01st week of 2013 patent applcation highlights part 75 |
Patent application number | Title | Published |
20130007411 | Configurable Allocation of Hardware Resources - Disclosed are various embodiments of configurable allocation of hardware resources. In one embodiment, a processing device includes a configurable communication grid including a plurality of crossbars interconnected by intercommunication paths in a geometric configuration and a plurality of pipeline elements distributed within the configurable communication grid. Each crossbar is designed to direct communications received at an input to a selected output. Each pipeline element is communicatively coupled to an output of a first crossbar adjacent to the pipeline element and an input of a second crossbar adjacent to the pipeline element. In another embodiment, a process matrix includes a plurality of pipeline elements interconnected by a configurable communication grid. The configurable communication grid includes intercommunication paths connecting crossbars in a geometric configuration. The crossbars are configured to implement at least a portion of a hardware pipeline by directing communications between at least a portion of the pipeline elements. | 2013-01-03 |
20130007412 | UNIFIED, WORKLOAD-OPTIMIZED, ADAPTIVE RAS FOR HYBRID SYSTEMS - A method, system, and computer program product for maintaining reliability in a computer system. In an example embodiment, the method includes managing workloads on a first processor with a first processor architecture by an agent process executing on a second processor with a second processor architecture. The method proceeds by activating redundant computation on the second processor by the agent process. The method continues by performing a same computation from a workload of the workloads at least twice. Finally, the method includes comparing results of the same computation. In this embodiment the first processor is coupled the second processor by a network, and the first processor architecture and second processor architecture are different architectures. | 2013-01-03 |
20130007413 | System and Apparatus For Consolidated Dynamic Frequency/Voltage Control - Methods and apparatus for accomplishing dynamic frequency/voltage control between at least two processor cores in a multi-processor device or system include receiving busy, idle and wait, time and/or frequency information from a first processor core and receiving busy, idle, wait, time and/or frequency information from a second processor core. The received busy, idle, wait, time and/or frequency information may be correlated to identify patterns of interdependence. The correlated information may be used to determine dynamic frequency/voltage control settings for the first and second processor cores to provide a performance level that accommodates interdependent processes, threads and processor cores. The correlation of received busy, idle, wait, time and/or frequency information may involve generating a consolidated busy/idle pulse train that can then be used to set the frequency or voltage of each processor core independently. | 2013-01-03 |
20130007414 | MULTI-CORE PROCESSOR APPARATUS WITH FLEXIBLE COMMUNICATION INTERCONNECTION - A computing and communication chip architecture is provided wherein the interfaces of processor access to the memory chips are implemented as a high-speed packet switched serial interface as part of each chip. In one embodiment, the interface is accomplished through a gigabit Ethernet interface provided by protocol processor integrated as part of the chip. The protocol processor encapsulates the memory address and control information like Read, Write, number of successive bytes etc, as an Ethernet packet for communication among the processor and memory chips that are located on the same motherboard, or even on different circuit cards. In one embodiment, the communication over head of the Ethernet protocol is further reduced by using an enhanced Ethernet protocol with shortened data frames within a constrained neighborhood, and/or by utilizing a bit stream switch where direct connection paths can be established between elements that comprise the computing or communication architecture. | 2013-01-03 |
20130007415 | METHOD AND APPARATUS FOR SCHEDULING OF INSTRUCTIONS IN A MULTI-STRAND OUT-OF-ORDER PROCESSOR - In accordance with embodiments disclosed herein, there are provided methods, systems, and apparatuses for scheduling instructions in a multi-strand out-of-order processor. For example, an apparatus for scheduling instructions in a multi-strand out-of-order processor includes an out-of-order instruction fetch unit to retrieve a plurality of interdependent instructions for execution from a multi-strand representation of a sequential program listing; an instruction scheduling unit to schedule the execution of the plurality of interdependent instructions based at least in part on operand synchronization bits encoded within each of the plurality of interdependent instructions; and a plurality of execution units to execute at least a subset of the plurality of interdependent instructions in parallel. | 2013-01-03 |
20130007416 | METHOD AND APPARATUS FOR SHUFFLING DATA - Method, apparatus, and program means for shuffling data. The method of one embodiment comprises receiving a first operand having a set of L data elements and a second operand having a set of L control elements. For each control element, data from a first operand data element designated by the individual control element is shuffled to an associated resultant data element position if its flush to zero field is not set and a zero is placed into the associated resultant data element position if its flush to zero field is not set. | 2013-01-03 |
20130007417 | PROCESSOR TO EXECUTE SHIFT RIGHT MERGE INSTRUCTIONS - Method, apparatus, and program means for performing bitstream buffer manipulation with a SIMD merge instruction. The method of one embodiment comprises determining whether any unprocessed data bits for a partial variable length symbol exist in a first data block is made. A shift merge operation is performed to merge the unprocessed data bits from the first data block with a second data block. A merged data block is formed. A merged variable length symbol comprised of the unprocessed data bits and a plurality of data bits from the second data block is extracted from the merged data block. | 2013-01-03 |
20130007418 | FLUSH OPERATIONS IN A PROCESSOR - Methods and apparatuses are provided for flush operations in a processor. The apparatus comprises an out-of-order execution unit for processing instructions issued in-order from an instruction decoder for first and second threads and being configured to identify an errored instruction in a first thread. A retire unit includes a retire queue for receiving completed instructions from the out-of-order execution unit, the retire unit being configured retire older in-order first thread instructions until the errored instruction would be the next instruction to be retired, and then flushing the errored instruction and all later in-order first thread instructions from the retire queue. The method comprises determining that an errored instruction is being processed by an out-of-order execution unit of a processor and continuing to process to completion instructions earlier in-order from the errored instruction until the completion of the errored instruction. Following completion of the errored instruction, it is flushed along with all instructions later in-order than the errored instruction to recover the processor to a pre-error state. | 2013-01-03 |
20130007419 | COMPUTER IMPLEMENTED METHOD OF ELECTING K EXTREME ENTRIES FROM A LIST USING SEPARATE SECTION COMPARISONS - A computer implemented method selects K extreme elements of a list of N elements by partitioning each of the N elements into a plurality of sections. For each section from a most significant section to a least significant section the method selects a threshold selection determining at least K extreme entries from the list. This iteratively compares a corresponding section to a section threshold, counts a number of sections which are more extreme than the section threshold, increasing (or decreasing) the section threshold if the count is greater than K and decreasing the section threshold if the count is less than K. After finding the section threshold for the corresponding section the method forms a combined threshold by concatenation of said section thresholds in order from a most significant section to a least significant section, compares each of the N elements to the combined threshold, and selects at least K elements from the set of N elements more extreme than the combined threshold. | 2013-01-03 |
20130007420 | CHECKING THE INTEGRITY OF A PROGRAM EXECUTED BY AN ELECTRONIC CIRCUIT - A method for checking the integrity of a program executed by an electronic circuit and including at least one conditional jump, wherein: a first value is updated for any instruction which does not correspond to a jump instruction; a second value is updated with the first value for each conditional jump instruction; and the second value is compared with a third value, calculated according to the performed conditional jumps. | 2013-01-03 |
20130007421 | Methods and Apparatus for Efficient Complex Long Multiplication and Covariance Matrix Implementation - Efficient computation of complex long multiplication results and an efficient calculation of a covariance matrix are described. A parallel array VLIW digital signal processor is employed along with specialized complex long multiplication instructions and communication operations between the processing elements which are overlapped with computation to provide very high performance operation. Successive iterations of a loop of tightly packed VLIWs may be used allowing the complex multiplication pipeline hardware to be efficiently used. | 2013-01-03 |
20130007422 | PROCESSING VECTORS USING WRAPPING ADD AND SUBTRACT INSTRUCTIONS IN THE MACROSCALAR ARCHITECTURE - Embodiments of a system and a method in which a processor may execute instructions that cause the processor to receive an input vector and a control vector are disclosed. The executed instructions may also cause the processor to perform a sum or difference operation on another input vector dependent upon the input vector and the control vector. | 2013-01-03 |
20130007423 | PREDICTING OUT-OF-ORDER INSTRUCTION LEVEL PARALLELISM OF THREADS IN A MULTI-THREADED PROCESSOR - Systems and methods for predicting out-of-order instruction-level parallelism (ILP) of threads being executed in a multi-threaded processor and prioritizing scheduling thereof are described herein. One aspect provides for tracking completion of instructions using a global completion table having a head segment and a tail segment; storing prediction values for each instruction in a prediction table indexed via instruction identifiers associated with each instruction, a prediction value being configured to indicate an instruction is predicted to issue from one of: the head segment and the tail segment; and predicting threads with more instructions issuing from the tail segment have a higher degree of out-of-order instruction-level parallelism. Other embodiments and aspects are also described herein. | 2013-01-03 |
20130007424 | CASCADING INDIRECT BRANCH INSTRUCTIONS - Techniques are disclosed relating to improving misprediction rates of indirect branch instructions. In one embodiment, a computer system determines misprediction information for an indirect branch instruction included in a sequence of instructions. The misprediction information is indicative of a processor not correctly predicting an actual target address of the indirect branch instruction. In some embodiments, the misprediction information includes a misprediction rate for the target address). Based on the misprediction information, the computer system inserts before the indirect branch instruction a conditional branch instruction that specifies the target address. | 2013-01-03 |
20130007425 | PROCESSOR AND DATA PROCESSING METHOD INCORPORATING AN INSTRUCTION PIPELINE WITH CONDITIONAL BRANCH DIRECTION PREDICTION FOR FAST ACCESS TO BRANCH TARGET INSTRUCTIONS - Disclosed are a processor and a processing method incorporating an instruction pipeline with direction prediction (i.e., taken or not taken) for conditional branch instructions. In the embodiments, reading of a branch instruction history table (BHT) and a branch instruction target address cache (BTAC) for branch direction prediction occurs in parallel with the current instruction fetch in order to minimize delay in the next instruction fetch. Additionally, direction prediction is performed in the very next clock cycle based either on an initial direction prediction for the specific instruction, as stored in the BHT, or, if applicable, on a prior entry for the specific instruction in the BTAC. An override bit associated with each entry in the BTAC is the determining factor for whether or the BTAC or BHT is controlling. Override bits in the BTAC can be pre-established based on the branch instruction type in order to ensure prediction accuracy. | 2013-01-03 |
20130007426 | RECOVERY OF DATA ACCESS FOR A LOCKED SECURE STORAGE DEVICE - A system for recovery of data access of a locked secure storage device can comprise a keystore module and an authorization module. The keystore module may be configured to allow access to a master file system comprising a user encryption key for data stored within the locked secure storage device based on a master code. The authorization module may be configured to receive the administrator code, authenticate the administrator code, decode the master code, and reset a lockout parameter of the locked secure storage device. | 2013-01-03 |
20130007427 | SELECTIVE KEY DISTINCTION AT SYSTEM STARTUP - A method of distinguishing at least one key of a key array. The method can include, via a processor, detecting initial startup of a processing system. The method further can include, during the initial startup, distinguishing at least a first key of the key array from other keys of the key array, wherein the first key is selectable to access a system startup menu or system function. | 2013-01-03 |
20130007428 | SYSTEM AND METHOD FOR CUSTOMIZED CONFIGURATION OF INFORMATION HANDLING SYSTEMS - In accordance with embodiments of the present disclosure, a method may include determining if personality information associated with an information handling resource of an information handling system is present on a personality module of the information handling system. The method may also include modifying the information handling resource or a second information handling resource to include the personality information in response to determining that the personality information associated with the information handling resource is present in the personality module. The method may further include executing the information handling resource or the second information handling resource as modified with the personality information. | 2013-01-03 |
20130007429 | INFORMATION PROCESSING APPARATUS AND OPERATION CONTROL METHOD - According to one embodiment, an information processing apparatus includes a storage device, a setup module, an operation control module, and a setup value control module. The storage device stores power-saving setup information including at least one setup item relating to an operation of the apparatus. The setup module sets up a value of the at least one setup item in accordance with a user operation. The setup value control module acquires first setup information including a first setup value corresponding to the at least one setup item, and applies a setup value with a higher power-saving effect, which is selected between the first setup value and a current setup value of the at least one setup item, to the at least one setup item. | 2013-01-03 |
20130007430 | SERVER AND FIRMWARE UPDATING METHOD - A server includes a Southbridge chipset, a USB port, a storage device, a baseboard management controller (BMC), and a switch. When the BMC is powered on and started, the BMC establishes communication between a USB device connected to the server and the BMC by uploading a driver of the USB device from the storage device to memory of the BMC. In response to receiving a firmware update command in relation to the BMC, the BMC disconnects an electrical connection between the USB port and the Southbridge chipset, and establishes an electrical connection between the USB port and the BMC using the switch. Then, the BMC reads updated firmware data from the USB device via the USB port, writes the updated firmware data into the memory, and updates the firmware of the BMC by writing the updated firmware data into the storage device. | 2013-01-03 |
20130007431 | INTEGRATED CIRCUIT DEVICE, SIGNAL PROCESSING SYSTEM, ELECTRONIC DEVICE AND METHOD THEREFOR - An integrated circuit device comprises a signal processing system having at least one first signal processing module fabricated by way of a first production process; and at least one second signal processing module fabricated by way of a second production process, wherein the second production process is different to the first production process. The signal processing system further comprises a signal processing management module arranged to: determine a desired system performance of the integrated circuit device; determine at least one operating condition of the signal processing system; and configure a signal processing operating mode of the signal processing system based at least partly on: the determined desired system performance; the at least one determined operating condition; and at least one of the first production process and the second production process. | 2013-01-03 |
20130007432 | Frequency and Symbol Locking Using Signal Generated Clock Frequency and Symbol Identification - Methods and systems are described for displaying video data after a hot plug event during a start-up dead period. In particular, approaches for receiving data, determining whether link training can be performed and, if not, self-configuring a receiver to display the information in a proper format even during the dead period. | 2013-01-03 |
20130007433 | SYSTEM AND METHOD FOR PROVIDING AN IMAGE TO AN INFORMATION HANDLING SYSTEM - A system and method for providing an image to an information handling system is disclosed. A method for delivering an image may include booting an information handling system with a provisioning operating system downloaded via a network into a memory of the information handling system. The method may also include calculating, by the second provisioning OS, a fingerprint of an image stored on the information handling system. The method may additionally include determining if the fingerprint matches a previously-calculated fingerprint of the image calculated prior to delivery of the information handling system to its intended destination. The method may further include enabling the information handling system to boot from a storage resource of the information handling system in response to a determination that the fingerprint matches the previously-calculated fingerprint. | 2013-01-03 |
20130007434 | LOCAL SECURITY KEY GENERATION - A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device. | 2013-01-03 |
20130007435 | SERVER MANAGEMENT WITH DYNAMIC CONSTRUCTION OF PRE-BOOT IMAGES - A request handler may receive an image capture request for an operating system (OS) executing on a server. A pre-boot image handler may generate a pre-boot image, based on the image capture request and on the executing operating system. An image handler may capture an image of the operating system, based on the pre-boot image. | 2013-01-03 |
20130007436 | INTERMEDIATION OF HYPERVISOR FILE SYSTEM AND STORAGE DEVICE MODELS - A communication model in which application(s) above a hypervisor use a file system having one data access model (e.g., a block-based file system) to access an underlying storage device having another data access model (e.g., an object-based file system). This is accomplished via an intermediary component that converts input/output requests and responses from the file system data access model into the underlying storage device data access model, and vice versa. As an example, virtual machines operating a block-based file system using a hypervisor may interface through the intermediary component with an object-based storage device. Thus, the prolific use and availability of block-based file systems may be used compatibly with highly efficient object-based storage devices. | 2013-01-03 |
20130007437 | COMPONENT UPDATE USING MANAGEMENT ENGINE - Embodiments of systems and methods for applying a component update using a management engine are disclosed. In some embodiments, the method may comprise storing a bootable image containing an update for a component of a computing device in a secured memory location and configuring the computing device to boot from the bootable image. Such configuration may include configuring the computing device for integrated device electronics redirection (IDE-R) to the bootable image. | 2013-01-03 |
20130007438 | STORAGE MEDIUM STORING MASTER BOOT RECORD, COMPUTER SYSTEM HAVING THE SAME AND BOOTING METHOD OF THE COMPUTER SYSTEM - A method and an apparatus for a storage medium implemented by at least one computer are provided. The storage medium includes a first sector to store a first master boot record including an execution code allowing the at least one computer to grasp command information and to implement a preset control according to the grasped command information, a first data storage region to store a first data file for booting, a second sector to store a second master boot record allowing the at least one computer to boot based on the first data file, a second data storage region to store a second data file for booting, and a third sector to store a third master boot record allowing the at least one computer to boot based on the second data file. | 2013-01-03 |
20130007439 | MULTICORE PROCESSOR SYSTEM, COMPUTER PRODUCT, AND NOTIFICATION METHOD - A multicore processor system includes a processor configured to detect, among cores that have booted with an old boot program in the multicore processor, a core to which no process is assigned; change upon detecting a core to which no process is assigned, a reference area from a storage area for the old boot program to a storage area for a new boot program; and notify the core to which no process is assigned of a reboot instruction specifying the reference area after the change. | 2013-01-03 |
20130007440 | METHOD AND APPARATUS FOR CONFIGURABLE THERMAL MANAGEMENT - Embodiments of an apparatus, system and method are described for configurable processor thermal management. An apparatus may comprise, for example, a processor arranged to operate in a plurality of thermal modes comprising a thermal limit down mode, a normal thermal limit mode and a thermal limit up mode, and thermal management logic operative to select a thermal mode based on one or more properties of the apparatus. Other embodiments are described and claimed. | 2013-01-03 |
20130007441 | Resource configuration change management - Prior to a first configuration change of a first resource, such as a network resource of a network, a processor determines a first performance metric of a second resource, such as a second network resource of the network. The first configuration change does not result in complete failure or fault of the second resource. Subsequent to the first configuration change of the first resource, the processor determines a second performance metric of the second resource and compares the second performance metric to at least one of the first performance metric and a service objective to yield comparison results. Based on the comparison results, the processor can cause a second configuration change of the first resource. The second configuration change of the first resource can revert a configuration of the first resource to its state prior to the first configuration change. | 2013-01-03 |
20130007442 | FACILITATING GROUP ACCESS CONTROL TO DATA OBJECTS IN PEER-TO-PEER OVERLAY NETWORKS - Methods and apparatuses are provided for facilitating group access controls in peer-to-peer or other similar overlay networks. A group administrator may create a group in the overlay network and may assign peer-specific certificates to each member of the group for indicating membership in the group. A group member peer node can access data objects in the overlay network using its respective peer-specific certificate to authenticate itself as a group member. The authentication is performed by another peer node in the network. The validating peer node can authenticate that the group member is the rightful possessor of the peer-specific certificate using a public key associated with the peer node to which the peer-specific certificate was issued. The validating peer node can also validate that the peer-specific certificate was properly issued to the group member using a public key of the apparatus that issued the peer-specific certificate. | 2013-01-03 |
20130007443 | SYSTEMS AND METHODS FOR IDENTIFYING CONSUMER ELECTRONIC PRODUCTS BASED ON A PRODUCT IDENTIFIER - Systems and methods for identifying consumer electronic products using a playback device with a product identifier in accordance with embodiments of the invention are disclosed. One embodiment includes a processor, and memory configured to store a product identifier, where the product identifier is associated with a specific product and is associated with cryptographic information, and user account data, where the user account data is associated with a user account. In addition, the processor is configured by an application to receive a request for registration from a playback device, receive a product identifier from the playback device, retrieve cryptographic information using the playback device, and send user account data to the playback device encrypted using at least the cryptographic information associated with the product identifier. | 2013-01-03 |
20130007444 | METHOD AND SYSTEM FOR THE SUPPLY OF DATA, TRANSACTIONS AND ELECTRONIC VOTING - A system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided. | 2013-01-03 |
20130007445 | SYSTEM AND METHOD FOR RETRIEVING CERTIFICATES ASSOCIATED WITH SENDERS OF DIGITALLY SIGNED MESSAGES - A system and method for retrieving certificates and/or verifying the revocation status of certificates. In one embodiment, when a user opens a digitally signed message, a certificate that is required to verify the digital signature on the message may be automatically retrieved if it is not stored on the user's computing device (e.g. a mobile device), eliminating the need for users to initiate the task manually. Verification of the digital signature may also be automatically performed by the application after the certificate is retrieved. Verification of the revocation status of a certificate may also be automatically performed if it is determined that the time that has elapsed since the status was last updated exceeds a pre-specified limit. | 2013-01-03 |
20130007446 | SYSTEM AND METHOD FOR PROCESSING CERTIFICATES LOCATED IN A CERTIFICATE SEARCH - A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device, without having to download those certificates to the computing device in their entirety. The data server is further adapted to transmit the status data to the computing device. In one embodiment, at least one status property of the certificates is verified at the data server in determining the status data. In another embodiment, additional certificate data is determined and transmitted to the computing device, which can be used by the computing device to verify, at the computing device, at least one other status property of the certificates. | 2013-01-03 |
20130007447 | PROVIDING CERTIFICATE MATCHING IN A SYSTEM AND METHOD FOR SEARCHING AND RETRIEVING CERTIFICATES - A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one broad aspect, certificate identification data that uniquely identifies a certificate associated with a message is generated. The certificate identification data can then be used to determine whether the certificate is stored on a computing device. Only the certificate identification data is needed to facilitate the determination alleviating the need for a user to download the entire message to the computing device in order to make the determination. | 2013-01-03 |
20130007448 | SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS - Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like. | 2013-01-03 |
20130007449 | Privacy Protected Interactions with Third Parties - Various embodiments are directed to computer-implemented methods and systems for a site to facilitate privacy protected interactions between users of a site and a third party utility. For example, a computer may receiving from a user selected from the users of the site, a request to interact with the third party utility. The computer may also encrypt an identification of the user to generate an encrypted user identification associated with the third party utility; and provide the encrypted user identification and the request to the third party utility. | 2013-01-03 |
20130007450 | SYSTEM, APPARATUS, AND METHOD FOR DIGITAL DISTRIBUTION - An apparatus for encrypting content to be played on another device is provided. The apparatus includes a processor and memory that includes a set of instructions. The set of instructions is configured to cause the processor to receive a selection of content from a user accessing the apparatus, and determine whether the user is authorized to receive the content. The set of instructions is further configured to cause the processor to transfer content along with an encrypted key associated with the user when the user is authorized to receive the selected content. | 2013-01-03 |
20130007451 | METHODS AND APPARATUSES FOR SECONDARY CONDITIONAL ACCESS SERVER - Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to provide services to secondary CA clients (e.g., a bridge, a renderer, a storage, or their different combinations) through network connections. Containing data representing the subscriber, a conditional access server recovers entitlement data and/or decryption keys of a primary security system for the conditional access protected content, such as service keys and control words, and/or enforces conditional access to the content by secondary CA clients according to the authorization of the primary security system for the secondary CA clients. In one embodiment, a conditional access system provides delayed authorization for use so that the content can be recorded for later use when authorized and broadcasts rights for use on multiple secondary CA clients. | 2013-01-03 |
20130007452 | METHOD AND SYSTEM FOR COMMAND AUTHENTICATION TO ACHIEVE A SECURE INTERFACE - Aspects of a method and system for command authentication to achieve a secure interface are provided. Command authentication between a host and a slave device in a multimedia system may be achieved by on-the-fly pairing or by an automatic one-time-programming via a security processor. In an on-the-fly pairing scheme, the host may generate a host key based on a host root key and host control words while the slave may generate slave key based the host key, a slave root key and slave control words. The slave key may be stored and later retrieved by the slave device to obtain the host key for authenticating host commands. The host may be disabled from generating and/or passing the host key to the slave. In an automatic one-time programming scheme, the security processor may burn a random number onto a onetime-programmable memory in the host and slave devices for command authentication. | 2013-01-03 |
20130007453 | Lattice scheme for establishing a secure multi-identity authentication context - This disclosure describes a secure and computationally-efficient method to establish a single authentication context for multiple identities. The method is implemented in an authentication system using a key exchange protocol, namely, the Diffie-Hellman key exchange. One or more entities that desire to authenticate (either individually or jointly) register with the authentication system and receive private Diffie-Hellman keys (the PINs). Later, during an authentication operation, each entity provides the PIN to the authentication system, preferably over a secure transport. The authentication system, using Diffie-Hellman key exchange artifacts, generates a Diffie-Hellman cryptographic value for each PIN, although the value need not be maintained private. The authentication system orders the Diffie-Hellman values as a “partially ordered set” to form a lattice. An authentication context is derived from the Diffie-Hellman values in the lattice. Thus, for example, during authentication of multiple entities, a shared key is computed incrementally as the Diffie-Hellman keys arrive from the entities for which a multi-identity authentication is required. The shared key represents a proof of group authentication. | 2013-01-03 |
20130007454 | SYSTEMS, DEVICES, AND METHODS FOR OUTPUTTING ALERTS TO INDICATE THE USE OF A WEAK HASH FUNCTION - Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak. | 2013-01-03 |
20130007455 | SYSTEM AND METHOD FOR ESTABLISHING PERPETUAL TRUST AMONG PLATFORM DOMAINS - A method may include generating a first shared secret for a present boot session of the information handling system and determining if a second shared secret existed for a prior boot session of the information handling system. If the second shared secret existed for the prior boot session, the method may include encrypting the first shared secret with the second shared secret and communicating the first shared secret encrypted by the second shared secret from a first information handling resource to a second information handling resource. If the second shared secret did not exist for the prior boot session, the method may include communicating the first shared secret unencrypted from the first information handling resource to the second information handling resource. The method may additionally include securely communicating between the first information handling resource and the second information handling resource using the first shared secret for encryption and decryption. | 2013-01-03 |
20130007456 | SYSTEM AND METHOD FOR EXCHANGING KEY GENERATION PARAMETERS FOR SECURE COMMUNICATIONS - A communication system exchanges key generation parameters for secure communications. An internet service and communications device of a user are in communication with each other. The internet service includes an account authentication mechanism for a user and includes a database having stored cryptographic keys and key generation parameters. A device client operates on the communications device and initiates a request to the internet service that authenticates the user and establishes a secure communications channel between the internet service and communications device and determine key generation parameters based on an authenticated user identifier and transmits the key generation parameters for initiating key generation and securely establishing a cryptographic key between the internet service and communications device. | 2013-01-03 |
20130007457 | EXCHANGE OF KEY MATERIAL - A communication network manages key material. A method generates and provides session keys from a security node to an access node for further propagation during handoff procedures, without requiring the security node to take part in the handoff procedures. | 2013-01-03 |
20130007458 | GREEN ENERGY GENERATION APPARATUS, MOBILE DEVICE, ELECTRIC STORAGE APPARATUS, AND MANAGEMENT METHOD OF GREEN ENERGY INFORMATION - A method is provided for authenticating characteristics of electrical energy. The method comprises acquiring a key, acquiring an amount of electrical energy, and generating a digital signature based on the amount and the key. The method further comprises generating a certificate comprising the signature and the amount. | 2013-01-03 |
20130007459 | SYSTEM AND METHOD FOR COMPRESSING SECURE E-MAIL FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device: the message is processed so as to modify the message with respect to encryption and/or authentication aspect. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a remote system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the remote system to one or more receivers. | 2013-01-03 |
20130007460 | METHOD AND SYSTEM FOR THE SUPPLY OF DATA, TRANSACTIONS AND ELECTRONIC VOTING - A method for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided. | 2013-01-03 |
20130007461 | NON-TRANSFERABLE ANONYMOUS DIGITAL RECEIPTS - A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent and received between a first party and a verifying party, the method comprising the steps of receiving a proof message from the first party, the proof message being derived from at least a first public key based on a secret owned by the first party and wherein the secret is associated with at least the secret of a further public key of the first party and an electronic receipt that has been issued by electronically signing a request message with a second public key, determining whether or not the proof message was derived from the second public key. | 2013-01-03 |
20130007462 | CIRCUMVENTION OF WATERMARK ANALYSIS IN A HOST CONTENT - Methods and devices are provided to thwart analysis of a watermarking system by preventing analysis of watermarks in a host content. Upon receiving a content at a watermark embedding device, the content is analyzed to ascertain whether one or more test features are present in at least a first portion of the received content. When the analysis reveals that one or more test features are present, embedding of watermarks in at least the first portion of the received content is disabled. The test features of interest include a temporal, a spatial and/or a frequency characteristic such that, if a region of the content that includes test feature is embedded with a watermark, at least one characteristic of the embedded watermark is detectable upon analysis of that region. The test feature can, for example, approximate an impulse signal, a step function signal or a pure sinusoidal signal. | 2013-01-03 |
20130007463 | COMMUNICATION CHANNEL ACCESS BASED ON CHANNEL IDENTIFIER AND USE POLICY - A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified. | 2013-01-03 |
20130007464 | Protocol for Controlling Access to Encryption Keys - A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover the plaintext of the encrypted data; and stores at least one encrypted key at a client system. To decrypt the data, the client must obtain a copy of the encrypted data from the server, and a key to decrypt its locally-stored encrypted key. Once decrypted, the locally-stored key can be used to decrypt the encrypted data, or to decrypt an encrypted key from the server, which may then be used decrypt the encrypted data. | 2013-01-03 |
20130007465 | Apparatus, Systems and Method for Virtual Desktop Access and Management - Systems and methods are provided for accessing and managing a virtual desktop. In some examples a desktop access manager may be provided to enable and communicatively link a virtual desktop key such that a user may access a linked desktop virtually over a second computing device. The systems and methods provide increased security when accessing a virtual desktop and enable customization of access to the virtual desktop. | 2013-01-03 |
20130007466 | PROTECTING KEYSTROKES RECEIVED FROM A KEYBOARD IN A PLATFORM CONTAINING EMBEDDED CONTROLLERS - Systems and methods of managing keystroke data in embedded keyboard environments may involve transferring a mode request from a management controller to an embedded controller of a keyboard via a dedicated communication channel. Keystroke activity can be detected at the keyboard, and keystroke data may be transferred from the embedded controller to the management controller via the dedicated communication channel in response to the keystroke activity and the mode request. In addition, the management controller may be used to encrypt the keystroke data, wherein the encrypted keystroke data can be transmitted from the management controller to an off-platform service via a network controller. | 2013-01-03 |
20130007467 | BINDING OF CRYPTOGRAPHIC CONTENT USING UNIQUE DEVICE CHARACTERISTICS WITH SERVER HEURISTICS - Systems and methods for binding of cryptographic content using unique device characteristics with server heuristics in accordance with embodiments of the invention are disclosed. One embodiment includes a processor and memory includes collecting a combination of device characteristics that uniquely identify the device using information stored on the device and accessible to the device using the device processor, generating device match data based upon the collected combination of device characteristics using the device processor, generating a device protection key using the device match data, encrypting the cryptographic data using the device protection key, and storing the encrypted cryptographic data in device memory using the device processor. | 2013-01-03 |
20130007468 | STORAGE DEVICE AND HOST DEVICE FOR PROTECTING CONTENT AND METHOD THEREOF - A storage device for protecting content, includes a Secure Area (SA) area in which a decryption key needed to decrypt encrypted content is stored, and access to which is available to a host device that has passed authentication using a secure authentication protocol. The storage device stores a security information file for mapping control information for controlling usage of the encrypted content and the decryption key to the encrypted content. | 2013-01-03 |
20130007469 | SECURELY MANAGING THE EXECUTION OF SCREEN RENDERING INSTRUCTIONS IN A HOST OPERATING SYSTEM AND VIRTUAL MACHINE - Provided are a computer readable storage medium, computer apparatus, and method for securely managing the execution of screen rendering instructions in a host operating system and virtual machine. A first rendering instruction hooking section is set to a first mode to hook a screen rendering instruction issued by a virtual machine application in a virtual machine. A second rendering instruction hooking section is set to a second mode to hook instructions issued by the virtual machine application. The hooked screen rendering instruction issued by the virtual machine application are encrypted in response to the setting of the first mode to produce illegible output. The hooked screen rendering instruction issued by the virtual machine application are encrypted in response to the setting of the second mode. The encrypted hooked screen rendering instruction encrypted in the second mode are issued to a host operating system to decrypt. | 2013-01-03 |
20130007470 | SECURE HOSTED EXECUTION ARCHITECTURE - In general, in one aspect, the invention relates to a method for executing applications. The method includes accessing a secure storage element via a host device including a computer processor; executing, by the computer processor, a hosted execution runtime environment (HERE) on the host device; identifying a persistent memory image of the HERE within the secure storage element; executing, by the computer processor, an application using the HERE; and applying, based on executing the application, a first set of changes to the persistent memory image. | 2013-01-03 |
20130007471 | SYSTEMS AND METHODS FOR SECURING CRYPTOGRAPHIC DATA USING TIMESTAMPS - Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment includes securely storing at least one timestamp in memory within a playback device in response to the occurrence of at least one predetermined event, where a stored timestamp is based on the current time of a system clock when an event occurs, generating a cryptographic key using the at least one timestamp, securing cryptographic data using the cryptographic key, receiving a request to playback encrypted content, where the encrypted content is accessible using the cryptographic data, accessing the at least one timestamp, generating the cryptographic key, accessing the cryptographic data using at least the cryptographic key, and playing back the content using the playback device. | 2013-01-03 |
20130007472 | ELECTRONIC DEVICE - An electronic device causing a removable storage medium to store data, the electronic device includes a removable storage medium, a storage medium interface connecting to the storage medium, and a control unit generating an encryption key at a predetermined time, encrypting data to be stored in the storage medium using the encryption key, storing encrypted data in the storage medium, and storing the encryption key in the storage medium in association with the encrypted data if it is detected that a removal operation of the storage medium has been made by a user. | 2013-01-03 |
20130007473 | Adaptive Power Management - Disclosed are various embodiments of adaptive management of a device. The adaptive management includes, e.g., power management, energy management, and diagnostics. In one embodiment, a device including a power management unit (PMU) communicatively coupled to a processor is configured to transmit a status notification to the processor in response to an interrupt signal; obtain a high level state command from the processor in response to the status notification, and modify power operation of the device in response to the high level state command. In another embodiment, a method for charging a power source includes obtaining, by a PMU of a device, operational characteristics of a power supply in communication with the device; determining a power supply type based at least in part upon the operational characteristics; and controlling charging of the power source based at least in part upon the power supply type. | 2013-01-03 |
20130007474 | PROVIDING POWER TO A COMMUNICATION DEVICE VIA A DEVICE SWITCH - Example embodiments disclosed herein relate to a device switch having a connection port and a communication port. The connection port is to receive data and power via a single network cable connection from a network switch. The communication port is to pass the power from the network cable connection at the connection port to a communication device. The communication device and a data device share a numeric interface of a keyboard. The communication port is to provide power to the communication device when the data device is not powered. | 2013-01-03 |
20130007475 | EFFICIENT FREQUENCY BOOST OPERATION - Systems and methods of operating a computing system may involve identifying a plurality of state values, wherein each state value corresponds to a computing thread associated with a processor. An average value can be determined for the plurality of state values, wherein a determination may be made as to whether to grant a frequency boost request based at least in part on the average value. | 2013-01-03 |
20130007476 | METHOD, APPARATUS AND SYSTEM FOR DETERMINING AN INTERFACE DURING A POWER STATE TRANSITION - Techniques for determining a communication interface of a computer platform. In an embodiment, a power management unit of a computer platform provides to an agent of the platform an indication of a power state. In certain embodiments, the agent determines, based on the indication of the power state, that an interface is expected to be available. The agent may designate information for transmission via the first interface—e.g. in lieu of transmitting the information via a second interface which is available prior to the first interface becoming available. | 2013-01-03 |
20130007477 | SERVER - A server includes an enclosure, a motherboard, a number of hard disk drives (HDDs), a number of built-in batteries, and a server power module. The motherboard includes a power management interface and a base management controller. When the server power module works normally, the server power module outputs a voltage to the motherboard to power the motherboard, and charge the built-in batteries. When the server power module cannot work normally, the built-in batteries output voltages to the motherboard to keep the motherboard working, while the base management controller stores data of the server to the HDDs and powers off the motherboard. | 2013-01-03 |
20130007478 | TESTING SYSTEM FOR BACKUP BATTERY MODULE OF STORING SYSTEM - A storing system is connected between an external power supply module and a server. The server is connected to external power supply module. The server switches off the external power supply module with the power source when the measured batch file is wholly transmitted to the first storing module. The backup battery module supplies power to the first storing module. The server compares the files stored in the permanent storing module with the measured batch file to determine whether or not the backup battery module is in working order. | 2013-01-03 |
20130007479 | Packetized Power - Methods, systems, and devices are disclosed for producing and delivering packetized power within a DC computing environment. Within the DC computing environment a power requirement or request is communicated to a power router. The power router then determines a power source capable of fulfilling the power requirement and then causes the power to be delivered in packetized form. The packetized power is appended to a message header which allows the power packet to be received by the requesting device. | 2013-01-03 |
20130007480 | NEGOTIATING A TRANSMIT WAKE TIME - Includes receiving, from a link partner, a message specifying a link partner receive wake time and resolving to the lesser of the received link partner receive wake time and a local transmit wake time. | 2013-01-03 |
20130007481 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 2013-01-03 |
20130007482 | MODE CHANGING POWER CONTROL - An apparatus and method of determining a communications mode. An operating condition of a device is monitored to determine if the operating condition satisfies a condition for loss of charging of a power pack of the device. Examples of operating conditions that satisfy a condition for loss of charging of a power pack of the device include determining that a power pack temperature of the power pack exceeds a power reduction temperature threshold and determining that a net electrical current drawn from the power pack exceeds a net charging electrical current delivered to the power pack. In response to determining that an operating condition of a device satisfies a condition for loss of charging of a power pack of the device, a wireless communications mode of the device is switched from a first mode to a second mode, where the second mode consumes less energy than the first mode. | 2013-01-03 |
20130007483 | METHOD AND APPARATUS TO REDUCE IDLE LINK POWER IN A PLATFORM - A method and apparatus to reduce the idle link power in a platform. In one embodiment of the invention, the host and its coupled endpoint(s) in the platform each has a low power idle link state that allows disabling of the high speed link circuitry in both the host and its coupled endpoint(s). This allows the platform to reduce its idle power as both the host and its coupled endpoint(s) are able to turn off their high speed link circuitry in one embodiment of the invention. | 2013-01-03 |
20130007484 | System and Method for Determining Transmitting Frequency to Maintain Remote Application Server Connectivity - A system and method for maintaining connectivity between a host system running an Always-On-Always-Connected (AOAC) application and an associated remote application server includes determining a timing interval Ti for sending keep-alive messages. The timing interval Ti may be determined by selecting a value for a timeout (Ti) to a value between a maximum timeout (T | 2013-01-03 |
20130007485 | STANDBY POWER REDUCING APPARATUS - A standby power reducing module according to an embodiment includes a AC rectification unit; a resonance unit electrically connected to the AC rectification unit and dropping DC voltage; a microcomputer connected to the resonance unit and controlling all operations of a system; a power blocking unit electrically connected to the microcomputer and blocking output voltage of the resonance unit when the system is switched into standby mode; and a independent power supplying unit supplying the standby power to the microcomputer when the system is switched into the standby mode. | 2013-01-03 |
20130007486 | METHOD AND SYSTEM FOR DETERMINING AN ENERGY-EFFICIENT OPERATING POINT OF A PLATFORM - A method and system for determining an energy-efficient operating point of the platform or system. The platform has logic to dynamically manage setting(s) of the processing cores and/or platform components in the platform to achieve maximum system energy efficiency. By using the characteristics of the workload and/or platform to determine the optimum settings of the platform, the logic of the platform facilitates performance guarantees of the platform while minimizing the energy consumption of the processor core and/or platform. The logic of the platform identifies opportunities to run the processing cores at higher performance levels which decreases the execution time of the workload and transitions the platform to a low-power system idle state after the completion of the execution of the workload. Since the execution time of the workload is reduced, the platform spends more time in the low-power system idle state and therefore the overall system energy consumption is reduced. | 2013-01-03 |
20130007487 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 2013-01-03 |
20130007488 | POWER MANAGEMENT OF A STORAGE DEVICE INCLUDING MULTIPLE PROCESSING CORES - A method of managing power of the storage device including a first processing core for controlling a first function block and a second processing core for controlling a second function block includes: analyzing a pattern of commands received from the outside; selecting an operation mode of the storage device based on the analyzed pattern; and managing the electric power of the storage device by using the first processing core if the selected operation mode is a first mode, and separately managing electric powers of the first and second function blocks by using the first and second processing cores, respectively, if the selected operation mode is a second mode. | 2013-01-03 |
20130007489 | SYSTEM AND METHOD FOR STANDBY POWER REDUCTION IN A SERIAL COMMUNICATION SYSTEM - In a serial communication system having a device including a receiver detection module, this specification is directed to systems and methods for selectively reducing the power consumed by the receiver detection module, preferably when the device is operating in a low power mode. In some embodiments, a signal detection module is configured to receive a control signal from the transmitter of a device at the other end of the communications link to control the operation of the receiver detection module. The control signal may be in-band or may be transmitted on a sideband of the serial link. | 2013-01-03 |
20130007490 | MULTICORE PROCESSOR SYSTEM, POWER CONTROL METHOD, AND COMPUTER PRODUCT - A multicore processor system having multiple cores, includes processors configured to measure bandwidth of a network; compare the measured bandwidth and a given threshold; determine among the cores and based on an obtained comparison result, a core adjustment number by which the number of cores executing a given process related to data communicated through the network is adjusted; calculate the number of executing cores after adjustment by the core adjustment number and based on the number of cores executing the given process before the adjustment and the determined core adjustment number; specify a core executing the given process among the cores and based on the calculated number of executing cores after the adjustment; and distribute the communicated data to the specified core executing the given process. | 2013-01-03 |
20130007491 | ENHANCED INTERCONNECT LINK WIDTH MODULATION FOR POWER SAVINGS - Methods and apparatus relating to enhanced interconnect link width modulation for power savings are described. In one embodiment, the width of a link is modified from a first width to a second width in response to a power management flit, while non-idle flits continue to be transmitted over the link after transmission of the power management flit. Other embodiments are also disclosed and claimed. | 2013-01-03 |
20130007492 | TIMER INTERRUPT LATENCY - An indication that a subsystem is about to enter an idle state is received, and an original fire time for a next timer interrupt is determined. An idle state for a subsystem is selected based on the original fire time; and a new fire time for the next timer interrupt is determined based on the selected idle state to reduce timer interrupt latency. A current latency in exiting an idle state is measured. The measured latency is added to a running average of latencies for the idle state. A latency value is determined based on the running average and a worst case latency to adjust an original fire time for a next timer interrupt. | 2013-01-03 |
20130007493 | COMPUTER SYSTEM, METHOD FOR CONTROLLING POWER OF COMPUTER SYSTEM, AND RECORDING MEDIUM FOR POWER CONTROL PROGRAM - A computer system for managing a plurality of virtual machines, the computer system including: a processor; and a memory coupled to the processor, wherein the processor executes a process includes: recording, on the memory, an operation history of a virtual machine that is related to a user operation in the plurality of virtual machines; determining whether the user operation is performed or not at switching of the virtual machines by referring to the operation history and comparing an operation time of the virtual machine that has operated most recently with the operation time of a control table, the control table being stored in the memory; and increasing an operation frequency of a CPU when performance of the user operation is detected. | 2013-01-03 |
20130007494 | MANAGING PROCESSOR-STATE TRANSITIONS - Techniques are disclosed relating to managing power consumption and latencies for entry and exit of idle power states. In one embodiment, a processor includes a processing core configured to operate in a plurality of power states (e.g., C-states) that includes an operating power state and at least one idle power state. The processing core is also configured to operate in a plurality of performance states. The processor further includes a power management unit configured to receive a request from the processing core to enter the at least one idle power state. The power management unit is configured to select a first of the plurality of performance states (e.g., P-states) based on the requested idle power state. In one embodiment, the power management unit is further configured to cause the processing core to transition into the selected first performance state prior to entering the requested idle power state. | 2013-01-03 |
20130007495 | System and Method for Maintaining Connectivity to Remote Application Servers - A system and method for maintaining connectivity between a host system running an Always-On-Always-Connected (AOAC) application and an associated remote application server. The system further includes circuitry configured to establish a communication link between the host system and the remote application server. The circuitry is configured periodically transmit keep-alive messages to the remote application server after the host system transitions to and remains in a low-power state. The keep-alive messages are configured to maintain connectivity and presence of the AOAC application with the remote application server while the host system is in the low-power state. | 2013-01-03 |
20130007496 | INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING THE SAME - According to one embodiment, a method controls an apparatus including a sensor which detects an open/close state of a cover, and an power manager which performs power management of the apparatus in accordance with a ordinary state and a power-saving state. The method includes notifying turning on the apparatus in order to change the apparatus to the ordinary state, if the power manager is notified a second notifying and the sensor detects that the cover is opened, and performing an power management corresponding to the power-saving state, if the power manager is notified a first notifying, or if the power manager is notified the second notifying and the sensor detects that the cover is closed. | 2013-01-03 |
20130007497 | APPARATUS FOR BLOCKING STANDBY POWER OF COMPUTER PERIPHERAL DEVICES - The present invention relates to an apparatus for blocking standby power of computer peripheral devices, comprising: a synchronization signal sensing control unit which senses the existence of horizontal and vertical synchronization signals provided to a monitor from a computer body, and outputs a switching control signal according to the sensed result; and a power switching unit which is provided with external power and situated on a power supply path for supplying power to the computer peripheral devices, and has a structure adapted for conducting or blocking the corresponding path according to the switching control signal. | 2013-01-03 |
20130007498 | SYSTEMS AND METHODS FOR USE IN CONTROLLING ENERGY CONSUMPTION - A computing device is provided. The computing device includes a communication interface that is configured to receive at least one signal from a utility, wherein the signal is representative of a request for a reduction of energy consumption within a building. Moreover, the computing device includes a processor that is coupled to the communication interface and is programmed to identify at least one machine within the building that is subject to the request. The processor is further programmed to generate at least one proposed control parameter for the machine based on the request. A user interface is coupled to processor and configured to enable a user of the machine to provide a response to the control parameter. | 2013-01-03 |
20130007499 | TRANSFERRING STATE INFORMATION BETWEEN ELECTRONIC DEVICES - Some embodiments enable a first electronic device (e.g., a notebook computer) to obtain state information directly from another electronic device (e.g., a smartphone) so that the first electronic device may replicate a state of content of the other computing device. This is useful when a user of an electronic device desires to switch between one device and another device such that the user may continue an activity (e.g., playing a video game) on another device without having to restart the activity. This is also useful when a user of a first electronic device attempts to replicate the state of the activity on a second device from another user such that both users may participate in the same activity. In some embodiments, a user of a device may obtain content from a server and state information from another device to replicate the state of content on the other device. | 2013-01-03 |
20130007500 | HIGH-SPEED I/O DATA SYSTEM - In embodiments of a high-speed I/O data system, a first computer chip includes a data transmission system, and a second computer chip includes a data reception system. A data channel communicates an NRZ data signal, and a clock channel communicates a forwarded clock signal, from the data transmission system to the data reception system. The data transmission system includes a first differential serializing transmitter to generate the NRZ data signal from pulsed data, and further includes a second differential serializing transmitter to generate a forwarded clock signal. A first multi-phase transmit clock generator generates transmit clock signals for the first and second differential serializing transmitters. The data reception system includes a data receiver and a de-serializer to receive and de-serialize the NRZ data signal, and includes a multi-phase receive clock generator to generate receive clock signals from the forwarded clock signal for the de-serializing data receiver. | 2013-01-03 |
20130007501 | SYSTEM AND METHOD FOR IDENTIFYING REPAIR POINTS AND PROVIDING EFFECTIVE DISPATCH - Systems and methods are disclosed for identifying repair points reported by individuals at one or more locations in a geographic area, and providing an effective process for dispatching repair crews. Event data related to a repair point is provided, where the event data is processed to determine the type(s) of repair needed, times and locations of reported events, as well as relationships between events and priority. This information is then used to prioritize dispatch to repair crews to address the events, and further monitor repair crews to determine status of repairs, and to further update priorities relating to ongoing repairs. | 2013-01-03 |
20130007502 | REPURPOSING DATA LANE AS CLOCK LANE BY MIGRATING TO REDUCED SPEED LINK OPERATION - Methods and apparatus relating to repurposing a data lane as a clock lane by migrating to reduced speed link operation are described. In one embodiment, speed of a link is reduced upon detection of failure on a clock lane of the link and one of a plurality of data lanes of a link is repurposed as a replacement clock lane. Other embodiments are also disclosed and claimed. | 2013-01-03 |
20130007503 | CONTINUOUS WORKLOAD AVAILABILITY BETWEEN SITES AT UNLIMITED DISTANCES - Continuous workload availability between sites at unlimited distances, which includes receiving a unit of work data. Once the unit of work data has been received the workload that the unit of work data is directed to is determined, and a primary site of a plurality of sites to process the unit of work is chosen. If the processing of the unit of work data is successful, then one of one or more processing systems of the primary site are selected to process the unit of work data, and the unit of work data is replicated to at least one other site. The primary site is separated from each of the plurality of sites by a distance greater than a metropolitan area network (MAN) and operations occur within a customer acceptability window. | 2013-01-03 |
20130007504 | HIGH AVAILABILITY DATA STORAGE SYSTEMS AND METHODS - Provided are systems and methods for accessing a storage device from a node when a local connection failure occurs between the node and the storage device. A failure is determined to have occurred at a first node access path between a first node and a storage device that prevents an application at the first node from accessing the storage device from the first node access path. An access request is sent from the first node to a second node. The second node has a second node access path to the storage device. A determination is made that the second node can communicate with the storage device. The storage device is accessed by an application at the first node via the second node access path. | 2013-01-03 |
20130007505 | Automatically Performing Failover Operations With A Load Balancer - A load balancer includes a failover logic unit to identify servers to execute services, generate and store in the load balancer a failover rule and a service rule, and to determine a failure in a first server that executes a first service responsive to a lack of response by the first server to a keepalive message sent by the load balancer to the first server. The load balancer can then perform an operation to cause an automatic failover of the first service to another server based on the failover and service rules. | 2013-01-03 |
20130007506 | MANAGING RECOVERY VIRTUAL MACHINES IN CLUSTERED ENVIRONMENT - Techniques involving replication of virtual machines of virtual machines in a clustered environment are described. One representative technique includes receiving a replication request to replicate a primary virtual machine. A clustering broker is configured to act on the replication request on behalf of a cluster of recovery nodes, by at least placing a replicated virtual machine corresponding to the source virtual machine on a recovery node and facilitate tracking the migration of the replicated virtual machine within the cluster. The clustering broker returns an address of the recovery node that has been placed or found through tracking for the particular virtual machine. | 2013-01-03 |
20130007507 | MECHANISM FOR ADVANCED SERVER MACHINE CHECK RECOVERY AND ASSOCIATED SYSTEM SOFTWARE ENHANCEMENTS - Embodiments of a hardware processor including a plurality of machine state registers (MSRs) are described. At least one of the MSRs includes an erroring logical processing (ELP) bit which when set, indicates that a particular thread executing on the hardware processor caused an error. | 2013-01-03 |
20130007508 | MANAGING STORAGE PROVIDERS IN A CLUSTERED APPLIANCE ENVIRONMENT - Receiving a power off alert indicating a power off condition of a first processing system on which a first storage provider is installed, the first storage provider managing at least one storage controller. Responsive to the power off alert, issuing a first command to a second storage provider installed on a second processing system, the first command indicating to the second storage provider to assume management of the storage controller. | 2013-01-03 |
20130007509 | METHOD AND APPARATUS TO UTILIZE LARGE CAPACITY DISK DRIVES - A method of utilizing storage in a storage system comprises prioritizing a plurality of storage areas in the storage system for data recovery with different priorities; and performing data recovery of the storage system at an occurrence of a failure involving one or more of the storage areas in the storage system based on the priorities. Data recovery for one storage area having a higher priority is to occur before data recovery for another storage area having a lower priority in the storage system. In various embodiments, the prioritization is achieved by monitoring the access characteristics, or the priority is specified by the host or management computer based on the usage and/or importance of data stored in the storage system, or the priority is determined by the storage system based on the area assignment/release (i.e., usage) of thin provisioned volumes. | 2013-01-03 |
20130007510 | SEMICONDUCTOR DEVICE HAVING REDUNDANT SELECT LINE TO REPLACE REGULAR SELECT LINE - Disclosed herein is a semiconductor device that includes selection lines selected based on an access address, a first hit signal generation circuit activating a first hit signal when the access address is coincident with a programmed address that designates a defective selection line included in the selection lines, and a first redundant selection line selected when the first hit signal is activated. The first hit signal generation circuit deactivates the first hit signal when a value of the access address is in a first address range even if the access address is coincident with the programmed address. | 2013-01-03 |