11th week of 2012 patent applcation highlights part 63 |
Patent application number | Title | Published |
20120066457 | SYSTEM AND METHOD FOR ALLOCATING AND DEALLOCATING MEMORY WITHIN TRANSACTIONAL CODE - Methods and systems are provided for managing memory allocations and deallocations while in transactional code, including nested transactional code. The methods and systems manage transactional memory operations by using identifiers, such as sequence numbers, to handle memory management in transactions. The methods and systems also maintain lists of deferred actions to be performed at transaction abort and commit times. A number of memory management routines associated with one or more transactions examine the transaction sequence number of the current transaction, manipulate commit and/or undo logs, and set/use the transaction sequence number of an associated object, but are not so limited. The methods and systems provide for memory allocation and deallocations within transactional code while preserving transactional semantics. Other embodiments are described and claimed. | 2012-03-15 |
20120066458 | STORAGE SYSTEM AND DATA TRANSFER METHOD OF STORAGE SYSTEM - A storage system comprises a storage apparatus that stores therein data used by an external apparatus, first and second temporary data storage units that temporarily store therein data to be written to the storage apparatus from the external apparatus or data read from the storage apparatus, a first data transfer controller communicatively coupled with the external apparatus, and the first and second temporary data storage units, and controls data transfer between the external apparatus, and the first and second temporary data storage units, a second data transfer controller communicatively coupled with the first and second temporary data storage units, and the storage apparatus, and controls data transfer between the first and second temporary data storage units, and the storage apparatus, a third data transfer controller communicatively coupled with the first and second temporary data storage units, that controls data transfer between the first and second temporary storage units, and performs a data processing function not included in the first and second data transfer controllers, and a data transfer control management unit that causes any one of a first data transfer process and a second data transfer process to be performed upon receipt of a data I/O request from the external apparatus, the first data transfer process executing data transfer between the external apparatus and the storage apparatus via the first temporary data storage unit under control of the first and second data transfer controllers, and the second data transfer process executing data transfer between the external apparatus or the storage apparatus and the second temporary data storage unit under control of the first and second data transfer controllers and executing data transfer between the first temporary data storage unit and the second temporary data storage unit under control of the third data transfer controller. | 2012-03-15 |
20120066459 | SYSTEM AND METHOD FOR ZERO BUFFER COPYING IN A MIDDLEWARE ENVIRONMENT - Systems and methods are provided for zero buffer copying. In accordance with an embodiment, such a system can include one or more high performance computing systems, each including one or more processors and a high performance memory. The system can further include a user space, which includes a Java virtual machine (JVM) and one or more application server instances. Additionally, the system can include a plurality of byte buffers accesible to the JVM and the one or more application server instances. When a request is received by a first application server instance data associated with the request is stored in a heap space associated with the JVM, and the JVM pins the portion of the heap space where the data is stored. The data is pushed to a first byte buffer where it is accessed by the first application server instance. A response is generated by the first application server using the data, and the response is sent by the first application server. | 2012-03-15 |
20120066460 | SYSTEM AND METHOD FOR PROVIDING SCATTER/GATHER DATA PROCESSING IN A MIDDLEWARE ENVIRONMENT - Systems and methods are provided for providing scatter/gather data processing. In accordance with an embodiment, a such a system can include a cluster of one or more high performance computing systems, each including one or more processors and a high performance memory. The cluster communicates over an InfiniBand network. The system can also include a middleware environment, executing on the cluster, that includes one or more application server instances. The system can further include a plurality of muxers. Each application server instance includes at least one muxer, and each muxer is operable to collect data from a plurality of locations in the high performance memory, and transfer the data in bulk. | 2012-03-15 |
20120066461 | MEMORY ARBITRATION SYSTEM AND METHOD HAVING AN ARBITRATION PACKET PROTOCOL - A memory hub and method for transmitting a read response on a data path of a memory hub interposed between a transmitting memory hub and a receiving memory hub. An arbitration packet including data indicative of a data path configuration for an associated read response is received at the memory hub. The arbitration packet is decoded, and the data path is configured in accordance with the data of the arbitration packet. The associated read response is received at the memory hub and the associated read response is coupled to the configured data path for transmitting the same to the receiving memory hub. | 2012-03-15 |
20120066462 | UPDATING MULTI-MEDIA CONTENT IN A DIGITAL DOWNLOAD KIOSK - A method of updating multi-media content at a digital download kiosk is described. The method comprises receiving a secure portable storage device into a portable device reader/writer in the kiosk; reading the secure portable storage device to ascertain if authorized multi-media content is stored thereon; uploading the multi-media content from the secure portable storage device to a data store accessible by the kiosk; and indicating when the multi-media content has been uploaded. The portable storage device may have been received by mail from a supplier, and the method may further comprise removing the portable storage device from the portable storage device reader/writer, and returning the removed portable storage device to the supplier by mail. | 2012-03-15 |
20120066463 | Managing Presence in Communications Systems - Raw presence data from a plurality of presence data sources is collected and processed into unified presence data. Unified presence data over a period of time before a first time is stored in a historical presence data archive. A probability of a presence variable having a specific value is generated based on unified presence data collected and processed at a second time on or after the first time, the historical presence data archive, and user profile data. Presence information is generated based on the probability and the user profile data. Presence data sources include both Session Initiation Protocol based and non Session Initiation Protocol based presence data sources. In an embodiment, non Session Initiation Protocol based unified presence data is transformed into Session Initiation Protocol based unified presence data. | 2012-03-15 |
20120066464 | APPARATUS AND METHOD FOR PROGRAMMABLE READ PREAMBLE - A memory device is provided. The memory device includes a preamble memory and a memory controller. The preamble memory is arranged to store a read preamble such that the read preamble includes a training pattern that is suitable for aligning a capture point for read data. Further, the training pattern is programmable such that the training pattern can be altered at least once subsequent to manufacture of the preamble memory. In response to a read command, the memory controller provides the read preamble stored in the preamble memory, as well as the read data. | 2012-03-15 |
20120066465 | TECHNIQUES FOR RESOLVING READ-AFTER-WRITE (RAW) CONFLICTS USING BACKUP AREA - Methods, apparatuses, and computer program products for generating an update package based on a comparison between a base data image and a new data image, the update package including a set of instructions used for, in a remote client device, creating the new data image from the base data image, and for creating the new data image from the base data image based on the instructions included in the update package are provided. The method for generating an update package includes determining differences between the base data image and the new data image, generating COPY instructions corresponding to respective sections of code in the base data image that can be used in creating the new data image by copying the respective sections of code into new data locations in the new data image, organizing the COPY instructions into a directed acyclic graph, performing cycle detection on the COPY instructions in the directed acyclic graph to detect any cycles, when a cycle is detected, identifying a COPY instruction in the detected cycle with a smallest overlapping part, removing the overlapping part from the identified COPY instruction, and generating a COPYBACK instruction including the overlapping part removed from the identified COPY instruction, and after all cycles have been detected, generating the update package based on the COPY and COPYBACK instructions. | 2012-03-15 |
20120066466 | STORAGE SYSTEM STORING ELECTRONIC MODULES APPLIED TO ELECTRONIC OBJECTS COMMON TO SEVERAL COMPUTERS, AND STORAGE CONTROL METHOD FOR THE SAME - This storage system supplies, to a plurality of computers, a plurality of duplicate volumes (CVOLs) (corresponding to duplicates of a master volume (MVOL) upon which is stored an electronic object (EO) that is common to the plurality of computers). Both the MVOL and the CVOLS are virtual logical volumes that follow sync provisioning. In the plurality of CVOLs, a plurality of physical regions that are allocated to the MVOL (i.e. regions in which the electronic object is stored) (PAs) are allocated. A storage, when writing an electronic module (EM) to which the EO is applied to the first CVOL, copies data within a first PA that is allocated to the virtual region (VA) that is the write destination to a second PA, writes the EM to the second PA, and moreover allocates the second PA to a VA of the write destination, instead of the first PA. And the storage allocates the second PA to a VA within the second CVOL corresponding to the VA of the write destination, instead of the PA that is allocated to that VA. | 2012-03-15 |
20120066467 | USING A DUAL MODE READER WRITER LOCK - A method, system, and computer usable program product for using a dual mode reader writer lock. A contention condition is detected in the use of a lock in a data processing system, the lock being used for managing read and write access to a resource in the data processing system. A determination of the data structure used for implementing the lock is made. If the data structure is a data structure of a reader writer lock (RWL), the data structure is transitioned to a second data structure suitable for implementing the DML. A determination is made whether the DML has been expanded. If the DML is not expanded, the DML is expanded such that the data structure includes an original lock and a set of expanded locks. The original lock and each expanded lock in the set of expanded locks forms an element of the DML. | 2012-03-15 |
20120066468 | COMPUTER SYSTEM CONTROL METHOD AND COMPUTER SYSTEM - A host computer is coupled to a first fabric, a source storage apparatus is coupled to a second fabric, and a destination storage apparatus is coupled to a third fabric. A destination port of the destination storage apparatus comprises a same WWPN as a WWPN of a source port, and is logged in to the fabric beforehand. Duplicate WWPNs are allowed to exist because an inter fabric router separately manages the second fabric and the third fabric. When a switchover is instructed, the inter fabric router switches a coupling destination of the host computer to the destination storage apparatus. | 2012-03-15 |
20120066469 | VIRTUALIZED STORAGE SYSTEM AND METHOD OF OPERATING THEREOF - A storage system and method are provided including physical storage devices controlled by storage control devices constituting a storage control layer operatively coupled to the physical storage devices and hosts. The storage control layer includes: a first virtual layer interfacing with the hosts, operable to represent a logical address space characterized by logical block addresses, characterized by an Internal Virtual Address Space (IVAS) and operable, responsive to I/O requests addressed to logical block addresses, to provide protocol-dependent translation of said logical block addresses into IVAS addresses; and a second virtual layer interfacing with the physical storage space, and operable to represent available physical space to said hosts and characterized by a Physical Virtual Address Space (PVAS). Each address in PVAS having a corresponding address in IVAS. The second virtual layer is operable to translate PVAS addresses corresponding to IVAS addresses into addresses in physical address space in a protocol-independent manner. | 2012-03-15 |
20120066470 | METHOD AND SYSTEM FOR ALLOCATING MEMORY TO A PIPELINE - A method, and associated system, for allocating memory to a first pipeline that includes a sequence of filters. Each filter is configured to execute a process specific to each filter, receive input data, and generate output data. The output data from each filter, except the last filter in the sequence, serves as the input data to the next filter in the sequence. An optimum memory capacity is allocated to the first pipeline if possible. Otherwise, a guaranteed memory bandwidth is allocated to the first pipeline if possible. Otherwise, extra memory currently allocated to a second pipeline is currently released if the second pipeline not currently performing processing or subsequently released when the second pipeline subsequently completes performing processing that is currently being performed, followed by allocating the extra memory to the first pipeline. | 2012-03-15 |
20120066471 | ALLOCATION OF MEMORY BUFFERS BASED ON PREFERRED MEMORY PERFORMANCE - A method and system are provided for associating one or more memory buffers in a computing system with a plurality of memory channels. The method and apparatus associates one or more memory buffers with a plurality of memory banks based on preferred performance settings, wherein the plurality of memory banks spans over one or more of the plurality of memory channels. Additionally, the method and apparatus accesses the one or more memory buffers based on the preferred performance settings. Further, the method and apparatus can, in response to accessing the one or more memory buffers based on the preferred performance settings, determine whether the preferred performance settings are being satisfied. | 2012-03-15 |
20120066472 | MACROSCALAR PROCESSOR ARCHITECTURE - A macroscalar processor architecture is described herein. In one embodiment, a processor receives instructions of a program loop having a vector block and a sequence block intended to be executed after the vector block, where the processor includes multiple slices and each of the slices is capable of executing an instruction of an iteration of the program loop substantially in parallel. For each iteration of the program loop, the processor executes an instruction of the sequence block using one of the slices while executing instructions of the vector block using a remainder of the slices substantially in parallel. Other methods and apparatuses are also described. | 2012-03-15 |
20120066473 | Memory Architecture with Policy Based Data Storage - A computing system and methods for memory management are presented. A memory or an I/O controller receives a write request where the data two be written is associated with an address. Hint information may be associated with the address and may relate to memory characteristics such as an historical, O/S direction, data priority, job priority, job importance, job category, memory type, I/O sender ID, latency, power, write cost, or read cost components. The memory controller may interrogate the hint information to determine where (e.g., what memory type or class) to store the associated data. Data is therefore efficiently stored within the system. The hint information may also be used to track post-write information and may be interrogated to determine if a data migration should occur and to which new memory type or class the data should be moved. | 2012-03-15 |
20120066474 | Real Address Accessing in a Coprocessor Executing on Behalf of an Unprivileged Process - A coprocessor performs operations on behalf of processes executing in processors coupled thereto, and accesses data operands in memory using real addresses. A process executing in a processor generates an effective address for a coprocessor request, invokes the processor's address translation mechanisms to generate a corresponding real address, and passes this real address is the coprocessor. Preferably, the real address references a block of additional real addresses, each for a respective data operand. The coprocessor uses the real address to access the data operands to perform the operation. An address context detection mechanism detects the occurrence of certain events which could alter the context of real addresses used by the coprocessor or the real addresses themselves. | 2012-03-15 |
20120066475 | TRANSLATION LOOKASIDE BUFFER - A translation lookaside buffer (TLB) is disclosed formed using RAM and synthesisable logic circuits. The TLB provides logic within the synthesisable logic for pairing down a number of memory locations that must be searched to find a translation to a physical address from a received virtual address. The logic provides a hashing circuit for hashing the received virtual address and uses the hashed virtual address to index the RAM to locate a line within the RAM that provides the translation. | 2012-03-15 |
20120066476 | MICRO-OPERATION PROCESSING SYSTEM AND DATA WRITING METHOD THEREOF - A data writing method and a micro-operation processing system are provided. The micro-operation processing system is adapted to access a plurality of registers and each of the registers defines at least one logic storing area. The data writing method comprises the following steps: executing a first micro-operation; selecting a target area of the first micro-operation, which has been updated by the second micro-operation before, as one of the logic storing areas; assigning each of the first micro-operation and the second micro-operation a respective identification number; determining that a execution order of the first micro-operation is later than a execution order of the second micro-operation according to the identification numbers of the first micro-operation and the second micro-operation; and recording that the target area has been updated by the first micro-operation. | 2012-03-15 |
20120066477 | ADVANCED PROCESSOR WITH MECHANISM FOR PACKET DISTRIBUTION AT HIGH LINE RATE - An advanced processor comprises a plurality of multithreaded processor cores each having a data cache and instruction cache. A data switch interconnect is coupled to each of the processor cores and configured to pass information among the processor cores. A messaging network is coupled to each of the processor cores and a plurality of communication ports. In one aspect of an embodiment of the invention, the data switch interconnect is coupled to each of the processor cores by its respective data cache, and the messaging network is coupled to each of the processor cores by its respective message station. Advantages of the invention include the ability to provide high bandwidth communications between computer systems and memory in an efficient and cost-effective manner. | 2012-03-15 |
20120066478 | METHOD FOR FAST PARALLEL INSTRUCTION LENGTH DETERMINATION - The present invention provides a method and apparatus that may be used for parallel instruction length decoding. One embodiment of the method includes concurrently determining a plurality of masks identifying bytes in a plurality of candidate instructions. Each mask uses a different byte in a first fetch window as a starting byte and the corresponding one of the plurality of candidate instructions includes the starting byte. This embodiment of the method also includes selecting one of the masks to identify one of the candidate instructions as a first instruction using information indicating an ending byte of a previous instruction. | 2012-03-15 |
20120066479 | METHODS AND APPARATUS FOR HANDLING SWITCHING AMONG THREADS WITHIN A MULTITHREAD PROCESSOR - A system, apparatus and method for handling switching among threads within a multithread processor are described herein. Embodiments of the present invention provide a method for multithread handling that includes fetching and issuing one or more instructions, corresponding to a first instruction execution thread, to an execution block for execution during a cycle count associated with the first instruction execution thread and when the instruction execution thread is in an active mode. The method further includes switching a second instruction execution thread to the active mode when the cycle count corresponding to the first instruction execution thread is complete, and fetching and issuing one or more instructions, corresponding to the second instruction execution thread, to the execution block for execution during a cycle count associated with the second instruction execution thread. The method additionally includes resetting the cycle counts when a master instruction execution thread is in the active mode. | 2012-03-15 |
20120066480 | Processor - A processor includes: an instruction fetch portion configured to fetch simultaneously a plurality of fixed-length instructions in accordance with a program counter; an instruction predecoder configured to predecode specific fields in a part of the plurality of fixed-length instructions; and a program counter management portion configured to control an increment of the program counter in accordance with a result of the predecoding. | 2012-03-15 |
20120066481 | Dynamic instruction splitting - A data processing apparatus and method are provided. The data processing apparatus is configured to perform data processing operations in response to data processing instructions including a multiple operation instruction, in response to which multiple data processing operations are performed. The data processing apparatus comprises two or more data processing units configured to perform the data processing operations and an instruction arbitration unit configured to perform sub-division of a multiple operation instruction into a plurality of sub-instructions and to perform allocation of the plurality of sub-instructions amongst the two or more data processing units, wherein each sub-instruction is arranged to cause one of the two or more data processing units to perform at least one data processing operation of the multiple data processing operations. The instruction arbitration unit is configured to perform the sub-division and the allocation dynamically in dependence on a current availability of a resource for each of the two or more data processing units, enabling more efficient usage of the resources of each of the data processing units to be made. | 2012-03-15 |
20120066482 | MACROSCALAR PROCESSOR ARCHITECTURE - A macroscalar processor architecture is described herein. In one embodiment, a processor receives instructions of a program loop having a vector block and a sequence block intended to be executed after the vector block, where the processor includes multiple slices and each of the slices is capable of executing an instruction of an iteration of the program loop substantially in parallel. For each iteration of the program loop, the processor executes an instruction of the sequence block using one of the slices while executing instructions of the vector block using a remainder of the slices substantially in parallel. Other methods and apparatuses are also described. | 2012-03-15 |
20120066483 | Computing Device with Asynchronous Auxiliary Execution Unit - A computing device includes: an instruction cache storing primary execution unit instructions and auxiliary execution unit instructions in a sequential order; a primary execution unit configured to receive and execute the primary execution unit instructions from the instruction cache; an auxiliary execution unit configured to receive and execute only the auxiliary execution unit instructions from the instruction cache in a manner independent from and asynchronous to the primary execution unit; and completion circuitry configured to coordinate completion of the primary execution unit instructions by the primary execution unit and the auxiliary execution unit instructions according to the sequential order. | 2012-03-15 |
20120066484 | PATCHING METHOD AND PATCHING DEVICE IN MULTI-CORE ENVIRONMENT - A patching mechanism in a multi-core environment that includes sending an inter-core non-maskable interrupt to each target Virtual Central Processing Unit (CPU) (VCPU) in a target VCPU group, which share a code segment, so that said each target VCPU enters a patch synchronization state in response to the inter-core non-maskable interrupt. Thereafter, the patch synchronization state of said each target VCPU is monitored, and after all the target VCPUs have entered the patch synchronization state, embodiments modify a first instruction of an original function to be patched of said each target VCPU into an abnormal instruction, and outputting a patch synchronization state end notification to all the target VCPUs, so that the original function to be patched is enabled to jump to a new patch function in an exception handling process. | 2012-03-15 |
20120066485 | SYSTEM AND METHOD FOR INSTALLING AND CONFIGURING A TAILORED OPERATING SYSTEM AND USER ENVIRONMENT - The systems and methods disclosed can be used for installing and configuring a tailored operating system and user environment including software products and applications on end-user computers. The systems and methods relate generally to software used to boot a computer with a maintenance operating system and to backup selected data to external storage. The software can initiate an installation of a new operating system and then restores the data that was backed up on external storage. | 2012-03-15 |
20120066486 | Feature Of A Computing Machine - Managing a computing machine including detecting a signal to disable a feature of the computing machine through an interface of the computing machine, identifying at least one component of the computing machine utilized by the feature in response to receiving the signal, and accessing a hardware switch corresponding to at least one of the identified components to disable the feature. | 2012-03-15 |
20120066487 | SYSTEM AND METHOD FOR PROVIDING LOAD BALANCER VISIBILITY IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method for providing load balancer visibility in an intelligent workload management system described herein may expand a role or function associated with a load balancer beyond handling incoming and outgoing data center traffic into supporting governance, risk, and compliance concerns that may be managed in an intelligent workload management system. In particular, the load balancer may establish external connections with destination resources in response to client devices establishing internal connections with the load balancer and then attach connection tracers to monitor the internal connections and the external connections. The connection tracers may then detect incoming traffic and outgoing traffic that the internal and external connections pass through the load balancer, and traffic tracers may collect data from the incoming traffic and the outgoing traffic, which the workload management system may use to manage the data center. | 2012-03-15 |
20120066488 | PROTECTED DISTRIBUTION AND LOCATION BASED AGGREGATION SERVICE - A system for and method of per access-point streaming media customization and privacy protected feedback in a wireless network. The system is operative to: encrypt real time streamed media content from a streaming media source; multicast the streamed encrypted media content for availability to a user device for playback, the user device sending out unicast responses at the time of joining or dropping the multicast; aggregate the unicast responses in the form of a connect multicast state or a disconnect multicast state of the user device based on the joining or dropping of the multicast; and provide information back to the streaming media source based on the aggregated unicast responses. | 2012-03-15 |
20120066489 | TCP/IP-BASED COMMUNICATION SYSTEM AND ASSOCIATED METHODOLOGY PROVIDING AN ENHANCED TRANSPORT LAYER PROTOCOL - A more secure TCP/IP protocol stack is provided having an enhanced transport layer. Encryption and decryption logic is arranged on the transmission side and on the reception side for processing a payload of a transport layer protocol, such as TCP or UDP. By employing this enhanced transport layer, a cryptograph process communication can be realized by dissolving various kinds of restrictions which a conventional IPsec or SSL possesses without affecting upper layer processing, and, at the same time, maintaining compatibility with the IP layer. | 2012-03-15 |
20120066490 | CRYPTOGRAPHIC DEVICE MANAGEMENT METHOD, CRYPTOGRAPHIC DEVICE MANAGEMENT SERVER, AND PROGRAM - A cryptographic device management server receives a first cryptographic calculation request from an arbitrary terminal device via a network, transmits a second cryptographic calculation request generated on the basis of the first cryptographic calculation request, management information of the terminal device and management information of the cryptographic device to a cryptographic device selected on the basis of the management information of the terminal devices and management information of the cryptographic devices stored in the cryptographic device management server, via a connection interface, receives a second cryptographic calculation result from the cryptographic device, and transmits a first cryptographic calculation result generated on the basis of the second cryptographic calculation result, the management information of the terminal device and the management information of the cryptographic device to the terminal device of the source of the first cryptographic calculation request via the network. | 2012-03-15 |
20120066491 | HITLESS MANUAL CRYPTOGRAPHIC KEY REFRESH IN SECURE PACKET NETWORKS - In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets. | 2012-03-15 |
20120066492 | METHOD FOR MAKING SECURITY MECHANISMS AVAILABLE IN WIRELESS MESH NETWORKS - The invention relates to a method for making safety mechanisms available in wireless mesh networks which have a plurality of nodes that are interconnected by multi-hop communication in a wireless network meshed by mesh routing in the MAC layer, every node being active as a router to forward the data traffic of the other nodes. At least two differentiated levels of confidence are defined by a type of protection (ToP) the value of which represents a specific level of confidence for the nodes and data packets, the data packets being labeled with a ToP value in the mesh header, and at least one ToP value being allocated to the participating nodes, the nodes forwarding the data packet in the mesh network using the ToP values of the node and of the data packet if this ToP value combination is admissible in the node. | 2012-03-15 |
20120066493 | Secure Transfer and Tracking of Data Using Removable Non-Volatile Memory Devices - A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device. | 2012-03-15 |
20120066494 | Controlling Download and Playback of Media Content - Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that can determine whether a client request to download or play content should be granted. All purchase, download, and playback requests require permission from the permission system. The server also includes a DD module system that transfers a DD module to the client. The DD module includes a content key decryption module, a content decryption module, and a content decompression module. The content key decryption module decrypts an encrypted content key that was received from the server. The decryption uses a unique DD module key that has been hard-coded into the content key decryption module. The content decryption module uses the content key to decrypt encrypted content. The content decompression module decompresses compressed content so that it can be played. | 2012-03-15 |
20120066495 | MOBILE CONTENT DELIVERY OPTIMIZATION - A device receives, from a target user device, a request for encrypted content, where the request is sent via a wireless access network. The device identifies a donor user device that is available to provide the encrypted content via a local wireless network connection, where the donor user device has previously downloaded the encrypted content. The device sends, to the target user device and/or the donor user device, instructions to establish a peer-to-peer connection, via the local wireless network, to provide the encrypted content to the target user device, where the encrypted content is decrypted by the target user device using a license key provided over a different network than the local wireless connection. | 2012-03-15 |
20120066496 | Sending Protected Data in a Communication Network - A method and apparatus for sending protected data from a sender unit to a receiver unit via an intermediate unit. A Transfer Init message that contains a ticket associated with the receiver unit is sent from the intermediate unit to the sender unit. The intermediate unit then receives a transfer response message from the sender unit, and also data which has been protected using at least one security key associated with the ticket and obtained from a Key Management Server. A message is sent to the receiver unit, the message including information required for security processing of the protected data. The protected data is then sent to the receiver unit, allowing the receiver unit to access the protected data. | 2012-03-15 |
20120066497 | METHOD AND DEVICE FOR ENABLING PORTABLE USER REPUTATION - The present invention relates to a method and a device adapted to determine at a party whether a set comprising at least one user pseudonym is associated with a user, wherein each of the user pseudonyms in the set is associated with the user at a service portal. At the party, for each of the user pseudonyms comprised in the set, a publicly available first coded string associated with the user pseudonym is retrieved from the service portal associated with the user pseudonym, wherein each of the first coded strings has been generated on the basis of a first secret unique to said first coded string. The user's knowledge of the first secrets associated with the respective first coded strings is verified by means of a first cryptographic protocol for interacting with the user, wherein the first protocol is adapted to utilize the first coded strings. | 2012-03-15 |
20120066498 | VERIFYING AUTHENTICITY OF A SENDER OF AN ELECTRONIC MESSAGE SENT TO A RECIPIENT USING MESSAGE SALT - A server receives a verification request sent by a client associated with a recipient of an electronic message to verify authenticity of a sender of the electronic message, where the verification request comprises message data of the electronic message and a salt hash value. The server identifies a key for the sender for generating a salt hash value and generates the salt hash value using the salt key and the message data. The server determines whether the generated salt hash value matches the salt hash value received in the verification request and sends a result to the client based on the determination of whether the salt hash values match. | 2012-03-15 |
20120066499 | SYSTEM AND METHOD FOR PERFORMING A MANAGEMENT OPERATION - There is provided a system and method of performing a management operation. An exemplary method comprises receiving a command that comprises information derived from a private key in response to a request to generate the command for an electronic device. The exemplary method also comprises verifying a source of the command using the information derived from the private key and a corresponding public key stored in an immutable memory of the electronic device. The exemplary method additionally comprises performing a management operation corresponding to the command if the verifying of the source of the command determines that the command is from an authorized source. | 2012-03-15 |
20120066500 | Method of Time Synchronization Communication - A method for sending a public key from a client to a time server for encrypting a response message to the client as part of a time synchronization communication to providing a safe way of performing time synchronization communication, where the method comprises sharing the public key of the time server with the client prior to the time synchronization communication, sending an encrypted public key of the client to the time server, and decrypting the encrypted public key of the client using the private key of the time server by the time server. | 2012-03-15 |
20120066501 | MULTI-FACTOR AND MULTI-CHANNEL ID AUTHENTICATION AND TRANSACTION CONTROL - The present disclosure provides a system and method for conducting multi-factor and multi-channel ID authentication and transaction control. The authentication and transaction control may be conducted between a device and servers of the service providers only, without involvement of a third party. A server of the device assists personalizing, binding, unbinding and rebinding of the device with respect to the servers of the service providers. | 2012-03-15 |
20120066502 | SYSTEMS AND METHODS FOR ENABLING TRUST IN A FEDERATED COLLABORATION - Systems and methods consistent with the present invention enable explicit and multilateral trust across a community of federated servers via a network. A trusted third party establishes a framework of policies and procedures governing a federation. Organizations joining the federation submit to an audit process of internal policies and procedures to ensure compliance with the policies and procedures of the federation. Upon successful completion of an audit, an organization may receive a digital certificate containing the digital public key of the organization and indicating approval of the trusted third party. The organization may then use the associated digital private key for signing security assertions associated with a request for resources from another federation service provider. The service provider may trust the assertion from the organization based on trust placed in trusted third party by the service provider and the trust placed in the organization by the trusted third party. | 2012-03-15 |
20120066503 | Secure Data Transfer in an Automation Network - A method for secure data transfer in an automation network wherein the method comprises authenticating a user by a program invocation rights system aided by user data for approving a use of the program invocation by the user, encrypting and signing data by the program invocation, were the data contains the user data. The method also includes transferring the data by a transfer medium from the program invocation to the subassembly, decrypting the data in the subassembly, authenticating the program invocation associated with the subassembly, and authenticating the user by the subassembly rights system aided by the user data. | 2012-03-15 |
20120066504 | METHODS, APPARATUS AND SYSTEMS FOR SECURING USER-ASSOCIATED PASSWORDS USED FOR IDENTITY AUTHENTICATION - Methods, apparatus and systems for securing user-associated passwords used in transactions are disclosed. The methods include a user computing device receiving a user-associated password such as a PIN from a user, where the user-associated password is operable to authenticate an identity of a user. The user-associated password may be received in response to the user receiving a request for the user-associated password from a third party such as a merchant. The user computing device may generate a temporary password such as a one-time password, dynamic password, or the like, and encrypt the user-associated password using the temporary password. The encrypted user-associated password may then be communicated to the third party in lieu of the user-associated password received by the user. | 2012-03-15 |
20120066505 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - A method and system are provided for resetting a password using a first device and a second device. The second device stores data encrypted using a content protection key, which itself is stored in encrypted form using the password, and is also stored in encrypted form using a key encryption key. The first device receives a public key from a second device. The first device uses the public key and a stored private key to generate a further public key. The further public key and a new password are sent to the second device. The second device uses the further public key to generate the key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key is created, and encrypted using the new password. | 2012-03-15 |
20120066506 | METHODS, APPARATUS AND SYSTEMS FOR ONSITE LINKING TO LOCATION-SPECIFIC ELECTRONIC RECORDS OF LOCATE OPERATIONS - Providing access at a jobsite to an electronic record of a locate operation. Data related to the locate operation is acquired by locate equipment and transmitted to a data repository for storage in the electronic record of the locate operation. A site-specific access mechanism is provided that establishes a link to the electronic record of the locate operation. In one example, the site-specific access mechanism is a physical mechanism, such as a printout of a website address, a barcode, or an RFID tag. In another example the site-specific access mechanism is a virtual mechanism, such as geographic location information provided by a location tracking system (e.g., GPS apparatus) and/or derived from information available to a wireless communications system or WiFi network. In one aspect, the access mechanism may be configured for use at the jobsite only by a person particularly authorized to access the electronic record of the locate operation. | 2012-03-15 |
20120066507 | IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS - Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the token and the user's biometric identifier, convert the biometric identifier to a biometric key, and apply the biometric key to decrypt the token. In this way, the decoders authenticate the users without performing a biometric identifier comparison. In some embodiments pieces or sets of the data are stored in designated data compartments, which are individually encrypted based on authority keys, and all of the encrypted data compartments are collectively encrypted based on the biometric key to create the token. The decoders store only the authority keys corresponding to the data compartments which they have authorization to open. In addition, in some embodiments the token and the biometric identifier are encrypted and sent to a remote authentication server for decryption of the token. | 2012-03-15 |
20120066508 | METHOD FOR MANAGING AND CONTROLLING ACCESS TO CONFIDENTIAL INFORMATION CONTAINED IN PORTABLE ELECTRONIC MEDIA - The management of confidential information contained in portable memory media provides for:
| 2012-03-15 |
20120066509 | MULTI-LEVEL SECURITY SOFTWARE ARCHITECTURE - A multi-level security software architecture includes various components configured to provide full data separation across multiple processors while limiting the number and size of high assurance components. The architecture includes a domain separator for ensuring that messages exchanged between domains that are distributed on different microprocessors are securely routed between domain members. The domain separator verifies a message label including a domain identifier provided by a domain gateway and cryptographically binds the message label to each message via cryptographic keys. This prevents misrouting messages caused by accidental or malicious corruption of message labels. Additionally, the domain separator can encrypt messages as necessary to enforce data separation on shared network buses. The domain separator is also responsible for managing the cryptographic keys used to label or encrypt messages. | 2012-03-15 |
20120066510 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PERFORMING HOMOMORPHIC ENCRYPTION AND DECRYPTION ON INDIVIDUAL OPERATIONS - A method of processing data includes receiving a request for an operand from a second processor at a first processor, encrypting the operand that has been requested using the first processor responsive to receiving the request for the operand, sending the operand that has been encrypted from the first processor to the second processor, receiving a result from the second processor at the first processor, the result generated from a single homomorphic operation being performed using the operand sent to the second processor, decrypting the result received from the second processor at the first processor, and receiving a request for the result that has been decrypted from the second processor at the first processor. | 2012-03-15 |
20120066511 | Container Security - A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened., providing the only communicative coupling between the first microprocessor function and the second microprocessor function. | 2012-03-15 |
20120066512 | REAL-TIME SECURE SELF-AQUIRING ROOT AUTHORITY - When software is delivered to a customer, there are often programs or routines of programs that a software distributor intended to run under the credentials of a specific user other than the user who started the program. A secure method is proposed for software running in a process to acquire rights to issue restricted operations. A trusting entity trusts a process based on verifying ownership of code residing in the process. The trusted process is granted rights by the trusting entity to perform any or specific operations under the credentials of a specific user, not necessarily the current process user. | 2012-03-15 |
20120066513 | METHOD AND APPARATUS FOR AUTHENTICATING A NON-VOLATILE MEMORY DEVICE - A method and an apparatus for authenticating a non-volatile memory device are provided. The method includes sending, to the memory device, a request for an Enhanced Media Identification (EMID) for identifying the memory device, by an EMID decoder for authenticating the memory device; receiving the requested EMID changed by a preset calculation of the EMID with an optional value from the memory device; and restoring the EMID by decoding the received changed EMID. | 2012-03-15 |
20120066514 | DIGITAL IDENTITY DEVICE - A digital identity device for uniquely identifying legal entities. The digital identity device is used for secure electronic communications. | 2012-03-15 |
20120066515 | ELECTRONIC DEVICE, KEY GENERATION PROGRAM, RECORDING MEDIUM, AND KEY GENERATION METHOD - An electronic device | 2012-03-15 |
20120066516 | METHOD FOR FAST DECRYPTION OF PROCESSOR INSTRUCTIONS - A processor, circuit and method provide for fast decryption of encrypted program instructions for execution by the processor. A programmable look-up coding is used to decode a field within the instructions. The decoded field for the instructions are recombined with the remaining portion of the same instructions to yield the decoded instructions. The programmable look-up coding can be programmed and controlled by a process executing at a higher privilege level than the program represented by the instructions, so that security against code-modifying attacks is enhanced. | 2012-03-15 |
20120066517 | DISPERSED SECURE DATA STORAGE AND RETRIEVAL - A computer-implemented method that includes secure storage and retrieval of data is described herein. | 2012-03-15 |
20120066518 | CANISTER-BASED STORAGE SYSTEM SECURITY - Security is provided for a data set stored in a data storage canister. The data set has a data size when received for storage within the canister. At least one data security operation is performed on the received data set to generate secure data having a secure data size that may be different than the set data size. The secure data is stored on at least one data storage device within the canister. Any information about the secure data size is kept from the data producer sending the data set for storage. | 2012-03-15 |
20120066519 | DATA CENTER POWER CONVERSION EFFICIENCY MANAGEMENT - A data center energy management (DCEM) server configures a power supply in the data center. The DCEM server sums input alternating current (AC) power of the power supply to a total AC power of the data center, wherein the total AC power of the data center is a sum of AC power of a plurality of power supplies. The DCEM server sums output direct current (DC) power of the power supply to a total DC power of the data center and reports a ratio of total AC power to total DC power as data center power conversion efficiency. The DCEM server sets a preset power supply efficiency threshold. The DCEM server determines that a real-time power efficiency level is below the power supply efficiency threshold. The DCEM server, responsive to a determination that real-time power efficiency level is below the power supply efficiency threshold, may remedy the power supply. | 2012-03-15 |
20120066520 | NETWORK CONTROLLER CIRCUITRY TO DETERMINE, AT LEAST IN PART, WHETHER AT LEAST ONE POWER MANAGEMENT ACTION IS TO BE INITIATED - An embodiment may include network controller circuitry that may be comprised, at least in part, in a host computer. The circuitry may determine, at least in part, based at least in part upon at least one comparison, whether at least one power management action is to be initiated. The at least one comparison may compare, at least in part, at least one pattern with at least one portion of at least one packet received, at least in part, by the host computer. The at least one power management action may include the modification, at least in part, of at least one power management configuration of the host computer. The modification may accommodate, at least in part, at least one packet processing latency policy associated, at least in part, with the at least one pattern. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment. | 2012-03-15 |
20120066521 | SEMICONDUCTOR INTEGRATED CIRCUIT, INTERCONNECT, AND COMPUTER READABLE MEDIUM STORING MEDIUM STORING CONTROL PROGRAM - A semiconductor integrated circuit includes an adjuster and a controller. The adjuster adjusts transmission and reception of data by temporarily holding the data transmitted and received among a plurality of devices and output location information on the data. The controller controls power consumption of at least one of target devices based on a change amount of the location information. | 2012-03-15 |
20120066522 | POWER SUPPLY DEVICE AND IMAGE FORMING APPARATUS - A power supply device provided with a main power supply unit that supplies generated predetermined power to an electric load, a current detecting unit, a current indicating unit, an electric storage unit, an auxiliary power supply unit, and a control unit that determines an upper limit current value to be output to the current indicating unit on the basis of at least a condition of the electric load, and controls the upper limit current value such that power supplied from the auxiliary power supply unit to the electric load is converged in a predetermined convergence time when the power supply from the auxiliary power supply unit to the electric load is stopped or reduced. | 2012-03-15 |
20120066523 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF INFORMATION PROCESSING APPARATUS - An information processing apparatus includes a processing device configured to process data, a first line connecting device configured to be connected to the processing device, a second line connecting device configured to be connected to the processing device, a first input and output port configured to be connected to a first end device via a first line, a second input and output port configured to be connected to a second end device via a second line, a first selecting unit that includes a first terminal, and a second terminal and a third terminal, the first terminal being connected to the first line connecting device and either the second terminal or the third terminal. | 2012-03-15 |
20120066524 | ELECTRONIC DEVICE AND POWER SUPPLY SYSTEM OF ELECTRONIC DEVICE - An electronic device and a power supplying system of the electronic device are provided. A power supplying method for an electronic device may include: obtaining information regarding power transmission efficiency between a source electronic device and a target electronic device; obtaining power for decoding and playback of multimedia data in the target electronic device; generating resonance power based on the power transmission efficiency and the obtained power; and transmitting the generated resonance power and multimedia data to the target electronic device. | 2012-03-15 |
20120066525 | COMMUNICATION DEVICE AND METHOD FOR CONTROLLING SAME - The rotating speed of a cooling fan is controlled in accordance with the number of devices connected to ports of a packet transmitting/receiving unit and a connection speed with that device. When the number of ports establishing a link at a speed of 1 Gbps is zero, the voltage value of power output from a power source block to the cooling fan is 0 V and the cooling fan is deactivated. When the number of ports establishing a link at a speed of 1 Gbps is one or two, the voltage value is 8 V and the cooling fan rotates in a slow mode. Furthermore, when the number of ports establishing a link at a speed of 1 Gbps is three or four, the voltage value is 12 V and the cooling fan rotates in a fast mode. | 2012-03-15 |
20120066526 | SYSTEM AND METHOD FOR DETERMINING OPTIMAL OPERATING PARAMETERS FOR CONSERVING POWER OF A PORTABLE COMPUTING DEVICE - A method and system for determining optimal operating parameters for conserving power of a portable computing device may include plotting a hypersurface in a coordinate system. The method includes defining one or more axes in a coordinate system, such as a Cartesian coordinate system, that impact power consumption of a PCD and which may be held as constants when applied as workloads on CPU. Then, at least one axis is identified as an unknown or variable which may be optimized for power consumption. After the hypersurface containing optimized values is created for various workload scenarios for the PCD, workloads corresponding to the synthetic workloads described above are applied to the PCD. Workload predictors, like a DCVS algorithm, are executed by the PCD and are observed and compared to the hypersurface. Parameters for the workload predictor may be adjusted based on the values from the hypersurface. | 2012-03-15 |
20120066527 | Information Processing Apparatus and Device Control Method - According to one embodiment, an information processing apparatus includes a plurality of power control target devices, a storage unit configured to store management data, and a device management module. The device management module is configured to determine whether a new process is started, based on process information indicative of a list of processes which are being executed, the process information being managed by an operating system, to determine, based on the management data, when the new process is started, one or more power control target devices which are used by an application program corresponding to the new process, and to power on, among the determined one or more power control target devices, a power control target device which is in a power-off state. | 2012-03-15 |
20120066528 | SYSTEM AND METHOD FOR PROVIDING A LOW POWER REMOTE CONTROL - To conserve power in a controlling device having a processing device in communication with an input element and a transmitting device the processing device is caused to be placed into a low-power state for at least a portion of a transmission inactive interval intermediate the transmission of at least a pair of command frames. The command frames are caused to be transmitted by the transmitting device in response to an activation of the input element sensed via the processing device to thereby command a functional operation of an intended target device. | 2012-03-15 |
20120066529 | INFORMATION PROCESSING APPARATUS AND METHOD FOR CONTROLLING POWER SUPPLY OF THE APPARATUS - An information processing apparatus includes an information processing unit, an interface supplying electrical power to and communicating a signal with an external electronic device through a single connector, a unit supplying electrical power to the electronic device through the interface and including a rechargeable battery. Detection units detect a connection of the electronic device to the apparatus, an external power supply. The power supply control, when the connections are detected, keeps supplying electrical power to the electronic device through the interface even after deactivation of the apparatus, in the event an instruction to turn off a power supply of the apparatus or deactivate the apparatus is issued. When the connection of the external power supply for charging the rechargeable battery to the apparatus is not detected, the power supply does not supply electrical power to the electronic device even during operation of the apparatus. | 2012-03-15 |
20120066530 | Configurable Power Switch Cells and Methodology - In one embodiment, a configurable power switch cell methodology may include designing multiple power switch cells which may be assembled to form a set of power switches such as a power switch segment. The power switch cells may all be designed to occupy the same amount of integrated circuit area, in an embodiment. Accordingly, one cell may be readily replaced by another, even late in the design process, without disturbing the placement of surrounding circuitry. In an embodiment, the power switch cells may include the interconnect layers that connect between cells, and abutting the power switch cells may automatically connect the interconnect between cells. Accordingly, swapping one power switch cell for another may be accomplished by placing the cell. No routing work may be required. | 2012-03-15 |
20120066531 | METHOD AND APPARATUS FOR ADAPTIVE POWER CONTROL IN A MULTI-LANE COMMUNICATION CHANNEL - An apparatus consisting of a digital communication channel comprised of a multiplicity of lanes where data is striped across the lanes in a predefined sequence. Each lane has the ability to be powered down or powered up in response to the amount of data being held in a transmit buffer at one end of the communication channel. The method consists of monitoring the amount of data being held in the transmit buffer; making the decision of how many lanes are required based on the amount of data; sending signals to cause the required number of lanes to be powered down or powered up; and performing the required power down or power up action at the particular transmitter and receiver. The fill level of the transmit buffer is continually monitored and the required number of active lanes and the striping sequence is calculated and updated as required as a function of the fill level, where a larger amount of data waiting to be transmitted will result in a greater number of lanes being powered up and a smaller amount of data waiting to be transmitted will result in a lesser number of lanes being powered up. | 2012-03-15 |
20120066532 | ELECTRONIC DEVICE AND METHOD FOR SAVING ENERGY THEREOF - An electronic device includes a dynamic memory, a static memory, a detection unit, a copy unit and a set unit. The dynamic memory stores an interrupt monitoring program. The interrupt monitoring program monitors whether an interrupt request is generated, and generates an interrupt signal when the interrupt request is generated. The detection unit detects whether the electronic device needs to enter a sleep mode, and generates a detection signal if the electronic device needs to enter the sleep mode. The copy unit copies the interrupt monitoring program from the dynamic memory to the static memory in response to the detection signal, and runs the interrupt monitoring program in the static memory for monitoring whether an interrupt signal is generated. The set unit sets the dynamic memory into a self-refresh mode in response to the detection signal. | 2012-03-15 |
20120066533 | DOCUMENT VALIDATOR WITH POWER MANAGEMENT - The disclosure relates to a device and a method for validating documents of value, especially a low power validator for validating documents of value is described comprising: a processing unit for controlling operation of the validator; an inlet for receiving a document of value from a user; and a power management system for transitioning the validator between a power conserving mode and a normal operating mode, wherein the power management system comprises a wake up unit arranged to monitor the inlet for the presence of a document of value and to monitor the voltage provided from a power source. | 2012-03-15 |
20120066534 | POWER SOURCE COUPLING AND DECOUPLING IN MEDICAL DEVICE - Aspects of this disclosure relate to coupling and decoupling a power source of a device with circuitry within the device. For example, in aspects of this disclosure, when a short develops within the device, a switch circuit may decouple the power source from the some of the circuitry within the device. Decoupling the power source when a short develops may extent the operational time of the power source, and may reduce thermal excursion. | 2012-03-15 |
20120066535 | MECHANISM FOR CONTROLLING POWER CONSUMPTION IN A PROCESSING NODE - A system includes a plurality of processor cores and a power management unit. The power management unit may be configured to independently control the performance of the processor cores by selecting a respective thermal power limit for each of the plurality of processor cores dependent upon an operating state of each of the processor cores and a relative physical proximity of each processor core to each other processor core. In response to the power management unit detecting that a given processor core is operating above the respective thermal power limit, the power management unit may reduce the performance of the given processor core, and thereby reduce the power consumed by that core. | 2012-03-15 |
20120066536 | Systems And Methods For Delivering Power - An exemplary embodiment of the present invention provides a system and method of delivering power. An exemplary method includes providing electrical current to a load and generating a reference value corresponding to a power provided to the load. The exemplary method also includes generating a time reference if the reference value is greater than or equal to a threshold value corresponding to a power boundary. If the time reference reaches a time boundary a power regulation event is initiated. | 2012-03-15 |
20120066537 | COMPOUND UNIVERSAL SERIAL BUS ARCHITECTURE PROVIDING PRECISION SYNCHRONISATION TO AN EXTERNAL TIMEBASE - A method of synchronising a compound Super Speed USB device, comprising: providing data communication between a host computing device and the compound Super Speed USB device across the Super Speed USB communication channel; establishing a Super Speed USB communication channel to a Super Speed USB function of the compound USB device; establishing a non-Super Speed synchronisation channel to a non-Super Speed USB function of the compound USB device; and synchronising a local clock of the compound USB device to a periodic data structure within a data stream in the non-Super Speed synchronisation channel so that the local clock can enable synchronous operation of the compound USB device with one or more comparable USB devices. | 2012-03-15 |
20120066538 | USING PULSES TO CONTROL WORK INGRESS - The present invention extends to methods, systems, and computer program products for using pulses to control work ingress. Generally, embodiments of the invention use a variable-speed clock for accepting work for lower-priority services. A clock rate is controlled by a load monitor. The load monitor periodically collects sensor measurements of resources available after allocations by higher-priority services. Based on the sensor measurements, the load monitor adjusts the clock speed up or down (i.e., depending on the amount of resources available after allocations by higher-priority services). At the boundary of the lower-priority service (e.g., where work enters the system), work requests are enqueued to be associated with a future pulse of the clock. Work is accepted or rejected based on a determination of whether the work request can be allocated a clock pulse within a defined period of time. | 2012-03-15 |
20120066539 | INTERCHANGEABLE LENS AND CAMERA BODY - An interchangeable lens that can be detachably fitted to a camera body includes: a clock signal reception unit that receives a clock signal outputted from the camera body; a control command reception unit that receives a control command and data signal from the camera body, the control command and data signal being in synchrony with the clock signal, specifying a control command for the interchangeable lens and including type data specifying a type of the control command; a response generation unit that generates a response data signal including the type data on the basis of the control command and data signal; and a response transmission unit that transmits the response data signal to the camera body in synchrony with the clock signal received by the clock signal reception unit when a control command and data signal is received from the camera body in a next communication cycle. | 2012-03-15 |
20120066540 | INFORMATION CORRECTION SUPPORT SYSTEM AND METHOD - An information correction support system includes a first information providing unit to provide first information that is input by a first user to a second user, a first information accepting unit to accept an error entry position in the first information and second information that is correct information for the input error entry that are input by the second user, an error entry position providing unit to provide the accepted error entry position to the first user without providing the accepted second information, a second information accepting unit to accept third information that is correction information for the error entry input by the first user, a correctness determination unit to determine whether the accepted third information is correctly input information based on the accepted second information, and a warning unit to warn the first user according to a determination by the correctness determination unit. | 2012-03-15 |
20120066541 | CONTROLLED AUTOMATIC HEALING OF DATA-CENTER SERVICES - Subject matter described herein is directed to reallocating an application component from a faulty data-center resource to a non-faulty data-center resource. Background monitors identify data-center resources that are faulty and schedule migration of application components from the faulty data-center resources to non-faulty data-center resources. Migration is carried out in an automatic manner that allows an application to remain available. Thresholds are in place to control a rate of migration, as well as, detect when resource failure might be resulting from data-center-wide processes or from an application failure. | 2012-03-15 |
20120066542 | Method for Node Addition and Removal of a Circuit - The present invention discloses a method for node addition and removal of a circuit. The steps of the method include: (a) providing a circuit with a plurality of nodes; (b) selecting a target node for computing mandatory assignments (MAs) of stuck-at 0 and stuck-at 1 fault tests on the target node, respectively, by a processing unit; (c) finding an added substitute node by utilizing the MAs of stuck-at 0 and stuck-at 1 fault tests of the target node by the processing unit; and (d) replacing the target node by using the added substitute node closest to primary inputs; and (e) the steps (b)˜(d) are repeated for removing the replaceable nodes and simplifying the circuit. | 2012-03-15 |
20120066543 | AUTONOMOUS PROPAGATION OF VIRTUAL INPUT/OUTPUT (VIO) OPERATION(S) TO SECOND VIO SERVER (VIOS) DUE TO A DETECTED ERROR CONDITION AT A FIRST VIOS - A method provides input/output (I/O) redundancy within a data processing system having (a) a client logical partition (LPAR) that generates and consumes I/O requests, (b) a plurality of virtual input/output servers (VIOS) that are communicatively inter-connected with each other to form a VIOS cluster and which include virtual I/O adapters for connecting to a fabric that provides access to a block storage. In one embodiment, a first VIOS receives an I/O request from the client LPAR. The first VIOS detects that a problem exists with a fabric connection to the block storage, and the first VIOS responds to the detected connection problem by autonomously propagating the I/O request to a second VIOS to which the first VIOS is connected. Forwarding of the I/O request to the block storage is subsequently completed by the second VIOS. | 2012-03-15 |
20120066544 | REMOTE MONITORING APPARATUS, WIND TURBINE GENERATOR SYSTEM, AND METHOD OF CONTROLLING REMOTE MONITORING APPARATUS - A SCADA system includes a main switching hub and a backup switching hub that relay transmission data between a wind turbine generator and terminals provided in another SCADA system and client terminals, and a network switch for performing switching between the main switching hub and the backup switching hub for relaying transmission data between the wind turbine generator and the terminals. A backup remote I/O connected to the backup switching hub causes the network switch to perform switching based on a switching command from a SCADA terminal input via the backup switching hub. This serves to solve a data transmission problem caused by a problem in a switching hub on the wind turbine generator side from a remote location. | 2012-03-15 |
20120066545 | FAULT-TOLERANT SYSTEM AND FAULT-TOLERANT CONTROL METHOD - A fault-tolerant system including a plurality of modules each further including a CPU subsystem, a fault-tolerant control unit, and an I/O subsystem, wherein the fault-tolerant control unit includes a master FT control LSI chip and at least one slave FT control LSI chip. One module is placed in an active state whilst the other module is placed in a standby state, so that I/O requests made by CPU subsystems of these modules are selectively delivered to I/O subsystems based on the master/slave relationship. Upon receiving fault information representing a failed subsystem which is either the CPU subsystem or the I/O subsystem found in the module, the master FT control LSI chip sends a command for controlling isolation of the failed subsystem to the slave FT control LSI chip, so that the slave FT control LSI chip controls isolation of the failed subsystem based on the command. | 2012-03-15 |
20120066546 | SYSTEM RECOVERY METHOD AND COMPUTING APPARATUS HAVING SYSTEM RECOVERY FUNCTION - A system recovery method and a computing apparatus having a system recovery function. The computing apparatus includes a first memory unit to store a general operating system (OS) in a system partition where a primary anti-virus program operates, and to store a recovery OS in a recovery partition where a secondary anti-virus program operates; a second memory unit to store firmware determining a booting partition of the computing apparatus; and a processor to control execution of the firmware to, when the system partition is infected by a virus and thus the computing apparatus does not boot to the general OS, boot the computing apparatus to the recovery OS, and to control recovery of the system partition. | 2012-03-15 |
20120066547 | Problem Record Signature Generation, Classification and Search in Problem Determination - A method for problem determination and resolution in an information technology (IT) system includes receiving a problem ticket, searching a database for a plurality of problem features based on data included in the problem ticket, extracting the plurality of problem features from the database, and generating a problem signature corresponding to the problem ticket, wherein the problem signature comprises at least one non-textual feature extracted from the plurality of problem features. | 2012-03-15 |
20120066548 | Automated Operating System Test Framework - A method of automating testing of a first computing system comprises identifying a plurality of system interface elements of a second computing system; determining an untested state at the first computing system of one of the identified plurality of system interface elements; determining the existence of any dependency of the one of the identified plurality of system interface elements upon another of the identified plurality of system interface elements; responsive to a finding of no the dependency, seeking in a repository a system interface element test corresponding to the one of the identified plurality of system interface elements and having an expected output according to a structure of the second computing system; and executing the system interlace element test at the first computing system. | 2012-03-15 |
20120066549 | Editing and Compiling Business Rules - A component in a graph-based computation having data processing components connected by linking elements representing data flows is updated by receiving a rule specification, generating a transform for transforming data based on the rule specification, associating the transform with a component in the graph-based computation, and in response to determining that a new rule specification has been received or an existing rule specification has been edited, updating the transform associated with the component in the graph-based computation according to the new or edited rule specification. A computation is tested by receiving a rule specification including a set of rule cases, receiving a set of test cases, each test case containing a value for one or more of the potential inputs, and for each test case, identifying one of the rule cases that will generate an output given the input values of the test case. | 2012-03-15 |
20120066550 | APPARATUS, SYSTEM AND METHOD FOR INTEGRATED TESTING OF SERVICE BASED APPLICATION - A service based application integrated testing apparatus, system and method is provided. The service based application integrated testing apparatus comprises an application integrated testing unit performs an integrated test on the at least one component service and the service based application by use of a control flow and a data flow, which are generated from an interaction between the at least one component service and the service based application. | 2012-03-15 |
20120066551 | Run-time Verification of CPU Operation - Safe operation in a processor may be verified by making use of an execution trace module that is normally only used for testing and software development. During operation of the processor in the field, a sequence of instructions may be executed the processor. A portion of the execution is traced to form a sequence of trace data. The sequence of trace data is compressed to form a checksum. The checksum is compared to a reference checksum, and an execution error is indicated when the checksum does not match the reference checksum. | 2012-03-15 |
20120066552 | Data processing apparatus, trace unit and diagnostic apparatus - A trace circuit | 2012-03-15 |
20120066553 | System and Methods for Monitoring a Geographic Information System - Disclosed are new approaches for monitoring an information system such as a GIS. For each service of a plurality of services provided by service computers, a periodic evaluation is performed by requesting performance of the selected test service routine by the service. If no valid response to the request is received within a response window the monitoring computer may produce an output indicating an error status for the service. The response window may be a time window or a maximum number of transmitted requests without a valid response. A monitoring computer may transmit requests to perform a service at a first period if an error indicator associated therewith is set and periodically at a second period if the error indicator associated therewith is not set. Requests to perform the service may not be transmitted during an exclusion time associated with a service or its corresponding service computer. | 2012-03-15 |
20120066554 | APPLICATION QUERY CONTROL WITH COST PREDICTION - Determining if access should be granted to a data source. A method includes determining resource usage cost of performing an operation on a data source. The method further includes determining if the resource usage cost exceeds a predetermined threshold. When the resource usage cost exceeds a predetermined threshold, the operation is rejected. | 2012-03-15 |
20120066555 | MOBILITY OF VERSIONED WORKLOAD PARTITIONS - A versioned workload partition (WPAR) can be migrated from a source machine to a destination machine. Each thread associated with a process executing within the versioned WPAR is frozen. For each thread associated with the process, an error number associated with the thread is received in response to freezing execution of the thread and at least a current state of the thread is determined as checkpoint information associated with the thread based, at least in part, on the error number associated with the thread. The checkpoint information associated with the one or more threads is provided to the destination machine. The checkpoint information is used at the destination machine to reconstruct the process within a destination versioned WPAR on the destination machine. | 2012-03-15 |
20120066556 | ERROR HANDLING IN A VIRTUALIZED OPERATING SYSTEM - When moving workload partitions (WPARs) from machine to machine, operating systems may encounter errors that prevent successful WPAR migration. Recording and reporting errors can be challenging. To move WPARs, the operating system may employ a plurality of software components, such as code residing in user space (e.g., application programs, OS libraries, and shell scripts), code residing in the operating system's kernel, and code residing on remote machines. Embodiments of the invention include a framework that enables all the software components to record errors. The framework can also report the errors to users and processes. | 2012-03-15 |