04th week of 2015 patent applcation highlights part 62 |
Patent application number | Title | Published |
20150026393 | Semiconductor Memory Device - A semiconductor memory device includes a memory array, a setting unit and a control unit. The memory array consists of non-volatile memory cells. The setting unit set a page address of the memory array which is initially read out at startup. The control unit performs an internal sequence to read out the page address from the setting unit at startup and, according to the read-out page address, transmits page data corresponding to the read-out page address from the memory array to a page buffer. | 2015-01-22 |
20150026394 | MEMORY SYSTEM AND METHOD OF OPERATING THE SAME - A method of operating a memory system includes the operations of outputting dirty cache lines from a data cache to a volatile memory device as instructions are executed, and outputting from the volatile memory device to a non-volatile memory device as many dirty cache lines as the size of a page of the non-volatile memory. | 2015-01-22 |
20150026395 | STORAGE SYSTEM AND MANAGEMENT METHOD OF CONTROL INFORMATION THEREIN - An embodiment of this invention divides a cache memory of a storage system into a plurality of partitions and information in one or more of the partitions is composed of data different from user data and including control information. The storage system dynamically swaps data between an LU storing control information and a cache partition. Through this configuration, in a storage system having an upper limit in the capacity of the cache memory, a large amount of control information can be used while access performance to control information is kept. | 2015-01-22 |
20150026396 | MEMORY CARD AND HOST DEVICE THEREOF - A memory card is attached to a host device, and includes a data control circuit which transfers data with respect to the host device in synchronism with a rise edge and a fall edge of a clock signal. | 2015-01-22 |
20150026397 | METHOD AND SYSTEM FOR PROVIDING MEMORY MODULE INTERCOMMUNICATION - Exemplary embodiments include a memory module including a plurality of connectors, at least one memory, at least one transmitter and at least one receiver. The connectors are configured to fit with a form factor of a memory socket on a server board. The memory is coupled with the connectors. The transmitter(s) are coupled with the memory. The transmitter(s) are configured to send a first plurality of signals from the memory module such that the first plurality of signals bypass the connectors. The receiver(s) are coupled with the memory. The receiver(s) are configured to receive a second plurality of signals to the memory module such that the second plurality of signals bypass the plurality of connectors. | 2015-01-22 |
20150026398 | MOBILE DEVICE AND A METHOD OF CONTROLLING THE MOBILE DEVICE - A mobile device including: a storage device; a system-on-chip (SOC) including a central processing unit (CPU) and a memory interface configured to access the storage device in response to a request of the CPU; and a working memory including an input/output (I/O) scheduler and a device driver, the I/O scheduler configured to detect real time processing requests and store the real time processing requests in a sync queue, and detect non-real time processing requests and store the non-real time processing requests in an async queue, the device driver configured to adjust the performance of the mobile device based on the number of requests in the sync queue. | 2015-01-22 |
20150026399 | Automatic Partial Array Self-Refresh - Methods of configuring dynamic memory associated with a processing system, are described. The dynamic memory is configured in a plurality of blocks, the method comprises: a) receiving information relating to a utilisation status of the memory; b) processing the received information to determine at least one first block of the memory that is currently not in use for information storage; and c) configuring the at least one first block to be excluded from an information refresh process. | 2015-01-22 |
20150026400 | Facilitating Communication Between Memory Devices and CPUs - According to one embodiment, an apparatus comprises one or more memory devices and one or more processors coupled to a circuit board. The memory devices are configured according to a second memory technology. The processors are configured to receive messages conforming to a first memory technology, translate the messages from the first memory technology to the second memory technology, and send the translated messages to the memory devices. | 2015-01-22 |
20150026401 | METHODS AND SYSTEM OF POOLING STORAGE DEVICES - A system and method are provided for pooling storage devices in a virtual library for performing a storage operation. A storage management device determines a storage characteristic of a plurality of storage devices with respect to performing a storage operation. Based on a storage characteristic relating to performing the storage operation, the storage management device associates at least two storage devices in a virtual library. The storage management device may continuously monitor the virtual library and detect a change in storage characteristics of the storage devices. When changes in storage characteristics are detected, the storage management device may change associations of the storage device in the virtual library. | 2015-01-22 |
20150026402 | STORAGE APPARATUS AND DATA MANAGEMENT METHOD - A storage apparatus includes storage devices of a plurality of types of varying performance, and a control unit which manages each of storage areas provided by the storage devices of the plurality of types by means of storage tiers of a plurality of different types, and assigns the storage areas in page units to a virtual volume from any of the storage tiers among the storage tiers of the plurality of types. If the data I/O request is received from the host, the control unit assigns storage areas in page units from the uppermost storage tier to the target areas of the virtual volume corresponding to the I/O request. The control unit changes the page unit storage area assignment to predetermined areas of the virtual volume from an upper storage tier to a lower storage tier in accordance with the speed of processing of the data I/O request. | 2015-01-22 |
20150026403 | SELF-ADJUSTING CACHING SYSTEM - An apparatus having a cache and a controller is disclosed. The controller is configured to (i) gather a plurality of statistics corresponding to a plurality of requests made from one or more hosts to access a memory during an interval, (ii) store data of the requests selectively in the cache in response to a plurality of headers and (iii) adjust one or more parameters in the headers in response to the statistics. The requests and the parameters are recorded in the headers. | 2015-01-22 |
20150026404 | Least Recently Used Mechanism for Cache Line Eviction from a Cache Memory - A mechanism for evicting a cache line from a cache memory includes first selecting for eviction a least recently used cache line of a group of invalid cache lines. If all cache lines are valid, selecting for eviction a least recently used cache line of a group of cache lines in which no cache line of the group of cache lines is also stored within a higher level cache memory such as the L1 cache, for example. Lastly, if all cache lines are valid and there are no non-inclusive cache lines, selecting for eviction the least recently used cache line stored in the cache memory. | 2015-01-22 |
20150026405 | SYSTEM AND METHOD FOR PROVIDING A SECOND LEVEL CONNECTION CACHE FOR USE WITH A DATABASE ENVIRONMENT - Described herein is a system and method for providing a level 2 connection cache for use with a database environment. In accordance with an embodiment, a second level, or level 2 (L2), connection cache is used to cache no-session connections for use with a database. When a connection is requested, a no-session connection (NSC) can be retrieved from the cache and a database session is attached. Later, when the connection is closed, the database session is logged off and the no-session connection returned to the cache for subsequent use. | 2015-01-22 |
20150026406 | SIZE ADJUSTING CACHES BY WAY - A size of a cache of a processing system is adjusted by ways, such that each set of the cache has the same number of ways. The cache is a set-associative cache, whereby each set includes a number of ways. In response to defined events at the processing system, a cache controller changes the number of ways of each set of the cache. For example, in response to a processor core indicating that it is entering a period of reduced activity, the cache controller can reduce the number of ways available in each set of the cache. | 2015-01-22 |
20150026407 | SIZE ADJUSTING CACHES BASED ON PROCESSOR POWER MODE - As a processor enters selected low-power modes, a cache is flushed of data by writing data stored at the cache to other levels of a memory hierarchy. The flushing of the cache allows the size of the cache to be reduced without suffering an additional performance penalty of writing the data at the reduced cache locations to the memory hierarchy. Accordingly, when the cache exits the selected low-power modes, it is sized to a minimum size by setting the number of ways of the cache to a minimum number. In response to defined events at the processing system, a cache controller changes the number of ways of each set of the cache. | 2015-01-22 |
20150026408 | CACHE MEMORY SYSTEM AND METHOD OF OPERATING THE SAME - A cache memory system and a method of operating the cache memory system are provided. The cache memory system includes: an address buffer for receiving address bits including a cache address and a tag address from the outside or externally; a cache memory including a memory array, the cache memory outputting, from a row of the memory array which the cache address designates, a plurality of pieces of tag data and a plurality of pieces of cache data corresponding to the plurality of pieces of tag data; and a register configured to temporarily store a data set including the plurality of pieces of cache data output from the cache memory. | 2015-01-22 |
20150026409 | DEFERRED RE-MRU OPERATIONS TO REDUCE LOCK CONTENTION - Data operations, requiring a lock, are batched into a set of operations to be performed on a per-core basis. A global lock for the set of operations is periodically acquired, the set of operations is performed, and the global lock is freed so as to avoid excessive duty cycling of lock and unlock operations in the computing storage environment. | 2015-01-22 |
20150026410 | LEAST RECENTLY USED (LRU) CACHE REPLACEMENT IMPLEMENTATION USING A FIFO - A method and apparatus for calculating a victim way that is always the least recently used way. More specifically, in an m-set, n-way set associative cache, each way a cache set comprises a valid bit that indicates that the way contains valid data. The valid bit is set when a way is written and cleared upon being invalidated, e.g., via a snoop address, The cache system comprises a cache LRU circuit which comprises an LRU logic unit associated with each cache set. The LRU logic unit comprises a FIFO of n-depth (in certain embodiments, the depth corresponds to the number of ways in the cache) and m-width. The FIFO performs push, pop and collapse functions. Each entry in the FIFO contains the encoded way number that was last accessed. | 2015-01-22 |
20150026411 | CACHE SYSTEM FOR MANAGING VARIOUS CACHE LINE CONDITIONS - A cache controller configured to detect a wait type (i.e., a wait event) associated with an imprecise collision and/or contention event is disclosed. The cache controller is configured to operatively connect to a cache memory device, which is configured to store a plurality of cache lines. The cache controller is configured to detect a wait type due to an imprecise collision and/or collision event associated with a cache line. The cache controller is configured to cause transmission of a broadcast to one or more transaction sources (e.g., broadcast to the transaction sources internal to the cache controller) requesting the cache line indicating the transaction source can employ the cache line. | 2015-01-22 |
20150026412 | NON-BLOCKING QUEUE-BASED CLOCK REPLACEMENT ALGORITHM - One embodiment provides an eviction system for dynamically-sized caching comprising a non-blocking data structure for maintaining one or more data nodes. Each data node corresponds to a data item in a cache. Each data node comprises information relating to a corresponding data item. The eviction system further comprises an eviction module configured for removing a data node from the data structure, and determining whether the data node is a candidate for eviction based on information included in the data node. If the data node is not a candidate for eviction, the eviction module inserts the data node back into the data structure; otherwise the eviction module evicts the data node and a corresponding data item from the system and the cache, respectively. Data nodes of the data structure circulate through the eviction module until a candidate for eviction is determined. | 2015-01-22 |
20150026413 | Access Map-Pattern Match Based Prefetch Unit for a Processor - In an embodiment, a processor may implement an access map-pattern match (AMPM)-based prefetcher in which patterns may include wild cards for some cache blocks. The wild card may match any access for the corresponding cache block (e.g. no access, demand access, prefetch, successful prefetch, etc.). Furthermore, patterns with irregular strides and/or irregular access patterns may be included in the matching patterns and may be detected for prefetch generation. In an embodiment, the AMPM prefetcher may implement a chained access map for large streaming prefetches. If a stream is detected, the AMPM prefetcher may allocate a pair of map entries for the stream and may reuse the pair for subsequent access map regions within the stream. In some embodiments, a quality factor may be associated with each access map and may control the rate of prefetch generation. | 2015-01-22 |
20150026414 | STRIDE PREFETCHING ACROSS MEMORY PAGES - A prefetcher maintains the state of stored prefetch information, such as a prefetch confidence level, when a prefetch would cross a memory page boundary. The maintained prefetch information can be used both to identify whether the stride pattern for a particular sequence of demand requests persists after the memory page boundary has been crossed, and to continue to issue prefetch requests according to the identified pattern. The prefetcher therefore does not have re-identify a stride pattern each time a page boundary is crossed by a sequence of demand requests, thereby improving the efficiency and accuracy of the prefetcher. | 2015-01-22 |
20150026415 | ADAPTIVE APPLICATION CACHING FOR MOBILE DEVICES - A method for pre-loading contents in a cache of a mobile terminal, and a mobile terminal using the method, are provided. The method includes determining specific contents for pre-loading, determining circumstances for pre-loading the specific contents, and monitoring circumstances of the mobile terminal. If the circumstances for pre-loading are detected, the method determines whether the specific contents are already present in cache, and if the specific contents are not present in cache, loads the specific contents into the cache when the circumstances for pre-loading are detected. | 2015-01-22 |
20150026416 | DYNAMIC MEMORY CACHE SIZE ADJUSTMENT IN A MEMORY DEVICE - Methods for dynamic memory cache size adjustment, enabling dynamic memory cache size adjustment, memory devices, and memory systems are disclosed. One such method for dynamic memory cache size adjustment determines available memory space in a memory array and adjusts a size of a memory cache in the memory array responsive to the available memory space. | 2015-01-22 |
20150026417 | Caching Method for Distributed Storage System, a Lock Server Node, and a Lock Client Node - A caching method for a distributed storage system, a lock server node, and a lock client node is disclosed. When the lock server node receives a first lock request sent by the first lock client node for locking a first data stripe, if the lock server node determines that the first lock request is a read lock request received for the first time on the first data stripe or a write lock request on the first data stripe, the lock server node records the owner of the first data stripe is the first lock client node in recorded attribute information of data stripes, and returns to the first lock client node a first response message indicating that the owner of the first data stripe is the first lock client node, and instructing the first lock client node to cache the first data stripe. | 2015-01-22 |
20150026418 | SYSTEM AND METHOD FOR INCREASED CAPACITY AND SCALABILITY OF A MEMORY TOPOLOGY - A system and method for serial interface topologies is disclosed. A serial interface topology includes a replication device configured to receive control information from a controller interface. The replication device is configured to transmit two or more copies of substantially replicated control information to a device control interface. A data interface is configured to provide differential, point-to-point communication of data with the device controller interface. | 2015-01-22 |
20150026419 | OPERATING SYSTEM VIRTUALIZATION FOR HOST CHANNEL ADAPTERS - A host information handling system (IHS) provides virtualization of host channel adapters (HCAs). A hypervisor partitions a system memory of the host IHS into multiple logical partitions (LPARs). A particular LPAR includes a single instance of an operating system. The single instance of the operating system includes a common layer that provides virtualization of physical HCAs and sharing of the physical HCAs by multiple virtual HCAs. | 2015-01-22 |
20150026420 | MEMORY ACCESS USING ADDRESS BIT PERMUTATION - An apparatus including a memory having an array of blocks addressable using address bits; and a permutation circuit coupled to the memory and configured to permutate the address bits such that during a memory access blocks of data are rearranged virtually. | 2015-01-22 |
20150026421 | MANAGEMENT SYSTEM FOR MANAGING A PHYSICAL STORAGE SYSTEM, METHOD OF DETERMINING A RESOURCE MIGRATION DESTINATION OF A PHYSICAL STORAGE SYSTEM, AND STORAGE MEDIUM - An example is a method for determining at least one migration destination for resources of one migration source physical storage system, with physical storage systems, which provide resources to a virtual storage system recognized by a host as one storage system, as migration destination candidates. The method defines at least one migration group from the resources included in the migration source physical storage system so that resources for which the predetermined management permissions are assigned to the same administrator are included in the same migration group, and determines at least one migration destination of the at least one migration group, on a condition that resources in the same migration group are migrated to the same physical storage system among the physical storage systems. | 2015-01-22 |
20150026422 | MANAGING DATA SETS OF A STORAGE SYSTEM - A method of and system for managing data sets of a storage facility is disclosed. The method and system may include copying a first data set of a first unit of storage space. A second data set in a second unit of storage space may be created from copying the first data set. The method and system may include copying the second data set of the second unit of storage space. A third data set in a third unit of storage space may be created from copying the second data set. The second data set may be verified. Verification may be performed by comparing the third data set with the first data set. It may be determined whether the third data set matches the first data set. The first and third data sets may be deleted in response to the third data set matching the first data set. | 2015-01-22 |
20150026423 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 2015-01-22 |
20150026424 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS PROVIDING CHANGE LOGGING IN A DEDUPLICATION PROCESS - A method performed in a network storage system, the method including receiving a plurality of data blocks at a secondary storage subsystem from a primary storage subsystem, generating a first log that includes a first plurality of entries, one entry for each of the data blocks, in which each entry of the first plurality of entries includes a name for a respective data block and a fingerprint of the respective data block, receiving metadata at the secondary storage subsystem from the primary storage subsystem, the metadata describing relationships between the plurality of blocks and a plurality of files, generating a second log that includes a second plurality of entries, and merging the first log with the second log to generate a change log. | 2015-01-22 |
20150026425 | ELECTRONIC DEVICE, OPERATING SYSTEM AND ACCESS CONTROL METHOD - An electronic device includes a memory protection unit configured to protect an access to a register of a device arranged in an address space. An operating system sets an access right to the register by using the memory protection unit. A process requests the operating system to operate the device when the process operates the device, and the operating system makes an access to the corresponding register in accordance with the request for the operation to operate the device. | 2015-01-22 |
20150026426 | SYSTEM AND METHOD FOR HIGH PERFORMANCE SECURE ACCESS TO A TRUSTED PLATFORM MODULE ON A HARDWARE VIRTUALIZATION PLATFORM - A system and method for high performance secure access to a trusted platform module on a hardware virtualization platform. The virtualization platform including Virtual Machine Monitor (VMM) managed components coupled to the VMM. One of the VMM managed components is a TPM (Trusted Platform Module). The virtualization platform also includes a plurality of Virtual Machines (VMs). Each of the virtual machines includes a guest Operating System (OS), a TPM device driver (TDD), and at least one security application. The VMM creates an intra-partition in memory for each TDD such that other code and information at a same or higher privilege level in the VM cannot access the memory contents of the TDD. The VMM also maps access only from the TDD to a TPM register space specifically designated for the VM requesting access. Contents of the TPM requested by the TDD are stored in an exclusively VMM-managed protected page table that provides hardware-based memory isolation for the TDD. | 2015-01-22 |
20150026427 | DATA REASSIGN METHOD AND STORAGE DEVICE - A data reassign method in an embodiment includes: when a reassign command specifying a first logical sector that is included in a first physical sector and that has not been specified yet by the reassign command is received, reassigning data in the first physical sector to a second physical sector different from the first physical sector; and refraining thereafter from reassigning data in the second physical sector until occurrence of either re-receipt of the reassign command for the first logical sector or second-time or later receipt of a reassign command for a second logical sector other than the first logical sector included in the second physical sector. | 2015-01-22 |
20150026428 | MEMORY USE FOR GARBAGE COLLECTED COMPUTER ENVIRONMENTS - A method, processing system, and computer readable storage medium, reduce heap memory used by an application, where unused memory in the heap memory is reclaimed by a garbage collector. A processor periodically monitors the application's memory usage including maximum heap memory size, committed heap memory size, in use heap memory size, and a garbage collection activity level. The processor, based on determining that the monitored garbage collection activity level is below a threshold, releases unused heap memory from the application by reducing the maximum heap memory size. | 2015-01-22 |
20150026429 | OPTIMIZING MEMORY USAGE ACROSS MULTIPLE GARBAGE COLLECTED COMPUTER ENVIRONMENTS - A method, information processing system, and computer readable storage medium, vary a maximum heap memory size for one application of a plurality of applications based on monitoring garbage collection activity levels for the plurality of applications, each application including a heap memory, and unused memory in the heap memory being reclaimed by a garbage collector. | 2015-01-22 |
20150026430 | VIRTUAL DATA STORAGE SERVICE WITH SPARSE PROVISIONING - Virtual data stores may be sparsely provisioned by virtual data storage services in a manner that controls risk of implementation resource shortages. Relationships between requested data storage space size, data storage server capacity, allocated data storage space size and/or allocated data storage space utilization may be tracked on a per data store, per customer, per data storage server, and/or a per virtual data storage service basis. For each such basis, a set of constraints may be specified to control the relationships. The set of constraints may be enforced during implementation resource allocation, and by migration of data storage space portions to different implementation resources as part of a sparse provisioning load balancing. Sparse provisioning details may be made explicit to virtual data storage service customers to varying degrees including explicit, aggregate on a per customer basis, and aggregate on a per virtual data storage service basis. | 2015-01-22 |
20150026431 | Method of Processing Data with an Array of Data Processors According to Application ID - A method wherein a plurality of data processors are associated with application IDs whereby the array processes a plurality of applications in parallel. | 2015-01-22 |
20150026432 | DYNAMIC FORMATION OF SYMMETRIC MULTI-PROCESSOR (SMP) DOMAINS - Symmetric multi-processor (SMP) nodes are dynamically configured via SMP sockets that use SMP optically-connected switches to dynamically connect SMP optically-connected links connected to the SMP nodes to form SMP domains based on best matched expected workloads for coherent traffic for exchanging SMP coherent information. The SMP nodes are dynamically added to one of the SMP domains and/or dynamically removed from one of the SMP domains. | 2015-01-22 |
20150026433 | ALLOCATION METHOD, APPARATUS, AND PROGRAM FOR ARCHITECTURAL REGISTER - An allocation system and a method for allocating an architectural register in a system having one or more mapping tables. When the allocation system detects a plurality of available architectural registers to an allocation target virtual register, it identifies adjacent instructions to all instructions having the allocation target virtual register in its destination operand, counts the number of uses of the architectural register appearing in the destination operand for each architectural register, summing the number of uses for each architectural register for each entry group in one or more mapping tables having the same assignment rule for correlations with the architectural registers, calculating the total of the numbers of uses of entries for each entry group, and allocating the architectural register to the allocation target virtual register such that the total of the numbers of uses of entries for each entry group approaches uniformity. | 2015-01-22 |
20150026434 | CONFIGURABLE LOGIC CONSTRUCTS IN A LOOP BUFFER - Techniques are described herein for using configurable logic constructs in a loop buffer. In an embodiment, a configurable hardware block is programmed based on one or more target functions within a loop. The configurable hardware block is associated with a plurality of registers, including a loopcount register and a first output register. For each iteration of the loop, a counter value in the loopcount register is updated and a target value in the first output register is updated using the programmed configurable hardware block. For each iteration of the loop, a set of one or more instructions may be fetched from the instruction buffer and executed based on the updated target value in the first output value. | 2015-01-22 |
20150026435 | INSTRUCTION SET ARCHITECTURE WITH EXTENSIBLE REGISTER ADDRESSING - A method and circuit arrangement selectively source and/or write data from/to extended registers of an extended register file based in part on whether an operand address of an instruction references a primary register of primary register file configured to store a pointer to the extended register. Control logic connected to the primary register file and the extended register file determines whether the operand address references a primary register configured to store a pointer, and responsive to the determination, the control logic causes execution logic to selectively source and/or write data from/to the extended register pointed to by the pointer stored in the referenced primary register. | 2015-01-22 |
20150026436 | HYBRID TAG SCHEDULER - The present invention provides a method and apparatus for scheduling based on tags of different types. Some embodiments of the method include broadcasting a first tag to entries in a queue of a scheduler. The first tag is broadcast in response to a first instruction associated with a first entry in the queue being picked for execution. The first tag includes information identifying the first entry and information indicating a type of the first tag. Some embodiments of the method also include marking at least one second entry in the queue is ready to be picked for execution in response to at least one second tag associated with at least one second entry in the queue matching the first tag. | 2015-01-22 |
20150026437 | METHOD AND APPARATUS FOR DIFFERENTIAL CHECKPOINTING - A processor core stores information that maps a physical register to an architectural register in response to an instruction modifying the architectural register. The processor recovers a checkpointed state of a set of architectural registers prior to modification of the architectural register by the instruction by modifying a reference mapping of physical registers to the set of architectural registers using the stored information. | 2015-01-22 |
20150026438 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR COOPERATIVE MULTI-THREADING FOR VECTOR THREADS - A system, method, and computer program product for ensuring forward progress of threads that implement divergent operations in a single-instruction, multiple data (SIMD) architecture is disclosed. The method includes the steps of allocating a queue data structure to a thread block including a plurality of threads, determining that a current instruction specifies a yield operation, pushing a token onto the second side of the queue data structure, disabling any active threads in the thread block, popping a next pending token from the first side of the queue data structure, and activating one or more threads in the thread block according to a mask included in the next pending token. | 2015-01-22 |
20150026439 | APPARATUS AND METHOD FOR PERFORMING PERMUTE OPERATIONS - An apparatus and method are described for permuting data elements with masking. For example, a method according to one embodiment includes the following operations: reading values from a mask data structure to determine whether masking is implemented for each data element of a destination operand; if masking not implemented for a particular data element, then selecting data elements from a first source operand and a second source operand based on index values stored in destination operand to be copied to data element positions within the destination operand, wherein any one of the data elements from either the first source operand and the second source operand may be copied to any one of the data element positions within the destination operand; and if masking is implemented for a particular data element of the destination operand, then performing a designated masking operation with respect to that particular data element. | 2015-01-22 |
20150026440 | APPARATUS AND METHOD FOR PERFORMING A PERMUTE OPERATION - An apparatus and method are described for permuting data elements with masking. For example, a method according to one embodiment includes the following operations: reading values from a mask data structure to determine whether masking is implemented for each data element of a destination operand; if masking not implemented for a particular data element, then selecting data elements from the destination operand and a second source operand based on index values stored in a first source operand to be copied to data element positions within the destination operand, wherein any one of the data elements from either the destination operand and the second source operand may be copied to any one of the data element positions within the destination operand; if masking is implemented for a particular data element of the destination operand, then performing a designated masking operation with respect to that particular data element. | 2015-01-22 |
20150026441 | METHOD AND SYSTEM OF INSERTING MARKING VALUES USED TO CORRELATE TRACE DATA AS BETWEEN PROCESSOR CORES - A method and system of inserting marker values used to correlate trace data as between processor cores. At least some of the illustrative embodiments are integrated circuit devices comprising a first processor core, a first data collection portion coupled to the first processor core and configured to gather data comprising addresses of instructions executed by the first processor core, a second processor core communicatively coupled to the first processor core, and a second data collection portion coupled to the first processor core and configured to gather data comprising addresses of instructions executed by the second processor core. The integrated circuit device is configured to insert marker values into the data of the first and second processor cores which allow correlation of the data such that contemporaneously executed instruction are identifiable. | 2015-01-22 |
20150026442 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MANAGING OUT-OF-ORDER EXECUTION OF PROGRAM INSTRUCTIONS - A method, system and computer program product embodied on a computer-readable medium are provided for managing the execution of out-of-order instructions. The method includes the steps of receiving a plurality of instructions and identifying a subset of instructions in the plurality of instructions to be executed out-of-order. | 2015-01-22 |
20150026443 | Branching To Alternate Code Based on Runahead Determination - The description covers a system and method for operating a micro-processing system having a runahead mode of operation. In one implementation, the method includes providing, for a first portion of code, a runahead correlate. When the first portion of code is encountered by the micro-processing system, a determination is made as to whether the system is operating in the runahead mode. If so, the system branches to the runahead correlate, which is specifically configured to identify and resolve latency events likely to occur when the first portion of code is encountered outside of runahead. Branching out of the first portion of code may also be performed based on a determination that a register is poisoned. | 2015-01-22 |
20150026444 | Compiler-control Method for Load Speculation In a Statically Scheduled Microprocessor - A statically scheduled processor compiler schedules a speculative load in the program before the data is needed. The compiler inserts a conditional instruction confirming or disaffirming the speculative load before the program behavior changes due to the speculative load. The condition is not based solely upon whether the speculative load address is correct but preferably includes dependence according to the original source code. The compiler may statically schedule two or more branches in parallel with orthogonal conditions. | 2015-01-22 |
20150026445 | PROCESSOR TESTING - Processors may be tested according to various implementations. In one general implementation, a process for processor testing may include randomly generating a first plurality of branch instructions for a first portion of an instruction set, each branch instruction in the first portion branching to a respective instruction in a second portion of the instruction set. The process may also include randomly generating a second plurality of branch instructions for the second portion of the instruction set, each branch instruction in the second portion branching to a respective instruction in the first portion of the instruction set. The process may additionally include generating a plurality of instructions to increment a counter when each branch instruction is encountered during execution. | 2015-01-22 |
20150026446 | SIGNAL PROCESSING DEVICE AND METHOD FOR INITIALIZING THE SAME - Provided is a signal processing device including: a digital signal detector outputting an inputted serial digital signal; a clock signal generator generating a clock signal on the basis of the serial digital signal; a chip selection signal generator generating a chip selection signal for selecting a chip by using at least one signal of the clock signal and the serial digital signal; and an initializer detecting an initializing signal included in the serial digital signal and generates a reset signal for initializing an operation of the clock signal generator and the chip selection signal generator on the basis of the initializing signal. | 2015-01-22 |
20150026447 | APPARATUS FOR CONFIGURING OPERATING SYSTEM AND METHOD THEREFOR - Disclosed are an apparatus and a method for configuring an operating system. An apparatus for configuring an operating system may comprise a system resource management part managing system resources by assigning control permission for system resources which interwork with the operating system to a first domain of the operating system; and a system operation part executing an application program in a second domain of the operating system which is independent from the first domain by utilizing the system resources managed by the system resource management part. Therefore, performance of the operating system may be enhanced at the same time of supporting high security of the operating system so that reliability of the operating system can also be enhanced. | 2015-01-22 |
20150026448 | DYNAMIC NIC BINDING - In one embodiment, a network boot program is received from a server via a first network interface controller associated with a first network identifier. The network boot program is executed. An operating system loader comprising an operating system driver is received from the server via the first network interface controller. The operating system driver identifies a second network interface controller associated with a second network identifier. The operating system driver associates the first network interface controller with the second network identifier and associates the second network interface controller with the first network identifier. | 2015-01-22 |
20150026449 | METHOD OF MANAGING A SOLID STATE DRIVE, ASSOCIATED SYSTEMS AND IMPLEMENTATIONS - One embodiment of a method includes loading, by a memory controller, a boot image from a solid state drive to an operating memory of a computing system during an initialization operation of the computing system. The initialization operation initializes components of the computing system. | 2015-01-22 |
20150026450 | Dynamic Data Dimensioning by Partial Reconfiguration of Single or Multiple Field-Programmable Gate Arrays Using Bootstraps - An approach is presented for managing resources of a field-programmable gate array (FPGA). At runtime, first data is extracted and processed. At runtime and via a very high speed integrated circuit hardware description language (VHDL) interface, a change in a size, a structure, or a load schedule of next data is received. The change is determined by a quantitative method analyzing the first data and executing external to the FPGA. At runtime, a first bootstrap code in the FPGA executes, and in response, other bootstrap codes in the FPGA are updated. The first bootstrap code is configured to update the structure of the next data. The other bootstrap codes are configured to extract and process, and to determine an order of processing and a configuration of the next data. The next data is extracted and processed based on the updated other bootstrap codes. | 2015-01-22 |
20150026451 | Multiprocessor Fabric Having Configurable Communication that is Selectively Disabled for Secure Processing - Disabling communication in a multiprocessor fabric. The multiprocessor fabric may include a plurality of processors and a plurality of communication elements and each of the plurality of communication elements may include a memory. A configuration may be received for the multiprocessor fabric, which specifies disabling of communication paths between one or more of: one or more processors and one or more communication elements; one or more processors and one or more other processors; or one or more communication elements and one or more other communication elements. Accordingly, the multiprocessor fabric may be automatically configured in hardware to disable the communication paths specified by the configuration. The multiprocessor fabric may be operated to execute a software application according to the configuration. | 2015-01-22 |
20150026452 | DIGITAL RIGHTS MANAGEMENT - There is disclosed a method of controlling use of encrypted content by a plurality of client terminals each provided with a digital rights management (DRM) client and a content decryption module separate to the DRM client. First key information is provided for use by one or more selected ones of the DRM clients, and second key information is provided for use by one or more selected ones of the content decryption modules. Content key information is encrypted to form encrypted content key information such that the selected ones of the content decryption modules are enabled by the second key information to recover the content key information from the encrypted content key information. The encrypted content key information is further encrypted to form super-encrypted content key information such that the selected ones of the DRM clients are enabled by the first key information to recover the encrypted content key information from the super-encrypted content key information. Corresponding head-end and client terminal apparatus are also disclosed. | 2015-01-22 |
20150026453 | SYSTEM AND METHOD FOR ESTABLISHING SECURITY IN NETWORK DEVICES CAPABLE OF OPERATING IN MULTIPLE FREQUENCY BANDS - A Network device including a security module to establish, in response to the network device being capable of operating in multiple frequency bands, and in response to the network device operating in a first frequency band, security for the frequency band and a second frequency band by performing a single authentication in the first frequency band prior to the network device switching operation form the first frequency band to the second frequency band. A session transfer module to transfer, subsequent to the network device switching operation from the first frequency band to the second frequency band, a communication session of the network device from the first frequency band to the second frequency band. The communication session resumes in the second frequency band using the security established for the second frequency band during the operation of the network device in the first frequency band. | 2015-01-22 |
20150026454 | CHUNK-LEVEL CLIENT SIDE ENCRYPTION IN HIERARCHICAL CONTENT ADDRESSABLE STORAGE SYSTEMS - Techniques for chunk-level client side encryption are provided. In a content addressable storage system, a plurality of chunks is used to implement a hierarchical file system. The hierarchical file system supports both encrypted and non-encrypted volumes. A folders and files layer makes calls directly to a chunk system layer for operations involving non-encrypted volumes. The folders and files layer makes calls to a volume encryption layer for operations involving encrypted volumes. The volume encryption layer receives calls from the folders and files layer through an API that matches the API through which the chunk system layer receives calls from the folders and files layer. | 2015-01-22 |
20150026455 | SYSTEMS AND METHODS FOR SECURING EMAIL IN MOBILE DEVICES - A computer-implemented method for providing secure mobile email communications is described. At least one application programming interface (API) of a native email client is hooked in order to transmit data securely via email. The native email client is native to an operating system of the mobile device. An email originating from a registered application is detected, via the hooked API. The email includes the data to transmit securely. The registered application is registered in a registry according to a mobile application authentication procedure. The registry includes a plurality of registered applications authenticated according to the mobile application authentication procedure. | 2015-01-22 |
20150026456 | APPARATUS AND METHOD FOR MANAGING DIGITAL COPYRIGHT ON EPUB-BASED CONTENT, AND APPARATUS AND METHOD FOR PROVIDING EPUB-BASED CONTENT ACCORDING TO USER'S RIGHT - Disclosed are an apparatus and method for managing a digital copyright on electronic publication (EPUB)-based content and an apparatus and method for providing EPUB-based content according to a user's right. An encryption unit of the apparatus for managing digital copyright generates encrypted unit files by encrypting a plurality of unit files included in content in the form of a compressed archive including the plurality of unit files with different encryption keys, stores the encrypted unit files in a content database, generates mapping data by mapping the encryption keys to pieces of identification information of the encrypted unit files, and stores the mapping data in an encryption key database. A rights management unit transmits an encryption key selected from among the plurality of encryption keys to a content provision apparatus, which decrypts the encrypted unit files and provides the unit files to a user, based on at least one of identification information of the user and identification information of the content included in an encryption key provision request message received from the content provision apparatus. | 2015-01-22 |
20150026457 | CONTROLLING ACCESS BY CODE - A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library. | 2015-01-22 |
20150026458 | Managing User Access in a Communications Network - A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network. | 2015-01-22 |
20150026459 | METHOD AND SYSTEM FOR ENCRYPTING MULTIMEDIA STREAMS - A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one embodiment, one or more data packets are selected from an incoming multimedia stream. Further, one or more of a header portion and a payload portion are selected within the one or more data packets. Furthermore, one or more regions in the selected one or more of the header portion and the payload portion are encrypted using an encryption algorithm. | 2015-01-22 |
20150026460 | Systems, Methods and Media for Selective Decryption of Files Containing Sensitive Data - Systems, methods and media are provided for selective decryption of files. One method includes monitoring a secure file storage area including at least one file using a selective decryption process associated with the secure file storage area. Content of each of the at least one file is protected with an encryption. The method also includes detecting a request by an application program for one of the at least one file. The method further includes determining whether the application program needs to access the content of the requested file. The method also includes, when it is determined that the application program does not need to access the content of the requested file, allowing the application program to access the file content without decrypting the encryption. | 2015-01-22 |
20150026461 | System and Method to Create Resilient Site Master-key for Automated Access - A system encrypts a private key with a master key and includes a storage device for storing a protected private key at a site location, a processor that determines a plurality of derivatives by selecting an order of site characteristics from a plurality of disjoint sets of site characteristics unique to a software installation or site location, wherein the processor applies a hash algorithm to each site characteristic. The system further includes a buffer storage device for storing an order of random selections of the site characteristics for the derivatives. The system encrypts the master key with the derivatives and additionally stores the encrypted form of the master key in a storage device. | 2015-01-22 |
20150026462 | METHOD AND SYSTEM FOR ACCESS-CONTROLLED DECRYPTION IN BIG DATA STORES - A method and system for access-controlled decryption in big data stores is provided. In an implementation, a system provides a method for encryption that stores meta-information about sensitive data elements being encrypted in a big data store, such as a Hadoop system, in which the bulk of the data may remain unencrypted. In an implementation, the system reads the stored meta-information at decryption time to determine where the encrypted data is within a large and unencrypted file system, and to determine whether or not an individual user has access rights to decrypt a given element of sensitive data. The system allows fine-grain control over access rights to sensitive data during decryption. | 2015-01-22 |
20150026463 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by the kernel mode driver by authenticating a content authenticator of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that contains content authenticators of approved code modules that are known not to contain viruses or malicious code and (ii) a local whitelist database containing content authenticators of at least a subset of the approved code modules. The activity relating to the code module is allowed when the content authenticator matches one of the content authenticators of approved code modules within the multi-level whitelist. | 2015-01-22 |
20150026464 | Steganography Detection - Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file. | 2015-01-22 |
20150026465 | Methods And Devices For Protecting Private Data - Private data in a cloud-based network may be protected by insuring that inadvertent, malicious, or suspicious access to such data is minimized. Reachability analyses may generate directed graphs that can be displayed as paths on a graphical user interface. If a displayed component of a path indicates that inadvertent, malicious or suspicious access may occur corrective action may be taken to prevent such access. | 2015-01-22 |
20150026466 | Token-Based Security for Links to Media Streams - Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may generate a first token based on a private key and an encryption algorithm. The first token may be inserted into a link to a media stream. When the link is selected at a client device, a media request including the first token may be sent to a server. The server may generate a second token based on the private key and the encryption algorithm. The server may grant or deny the media request based on a comparison of the first token and the second token. | 2015-01-22 |
20150026467 | Methods and Apparatus for Authenticating Data as Originating from a Storage and Processing Device and for Securing Software and Data Stored on the Storage and Processing Device - Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for installing software and data to a storage medium in a way which inhibits unauthorized copying of the software and data to another storage medium. Cryptoprocessing keys are created using unique features of the storage medium such as location information related to storage of selected elements of a software installation on the storage medium, or alternatively defective block information relating to the storage medium. The cryptoprocessing keys are used to encrypt data for transmission to a remote server. The remote server uses the cryptoprocessing keys to decrypt the data and authenticates the data as having been encrypted with the correct keys. | 2015-01-22 |
20150026468 | TOKEN-BASED SECURITY FOR LINKS TO MEDIA STREAMS - Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may receive a media request in response to selection of a link to a media stream. The link may include a first token that is generated based on a private key and an encryption algorithm, and the media request may include the first token. The computing device may grant or deny the media request based on a comparison of the first token and a second token that is generated based on the private key and the encryption algorithm. | 2015-01-22 |
20150026469 | SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER - A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives instructions from a first user identifying transfer data and a recipient identifier, creates a key, encodes the transfer data using the key, and communicates the key and the recipient identifier to a server. The server creates a secure package identifier and communicates such to the sender client. The recipient client receives and identifies the secure package identifier and the encoded transfer data, receives from a second user a user identifier, and communicates the user identifier and the secure package identifier to the server. The server communicates the key to the recipient client only if the secure package identifier received from the recipient client matches the secure package identifier created by the server and if the user identifier matches the recipient identifier. | 2015-01-22 |
20150026470 | SECURED EMBEDDED DATA ENCRYPTION SYSTEMS - Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets. A receiving device uses its copy of the transmitting device's transformation matrix to decrypt the data in a packet, determining whether a MAC extracted from that packet matches the transmitting device's MAC. The receiving device can permit or prevent further processing of the packet's data depending on whether the MACs match. Each device can store a copy of a same program that can be used to derive derivative security vectors from existing security vectors. Each device in the network can derive the same set of derivative vectors for any selected other device in the network, thereby “evolving” the transformation matrices. | 2015-01-22 |
20150026471 | Staged Control Release in Boot Process - Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware module may also receive a first code measurement. The secure hardware module may provide a first key based on the root key and the first code measurement. The secure hardware module may receive a second code measurement and provide a second key based on the first key and the second code measurement. The release of keys based on code measurements may provide authentication in stages. | 2015-01-22 |
20150026472 | SYSTEMS AND METHODS FOR IMPLEMENTING COMPUTER SECURITY - A computer system includes memory storing an operating system. An agent executive runs within the operating system. The agent executive receives an agent identity token from a grid computer system. The agent identity token includes a unique cryptographic key assigned to the agent executive. The agent executive collects information about the computer system for an evaluation of integrity of the agent executive, according to a plurality of agent self-verification factors. The agent executive encrypts the collected information using the cryptographic key and transmits the encrypted information to the grid computer system. The agent executive retrieves an encrypted set of commands from the grid computer system, which are selected by the grid computer system in response to the transmitted information. The agent executive decrypts the encrypted set of commands and executes, at the computer system, each command in the set of commands. | 2015-01-22 |
20150026473 | VERIFYING PRIVACY OF WEB REAL-TIME COMMUNICATIONS (WEBRTC) MEDIA CHANNELS VIA CORRESPONDING WEBRTC DATA CHANNELS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Verification of privacy of Web Real-Time Communications (WebRTC) media channels via corresponding WebRTC data channels, and related methods, systems, and computer-readable media are disclosed. In this regard, in one embodiment, a method for verifying privacy of a WebRTC media channel comprises establishing the WebRTC media channel between first and second WebRTC clients using a keying material. The method further comprises establishing a corresponding WebRTC data channel between the first and second WebRTC clients using the keying material, and negotiating, in the WebRTC data channel, a cryptographic key exchange. The method also comprises generating a first and a second Short Authentication String (SAS) based on the cryptographic key exchange in the WebRTC data channel. The method further comprises displaying the first SAS and the second SAS, such that a mismatch between the first SAS and the second SAS indicates an existence of a man-in-the-middle (MitM) attacker. | 2015-01-22 |
20150026474 | MANAGED AUTHENTICATION ON A DISTRIBUTED NETWORK - An authoritative computer network ( | 2015-01-22 |
20150026475 | SIMPLE NONAUTONOMOUS PEERING NETWORK MEDIA - A method of playing content across a network includes receiving, at a media player, an input from a user selecting media located on a network, sending a request across a network comprised of devices employing a common security protocol, the request to identify peer devices on the network, receiving a response across the network from a peer device, and accessing the media from a content memory of the peer device. A method of tracking valid peers on a secure media network, includes receiving, at a media player, an input from a user selecting media located on a peer device on the network, performing an authentication test of the peer player, determining if a latency associated with the peer player meets a criteria, and updating a latency log on the media player to include the peer player. A device has a content memory to store media content for playback, a network port arranged to allow the device to access a network, and a controller programmed to send a request through the network port to a network, the request being for a particular media content file, communicate with a peer device across the network to authenticate a communication session with the peer device, receive a response from the peer device indicating that the session has been authenticated, and access the media content file on a content memory on the peer device. | 2015-01-22 |
20150026476 | METHOD FOR READING AN ATTRIBUTE FROM AN ID TOKEN - A method for reading at least one attribute stored in an ID token using first, second and third computer systems, wherein the third computer system comprises a browser and a client, and wherein a service certificate is assigned to the second computer system, wherein the service certificate comprises an identifier which is used to identify the second computer system, wherein the ID token is assigned to a user,: a first cryptographically protected connection (TLS1) is set up between the browser of the third computer system and the second computer system, wherein the third computer system receives a first certificate, the first certificate is stored by the third computer system, the third computer system receives a signed attribute specification via the first connection, a second cryptographically protected connection (TLS2) is set up between the browser of the third computer system and the first computer system, wherein the third computer system receives a second certificate, the signed attribute specification is forwarded from the third computer system to the first computer system via the second connection, the first computer system accesses an authorization certificate, wherein the authorization certificate comprises the identifier, a third cryptographically protected connection (TLS3) is set up between the first computer system and the client of the third computer system, wherein the third computer system receives the authorization certificate containing the identifier via the third connection, the client of the third computer system checks whether the first certificate comprises the identifier as proof of the fact that the first certificate matches the service certificate, the user is authenticated with respect to the ID token, the first computer system is authenticated with respect to the ID token, a fourth cryptographically protected connection with end-to-end encryption is set up between the ID token and the first computer system, after the user and the first computer system have been successfully authenticated with respect to the ID token, the first computer system has read access to the at least one attribute stored in the ID token via the fourth connection in order to read the one or more attributes specified in the attribute specification from the ID token,—the first computer system transmits the at least one attribute to the second computer system after said attribute has been signed. | 2015-01-22 |
20150026477 | SYSTEM AND METHOD FOR DELIVERING APPLICATION CONTENT - A system and method for messaging application content that includes providing an application content messaging application programming interface (API); receiving a content delivery request from an account, through the application content messaging API; retrieving device information of a destination endpoint specified in the content delivery request; based on the device information, selecting an application content format from a set of formats and obtaining application content in the application content format; and transmitting the application content. | 2015-01-22 |
20150026478 | ELECTRONIC DOCUMENT NOTARIZATION - A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user, and a signature of the user. The server compares the photograph of the user to the photograph included with the identification information. Next, the server verifies an identity of the user based on the identification information and the photograph by comparing the photograph of the signer to the photograph included with the identification information. The server then applies the signature and an indication of notarization to the document designated for notarization to create a notarized version of the document. The server stores the notarized version of the document, the photograph, and the identification document in a secure data package, and provides the notarized version of the document to the user. | 2015-01-22 |
20150026479 | CREATION AND AUTHENTICATION OF BIOMETRIC INFORMATION - In accordance with the embodiments of the present invention, the biometric information created for biometric authentication is available for a predetermined time after it was acquired. In addition, the authentication processing is performed on the biometric information useful for a predetermined time after the biometric information was acquired when authenticating it. Therefore, the authentication processing can be normally performed on only the biometric information that is acquired immediately when it is necessary for the user to do the financial transaction or individual authentication. | 2015-01-22 |
20150026480 | Personal Digital Key Initialization And Registration For Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes. | 2015-01-22 |
20150026481 | Computation Protected Against Spying - The invention provides a method for executing a cryptographic computation comprising a plurality of blocks while employing secret data in a processor, said executing being protected against spying out of secret data. To achieve a computational result of the computation, there is executed a multiple computation in which the computation is executed several times, at least twice. Within the multiple computation, blocks of the several, at least two, executions of the computation are executed in interlaced order. | 2015-01-22 |
20150026482 | SYSTEMS, METHODS, SOFTWARE, AND COMPONENTS USING TAMPER-PROOF REAL-TIME CLOCK - The write-access control line for an RTC is combined with a clear line for an RTC signature register, so that changes to the RTC will cause subsequent reads to return an invalidity flag. | 2015-01-22 |
20150026483 | Systems and Methods for Mobile Application Protection - Systems and methods are provided for mobile application protection. An executable code associated with an application is received. An encrypted code and a wrapper code are generated based at least in part on the executable code. The encrypted code is capable of being decrypted based at least in part on the wrapper code. An application package including the encrypted code and the wrapper code is generated for a mobile device. | 2015-01-22 |
20150026484 | SMART STORAGE DEVICE - A smart storage device can have a smart-card portion with access control circuitry and integrated memory, a controller in selective communication with the smart-card portion, and a memory device in communication with the controller. The memory device can be separate from the smart-card portion and can store one or more smart-card applications. | 2015-01-22 |
20150026485 | METHOD AND APPARATUS FOR PREVENTION OF TAMPERING AND UNAUTHORIZED USE, AND UNAUTHORIZED EXTRACTION OF INFORMATION FROM SECURED DEVICES - The present invention considers an apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one secure system including at least one information device arranged to process information, at least one integrated encryption segment arranged to encrypt the information using at least one encryption process enabled by a set of encryption key information incorporated in at least one secure information storage of the at least one information device, at least one destruction driver arranged to initiate and support at least one controllable energy release in a proximity of the at least one secure information storage of the at least one information device incorporating the set of encryption key information, such that at least fraction of the set of encryption key information has been obliterated during the controllable energy discharge. | 2015-01-22 |
20150026486 | OVERCURRENT PROTECTION CIRCUIT AND SERVER USING THE SAME - An overcurrent protection circuit and a server using the same are provided. The overcurrent protection circuit coupled between a power supply module and a load on a mainboard including a detecting component, a detection unit, a comparing unit, and a power switch. The detecting component is coupled between the power supply module and the detection unit. The detection unit detects a detecting voltage generated by the detecting component responsive to a supplying current. The comparing unit generates a control voltage according to the detecting voltage and a reference voltage. The power switch is coupled between the detecting component and the load and is controlled by the control voltage. When the comparing unit determines that the detecting voltage is greater than the reference voltage, the comparing unit cuts off the power switch to disconnect a power supply path between the power supply module and the load. | 2015-01-22 |
20150026487 | MOBILE TERMINAL AND METHOD OF DETERMINING AND DISPLAYING POWER EFFICIENCY OF AN APPLICATION - A method and mobile terminal for determining a power efficiency of an application installed in and executed by a mobile terminal. The method includes: determining power consumption per unit time according to units of the installed and executed application; and determining a power efficiency level of the installed and executed application based on the determined power consumption per unit time. The mobile terminal includes: a power consumption determiner configured to determine power consumption per unit time according to units of the installed and executed application; and a level determiner configured to determine a power efficiency level of the installed and executed application based on the determined power consumption per unit time. | 2015-01-22 |
20150026488 | SELECTIVELY POWERING A STORAGE DEVICE OVER A DATA NETWORK - Methods and structure for selectively powering a storage device over a data network. An exemplary system includes a power module configured to detect power from a host system via a network port. The system also includes an input/output controller configured to receive power derived from the network port of the power module, and in response, to identify a disk drive for a read/write operation based on information from the host system. With power derived from the network port, the power module is further configured to supply power to an expander that connects the disk drive to the input/output controller, and to supply power to the disk drive to perform the read/write operation. | 2015-01-22 |
20150026489 | DISTRIBUTED ANTENNA SYSTEM USING POWER-OVER-ETHERNET - A system is provided for adjusting power provided over a channel to a device. The system can include power sourcing equipment and a sub-system. The power sourcing equipment can provide power to a powered device via a channel. The sub-system can determine an amount by which to increase the power based on a resistance of the channel. The power sourcing equipment or the powered device can adjust the power (or load) in response to a command from the sub-system. The sub-system can include at least one measurement device and a processor. The measurement device can measure an output voltage of the power sourcing equipment, an input voltage of the powered device, and a current on the channel. The processor can determine the resistance of the channel based on the output voltage, the input voltage, and the current. The processor can output a command specifying an increase or decrease in the level of power supplied by the power sourcing equipment. | 2015-01-22 |
20150026490 | CLOCK TREE IN CIRCUIT AND OPERATION METHOD THEREOF - A clock tree in a circuit and an operation method thereof are provided. The clock tree includes at least two sub clock trees, at least two voltage-controllable power-mode-aware (PMA) buffers and a power-mode control circuit. The PMA buffers delay a system clock to serve as the delayed clock, and provide respectively the delayed clock to the sub clock trees. The power-mode control circuit provides at least two first power information to at least two function modules respectively, wherein a power mode of each of the function modules is determined according to the first power information respectively. The power-mode control circuit provides at least two second power information to the PMA buffers respectively, wherein a delay time of each of the PMA buffers is determined according to the second power information respectively. | 2015-01-22 |
20150026491 | REMOTELY CONTROLLABLE ELECTRONIC DEVICE AND SYSTEM INCLUDING THE SAME - An electronic device is provided. The electronic device includes a controller configured to transition the electronic device into a sleep mode, and a communication interface configured to establish a network session with the external computing device when the electronic device into the sleep mode, wherein the communication interface is configured to maintain the network session with the external computing device when the electronic device is in the sleep mode, and to transition the electronic device into a non-sleep mode in response to a signal, for requesting that the electronic device gets out the sleep mode, being received through the maintained network session. | 2015-01-22 |
20150026492 | Process Calibrator - A process calibrator is formed with functions of a fieldbus communicator. Preferably, functions of a fieldbus communicator support several fieldbus protocols, and it is provided such that the use of it does not hamper the functioning of a process calibrator. This has been achieved by providing the process calibrator with a pair of fieldbus connecting terminals for measuring of the fieldbus signal. The process calibrator comprises a processor, and the pair of fieldbus connecting terminals comprises a signal terminal and a ground terminal. The process calibrator further comprises at least two parallel fieldbus protocol units between the processor and the signal terminal of the pair of fieldbus connecting terminals. Each fieldbus protocol unit is dedicated to its respective fieldbus protocol. Further, the process calibrator comprises a selection unit for selecting a fieldbus protocol unit and a voltage unit for being between the terminals of said pair of fieldbus connecting terminals, which voltage unit is arranged to adjust the voltage and the impedance according to the selected fieldbus protocol unit. The selecting unit is controlled manually through the user interface. The user interface is realized by a touch screen or a combination of a touch screen and keyboard or only by a keyboard. | 2015-01-22 |