05th week of 2013 patent applcation highlights part 64 |
Patent application number | Title | Published |
20130031329 | INTEGRATED CIRCUIT AND SEMICONDUCTOR MEMORY DEVICE USING THE SAME - An integrated circuit includes a random address generation unit configured to generate a first random address for a data randomizing operation, an address conversion unit configured to convert the first random address and generate a second random address, and a synchronization output unit configured to sequentially output the first and second random addresses in synchronization with a clock signal. | 2013-01-31 |
20130031330 | ARRANGEMENT AND METHOD - A first arrangement including a first interface configured to receive a memory transaction having an address from a second arrangement; a second interface; an address translator configured to determine based on said address if said transaction is for said first arrangement and if so to translate said address or if said transaction is for a third arrangement to forward said transaction without modification to said address to said second interface, said second interface being configured to transmit said transaction, without modification to said address, to said third arrangement. | 2013-01-31 |
20130031331 | HIERARCHICAL IMMUTABLE CONTENT-ADDRESSABLE MEMORY COPROCESSOR - Intercepting a requested memory operation corresponding to a conventional memory is disclosed. The requested memory operation is translated to be applied to a structured memory. | 2013-01-31 |
20130031332 | MULTI-CORE SHARED PAGE MISS HANDLER - Methods and apparatus are disclosed for using a shared page miss handler device to satisfy page miss requests of a plurality of devices in a multi-core system. One embodiment of such a method comprises receiving one or more page miss requests from one or more respective requesting devices of the plurality of devices in the multi-core system, and arbitrating to identify a first page miss requests of the one or more requesting devices A page table walk is performed to generate a physical address responsive to the first page miss request. Then the physical address is sent to the corresponding requesting device, or a fault is signaled to an operating system for the corresponding requesting device responsive to the first page miss request. | 2013-01-31 |
20130031333 | METHOD AND APPARATUS FOR TLB SHOOT-DOWN IN A HETEROGENEOUS COMPUTING SYSTEM SUPPORTING SHARED VIRTUAL MEMORY - Methods and apparatus are disclosed for efficient TLB (translation look-aside buffer) shoot-downs for heterogeneous devices sharing virtual memory in a multi-core system. Embodiments of an apparatus for efficient TLB shoot-downs may include a TLB to store virtual address translation entries, and a memory management unit, coupled with the TLB, to maintain PASID (process address space identifier) state entries corresponding to the virtual address translation entries. The PASID state entries may include an active reference state and a lazy-invalidation state. The memory management unit may perform atomic modification of PASID state entries responsive to receiving PASID state update requests from devices in the multi-core system and read the lazy-invalidation state of the PASID state entries. The memory management unit may send PASID state update responses to the devices to synchronize TLB entries prior to activation responsive to the respective lazy-invalidation state. | 2013-01-31 |
20130031334 | Automatically Routing Super-Compute Interconnects - A mechanism is provided for automatically routing network interconnects in a data processing system. A processor in a node of a plurality of nodes receives network topology from neighboring nodes in the plurality of nodes within the data processing system. The processor constructs a system node map that identifies a physical connectivity between the node and the neighboring nodes. The processor programs a switch in the node with a connectivity map that indicates a set of point-to-point connections with the neighboring nodes. The set of point-to-point connections comprise locally-connected connections and pass-through connections. | 2013-01-31 |
20130031335 | USING PREDICTIVE DETERMINISM WITHIN A STREAMING ENVIRONMENT - Techniques are described for transmitting predicted output data on a processing element in a stream computing application instead of processing currently received input data. The stream computing application monitors the output of a processing element and determines whether its output is predictable, for example, if the previously transmitted output values are within a predefined range or if one or more input values correlate with the same one or more output values. The application may then generate a predicted output value to transmit from the processing element instead of transmitting a processed output value based on current input values. The predicted output value may be, for example, an average of the previously transmitted output values or a previously transmitted output value that was transmitted in response to a previously received input value that is similar to a currently received input value. Moreover, the processing element or elements that transmit the predicted output data may be upstream from the processing element with the predictable output. | 2013-01-31 |
20130031336 | EXTERNAL INTRINSIC INTERFACE - An external intrinsic interface. A processor may include a core including a plurality of functional units, an intrinsic module located outside the core, and an interface module to perform relaying between the intrinsic module and a functional unit, among the plurality of functional units. | 2013-01-31 |
20130031337 | Methods and Apparatus for Storage and Translation of an Entropy Encoded Instruction Sequence to Executable Form - A method of compressing a sequence of program instructions begins by examining a program instruction stream to identify a sequence of two or more instructions that meet a parameter. The identified sequence of two or more instructions is replaced by a selected type of layout instruction which is then compressed. A method of decompressing accesses an X-index and a Y-index together as a compressed value. The compressed value is decompressed to a selected type of layout instruction which is decoded and replaced with a sequence of two or more instructions. An apparatus for decompressing includes a storage subsystem configured for storing compressed instructions, wherein a compressed instruction comprises an X-index and a Y-index. A decompressor is configured for translating an X-index and Y-index accessed from the storage subsystem to a selected type of layout instruction which is decoded and replaced with a sequence of two or more instructions. | 2013-01-31 |
20130031338 | ENABLING PORTIONS OF PROGRAMS TO BE EXECUTED ON SYSTEM z INTEGRATED INFORMATION PROCESSOR (zIIP) WITHOUT REQUIRING PROGRAMS TO BE ENTIRELY RESTRUCTURED - A method, system and computer program product for allowing portions of programs to be executed on a System z Integrated Information Processor (zIIP). A service call is inserted at the beginning of the zIIP eligible code to enable enclave Service Request Block (SRB)-mode execution on the zIIP processor. An additional service call is inserted at the end of the zIIP eligible code to disable the enclave SRB-mode execution. A module in the operating system, referred to herein as the “zIIP shifter module,” is configured to detect these service calls thereby implementing and terminating the SRB-mode execution so that the zIIP processor executes the zIIP eligible code for the appropriate duration of time. In this manner, only a portion of the programs that contain eligible zIIP executable code is executed on the zIIP processor without requiring the programs to be entirely restructured thereby reducing development cost and improving software development productivity. | 2013-01-31 |
20130031339 | SYSTEMS, METHODS, AND APPARATUS FOR UTILITY METER CONFIGURATION - Systems, methods, and apparatus for configuring utility meters are provided. A meter configuration application may be executed by a device that includes one or more computers and that facilitates utility meter configuration. A plug-in module associated with a utility meter type may be received by the device. Based at least in part upon providing the plug-in module to the meter configuration application, a configuration file may be built for the utility meter type. The utility meter may then be configured utilizing the configuration file. | 2013-01-31 |
20130031340 | ELECTRICITY SYSTEM CONFIGURATION METHOD AND COMPUTER PROGRAM PERFORMING THE METHOD - A method for configuring an electricity system including providing a first programmable electronic device, providing a further programmable electronic device adapted to communicate with the first programmable electronic device and configurable according to a first communication configuration mode which is dynamic or a static, providing a first configuration description file defining communications between the first and further programmable electronic devices according to a second communication configuration mode opposite to the first mode, and processing via computer the first file to convert it into a converted configuration description file defining communications configuration between the first and further programmable electronic devices according to the first mode. | 2013-01-31 |
20130031341 | Hibernation and Remote Restarting Hibernation Data in a Cluster Environment - Hibernation and remote restore functions of a client logical partition (LPAR) that exists within a data processing system having cluster-aware Virtual Input/Output (I/O) Servers (VIOSes) is performed via receipt of commands via a virtual control panel (VCP) through an underlying hypervisor. The client hibernation data file is stored in a shared repository by a source/original VIOS assigned to the client. The hypervisor receives a remote restart command and assigns a target/remote client LPAR and a target VIOS. The source I/O adapters and target I/O adapters are locked and the target VIOS gathers adapter configuration information from the source VIOS and configures the target adapters to be able to perform the I/O functionality provided by the source adapters to the client LPAR. The target VIOS then retrieves the client's hibernation data file, and the client LPAR is restored at the remote LPAR with the target VIOS providing the client's I/O functionality. | 2013-01-31 |
20130031342 | STORAGE AND TRANSFER OF PHYSICAL MACHINE STATE - According to one embodiment, an apparatus comprises a physical computing device including a network interface configured to enable communications over a network, and at least one processor. The apparatus captures an operational state of the physical computing device including information pertaining to a state of the physical computing device resulting from operations performed by the physical computing device. The apparatus further configures the physical computing device with the operational state captured from a desired computing device to continue operations of the desired computing device on the physical computing device. Embodiments may further include a method and computer-readable media encoded with software for the storage and transfer of physical machine state in substantially the same manner described above. | 2013-01-31 |
20130031343 | COMPUTER SYSTEM AND OPERATION SYSTEM LOADING METHOD - A computer system and an operation system loading method thereof are provided. The computer system comprises a universal serial bus (USB) storage device storing a boot image, servers and a boot image sharer comprising USB ports, a memory, a first USB host controller and a micro-processor. The micro-processor controls the first USB host controller to emulate each USB port to the USB storage device, and stores the boot image to memory, such that the boot image is shared to the USB ports. The servers are respectively coupled to the USB ports, wherein each server comprises a second USB host controller and a basic input output system (BIOS). The second USB host controller is coupled to one of the USB ports. The BIOS reads the boot image from the emulated USB storage device and loads an operation system according to the boot image. | 2013-01-31 |
20130031344 | COMPUTER AND DISPLAY AND BOOT CIRCUIT FOR SAME - A computer system includes a display and a computer. The display includes a first data port, a boot button connected to a first pin of the first data port, and a display control circuit connected to the boot button. The computer includes a second data port connected to the first data port, a buffer connected to a second pin of the second data port, and a computer control circuit. When the boot button is turned on, the display control circuit receives a low-level signal. The display control circuit boots the display, and controls the display to operate. The computer control circuit receives the low-level signal through the first and second data ports, and the buffer. The computer control circuit boots the computer, and controls the computer to operate. | 2013-01-31 |
20130031345 | POWER SWITCHING SYSTEM, COMPUTER SYSTEM, AND REBOOT CONTROLLING METHOD THEREOF - A power switching system, a computer system, and a reboot controlling method thereof are disclosed. The power switching system is used to the computer system and includes a first power input port, a first power output port, a first linear regulator module, and a first switch module. The first power input port is used for inputting a first power signal. The first power output port is used for outputting a second power signal. The first linear regulator module includes a first transformer unit used for transforming the first power signal into the second power signal, and a first switch control unit used for controlling the first transformer unit. When the first switch module is activated, the first switch control unit is connected to a ground and controls the first transformer unit to stop outputting the second power signal. | 2013-01-31 |
20130031346 | Switching Between Processor Cache and Random-Access Memory - The present disclosure describes techniques and apparatuses for switching between processor cache and random-access memory. In some aspects, the techniques and apparatuses are able to reduce die size of application-specific components by forgoing dedicated random-access memory (RAM). Instead of using dedicated RAM, a memory having a cache configuration is reconfigured to a RAM configuration during operations of the application-specific component and then, when the operations are complete, the memory is configured back to the cache configuration. Because many application-specific components already include memory having the cache configuration, reconfiguring this memory rather than including a dedicated RAM reduces die size for the application component. | 2013-01-31 |
20130031347 | ARRANGEMENT AND METHOD - A first arrangement including an interface configured to receive transactions with an address from a second arrangement having a first memory space; a translator configured to translate an address of a first type of received transaction to a second memory space of the first arrangement, the second memory space being different to the first memory space; and boot logic configured to map a boot transaction of the received transactions to a boot region in the second memory space. | 2013-01-31 |
20130031348 | Communicating Operating System Booting Information - Disclosed embodiments relate to communicating operating system booting information. A machine-readable storage medium may include instructions for reading data related to booting of an operating system of an electronic device from a non-volatile storage, instructions for writing the read data to a volatile storage prior to the booting of an operating system on the electronic device, and instructions for communicating the data written to the volatile storage to the electronic device via a serial communication interface. The machine-readable storage medium may further include instructions for receiving data, from the electronic device via the serial communication interface, related to the booting of the operating system of the electronic device and instructions for writing the received data to the non-volatile storage. | 2013-01-31 |
20130031349 | Computing device booting utilizing dispersed storage - A computing device boot-up method begins by a processing module detecting a boot-up of the computing device. The method continues with the processing module addressing a distributed basic input/output system (BIOS) memory to retrieve a plurality of error coded BIOS data slices. The method continues with the processing module reconstructing BIOS data from the plurality of error coded BIOS data slices using an error coding dispersal function. The method continues with the computing device booting up in accordance with the BIOS data. | 2013-01-31 |
20130031350 | Configuring an Electronic Device Based on a Transaction - A first network signal is received indicating a device identifier in response to a transaction involving an electronic device uniquely associated with the device identifier. An entity identifier specific to an entity associated with the transaction is determined. In response to an initialization event of the electronic device, a second network signal from the electronic device is received that identifies the electronic device. In response to the second network signal, a configuration is communicated to the electronic device that is specific to the entity associated with the transaction. | 2013-01-31 |
20130031351 | Multi-Mode Data Card and Calibrating Method Thereof - A multi-mode data card includes at least two mode modules, and also includes an external interface module and an interface control module. The external interface module connects to the interface control module. The external interface is configured to connect with computer for data interaction; the interface control module is equipped with at least two channels, and said at least two channels connects to said at least two mode modules respectively. The interface control module is configured to: when the multi-mode data card is calibrated, connect the external interface module with the channel corresponding to the mode module to be calibrated, and switch the multi-mode data card to the mode to be calibrated. A method for calibrating multi-mode data card is also provided in the present invention. | 2013-01-31 |
20130031352 | ENABLING PORTIONS OF PROGRAMS TO BE EXECUTED ON SYSTEM z INTEGRATED INFORMATION PROCESSOR (zIIP) WITHOUT REQUIRING PROGRAMS TO BE ENTIRELY RESTRUCTURED - A method for allowing portions of programs to be executed on a System z Integrated Information Processor (zIIP). A service call is inserted at the beginning of the zIIP eligible code to enable enclave Service Request Block (SRB)-mode execution on the zIIP processor. An additional service call is inserted at the end of the zIIP eligible code to disable the enclave SRB-mode execution. A module in the operating system, referred to herein as the “zIIP shifter module,” is configured to detect these service calls thereby implementing and terminating the SRB-mode execution so that the zIIP processor executes the zIIP eligible code for the appropriate duration of time. In this manner, only a portion of the programs that contain eligible zIIP executable code is executed on the zIIP processor without requiring the programs to be entirely restructured thereby reducing development cost and improving software development productivity. | 2013-01-31 |
20130031353 | INFORMATION PROCESSING DEVICE, NON-TRANSITORY, COMPUTER READABLE STORAGE MEDIUM, AND METHOD OF CONTROLLING INFORMATION PROCESSING DEVICE - An information processing device has a storage unit configured to store correlation information in which a control rule for an operating frequency of a central processing unit of the information processing device is correlated with a combination of a state change of a first element of the information processing device, and a state of a second element of the information processing device which is different from the first element, a detecting unit configured to detect the state change of the first element, a determining unit configured to determine the state of the second element in the event that state change of the first element has been detected by the detecting unit, a searching unit configured to search for, a control rule corresponding to a combination of the state change and the state, and a control unit configured to control the operating frequency of the central processing unit. | 2013-01-31 |
20130031354 | SYSTEM FOR PREVENTING UNAUTHORIZED ACQUISITION OF INFORMATION AND METHOD THEREOF - A server apparatus includes: an output detector for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shared area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data. The client apparatus includes: a reading detection section for detecting reading-processing which is processing of reading data from the shared area; and a reading control section which reads the instruction information from the shared area in response to the detection of the reading-processing, and which acquires the output data by the acquisition method specified by the instruction information. | 2013-01-31 |
20130031355 | SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION - An interactive information dissemination system includes a media server ( | 2013-01-31 |
20130031356 | SUPPORTING SECURE SESSIONS IN A CLOUD-BASED PROXY SERVICE - A proxy server in a cloud-based proxy service receives a secure session request from a client device for a secure session. The secure session request is received at the proxy server as a result of a Domain Name System (DNS) request for a domain resolving to the proxy server. The proxy server participates in a secure session negotiation with the client device including transmitting a digital certificate to the client device that is bound to domain and multiple other domains. The proxy server receives an encrypted request from the client device for an action to be performed on a resource that is hosted at an origin server corresponding to the domain. The proxy server decrypts the request and participates in a secure session negotiation with the origin server including receiving a digital certificate from the origin server. The proxy server encrypts the decrypted request using the digital certificate from the origin server and transmits the encrypted request to the origin server. | 2013-01-31 |
20130031357 | METHOD FOR SECURE TRANSFER OF AN APPLICATION FROM A SERVER INTO A READING DEVICE UNIT - A method and a system for secure transfer of an application from a server (S) into a reading device unit ( | 2013-01-31 |
20130031358 | WIRELESS NETWORK SECURITY - A method includes identifying a suspect node of a network that includes multiple nodes in wireless communication. The method also includes initiating formation of a sub-network of the network in response to identifying the suspect node. The suspect node is not a member of the sub-network. After formation of the sub-network, first communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. The sub-network is configured to enable second communications between members of the sub-network, where the second communications are communicated in a manner that is secured against access by the suspect node. | 2013-01-31 |
20130031359 | METHOD AND SYSTEM FOR MODULAR AUTHENTICATION AND SESSION MANAGEMENT - Modular authentication and session management involves the use of discrete modules to perform specific tasks in a networked computing environment. There may be a separate authentication server that verifies the identity of the user and an authorization client that grants various levels of access to users. There may also be an authentication client that receives an initial request from a requesting application and forwards the request to the authentication server to verify the identity of the use. The authorization client may then be invoked to provide the necessary level of access. The use of discrete modules allows multiple business applications to use the same modules to perform user authentication tasks, thus alleviating the unnecessary multiplication of code. | 2013-01-31 |
20130031360 | PROCESS CONTROL SYSTEM - A process control system is disclosed which can include a plurality of spatially distributed, internetworked network subscribers with secure communication between the network subscribers via a communication network. Communication integrity can be based on an interchange of certificates. In order to protect the communication integrity, the process control system can include a central certification point which is an integral part of the process control system and allocates and distributes certificates. | 2013-01-31 |
20130031361 | URL-BASED CERTIFICATE IN A PKI - A method of requesting and issuing a certificate from certification authority for use by an initiating correspondent with a registration authority is provided. The initiating correspondent makes a request for a certificate to the registration authority, and the registration authority sends the request to a certificate authority, which issues the certificate to the registration authority. The certificate is stored at a location in a directory and this location is associated with a pointer such as uniform resource locator (URL) that is derived from information contained in the certificate request. The initiating correspondent computes the location using the same information and forwards it to other corespondents. The other correspondents can then locate the certificate to authenticate the public key of the initiating correspondent. | 2013-01-31 |
20130031362 | METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere. | 2013-01-31 |
20130031363 | GENERATING A CRL USING A SUB-SYSTEM HAVING RESOURCES SEPARATE FROM A MAIN CERTIFICATE AUTHORITY SUB-SYSTEM - A server computing system initiates a first sub-system to generate a certificate revocation list (CRL) using resources that are separate from resources of a second sub-system that performs certificate authority (CA) management functions other than generating a CRL. The first sub-system receives a command from the second sub-system to update revocation data in a cache that is coupled to the first sub-system and generates a CRL using the updated revocation data in the cache. The first sub-system provides the CRL to the second sub-system. | 2013-01-31 |
20130031364 | Fine-grained security in federated data sets - A data processing system, a server such as a federated server, a computer system, and like devices, and associated operating methods can be configured to support fine-grained security including resource allocation and resource scheduling. A data processing system can comprise a federated server operable to access data distributed among a plurality of remote data sources upon request from a plurality of client users and applications; and logic executable on the federated server. The logic can be operable to enforce fine-grained security operations on a plurality of federated shared data sets distributed among the plurality of remote data sources. | 2013-01-31 |
20130031365 | INFORMATION PROTECTION SYSTEM AND METHOD - An information protection system includes a mobile terminal and an encryption module. The mobile terminal requests a key sequence by transmitting a message including a Personal Identification Number (PIN) number input by a user, and encrypts or decrypts one or more communication signals, including voice signals and data signals, based on the key sequence when the key sequence is received. The encryption module is connected to the mobile terminal. The encryption module encrypts a security key using the identifier and the PIN number of the mobile terminal, decrypts the encrypted security when requested by the mobile terminal, and transmits the key sequence generated based on the decrypted security key to the mobile terminal. | 2013-01-31 |
20130031366 | MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD FOLLOWING INTRODUCTION OF THE PPCD INTO A WORKFLOW - In a method for managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow among a plurality of workflow participants, in a secure content manager, from a workflow participant of the plurality of workflow participants, a key-map file for a subsequent workflow participant that is to receive the key-map file is received, wherein the key-map file comprises a set of keys to enable the subsequent workflow participant to access the content-part in the PPCD. In addition, authenticity of the received key-map file is verified, the subsequent workflow participant to receive the PPCD is identified and authenticated, a public key of the subsequent workflow participant is accessed, the key map file or a symmetric key used to encrypt the key-map file prior to receipt of the key-map file by the secure content manager is encrypted using the public key of the subsequent workflow participant, and the encrypted key-map file is sent to the subsequent workflow participant. | 2013-01-31 |
20130031367 | Facilitating access control in peer-to-peer overlay networks - Methods and apparatuses are provided for facilitating access controls for digital objects stored within a peer-to-peer overlay network. A privacy-preserving method is provided for matching identities between a first peer node and a second peer node in a peer-to-peer network. Such identity matching may be used, for example, to ascertain whether the first peer node should provide access to certain digital object stored in the peer-to-peer overlay network. Rather than providing its identities in an unprotected format, the second peer may provide its identities to the first peer node in a concealed representation so as to prevent the first peer from learning about non-matching identities. Such concealed representation may be a data structure that cryptographically conceals one or more identities of the second peer node or a user of the second peer node within a shared data space of the data structure. | 2013-01-31 |
20130031368 | REMOTE COMPUTER MANAGEMENT WHEN A PROXY SERVER IS PRESENT AT THE SITE OF A MANAGED COMPUTER - The invention facilitates remote management of a computer via a network. Remote computer management in which communication between a managed computer and a remote computer management server is initiated by the managed computer is implemented so that the presence of a proxy server at the site at which the managed computer is located can be detected, and communication from the managed computer to the remote computer management server is routed to a communication port assigned for communication with the proxy server, with instructions to then send the communication to the remote computer management server. | 2013-01-31 |
20130031369 | MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD USING A KEY RESET POINT - In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map files comprising subsets of access keys that provide access to the secure content-part during respective content access sessions are generated, in which at least one of the key-map files corresponds to the key reset point and comprises a first decryption key, a first verification key, a second encryption key, and a second signature key, in which the first decryption key does not correspond to the second encryption key, and in which the first verification key does not correspond to the second signature key. In addition, the plurality of key-map files are supplied to at least one of the participants. | 2013-01-31 |
20130031370 | ELECTRONIC SIGNATURE AUTHENTICATION - Method of authenticating a signature on a work document in which a remote server generates a digital work fingerprint and a representation file of the work document. The representation file and the digital work fingerprint are transmitted to a client station from the remote server via a wide area communication network, and at least one digital representation fingerprint of the representation file is generated. A file to be signed is generated containing at least the digital work and representation fingerprints. The client station generates only one client signature from the file to be signed, and a client signature file is generated containing at least the file to be signed and the client signature. | 2013-01-31 |
20130031371 | Software Run-Time Provenance - An executing first computing module verifies the run-time provenance of an unverified second computing module. A signed certificate identifying an author of the second computing module is received at the first computing module. An association between the signed certificate and the second computing module is verified. A first provenance certificate and associated private key signed by the first computing module and identifying a runtime provenance of the second computing module is then generated, and the first provenance certificate is published to the second computing module. A chain of signed certificates, including provenance certificates and a static identification certificates, can be published. Each provenance certificate in the chain verifies the integrity of a layer of execution, and the plurality of static identification certificates identifies a respective author of the computing module associated with each layer of software. The provenance of the second computing module can be recursively traced through the published chain of certificates. | 2013-01-31 |
20130031372 | SECURE DATA STORAGE - Methods and systems for obscuring the location of critical system files are provided. In particular, the locations of files stored within a file system are selected by applying various inputs to a hash algorithm. For system files, the inputs applied to the hash algorithm can include a user name and password. For data files, the information provided to the hash algorithm can include the file name. In addition to providing random file locations, a file system in accordance with embodiments of the present invention can homogenize other information, including file names, sizes and creation dates. | 2013-01-31 |
20130031373 | Product authentication based upon a hyperelliptic curve equation and a curve pairing function - Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code. | 2013-01-31 |
20130031374 | FIRMWARE-BASED TRUSTED PLATFORM MODULE FOR ARM PROCESSOR ARCHITECTURES AND TRUSTZONE SECURITY EXTENSIONS - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices. | 2013-01-31 |
20130031375 | Method and apparatus for protecting software of mobile terminal - A method for protecting software of a mobile terminal is provided in the disclosure, wherein an encryption chip is mounted in the mobile terminal. The method includes: when the mobile terminal is turned on, whether or not the encryption chip is invalid is detected; when it is not invalid, the encryption chip authenticates the software of the mobile terminal through interaction with a main chip; when the authentication is not passed, the encryption chip controls a functional module of the mobile terminal through a hardware protection circuit. An apparatus for protecting software of a mobile terminal is also provided in the present disclosure. The solution of the disclosure can prevent the software of the mobile terminal from being cracked and protect the functions of the mobile terminal from illegal usage, thus the security of the mobile terminal is greatly improved and the interests of operators and manufacturers are protected. | 2013-01-31 |
20130031376 | REMOVABLE STORAGE DEVICE DATA PROTECTION - Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a protected removable storage device connected to an information handling device, said protected removable storage device having a first partition for storing data according to a first file system type, and a second partition for storing user data according to a second file system type; and responsive to said information handling device recognizing said second file system type, querying for user credentials to decrypt a data encryption key used to encrypt said user data of said second partition. Other embodiments are described. | 2013-01-31 |
20130031377 | Information Handling System Wireless Power Docking Station Module - A wireless power module couples to an information handling system to accept power from a wireless power source and to provide the power to the information handling system through a docking station connector of the information handling system. The wireless power module selectively decouples from the information handling so that an end user can elect to reduce the footprint of the information handling system by removing the wireless power module when not taking advantage of wireless power. | 2013-01-31 |
20130031378 | Power Transfer in an Inline Switch Device - An apparatus and method for transferring power in an inline switch device are provided. The method comprises drawing power from an inline power source and transferring, by the powered device subsystem, a portion of the power that is not consumed by the powered device subsystem to one or more connected powered devices. The method further comprises determining a limit of current drawn by the powered device subsystem during transfer of power by the powered device subsystem to the one or more powered devices that results in the transfer of a desired amount of power to the one or more powered devices, and adjusting the limit for the current drawn by the powered device subsystem to the determined current limit. | 2013-01-31 |
20130031379 | CUSTOMER INITIATED REMOTE OPTICAL NETWORK TERMINAL RESET SYSTEMS AND METHODS - The disclosure relates to a system and method to allow an end user to remotely reset or reboot an optical network terminal (ONT) and/or residential gateway that has become unresponsive or otherwise needs to be reset. In various aspects, the end user may initiate a sequence of hook flash signals from a telecommunication device that causes an ONT control system to power cycle the ONT. | 2013-01-31 |
20130031380 | POWER SUPPLY CONVERTING SYSTEM AND METHOD - A power supply converting system includes a start unit for outputting power to a server through a number of circuitries, an obtaining unit, a comparison unit, a memory module, and a converting unit. The obtaining unit is connected to the start unit and the server, to obtain the model code of a central processing unit (CPU) of the server and transmits the model code to the comparison unit. The comparison unit compares the model code of the server CPU against a plurality of circuitry codes in a truth table stored in the memory module, to obtain a circuitry code corresponding to the model code of the server CPU. The converting unit adjusts the numbers of turned on circuitries based on the circuitry code from the comparison unit. | 2013-01-31 |
20130031381 | RACK SERVER SYSTEM - A rack server system including at least one server and a battery backup unit (BBU) is provided. A power supplier is coupled to the server for converting an input voltage into a first output voltage when the input voltage is normal and for providing the first output voltage to the server. The BBU is coupled to the server and the power supplier for detecting the first output voltage outputted from the power supplier and for providing a second output voltage to the server when the input voltage and/or the first output voltage are abnormal. | 2013-01-31 |
20130031382 | RACK SERVER SYSTEM AND OPERATION METHOD APPLICABLE THERETO - A rack server system and an operating method applicable thereto are provided. The rack server system includes a battery backup unit (BBU) and at least one server. The operating method includes: communicating the server and the BBU with each other; the BBU providing a status information and a previous self-discharging test information to the server for the server to judge a status of the BBU; and providing power from the BBU to the server and adjusting a loading of the server according to the status information of the BBU when an input power is interrupted. | 2013-01-31 |
20130031383 | POWER OVER ETHERNET POWERED DEVICE CIRCUIT AND ELECTROSTATIC DISCHARGE PROTECTION CIRCUIT THEREOF - A Power over Ethernet (PoE) Power Device (PD) circuit and a protection circuit of electrostatic discharge (ESD) thereof are provided. The protection circuit of ESD includes a transient voltage suppressor (TVS) and a high-voltage capacitor, wherein the TVS and the high-voltage capacitor are coupled in series between a negative power terminal and a grounding terminal to reduce system malfunctions or damages when ESD or transient voltage surge occurs. | 2013-01-31 |
20130031384 | DEVICE MANAGEMENT APPARATUS AND COMPUTER-READABLE NON-TRANSITORY RECORDING MEDIUM - The device management server is provided with a power consumption acquisition unit that acquires information relating to power consumption of each of a plurality of sockets; a communication unit that performs communication with an object device from among devices connected to a network in order to change power consumption of the object device; a socket specifying unit that specifies a socket in which power consumption has changed within a period of time relating to the communication on the basis of information acquired by the power consumption acquisition unit; and an association unit 24 that associates the object device with the socket specified by the socket specifying unit. | 2013-01-31 |
20130031385 | POWER CONSUMPTION AMOUNT MANAGEMENT SYSTEM FOR MANAGING POWER CONSUMPTION AMOUNT, POWER CONSUMPTION MANAGEMENT METHOD, AND STORAGE MEDIUM - A power consumption amount management system which is capable of appropriately managing the amount of power consumption according to the situation. In the power consumption amount management system, an image forming apparatus and a power consumption management server are connected to a network. An electric power measurement section in the image forming apparatus measures the amount of electric power consumed by the apparatus. A measurement error determination section determines whether or not measurement of the power consumption amount is successful. An interface section outputs a notification of information on the power consumption amount measured in the image forming apparatus and a result of the determination. The power consumption management server receives the notification from the image forming apparatus, and corrects the information on the power consumption amount in the image forming apparatus by referring to the result of the determination. | 2013-01-31 |
20130031386 | ELECTRONIC DEVICE - An electronic device, comprising: an execution unit which executes a predetermined function; a first control unit that has an input terminal and causes the execution unit to execute the predetermined function; a power source unit that supplies power at least to the first control unit; and a second control unit that has an output terminal connected to the input terminal of the first control unit via a signal line, operates to output a signal to the first control unit via the signal line, and causes the power source unit to cut off power supply to the first control unit, and wherein the second control unit keeps a potential of the signal line at a reference level lower than or equal to a predetermined threshold while the second control unit causes the power source unit to cut off power supply to the first control unit. | 2013-01-31 |
20130031387 | CLOSED-LOOP EFFICIENCY MODULATION FOR USE IN NETWORK POWERED APPLICATIONS - Methods for reducing power dissipation from an input power source in a telecommunications system are disclosed. In one embodiment the method includes: utilizing a first I2C device to monitor an input voltage and input current to a remote unit; providing the input voltage and input current to a main microprocessor for calculating an input power; utilizing a second I2C device to monitor an output voltage and output current from the remote unit; providing the output voltage and output current to the main microprocessor for calculating an output power; calculating a power efficiency of the remote unit at the main microprocessor based on the input power and the output power; utilizing a third I2C device to provide the power efficiency of the remote unit to a digital power manager; and utilizing the digital power manager to control the DA trim output to a DC/DC converter. | 2013-01-31 |
20130031388 | ZERO POWER HIBERNATION MODE WITH INSTANT ON - Systems, methods, and other embodiments associated with a processor configured with a zero power hibernation/sleep mode during which the processor consumes no power are described. According to one embodiment, a processor includes a power management logic. The power management logic is configured to receive a control signal requesting the processor to transition into a power saving mode that reduces power to the processor while retaining a current state of the processor. The power management logic is configured to store, in response to the control signal, a current state of components of the processor in a non-volatile memory. The power management logic is configured to adjust power to the processor to a zero power mode to place the processor into the power saving mode, wherein during the zero power mode the processor is receiving no power. | 2013-01-31 |
20130031389 | Computer System with Over-Subscription Mode of Power Supply - A computer system with an over-subscription mode of power-supplying device is provided. The computer system includes at least a power-consuming device, at least a power-supplying device, and a power management controller. The at least a power-supplying device supplies power to the at least a power-consuming device. The output power of the at least a power-supplying device has a maximum label value, a safety limitation value higher than the maximum label value, and an over-subscription zone between the maximum label value and the safety limitation value. The power management controller is coupled with the at least a power-supplying device and the at least a power-consuming device that controls the power consumption of the at least a power-consuming device. If the output power exceeds the maximum label value to enter the over-subscription zone, the power management controller will lower the power consumption of the power-consuming device(s). | 2013-01-31 |
20130031390 | METHOD AND SYSTEM FOR BUILDING A LOW POWER COMPUTER SYSTEM - Various embodiments disclosed herein relate to an efficient computer server system comprising an efficient power supply unit utilizing a plurality of power-rails to supply electric power to the system components, a special-purpose processor configured to operate as an efficient general purpose server processor while maintaining high performance, and a platform manager configured to control the power supplied to the system components to minimize the system's overall power consumption. Some disclosed embodiments relate to a method of reducing power consumption in information handling server systems comprising configuring a special-purpose processor to be function as a general purpose server processor, selecting a set of power efficient system components based on performance and power efficiency, utilizing an efficient power supply unit and a platform manager to control the power supplied by the power supply unit, and adjusting the processor's frequency to achieve an optimal performance/power-consumption ratio. | 2013-01-31 |
20130031391 | MULTI-CORE PROCESSOR SYSTEM, ELECTRICAL POWER CONTROL METHOD, AND COMPUTER PRODUCT - A multi-core processor system includes a core configured to detect that among cores different from a specific core executing a specific process, a given software different from specific software having a function equivalent to the specific process, is under execution; extract, from a database storing required computing capacities for the plural software and upon detecting that a given software is under execution, requirement values indicating the required computing capacity of the specific software and of the given software; judge for each the cores, whether a sum of the required computing capacities of the specific software and the software is at most a computing capacity value of the core; assign the specific software to a core for which the sum of the required computing capacities is judged to be at most the computing capacity value of the core; and suspend the specific core, upon assigning the specific software to the core. | 2013-01-31 |
20130031392 | USB DEVICE SIDE WAKE-UP FOR POWER CONSERVATION AND MANAGEMENT - In a system in which a host device is in communication with a peripheral device through communications device connected to a USB port, the USB host device polls the communications device to constantly regardless of the power state of the USB communications device. While in the low power mode, the USB communications device generates NAK packets, indicating that the device has no data to send. The NAK packets are generated in hardware, thereby allowing the USB host continues operating while unaware of the state of the peripheral device. External events can be used to trigger the USB communications device to exit the low power state without communicating with the USB host, and without the USB host altering its behavior. | 2013-01-31 |
20130031393 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND RECORDING MEDIUM - An information processing apparatus includes a control unit to control the apparatus, a power supplying control unit to control power supply and a stop of the power supply to the control unit, a receiving unit to receive data from outside, and a response unit to generate and send first response data with respect to first received data received by the receiving unit while the power supply to the control unit is stopped, when the response unit verifies the first received data are predetermined data capable of being responded to by the response unit. The control unit includes a unit to send an instruction to make the power supplying control unit stop the power supply to the control unit, in a predetermined condition while the power is supplied to the control unit. | 2013-01-31 |
20130031394 | IMAGE FORMING APPARATUS FOR FORMING IMAGE ON SHEET - The power supply unit supplies operating power for operating the image forming unit and the first communication interface. The setting control unit stores continuation setting information in the storage unit when a setting condition set in advance is satisfied. The power control unit causes the power supply unit to continue to supply operating power to the first communication interface if the continuation setting information is stored in the storage unit in a sleep mode and causes the power supply unit to stop the supply of the operating power to the first communication interface unless the continuation setting information is stored in the storage unit in the sleep mode. The switching control unit causes the power control unit to perform a normal mode when the first communication interface obtains first communication-related information in the sleep mode. | 2013-01-31 |
20130031395 | IMAGE PROCESSING APPARATUS, COMMUNICATION METHOD THEREFOR, AND RECORDING MEDIUM - An image processing apparatus being configured to support a power-saving mode which allows achieving low power consumption while keeping an idle connection without communication between the image processing apparatus and a communication device in a network environment, comprises: a first judgment portion which judges whether or not the communication device supports the power-saving mode; and a communicator which establishes a connection to the communication device at a first communication rate if the first judgment portion judges that the communication device does not support the power-saving mode, at a second communication rate which is faster than the first communication rate if the first judgment portion judges that the communication device supports the power-saving mode. | 2013-01-31 |
20130031396 | POWER SUPPLY SYSTEM, IMAGE FORMING APPARATUS HAVING THE SAME, AND LOW-CAPACITY POWER SUPPLY CIRCUIT - A power supply system includes: a switching power supply, which rectifies and smoothes an AC voltage of an AC power supply to generate a first DC voltage in a normal mode; a control unit, which controls the switching power supply to switch between the normal mode and a power saving mode; and a low-capacity power supply circuit, which supplies power to the control unit in the power saving mode, and which includes: a first capacitor, which includes a first electrode connected to one end of the AC power supply, and a second electrode; a second capacitor, which includes a first electrode connected to the other end of the AC power supply, and a second electrode; a rectifying circuit, which rectify an AC voltage applied to both capacitors; and a smoothing circuit, which smoothes the rectified AC voltage to generate a smooth voltage. | 2013-01-31 |
20130031397 | INFORMATION PROCESSING APPARATUS - One embodiment provides an information processing apparatus including a processor; memory blocks; an internal voltage generator connected to the memory blocks; an input/output circuit connected to the memory blocks; switches each installed corresponding to the internal voltage generator, the input/output circuit, and the memory blocks, and configured to switch ON/OFF of the connection with a power source; a data register configured to store a data set that controls the ON/OFF of the switches; and a data management circuit configured to set the data set in the data register, wherein when a clock signal input to the processor is turned to OFF, the data management circuit generates a first type of the data set, which switches ON the switch connected to the internal voltage generator and switches OFF the switches connected to the memory blocks, and sets the first type of the data set in the data register. | 2013-01-31 |
20130031398 | POWER SUPPLY AND DATA SIGNAL INTERFACE CIRCUIT WITH OVERVOLTAGE PROTECTION - A data processing device with a power supply and data signal interface circuit has a switch for connecting an external line and an internal node. The power supply and data signal interface circuit also includes a controller for applying an enabling voltage to the switch enabling the switch to supply current between the external line and the internal node in the presence of power supply to the controller and in the absence of the overvoltage condition on the external line. The power supply and data signal interface circuit also includes a voltage reduction connection from the external line for applying a control voltage to the switch in the absence of power supply to the controller. The control voltage from the voltage reduction connection limits a voltage applied to the internal node through the switch in the presence of the overvoltage condition. | 2013-01-31 |
20130031399 | SYSTEMS AND METHODS FOR WIRELESS COMMUNICATION OF POWER DISTRIBUTION INFORMATION - A system of managing power distribution units includes a master rack PDU and a plurality of child rack PDU's. The master rack PDU is coupled to a network and is configured to receive short-range wireless signals. The plurality of child rack PDU's are configured to transmit short-range wireless signals including data measurements. The master rack PDU receives the data measurements in the short-range wireless signals transmitted by the plurality of child rack PDU's and the master rack PDU transmits the data measurements to a computer over the network. | 2013-01-31 |
20130031400 | OPTIMIZING POWER USAGE BY PROCESSOR CORES BASED ON ARCHITECTURAL EVENTS - A method and apparatus to monitor architecture events is disclosed. The architecture events are linked together via a push bus mechanism with each architectural event having a designated time slot. There is at least one branch of the push bus in each core. Each branch of the push bus may monitor one core with all the architectural events. All the data collected from the events by the push bus is then sent to a power control unit. | 2013-01-31 |
20130031401 | Systems, Methods, and Computer Program Products Providing Output Sample Frequency Determinism - A computer-implemented method for performing processing including setting a timer associated with a first processing event, scheduling an expected time for the processing event using wall clock time, at the timer, using the expected time to calculate a delay associated with the timer, performing the first processing event in response to the timer, and setting a subsequent timer to compensate for the delay. | 2013-01-31 |
20130031402 | MODIFYING DISPERSED STORAGE NETWORK EVENT RECORDS - A method begins by a dispersed storage (DS) processing module identifying a performance anomaly within a dispersed storage network (DSN). The method continues with the DS processing module identifying a set of collections of records corresponding to the performance anomaly, wherein one of the set of collections of records includes an event record including information regarding an event, a first record including information regarding a dispersed storage (DS) processing module processing an event request to produce a plurality of sub-event requests, and a plurality of records including information regarding a set of DS units processing the plurality of sub-event requests. The method continues with the DS processing module determining whether a reliable significance indication of the performance anomaly is determinable, and when the reliable significance indication of the performance anomaly is not determinable, modifying data collection criteria for one or more of the sets collections of records. | 2013-01-31 |
20130031403 | Failover Data Replication to a Preferred List of Instances - A method, system, and medium are disclosed for performing transparent failover in a cluster server system. The cluster includes a plurality of servers. In servicing a client request, a primary server replicates session data for the client into memory space of one or more backup servers. The primary server sends a response to the client, wherein the response includes an indication of the one or more backup servers. When the client sends a subsequent request, it includes an indication of the backup servers. If the primary server is unavailable, the cluster determines a recovery server from among the backup servers indicated by the request. The chosen recovery server would then service the request. | 2013-01-31 |
20130031404 | SYSTEM AND METHOD FOR IMPLEMENTING PNRP LOCALITY - A method is provided for a host node in a computer network to determine its coordinates in a d-dimensional network space, comprising discovering an address of a peer node in the network, measuring network latency between the host node and the peer node, determining whether network latency has been measured for at least d+1 peer nodes, where, if network latency has not been measured for at least d+1 peer nodes, estimating the network coordinates of the host node, and where, if network latency has been measured for at least d+1 peer nodes, calculating the network coordinates of the host node using d+1 measured latencies. | 2013-01-31 |
20130031405 | DISASTER RECOVERY APPLIANCE - A disaster recovery appliance is described herein. The disaster recovery appliance is coupled to one or more servers. The disaster recovery appliance continuously receives backup data for each of the one or more servers. When a server fails, the disaster recovery appliance, replaces the failed server. While the failed server is inaccessible, the disaster recovery appliance is able to mimic the functionality of the failed server. In some embodiments, the disaster recovery appliance is able to act as a server in addition to a backup device for the other servers. | 2013-01-31 |
20130031406 | APPARATUS AND METHOD FOR WRITING DATA BASED ON DRIVE STATE - Disclosed are an apparatus and method for writing data based on a drive state. In one embodiment, a method may comprise receiving a command to store data to a first area of a data storage device, detecting whether the data storage device is in a first state indicating a lowered write reliability, and writing the data to a second area when the first state is detected, the second area having a higher write reliability than the first area. In another embodiment, an apparatus may comprise a processor configured to receive a command to write data to a first area of a data storage device, detect whether the data storage device is in a first mode indicating a reduced writing reliability relative to a second mode, and write the data to a second area of the data storage device when the first mode is detected. | 2013-01-31 |
20130031407 | IDENTIFYING A SLICE ERROR IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module identifying a set of collections of records corresponding to a data segment that is stored in a dispersed storage network (DSN) as a set of encoded data slices, wherein a collection of records includes an event record including information regarding an event, a first record including information regarding a dispersed storage (DS) processing module processing an event request to produce a plurality of sub-event requests, and a plurality of records including information regarding a set of DS units processing the plurality of sub-event requests. The method continues with the DS processing module determining whether an error exists for one of the set of encoded data slices based on at least some of the set of collections of records and when the error exists, flagging the one of the set of encoded data slices for potential rebuilding. | 2013-01-31 |
20130031408 | DEVICE AND METHOD FOR TESTING A MEMORY OF AN ELECTRIC TOOL - The device for testing a memory of an electric tool has a control unit, a testing module, a buffer memory and an address translator. The control unit is coupled to the memory and configured to control the electric tool. The testing module is coupled to the memory and configured to test a specific memory cell from among a plurality of memory cells of the memory. The buffer memory is configured to provide temporary storage of the data that is stored in the specific memory cell during the testing of the specific memory cell. The address translator is configured to translate the address of the specific memory cell to the address of the buffer memory during the testing of the specific memory cell. A tool and method are also provided. | 2013-01-31 |
20130031409 | DEVICE AND METHOD FOR TESTING A MEMORY OF AN ELECTRIC TOOL - The device for testing a memory of an electric tool has a memory, a control unit for controlling the electric tool and a testing module. The memory has a plurality of memory cells for storing data, a first interface and a second interface that is independent of the first interface. The control unit is coupled to the memory via the first interface. The testing module is configured for testing the memory cells of the memory and for this purpose, it is coupled to the memory via the second interface. A tool and method are also provided. | 2013-01-31 |
20130031410 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTICS - Diagnostic apparatus for computers, including a diagnoser that connects to a PC, including an SD connector for connecting the diagnoser to an SD port of a PC, a storage medium for storing diagnostic program code that automatically runs on the PC via the SD connector, in response to connecting the diagnoser to the SD port of the PC, wherein the diagnostic program code performs specific diagnostic tests on the PC in response to input instructions, and generates test results as output, a modem for receiving input instructions from a remote online help-desk facility, specifying which diagnostic tests the diagnostic program code should perform on the PC, and for transmitting the test results to the help-desk facility, and a processor for controlling the storage medium and the modem. | 2013-01-31 |
20130031411 | COMPUTER SYSTEM AND DIAGNOSTIC METHOD THEREOF - A computer system and a diagnostic method thereof are provided. The computer system comprises a system management bus (SMBus) switch, a plurality of servers and a remote management controller (RMC). Each server comprises a diagnostic message port, a basic input output system (BIOS) and a logic circuit. The BIOS outputs a diagnostic message to the diagnostic message port. The logic circuit catches the diagnostic message. The RMC comprises a SMBus host controller. The SMBus host controller controls the SMBus switch to connect the SMBus host controller to a corresponding logic circuit according to a request. The logic circuit responds the diagnostic message to the SMBus host controller according to the request. | 2013-01-31 |
20130031412 | PROCESSING APPARATUS, TEST SIGNAL GENERATOR, AND METHOD OF GENERATING TEST SIGNAL - A first test signal receiver that receives first test signals output from a first test signal output terminal in response to a test start instruction;
| 2013-01-31 |
20130031413 | METHODS AND SYSTEMS FOR PREBOOT DATA VERIFICATION - A method for validating the data defining an executable program prior to loading of the data for program execution is described. The method includes calculating a verification number for the data within a primary data storage area, the data defining an executable program, comparing the calculated verification number with a stored number, executing the program within the primary data storage area if the verification number matches the stored number, calculating a verification number for the data within a secondary data storage area, the data within the secondary data storage area defining the same executable program as that within the primary data storage area, if the verification number and the stored number do not match, comparing the calculated verification number for the data within the secondary data storage area with the stored number, causing the program to be executed if the verification number for the data within the secondary data storage area and the stored number match, and indicating a failure if the verification number for the data within the secondary data storage area and stored number do not match. | 2013-01-31 |
20130031414 | IDENTIFYING AN ERROR CAUSE WITHIN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module selecting two or more correlated error messages of a plurality of error messages. The method continues with the DS processing module identifying two or more collection of records corresponding to the selected two or more correlated error messages such that a collection of records includes an event record including information regarding an event, a first record including information regarding a dispersed storage (DS) processing module processing an event request to produce a plurality of sub-event requests, and a plurality of records including information regarding a plurality of DS units processing the plurality of sub-event requests. The method continues with the DS processing module identifying a correlation cause of one or more errors corresponding to the two or more correlated error messages based on the two or more collections of records. | 2013-01-31 |
20130031415 | Entity Oriented Testing of Data Handling Systems - An apparatus and program product in which test components—here denominated entities—are handled by a test framework and wrapped in a common API (application programming interface) which provides command execution, file handling and inter-communication. The entities are interchangeable parameters to the test, hiding platform-specific code from the test developer and promoting code re-use. Retargettability is enabled by allowing specific systems—physical machines, for example—to be specified on a per test run basis, without changing generic test code. | 2013-01-31 |
20130031416 | Method for Entity Oriented Testing of Data Handling Systems - Test components—here denominated entities—are handled by a test framework and wrapped in a common API (application programming interface) which provides command execution, file handling and inter-communication. The entities are interchangeable parameters to the test, hiding platform-specific code from the test developer and promoting code re-use. Retargettability is enabled by allowing specific systems—physical machines, for example—to be specified on a per test run basis, without changing generic test code. | 2013-01-31 |
20130031417 | METHOD AND DEVICE FOR TESTING A PROGRAM STORED IN THE MEMORY OF AN ELECTRIC TOOL - A method for testing a program stored in the memory of an electric tool, from a plurality of modules, comprises the following steps: testing the program using at least one predefined safety test while the program is being executed, and testing at least one module from the plurality of modules using at least one predefined module test while the program is being executed. | 2013-01-31 |
20130031418 | TESTING AND OPERATING A MULTIPROCESSOR CHIP WITH PROCESSOR REDUNDANCY - A system and method for improving the yield rate of a multiprocessor semiconductor chip that includes primary processor cores and one or more redundant processor cores. A first tester conducts a first test on one or more processor cores, and encodes results of the first test in an on-chip non-volatile memory. A second tester conducts a second test on the processor cores, and encodes results of the second test in an external non-volatile storage device. An override bit of a multiplexer is set if a processor core fails the second test. In response to the override bit, the multiplexer selects a physical-to-logical mapping of processor IDs according to one of: the encoded results in the memory device or the encoded results in the external storage device. On-chip logic configures the processor cores according to the selected physical-to-logical mapping. | 2013-01-31 |
20130031419 | Collecting Debug Data in a Secure Chip Implementation - Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data. | 2013-01-31 |
20130031420 | Collecting Debug Data in a Secure Chip Implementation - Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data. | 2013-01-31 |
20130031421 | COMPUTING DEVICE AND METHODS OF PRESENTING DATA TO IDENTIFY FAULTS WITHIN POWER SYSTEMS - A computing device for use with a power system is provided. The computing device includes a processor that is programmed to organize data representative of at least one fault within the power system and to generate a graphical representation of the organized data. The computing device also includes a presentation interface that is coupled to the processor for presenting the graphical representation to a user to enable the user to identify the fault. Moreover, a user interface is coupled to the presentation interface and configured to enable the user to select at least one data point on the graphical representation such that the user is enabled to identify at least one variable of the fault. | 2013-01-31 |
20130031422 | DETECTING DEVICE IMPAIRMENT THROUGH STATISTICAL MONITORING - A tool for detecting potential impairment in an electronic device. The tool classifies the user input into various categories and determines some measurement, typically a rate of input per user or per time, for determining average use statistics of the electronic device. The tool then determines if a calculated measurement based on user inputs deviates from the average use statistics past some threshold level of deviation. In response to surpassing the threshold level of deviation, the tool identifies the electronic device as potentially impaired. | 2013-01-31 |
20130031423 | System and Method for Identifying Fault Prone Computer Code Files - Metrics associated with computer code files within a codebase may be analyzed to identify bug-prone files. Functions of the method or system may determine metrics corresponding to each file of a plurality of codebase files within an application codebase. The functions may also store the metrics corresponding to each codebase file in a record of a database table, rank order the plurality of codebase files according to at least one metric, and flag each codebase file having a ranking over a threshold value of the metric. The codebase file metrics may describe fault-inducing characteristics of the plurality of codebase files and include both a total number of previous faults and a total number of changes that are associated with each codebase file. | 2013-01-31 |
20130031424 | PROACTIVE AND ADAPTIVE CLOUD MONITORING - Processes, computer-readable media, and machines are disclosed for reducing a likelihood that active functional components fail in a computing system. An active monitoring component receives metrics associated with different active functional components of a computing system. The different active functional components contribute to different functionalities of the system. Based at least in part on the metrics associated with a particular active functional component, the active monitoring component determines that the particular active functional component has reached a likelihood of failure but has not failed. In response to determining that the particular active functional component has reached the likelihood of failure but has not failed, the active monitoring component causes a set of actions that are predicted to reduce the likelihood of failure. | 2013-01-31 |
20130031425 | ESTIMATING DATA AVAILABILITY ON MANAGED STORAGE DEVICES - This disclosure describes methods, systems and software that can be used to calculate the estimated mean time to data loss for a particular configuration of a disk group. For example, a system can be used to evaluate a plurality of configurations, and/or to select (and/or allow a user to select) an optimal configuration of the disk group, based, in some cases, on the relative estimated mean times to data loss of the various configurations. This can allow, if desired, the configuration of the disk group to minimize the likelihood of data loss in the disk group. | 2013-01-31 |
20130031426 | COMMUNICATION APPARATUS - To make it possible to easily identify the error location, a communication apparatus includes: a first storage unit; an error detecting unit detecting a bus error caused on a bus of its own PLC; an error counting unit counting the number of times the error detecting unit has detected a bus error and recording a counted value of the bus error in the first storage unit; a transmitting unit transmitting a counted value recorded in the first storage unit and counted by the error counting unit to all of other PLCs belonging to the same PLC system; and a receiving unit receiving a counted value transmitted from the other PLCs belonging to the same PLC system and storing the received counted value in the first storage unit in such a way that a PLC that is a transmission source of the counted value can be identified. | 2013-01-31 |
20130031427 | Performing Process for Removal Medium - In a controller of a tape drive, when an error recovery section cannot recover an error detected by an error detecting section, an error-report generation section generates an error report, an error-information acquisition section acquires error information of the tape drive and a cartridge loaded in the tape drive, an error-information exchange section acquires pieces of error information of other tape drives and cartridges loaded in these other tape drives, an error-factor judging section judges whether the error is attributable to the tape drive or the cartridge based on these pieces of error information, an error-report update section updates the error report in accordance with the result of this judgment, and an error-report output section outputs the error report thus updated to a host. | 2013-01-31 |
20130031428 | Detecting Memory Hazards in Parallel Computing - A computer-implemented method, computer-readable media, and a computerized system to track and detect data hazards are provided. The computerized system includes processors configured to execute instructions associated with a multithreaded program. The computerized system allocates memory for the multithreaded program and creates threads for execution on the processors. The memory may include a reserved area for tracking information. The threads access the allocated memory in accordance with the multithreaded program and the memory including the tracking information is updated based on the threads' memory access. In turn, the processors generate notifications of data hazard based on the tracking information stored in the allocated memory. | 2013-01-31 |