05th week of 2014 patent applcation highlights part 67 |
Patent application number | Title | Published |
20140032891 | Direct Binary File Transfer based Network Management System Free of Messaging, Commands and Data Format Conversions - Telecommunication network management operations are performed based on accessing network management data (NMD) files via GUIs and general purpose computers including a network management system (NMS) server, and automatic routines for transferring binary NMD files between the general purpose computers and remote network elements (NEs) being managed. A system user produces configuration files at the NMS server for NEs using a network management GUI, and the hardware of NEs automatically complete the network management operations indicated by the NMD files transferred to them from the NMS server and produce their status files to the NMS server. The network management GUI displays network status based on the latest NE status files at the NMS server. This provides direct, binary file transfer based NMS communication that avoids the complexity and restrictions of intermediate messaging protocols or transaction languages and conversions thereof. | 2014-01-30 |
20140032892 | METHOD AND APPARATUS FOR BOOTSTRAPPING GATEWAY IN DEVICE MANAGEMENT SYSTEM - The present invention discloses a method and an apparatus for bootstrapping a gateway in a device management system, where the method includes: acquiring, from a terminal device by a gateway, server information saved by the terminal device; determining, by the gateway, a target server according to the acquired server information, and initiating a bootstrap request; and performing, by the gateway, a bootstrap according to bootstrap information received from the target server. The present invention enables the gateway to accomplish a bootstrap process in a use process. | 2014-01-30 |
20140032893 | SECURE VIRTUALIZATION ENVIRONMENT BOOTABLE FROM AN EXTERNAL MEDIA DEVICE - Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment bootable from an external media device. A host computing device loads and boots a common operating system image stored on an external media device. A client agent stored on the external media device and executing in the common operating system image creates an adapted operating system image by copying the operating system of the host computing device, eliminating all unnecessary files and data and storing the adapted operating system image to the external media device. The host computing device provides a secure virtualized environment by booting the adapted operating system image. | 2014-01-30 |
20140032894 | CONTROL METHOD AND ELECTRONIC DEVICE - A control method and an electronic device are disclosed in the application. The control method is applied to an electronic device including a CPU. The method includes: obtaining a current state of the electronic device; judging whether the current state is a first or a second state; generating a first control instruction in the case that the current state is the first state, or generating a second control instruction in the case that the current state is the second state; performing the first control instruction to control the operating frequency of the CPU within the first maximum operating frequency or performing the second control instruction to control the operating frequency of the CPU within the second maximum operating frequency. Enabling to regulate the maximum operating frequency of the CPU adaptively based on the current state of the electronic device. | 2014-01-30 |
20140032895 | METHOD AND APPARATUS FOR CONTROLLING ALARM OPERATION IN A TERMINAL - According to one embodiment, a method and apparatus for controlling an alarm operation in a terminal, by which a plurality of alarms are terminated in the terminal. The method includes setting at least one of multiple alarm groups, each alarm group including multiple alarms, in which the setting of the at least one alarm groups includes automatically setting termination of the plurality of alarms associated with the alarm group to correspond to termination of the alarm group. | 2014-01-30 |
20140032896 | SECURE COMMUNICATION USING PHYSICAL PROXIMITY - Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device. | 2014-01-30 |
20140032897 | SECURELY ESTABLISHING A COMMUNICATION CHANNEL BETWEEN A SWITCH AND A NETWORK-BASED APPLICATION USING A UNIQUE IDENTIFIER FOR THE NETWORK-BASED APPLICATION - A network-based application can establish a secure network connection to a switch. A unique identifier (UID) is generated for the network-based application, and a secure authentication request is generated from the network-based application. The UID for the network-based application is embedded in the secure authentication request. The secure authentication request is communicated to the switch. A response to the secure authentication request is received from the switch. One or more operations are performed that utilize the UID to establish a secure communication channel between the network-based application and the switch. | 2014-01-30 |
20140032898 | AUTHENTICATION SYSTEM AND METHOD FOR DIGITAL TELEVISIONS - The invention relates to digital television authentication system and method. The system includes a digital television having a digital television master chip; an SIM card module with a built-in SIM card, connected to the digital television master chip, and an authentication server wirelessly connected to the SIM card. The SIM card module includes a symmetric key generation unit used for generating a symmetric encryption key CT according to a Session Key (SEK) received by the SIM card and an identity (ID) of the SIM card; and a CW acquisition unit used for decrypting, according to the symmetric encryption key CT, an ECW sent by the authentication server, to obtain a CW. The authentication server includes an SEK generation unit used for randomly generating a string and taking the string as an SEK; and an SEK sending unit used for sending the SEK to the SIM card module. | 2014-01-30 |
20140032899 | Method and system for secure form delivery - A system, for secure form delivery, may include a detector to detect a request to submit an electronic form that includes associated application data; an encryption module to respond to the request to submit the electronic form by automatically accessing an encryption key, determining destination information, and encrypting the associated application data, utilizing the encryption key; and a submit module to submit the electronic form to a destination, utilizing the destination information. | 2014-01-30 |
20140032900 | VERSIONING OF MODIFIABLE ENCRYPTED DOCUMENTS - In some embodiments, a method includes receiving a modifiable electronic document. The method includes generating a new version of the modifiable electronic document. The method also includes encrypting the new version of the modifiable electronic document using an encryption key that is used to encrypt the modifiable electronic document and different versions of the modifiable electronic document. The method includes saving the new version of the modifiable electronic document. | 2014-01-30 |
20140032901 | SYSTEM FOR PROVIDING SESSION-BASED NETWORK PRIVACY, PRIVATE, PERSISTENT STORAGE, AND DISCRETIONARY ACCESS CONTROL FOR SHARING PRIVATE DATA - The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored information, which is accomplished by imposing mechanisms that separate a user's actions from their identity. The system provides (i) anonymous network browsing, in which event the anonymity system is unaware of both the user's identity and browsing activities, (ii) private network storage and retrieval of data such as passwords, profiles and files in a manner such that the data can be stored into the system and later retrieved without the system knowing the contents or owners of the data, and (iii) the ability of the user to control and manage access to the remotely stored data without the system knowing the contents, owners, or accessors of the data. | 2014-01-30 |
20140032902 | Cryptographic binding of multiple secured connections - In some embodiments, a method includes establishing a secured connection between a client device and a subordinate web service of a single sign-on service for a user, using a shared cryptographic key in a cookie stored on the client device that was transmitted over a different secured connection by a master web service of the single sign-on service, as part of authentication of the user for the single sign-on service. | 2014-01-30 |
20140032903 | SECURE KEY DISTRIBUTION WITH GENERAL PURPOSE MOBILE DEVICE - One embodiment is directed to a method for managing cryptographic information. The method includes initiating cryptographic information loading application on a general purpose mobile device (GPMD) and establishing a connection between the GPMD and a server that includes cryptographic information. Authentication input is received from a user of the GPMD. Data identifying the GPMD and the authentication input is sent from the GPMD to the server for authentication of the GPMD and the user. The GPMD also sends data identifying an electronic device into which cryptographic information is to be loaded. In response, the GPMD receives cryptographic information for the electronic device at the GPMD from the server. The GPMD then sends the cryptographic information from the GPMD to the electronic device for loading therein. | 2014-01-30 |
20140032904 | SECURING PRIVATE INFORMATION IN PUBLIC, PRIVATE AND MOBILE DEVICES - Technologies are generally disclosed for methods and systems for securing data. An example method may include storing, by a processing device, the data in a memory. The data may be encrypted and accessible only with the use of a decryption key. The method may further include receiving, by the processing device, one or more permission requests to access the data and requesting, by the processing device, the decryption key. In response to receiving the decryption key, the method may include authenticating, by the processing device, the decryption key to verify one or more permissions, and allowing, by the processing device, access to the data in accordance with the one or more permissions. | 2014-01-30 |
20140032905 | EFFICIENT KEY DERIVATION FOR END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY - Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: | 2014-01-30 |
20140032906 | CRYPTOGRAPHIC AUTHENTICATION TECHNIQUES FOR MOBILE DEVICES - A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device regenerates a credential containing a key pair from a PIN and a protocredential, and authenticates cryptographically to a verifier black-box in the back-end subsystem; then the verifier black-box sends an authentication token to the prover black-box as verifiable confirmation of the cryptographic authentication, the prover black-box sends the authentication token to an application front-end in the computing device, the application front-end sends the authentication token to an application back-end in the back-end subsystem, and the application back-end verifies the authentication token. | 2014-01-30 |
20140032907 | PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE - A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate. | 2014-01-30 |
20140032908 | METHOD FOR MANAGING REMOTE UPGRADING KEYS IN AN INFORMATION SECURITY APPARATUS - The present invention discloses a method for managing remote upgrading keys in an information security apparatus. A remote source apparatus generates key disabling data according to a divulged remote upgrading key and sends the key disabling data to the information security apparatus, and the information security apparatus performs the disabling operation on the divulged remote upgrading key according to the received key disabling data. Using the method disclosed in the present invention can prevent the information security apparatus from being maliciously attacked by malicious attackers by using the divulged remote upgrading key and through the remote upgrading process. | 2014-01-30 |
20140032909 | METHOD AND APPARATUS FOR PUBLIC KEY CRYPTOGRAPHY - Method and apparatus are described wherein, in one example embodiment, a first entity shares a digital file such as a digital image with a second entity, and the first entity and the second entity each use the digital file as a seed to generate identical public/private key pairs using the same key generation procedure, such that both entities hold identical key pairs. The first and second entities may use the key pairs to encrypt, decrypt, or sign and authenticate communications between the entities. | 2014-01-30 |
20140032910 | STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED - According to one embodiment, a storage system includes a host device, a secure storing medium, and a non-secure storing medium. The secure storing medium includes a memory provided with a protected first storing region which stores secret information sent from the host device, and a second storing region which stores encoded contents, and a controller which carries out authentication processing for accessing the first storing region. The host device and the secure storing medium produce a bus key which is shared only by the host device and the secure storing medium by authentication processing, and which is used for encoding processing when information of the first storing region is sent and received between the host device and the secure storing medium. The host device has the capability to request the secure storing medium to send a status. | 2014-01-30 |
20140032911 | KEY AGREEMENT AND TRANSPORT PROTOCOL - A key establishment protocol includes the generation of a value of cryptographic function, typically a hash, of a session key and public information. This value is transferred between correspondents together with the information necessary to generate the session key. Provided the session key has not been compromised, the value of the cryptographic function will be the same at each of the correspondents. The value of the cryptographic function cannot be compromised or modified without access to the session key. | 2014-01-30 |
20140032912 | TRUST CONTEXT FOR DOCUMENT SIGNATURES - Apparatus, systems, and methods may operate to access electronic content comprising a document file including document content data, digital signature data, and digital signature trust context data including a previously-stored version number. Additional activities may include executing instructions included in a document processing application to access the digital signature trust context data and to obtain a trusted version number from a digital signature trust settings file, comparing the trusted version number with the previously-stored version number, and indicating the previously-stored version number is not current when the previously-stored version number is not greater than or equal to the trusted version number. Additional apparatus, systems, and methods are disclosed. | 2014-01-30 |
20140032913 | METHODS AND APPARATUS FOR VALIDATING A DIGITAL SIGNATURE - Various embodiments include one or more of systems, methods, software, and data structures for validating a digital signature, wherein common information in a certification chain is maintained in one entry of a Document Secure Store (DSS). The DSS separates the Long Term Validation (LTV) information from the digital signature, allowing amendment of and addition to the LTV information in the DSS after a digital signature is applied to a document. | 2014-01-30 |
20140032914 | POLICY-BASED SIGNATURE AUTHENTICATION SYSTEM AND METHOD - In various example embodiments, a system and method for providing policy-based authentication is provided. in example embodiments, a request to access and sign a document is received from a device of an intended signer. A policy assigned to the intended signer is determined. Based on the policy, a determination is made whether an authentication mechanism is applicable to the intended signer. In response to the determining that the authentication mechanism is applicable to the intended signer, the intended user is required to perform the authentication mechanism. The intended user is provided access to view and sign the document based on the intended user satisfying the authentication mechanism. | 2014-01-30 |
20140032915 | METHOD AND APPARATUS FOR VALIDATING THE INTEGRITY OF INSTALLER FILES PRIOR TO INSTALLATION - A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file. | 2014-01-30 |
20140032916 | SECURED FLASH PROGRAMMING OF SECONDARY PROCESSOR - A system and method for securely flashing a controller, where the controller includes at least one main processor and at least one secondary processor, and where the processing duties are distributed between the processors. A programming tool provides a content file to be flashed and a digital signature to the controller. The controller calculates a hash value of the content file, decrypts the digital signature using a public key to generate a decrypted hash value, compares the decrypted hash value to the calculated hash value, and determines that the content file is valid if the decrypted hash code matches the calculated hash value, where one or more of the steps of calculating the hash value, decrypting the digital signature, comparing the decrypted hash value to the calculated hash value and determining that the content file is valid, is performed by the main processor for the secondary processor. | 2014-01-30 |
20140032917 | GROUP SIGNATURE PROCESSING DEVICE FOR PROCESSING A PLURALITY OF GROUP SIGNATURES SIMULTANEOUSLY - A plurality of group signature processes is executed in parallel with a small number of processing devices and small power consumption, without lowering an average response speed. A signature processing device includes subsystems for each type of basic operations included in a signature processing procedure. Each subsystem has a configuration in which one or more basic operation execution units and a dispatcher that monitors operation states thereof and instructs to execute an operation are interconnected. A plurality of signature generation requests or signature verification requests is accepted as a single input, and a plurality of requests is simultaneously processed in parallel. At this time, each subsystem assigns operations in different requests to unoccupied basic operation units and causes the basic operation units to simultaneously execute the operations, without being occupied with a single request. | 2014-01-30 |
20140032918 | METHOD FOR BUIDLING AND TRANSMITTING A WATERMARKED CONTENT, AND METHOD FOR DETECTING A WATERMARK OF SAID CONTENT - The present invention concerns a method for building a watermarked content for sending to at least one user unit having a user unit identifier, the watermarked content comprising a first series of packets, at least some from the first series of packets being available in at least two different qualities, wherein said method comprises the steps of:
| 2014-01-30 |
20140032919 | DOCUMENT DE-REGISTRATION - A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures in a signature database, each signature being associated with one of a plurality of registered documents. In one embodiment, the invention further includes maintaining the signature database by de-registering documents by removing the signatures associated with de-registered documents. In one embodiment, the invention further includes maintaining the database by removing redundant and high detection rate signatures. In one embodiment, the invention also includes maintaining the signature database by removing signatures based on the source text used to generate the signature. | 2014-01-30 |
20140032920 | Secure Virtual Machine Provisioning - A device and method in a provisioning unit of secure provisioning of a virtual machine on a target platform having a specific configuration is provided. The method comprising: receiving ( | 2014-01-30 |
20140032921 | Protecting data on a mobile device - A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data. | 2014-01-30 |
20140032922 | BLIND HASHING - A blind hashing system and method are provided in which blind hashing is used for data encryption and secure data storage such as in password authentication, symmetric key encryption, revocable encryption keys, etc. The system and method include using a hash function output (digest) as an index or pointer into a huge block of random data, extracting a value from the indexed location within the random data block, using that value to salt the original password or message, and then hashing it to produce a second digest that is used to verify the password or message, encrypt or decrypt a document, and so on. A different hash function can be used at each stage in the process. The blind hashing algorithm typical runs on a dedicated server and only sees the digest and never sees the password, message, key, or the salt used to generate the digest. | 2014-01-30 |
20140032923 | System and device for authenticating a user - A system for authenticating a user trying to access a service ( | 2014-01-30 |
20140032924 | MEDIA ENCRYPTION BASED ON BIOMETRIC DATA - Embodiments of techniques and systems for biometric-data-based media encryption are described. In embodiments, an encryption key may be created for a recipient user based at least in part on biometric data of the recipient user. This encryption key may be maintained on a key maintenance component and used by a sharing user to encrypt a media file for access by the recipient user. One or more access policies associated with recipient user may be encrypted in the encrypted media file as well. In embodiments, the media file may be encrypted for use by multiple recipient users. When a recipient user desires to access the encrypted media file, a decryption key may be generated in real time based on contemporaneously captured biometric data and used to provide access to the encrypted media file. Other embodiments may be described and claimed. | 2014-01-30 |
20140032925 | SYSTEM AND METHOD FOR COMBINING DEDUPLICATION AND ENCRYPTION OF DATA - The embodiments herein relate to data management and, more particularly, to global deduplication and encryption of data in data management systems. The user equipments (UE) are grouped under certain deduplication groups based on certain parameters such as rate of data exchange, frequency of data exchange, social closeness, work closeness, similarity of data and interests and so on, between those UEs. Further, specific deduplication and encryption parameters such as encryption method, encryption key, signature computation method, block computation method and so on are assigned to each group. Further, deduplication and encryption of data in each group is performed using the deduplication and encryption modes and parameters assigned to each group. The deduplication and encryption of data is performed in at least one of the UEs and/or a server. Further, the parameters used for deduplication and encryption are stored in specific databases and are encrypted for better security. | 2014-01-30 |
20140032926 | SYSTEM, METHOD AND COMPUTER PRODUCT FOR FAST AND SECURE DATA SEARCHING - A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a user via the user interface and configured to perform user authentication, and a database layer in communication with and accessible by the web layer and comprising a database configured for storing data, and a search engine configured for searching the database, wherein, communication to and from the database layer from and to the web layer is controlled by secure socket layer certificate authorization. The database layer may also include an inverted index in communication with the database and the search engine and configured for maintaining updated snapshots relating to the data in the database and an encryption/decryption layer for selective encryption of the data and configurable for field level, document level, and/or chunk level encryption. | 2014-01-30 |
20140032927 | ARCHIVING ELECTRONIC CONTENT HAVING DIGITAL SIGNATURES - In various embodiments, a computerized method includes receiving electronic content to be archived. The electronic content comprises a digital signature. The method may include archiving the digital signature, by determining a validity status of the digital signature and storing the validity status in the electronic content. The method may also include archiving the electronic content after the validity status has been stored in the electronic content. | 2014-01-30 |
20140032928 | SECURE LOOKUP - A method for secure data transformation and lookup is executed by a computer system. A data value to create an encrypted value is encrypted by the computer system. A hash value based on the encrypted value is generated by the computer system. A modulo operation is performed by the computer system on the hash value to create a modulo value. A transformed value from a lookup table is retrieved by the computer system by using the modulo value as an index for the look up table. The transformed value is provided by the computer system. | 2014-01-30 |
20140032929 | METHOD, DEVICE, AND SYSTEM FOR ENCRYPTING AND DECRYPTING IMAGE - The present invention relates to the field of computers, and disclosed are a method, device, and system for encrypting and decrypting an image. The method for encrypting an image includes: encrypting a preset size of header data of a to-be-encrypted image, and obtaining an encrypted data corresponding to the header data; determining a storage location for saving the encrypted data, saving the encrypted data in the storage location, and acquiring an offset for saving the encrypted data; and placing the encryption identifier and the offset in a storage area of the preset size of the to-be-encrypted image, so as to encrypt the to-be-encrypted image. The system includes: a device for encrypting an image and a device for decrypting an image. The present invention is capable of improving the speed and efficiency of encrypting and decrypting an image. | 2014-01-30 |
20140032930 | Secure data scanning method and system - A method of scanning secure data in a data store is performed in a manner that does not expose the scan data, the files being searched, or information about when matches occur between the scan data and the files. During the scan process, encrypted versions of searched files are compared to encrypted versions of match strings, and any resulting match data is encrypted before being written into a results file. In addition, to disguise when match entries are written, during the scan one or more encrypted dummy items are written into the results file. | 2014-01-30 |
20140032931 | CRYPTOGRAPHIC EQUIPMENT IMPLEMENTING RED/BLACK COMMUNICATION MODES - The invention relates to cryptographic equipment which comprises an input interface, a red module, a cryptographic module, a black module, and an output interface. The cryptographic module includes a cryptographic unit, which interacts with the red module and with the black module, and a management device, which interacts with the input interface and with either the red module or the black module, but not with both simultaneously. The cryptographic unit and the management device are physically and logically separate from one another and independent, and have identical protection means capable of protecting the integrity of the management device so as to detect any attempt at tampering. | 2014-01-30 |
20140032932 | METHOD, MANUFACTURE, AND APPARATUS FOR SECURE DEBUG AND CRASH LOGGING OF OBFUSCATED LIBRARIES - A method, apparatus, and manufacture for debugging and crash logging is provided. A log file is received, where the log file includes encrypted log messages that indicate execution trace of obfuscated code while leaving code locations of corresponding code in the obfuscated code unknown. The encrypted log messages include execution way-point indices. Next, at least a portion of the log file is then decrypted. A debug log viewer is then employed to view the decrypted log file. The debug log viewer includes an execution way-point manifest that correlates each of the execution way-point indices to a corresponding code location. | 2014-01-30 |
20140032933 | PROVIDING ACCESS TO ENCRYPTED DATA - Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed. | 2014-01-30 |
20140032934 | STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED - According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the secure storage by authentication processing, and which is used for encoding processing. The host device produces a message authentication code including a message which can be stored in the secure storage based on the bus key, and sends the produced message authentication code to the secure storage. The secure storage stores the message included in the message authentication code in accordance with instructions of the host device. The host device verifies whether the message stored in the secure storage is intended contents. | 2014-01-30 |
20140032935 | MEMORY SYSTEM AND ENCRYPTION METHOD IN MEMORY SYSTEM - An encryption method used in the memory system includes; generating a private key using physical unique identification (PUID) information of a nonvolatile memory device, encrypting data using the private key, and then programming the encrypted data in the nonvolatile memory device. | 2014-01-30 |
20140032936 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus includes a volatile storage unit, nonvolatile storage unit, and control unit configured, in a case where a factor to shift the information processing apparatus to a state in which power supply to the volatile storage unit is stopped exists, to encrypt and store information, stored in a specific region in the volatile storage unit, in the nonvolatile storage unit, and to store, in the nonvolatile storage unit in unencrypted form, information stored in a region other than the specific region, and configured, in a case where a factor to shift the information processing apparatus to a state in which power is supplied to the volatile storage unit exists, to decrypt and store the encrypted information, stored in the nonvolatile storage unit, in the volatile storage unit, and to store, in the volatile storage unit, the unencrypted information stored in the nonvolatile storage unit. | 2014-01-30 |
20140032937 | SYSTEMS AND METHODS FOR INFORMATION SECURITY USING ONE-TIME PAD - Methods of encryption and decryption using a key generated from a common document are disclosed. In one embodiment, the method of encryption includes: (1) generating a single pointer to a position in a common document, wherein the pointer includes either a page number and a line number of the common document or a chapter number and a paragraph number of the common document, (2) receiving a message to be encrypted, (3) retrieving, from a computer memory, a key from the common document based on the pointer and having a length at least equaling a length of the message, (4) applying a cryptographic function to characters of the message based on characters of the key (5) causing the message to be stored in a memory device and (6) generating a new pointer to a different position in the common document. | 2014-01-30 |
20140032938 | Power Management - A system includes a power supply system, a power management system, and a module. The module communicates to the power management system a variable parameter indicating power usage by the module and the power management system changes an operating range of the power supply system in response to the communication from the module. | 2014-01-30 |
20140032939 | APPARATUS POWER CONTROL - The present disclosure includes apparatuses and methods for apparatus power control. A number of embodiments include determining a power profile for each of a number of commands in a command queue that are ready for execution and selecting a portion of the number of commands in the command queue for execution based on the power profiles of the number of commands to control power consumption in the apparatus. | 2014-01-30 |
20140032940 | DISTRIBUTED FILE SYSTEM AT NETWORK SWITCH - Embodiments herein relate to running a distributed file system on a network switch. The distributed file system is to manage access to a plurality of storage drives that store data and are connected to the network switch. | 2014-01-30 |
20140032941 | SEMICONDUCTOR DEVICE EMPLOYING DVFS FUNCTION - Disclosed herein is a device that includes: a memory cell array including a plurality of memory cells, the memory cell array operates on a first internal voltage; a peripheral circuit accessing selected one or ones of the memory cells, the peripheral circuit operates on a second internal voltage; a first internal voltage generation circuit that supplies the first internal voltage to the memory cell array; and a second internal voltage generation circuit that supplies the second internal voltage to the peripheral circuit. The second internal voltage generation circuit sets the second internal voltage to a first voltage value in a first mode, and to a second voltage value that is different from the first voltage value in a second mode. The first internal voltage generation circuit sets the first internal voltage to a third voltage value in both the first and second modes. | 2014-01-30 |
20140032942 | VOLTAGE REGULATOR, SEMICONDUCTOR DEVICE, AND DATA PROCESSING SYSTEM - A voltage regulator has a voltage converter circuit and a control unit. The control unit controls the voltage converter circuit so that an output voltage attains a target voltage when the voltage regulator is in a no-load condition so as to have a transition characteristic in which the output voltage decreases with increase in the load current. The control unit calculates deviation between the output voltage and an ideal value thereof when a load condition of the voltage regulator is a first load condition, and corrects the target voltage by the output voltage adjustment unit. so The control unit also calculates deviation between rate of change of the output voltage with respect to the load current and an ideal value thereof, and corrects the transition characteristic so that the deviation becomes small to minimize deviation. | 2014-01-30 |
20140032943 | Cable with Memory - A cable for providing electric power from a power source to a mobile device, the cable having a first connector at a first end of the cable for connecting the cable to a mobile device and with a second connector at a second end for connecting the cable to the power source, wherein the cable comprises a memory module for backup and bidirectional transfer of data to and from the mobile device. | 2014-01-30 |
20140032944 | Early Detection of Overheating Devices - A method is provided that monitors the odor within the physical enclosure of a computing device that includes one or more components. The method includes determining whether the odor within the physical enclosure is indicative of an overheating component that is overheating within the physical enclosure of the computing device. Determining whether the odor within the physical enclosure may include an artificial neural network (“ANN”) to determine whether the odor is indicative of an overheating component. The method includes initiating an overheating protocol in response to determining that the odor within the physical enclosure is indicative of an overheating component. The method may, for example, alert the user and/or applications that a component is overheating. | 2014-01-30 |
20140032945 | Packet-Based Digital Display Interface Signal Mapping to Micro Serial Interface - A passive cable adaptor for connecting a data source device with a display device is described. The adaptor has a packet-based interface connector at one end, the connector having a positive main link pin, a negative main link pin, a positive auxiliary channel pin, and a negative auxiliary channel pin. At the other end is a micro serial interface connector, wherein multimedia content is transmitted over the cable adaptor and electrical power is supplied over the cable adaptor simultaneously. The cable adaptor has an auxiliary and hot plug detect (HPD) controller utilized to map the auxiliary channel and HPD signals of the packet-based digital display to the micro serial interface ID signal. | 2014-01-30 |
20140032946 | POWER SUPPLY CONTROL ACROSS INDEPENDENTLY POWERED MODULES IN A STORAGE LIBRARY - Embodiments include systems and methods for controlling power distribution and supply across independently powered modules in a storage library. Embodiments operate in context of a data storage library having a base module and one or more expansion modules. Each expansion module is independently powered, and each is in communication with the base module via a powered data communications network. In some embodiments, when the base module power supply is on, a base controller in the base module provides network power over the powered data communications network. The network power causes expansion controllers in each expansion module to boot up and power on the power supplies of their respective modules. When the base module is powered down, power is no longer available to the expansion controllers, and the respective power supplies can be hard-coded to shut down automatically under that condition. | 2014-01-30 |
20140032947 | TRAINING, POWER-GATING, AND DYNAMIC FREQUENCY CHANGING OF A MEMORY CONTROLLER - A method for managing a memory controller comprising selecting a low-power state from a plurality of low-power states. The method further comprises transitioning to the low-power and entering the low-power state when the transition is complete, provided a wake-event has not been received. An apparatus comprises a controller configured to select a power state for transition, a state-machine configured to execute steps for transitions between power states of a memory controller connected by a bus to a memory, a storage configured to store at least one context, and a context engine configured to stream, at the direction of the state-machine engine, the at least one context to the memory controller. Streaming comprises communicating N portions of context data as a stream to N registers in the memory controller. A context comprises a plurality of calibrations corresponding to a state selected for transition. | 2014-01-30 |
20140032948 | MULTI-HOST SATA CONTROLLER - Described herein is a system having a multi-host SATA controller ( | 2014-01-30 |
20140032949 | SYSTEM ON CHIP AND TEMPERATURE CONTROL METHOD THEREOF - A temperature control method of a semiconductor device is provided. The temperature control method includes detecting a temperature of the semiconductor device; activating a reverse body biasing operation in which a body bias voltage applied to a function block of the semiconductor device is regulated, when the detected temperature is greater than a first temperature level; and activating a thermal throttling operation in which at least one of a frequency of a driving clock provided to a function block of the semiconductor device and a driving voltage applied to the function block of the semiconductor device is regulated, when the detected temperature is greater than a second temperature level that is different than the first temperature level. | 2014-01-30 |
20140032950 | METHOD, APPARATUS, AND SYSTEM FOR OPTIMIZING FREQUENCY AND PERFORMANCE IN A MULTIDIE MICROPROCESSOR - With the progress toward multi-core processors, each core is can not readily ascertain the status of the other dies with respect to an idle or active status. A proposal for utilizing an interface to transmit core status among multiple cores in a multi-die microprocessor is discussed. Consequently, this facilitates thermal management by allowing an optimal setting for setting performance and frequency based on utilizing each core status. | 2014-01-30 |
20140032951 | Method and System for Adaptive Enhanced Power Saving for Peer to Peer Group Owner - A method and system for saving power in a peer-to-peer group owner. The group owner uses an adaptive absence method for deciding the absence of the group owner based on the amount of data traffic in the network. The group owner periodically sends period of absence information with dynamic values to client devices, informing them of the dynamically changing period of absence. | 2014-01-30 |
20140032952 | ELECTRONIC APPARATUS AND DRIVE CONTROL METHOD THEREOF - An electronic apparatus includes an input unit to receive a DC electric power from an adapter, a battery unit to store the received DC electric power therein, a first control unit to drive the electronic apparatus by using the electric power of the battery unit or the electric power received from the input unit in a first operation mode, and to drive the electronic apparatus by using both the electric power of the battery unit and the electric power received from the input unit in a second operation mode, and a comparing circuit unit to allow the first control unit to drive the electronic apparatus in a third operation mode having a power consumption lower than the first and second operation modes when the DC electric power input from the adapter is blocked. | 2014-01-30 |
20140032953 | BATTERY CHARGE SYSTEM AND METHOD CAPABLE OF OPERATING IN DIFFERENT CONFIGURATIONS - A controller configurable to operate in either in an NVDC mode or a standard mode. The controller includes mode logic that detects a mode value indicative of the selected mode and that asserts a corresponding mode signal, and control logic that is configured to operate according to the selected battery charging mode based on the mode signal and that provides a control signal accordingly. In the standard mode, the control signal is in either an on or off state depending upon presence of an external adapter and the charge state of the battery. In the NVDC mode, the control signal may operate in a linear mode if the battery is deeply discharged. A battery detector provides a battery indication that is used to switch the regulation operating point of an external system voltage. A power monitor output provides an indication of power being provided via the system voltage. | 2014-01-30 |
20140032954 | DYNAMIC CONTROL OF REDUCED VOLTAGE STATE OF GRAPHICS CONTROLLER COMPONENT OF MEMORY CONTROLLER - A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller component of a memory controller. The reduction in voltage may cause the voltage to be reduced below a voltage level required to maintain context information in the graphics controller component. | 2014-01-30 |
20140032955 | METHOD, DEVICE, AND SYSTEM FOR DELAYING PACKETS DURING A NETWORK-TRIGGERED WAKE OF A COMPUTING DEVICE - A method, device, and system for delaying delivery of incoming packets during a network-triggered wake of a host computing device includes receiving one or more packets from a remote computing device over a network. The host computing device holds or buffers incoming packets to delay delivery while one or more components transition from a low-power power-managed state to an operational power-managed state. The host computing device may hold and release the packets after passage of a reference time. Additionally, the host computing device may hold and release, buffer and inject, or buffer and replay the packets upon receiving notification that one or more components has transitioned from a low-power state to an operational state. The delayed packets may be acknowledged to the remote computing device to reduce or minimize the overall time needed to establish a connection. | 2014-01-30 |
20140032956 | ULTRA-DEEP POWER-DOWN MODE FOR MEMORY DEVICES - A memory device includes a voltage regulator, whose output provides a voltage supply for various other components of the memory device, including a command user interface. The memory device is placed into an ultra-deep power-down mode by providing to the memory device a software command, which causes the output of the voltage regulator to be disabled. To bring the memory device out of the ultra-deep power-down mode, a chip select signal is provided to the memory device, which includes a wake-up circuit that remains powered on even when the memory device is in the ultra-deep power-down mode. Receipt of the chip select signal while the memory device is in the ultra-deep power-down mode causes the output of the voltage regulator to be enabled, thereby providing power to the components that were completely powered down. | 2014-01-30 |
20140032957 | SYNCHRONOUS MODE REPLICATION TO MULTIPLE CLUSTERS - Provided are a computer program product, system, and method for synchronous mode replication to multiple clusters receiving a write to a volume from a host. A received write is cached in a memory. A determination is made of a replication rule indicating one of a plurality of replication modes for a first cluster and a second cluster used for replication for the write, wherein one of the replication modes comprises a synchronous mode. A determination is made that the replication rule indicates a synchronous mode for the first and the second clusters. The write is transmitted from the memory to the first cluster to store in a first non-volatile storage of the first cluster and to the second cluster to store in a second non-volatile storage in response to determining that the replication rule indicates the synchronous mode. | 2014-01-30 |
20140032958 | CLUSTERED FILESYSTEMS FOR MIX OF TRUSTED AND UNTRUSTED NODES - A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory access control label as an extended attribute of each filesystem object regardless of whether required by a client node accessing the filesystem object. The mandatory access control label indicates the sensitivity and integrity of the filesystem object and is used by the trusted metadata server(s) to control access to the filesystem object by all client nodes. | 2014-01-30 |
20140032959 | System and Method of Replicating Virtual Machines for Live Migration Between Data Centers - A method of replicating tiered data includes copying a volume from a first tiered storage array of a primary processing site to a second tiered storage array of a failover processing site, wherein the volume is tiered with a first tiered organization in both the first and second tiered storage arrays, directing from a first storage controller of the primary processing site that a second storage controller of the failover processing site stop tiering the volume on the second tiered storage array, changing the first tiered organization of the volume in the first tiered storage array to a second tiered organization, and changing the first tiered organization of the volume in the second tiered storage array to the second tiered organization. | 2014-01-30 |
20140032960 | INFORMATION PROCESSING SYSTEM AND ACCESS CONTROL METHOD - An information processing system includes a plurality of storage devices, a plurality of data access devices, and a first processor. The first processor selects, when a first data access device permitted to access data in a first storage device fails, a second data access device other than the first data access device. The first data access device is included in the plurality of data access devices. The first storage device is included in the plurality of storage devices. The second data access device is included in the plurality of data access devices. The first processor permits the second data access device to access data in the first storage device. The first processor updates correspondence information, which indicates the first data access device as a transfer destination of a request to access first data in the first storage device, to indicate the second data access device as the transfer destination. | 2014-01-30 |
20140032961 | PESSIMISTIC DATA READING IN A DISPERSED STORAGE NETWORK - A method begins by a processing module receiving a data retrieval request and determining a read threshold number of dispersed storage (DS). The method continues with the processing module sending read request messages to DS units and receiving encoded data slices to produce received encoded data slices. The method continues with the processing module determining an incremental number of encoded data slices based on the number of received encoded data slices, determining an incremental number of DS units, and sending a read request message to each of the incremental number of DS units when the number of received encoded data slices compares unfavorably to a decode threshold number. The method continues with the processing module dispersed storage error decoding the received encoded data slices to produce data when the number of received encoded data slices compares favorably to the decode threshold number of encoded data slices. | 2014-01-30 |
20140032962 | System and Methods for Self-Healing From Operating System Faults in Kernel/Supervisory Mode - A method, apparatus, and computing system are provided for self-healing from a fault in an operating system (OS) without crashing the OS. In one example, the method includes detecting, isolating, and repairing a faulty kernel code module without affecting the run-time operation of other, properly function, portions of the OS. In another example, the apparatus comprises a variety of modules, including, for instance, a kernel level fault detector and a kernel level fault manager, that are configured to execute steps of the method. In another example, the computing system includes an OS that has at least some modularized kernel code sections, and a self-healing code for detecting, isolating, and repairing failures occurring in one or more of the modularized kernel code sections without crashing the OS. | 2014-01-30 |
20140032963 | MESSAGE SEQUENCE GENERATION METHOD AND MESSAGE SEQUENCE GENERATION DEVICE - A message sequence generation method and a message sequence generation device, by which a message sequence with an error handling added thereto can be efficiently generated. The method includes setting an action for a specific phenomenon in the phenomenon causal relationship model, associating each element included in the message sequence information with each phenomenon to generate element/phenomenon correspondence information, storing the element/phenomenon correspondence information into a memory device, and acquiring the action set for the phenomenon corresponding to each element and the action set for another phenomenon caused by the phenomenon, from the element/phenomenon correspondence information, and adding the actions to the element as an error handling. | 2014-01-30 |
20140032964 | AUTOMATIC DATA REQUEST RECOVERY AFTER SESSION FAILURE - Techniques for recovering from session failures between clients and database servers are described herein. A session may be established between a client and a first database server to handle a database query for the client. A command of the session may be received by the first database server from the client. Data requested by the command may be retrieved. Prior to responding to the command, the data is spooled to a session state stored in a repository of the first database server, and the session state is replicated to one or more additional database servers. The session state stored in the repository of the first database server enables the first database server and client to recover from a failure of the session. The replicated session state enables the additional database server(s) to reestablish the session and respond to the command, instead of the first database server, if the session fails. | 2014-01-30 |
20140032965 | MONITORING DEVICE, INFORMATION PROCESSING APPARATUS, AND MONITORING METHOD - A monitoring device includes a detection unit which is inserted between the device to be monitored and a processing apparatus performing processing for the device to be monitored and detects a failure which occurs in the device to be monitored, a notification unit generating failure information indicating a content of the failure detected by the detection unit and notifying the generated failure information and the occurrence of the failure to the processing apparatus, and an acquisition unit acquiring status information after the occurrence of the failure of the device to be monitored from the device to be monitored and storing the acquired status information in a storage unit as the failure occurs. | 2014-01-30 |
20140032966 | Hardware verification using ACCELERATION platform - A method, apparatus and product for hardware verification using acceleration platform. The method comprising executing a first post-silicon testing program by a reference model, wherein during said executing the first post-silicon testing program one or more test-cases are generated; generating a second post-silicon testing program that is configured to execute the one or more test-cases; and executing the second post-silicon testing program on an acceleration platform. | 2014-01-30 |
20140032967 | SAS SELF-TEST OPERATIONS - A self-test engine to manage self-test mode operations between adjacent PHYs of a serial-attached SCSI (SAS) topology. | 2014-01-30 |
20140032968 | CACHE SELF-TESTING TECHNIQUE TO REDUCE CACHE TEST TIME - A method for identifying, based on instructions stored externally to a processor containing a cache memory, a functional portion of the cache memory, then loading cache test code into the functional portion of the cache memory from an external source, and executing the cache test code stored in the cache memory to test the cache memory on a cache-line-granular basis and store fault information. | 2014-01-30 |
20140032969 | Post-silicon validation using a partial reference model - Method, system and product for post silicon validation using a partial reference model. The method performed by a device having registers, the method comprising: first executing, by the device when operating in trace mode, a test-case, wherein during the execution utilizing a partial reference model to determine an expected value of at least one register; second executing, by the device when operating in non-trace mode, the test-case; and in response to said second executing, checking values of registers based on, at least in part, values determined during said first execution. | 2014-01-30 |
20140032970 | SAFETY CIRCUIT OF AN ELEVATOR, AND METHOD FOR IDENTIFYING A FUNCTIONAL NONCONFORMANCE OF A SAFETY CIRCUIT OF AN ELEVATOR - The invention relates to a safety circuit of an elevator and also to a method for identifying a functional nonconformance of the safety circuit of an elevator. In the method a message is formed in node A, a testing field is added to the message for testing the operation of the safety circuit of an elevator, and the aforementioned message containing the testing field is sent from node A to the communications bus in the safety circuit of the elevator. | 2014-01-30 |
20140032971 | Computer-Implemented Methods and Systems for Testing Online Systems and Content - Computer-implemented methods and systems are provided for scanning web sites and/or parsing web content, including for testing online opt-out systems and/or cookies used by online systems. In accordance with one implementation, a computer-implemented method is provided for testing an opt-out system associated with at least one advertising system that uses cookies. The method includes transmitting a first request to an opt-out system, wherein the first request corresponds to a first test for testing at least one of the opt-out system and an advertising system; receiving a first stream sent in response to the first request; determining a first outcome of the first test based on the first stream; and generating a report based on the first outcome. | 2014-01-30 |
20140032972 | METHOD OF ENGINEERING AND DIAGNOSING A FIELD DEVICE AND A SYSTEM THEREOF - A method is disclosed for engineering a field device by an engineering tool, which method can include identifying the field device, and configuring, parameterizing, diagnosing and commissioning the field device. Diagnosing the field device can include identifying one or more parameters that cause an error. Diagnosing the field device by an engineering tool can include identifying the parameter that causes an error through a device specific command. | 2014-01-30 |
20140032973 | SYSTEM AND METHOD FOR ROBUST PATTERN ANALYSIS WITH DETECTION AND CORRECTION OF ERRORS - A pattern analysis system and method that is robust against errors, misalignments and failures of process that may be caused by unexpected events. By performing multiple, redundant overlapping analyses with different operating characteristics and by actively testing for disagreements and errors, the invention detects errors and either corrects them or at least eliminates their harmful effects. The invention is especially effective in highly constrained situations, such as training a model to a script that is presumed correct or recognition with a highly constrained grammar or language model. In particular, it is effective when unexpected events may be rare but disastrous when they occur. The system and method handle errors that would otherwise be undetected as well as errors that would cause catastrophic failures. | 2014-01-30 |
20140032974 | METHOD FOR GENERATING DESCRIPTIVE TRACE GAPS - A method of managing a debug trace data stream by detecting conditions where the trace data generated exceeds the available transmission bandwidth, and inserting a trace data gap into the trace data stream. The gap may contain additional information relating to the amount and type of data that is being lost during the overflow condition. In an alternate embodiment the generated trace may be throttled to ensure the available bandwidth is not exceeded. | 2014-01-30 |
20140032975 | DYNAMIC HARDWARE WATCHPOINT - A method and apparatus for monitoring changes to a block of data is disclosed. A computer sets a first hardware watchpoint to monitor changes to the block of data at a current location of the block of data in memory and a second hardware watchpoint to monitor changes at a selected location in the memory where a reference to the block of data is located. Responsive to the second hardware watchpoint being triggered by a change at the selected location where the reference to the block of data is located, the computer identifies a new location of the block of data in the memory based on the change that triggered the second hardware watchpoint. Subsequent to identifying the new location of the block of data, the computer then resets the first hardware watchpoint to monitor changes to the block of data at the new location of the block of data. | 2014-01-30 |
20140032976 | APPARATUS AND METHOD FOR DETECTING ERROR - An apparatus and method for detecting an error occurring when an application program is executed in a computer environment is provided. The error detection apparatus may measure a deterministic progress index (DPI) and a program counter (PC) value when an instruction is executed, set, as a verification set, a DPI and a PC value measured when the instruction is executed without causing an error, set, as a measurement set, the DPI and the PC value measured when an instruction is executed, and detect a runtime error of the instruction by comparing the measurement set to the verification set. | 2014-01-30 |
20140032977 | MANAGING OPERATION PERFORMANCE - Systems and methods for managing operation performance are included herein. In one example, a method includes determining an operation execution time. The method also includes storing the operation execution time. Furthermore, the method includes calculating an operation performance characteristic based on the operation execution time. The method also includes determining a threshold based on the operation performance characteristic. Additionally, the method includes determining the operation execution time is above the threshold. In addition, the method includes providing a warning based at least on the operation performance characteristic and the threshold. | 2014-01-30 |
20140032978 | SERVER AND METHOD OF MONITORING BASEBOARD MANAGEMENT CONTROLLER - A server includes a baseboard management controller. The server controls a real time clock to send a clock signal to a platform controller hub (PCH) in a predefined interval. When a system management interrupt has been activated, the server executes a monitoring instruction to obtain a state value of the BMC. When the state value of the BMC is not the same as a normal state value, the server is restarted. An event log of the BMC is written to the BMC and an alarm is raised. | 2014-01-30 |
20140032979 | METHODS AND STRUCTURE FOR HARDWARE SERIAL ADVANCED TECHNOLOGY ATTACHMENT (SATA) ERROR RECOVERY IN A SERIAL ATTACHED SCSI (SAS) EXPANDER - Methods and structure for enhanced SAS expander functionality to store and forward buffered information transmitted from an initiator device to a target device and to process errors in control circuits of the expander without intervention from the general purpose programmable processor of the expander. A PHY of an expander is associated with control circuits that comprise buffering of commands to be forwarded to an end device directly coupled to the PHY. The control circuits locally process errors detected from the end device. The control circuits comprise a SATA host circuit adapted to communicate with a SATA end device to detect and clear error conditions and a SATA target circuit to communicate with one or more STP initiator devices to report and clear error conditions reported by the end device. The structures and methods may also service SAS connections (in addition to STP connections). | 2014-01-30 |
20140032980 | RESILIENT REGISTER FILE CIRCUIT FOR DYNAMIC VARIATION TOLERANCE AND METHOD OF OPERATING THE SAME - The disclosed system and method detect and correct register file read path errors that may occur as a result of reducing or eliminating supply voltage guardbands and/or frequency guardbands for a CPU, thereby increasing overall energy efficiency of the system. | 2014-01-30 |
20140032981 | INTERMEDIATE DATABASE MANAGEMENT LAYER - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for using an intermediate database management layer to manage communications between an application layer and a database layer. The database management layer can receive an initial communication from the application layer and transmit a subsequent communication to a particular database based upon a rule. The rules can specify the particular database based upon the initial communication and an availability status of the database. The rules specify criteria by which the initial communication is identified and logic specifying the particular database to receive the subsequent communication based upon the identification of the initial communication. The rules can specify a plurality of potential particular databases to receive the subsequent communication and an order in which to select one of the databases to receive the subsequent communication based upon the determined availability status of each of the potential particular databases. | 2014-01-30 |
20140032982 | Systems and Methods for Enhanced Media Defect Detection - Various embodiments of the present invention provide systems and methods for media defect detection. | 2014-01-30 |
20140032983 | Computer Program Product for Handling Communication Link Problems Between a First Communication Means and a Second Communication Means - A computer program product for handling communication link problems between a first communication means and a second communication means. Data signals, control signals and/or error information are transferred between the first communication means and the second communication means using the communication link. The method includes activating a static identification pattern in the first communication means representing an error information, and stopping a clock signal (Clk) inside the first communication means to freeze a present error condition, in response to a communication link problem being detected, and transferring the activated static identification pattern permanently and/or repeatedly to the second communication means using the communication link. | 2014-01-30 |
20140032984 | MEMORY MODULE AND A MEMORY TEST SYSTEM FOR TESTING THE SAME - A memory module includes a first rank, a second rank and a test control unit. The first rank includes a plurality of semiconductor memory devices configured to operate in response to a first chip selection signal. The second rank includes a plurality of semiconductor memory devices configured to operate in response to a second chip selection signal. The test control unit is configured to simultaneously enable the first and second chip selection signals to test the first and second ranks in a test mode. | 2014-01-30 |
20140032985 | SCAN TEST CIRCUITRY CONFIGURED TO PREVENT CAPTURE OF POTENTIALLY NON-DETERMINISTIC VALUES - An integrated circuit comprises scan test circuitry and additional circuitry subject to testing utilizing the scan test circuitry. The scan test circuitry comprises at least one scan chain having scan cells. The scan test circuitry is configured to control at least a given one of the scan cells so as to prevent the scan cell from capturing a potentially non-deterministic value from a portion of the additional circuitry. The portion of the additional circuitry that provides the potentially non-deterministic value may comprise, for example, at least one of a mixed signal logic block and a memory block of the additional circuitry. The given scan cell may be controlled by configuring the scan cell such that it is unable to capture data in a scan capture mode of operation in which it would otherwise normally be able to capture data. | 2014-01-30 |
20140032986 | SYSTEM AND METHOD FOR PERFORMING SCAN TEST - A system for performing a scan test on an integrated circuit such as a System on a Chip (SoC) that may be packaged in different package types and with different features enabled includes a bypass-signal generator and a first scan-bypass circuit. The bypass-signal generator generates a first bypass signal based on chip package information. The first bypass signal indicates whether a first scan chain associated with a first non-common circuit block of the SoC is to be bypassed. The first scan chain is bypassed in response to the first bypass signal. By enabling partial scan testing based on package information, unintentional yield loss caused by a full scan test determining an SoC is faulty can be avoided. | 2014-01-30 |
20140032987 | REPLACING LOST MEDIA DATA FOR NETWORK STREAMING - In one example, a device includes one or more processors configured to determine that data for at least a portion of a segment of media data has been lost after a remaining portion of the segment has been received via a network transmission in accordance with dynamic adaptive streaming over HTTP (DASH), based on the determination, prior to decoding the media data, add default data to the segment to replace the data that has been determined to be lost to form a replacement segment, and output media data of the replacement segment. | 2014-01-30 |
20140032988 | COMMUNICATION APPARATUS, TERMINAL APPARATUS AND COMMUNICATION METHOD - A loss correction encoding device having an improved capability of loss correction using LDPC-CC includes a rearranging unit that rearranges information data contained in n information packets according to the constraint length Kmax and the encoding rate (q−1)/q of a check polynomial of the loss correction code used in a loss correction encoding unit. Specifically, the rearranging unit rearranges the information data in such a way that continuous Kmax×(q−1) pieces of information data after rearrangement are contained in different information packets. The rearranging unit distributes the information data to information blocks from n information packets, where n satisfies the formula Kmax×(q−1)≦n. | 2014-01-30 |
20140032989 | Symbol Selective Scaling With Parity Forcing - The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for data processing systems with symbol selective scaling interacting with parity forcing. | 2014-01-30 |
20140032990 | Decoder and Method for Physically Unclonable Functions Using Threshold Decoding - A decoder comprises a feedback shift register having a plurality of register elements that implement a simplex code and take a register vector for determining an appropriate syndrome fed into the feedback shift register and stored in the plurality of register elements. A combination device algebraically combines a subset of the register elements and provides a combination result vector. A majority decision-making unit ascertains a most frequently occurring value within the combination result vector and provides it as a decision result. An input selector connects an input of the feedback shift register to an input interface arrangement or to an output of the majority decision-making unit, and provides an input vector by the input interface arrangement and corresponds to the ascertained form of the physical unclonable properties as a register vector and, and provides a decision vector comprising the decision result and further decision results as a register vector. | 2014-01-30 |