Patent application number | Description | Published |
20100070680 | MEMORY MANAGEMENT METHOD DURING POWER-ON SELF TEST - A memory management method during a power-on self test is used to perform an access management on an option ROM during a power-on self test after a personal computer is powered on. The memory management method includes the following steps. When a BIOS is booted, an option ROM is detected. A memory segment is designated in a conventional memory. It is determined whether the memory segment is empty or not. If the memory segment is not empty, a register segment with the same capacity as the memory segment is applied for from an extended memory, and data in the memory segment is moved to the register segment for being stored. If the memory segment is empty, data in the option ROM is moved to the memory segment. The option ROM in the memory segment is set. | 03-18-2010 |
20120011402 | METHOD FOR TESTING SERVER SUPPORTING INTELLIGENT PLATFORM MANAGEMENT INTERFACE - A testing method for a server supporting an intelligent platform management interface (IPMI) is applied to test a server before an operating system (OS) of the server operates. The test method includes the following steps. A baseboard management controller (BMC) of the server is activated. The server is activated, and a monitoring module is operated. Real-time status data of the server stored in the BMC of the server is obtained. The monitoring module executes a pre-test procedure according to the real-time status data of the server before the OS operates. A test result of the pre-test procedure is stored. | 01-12-2012 |
20120133374 | METHOD FOR DETECTING CAPACITOR LOSS - A method for detecting a capacitor loss is applicable to detecting a plurality of by-pass capacitors connected in parallel to each other. The detection method includes the following steps, an alternating current (AC) signal is input into the by-pass capacitors, in which the AC signal has a plurality of test frequencies; test voltages of the by-pass capacitors at each of the test frequencies are recorded, so as to form a test result table; it is determined whether the test result table is the same as a standard voltage table; and when a result of the determination is NO, a fail signal is output. By applying the detection method, whether a loss exists in the by-pass capacitors can be effectively identified, thereby solving the problem that small capacitors are undetectable when large capacitors are connected in parallel to the small capacitors. | 05-31-2012 |
20120136842 | PARTITIONING METHOD OF DATA BLOCKS - A partitioning method of data blocks is applied to a data de-duplication process. The method includes the following steps. A file structural tank partitioning program and a data block partitioning process are performed on an input file. A fingerprint feature value of a generated data block is compared with fingerprint feature values recorded in completed file structural tanks. If a duplicate fingerprint feature value exists in another file structural tank, it is determined whether the duplicate data block is a first data block of the existing file structural tank. If the data block is the same as the first data block of the existing file structural tank, it is further determined whether the structural tank feature values of the file structural tanks of the two data blocks are the same; and if yes, the data block to be compared is deleted. | 05-31-2012 |
20120136958 | METHOD FOR ANALYZING PROTOCOL DATA UNIT OF INTERNET SMALL COMPUTER SYSTEMS INTERFACE - A method for analyzing a Protocol Data Unit (PDU) of an internet Small Computer Systems Interface (iSCSI) is used for processing a data write request of the iSCSI. The method includes sending the data write request to a target; the target generating a Ready to Transfer (R2T) PDU according to the data write request, and transferring the R2T PDU to an initiator; the initiator generating multiple groups of Data Out PDUs, and writing a scatter/gather block in a target transfer tag of each Data Out PDU; the target finding the corresponding scatter/gather block according to the target transfer tag, and obtaining a host buffer from the scatter/gather block; the target executing a Direct Memory Access command, so as to directly write a payload content received by the target in the host buffer; and after the target completes the write request, the target sending out an RSP PDU to the initiator. | 05-31-2012 |
20120136969 | MULTI-CAST DOWNLOAD METHOD FOR IMAGE FILE - A multi-cast download method for downloading an image file is applicable to downloading the image file from an image file server to a computer. The multi-cast download method includes the steps of establishing a wire network connection and a wireless network connection in the computer, in which the wire network connection connects the computer and the image file server; and simultaneously performing a retransmitted packet receiving process and the following steps. The image file is downloaded from the image file server to the computer in a multicast manner by using the wire network connection. When a lost packet is detected, a packet retransmitting request corresponding to the lost packet is sent by using the wireless network connection and Transmission Control Protocol (TIC). | 05-31-2012 |
20120137027 | SYSTEM AND METHOD FOR MONITORING INPUT/OUTPUT PORT STATUS OF PERIPHERAL DEVICES - A system and method for monitoring an input/output port status of peripheral devices are used for monitoring an operating status of each peripheral device of a main board. The system includes at least one peripheral device, a complex programmable logic device (CPLD), and an output apparatus. The CPLD is electrically connected to the peripheral devices. The CPLD further includes a protocol conversion unit and multiple data registers. The protocol conversion unit converts an operating status of the CPLD or the peripheral devices into device status information. The data register is used for storing the device status information. The output apparatus is electrically connected to the CPLD. The output apparatus is used for displaying the device status information in the data register. A user can observe the operating status of each of the peripheral devices of the main board conveniently. | 05-31-2012 |
20120137159 | MONITORING SYSTEM AND METHOD OF POWER SEQUENCE SIGNAL - A monitoring system and method of the power sequence signals are presented, so as to monitor a power sequence signals transmitted via the peripheral devices of a motherboard in operation process. The monitoring system includes a power supply unit and a Complex Programmable Logic Device (CPLD). The monitoring method includes activating the motherboard, and driving the CPLD to select any one of the peripheral devices in sequence being electrified; controlling, by the CPLD, operation powers of the peripheral devices through a General Purpose Input/Output (GPIO) pin, and recording the power sequence signals of the peripheral devices under different operation powers in a data register; and outputting, by the CPLD, the power sequence signals of the peripheral devices. | 05-31-2012 |
20120137179 | PROCESSING SYSTEM FOR MONITORING POWER-ON SELF-TEST INFORMATION - A processing system for monitoring the power-on self-test information is used for monitoring an operating state of a complex programmable logic device (CPLD) of a main board. The processing system includes a basic input/output system (BIOS) device, a CPLD and a monitoring device. The BIOS device sends power-on self-test information at a first frequency. The CPLD is electrically connected to the BIOS device. The CPLD further includes a first in first out (FIFO) register, and the FIFO register is used for storing the received power-on self-test information. The CPLD sends the power-on self-test information stored in the FIFO register at a second frequency. The monitoring device is electrically connected to the CPLD. The monitoring device is used for receiving the power-on self-test information sent from the CPLD. | 05-31-2012 |
20120137284 | METHOD FOR INSTALLING IMAGE FILE - An installing method for an image file is capable of more effectively installing the image file in a computer. The installing method includes the following steps that a wire network connection between the computer and an image file server is made; the image file is downloaded from the image file server to the computer by using the wire network connection; the wire network connection is closed, and the image file is decompressed and installed to the computer; a wireless network connection between the computer and the image file server is made; and an installation result and an install log of the computer are returned by using the wireless network connection. | 05-31-2012 |
20120147781 | METHOD FOR CONTROLLING TRANSMISSION SPEED OF MULTI-CAST PACKETS - A transmission speed controlling method for multi-cast packets includes the steps of calculating a standard time, and recording an accumulated error time; transmitting one of the multi-cast packets, and calculating a transmission time of the transmitted multi-cast packet; calculating a difference between the standard time and the transmission time, recording the difference as a current error time, adding the accumulated error time and the current error time, and recording the add result as a preset sleep time; and performing the following steps when the preset sleep time is greater than an error threshold value, wherein the following steps are sleeping for the preset sleep time; being awaked from sleep, and calculating a practical sleep time; calculating a new accumulated error time by subtracting the practical sleep time from the preset sleep time; and returning to the first step to transmit the next one of the multi-cast packets. | 06-14-2012 |
20120147886 | METHOD FOR RECEIVING MULTI-CAST PACKET - A receiving method for multi-cast packets includes the steps of creating a plurality of buffer partitions in a memory; for writing the received multi-cast packets that belong to a same data block into the same buffer partition in sequence; decompressing and combining all the multi-cast packets in the completely received buffer partition into the data block that the multi-cast packets belong to, writing the combined data block into a storage device, and emptying the completely received buffer partition, when the multi-cast packets that belong to the data block in any buffer partition are received completely; and transmitting a retransmission request to a transmitting end for any buffer partition that is not empty and in which the multi-cast packets that belong to the data block are not received completely. | 06-14-2012 |
20120150824 | Processing System of Data De-Duplication - A processing system of data de-duplication includes a client and a server. A characteristic value of each data block is compared with characteristic values stored in the client. If the same characteristic value exists in the client, the data block corresponding to the compared characteristic value is deleted. A server data management module is connected to a client data management module through a network. If the characteristic value does not exist in the server, a corresponding data block is obtained from the client, and the new data block and the characteristic value are stored in the server. A file management module records a storage address of the data blocks in the server into an index file. In this way, the server is not required to perform all data de-duplication processes of the clients, thus reducing the occupation of bandwidth and improving the processing efficiency of the server. | 06-14-2012 |
20120150869 | METHOD FOR CREATING A INDEX OF THE DATA BLOCKS - An method for creating a index of the data blocks is applicable in data de-duplication procedure, includes loading an index file, the index file includes a plurality of location blocks, each location block includes a plurality of storage fields, and each storage field records a primary Hash value corresponding to the data block; performing a first Hash procedure on a primary Hash value of the data block and calculating a block number; performing a second Hash procedure on the primary Hash value in the same data block and calculating a field number; loading a location conflict list; comparing the field number with the field number in the location conflict list to search whether the same field number is stored in the location conflict list; writing the primary Hash value into the corresponding block number and the field number if the field number does not exist in the location conflict list. | 06-14-2012 |
20120151005 | IMAGE FILE DOWNLOAD METHOD - A download method for image file includes the steps of reading a header of an image file from an image file server; reading a start data block in a plurality of disk data blocks of a target disk; when the start data block has progress information, obtaining a current data block according to the progress information; downloading an image file data block corresponding to the current data block from the plurality of image file data blocks of the image file to the current data block; updating the progress information; when the current data block completing download is an end data block of the target disk, downloading an image file data block corresponding to the start data block to the start data block, and updating partition table information of the target disk; and repeating the above steps till all the image file data blocks are downloaded to the disk data blocks. | 06-14-2012 |
20120151054 | LOAD BALANCING METHOD FOR CLUSTER SYSTEM - A load balancing method for a cluster system is presented. A load record is firstly established in each server, and the load record has an access connection number of each server. An access channel is then established, and one of the servers is specified as a first server. The first server determines whether the first server specified by the access channel needs to be changed according to the load records. When it is determined that the first server needs to be changed, another server is specified as a second server according to a configuration strategy. The first server sends a reply signal to a user terminal, and the user terminal establishes an access connection with the second server according to the reply signal. Finally, the load records of all the servers are synchronously updated so that all the servers in the cluster system know load conditions of other servers. | 06-14-2012 |
20120303595 | DATA RESTORATION METHOD FOR DATA DE-DUPLICATION - A data restoration method for data de-duplication uses to restore partial data of a target file of a client, includes the client queries a file attribute of a source file corresponding to the target file from a storage server; the client compares whether the file attribute of the target file is the same as the file attribute of the source file; if the file attributes of the target file and the source file are different, segmentation processing is performed on the target file to generate segmentation data blocks and corresponding fingerprints; after obtaining all the fingerprints of the source file from the storage server, the client compares a difference between the fingerprints of the source file and the target file; the client obtains corresponding segmentation data blocks from the storage server according to the different fingerprints and overwrites the obtained segmentation data blocks to corresponding positions in the target file. | 11-29-2012 |
20120303761 | BREAKPOINT CONTINUOUS TRANSMISSION METHOD - A method for breakpoint continuous transmission is applicable to the case that a server may continuously transmit data of which the transmission is not completed directly from a breakpoint when interruption of data transmission occurs, and may find out modified data during system interruption, thereby maintaining data consistency at entire data transmission time points. First, the server receives a data element to be transmitted and a first snapshot corresponding to the data element to be transmitted that are transmitted by a client. When detecting an interruption signal, the server determines whether the first snapshot of the client is complete. If the first snapshot of the client is not complete, the server first determines whether metadata of the data element to be transmitted of the client is changed, and if the metadata is changed, the server first finishes receiving the changed metadata, and then continues the transmission. | 11-29-2012 |
20120310936 | METHOD FOR PROCESSING DUPLICATED DATA - A processing method for duplicated data includes the following steps. A stored file is partitioned into a plurality of raw tanks and a plurality of meta tanks, in which the raw tanks correspond to the meta tanks in a one to one manner, and each meta tank has a stored fingerprint value of the corresponding raw tank. A duplicated data determination request is received, in which the duplicated data determination request includes a requested fingerprint value. At least one of the meta tanks is read, and the requested fingerprint value is compared with the stored fingerprint value of the read meta tank. A referred counter value of the read meta tank is modified, and the modified meta tank is stored back, when the requested fingerprint value is the same as the stored fingerprint value of the read meta tank. | 12-06-2012 |
20120310974 | METHOD FOR PROCESSING DUPLICATED DATA - A processing method for duplicated data includes the following steps. A query request is received from a client, in which the query request includes a requested fingerprint value. A hash tank corresponding to the requested fingerprint value in a memory is searched for the requested fingerprint value. When the requested fingerprint value does not exist in the hash tank corresponding to the requested fingerprint value, the following steps are executed. An addition table in the memory is searched for the requested fingerprint value; and when the requested fingerprint value exists in the addition table, an invalid duplicate message is sent to the client. | 12-06-2012 |
20120311021 | PROCESSING METHOD OF TRANSACTION-BASED SYSTEM - A method of a transaction-based system is applicable to a data deduplication system. In the system, pointers of same data point to a same position, so that when one piece of data is changed, all associated pointers need to be changed. In this method, a server first sets a flag to a false value, and after the server receives a request for backing up a data element from a client, the server reads a fingerprinting of the data element and determines whether the fingerprinting is the same as a temporary fingerprinting in a meta cache of the client, writes the data element and the fingerprinting into a corresponding temporary storage data block when the fingerprinting is not the same as the temporary fingerprinting, and writes the data element and the fingerprinting into a main meta cache and resets the flag when the flag is a true value. | 12-06-2012 |
20120311327 | DATA CRYPTO METHOD FOR DATA DE-DUPLICATION AND SYSTEM THEREOF - A data crypto method for data de-duplication and a system thereof are described. The data crypto method includes the following steps. A client performs a data de-duplication procedure and generates a partitioned data block. Each client has a respective first key. The partitioned data block is enciphered by using the first key, and corresponding ciphertext data is generated. The ciphertext data is transported to a server. The server searches an crypto look-up table for the corresponding first key and restores the partitioned data block from the ciphertext data through the first key. The server generates stored data from the restored partitioned data block by using a second key. The server restores the partitioned data block from the stored data through the second key and enciphers the partitioned data block to be the ciphertext data according to the corresponding first key. The server transports the ciphertext data to the corresponding client. | 12-06-2012 |
20120323864 | DISTRIBUTED DE-DUPLICATION SYSTEM AND PROCESSING METHOD THEREOF - A distributed de-duplication system and a processing method thereof are described. A client runs a de-duplication procedure on an input file to generate a partitioned data block and a corresponding fingerprint eigenvalue. The client sends an inquiry request having the fingerprint eigenvalue to a dispatch server. The dispatch server records a storage location of the partitioned data block. The dispatch server forwards the inquiry request to the corresponding dedup. engine according to the fingerprint eigenvalue. The dedup. engine judges whether the fingerprint eigenvalue already exists. If the fingerprint eigenvalue does not exist, the dedup. engine stores a new partitioned data block to a storage server according to a new fingerprint eigenvalue. | 12-20-2012 |
20130132335 | UPDATING METHOD AND SYSTEM OF APPLICATION SYSTEM DATABASE THEREOF - An updating system comprises a registering module, for registering database updating requests required to be executed by an applicant of the application system during an application session, when a same data registered and updated previously is required during a same application session, the same data is acquired from a modified data in a recording module; a recording module, for recording the registered database updating requests and the modified data required for submitting to the database; a submitting module, for submitting the multiple database updating requests when the application session is completed; a merging module, for merging the database updating requests, when multiple times of updating are executed for different fields of a same data by the applicant in the application session, the database updating requests of the same data are merged into one database updating request; and an updating module, for starting database transaction and completing the database update. | 05-23-2013 |
20130132669 | METHOD FOR CONTROLLING THE SINGLE-AFFILIATION SERIAL ADVANCED TECHNOLOGY ATTACHMENT DRIVER OF ACTIVE-ACTIVE REDUNDANT ARRAY OF INDEPENDENT DISKS AND SYSTEM THEREOF - A method for controlling a single-affiliation serial advanced technology attachment (SATA) driver of an active-active redundant array of independent disks (RAID) and a system thereof are described. The method includes a first control device assembly traversing a local access path for determining whether the local access path is capable of being connected to an SATA device; if the local access path is damaged, the first control device assembly being connected to a second lock module; determining whether a first lock module or the second lock module obtains an access authority to the SATA device according to a time-sharing mechanism; and when the first lock module obtains the access authority, a first RAID controller being connected to the second control device assembly and accessing the SATA device by a remote access path lock module. | 05-23-2013 |