11th week of 2015 patent applcation highlights part 65 |
Patent application number | Title | Published |
20150074352 | Multiprocessor Having Segmented Cache Memory - A sequential data processor having a plurality of data processors, a plurality of memory segments, and a plurality of bus segments selectively interconnecting the data processors and memory segments to form a data cache. | 2015-03-12 |
20150074353 | System and Method for an Asynchronous Processor with Multiple Threading - Embodiments are provided for an asynchronous processor with multiple threading. The asynchronous processor includes a program counter (PC) logic and instruction cache unit comprising a plurality of PC logics configured to perform branch prediction and loop predication for a plurality of threads of instructions, and determine target PC addresses for caching the plurality of threads. The processor further comprises an instruction memory configured to cache the plurality of threads in accordance with the target PC addresses from the PC logic and instruction cache unit. The processor further includes a multi-threading (MT) scheduling unit configured to schedule and merge instruction flows for the plurality of threads from the instruction memory into a single combined thread of instructions. Additionally, a MT register window register is included to map operands in the plurality of threads to a plurality of corresponding register windows in a register file. | 2015-03-12 |
20150074354 | DEVICE, SYSTEM AND METHOD FOR USING A MASK REGISTER TO TRACK PROGRESS OF GATHERING ELEMENTS FROM MEMORY - A device, system and method for assigning values to elements in a first register, where each data field in a first register corresponds to a data element to be written into a second register, and where for each data field in the first register, a first value may indicate that the corresponding data element has not been written into the second register and a second value indicates that the corresponding data element has been written into the second register, reading the values of each of the data fields in the first register, and for each data field in the first register having the first value, gathering the corresponding data element and writing the corresponding data element into the second register, and changing the value of the data field in the first register from the first value to the second value. Other embodiments are described and claimed. | 2015-03-12 |
20150074355 | EFFICIENT CACHING OF FILE SYSTEM JOURNALS - An apparatus includes a memory and a controller. The memory may be configured to implement a cache and store meta-data. The cache generally comprises one or more cache windows. Each of the one or more cache windows comprises a plurality of cache-lines configured to store information. Each of the plurality of cache-lines is associated with meta-data indicating one or more of a dirty state, an invalid state, and a partially dirty state. The controller is connected to the memory and may be configured to (i) detect an input/output (I/O) operation directed to a file system recovery log area, (ii) mark a corresponding I/O using a predefined hint value, and (iii) pass the corresponding I/O along with the predefined hint value to a caching layer. | 2015-03-12 |
20150074356 | PROCESSOR WITH MEMORY-EMBEDDED PIPELINE FOR TABLE-DRIVEN COMPUTATION - A processor and a method implemented by the processor to obtain computation results are described. The processor includes a unified reuse table embedded in a processor pipeline, the unified reuse table including a plurality of entries, each entry of the plurality of entries corresponding with a computation instruction or a set of computation instructions. The processor also includes a functional unit to perform a computation based on a corresponding instruction. | 2015-03-12 |
20150074357 | DIRECT SNOOP INTERVENTION - A low latency cache intervention mechanism implements a snoop filter to dynamically select an intervener cache for a cache “hit” in a multiprocessor architecture of a computer system. The selection of the intervener is based on variables such as latency, topology, frequency, utilization, load, wear balance, and/or power state of the computer system. | 2015-03-12 |
20150074358 | HIGH PERFORMANCE SYSTEM PROVIDING SELECTIVE MERGING OF DATAFRAME SEGMENTS IN HARDWARE - A method of writing data to a range of logical blocks in a storage medium includes: receiving a command including a starting logical block address, a value indicating a range of logical block addresses to be written, and a logical block of data; storing the logical block in a first temporary storage; generating a logical page by duplicating the logical block a plurality of times corresponding to a number of logical blocks in a logical page and transporting the generated logical page to a second temporary storage and storing the generated logical page in the second temporary storage; writing the generated logical page from the second temporary storage into the storage medium beginning from the starting logical block address; and performing a read-modify-write operation if the first write operation does not begin on a logical page boundary or the last write operation does not end on a logical page boundary. | 2015-03-12 |
20150074359 | ELECTRONIC APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER PROGRAM PRODUCT - An electronic apparatus includes: a main storage unit; a first storage unit that stores multiple pieces of first setting information for the main storage unit; a second storage unit that stores second setting information, the second setting information being setting information for the main storage unit and corresponding to at least some of the multiple pieces of first setting information; a setting unit that sets the second setting information with a higher priority than the first setting information; and a control unit that controls the main storage unit based on information set by the setting unit. | 2015-03-12 |
20150074360 | SCHEDULER FOR MEMORY - A scheduler controls execution in a memory of operation requests received in an input request set (IRS) by providing a corresponding output request set (ORS). The scheduler includes zone standby units having a one-to-one relationship with corresponding zones such that each zone standby unit stores an operation request. The scheduler also includes an output processing unit that determines a processing sequence for the operation requests stored in the zone standby units to provide the ORS. | 2015-03-12 |
20150074361 | IDENTIFICATION OF NON-SEQUENTIAL DATA STORED IN MEMORY - Systems and methods for identification of data stored in memory are provided. A data packet is received and a first packet byte within the data packet is compared to a first memory byte within a memory. A mismatch is determined between the first packet byte and the first memory byte. A memory location is accessed that contains a second memory byte that is non-consecutive with the first memory byte. A packet location accessed that contains a second packet byte that is non-consecutive with the first packet byte. The second packet byte is compared to the second memory byte. A retrieval instruction is generated based at least in part on a result of the comparison between the second packet byte and the second memory byte. Various embodiments may be included in a network memory architecture to allow for faster data matching and instruction generation in a central appliance. | 2015-03-12 |
20150074362 | SYSTEMS AND METHODS FOR PROTECTING VIRTUAL MACHINE DATA - A computer-implemented method for protecting virtual machine data may include (1) receiving a request to perform a granular backup operation on data stored by a guest system within a virtual machine, (2) identifying a storage container that comprises an agent that performs backup operations, (3) attaching the storage container to the virtual machine in response to the request, and (4) performing the granular backup operation by sending an instruction to the guest system within the virtual machine to execute the agent. Various other methods, systems, and computer-readable media are also disclosed. | 2015-03-12 |
20150074363 | DYNAMICALLY ADJUSTING WRITE PACING - For dynamically adjusting write pacing, a calculation module calculates an interval as a maximum threshold for a primary volume divided by a first maximum pacing level for a first importance level. The calculation module further calculates a first pacing level as a number of record sets that have not been mirrored to a secondary volume divided by the interval. The first pacing level is set to the first maximum pacing level if the first pacing level is greater than the first maximum pacing level. The calculation module also selects a first pacing delay associated with the first pacing level from a delay table. A pacing module delays writes for a first channel command word writing to the primary volume by the first pacing delay. | 2015-03-12 |
20150074364 | STORAGE APPARATUS AND STORAGE APPARATUS MIGRATION METHOD - A source remote copy configuration in a source storage system is migrated to a destination storage system as a destination remote copy configuration. The destination primary storage apparatus of the destination storage system defines a virtual volume mapped to the primary volume provided by the source primary storage apparatus which is a storage area of the virtual volume; takes over a first identifier of the primary volume to the virtual volume; transfers, when the virtual volume receives an access request, the access request to the source primary storage apparatus to write data in the primary volume; and takes over the first identifier from the virtual volume to another primary volume provided by the destination primary storage apparatus, after completion of copy of data from primary volume of the source primary storage apparatus into primary volume of the destination primary storage apparatus and secondary volume of the destination secondary storage apparatus. | 2015-03-12 |
20150074365 | INFORMATION PROCESSING APPARATUS AND DUPLICATION METHOD - An information processing apparatus duplicates the state of the own apparatus into a storage device at the time of the loss of a power supply. Furthermore, the information processing apparatus duplicates a difference of the state of the own apparatus at a predetermined time interval. Furthermore, the information processing apparatus estimates the time period needed to duplicate the difference. Then, the information processing apparatus determines whether the estimated time period is longer than the time period for which a battery operates the information processing apparatus at the time of the loss of the power supply. When the information processing apparatus determines that the estimated time period is longer than the time period for which the battery operates the information processing apparatus, the information processing apparatus reduces the time interval of the duplication. | 2015-03-12 |
20150074366 | APPARATUS AND METHOD FOR IMPROVED LOCK ELISION TECHNIQUES - An apparatus and method for improving the efficiency with which speculative critical sections are executed within a transactional memory architecture. For example, a method in accordance with one embodiment comprises: waiting to execute a speculative critical section of program code until a lock is freed by a current transaction; responsively executing the speculative critical section to completion upon detecting that the lock has been freed, regardless of whether the lock is held by another transaction during the execution of the speculative critical section; once execution of the speculative critical section is complete, determining whether the lock is taken; and if the lock is not taken, then committing the speculative critical section and, if the lock is taken, then aborting the speculative critical section. | 2015-03-12 |
20150074367 | METHOD AND APPARATUS FOR FAULTY MEMORY UTILIZATION - A method for faulty memory utilization in a memory system includes: obtaining information regarding memory health status of at least one memory page in the memory system; determining an error tolerance of the memory page when the information regarding memory health status indicates that a failure is predicted to occur in an area of the memory system affecting the memory page; initiating a migration of data stored in the memory page when it is determined that the data stored in the memory page is non-error-tolerant; notifying at least one application regarding a predicted operating system failure and/or a predicted application failure when it is determined that data stored in the memory page is non-error-tolerant and cannot be migrated; and notifying at least one application regarding the memory failure predicted to occur when it is determined that data stored in the memory page is error-tolerant. | 2015-03-12 |
20150074368 | THIN PROVISIONING STORAGE DEVICES IN CONNECTION WITH SECURE DELETE OPERATIONS - A method for improving thin provisioning storage devices in connection with secure delete operations is provided. The method may include receiving at a physical storage device a first indicator to initiate writing a secure delete pattern to a plurality of physical storage locations. The secure delete pattern is written to a plurality of allocated physical storage locations based on the received first indicator. When a second indicator is set, the end of the secure delete pattern is reached. The thin provisioning storage device, upon receiving the second indicator, securely erases the plurality of storage device metadata regions where the mapping of virtual storage locations to allocated physical storage locations is stored. Requests to write a secure delete pattern for virtual storage locations without corresponding allocated physical storage locations are ignored. | 2015-03-12 |
20150074369 | METHODS AND SYSTEMS FOR FORMATTING STORAGE VOLUMES - Methods, systems, and computer storage mediums including a computer program product method for formatting storage volumes are provided. One method includes creating a storage volume including a global counter and partitioned into multiple storage segments including a segment counter and partitioned into multiple stripes, wherein the global counter and each segment counter match at an initial time. The method further includes receiving a command to write data to a first stripe, comparing a first segment counter associated with the segment, determining if the segment and global counters match, and re-initializing first metadata associated with the segment to indicate the first segment requires formatting if the counters do not match. One system includes a processor for performing the above method and one computer storage medium includes a computer program product configured to perform the above method. | 2015-03-12 |
20150074370 | METHODS OF ACCESSING MEMORY CELLS, METHODS OF DISTRIBUTING MEMORY REQUESTS, SYSTEMS, AND MEMORY CONTROLLERS - Methods of accessing memory cells, methods of distributing memory requests, systems, and memory controllers are described. In one such method, where memory cells are divided into at least a first region of memory cells and a second region of memory cells, memory cells in the first region are accessed according to a first address definition and memory cells in the second region are accessed according to a second address definition that is different from the first address definition. Additional embodiments are described. | 2015-03-12 |
20150074371 | STORAGE ARRAY SYSTEM AND NON-TRANSITORY RECORDING MEDIUM STORING CONTROL PROGRAM - According to the embodiments, a storage array system includes a plurality of storage units, and a host device. The host device determines whether first data, which is restored from data in the storage units other than a replaced first storage unit, is identical with data indicated by a first function. The host device transmits and writes the first data to the first storage unit, when the first data is not identical with the data indicated by the first function. The host device transmits a deletion notification to the first storage unit, when the first data is identical with the data indicated by the first function. | 2015-03-12 |
20150074372 | Apparatus and Method for Hash Table Access - A system and method for accessing a hash table are provided. A hash table includes buckets where each bucket includes multiple chains. When a single instruction multiple data (SIMD) processor receives a group of threads configured to execute a key look-up instruction that accesses an element in the hash table, the threads executing on the SIMD processor identify a bucket that stores a key in the key look-up instruction. Once identified, the threads in the group traverse the multiple chains in the bucket, such that the elements at a chain level in the multiple chains are traversed in parallel. The traversal continues until a key look-up succeeds or fails. | 2015-03-12 |
20150074373 | SCATTER USING INDEX ARRAY AND FINITE STATE MACHINE - Methods and apparatus are disclosed using an index array and finite state machine for scatter/gather operations. Embodiment of apparatus may comprise: decode logic to decode scatter/gather instructions and generate micro-operations. An index array holds a set of indices and a corresponding set of mask elements. A finite state machine facilitates the scatter operation. Address generation logic generates an address from an index of the set of indices for at least each of the corresponding mask elements having a first value. Storage is allocated in a buffer for each of the set of addresses being generated. Data elements corresponding to the set of addresses being generated are copied to the buffer. Addresses from the set are accessed to store data elements if a corresponding mask element has said first value and the mask element is changed to a second value responsive to completion of their respective stores. | 2015-03-12 |
20150074374 | METHOD AND APPARATUS FOR ASYNCHRONOUS PROCESSOR WITH AUXILIARY ASYNCHRONOUS VECTOR PROCESSOR - An asynchronous processing system comprising an asynchronous scalar processor and an asynchronous vector processor coupled to the scalar processor. The asynchronous scalar processor is configured to perform processing functions on input data and to output instructions. The asynchronous vector processor is configured to perform processing functions in response to a very long instruction word (VLIW) received from the scalar processor. The VLIW comprises a first portion and a second portion, at least the first portion comprising a vector instruction. | 2015-03-12 |
20150074375 | Reconfigurable Protocol Tables Within An ASIC - A high performance computing system is provided with an ASIC that communicates with another device in the system according to a protocol defined by the other device. The ASIC is coupled to a reconfigurable protocol table, in the form of a high speed content-addressable memory (“CAM”). The CAM includes instructions to control the execution of the protocol by the ASIC. The CAM may include instructions to control the ASIC in the event that unanticipated signals or other errors are encountered while executing the protocol. Internal ASIC state data may be routed to the CAM to permit the ASIC to generate a reasonable response to errors either in the design or fabrication of the ASIC or the device with which it is communicating. | 2015-03-12 |
20150074376 | System and Method for an Asynchronous Processor with Assisted Token - Embodiments are provided for an asynchronous processor using master and assisted tokens. In an embodiment, an apparatus for an asynchronous processor comprises a memory to cache a plurality of instructions, a feedback engine to decode the instructions from the memory, and a plurality of XUs coupled to the feedback engine and arranged in a token ring architecture. Each one of the XUs is configured to receive an instruction of the instructions form the feedback engine, and receive a master token associated with a resource and further receive an assisted token for the master token. Upon determining that the assisted token and the master token are received in an abnormal order, the XU is configured to detect an operation status for the instruction in association with the assisted token, and upon determining a needed action in accordance with the operation status and the assisted token, perform the needed action. | 2015-03-12 |
20150074377 | System and Method for an Asynchronous Processor with Pepelined Arithmetic and Logic Unit - Embodiments are provided for an asynchronous processor with pipelined arithmetic and logic unit. The asynchronous processor includes a non-transitory memory for storing instructions and a plurality of instruction execution units (XUs) arranged in a ring architecture for passing tokens. Each one of the XUs comprises a logic circuit configured to fetch a first instruction from the non-transitory memory, and execute the first instruction. The logic circuit is also configured to fetch a second instruction from the non-transitory memory, and execute the second instruction, regardless whether the one of the XUs holds a token for writing the first instruction. The logic circuit is further configured to write the first instruction to the non-transitory memory after fetching the second instruction. | 2015-03-12 |
20150074378 | System and Method for an Asynchronous Processor with Heterogeneous Processors - Embodiments are provided for an asynchronous processor with heterogeneous processors. In an embodiment, the apparatus for an asynchronous processor comprises a memory configured to cache instructions, and a first unit (XU) configured to processing a first instruction of the instructions. The apparatus also comprises a second XU having less restricted access than the first XU to a resource of the asynchronous processor and configured to process a second instruction of the instructions. The second instruction requires access to the resource. The apparatus further comprises a feedback engine configured to decode the first instruction and the second instruction, and issue the first instruction to the first XU, and a scheduler configured to send the second instruction to the second XU. | 2015-03-12 |
20150074379 | System and Method for an Asynchronous Processor with Token-Based Very Long Instruction Word Architecture - Embodiments are provided for an asynchronous processor with token-based very long instruction word architecture. The asynchronous processor comprises a memory configured to cache a plurality of instructions, a feedback engine configured to receive the instructions in bundles of instructions at a time (referred to as very long instruction word) and to decode the instructions, and a crossbar bus configured to transfer calculation information and results of the asynchronous processor. The apparatus further comprises a plurality of sets of execution units (XUs) between the feedback engine and the crossbar bus. Each set of the sets of XUs comprises a plurality of XUs arranged in series and configured to process a bundle of instructions received at the each set from the feedback engine. | 2015-03-12 |
20150074380 | METHOD AND APPARATUS FOR ASYNCHRONOUS PROCESSOR PIPELINE AND BYPASS PASSING - A clock-less asynchronous processor comprising a plurality of parallel asynchronous processing logic circuits, each processing logic circuit configured to generate an instruction execution result. The processor comprises an asynchronous instruction dispatch unit coupled to each processing logic circuit, the instruction dispatch unit configured to receive multiple instructions from memory and dispatch individual instructions to each of the processing logic circuits. The processor comprises a crossbar coupled to an output of each processing logic circuit and to the dispatch unit, the crossbar configured to store the instruction execution results. | 2015-03-12 |
20150074381 | PROCESSOR WITH MEMORY-EMBEDDED PIPELINE FOR TABLE-DRIVEN COMPUTATION - A processor and a method implemented by the processor to obtain computation results are described. The processor includes a unified reuse table embedded in a processor pipeline, the unified reuse table including a plurality of entries, each entry of the plurality of entries corresponding with a computation instruction or a set of computation instructions. The processor also includes a functional unit to perform a computation based on a corresponding instruction. | 2015-03-12 |
20150074382 | System and Method for an Asynchronous Processor with Scheduled Token Passing - Embodiments are provided for adding a token jump logic to an asynchronous processor with token passing. The token jump logic allows token forward jumps and token backward jumps over a cascade of token processing logics in the processor. An embodiment method includes determining, using a token jump logic coupled to a cascade of token processing logics, whether to administer a token forward jump or a token backward jump of a token signal passing through the token processing logics. The token forward jump and token backward jump allow the token signal to skip one or more token processing logics in the cascade. The method further includes monitoring, for each of the token processing logics, a polarity status of a token sense logic, and inverting the polarity status according to the determination at the token jump logic. | 2015-03-12 |
20150074383 | VECTOR GALOIS FIELD MULTIPLY SUM AND ACCUMULATE INSTRUCTION - A Vector Galois Field Multiply Sum and Accumulate instruction. Each element of a second operand of the instruction is multiplied in a Galois field with the corresponding element of the third operand to provide one or more products. The one or more products are exclusively ORed with each other and exclusively ORed with a corresponding element of a fourth operand of the instruction. The results are placed in a selected operand. | 2015-03-12 |
20150074384 | SECURE BOOT METHOD, SEMICONDUCTOR DEVICE AND RECORDING MEDIUM - A secure boot method for a system, the system including a processor and a storage medium configured to store a program, a plurality of first partial hash values calculated based on a plurality of first partial programs into which the program is divided, and a first legitimate hash value which is a hash value calculated based on a plurality of first legitimate partial hash values, the plurality of first legitimate partial hash values being calculated based on a plurality of legitimate partial programs. The secure boot method includes calculating, a second calculated hash value based on the plurality of first partial hash values, and determining, whether or not the second calculated hash value matches the first legitimate hash value to continue the start-up processing of the system when the determination indicates match, and suspend the start-up processing of the system when the determination does not indicate match. | 2015-03-12 |
20150074385 | SERVER SYSTEM - A server system includes a PCH, a BMC, a BIOS with a write protect end, and a controlling circuit. The BIOS includes a write protect end. The BMC includes a memory portion storing updated server data. The BIOS is electrically connected to the PCH and is electrically connected to the BMC. The controlling circuit includes a first input end and an output end. The first input end is electrically connected to the PCH. The output end is electrically connected to the write protect end. The controlling circuit is configured so that when an error in the BIOS is detected, the write protect end is opened and the BIOS is updated from the memory portion of the BMC. | 2015-03-12 |
20150074386 | BOOT METHOD AND BOOT SYSTEM - A boot method for a platform system including a Universal Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS) is provided. The UEFI BIOS includes partitions storing an initial boot program code, a factory setting boot program code, a first customized boot program code, a second customized boot program code and boot information respectively. The provided method comprises steps of: loading the initial boot program code stored in one of the partitions of the UEFI BIOS into a memory, and executing the initial boot program code stored in the memory by a CPU to perform a first phase of boot; and loading one of the factory setting boot program code, the first customized boot program code and the second customized boot program code stored in the partitions of the UEFI BIOS into the memory according to data in the boot information, and executing the program code loaded in the memory to perform a second phase of boot by the CPU. | 2015-03-12 |
20150074387 | SYSTEM AND METHOD FOR AUTO-ENROLLING OPTION ROMS IN A UEFI SECURE BOOT DATABASE - A mechanism for automatically enrolling option ROMs into the system security database used for a UEFI Secure Boot is discussed. A request is received by a computing device to auto-enroll one or more option ROMs for one or more respective devices on the next boot of the system. Upon receiving the request, a flag or other type of indicator indicative of an auto-enroll status is changed to an active mode. The indicator is stored in non-volatile memory and may be stored as a UEFI Authenticated Variable. Following the changing of the indicator, the system is either reset or shut down. During the next boot only, after identifying the indicator indicative of an active mode auto-enroll status, the signatures for the option ROMs of all discovered devices whose signatures do not exist in the system security database are calculated(hashed) and added to the UEFI Secure Boot database without user interaction. | 2015-03-12 |
20150074388 | METHOD AND SYSTEM FOR CONTENT DISTRIBUTION - A centralized distribution server comprises converter means for embedding content data into a digital delivery stream and transmitting means for transmitting said digital delivery stream to at least one of said subscriber terminals via a forward network channel. The at least one subscriber terminal comprises receiving means for receiving said digital delivery stream from said centralized server and interface means for enabling access to said digital delivery stream and/or the content data embedded therein by a subscriber. According to the invention, the at least one subscriber terminal comprises first means for generating a first acknowledgement (type 1) upon receipt of said digital delivery stream by said receiving means and second means for generating a second acknowledgement (type 2) upon access of the digital delivery stream and/or the content data embedded therein by the user via the interface means, said first and second acknowledgements to be transmitted to the centralized distribution server via a return network channel and said centralized distribution server comprises a feedback management module for receiving said first and second acknowledgements transmitted from said at least one subscriber terminal to the centralized distribution server. Each acknowledgment (type 1 or type 2) sent by each subscriber terminal and received by the centralized distribution server generates a message that proves that the status of the digital delivery stream and/or the content data embedded therein on the subscriber terminal is known by the centralized distribution server and thus confirmed. | 2015-03-12 |
20150074389 | PRIVATE PEER-TO-PEER NETWORK PLATFORM FOR SECURE COLLABORATIVE PRODUCTION AND MANAGEMENT OF DIGITAL ASSETS - Asset management systems and methods are presented. In one embodiment, a system includes a computing resource associated with a project member. A project container is stored on the computing resource, wherein the project container comprises encrypted objects related to a project. The encrypted objects includes project metadata and one or more working objects associated with one or more sub-projects of which the project member is granted permissioned access. An encryption/decryption engine is included for encrypting and decrypting the encrypted objects. The system includes an archive file system for storing the encrypted objects and previous versions of the objects, and a façade file system for viewing and accessing and interacting with the one or more working objects. Other computing resources associated with other project members are similarly configured, wherein a plurality of project containers store distributed objects that are grouped within the project. An authentication server provides authenticated access to each of the plurality of project containers, and authenticated peer-to-peer communication between the plurality of project containers. | 2015-03-12 |
20150074390 | METHOD AND DEVICE FOR CLASSIFYING RISK LEVEL IN USER AGENT BY COMBINING MULTIPLE EVALUATIONS - The present invention is directed toward a computer implemented method and device for classifying a safety level associated with a particular network data resource (e.g., webpage) in connection with the operation of a user agent (e.g., web browser). According to the invention, the safety level is classified by performing evaluations of the data resource on each of a plurality of categories relating to security or trust, quantifying the evaluations to associate a score with each of the plurality of categories, and applying a set of rules to the obtained scores. Furthermore, based on the application of these rules, a determination can be made as to whether a precautionary measure is warranted. If so, the user is notified of the precautionary measure. | 2015-03-12 |
20150074391 | VERIFICATION OF USER COMMUNICATION ADDRESSES - Disclosed are various embodiments for performing stateless verification of communication addresses. Encrypted verification data is generated for a user, including a communication address, an identifier of the user, a verification code, and a timestamp. The encrypted verification data is sent to the user, and the verification code is transmitted to the communication address. The encrypted verification data and the verification code are received from the user. The communication address is verified based at least in part on the verification code received from the user and the encrypted verification data received from the user. | 2015-03-12 |
20150074392 | SECURE PROCESSING ENVIRONMENT FOR PROTECTING SENSITIVE INFORMATION - A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data. | 2015-03-12 |
20150074393 | Method, Apparatus, and System for Implementing Media Data Processing - Some embodiments disclose a method, an apparatus, and a system for implementing media data processing. A method includes dividing media data into several data blocks and selecting a part of the several data blocks using a preset rule shared with a requester. The method also includes encrypting the selected part of the several data blocks and sending the encrypted part of the several data blocks and another unencrypted part of the several data blocks to the requester. The requester can determine the encrypted part of the several data blocks according to the preset rule. | 2015-03-12 |
20150074394 | HOST DEVICE AND AUTHENTICATION METHOD FOR HOST DEVICE - A first data generation unit generates identification key information (FKey) that may be decrypted from the identification key information (IDKey) using key management information (FKB) read from an authenticatee. A decryption unit decrypts encrypted secret identification information (E-SecretID) using the identification key information (FKey) to generate secret identification information (SecretID). A second data generation unit generates a first session key (Skey) using the first key information (Hkey) and a random number. A one-way conversion unit performs a one-way conversion process on the secret identification information (SecretID) using the generated first session key (SKey) to generate first one-way conversion data (Oneway-ID). | 2015-03-12 |
20150074395 | Establishing a Trust Relationship Between Two Product Systems - A mechanism is provided for establishing a trust relationship between two products. A resource device receives a registration request from an application device to access a resource on the resource device by an application and users of the application on the application device. The resource device sends a registration response using a redirection uniform resource identifier (URI) provided with the registration request, where the registration response includes an authorization code and a symmetric key in response to authenticating the registration request. The resource device receives an access token request that includes the symmetric key, verifiable authentication data, and the redirection URI. The resource device sends an access token to the application device in response to validating the access token request, where the access token allows for access to the resource on the resource device thereby establishing the trust relationship between the resource device and the application device. | 2015-03-12 |
20150074396 | Lawful Interception of Encrypted Communications - A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication. | 2015-03-12 |
20150074397 | METHOD OF DISTRIBUTING DIGITAL PUBLICATIONS INCORPORATING USER GENERATED AND ENCRYPTED CONTENT WITH UNIQUE FINGERPRINTS - Electronic publications are increasingly replacing physical media, where standards have evolved to mimic these physical media. Accordingly it is beneficial to provide electronic publication software systems and/or software applications to enable new paradigms that provide consumers, authors, publishers, retailers, and others with a method of publishing new electronic content in a manner wherein primary and secondary electronic content may be combined from multiple sources to generate said new electronic content which may be distributed based upon rights embedded within content elements. The method further comprising the ability to support community interactions within work and private environments; to re-assign licenses and issue sub-licenses; and to distribute said new electronic content with a unique fingerprint allowing unique identification of sources of non-authorised content. | 2015-03-12 |
20150074398 | SECURITY - A method of secure information sharing between a first domain and a plurality of destination domains, the method comprising:
| 2015-03-12 |
20150074399 | PERSISTENT HOUSEHOLD KEYS FOR IN-HOME MEDIA CONTENT DISTRIBUTION - A method of enabling media recording compatibility between client devices, comprising provisioning a first client device associated with a subscriber identifier with a household key also associated with the subscriber identifier, receiving a media content stream at the first client device, the media content stream having been encrypted by a content provider, decrypting the media content stream at the first client device, creating a recording with the first client device by digitally recording a portion of the media content stream, encrypting the recording with the household key at the first client device, saving the recording to a memory device, and loading the recording onto a second client device that has also been provisioned with the household key, the second client device also being associated with the subscriber identifier, such that the second client device uses the household key to decrypt and play back the recording. | 2015-03-12 |
20150074400 | SYSTEM AND METHOD FOR OBTAINING AN AUTHORIZATION KEY TO USE A PRODUCT - A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based on a cryptographic algorithm. | 2015-03-12 |
20150074401 | CLOUD KEY ESCROW SYSTEM - Embodiments are directed to allowing a user to store encrypted, third-party-accessible data in a data store and to providing third party data access to a user's encrypted data according to a predefined policy. A data storage system receives encrypted data from a user at a data storage system. The data is encrypted using the user's private key. The data storage system stores the received encrypted data according to a predefined policy. The encryption prevents the storage system from gaining access to the encrypted data, while the policy allows the encrypted data to be released upon receiving a threshold number of requests from verified third parties. The data storage system implements a verifiable secret sharing scheme to verify that the encrypted data can be reconstituted without the data storage system accessing the encrypted data. The data storage system synchronously acknowledges that the received encrypted data has been verified and successfully stored. | 2015-03-12 |
20150074402 | CLOUD KEY ESCROW SYSTEM - Embodiments are directed to allowing a user to store encrypted, third-party-accessible data in a data store and to providing third party data access to a user's encrypted data according to a predefined policy. A data storage system receives encrypted data from a user at a data storage system. The data is encrypted using the user's private key. The data storage system stores the received encrypted data according to a predefined policy. The encryption prevents the storage system from gaining access to the encrypted data, while the policy allows the encrypted data to be released upon receiving a threshold number of requests from verified third parties. The data storage system implements a verifiable secret sharing scheme to verify that the encrypted data can be reconstituted without the data storage system accessing the encrypted data. The data storage system synchronously acknowledges that the received encrypted data has been verified and successfully stored. | 2015-03-12 |
20150074403 | METHOD AND APPARATUS FOR MUTUAL AUTHENTICATION - Disclosed is a method for mutual authentication between a station, having a digital rights agent, and a secure removable media device. The digital rights agent is configured to initiate mutual authentication by sending a message to the secure removable media device. The secure removable media device is configured to encrypt at least a first random number using a public key associated with the digital rights agent. The digital rights agent is configured to decrypt the encrypted first random number, and encrypt at least a second random number and a first hash based on at least the first random number. The secure removable media device is configured to decrypt the encrypted second random number and the first hash, verifie the first hash to authenticate the digital rights agent, and generate a second hash based on at least the second random number. The digital rights agent is configured to verify the second hash to authenticate the secure removable media device. | 2015-03-12 |
20150074404 | METHOD FOR THE PROTECTED TRANSMISSION OF DATA - A method for authenticating a transmitter to a receiver, as well as for the protected transmission of messages; both the transmitter, as well as the receiver at least having a first common key; a random number, as well as at least one first partial code of a first code calculated from the random number with the aid of the first key from the receiver to the transmitter being transmitted in a synchronization message; the first partial code being checked by the transmitter; a first counter being generated by the transmitter; useful data, as well as a first partial counter of first counter and at least one second partial code of a second code calculated with the aid of a second key being transmitted by the transmitter to the receiver in a message; and the receiver checking the second partial code to verify the transmitter, as well as the transmitted message. | 2015-03-12 |
20150074405 | SECURING DATA USING INTEGRATED HOST-BASED DATA LOSS AGENT WITH ENCRYPTION DETECTION - A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted. | 2015-03-12 |
20150074406 | MEMORY DEVICE AND MEMORY SYSTEM - For authentication of the host device, the memory device is configured to output the encrypted second key information (FKB) to the host device, output the encrypted identification information (E-SecretID) to the host device, generate third third key information (Hkey) using information (HC) received from the host device and the first key information, generate a session key (Skey) using a random number (RN) received from the host device, and the third key information,
| 2015-03-12 |
20150074407 | FEDERATED AUTHENTICATION OF CLIENT COMPUTERS IN NETWORKED DATA COMMUNICATIONS SERVICES CALLABLE BY APPLICATIONS - A data processing method providing improved and efficient authentication of client computers by server computers, the method comprising: using authentication logic of a server computer, establishing a secure socket connection with a client computer; receiving, from the client computer, a request to use a communications service that is implemented at the server computer, and in response to the request, determining that the client computer is unauthenticated; providing a nonce value to the client computer; receiving from the client computer an encrypted identity token that includes the nonce and a user identifier, wherein the identity token has been encrypted using a provider computer and an encryption key of the provider computer, wherein the encryption key is known at the server computer; validating the identity token and obtaining the user identifier therein; creating and storing a session token that is uniquely associated with the client computer and that includes a session identifier, the user identifier, and a binding to the secure socket connection. | 2015-03-12 |
20150074408 | SYSTEM AND METHOD FOR CENTRALIZED KEY DISTRIBUTION - A system and method for distributing key pair credentials that includes receiving a public key message at a key master service, wherein the public key message originates from a first client application; associating a key identifier with the public key; storing the public key at the key master service indexed at least by a key identifier; receiving a request for a public key from an outside service, wherein the request specifies a key identifier; and responding to the request with a public key according to the key identifier. | 2015-03-12 |
20150074409 | SYSTEM AND METHOD FOR SECURELY STORING AND SHARING INFORMATION - A method for any community of interest to conduct secure exchange of encrypted data using a three-party security mechanism consisting of key masters, registries and cloud lockboxes. The registries establish unique identities, verify authenticity, and create directories of individuals, members, cloud lockboxes and other registries. The registries manage permissions lists communicated to the cloud lockboxes as well as detecting and halting anomalous activity. The key masters operated by members to manage keys for individuals, handle encryption and decryption and conduct key exchanges with other members. The cloud lockboxes manage file storage, retrieval and access control. Related application programming interfaces support multiple levels of integration and generate metadata specific to the needs of the community of interest. Community of interest establishes operating parameters including: selecting an encryption algorithm, establishing identity verification processes and selecting a security level. The design supports several other key features. | 2015-03-12 |
20150074410 | SYSTEM, PROCESSING DEVICE, COMPUTER PROGRAM AND METHOD, TO TRANSPARENTLY ENCRYPT AND STORE DATA OBJECTS SUCH THAT OWNERS OF THE DATA OBJECT AND PERMITTED VIEWERS ARE ABLE TO VIEW DECRYPTED DATA OBJECTS AFTER ENTERING USER SELECTED PASSWORDS - A cryptographic system makes everyday data objects, such as a document or conversation, unreadable to anyone other than the owner or those currently having permission to access the data objects. The cryptographic system is transparent by requiring no additional effort on the part of any user in the encryption/decryption process other than entering a user identifier and password. Each document is encrypted with a unique encryption key. Changes to data object access permissions are immediately honored and enforced by enabling or disabling access to certain decryption keys. Decryption of data objects requires information known only to the owner of the data object or those permitted to access the data object. This decryption information is not stored anywhere in the system. | 2015-03-12 |
20150074411 | ENHANCED SECURITY FOR DIRECT LINK COMMUNICATIONS - A method and apparatus for secure direct link communication between multiple wireless transmit/receive units (WTRUs) are disclosed. The WTRUs may exchange nonces that are used for generating a common nonce. Group identification information may be generated from at least the common nonce and is forwarded to an authentication server. The authentication server may generate a master key from the group identification information to match WTRUs as part of a key agreement group. The common nonce may be a session key and be refreshed during communication with the second WTRU. A group key encryption key (GKEK) and a group key confirmation key (GKCK) may also be generated based on the common nonce and used to encrypt and sign the master key so that base stations do not have access to the master key. A first WTRU may generate a group direct link temporal key (GDLTK) for communicating with the second WTRU. | 2015-03-12 |
20150074412 | CRYPTOGRAPHIC STORAGE DEVICE CONTROLLER - A method of configuring a controller of a portable-computer-readable-medium for performing a cryptographic function, and a portable-computer-readable-medium configured by same, are disclosed. The portable-computer-readable-medium has memory means in which at least first and second data files are stored, each file starting at a respective Logical Block Address (LBA) of the memory means. A first code, for instance a private key, is written in the first file. A password is associated with the second file. The controller of the portable-computer-readable-medium is configured to perform a hash function upon input data to be written to the second file with the first code, write the output hash to at least the second LBA, increment the first code and write the incremented first code to the first LBA. | 2015-03-12 |
20150074413 | AUTOMATIC CONTENT PUBLICATION AND DISTRIBUTION - A method and system relate to receiving, by a network device, information associated with a client device; determining, by the network device, that the client device is authorized to access digital content associated with a content provider; and forwarding, by the network device, authentication data to the content provider. The authentication data includes, for example, information identifying the client device, and an indication that the client device is authorized to access the digital content. The content provider enables the client device to access the digital content based on the authentication data. | 2015-03-12 |
20150074414 | SYSTEM AND METHOD FOR PROVIDING DIGITAL SIGNATURE BASED ON MOBILE TRUSTED MODULE - Provided are a system and method for providing a digital signature based on a mobile trusted module (MTM). The system includes a control unit configured to activate a mobile application and receive selection of one certificate in a previously set certificate list from a user through the activated mobile application, an MTM configured to generate based on the selected certificate a keypad image in which buttons are irregularly arranged, an MTM table for converting keypad touch information into an actual value, and a terminal table for converting keypad image coordinates into an area, and put a digital signature on the certificate using a certificate password input by the user based on the keypad image, the MTM table, and the terminal table to generate a digital signature value, and a communication unit configured to encrypt the generated digital signature value and transmit the encrypted digital signature to an authentication server. | 2015-03-12 |
20150074415 | Image Verification By An Electronic Device - A method for verifying an image by a first electronic device, the method comprising the first electronic device: sending a request for an image to a second electronic device, wherein the second electronic device is remote from the first electronic device and, optionally, a server; receiving an image and a certificate from the second electronic device, wherein the certificate comprises a protected checksum of at least the image; generating a checksum in dependence on at least the received image; performing a comparison in dependence on said generated checksum and the protected checksum received in the certificate; and verifying the received image in dependence upon the comparison. Advantageously, the first electronic device is able to verify each received image and to prevent the display of any received images that are not authenticated. Applications include the display of card images. | 2015-03-12 |
20150074416 | VERIFICATION OF SIGNED DIGITAL DOCUMENTS - Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secure delay processing operations, each operation generating a delayed output value from an initial value. The passphrase is verified upon completion of the sequence of secure delay processing operations. Further, initial values of respective secure delay processing operations are based on respective passphrase elements and, for each secure delay processing operation after a first secure delay processing operation, a delayed output value from at least one other secure delay processing operations. | 2015-03-12 |
20150074417 | APPARATUS AND METHOD FOR ACCESS CONTROL OF CONTENT IN DISTRIBUTED ENVIRONMENT NETWORK - An apparatus for generating a key for access control of content in a distributed environment network is provided. The apparatus includes a first key distributor configured to generate first encrypted keys by encrypting a first key corresponding to a key for write authorization using each public key of members having write authorization among members included in an access control list including information of at least one user and distribute the access control list and information about access authorization and the first encrypted keys to the members having write authorization, and a second key distributor configured to generate second encrypted keys by encrypting a second key corresponding to a key for read authorization using the first key using each public key of members having read authorization among members included in the access control list and distribute the access control list and second encrypted keys to the members having read authorization. | 2015-03-12 |
20150074418 | METHOD AND APPARATUS FOR OUTPUTTING RECOGNIZED ERROR OF SENSOR IN ELECTRONIC DEVICE - A method and an apparatus are provided for operating an electronic device. The electronic device recognizes biometric data of a user that is input to the electronic device. Information related to an input error of the biometric data based on the recognition of the biometric data is presented to the user. | 2015-03-12 |
20150074419 | SECURE VAULT SERVICE FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT - Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed. | 2015-03-12 |
20150074420 | EMBEDDED SYSTEM, INFORMATION PROCESSING UNIT, AND IMAGE FORMING APPARATUS - An embedded system includes a nonvolatile memory, a control section, and a firmware update section. The nonvolatile memory stores firmware and a public key in a normal area, and stores a hash value concerning the public key in an access restricted area. The control section reads and executes the firmware from the nonvolatile memory. The firmware update section receives new firmware in which the hash value is encrypted and given as an electronic signature, and updates the firmware to the new firmware. The firmware update section is configured to: read the public key from the nonvolatile memory to calculate the hash value concerning the public key; when the hash value is identical to the hash value stored in the nonvolatile memory, calculate a hash value of the new firmware; decrypt the electronic signature with the public key to restore the hash value; and when these hash values are identical to each other, update the firmware. | 2015-03-12 |
20150074421 | SECURITY SYSTEM - A security system includes a controller manufacturer, a key issuer, and a medium manufacturer. The controller manufacturer writes a controller key Kc and a controller unique ID (IDcu) in the controller at the time of manufacturing the controller, and transmits the controller key Kc to the key issuer. The key issuer generates a medium device key Kmd_i and a medium device key certificate Cert | 2015-03-12 |
20150074422 | ELECTRONIC CIRCUIT AND METHOD FOR MONITORING A DATA PROCESSING - According to one embodiment, an electronic circuit is described comprising a processing circuit configured to perform a data processing including a plurality of successive operations, wherein in at least some of the plurality of operations, a predetermined input value is processed; a check value memory; a controller configured to check, for each operation of the data processing performed by the processing circuit, whether the predetermined input value is processed in the operation, and, if the predetermined input value is processed in the operation, combine the predetermined input value to the content of the check value memory and a detector configured to check, when the processing is complete, whether the content of the check value memory is equal to a predetermined value. | 2015-03-12 |
20150074423 | Digitizing Documents - The present embodiments disclose methods and devices for digitizing documents. The device includes a document-scanning device designed to digitize at least one document existing as a hard copy, and having a security device that is designed to protect the at least one digitize document against unauthorized access on the basis of an identifier that is only valid once. | 2015-03-12 |
20150074424 | AVIONICS GATEWAY INTERFACE, SYSTEMS AND METHODS - Systems and methods are provided for FAA-certified avionics devices to safely interface with non-certified mobile telecommunications devices before, during, and after flight. Data transmitted to the certified devices do not affect functionality of the certified device unless and until a user acknowledges and/or confirms the data on the certified device. Thus, the integrity of the certified device is maintained. | 2015-03-12 |
20150074425 | System and Method for Encrypted Disk Drive Sanitizing - A system and method for first changing the encryption key on a self-encrypting disk drive followed by a complete disk wipe. Either process can be separately performed, and they can be performed in any order. In fact, one embodiment of the invention, resets the symmetric key, wipes the disk a predetermined number of times with different predetermined data patterns, and then resets the key a second time. This assures that there is absolutely no way to recover the original key or to read the original plain text data, even if some of it's encrypted values remain on unallocated tracks after wiping. A user can be assured that in milliseconds after starting the wiping process, the entire disk is rendered unreadable and unrecoverable. | 2015-03-12 |
20150074426 | Generating and Using an Enhanced Initialization Vector - Embodiments for generating and using an enhanced initialization vector are disclosed. In one embodiment, data and a record identifier to which the data is to be written are received. An initialization vector for encrypting the data is then generated. The initialization vector is based on the record identifier and a value that changes every time that the record identifier is to be written to. The value can be generated, for example, by a counter that increments every time the record identifier is to be written to or by a random number generator that generates a random number every time the record identifier is to be written to. In some embodiments, the generated initialization vector is also based on a second value, such as, for example, a value that is shared by other storage modules or a value that is unique to the storage module. | 2015-03-12 |
20150074427 | SYSTEM AND METHOD TO SECURE ON-BOARD BUS TRANSACTIONS - A technique for securing on-board bus transactions in a computing device is discussed. A shared key is generated and then programmed into the read-only non-volatile write-once storage of two on-board components. The shared key may be generated during the manufacturing process. Once complete, all transactions between the two on-board components are encrypted by the components using the shared key without exposing the key on any external bus. | 2015-03-12 |
20150074428 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object. | 2015-03-12 |
20150074429 | System and Method for Secure Distribution and/or Storage of Data Files with Long Term File Integrity Verification - Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third party administrator are disclosed. The subscriber-based system acts as an electronic repository to ensure that data files remain intact, secure, and unaltered from their original form. Systems and methods for long term verification of data file integrity using checksum records stored in a public checksum directory are also disclosed. | 2015-03-12 |
20150074430 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. | 2015-03-12 |
20150074431 | SYSTEM AND METHOD FOR MANAGING POWER FEEDS THROUGH WAVEFORM MONITORING - Managing power feeds includes monitoring a waveform of a high-voltage power feed supplied to an electrical load to detect potential interruption of the high-voltage power feed and switching to another power feed to supply power to the electrical load in response to identifying the waveform pattern. Monitoring a waveform includes processing the waveform to determine if one or more waveform patterns are present in the waveform. A waveform pattern indicates, by its presence in a waveform of a power feed, a power event associated with the power feed, and some waveform patterns indicate potential interruption of the power feed. Switching to another power feed in response to determining potential interruption of the power feed based on waveform monitoring enables an uninterrupted power supply. | 2015-03-12 |
20150074432 | WAKE ON APPLICATION - Systems and methods for “Wake on Application” (WOA). An Information Handling System (IHS) may include a logic circuit and a memory having instructions that, upon execution, cause the IHS to: receive a WOA packet while the IHS is in a first power state, where the WOA packet identifies at least one of a software application or virtual server residing within the IHS; and, in response to having received the WOA packet, operate in a second power state and launch the software application or wake up the virtual server. A method may include originating, via a first IHS, a single WOA packet; and transmitting the single WOA packet over a network, where the single WOA packet is configured to cause a second IHS to switch operation from a first power state to a second power state, and to launch a software application or wake up a virtual server. | 2015-03-12 |
20150074433 | PHYSICALLY UNCLONABLE FUNCTION BASED ON BREAKDOWN VOLTAGE OF METAL- INSULATOR-METAL DEVICE - One feature pertains to a method of implementing a physically unclonable function that includes providing an array of metal-insulator-metal (MIM) devices, where the MIM devices are configured to represent a first resistance state or a second resistance state and a plurality of the MIM devices are initially at the first resistance state. The MIM devices have a random breakdown voltage that is greater than a first voltage and less than a second voltage, where the breakdown voltage represents a voltage that causes the MIM devices to transition from the first resistance state to the second resistance state. The method further includes applying a signal line voltage to the MIM devices to cause a portion of the MIM devices to randomly breakdown and transition from the first resistance state to the second resistance state, the signal line voltage greater than the first voltage and less than the second voltage. | 2015-03-12 |
20150074434 | POWER CAPPING APPARATUS AND METHOD - A power capping apparatus including a measurement unit to measure a performance counter value and a used amount of power of the computing system before a power limit value is set. A calculation unit to calculate an energy reference value used in an energy conservation mode using the used amount of power and the performance counter value. A management unit to compare a first used amount of power measured before a power limit value is set with the power limit value when the power limit value is set, and limit the used amount of power to a value below the power limit value when the first used amount of power is greater than the power limit value, wherein the management unit outputs an error message so that a user sets the power limit value in which the energy reference value is within an effective range in the energy conservation mode. | 2015-03-12 |
20150074435 | Processor Power and Performance Manager - Techniques are provided for managing the power consumption and performance of a processing device. Power consumption and utilization ratios for a processing device may be continuously measured. The measured power consumption and utilization ratios may be compared to target power consumption and utilization ratios to adjust an operating frequency of the processing device. In one implementation a power controller may take the target and measured power consumption as inputs to generate a power output and a utilization controller may take the target and measured utilization ratios as inputs to generate a utilization output. The lower of the power output and the utilization output may be selected and used to adjust the operating frequency of the processing device. The power and utilization controllers may implement a proportional-integral control scheme. | 2015-03-12 |
20150074436 | In-Kernel CPU Clock Boosting on Input Event - One embodiment provides a method to wake an electronic device having a central processing unit (CPU) from an idle condition. The method includes creating a worker queue in an interrupt-request (IRQ) driver module of the operating-system kernel of the device, receiving in the kernel an indication of user input in a form of an IRQ, and in response to receiving the indication of user input, posting a request in the worker queue to boost clock speed in the CPU. The request is then processed, causing an increase in the clock speed. | 2015-03-12 |
20150074437 | MEMORY CONTROLLER WITH TRANSACTION-QUEUE-MONITORING POWER MODE CIRCUITRY - An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device. | 2015-03-12 |
20150074438 | ADAPTIVE USB CHARGING METHOD AND SYSTEM - An adaptive universal serial bus (USB) charging method and system are disclosed. In a low-power state, a USB device is charged with a non-USB charging mode. The non-USB charging mode is retained when no variation of a data signal coupled to the USB device is detected. When the data signal possesses variation for a first period, it is switched to a third proprietary charging mode. | 2015-03-12 |
20150074439 | SYSTEM POWER SUPPLY MANAGEMENT APPARATUS AND METHOD, AND SYSTEM WITH POWER SUPPLY ENERGY SAVING MANAGEMENT FUNCTION - A system power supply management apparatus and method, and a system with a power supply energy saving management function, where the apparatus includes: a board energy saving management module, a system energy saving management module, and a power supply energy saving management module, where, the board energy saving management module perform a board energy saving action, generate a board power variation corresponding to the board energy saving action, and send the board power variation to the system energy saving management module; and the system energy saving management module calculate, according to the board power variation, an expected power variation of the system, and control, according to the expected power variation of the system, the power supply energy saving management module to adjust an output power of a power module in the system. | 2015-03-12 |
20150074440 | LINK POWER SAVINGS WITH STATE RETENTION - Methods and apparatus relating to link power savings with state retention are described. In one embodiment, one or more components of two agents coupled via a serial link are turned off during idle periods while retaining link state in each agent. Other embodiments are also disclosed. | 2015-03-12 |
20150074441 | POWER CONTROL DEVICE AND POWER CONSUMING DEVICE - A power control device | 2015-03-12 |
20150074442 | REDUCING LATENCY ASSOCIATED WITH TIMESTAMPS - A system and method are provided for reducing a latency associated with timestamps in a multi-core, multi threaded processor. A processor capable of simultaneously processing a plurality of threads is provided. The processor includes a plurality of cores, a plurality of network interfaces for network communication, and a timer circuit for reducing a latency associated with timestamps used for synchronization of the network communication utilizing a precision time protocol. | 2015-03-12 |
20150074443 | METHOD AND APPARATUS FOR ASYNCHRONOUS PROCESSOR WITH FAST AND SLOW MODE - A clock-less asynchronous processing circuit or system is configured to operation in a plurality of modes. In an initialization mode (e.g., reset, initialization, boot up), a self-clocked generator associated with the asynchronous circuit is configured to generate an active complete signal (to latch output processed data) within a first period of time after receiving a trigger signal. In a normal mode, the self-clocked generator is configured to generate the active complete signal within a second period of time after receiving the trigger signal. In one embodiment, during the initialization mode, the asynchronous circuit latches the output slower than when in the normal mode. | 2015-03-12 |
20150074444 | DATA PROCESSING DEVICE AND METHOD FOR DETERMINING A CLOCK RELATIONSHIP - A data processing device is described comprising a first clock generator configured to generate a first clock signal with a first frequency; a second clock generator configured to generate a second clock signal with a second frequency, wherein the second frequency is higher than the first frequency; and a processing circuit configured to sample a clock cycle number of the second clock signal at a plurality of sample times given by the first clock signal and determine a relationship between the first frequency and the second frequency based on a minimization of a measure of a deviation of the sampled clock cycle numbers from the clock cycle numbers of the second clock signal at the plurality of sample times expected according to the determined relationship. | 2015-03-12 |
20150074445 | METHOD AND APPARATUS FOR ASYNCHRONOUS PROCESSOR REMOVAL OF META-STABILITY - A clock-less asynchronous processing circuit or system having a plurality of pipelined processing stages utilizes self-clocked generators to tune the delay needed in each of the processing stages to complete the processing cycle. Because different processing stages may require different amounts of time to complete processing or may require different delays depending on the processing required in a particular stage, the self-clocked generators may be tuned to each stage's necessary delay(s) or may be programmably configured. | 2015-03-12 |
20150074446 | METHOD AND APPARATUS FOR ASYNCHRONOUS PROCESSOR BASED ON CLOCK DELAY ADJUSTMENT - A clock-less asynchronous processing circuit or system utilizes a self-clocked generator to adjust the processing delay (latency) needed/allowed to the processing cycle in the circuit/system. The timing of the self-clocked generator is dynamically adjustable depending on various parameters. These parameters may include processing instruction, opcode information, type of processing to be performed by the circuit/system, or overall desired processing performance. The latency may also be adjusted to change processing performance, including power consumption, speed etc. | 2015-03-12 |
20150074447 | CLUSTER SYSTEM AND METHOD FOR PROVIDING SERVICE AVAILABILITY IN CLUSTER SYSTEM - Provided is a cluster system including a first physical server having registered therein an active virtual machine; and a plurality of physical servers, wherein the plurality of physical servers comprises a second physical server having registered therein a standby virtual machine corresponding to the active virtual machine, the active virtual machine failing over to the standby virtual machine when a failure occurs in the first physical server, wherein each of the plurality of physical servers stores post-failure registration information when the failure occurs, wherein the post-failure registration information associates the active virtual machine with a physical server among the plurality of physical servers, and wherein the physical server is different from the second physical server. | 2015-03-12 |
20150074448 | CLUSTER SYSTEM, INFORMATION PROCESSING DEVICE, METHOD OF CONTROLLING CLUSTER SYSTEM, AND RECORDING MEDIUM - The present invention provides a cluster system that promptly stops access to a shared disk upon occurrence of abnormality. The cluster system is a cluster system where an active system server and a standby system server operate utilizing a shared disk. Each server includes: a disk input/output unit that accesses the shared disk by using data that is input and output via a predetermined bus; a fault detecting unit that, when a fault occurs in the active system server, detects the fault; and a bus closing unit that, when the fault detecting unit detects the fault, closes the bus by issuing an uncorrectable fault generation request to cause generation of an uncorrectable fault on the bus. | 2015-03-12 |
20150074449 | Fault Detection And Correction For Single And Multiple Media Players Connected To Electronic Displays, And Related Devices, Methods And Systems - Systems, devices, software, hardware and networks adapted and arranged for monitoring and correcting faults in networked media player systems that include electronic displays are provided. After detection or notification of a fault in at least one networked media player in a network of at least two, or N, media players operationally connected to electronic displays, the invention provides an alternate source of signal to the affected display. In some preferred embodiments, the invention utilizes at least one additional, or N+1, media player as a backup to substitute for the failed media player. Reconfiguration of the faulted media player by means of the N+1 backup networked media player advantageously increases the reliability and efficiency of ongoing maintenance of digital visual systems operating in commercial and other environments. | 2015-03-12 |
20150074450 | HARD DISK DRIVE (HDD) EARLY FAILURE DETECTION IN STORAGE SYSTEMS BASED ON STATISTICAL ANALYSIS - In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to detect a failure event indicating possible failure of a storage device, initiate a rebuild for the storage device which experienced the failure event, receive information about the storage device which experienced the failure event, and apply a set of statistical process control rules to the information to determine whether the failure event is statistically abnormal. Other systems, methods, and computer program products for providing early warning of storage device failure are also described in additional embodiments. | 2015-03-12 |
20150074451 | MEMORY SYSTEM - According to one embodiment, there is provided a memory system including a first storage medium group, a second storage medium group, and a controller. The controller is configured to multiply write the same data to the first storage medium group and the second storage medium group. And the controller is configured to transmit data read out from a storage medium group selected from the first storage medium group and the second storage medium group to a host according to a progress status of a readout process for the first storage medium group and the second storage medium group when receiving a readout command of stored data in the first storage medium group and the second storage medium group from the host. | 2015-03-12 |