatus, so that the same use environment as a system using current DLNA and DTCP-IP can be realized for content use in the home network. Thereby, unjust distribution of content is prevented while an authentication and key exchange procedure performed via an external network is allowed. | 2014-07-24 |
20140208114 | SYSTEM AND METHOD FOR MASSIVE CONTROLLED AND SECURED UPDATE OF DEVICES FIRMWARE - System for remote firmware updates of mail processing device from a remote data server including: file download servers connected to the remote data server for receiving encrypted files encrypted from a list of binary files corresponding to firmware of a mail processing device to update; web servers providing a web service application for downloading files and connected to the remote data server and the files download servers for retrieving the encrypted files associated with a personalized files catalogue retrieved from the remote data server; and a user computer system connected to the web servers for receiving the encrypted files for download onto a storage device to plug into the mail processing device. The mail processing device decrypts the encrypted files with file decryption keys previously provided with the personalized files catalogue and installs the files before connecting to the remote data server for report the outcome of the installation. | 2014-07-24 |
20140208115 | COMMUNICATION APPARATUS, METHOD FOR CONTROLLING COMMUNICATION APPARATUS, AND PROGRAM - A communication apparatus includes a storage unit, an updating unit, a determination unit, and a deletion unit. The storage unit stores, in a storage, a first key used to decrypt or authenticate a packet to be communicated between the communication apparatus and a second communication apparatus. The updating unit updates the first key to a second key different from the first key when an expiration date of the first key has passed. The determination unit determines that a packet to be decrypted or authenticated using the second key has been received from the second communication apparatus. The deletion unit deletes the first key from the storage unit in response to the determination unit determining that the packet to be decrypted or authenticated using the second key has been received from the second communication apparatus. | 2014-07-24 |
20140208116 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a communication apparatus includes a sharing processing unit, an extension unit, and a communication unit. The sharing processing unit shares a first cryptographic key with an external apparatus connected via a link, and further generates a second cryptographic key and shares the second cryptographic key with the external apparatus through secret communication using the first cryptographic key. The extension unit generates an extended key by extending a length of the second cryptographic key. The communication unit transmits the extended key to a first application which communicates with a second application to which the external apparatus provides the second cryptographic key. | 2014-07-24 |
20140208117 | SERVER APPARATUS AND PROGRAM - A server apparatus according to an embodiment generates a random number on receiving from a user apparatus a notification showing that a re-encryption key should be updated, and calculates re-encryption key data on the basis of the re-encryption key stored and the random number generated. The server apparatus transmits the re-encryption key to the user apparatus and receives, from the user apparatus, the user private key not updated yet and re-encryption key updating data calculated from the re-encryption key data on the basis of the user private key updated. The server apparatus calculates the re-encryption key updated, on the basis of the re-encryption key updating data and the random number, and replaces the re-encryption key stored in the storage device with the updated re-encryption key. | 2014-07-24 |
20140208118 | System and Method for the Safe Spontaneous Transmission of Confidential Data Over Unsecure Connections and Switching Computers - Disclosed is a method and system for transmitting data. The system includes at least one first stationary and/or mobile communication terminal at least one further second communication terminal and a switching unit reachable by all communication terminals via a data network. The communication terminals send data to the switching unit, which data are encrypted with a symmetric encryption method, and send the symmetric key encrypted with a public key of a key pair to the switching unit, so that the same can send it to other communication terminals, which in possession of an associated private key then are capable of accessing the information stored at the switching unit and decrypt the same. | 2014-07-24 |
20140208119 | Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment - Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request. The token-owning process signs the request to indicate that it endorses the request. A receiving server accepts a request if (1) the token-owning process endorses the request by signing the request; (2) the token is valid (token is signed by its issuer and the digital signature is verified and unexpired); (3) user entity, which can be a real user or a deployment or a server process, that is represented by the token has the authorization to access the specified resources; and (4) the token-owning process is authorized to endorse the user entity represented by the token to access the specified resources. | 2014-07-24 |
20140208120 | SYSTEM FOR CONTROLLING THE DISTRIBUTION AND USE OF RENDERED DIGITAL WORKS THROUGH WATERMARKING - A trusted rendering system for use in a system for controlling the distribution and use of digital works. A trusted rendering system facilitates the protection of rendered digital works which have been rendered on a system which controls the distribution and use of digital works through the use of dynamically generated watermark information that is embedded in the rendered output. The watermark data typically provides information relating to the owner of the digital work, the rights associated with the rendered copy of the digital work and when and where the digital work was rendered. This information will typically aid in deterring or preventing unauthorized copying of the rendered work to be made. The system for controlling distribution and use of digital works provides for attaching persistent usage rights to a digital work. Digital works are transferred between repositories which are used to request and grant access to digital works. Such repositories are also coupled to credit servers which provide for payment of any fees incurred as a result of accessing a digital work. | 2014-07-24 |
20140208121 | NEAR FIELD COMMUNICATION (NFC) DEVICE AND METHOD FOR SELECTIVELY SECURING RECORDS IN A NEAR FIELD COMMUNICATION DATA EXCHANGE FORMAT (NDEF) MESSAGE - A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC) device are provided. The method includes generating a place marker signature record by setting a URI_present field to ‘0’ and setting a signature_type field to a predefined value, wherein a combination of the URI_present field set to ‘0’ and the signature_type field set to the predefined value indicates that a signature Record Type Definition (RTD) is a place marker signature record; and placing the place marker signature record in the NDEF message, wherein a set of records following the place marker signature record are secured. | 2014-07-24 |
20140208122 | SECURE CONTENT DISTRIBUTION - In an example, a method of securing content is described. The method may include instantiating a content server on a client device. The method may also include operating the content server to retrieve content identified by a Uniform Resource Identifier (URI). The method may also include serving the content from the content server to a content renderer on the client device. The content renderer may be configured to render the content at the client device and to prohibit saving the content in the clear on the client device. | 2014-07-24 |
20140208123 | PRIVILEGED CRYPTOGRAPHIC SERVICES IN A VIRTUALIZED ENVIRONMENT - A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other security resources in a multitenant remote program execution environment. The privileged service can receive requests to use the cryptographic keys and issue responses to these requests. In addition, the privileged service can measure the hypervisor at runtime (e.g., either periodically or in response to the requests) in an attempt to detect evidence of tampering with the hypervisor. Because the privileged service is operating in system management mode that is more privileged than the hypervisor, the privileged service can be robust against virtual machine escape and other hypervisor attacks. | 2014-07-24 |
20140208124 | HIGH PRIVACY OF FILE SYNCHRONIZATION WITH SHARING FUNCTIONALITY - Systems and methods for providing privacy of file synchronization with sharing functionality are presented. In embodiments, a file synchronization system comprises one or more folders associated with one or more non-shared encryption keys, which may be a managed key shared across an organization, and/or a personal key that is not shared or has limited third-party sharing. The one or more non-shared encryption keys are not known to the data storage service. The file synchronization system may also include one or more folders associated with a shared encryption key that is shared with the data storage service, and in embodiments, with a set of users of the service. The system may include a mapping correlating folders to encryption type so items in each folder can be handled appropriately. The system may have additional folders, such as one or more public folders that may be available with limited or no restrictions. | 2014-07-24 |
20140208125 | ENCRYPTION AND DECRYPTION DEVICE FOR PORTABLE STORAGE DEVICE AND ENCRYPTION AND DECRYPTION METHOD THEREOF - An encryption and decryption device for a portable storage device and an encryption and decryption method thereof are provided. The encryption and decryption device includes a storage element, a control element and an encryption and decryption circuit. The control element receives a password, saves the password to the storage element and provides an encryption and decryption command. The encryption and decryption circuit is electrically connected to a portable storage device, receives the encryption and decryption command, reads the password stored in the storage element according to the encryption and decryption command, and encrypts or decrypts data stored in the portable storage device by utilizing the password according to whether the data have been encrypted. After the data are encrypted or decrypted, the encryption and decryption circuit clears the password in the storage element. | 2014-07-24 |
20140208126 | RATE SCALABLE IO INTERFACE WITH ZERO STAND-BY POWER AND FAST START-UP - Systems and methods of interconnecting devices may include an input/output (IO) interface having one or more clock circuits, a power supply coupled to the one or more clock circuits, and logic to receive a rate adjustment command at the IO interface. The logic may also be configured to adjust a data rate of the IO interface in response to the rate adjustment command, and to adjust an output voltage of the power supply in response to the rate adjustment command. | 2014-07-24 |
20140208127 | ELECTRONIC DEVICE HAVING MULTIPLE HUMAN-MACHINE INTERFACES AND METHOD FOR RUNNING MULTIPLE HUMAN-MACHINE INTERFACES - An electronic device having multiple human-machine interfaces and a method for running multiple human-machine interfaces are provided. The electronic device includes a host and a plurality of human-machine interfaces. The host has a processor, and each of the human-machine interfaces is disposed in the host and includes a power setting module. The processor analyzes all the human-machine interfaces to determine a target interface in which the enabled power setting module is included, so as to perform message input and output operations of the target interface. | 2014-07-24 |
20140208128 | Initialize a Computing Device to Perform an Action - A method uses a computing device that includes a first processor in a first, inactive state operatively coupled to a second processor in an active state. While the first processor is in the first state ( | 2014-07-24 |
20140208129 | RESERVE POWER SYSTEM FOR DATA CENTER - A system for performing computing operations in a data center includes one or more sets of computer systems, one or more primary power systems, and a reserve power system. The primary power systems include at least one power distribution unit that supplies power to at least one of the sets of computer systems. The reserve power system automatically supplies power to at least one of the sets of computer systems if a condition is met (such as a failure of the primary power system). | 2014-07-24 |
20140208130 | RESERVE POWER SYSTEM FOR DATA CENTER - A system for performing computing operations in a data center includes one or more sets of computer systems, one or more primary power systems, and a reserve power system. The primary power systems include at least one power distribution unit that supplies power to at least one of the sets of computer systems. The reserve power system automatically supplies power to at least one of the sets of computer systems if a condition is met (such as a failure of the primary power system). | 2014-07-24 |
20140208131 | ELECTRONIC APPARATUS, POWER SUPPLY DEVICE, SYSTEM AND APPARATUS - A power supply device is caused to execute a new program. An electronic apparatus that receives power from a power supply device in a non-contact manner includes: an intra-apparatus circuit that operates with power received via a power transmission path from the power supply device to the electronic apparatus; a program acquiring unit that acquires a program to be executed by the power supply device from outside, and stores the program; and an apparatus-side communicating unit that transmits the program to the power supply device via the power transmission path. | 2014-07-24 |
20140208132 | WAKE ON CLOUD - A method can include receiving a request to access a specified resource associated with a user account; and, in response to the request, transmitting, to a network address associated with the user account, instructions for waking a system or device from a sleep state and for accessing the specified resource. Various other apparatuses, systems, methods, etc., are also disclosed. | 2014-07-24 |
20140208133 | SYSTEMS AND METHODS FOR OUT-OF-BAND MANAGEMENT OF AN INFORMATION HANDLING SYSTEM - In accordance with embodiments of the present disclosure, an access controller of an information handling system may be configured to receive a management operation from a management server communicatively coupled to an out-of-band network interface of the information handling system. The access controller may further be configured to, in response to receipt of the management operation and in concert with a basic input/output system of the information handling system, cause the information handling system to enter a power state in which a computer-readable medium associated with the information handling system is powered on. The access controller may also be configured to, in concert with the basic input/output system, transfer data associated with the management operation from the management server to the computer-readable medium. | 2014-07-24 |
20140208134 | HOST CONTROLLER INTERFACE FOR UNIVERSAL SERIAL BUS (USB) POWER DELIVERY - An apparatus, comprising a system management bus configured to communicate with a USB PDC, and a processor coupled to the system management bus and configured to send a power delivery configuration to the PDC, wherein the power delivery configuration comprises voltage and current settings, and receive a power delivery status from the PDC. Also disclosed is an apparatus comprising a power bus interface configured to communicate with a USB port partner, a system management bus interface configured to communicate with a host, and a processor coupled to the power bus interface and the system management bus interface, wherein the processor is configured to receive, via the system management bus interface, a power delivery configuration from the host, generate a power capability message based on the power delivery configuration, and send, via the power bus interface, the power capability message to the USB port partner. | 2014-07-24 |
20140208135 | POWER-UP RESTRICTION - Techniques are disclosed relating to power management within an integrated circuits. In one embodiment an apparatus is disclosed that includes a circuit and a power management unit. The power management unit is configured to provide, based on a programmable setting, an indication of whether an attempted communication to the circuit is permitted to cause the circuit to exit from a power-managed state. In some embodiments, the apparatus includes a fabric configured to transmit the attempted communication to the circuit from a device. In such an embodiment, the circuit is configured to exit the power-managed state in response to receiving the attempted communication. The fabric is configured to determine whether to transmit the attempted communication based on the indication provided by the power management unit. | 2014-07-24 |
20140208136 | Systems And Methods For Power Supply Configuration And Control - Systems and methods are disclosed that may be used for controlling information handling system power supply based on current system power policy such as current system load power need and/or based on current system load power capping information. The disclosed systems and methods may be so implemented to improve power use efficiency for information handling system applications in which a power supply unit (PSU) has a power delivery capability that is overprovisioned relative to the power-consuming system load component/s of an information handling system. | 2014-07-24 |
20140208137 | SYSTEMS AND METHODS FOR DYNAMIC LOAD REDUCTION CONTROL MESSAGING - Systems and methods for dynamic load reduction control messaging. In one embodiment, a system can include at least one memory that stores computer-executable instructions; and at least one processor configured to access the at least one memory, wherein the at least one processor is configured to execute the computer-executable instructions. The computer-executable instructions can be operable to receive, by the at least one processor, a multicast load control instruction for a demand response device; generate, based at least in part on the multicast load control instruction, at least one unicast load control instruction; and transmit, by a transmission device coupled to the at least one processor, the at least one unicast load control instruction to a home area network (HAN) device. | 2014-07-24 |
20140208138 | SYSTEM AND METHOD FOR REDUCING POWER CONSUMPTION - Systems and methods are disclosed for operating an interface of an electronic device in an active mode or a power save mode based, at least in part, on a condition of a data exchange module buffer. When buffer space is available, incoming data may be stored locally and the interface used to access remote memory storage may be in a power save mode. The interface may revert to active mode to transfer data to the remote memory, such as after a configurable reception interval. Outgoing data may also be stored in a buffer, allowing the interface to be in a power save mode with information transmitted from the buffer. | 2014-07-24 |
20140208139 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING POWER CONSUMPTION, AND STORAGE MEDIUM - An apparatus includes a memory, a processor coupled to the memory, a power supply device that supplies power to the processor, and a signal generation circuit that, when overcurrent of the power supply device is detected, generates a first signal instructing suppression of power consumption of the processor, and outputs the first signal to the processor. | 2014-07-24 |
20140208140 | POWER CONSUMPTION LIMIT ASSOCIATED WITH POWER OVER ETHERNET (POE) COMPUTING SYSTEM - A computing system is associated with power consumption based on Power over Ethernet (PoE). Power consumption is compared to a threshold, and a signal is asserted that power consumption is to be limited based on the comparison to the threshold. | 2014-07-24 |
20140208141 | DYNAMICALLY CONTROLLING INTERCONNECT FREQUENCY IN A PROCESSOR - In one embodiment, the present invention includes a method for determining whether a number of stalled cores of a multicore processor is greater than a stall threshold. If so, a recommendation may be made that an operating frequency of system agent circuitry of the processor be increased. Then based on multiple recommendations, a candidate operating frequency of the system agent circuitry can be set. Other embodiments are described and claimed. | 2014-07-24 |
20140208142 | SEMICONDUCTOR DEVICE - Supply of power to a plurality of circuits is controlled efficiently depending on usage conditions and the like of the circuits. An address monitoring circuit monitors whether a cache memory and an input/output interface are in an access state or not, and performs power gating in accordance with the state of the cache memory and the input/output interface. The address monitoring circuit acquires and monitors an address signal between a signal processing circuit and the cache memory or the input/output interface periodically. When one of the cache memory and the input/output interface is in a standby state and the other is in the access state, power gating is performed on the circuit that is in the standby state. | 2014-07-24 |
20140208143 | Multiprocessor Having Runtime Adjustable Clock and Clock Dependent Power Supply - A multiprocessor that that provides for adjusting the clock frequency for at least some data processing units at runtime and a voltage supply adapted to supply higher supply voltages for data processing at higher clock frequencies. | 2014-07-24 |
20140208144 | Method and Apparatus for Adaptive Power Management of Memory Subsystem - A method and apparatus are disclosed for performing adaptive memory power management in a system employing a CPU and a memory subsystem. A CPU throttle control (THR) module generates a CPU throttle control signal indicating when the CPU is idle. A memory controller (MC) module generates memory power management signals based on at least one of the CPU throttle control signal, memory read/write signals, memory access break events, and bus master access requests. Certain portions of the memory subsystem are powered down in response to the memory power management signals. Memory power management is performed on a time segment by time segment basis to achieve efficient power management of the memory subsystem during CPU run time. | 2014-07-24 |
20140208145 | METHODS AND APPARATUS FOR SAVING POWER - In one example embodiment, a device uses a camera and an eye detection service to determine whether a user is looking at a display of the device during periods when the user is not actively interacting with the device. In response to a determination that the user is not looking at the display, the display is automatically powered off. In response to the user's resumption of looking at the display, the display may be automatically powered back on. Other embodiments are described and claimed. | 2014-07-24 |
20140208146 | Time Protocol Latency Correction Based On Forward Error Correction Status - One embodiment provides a method for time protocol latency correction based on forward error correction (FEC) status. The method includes determining, by a network node element, if a forward error correction (FEC) decoding mode is enabled or disabled for a packet received from a link partner in communication with the network node element. The method also includes determining, by the network node element, a first time correction factor if an FEC decoding mode is enabled, the first time correction factor includes a time delay associated with the enabled FEC decoding mode and the first time correction factor is applied to a time stamp associated with the packet. The method also includes determining, by the network node element, a second time correction factor if an FEC decoding mode is disabled, the second time correction factor is applied to the time stamp associated with the packet. | 2014-07-24 |
20140208147 | APPARATUS AND METHOD FOR LOCALLY OPTIMIZING SOURCE SYNCHRONOUS DATA STROBES - An apparatus is provided that compensates for misalignment on a synchronous data bus. The apparatus includes a bit lag control element and a synchronous lag receiver. The bit lag control element is configured to measure a propagation time beginning with assertion of a strobe and ending with assertion of a first one of a plurality of radially distributed strobes corresponding to the strobe, and is configured to generate a value on a lag bus that indicates the propagation time. The synchronous lag receiver is coupled to the bit lag control element, and is configured to receive the first one of the plurality of radially distributed strobes and a data bit, and is configured to delay registering of the data bit by the propagation time. | 2014-07-24 |
20140208148 | AUTOMATIC SOURCE SYNCHRONOUS BUS SIGNAL ALIGNMENT COMPENSATION MECHANISM - An apparatus including a Joint Test Action Group (JTAG) interface and a bit lag control element. The JTAG interface receives information that indicates an amount to adjust a propagation time. The bit lag control element measures the propagation time beginning with assertion of a first signal and ending with assertion of a second signal, and generates a value indicating an adjusted propagation time. The bit lag control element includes delay lock control, adjust logic, and a gray encoder. The delay lock control selects one of a plurality of successively delayed versions of the first signal that coincides with the assertion the second signal, and generates a second value indicating the propagation time. The adjust logic adjusts the second value by the amount prescribed by the JTAG interface to yield a third value. The gray encoder gray encodes the third value to generate the value on the lag bus. | 2014-07-24 |
20140208149 | APPARATUS AND METHOD FOR DYNAMICALLY ALIGNED SOURCE SYNCHRONOUS RECEIVER - An apparatus including a synchronous lag receiver that receives one of a plurality of radially distributed strobes and a data bit, and that delays registering of the data bit by a propagation time. The synchronous lag receiver has a first plurality of matched inverters, a first mux, and a bit receiver. The first plurality of matched inverters generates successively delayed versions of the data bit. The first mux receives a value on a lag bus that indicates the propagation time, and selects one of the successively delayed versions of the data bit that corresponds to the value. The bit receiver receives the one of the successively delayed versions of the data bit and one of a plurality of radially distributed strobe signals, and registers the state of the one of the successively delayed versions of the data bit upon assertion of the one of a plurality of distributed strobe signals. | 2014-07-24 |
20140208150 | CROSS COMMUNICATION OF COMMON PROBLEM DETERMINATION AND RESOLUTION - Approaches for problem determination and resolution process cross communication are provided. Embodiments provide cross communication of a problem determination and resolution among similar data center devices. Specifically, symptoms of an error condition encountered for one data center device are captured by a first enterprise group, along with an associated resolution solution, and made available to an another enterprise group managing a commonly configured data center device, which may be faced with a similar error condition. The error signature and resolution steps captured by the first enterprise group are subsequently made available within and across multiple management domains operating within a common model (e.g., a publication-subscription system). Within this model, both the originator of the error determination and resolution (i.e., publisher), and one or more commonly configured data center devices susceptible to the same error condition (i.e., subscribers), can filter, access, and control the flow of error resolutions. | 2014-07-24 |
20140208151 | Method And Apparatus To Recover From An Erroneous Logic State In An Electronic System - An electronic system includes circuitry to detect errors in logic state in the system and to initiate corrective action when one or more errors are detected. In some embodiments, redundant information is stored within a system that is associated with an operational state of the system. If the operational state of the system is subsequently corrupted as a result of an electrical or mechanical overstress condition, resulting errors may be detected by comparing or otherwise processing the stored operational state information and the redundant information. | 2014-07-24 |
20140208152 | RELAY NODE, CONTROL METHOD OF RELAY NODE AND NETWORK SYSTEM - A first network device includes: a forwarding controller configured to forward received data; and a fault detector configured to detect occurrence of a failure in a remote second relay node. The forwarding controller includes: a forwarding unit configured to forward the received data; and a modifier configured to modify the received data for detection of the occurrence of a failure in the second relay node. The modifier includes (i) a flag option marker configured to attach a flag to data; (ii) a sequence adding unit configured to add a protocol specific number to a sequence number; and (iii) a sequence subtracting unit configured to subtract the protocol specific number from an acknowledgement number. The fault detector detects the occurrence of a failure in the remote second relay node, based on at least one of the flag and the acknowledgement number. | 2014-07-24 |
20140208153 | METHOD AND SYSTEM FOR PROVIDING HIGH AVAILABILITY TO COMPUTER APPLICATIONS - A system and method for assigning application specific IP addresses to individual applications. The system may be operable to assign a unique IP address to an application, and alias the application IP address to a NIC IP address on the host where the application is running. In an exemplary embodiment, the system may be further operable to migrate the application IP address to a new host as part of a migration, and alias the application IP address to a NIC in the new host as part of the migration. | 2014-07-24 |
20140208154 | STORING DATA IN A DISPERSED STORAGE NETWORK - A method begins by creating a vault as a virtual memory block within memory of a dispersed storage network (DSN). A segment of data is encoded into a set of encoded data slices and stored in the vault. The method continues by dividing the virtual memory block into a set of vault regions. The method continues by determining, for each vault region of the set of vault regions, vault parameters to produce a set of vault parameters. Vault parameters include a decode threshold number of encoded data slices and a total number of encoded data slices for encoding the segment of data. The method continues by facilitating data access to the vault in accordance with the set of vault parameters. | 2014-07-24 |
20140208155 | REBUILDING DRIVE DATA - A method that includes identifying an inaccessible portion of a first disk drive. The method also includes regenerating data corresponding to the inaccessible portion of the first disk drive and storing the regenerated data to a second disk drive. The method also includes copying data from an accessible portion of the first disk drive to the second disk drive. | 2014-07-24 |
20140208156 | MEMORY ACCESS METHODS AND APPARATUS - A disclosed example apparatus includes a row address register ( | 2014-07-24 |
20140208157 | METHOD AND APPARATUS FOR REDUNDANCY IN AN ATM USING HOT SWAP HARDWARE UNDERLYING A VIRTUAL MACHINE - A method and apparatus for providing redundancy in an Automatic Teller Machine (ATM) is provided. Application software may be run on top of a virtual environment such as a virtual machine and/or a virtual disk environment. Should a software component fail, the virtual environment will “crash” but the ATM hardware and operating system will remain intact. If the software is fatally flawed—e.g., due to a faulty “upgrade” the older version may be “rolled back” from a previously stored virtual environment. | 2014-07-24 |
20140208158 | SYSTEMS AND METHODS OF DATA TRANSMISSION AND MANAGEMENT - Data communications systems and methods comprise a conductive media infrastructure in communication with a baseband data universe propagating at least one first signal and a broadband data universe propagating at least one second signal. At least one segmentation device is in communication with the conductive media infrastructure and partitions the broadband data universe from the baseband data universe. A coupling device is in communication with the at least one segmentation device and modulates transmission parameters of the second signal such that information travels within the broadband data universe via the conductive media infrastructure and avoids the baseband data universe. Power distribution and management systems and methods are also provided which preserve power distribution via a baseband data universe while one or more devices communicate energy data via a broadband data universe | 2014-07-24 |
20140208159 | SYSTEMS AND METHODS FOR IMPLEMENTING DATA ANALYSIS WORKFLOWS IN A NON-DESTRUCTIVE TESTING SYSTEM - A collaboration system may include a first computing device that may communicate with at least one other computing device via a computing network. The computing network may communicatively couple to a number of computing devices and the first computing device may receive inspection data acquired by one or more non-destructive testing (NDT) devices. After receiving the inspection data, the first computing device may determine at least one of a workflow for analyzing the inspection data based on the inspection data, a layout configured to display the inspection data, or a set of tools configured to analyze the inspection data. The first computing device may then implement the workflow, display the inspection data according to the layout, and/or display the set of tools. The workflow may include one or more processes that may be used to analyze the inspection data. | 2014-07-24 |
20140208160 | AUTOMATED TEST PLATFORM - A segmented subsystem, for use within an automated test platform, includes a first subsystem segment including a first data sequencer configured to coordinate the execution of one or more instructions within the first subsystem segment. A second subsystem segment includes a second data sequencer configured to coordinate the execution of one or more instructions within the second subsystem segment. | 2014-07-24 |
20140208161 | SCALABLE TEST PLATFORM - A scalable test platform includes a PCIe-based event fabric. One or more CPU subsystems are coupled to the PCIe-based event fabric and configured to execute an automated test process. One or more instrument subsystems are coupled to the PCIe-based event fabric and configured to interface one or more devices under test. | 2014-07-24 |
20140208162 | GENERATION OF SIMULATED ERRORS FOR HIGH-LEVEL SYSTEM VALIDATION - A device, integrated circuit and method for generating simulated errors are disclosed. In the disclosed device, integrated circuit and method, an original data value is read from a memory. The original data value is intercepted by the integrated circuit. The integrated circuit is operable to virtualize an error in the original data value to generate a modified data value. The integrated circuit is also operable to generate an interrupt according to the virtualization. This disclosure may be particularly useful for high-level memory validation. | 2014-07-24 |
20140208163 | SYSTEMS AND METHODS FOR ANALYZING DATA IN A NON-DESTRUCTIVE TESTING SYSTEM - A collaboration system may include a non-destructive testing (NDT) inspection device that may communicate with at least one other computing device via a computing network. The computing network may communicatively couple a plurality of computing devices and the NDT inspection device may acquire inspection data, establish a communication connection to the at least one other computing device, and send the data to the at least one other computing device. There, the at least one other computing device may analyze the data. After the data is analyzed, the NDT inspection device may receive the analyzed data from the at least one other computing device. | 2014-07-24 |
20140208164 | SCALABLE TEST PLATFORM - A scalable test platform includes a PCIe-based event fabric. One or more instrument subsystems are coupled to the PCIe-based event fabric and configured to interface one or more devices under test and generate captured test data. One or more digital signal processing subsystems are coupled to the PCIe-based event fabric and configured to process the captured test data | 2014-07-24 |
20140208165 | MULTI-CORE DEVICE, TEST DEVICE, AND METHOD OF DIAGNOSING FAILURE - Provided is a multi-core device. The multi-core device includes: a plurality of cores outputting a test response value by receiving a test pattern value; a majority analyzer outputting a value corresponding to a majority of the test response value by analyzing the test response value; and a determination unit determining a core outputting a test response value different from the value corresponding to the majority among the plurality of cores. | 2014-07-24 |
20140208166 | HEALTH MONITORING OF APPLICATIONS IN A GUEST PARTITION - A health monitoring technique monitors the health and performance of applications executing in a guest partition in a virtualized environment. In an embodiment, a guest integration component interacts with an application through an application programming interface in order for the virtualization platform to monitor the health and performance of the application. In another embodiment, the guest integration component may include a monitoring agent that accesses an event log and/or a performance monitor log to access the health and performance of the application. The health and performance of the application may then be analyzed by the virtualization platform to determine an appropriate remedial action. | 2014-07-24 |
20140208167 | METHOD AND SYSTEM FOR SINGLE POINT OF FAILURE ANALYSIS AND REMEDIATION - Embodiments of the present invention disclose a method and system for single point of failure analysis (SPOF) and remediation. According to one embodiment, a SPOF analysis is performed based on component configuration information associated with a plurality of system components. Based on the SPOF analysis, at least one SPOF component is identified. In addition, remediation information for the identified SPOF is computed based on the component configuration information. The result of the SPOF analysis and the remediation information are then displayed to an operating user. | 2014-07-24 |
20140208168 | Database System and Control Method Therefor - In an open environment, a consensus building means for maintaining dependability throughout the entire life cycle of a target system between stakeholders is provided, thereby appropriately operating the target system in accordance with the content of an agreement between the stakeholders. | 2014-07-24 |
20140208169 | DOMAIN SCRIPTING LANGUAGE FRAMEWORK FOR SERVICE AND SYSTEM INTEGRATION - Systems and methods are disclosed herein to a computer-implemented method of executing an enterprise application comprising: receiving, by a computer, an external request for a service provided by a runtime engine of the enterprise application; selecting, by a computer, a script from a plurality of scripts saved on a database based on the external request; referencing, by the computer, one or more tags stored in a tag library saved on the database that are called by the script, wherein the tags in the tag library define commands of the plurality of scripts and call one or more granular services of the enterprise application; loading, by a computer, the selected script and the tags referenced by the selected script; and executing, by a computer, instructions of the script to provide the service requested by the external request, wherein the selected script is updated in the database after executing instructions of the script. | 2014-07-24 |
20140208170 | METHOD FOR MONITORING A GRAPHICAL USER INTERFACE ON A SECOND COMPUTER DISPLAY FROM A FIRST COMPUTER - A high level interface between a remote computer and local computer operator permits the remote computer to be controlled via a sequence of interactions. The remote computer may be monitored for display information which is expected, and also controlled in the event the expected information either is or is not obtained. Command language extensions are provided which extend and complement a basic scripting language. Scripts with embedded command language extensions may be executed through a remote interface, permitting remote testing, operation and evaluation. The development of the scripts, including embedded command language extensions, may be prepared through execution of commands at the local computer on a depiction of the GUI received from the remote computer, and subsequently saved as a script. | 2014-07-24 |
20140208171 | MONITORING AND CAPTURING EARLY DIAGNOSTIC DATA - A deviance monitoring module is provided for examining various parameters of an operating system for deviance from a baseline behavior at specified intervals. A range of acceptable deviance values from a baseline behavior is set for parameters of an operating system. The parameters of the operating system are then monitored at specified intervals for deviance from the baseline behavior. In response to detecting that the deviance exceeds a predetermined threshold, the method triggers diagnostic data gathering on the parameters of the operating system according to an embodiment. | 2014-07-24 |
20140208172 | Monitoring of Computer Events - A data processing system ( | 2014-07-24 |
20140208173 | COMMON LEASE AGENT FOR CLUSTER COMMUNICATION - Detecting failures of interconnected machines. A method includes establishing a machine to machine lease at a first machine using a first lease agent at the first machine to a second lease agent at a second machine as a result of an application on the first machine requesting to establish a lease with an application on the second machine. Using the machine to machine lease, the method further includes detecting a communication failure between the first machine and the second machine or a machine failure of the second machine. | 2014-07-24 |
20140208174 | STORAGE CONTROL SYSTEM WITH DATA MANAGEMENT MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a storage control system includes: determining a bit error rate of a page; calculating a slope based on the bit error rate; and adjusting a threshold voltage for the page based on the slope for reading a memory device. | 2014-07-24 |
20140208175 | AT-SPEED SCAN TESTING OF CLOCK DIVIDER LOGIC IN A CLOCK MODULE OF AN INTEGRATED CIRCUIT - An integrated circuit comprises scan test circuitry and additional circuitry subject to testing utilizing the scan test circuitry. The scan test circuitry comprises a scan chain having a plurality of scan cells. The integrated circuit further comprises a clock distribution network configured to provide clock signals to respective portions of the integrated circuit. The clock distribution network comprises at least one clock module comprising one or more clock dividers and associated clock divider logic, and the scan test circuitry is configured to permit testing of at least a portion of the clock divider logic. A given scan chain of the scan test circuitry may comprise first and second scan cells, with the first scan cell having a scan output coupled to a scan input of the second scan cell, and the second scan cell having a data input driven by an output of the clock divider logic. | 2014-07-24 |
20140208176 | SCAN CHAIN IN AN INTEGRATED CIRCUIT - In an embodiment, a scannable storage element includes an input circuit for providing a first signal at first node based on a data input and a scan input, where the scan input is of pull-up logic in functional mode. The input circuit includes a first pull-up path comprising a switch receiving data input and a switch receiving scan enable input, and second pull-up path comprising a switch receiving scan input, first pull-down path comprising a switch receiving the scan enable input and a switch receiving the scan input, and second pull-down path comprising a switch receiving the data input. The storage element includes a shifting circuit configured to provide a second signal in response to the first signal at second node, and a scan output buffer coupled to the second node and configured to provide a scan output at a scan output terminal in response to the second signal. | 2014-07-24 |
20140208177 | CIRCUITS AND METHODS FOR DYNAMIC ALLOCATION OF SCAN TEST RESOURCES - A method of testing devices under test (DUTs) and testing system are disclosed. The method comprises generating at least one control signal associated with a test pattern structure received from a testing system. The method further comprises selecting M1 number of ports from M number of I/O ports in the DUT to receive scan input corresponding to the test pattern structure based on the control signal, selecting M2 number of ports from the M number of I/O ports to provide scan output based on the control signal, wherein each of M1 and M2 is a number selected from 0 to M, and wherein a sum of M1 and M2 is less than or equal to M. Thereafter, the method comprises performing a scan testing of the DUT based on the scan input provided to the M1 number of ports and receiving the scan output from the M2 number of ports. | 2014-07-24 |
20140208178 | Circuit and Method for Measuring Delays between Edges of Signals of a Circuit - Various aspects of the present invention relate to techniques of measuring delays between edges of signals of a circuit. Alternating signals, synchronous to a first clock, are supplied to a plurality of nodes of the circuit. First samples of a plurality of signals associated with the alternating signals are captured using a first capture clock, of which sampling instants are synchronous to a second clock. Second samples of the first samples are then captured using a second capture clock, of which sampling instants are also synchronous to the second clock. The captured second samples are conveyed via a shift register to a plurality of modulo counters. The measured signal delay includes a timing skew associated with the first clock and a timing skew of the first capture clock but not a timing skew of the second capture clock. | 2014-07-24 |
20140208179 | METHODS AND DEVICES FOR FACILITATING DATA RETRANSMISSIONS IN WIRELESS COMMUNICATION SYSTEMS - Wireless communications devices are adapted to perform retransmissions of data blocks. A wireless communications device can be adapted to transmit a plurality of data blocks to a receiving device. When the plurality of data blocks are transmitted, the wireless communications device can initiate a block timer associated with a round trip time for communications between the wireless communications device and the receiving device. When, prior to expiration of the block timer, a transmission is received with an indication that at least one data block was not successfully received, the wireless communications device can retransmit the unsuccessful data block. On retransmission, the block timer is restarted. If another transmission is received prior to expiration of the restarted block timer, the wireless communications device can ignore any indication of unsuccessful receipt associated with the retransmitted data block. Other aspects, embodiments, and features are also claimed and described. | 2014-07-24 |
20140208180 | Systems and Methods for Reusing a Layered Decoder to Yield a Non-Layered Result - The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for performing data decoding. | 2014-07-24 |
20140208181 | ZERO SUM SIGNALING IN A DIGITAL SYSTEM ENVIRONMENT - Zero sum signaling schemes utilize coding across data words to allow the use of single-ended buffers while mitigating simultaneous switching noise (SSN) in digital systems. Zero sum signaling may include balanced zero sum coding (target disparity=0) and nearly balanced zero sum coding (target disparity=±d). Zero sum signaling may reduce simultaneous switching noise as compared to single-ended signaling while allowing a reduction in the number of physical channels (e.g. circuit board traces) by nearly a factor of two as compared to differential signaling. | 2014-07-24 |
20140208182 | CONTROLLER, INFORMATION PROCESSING SYSTEM, METHOD OF CONTROLLING CONTROLLER, AND PROGRAM - A controller includes: a low-level error correction section configured to execute low-level error correction in which an error in a code word is corrected with use of a predetermined decoding algorithm; and a high-level soft-decision error correction section configured to execute high-level soft-decision error correction in which the error in the code word is corrected with use of a high-level algorithm when the error correction by the low-level error correction section has failed, the high-level algorithm being a soft-decision decoding algorithm having higher error correction capability than error correction capability of the predetermined decoding algorithm. | 2014-07-24 |
20140208183 | METHOD AND SYSTEM FOR ENCODING AND DECODING DATA USING CONCATENATED POLAR CODES - A concatenated encoder is provided that includes an outer encoder, a symbol interleaver and a polar inner encoder. The outer encoder is configured to encode a data stream using an outer code to generate outer codewords. The symbol interleaver is configured to interleave symbols of the outer codewords and generate a binary stream. The polar inner encoder is configured to encode the binary stream using a polar inner code to generate an encoded stream. A concatenated decoder is provided that includes a polar inner decoder, a symbol de-interleaver and an outer decoder. The polar inner decoder is configured to decode an encoded stream using a polar inner code to generate a binary stream. The symbol de-interleaver is configured to de-interleave symbols in the binary stream to generate outer codewords. The outer decoder is configured to decode the outer codewords using an outer code to generate a decoded stream. | 2014-07-24 |
20140208184 | ERROR PROTECTION FOR INTEGRATED CIRCUITS - A method for providing error detection and/or correction to an array of storage cells includes determining a sensitive direction and an insensitive direction of the storage cells and adding a first error control mechanism to the array of storage cells in the insensitive direction. The method also includes adding a second error control mechanism to the array of storage cells in the sensitive direction. The second error control mechanism has a higher Hamming distance than the first error control mechanism. | 2014-07-24 |
20140208185 | RATE ADAPTIVE IRREGULAR QC-LDPC CODES FROM PAIRWISE BALANCED DESIGNS FOR ULTRA-HIGH-SPEED OPTICAL TRANSPORTS - Systems and methods for data transport include encoding one or more streams of input data using one or more Quasi-Cyclic Low Density Parity Check (QC-LDPC) encoders; controlling irregularity of the QC-LDPC encoded data while preserving the quasi-cyclic nature of the LDPC encoded data and eliminating the error floor phenomenon. A parity-check matrix may be partially reconfigured to adapt one or more code rates; and one or more signals are generated using a mapper, wherein the output of the mapper is modulated onto a transmission medium. One or more streams of input data are received, and the streams are decoded using one or more QC-LDPC decoders. | 2014-07-24 |
20140208186 | DEVICE FOR ENCODING AND DECODING USING SMALLER BLOCK OF SYMBOLS - A method of encoding user data into codevectors of an error correcting code, includes generating a first block of data symbols including user data symbols and dummy data symbols; encoding the first block using an ECC encoder to obtain a codeword comprising the first block of data symbols and a second block of parity symbols; and generating a codevector by selecting a user data portion of the user data symbols from the first block and a parity portion of the parity symbols from the second block. The sum of a number of the user data portion and a number of the parity portion is smaller than the sum of a number of the user data symbols and a number of the parity symbols of the second block. | 2014-07-24 |
20140208187 | SEMICONDUCTOR APPARATUS AND METHOD OF OPERATING THE SAME - A semiconductor apparatus includes a memory device configured to include a buffer memory block and a main memory block, and to correct data read from the buffer memory block based on error information, and to perform a program loop to store corrected data in the main memory block, and a memory controller configured to perform an error checking and correction (ECC) operation on the data and to output the error information obtained through the ECC operation to the memory device. | 2014-07-24 |
20140208188 | Variable Code Rate Transmission - An integrated circuit device includes an output buffer circuit that provides a first output having a first code rate. The first output is provided in response to a first indication of a change in a parameter that affects an error rate of the first output. The first output includes redundant information. The output buffer circuit provides a second output having a second code rate. The second output is provided in response to a second indication of the second output having an error rate that is different than the error rate of the first output. The second code rate of the second output is different than the first code rate. | 2014-07-24 |
20140208189 | DETERMINING SOFT DATA USING A CLASSIFICATION CODE - Apparatuses and methods for determining soft data using a classification code are provided. One example apparatus can include a classification code (CC) decoder and an outer code decoder coupled to the CC decoder. The CC decoder is configured to receive a CC codeword. The CC codeword includes a piece of an outer code codeword and corresponding CC parity digits. The CC decoder is configured to determine soft data associated with the piece of the outer code codeword, at least partially, using the corresponding CC digits. | 2014-07-24 |
20140208190 | METHOD FOR PROCESSING TRANSMISSION ERRORS, IN PARTICULAR NOISE, DURING A CONTACTLESS COMMUNICATION BETWEEN A CARD AND A READER - A method is for processing transmission errors during contactless communication of information between a device and a reader. The information may be transmitted in the form of frames sent to a send/receive module of the reader in contactless coupling with the device and controlled by a control module coupled to the send/receive module. The information may be extracted from the frames within the send/receive module so as to be delivered to the control module. The method may include a detection of transmission errors that are to be ignored. | 2014-07-24 |