15th week of 2014 patent applcation highlights part 52 |
Patent application number | Title | Published |
20140101411 | Dynamically Switching A Workload Between Heterogeneous Cores Of A Processor - In one embodiment, a policy manager may receive operating system scheduling information, performance prediction information for at least one future quantum, and current processor utilization information, and determine a performance prediction for a future quantum and whether to cause a switch between asymmetric cores of a multicore processor based at least in part on this received information. Other embodiments are described and claimed. | 2014-04-10 |
20140101412 | SPECULATIVE PRIVILEGE ELEVATION - Systems and methods are provided for speculatively elevating a privilege level at which instructions are executed. In embodiment, this is accomplished b identification of a privilege elevation instruction (e.g., SYSCALL) at an early pipeline stage and speculatively executing subsequent instructions with elevated privileges. | 2014-04-10 |
20140101413 | INFORMATION HANDLING SYSTEM INCLUDING HARDWARE AND SOFTWARE PREFETCH - A prefetch optimizer tool for an information handling system (IHS) may improve effective memory access time by controlling both hardware prefetch operations and software prefetch operations. The prefetch optimizer tool selectively disables prefetch instructions in an instruction sequence of interest within an application. The tool measures execution times of the instruction sequence of interest when different prefetch instructions are disabled. The tool may hold hardware prefetch depth constant while cycling through disabling different prefetch instructions and taking corresponding execution time measurements. Alternatively, for each disabled prefetch instruction in the instruction sequence of interest, the tool may cycle through different hardware prefetch depths and take corresponding execution time measurements at each hardware prefetch depth. The tool selects a combination of hardware prefetch depth and prefetch instruction disablement that may improve the execution time in comparison with a baseline execution time. | 2014-04-10 |
20140101414 | TECHNIQUE FOR TRANSLATING DEPENDENT INSTRUCTIONS - In response to determining an operation is a dependent operation, a mapper of a processor determines the source registers of the operation from which the dependent operation depends. The mapper translates the dependent operation to a new operation that uses as its source operands at least one of the determined source registers and a source register of the dependent operation. The new operation is independent of other pending operations and therefore can be executed without waiting for execution of other operations, thus reducing execution latency. | 2014-04-10 |
20140101415 | REDUCING DATA HAZARDS IN PIPELINED PROCESSORS TO PROVIDE HIGH PROCESSOR UTILIZATION - A pipelined computer processor is presented that reduces data hazards such that high processor utilization is attained. The processor restructures a set of instructions to operate concurrently on multiple pieces of data in multiple passes. One subset of instructions operates on one piece of data while different subsets of instructions operate concurrently on different pieces of data. A validity pipeline tracks the priming and draining of the pipeline processor to ensure that only valid data is written to registers or memory. Pass-dependent addressing is provided to correctly address registers and memory for different pieces of data. | 2014-04-10 |
20140101416 | DETERMINING EACH STALL REASON FOR EACH STALLED INSTRUCTION WITHIN A GROUP OF INSTRUCTIONS DURING A PIPELINE STALL - During a pipeline stall in an out of order processor, until a next to complete instruction group completes, a monitoring unit receives, from a completion unit of a processor, a next to finish indicator indicating the finish of an oldest previously unfinished instruction from among a plurality of instructions of a next to complete instruction group. The monitoring unit receives, from a plurality of functional units of the processor, a plurality of finish reports including completion reasons for a plurality of separate instructions. The monitoring unit determines at least one stall reason from among multiple stall reasons for the oldest instruction from a selection of completion reasons from a selection of finish reports aligned with the next to finish indicator from among the plurality of finish reports. Once the monitoring unit receives a complete indicator from the completion unit, indicating the completion of the next to complete instruction group, the monitoring unit stores each determined stall reason aligned with each next to finish indicator in memory. | 2014-04-10 |
20140101417 | CODE COVERAGE FRAMEWORK - An information processing system records an execution of a program instruction. A determination is made that a thread has entered a program unit. Another determination is made that that the thread is associated with at least one attribute that matches a set of thread recording criteria. An instruction recording mechanism for the thread is dynamically activated in response to the at least one attribute of the thread matching the set of thread recording criteria. | 2014-04-10 |
20140101418 | MITIGATING INSTRUCTION PREDICTION LATENCY WITH INDEPENDENTLY FILTERED PRESENCE PREDICTORS - Embodiments of the disclosure include mitigating instruction prediction latency with independently filtered instruction prediction presence predictors coupled to the processor pipeline. The prediction presence predictor includes a plurality of presence predictors configured to each receive an instruction address in parallel and to generate an unfiltered indication of an associated instruction prediction. The prediction presence predictor includes a plurality of dynamic filters that are each coupled to one of the plurality of presence predictors. Each dynamic filter is configured to block the unfiltered indications based on a performance of the presence predictor it is coupled to. The prediction presence predictor further including stall determination logic coupled to the plurality of dynamic filters. The stall determination logic is configured to generate a combined indication that will stall instruction delivery, allowing potentially latent instruction predictions to be accounted for, based upon one or more non-blocked indications received from the plurality of dynamic filters. | 2014-04-10 |
20140101419 | METHOD FOR PREEMPTIVELY RESTARTING SOFTWARE IN A MULTI-SUBSYSTEM MOBILE COMMUNICATION DEVICE TO INCREASE MEAN TIME BETWEEN FAILURES - Methods for a mobile device restarting subsystem software on a schedule that reduces the likelihood of subsystem failures without requiring a general system restart or impacting other subsystems. The mobile device may calculate a restart time window during which a first subsystem may be restarted efficiently and prior to the occurrence of software failures. Upon initialization of the first subsystem, a restart timer may be established which indicates the period since a previous restart of the first subsystem. Once the restart timer indicates a time within the restart time window, the mobile device may transmit request messages to other subsystems dependent upon the first subsystem. In response to a unanimous vote by the other subsystems or the restart timer exceeding the time restart window, the mobile device may restart the first subsystem. In an aspect, the mobile device may transmit the request messages at an increasing rate. | 2014-04-10 |
20140101420 | Adaptive Control of Processor Performance - Embodiments include a method, system and an article of manufacture for configuring at least one processor. These include changing a sampling frequency of at least a portion of a control loop coupled to the processor in response to a change in a current input workload, determining a current error of the processor after the changing, and adjusting one or more of a clock rate and a voltage of the processor to reduce a difference between the current error and a desired error. | 2014-04-10 |
20140101421 | DYNAMIC PROTECTION OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of future deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the master OS image. | 2014-04-10 |
20140101422 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 2014-04-10 |
20140101423 | PROCESSING DEVICE AND MANAGEMENT BOARD - A processing device includes: casing; a processor in the casing; and a management board detachably mounted on the casing and manages the processor. The casing includes a memory storing therein first identification data to identify the casing. The management board includes a non-volatile memory storing therein second identification data of the casing mounting thereon the management board and second setting data to be referred by firmware, a portable recording medium being detachably mounted on the management board and storing therein third identification data of the casing mounting thereon the management board that mounts thereon the portable recording medium and third setting data to be referred by firmware, and a determiner. The determiner determines, using the first, second, and third identification data, whether the non-volatile memory or the portable recording medium stores setting data to be referred by the firmware operating on the management board. | 2014-04-10 |
20140101424 | Cooperative Boot Techniques for an Enterprise Computing System - Cooperative boot techniques enable sharing of information in an enterprise computing system so as to optimize performance of the system. For example, in an enterprise computing system comprising a management server, one or more server computers, and a storage subsystem, the management server monitors the one or more server computers for a notification that a server computer has started boot operations. The management server determines that a first server computer has started boot operation, and notifies the storage subsystem that a boot-data request is forthcoming from the first server computer. The storage subsystem is notified that the first server computer has started boot operations before the first server computer has completed boot operations so that that the storage subsystem can prepare data likely to be requested in the boot-data request. | 2014-04-10 |
20140101425 | MANAGING OPERATING SYSTEM COMPONENTS - A plurality of operating system (OS) components is stored in a storage location on a computing device. A user may selected a set of OS components to use when the computing device boots. A boot location is created and links to the set of OS components are stored in the boot location. The computing device may boot using any one of a plurality of boot locations. | 2014-04-10 |
20140101426 | PORTABLE, SECURE ENTERPRISE PLATFORMS - A portable, secure enterprise computing platform is provided by a device having a storage or memory, including a firmware module, a processor and an interface for interfacing with a host platform. The interface may be a USB interface and the device may have the form factor of a USB thumb drive. The storage may include a public partition, secure partition, operating system partition and command partition. A boot load manager in the firmware module causes the processor to load an operating system on the operating system partition and selectively enables access to the operating system by the host platform. The operating system partition may be formatted as a CDFS device such that the host platform recognizes the device as a bootable CD drive. The device provides for secure booting to the operating system partition by the host platform, without risk of corruption or malware from the host platform. A user may select from multiple operating systems. Multiple devices may be managed by a policy management application, which may assign groups of users and applications to one or more devices across an enterprise. | 2014-04-10 |
20140101427 | AUTOMATIC UPDATE OF PERSISTENT BOOT PARAMETER STORAGE - A computer system includes a memory, the memory comprising a hardware boot parameter storage area; an operating system running on the computer system; and reboot logic configured to: store updated boot parameters for the operating system in the hardware boot parameter storage area in the memory; perform a reboot of the operating system with the updated boot parameters; determine whether the reboot of the operating system is successful, and, in the event the reboot of the operating system is successful, automatically propagate the updated boot parameters to a persistent boot parameter storage area. | 2014-04-10 |
20140101428 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 2014-04-10 |
20140101429 | DYNAMIC PROTECTION OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of future deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the master OS image. | 2014-04-10 |
20140101430 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 2014-04-10 |
20140101431 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 2014-04-10 |
20140101432 | Detection of Component Operating State by Computer - A mechanism is provided for detecting an operating state of a component. A CLI command is transmitted via a command line interface to the component. An output character string is received responsive to the CLI command. A set of significant character substrings is dissected from the output character string, where each significant character substring comprises a label character string indicating a meaning of the output character string and a data character string expressing data of the output character string. A regular expression corresponding to each significant character substring is set thereby forming a set of regular expressions. A difference is calculated between each of the set regular expressions and each significant character substring corresponding to the regular expression as a character string distance. Each calculated character string distance is compared to a corresponding predetermined threshold and the operating state of the component is output based on results of the comparison. | 2014-04-10 |
20140101433 | INFORMATION PROCESSING APPARATUS - In the invention, a first processor that controls operation of a predetermined controlled unit and a second processor are operated in a first mode, a second mode, and a third mode, in the first mode the first processor and second processor are operable respectively, in the second mode respective amounts of power supplied to the first and second processors are lower than that in the first mode, in the third mode respective amounts of power supplied to the first and second processors are an amount between that in the first mode and that in the second mode and at least the predetermined controlled unit is operable, and in the second mode, the first processor puts a process related to the first processor before a process related to the second processor until the second mode is transited to the third mode. | 2014-04-10 |
20140101434 | CLOUD-BASED FILE DISTRIBUTION AND MANAGEMENT USING REAL IDENTITY AUTHENTICATION - Systems, devices and process for secure storage, retrieval and management of files using cloud-based hosting services are supported with a real identity authentication device and process. Biometric authentication is required for encryption/decryption of files. The real identity authentication processes are integrated with file exchange processes and API's related to the hosting services. Systems for enabling third parties to request encrypted files, and for notifying a file owner of such requests, are supported. | 2014-04-10 |
20140101435 | ENCRYPTED COMMUNICATION APPARATUS AND CONTROL METHOD THEREFOR - An encrypted communication apparatus determines a security protocol in IPsec to be applied to an IP packet, and calculates, based on the determined security protocol, a packet size which prevents the IP packet from being fragmented even if IPsec is applied to the IP packet. The packet size to be calculated is independent of an encryption algorithm and authentication algorithm which are actually specified by the determined security protocol. | 2014-04-10 |
20140101436 | DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT - A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network. | 2014-04-10 |
20140101437 | AUTOMATED CERTIFICATION BASED ON ROLE - In one aspect, systems and methods for generating a set of certification requirements based on a defined role and certification level for a requesting entity are provided. A target set of certification requirements is organized according to a set of process areas that are applicable to one or more roles. Each process area is defined into a set of process area subgroups, which is further defined according to base practice objectives. Each base practice objective includes an identification of certification requirements. Each of the certification requirements may be applicable to a requesting entity based on the specified level of certification. In another aspect, an entity may request certification based on an evaluation of certification information submitted by the entity against a set of previously determined applicable certification requirements. The certification authority can utilize a variety of thresholds to determine whether certification is appropriate or what level of certification is appropriate. | 2014-04-10 |
20140101438 | STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM - A database encryption system and method, the Structure Preserving Database Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with its unique position. The SPDE method permits to convert a conventional database index into a secure one, so that the time complexity of all queries is maintained. No one with access to the encrypted database can learn anything about its content without the encryption key. Also a secure index for an encrypted database is provided. Furthermore, secure database indexing system and method are described, providing protection against information leakage and unauthorized modifications by using encryption, dummy values and pooling, and supporting discretionary access control in a multi-user environment. | 2014-04-10 |
20140101439 | SYSTEMS AND METHODS FOR AUTHENTICATION BETWEEN NETWORKED DEVICES - Systems, methods, and computer-readable media are disclosed for authentication of networked devices in which a server device may authenticate a client device and/or a client device may authenticate a server device. Authentication credentials may be exchanged by the server device and the client device to enable mutual authentication. Upon authentication of the connection between the server device and the client device, authenticated, and potentially encrypted communications, may be exchanged by the server device and the client device. | 2014-04-10 |
20140101440 | DIGITAL ARBITRATION - A method for resolving disputes between users in network communications using digital arbitration. The method comprising the steps of agreeing on a contract between the users and choosing a set of arbitrators; appealing to the arbitrators by a first user, if he/she suspects the second user violates the agreement; and giving the information needed to reconstruct a resource of the second user, if a large enough number of arbitrators agree that the second user actually violated the agreement. | 2014-04-10 |
20140101441 | SYSTEMS AND METHODS FOR FLASH CROWD CONTROL AND BATCHING OCSP REQUESTS VIA ONLINE CERTIFICATE STATUS PROTOCOL - The present invention is directed towards systems and methods for batching OCSP requests and caching corresponding responses. An intermediary between a plurality of clients and one or more servers receives a first client certificate during a first SSL handshake with a first client and a second client certificate during a second SSL handshake with a second client. The intermediary may identify that the statuses of the client certificates are not in a cache of the intermediary. An OCSP responder of the intermediary may transmit a single request to an OCSP server to determine the statuses. The intermediary may determine, from a single response received from the OCSP server, whether to establish SSL connections with the clients based on the statuses. The intermediary may store the statuses to the cache for determining whether to establish a SSL connection in response to receiving a client certificate from the first client. | 2014-04-10 |
20140101442 | SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT - Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server when a CA is deprecated or has fraudulent certificate generation. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. The apparatus protects an endpoint from a man-in-the-middle attack when a certificate authority has lost control over certificates used in TLS. | 2014-04-10 |
20140101443 | METHOD AND APPARATUS FOR SELECTIVELY PROVIDING PROTECTION OF SCREEN INFORMATION DATA - A method and apparatus for enabling a cloud server to provide screen information data indicating a screen to be displayed on a client device are provided. The method of enabling a cloud server to provide screen information data relating to a screen to be displayed on a client device includes: generating the screen information data; determining whether or not to protect the generated screen information data based on characteristics of an object configuring the screen; encrypting the provided screen information data based on the determining; and transmitting the encrypted the screen information data to the client device. | 2014-04-10 |
20140101444 | APPARATUS AND METHOD FOR TRANSMITTING DATA, AND RECORDING MEDIUM STORING PROGRAM FOR EXECUTING METHOD OF THE SAME IN COMPUTER - Disclosed are a data transmission/reception apparatus and method. A secret key generation unit uses a user ID as a public key to generate a secret key corresponding to the user ID. An encryption/decryption unit sets a user ID intended to receive data as an input value to encrypt the data using a certain method and decrypt the encrypted data using a certain method on the basis of a secret key corresponding to a user ID of a receiver generated by the secret key generation unit. The transmission apparatus and method according to the present invention allow for secure communication between terminals without server intervention by encrypting data using an ID-based encryption technique for safe data communication and then communicating the encrypted data. | 2014-04-10 |
20140101445 | Authenticated Encryption Support in ISO/IEC 23009-4 - A server apparatus supporting authenticated encryption in a network, comprising a receiver configured to receive an unencrypted segment, a processor configured to selecting an encryption key, an initialization vector, and an additional authentication data (AAD), encrypt the segment, configuring the segment for transfer in a Dynamic Adaptive Streaming over Hypertext Transfer Protocol (HTTP) (DASH) media, assign a segment number to the encrypted segment, append an authentication tag to the encrypted segment, store the encrypted segment with the appended authentication tag, and update a Media Presentation Description (MPD) associated with the encrypted segment with the appended authentication tag, wherein the MPD comprises an @aadBase attribute with an AAD base value, wherein the AAD value is the sum of the segment number and the @ aadBase attribute value, and a transmitter configured to transmit the encrypted segment with the appended authentication tag to a destination. | 2014-04-10 |
20140101446 | SECURE CLIENT-SIDE KEY STORAGE FOR WEB APPLICATIONS - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for secure client-side key storage for authentication tracking. Implementations include actions of determining, at a browser executed on a client-side computing device, that an application is authentic, the application being executed on a server-side computing device, in response to determining that the application is authentic, receiving a session signing key (SSK) at a sub-domain of an application domain, the sub-domain including a static script that handles the SSK and that selectively provides request signatures, receiving, at the sub-domain, a message requesting a request signature, determining that the message originated from an authentic origin, and in response to determining that the message originated from an authentic origin, providing a request signature to a source of the message, the request signature being based on the SSK. | 2014-04-10 |
20140101447 | Mutual Authentication Schemes - Implementations of the present disclosure are directed to web-based authentication. Implementations include receiving user credentials at a browser, transmitting a first request to an application, the first request including a first user credential, receiving a first response, the first response including an encrypted server public key (SPK) and a user-specific salt value, decrypting the encrypted SPK to provide a SPK, the encrypted SPK being decrypted based on the user-specific salt value and a second user credential, determining a browser public key (BPK) and a client-side session signing key (SSK), encrypting the BPK to provide an encrypted BPK, transmitting a second request to the application, the second request including the encrypted BPK and a request signature, the request signature having been provided based on the client-side SSK, and receiving a second response, the second response including a response signature and indicating that a user has been authenticated by the application. | 2014-04-10 |
20140101448 | SYSTEM AND METHOD FOR SECURE MESSAGING IN A HYBRID PEER-TO-PEER NETWORK - An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages to one another within a hybrid peer-to-peer environment. | 2014-04-10 |
20140101449 | METHOD AND SYSTEM FOR THE REMOTE PROVISIONING OF SUBSCRIPTION - The present disclosure relates to a method and system for the remote provisioning of an access subscription of a user to a wireless communication network, wherein at least one network operator provides communication services to mobile communication devices provided with a user UICC card. Data of a temporary subscription are generated from the data of an initial subscription which will subsequently allow generating data of a definitive subscription in a network operator and in the UICC card requesting a subscription from the former without the need of remotely transmitting sensitive data of the definitive subscription. | 2014-04-10 |
20140101450 | METHOD AND APPARATUS FOR REMOTELY PROVISIONING SOFTWARE-BASED SECURITY COPROCESSORS - A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed. | 2014-04-10 |
20140101451 | CLIENT SIDE ENCRYPTION WITH RECOVERY METHOD - Technology is disclosed herein for client side data encryption with a recovery mechanism. According to at least one embodiment, a computing device encrypts at least one data set into an encrypted data set using a private encryption key. The computing device encrypts the private encryption key using a password provided by a user of the device. The password is also encrypted using the user's answers to password recovery questions. The encrypted data set, the encrypted key and the encrypted password are transmitted to and stored by a server. The computing device can retrieve and decrypt the encrypted data set form the server. The encryption key can be recovered by decrypting the encrypted key using the password. The password can be recovered by decrypting the encrypted password using answers to the password recovery questions provided by the user. | 2014-04-10 |
20140101452 | METHOD AND TERMINAL FOR TRANSMITTING INFORMATION - The present disclosure provides an information transmitting method and terminal for the same. The method can comprise: establishing a communication connection between an execution terminal and a command terminal into which an IM message is entered when the command terminal detects an information transmission request from the execution terminal; recording multimedia information by the execution terminal and sending the multimedia information from the execution terminal to the command terminal which has established the communication connection with the execution terminal; receiving the multimedia information by the command terminal and inserting the multimedia information by the command terminal into the IM message. The present disclosure can accomplish the transmission of multimedia information via inter-terminal interaction, thereby allowing a terminal into which an IM message is entered to obtain multimedia information from other terminals and increasing the convenience of using IM applications and the applications' rate of utilization. | 2014-04-10 |
20140101453 | REAL IDENTITY AUTHENTICATION - A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored instructions in firmware which perform authentication in a secure manner, independent of processing and storage resources on a host platform. The device and authentication process require biometric data and are secured against effects of malware or other security risks presented by applications running on the host platform. During an enrollment process, a unique encrypted enrollment biometric token is created using biometric data and uploaded securely to an authentication server. During an authentication process, the encrypted enrollment biometric token is downloaded to the real identity authentication device firmware and is decrypted on the device. The biometric data obtained from the decrypted data and is compared with live, real-time biometric data obtained from the user, for example, by a real-time fingerprint scan. If the real-time biometric data and the enrolled, decrypted biometric data match, the user is authenticated. | 2014-04-10 |
20140101454 | SECURE CREDENTIAL UNLOCK USING TRUSTED EXECUTION ENVIRONMENTS - Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges. Upon receiving a valid response back, the computing device can unlock the secured computing device cryptographic key associated with the issued challenge and subsequently provide access to protected data. | 2014-04-10 |
20140101455 | IMPLEMENTING DYNAMIC BANDING OF SELF ENCRYPTING DRIVE - A method and controller for implementing dynamic banding of a storage device, such as a Self Encrypting Device (SED) in a data storage array, and a design structure on which the subject controller circuit resides are provided. The controller dynamically identifies band boundaries for the storage device at the time a data storage array is created, when one or more devices are added into an existing data storage array, and when a replacement device is rebuilt into an exposed array, or an array with a failed device. A storage device band definition is provided based upon the dynamically identified band boundaries for the storage device. | 2014-04-10 |
20140101456 | CONFIDENTIALITY PRESERVING DOCUMENT ANALYSIS SYSTEM AND METHOD - A method and system for document processing allow a service provider to process a document without having access the textual content of the document. The system includes memory which receives an encoded source document from an associated client system. The encoded source document includes structural information and encoded content information. The encoded content information includes a plurality of encoded tokens generated by individually encoding each of a plurality of text tokens of the source document. The structural information includes location information for each of the plurality of text tokens. A processing module processes the encoded document to generate a modified document, without decoding the encoded tokens. A transmission module transmits the modified document to an associated client system whereby the client system is able to generate a transformed document based on the modified document and the plurality of text tokens. | 2014-04-10 |
20140101457 | METHOD AND SYSTEM FOR PROVIDING DOCUMENT RETENTION USING CRYPTOGRAPHY - Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained. | 2014-04-10 |
20140101458 | CODE TAMPERING PROTECTION FOR INSECURE ENVIRONMENTS - In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow subsequent detection of tampering by a attacker with the code. This verification technique is used here in a “White Box” cryptographic process by tying the verification data to the content of functional table lookups present in the object (compiled) code, where values in the table lookups are selectively masked (prior to the source code being compiled into the subject code) by being subject to permutation operations. | 2014-04-10 |
20140101459 | MODE-BASED SECURE MICROCONTROLLER - Various embodiments of the present invention are related to integrated circuits for processing data at a microcontroller interface. The microcontroller interfaces to a memory. The method is employed to process input data provided by the microcontroller during a memory write operation, or input data extracted from the memory during a memory read operation, respectively. A write/read control is used to indicate the memory write or read operation, and a logic address is translated to at least one physical address in the memory. The write/read control and the logic address are further employed to determine a data process mode. In various data processing modes, the input data are processed according to at least one of a plurality of data processing methods to result in processed data in different data formats. Data in different formats may be stored in various regions of the memory. | 2014-04-10 |
20140101460 | ARCHITECTURE AND INSTRUCTION SET FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass. | 2014-04-10 |
20140101461 | PARALLELIZED COUNTER TREE WALK FOR LOW OVERHEAD MEMORY REPLAY PROTECTION - A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks along a counter tree structure. The memory encryption engine upon receiving an incoming read request for the protected memory region, performs a dependency check operation to identify dependency between the incoming read request and an in-process request and to remove the dependency when the in-process request is a read request that is not currently suspended. | 2014-04-10 |
20140101462 | ENERGY-EFFICIENT UNINTERRUPTIBLE ELECTRICAL DISTRIBUTION SYSTEMS AND METHODS - A power distribution system for data center systems (and corresponding method) feeds DC power directly to a first AC-DC power supply of a computer system in the data center system and feeds AC power to a second AC-DC power supply of the computer system to efficiently and reliably provide an uninterruptible supply of power to the computer system. The power distribution system includes an energy storage unit for supplying the DC power, a charger for charging the energy storage unit, and an inverter through which the energy storage unit provides energy to an electrical substation of an electrical grid. The charger is configured to receive energy from a renewable energy source and the electrical substation. The inverter may also be configured to receive renewable energy from the renewable energy source and supply that energy to the electrical substation. An uninterruptible power supply may be coupled between the electrical substation and the AC power feed. The power distribution system further includes a monitor for monitoring the flow of current to and/or from the electrical substation, a communications interface for receiving messages or requests from a utility company associated with the electrical substation, and a controller for controlling the components of the power distribution system based on requests from the utility company and the information gathered by the monitor. | 2014-04-10 |
20140101463 | Current Distribution System, Current Distribution Method, and Computer System Thereof - A current distribution system, a current distribution method, and a computer system thereof are disclosed. The current distribution system includes a main control unit, a first power supply device, and a second power supply device. The main control unit is used for generating a first control command and a second control command. The first and the second power supply devices are used for receiving a first and a second power signals from a first and a second power input ends. The first and the second power supply devices adjust the first and the second power signals to a first and a second power shunt signals base on the first and the second control command and output to a load device, then the main control unit distributes a proportion of the first power shunt signal to the second power shunt signal accordingly. | 2014-04-10 |
20140101464 | Uninterruptible Power System and Power Control System Thereof - An uninterruptible power system and a power control system thereof are disclosed. The power control system includes the uninterruptible power system and a computer system. The uninterruptible power system supplies power to the computer system and includes an external power adaptor, a battery module, a first switch module, a second switch module, and a switching control module. When external power is input, the external power is transmitted to the computer system via the external power adaptor. When the external power is not input, the first switch. module switches automatically to supply a backup power signal from the battery module to the computer system. When the external power is not input and a control signal is not received from the computer system, the switching control module controls the second switch module to electrically disconnect a connection between the computer system and the battery module. | 2014-04-10 |
20140101465 | EXTENDING THE CAPABILITIES OF EXISTING DEVICES WITHOUT MAKING MODIFICATIONS TO THE EXISTING DEVICES - A system of extending functionalities of a host device using a smart flash storage device comprises the host device having a host interface and configured to perform a specific function to generate a first set of data. The host device is coupled with a flash storage device. The flash storage device is configured to conform to a flash memory interface. A set of data generated by the host device is to be stored in flash memory storage of the flash storage device. A processor of the flash storage device is configured to run one or more user applications to process the set of data. The processor is to operate using power supplied by the host device. | 2014-04-10 |
20140101466 | INFORMATION PROCESSING DEVICE AND METHOD, RECORD MEDIUM AND PROGRAM - The present technique relates to an information processing device, an information processing method, a record medium and a program which can prevent hot insertion and extraction of an SIM card. A removing unit removes a tray storing a storage member. A removal detector detects an operation of starting removal of the tray before the removing unit removes the tray. A power controller stopping power supplying to the storage member when the removal detector detects the operation of starting the removal of the tray may be employed. The present technique may be applied, e.g., to a personal computer. | 2014-04-10 |
20140101467 | DISCOVERING, VALIDATING, AND CONFIGURING HARDWARE-INVENTORY COMPONENTS - Methods, systems, and computer-readable media for automatically validating and configuring an inventory of hardware to interact seamlessly with a cloud-computing fabric of a data center are provided. Initially, devices internal to the hardware inventory are located by sending and receiving messages via out-of-band communication channels and network communication channels, respectively. Locating the internal devices involves establishing communication from a user device to the hardware inventory and selecting at least one of the internal devices for conducting a discovery process thereon. The discovery process involves receiving a first network identifier via the out-of-band communication channel and receiving a second network identifier via the network communication channel. When the first and second network identifiers match, the interconnection of the selected device is validated. Otherwise, one or more remedial measures are initiated with respect to the selected device. Validation involves conducting a server boot within the MOS and executing validation and configuration tools. | 2014-04-10 |
20140101468 | APPARATUS, SYSTEM AND METHOD FOR GATED POWER DELIVERY TO AN I/O INTERFACE - Techniques and mechanisms for managing a delivery of power to a resource of an input/output (I/O) interface. In an embodiment, a first link of a plurality of communication links is monitored. Of the plurality of links, a first set of resources of the I/O interface is to support communication only via the first link. One or more other resources of the I/O interface are for supporting communications of another link of the plurality of links. In another embodiment, a resource of the first set of resources is decoupled from a power supply in response to detecting a total number of active lanes of the first link, decoupling. | 2014-04-10 |
20140101469 | HARD DRIVE ENERGY-SAVING CONTROL METHOD AND APPARATUS, AND CENTRAL PROCESSING UNIT - A hard drive energy-saving control method is disclosed. The method includes: obtaining a historical working state of a hard drive in each preset time segment, where each preset time segment is each preset time segment in at least one statistic period; predicting a working state of the hard drive in a next time segment of the current time segment according to the historical working state of the hard drive; and selecting a corresponding energy-saving policy level according to the working state of the hard drive in the next time segment, and performing energy-saving control on the hard drive. Embodiments of the present invention solve the technical problem in the prior art that energy consumption of a hard drive is not correlated with actual service access traffic and the energy-saving efficiency is not optimum. The embodiments of the present invention improve the energy-saving efficiency of the hard drive. | 2014-04-10 |
20140101470 | IDLE DURATION REPORTING FOR POWER MANAGEMENT - For one disclosed embodiment, data corresponding to an idle duration for one or more downstream devices may be received. Power may be managed based at least in part on the received data. Other embodiments are also disclosed. | 2014-04-10 |
20140101471 | POWER MANAGEMENT FOR PROCESSING CAPACITY UPGRADE ON DEMAND - A method, computer program product, and apparatus for managing power management in a data processing system are presented. A core is activated and configured to operate at a frequency in response to a request to increase a processing capacity. A determination whether a use of power resulting from activating the core meets a policy for the use of the power is made. A set of parameters is adjusted to meet the policy for the use of power in response to a determination that the use of power does not meet the policy. A determination whether a number of operations performed by a set of cores is made. An indication that the request to increase the processing capacity is unavailable is made in response to the number of operations having not increased. | 2014-04-10 |
20140101472 | ADAPTIVE SCREEN TIMEOUTS BASED ON USER PREFERENCES, INTERACTION PATTERNS AND ACTIVE APPLICATIONS - A computing device, such as a mobile communication device, is provided that adjusts, based on user interaction with the device, sleep times for a display to enter a sleep mode restricting use of a graphical user interface. The device includes a display providing the graphical user interface and a processor. The processor is configured to cause the display to enter the sleep mode after a sleep time without receiving any user inputs, increase the sleep time responsive to a user input received within a predetermined period of time after entry of the sleep mode and decrease the sleep time responsive to another user input directing the display to enter the sleep mode before passage of the sleep time. The processor may execute similar processes to adjust a plurality of sleep times associated with different applications and different functions within an application. | 2014-04-10 |
20140101473 | System and Method for Enabling Energy Efficient Ethernet Networks with Time-Sensitive Protocols - A system and method for enabling energy efficient Ethernet networks with time-sensitive protocols. Time-stamped packets generated by a time-sensitive protocol rely on fixed latency in a transit time through a transmission subsystem. An energy efficiency control policy in a network device governs a transmission of time-stamped packets in accordance with energy efficiency initiatives controlled by the energy efficiency control policy. In one embodiment, time-stamped packets can be dropped or modified to account for transitions by the transmission subsystem into an energy saving state. In another embodiment, transitions by the transmission subsystem into or out of an energy saving state can be impacted by the existence of time-stamped packets scheduled for transmission. | 2014-04-10 |
20140101474 | System and Method for Extending System Uptime while Running on Backup Power - A server chassis includes an uninterruptible power supply, and a server including a controller. The uninterruptible power supply is configured to provide a reserve power when a primary power is lost, and to send a power loss signal when the primary power is lost. The controller is configured to receive a desired server uptime, to receive an indication that a power limit for the server is fixed or decreasing over the desired server, to receive the power loss signal from the uninterruptible power supply, to send a power capacity query to the uninterruptible power supply, to receive a reserve power capacity of the uninterruptible power supply in response to the power capacity query, to calculate the power limit for the server based on the reserve power capacity of the uninterruptible power supply and on the desired server uptime, and to enforce the power limit on the server. | 2014-04-10 |
20140101475 | POWER MANAGEMENT SYSTEM - A power management system includes a power system. A powered component is coupled to the power system. A power detect circuit is coupled to the power system. A power system controller is coupled to the power system, the powered component, and the power detect circuit. The power system controller is operable, for each of at least one workload run using the powered component, to program the power detect circuit with a first threshold for a first system operation setting and determine that the first threshold was not exceeded while the workload was running. The power system controller is then operable to program the power detect circuit with a second threshold for the first system operation setting, determine that the second threshold was exceeded while the workload was running and, in response, use the second threshold to allocate power from the power system. | 2014-04-10 |
20140101476 | BATTERY MANAGEMENT SYSTEM AND METHOD - A battery management system/method implementing optimal dynamic battery charge/discharge cycling is disclosed. The system utilizes a power source control unit (PSCU) to selectively switch a power supply source to a battery charger that charges a battery servicing a portable computing device. The PSCU is controlled by a power monitor control unit (PMCU) that monitors the battery state and determines the optimal charge/discharge profile for the battery. Depending on the type and current condition of the battery as well as battery charge/discharge history, the PMCU monitors the historical, current, and/or anticipated demand activity of the battery to determine an optimal charge/discharge profile for the battery to enable maximum battery life under a wide variety of environmental and use profiles. Present invention methods control battery charge/discharge activity based on computing device historical/anticipated use characteristics, battery chemistry, and/or optimal battery lifecycle operation. | 2014-04-10 |
20140101477 | POWER SWITCHING IN A TWO-WIRE CONDUCTOR SYSTEM - In an example embodiment, a power switching circuit of an automobile audio bus (A | 2014-04-10 |
20140101478 | Processor Clocking Policies for Mobile Computing Devices - In one embodiment, a processor of a computing device executes a sequence of instructions that depends on one or more external operations. Software of the computing device determines a clocking policy for the processor during execution of the sequence of instructions. The clocking policy is based at least in part on a pattern of execution involving the sequence of instructions and the external operations, and the clocking policy modifies a clock speed of the processor. The software of the computing device applies the clocking policy to the processor during execution of at least a portion of the sequence of instructions. | 2014-04-10 |
20140101479 | IMPLEMENTING STORAGE ADAPTER PERFORMANCE CONTROL - A method and controller for implementing storage adapter performance control, and a design structure on which the subject controller circuit resides are provided. The controller includes a performance state machine controlling the use of a performance path and a normal or error recovery path in a storage adapter firmware stack. The performance state machine determines which storage resources are allowed to use the performance path and properly transitions the running of each storage resource to and from the performance path and normal path mode of operation. | 2014-04-10 |
20140101480 | COMMON HOT SPARE FOR MULTIPLE RAID GROUPS - A storage system assigns one or more large disks in a storage enclosure as a common dedicated hot spare that is used by multiple RAID groups. Storage space equivalent to the smallest physical disk in a RAID group is allocated on the common dedicated hot spare. A mapping of this allocated storage space to the RAID group is maintained in nonvolatile memory. When a disk fails in the RAID group, the allocated storage space on the common dedicated hot spare receives a rebuild of the failed disk. Once the rebuild is complete, the allocated storage space acts as part of the RAID group. When the failed disk is replaced, the data on the allocated storage space is copied to the replacement disk. Once the copy is complete, the allocated storage space is once again set to act as a dedicated hot spare to the RAID group. | 2014-04-10 |
20140101481 | PER-RANK CHANNEL MARKING IN A MEMORY SYSTEM - Channel marking is provided in a memory system that includes a memory channel with a plurality of memory devices. The memory devices are arranged into a first group of memory devices and a second group of memory devices. The memory system is configured to perform a method that includes determining that more than a threshold number of memory devices in the first group are failing. An error correction code (ECC) is configured to compensate for errors associated with memory devices in the first group on the memory channel and to perform error correction on errors associated with memory devices in the second group on the memory channel. | 2014-04-10 |
20140101482 | Systems and Methods for Repairing System Files - Systems and methods are provided for repairing system files. For example, a list of system files including file information of one or more first repairable system files are updated in real time; file information of a target file sent from a terminal is received; whether the target file is in need of repair is detected based on at least information associated with the list of system files; in response to the target file being in need of repair, a first repair strategy for the target file is determined based on at least information associated with a predetermined database of repair strategies and a file type of the target file; and the target file is repaired based on at least information associated with the first repair strategy. | 2014-04-10 |
20140101483 | Systems and Methods for Modified Quality Based Priority Scheduling During Iterative Data Processing - Systems, circuits, devices and/or methods related to systems and methods for data processing, and more particularly to systems and methods for priority based data processing. | 2014-04-10 |
20140101484 | MANAGEMENT OF A DISTRIBUTED COMPUTING SYSTEM THROUGH REPLICATION OF WRITE AHEAD LOGS - Several methods and a system of a replicated service for write ahead logs are disclosed. In one embodiment, a method includes persisting a state of a distributed system through a write ahead log (WAL) interface. The method also includes maintaining a set of replicas of a WAL through a consensus protocol. In addition, the method includes providing a set of mechanisms for at least one of detection and a recovery from a hardware failure. The method further includes recovering a persistent state of a set of applications. In addition, the method includes maintaining the persistent state across a set of nodes through the hardware failover. In one embodiment, the system may include a WAL interface to persist a state of a distributed system. The system may also include a WAL replication servlet to maintain and/or recover a set of replicas of a WAL. | 2014-04-10 |
20140101485 | DATA COMPRESSION PROFILER FOR CONFIGURATION OF COMPRESSION - A method and apparatus for determining one or more compression parameters suitable to compress a class of signals, may include inputting a test data set, being representative of a data set to be compressed, characterizing the test data, selecting a compression algorithm, calculating a distortion level to be used in determining the compression ratio (or a compression ratio to be used in determining the distortion level), generating a computer implemented model for the test data, selecting a recommended operating point based on a computer implemented model, and determining compression parameters corresponding to the operating point. The compression parameters may subsequently be applied for configuration of compression applied to one or more production data sets that are similar to the test data. This abstract does not limit the scope of the invention as described in the claims. | 2014-04-10 |
20140101486 | SICHERHEITSSYSTEM - Multiple safety related participants are arranged along a bus line in such a way that both a forward test signal path and a return test signal path run through the same safety related participants and the safety related participants are adapted in such a way that the occurrence of a non-secure state of their protective device brings about an interruption of the test signal path. A termination element connects the forward test signal path to the return test signal path. The safety unit is configured to transmit an output signal at its output and the termination element is configured to receive the output signal from the forward test signal path and to output a test signal to the return test signal path. The test signal is changed with respect to the received output signal in dependence on the received output signal. | 2014-04-10 |
20140101487 | PERFORMANCE AND FAULT MANAGEMENT SYSTEM - A network device is configured to receive information from a plurality of device. The network device is configured to further analyze the information and determine that a performance or fault issue exists relating to operation of a device. The network device is configured to further send first information to a user device. The user device is to receive an instruction on eliminating the performance or fault issue. The network device is configured to further receive second information to resolve the performance of fault issue relating to the operation of the device; and send a notification to resolve the performance or fault issue relating to the operation of the device. | 2014-04-10 |
20140101488 | SYSTEM AND METHOD FOR APPLICATION DEBUGGING - A system includes a client system comprising a memory and a processor configured to execute a debugging tool. The debugging tool is communicatively coupled to an OPC Unified Architecture (UA) server. Furthermore, the debugging tool is configured to monitor and control, from the client system, debugging of an application executing on the OPC UA server. | 2014-04-10 |
20140101489 | Method, Apparatus, and System for Handling Virtual Machine Internal Fault - A method, an apparatus, and a system for handling a virtual machine internal fault. The method includes: monitoring, by a virtual machine internal fault detecting apparatus, a state of a virtual machine operating system; when detecting that the virtual machine operating system encounters an exception, obtaining, by an exception catching module in the virtual machine internal fault detecting apparatus, exception information corresponding to the exception according to a context of the virtual machine operating system; and reporting, by the exception catching module, the exception information to a virtual machine monitoring apparatus, so that the virtual machine monitoring apparatus determines, according to the exception information, a policy for resolving the exception corresponding to the exception information, and resolves the exception corresponding to the exception information by using the policy. The present invention is applicable to a virtualized environment having a virtual machine. | 2014-04-10 |
20140101490 | APPARATUS AND METHODS FOR PROVIDING DATA INTEGRITY - The present disclosure includes apparatus (e.g., computing systems, memory systems, controllers, etc.) and methods for providing data integrity. One or more methods can include, for example: receiving a number of sectors of data to be written to a number of memory devices; appending first metadata corresponding to the number of sectors and including first integrity data to the number of sectors, the first metadata has a particular format; generating second integrity data to be provided in second metadata, the second integrity data corresponding to at least one of the number of sectors (wherein the second metadata has a second format); and generating third integrity data to be provided in the second metadata, the third integrity data including error data corresponding to the second integrity data and the at least one of the number of sectors. | 2014-04-10 |
20140101491 | TRACING OF A DATA PROCESSING APPARATUS - A trace unit, diagnostic apparatus and data processing apparatus are provided for tracing of conditional instructions. The data processing apparatus generates instruction observed indicators indicating execution of conditional instructions and result output indicators indicating output by the data processing apparatus of results of executing respective conditional instructions. The instruction observed indicators and result output indicators are received by a trace unit that is configured to output conditional instruction trace data items and independently output conditional result trace data items enabling separate trace analysis of conditional instructions and corresponding conditional results by a diagnostic apparatus. The instruction observed indicator is received at the trace unit in a first processing cycle of the data processing apparatus whilst result output indicator is received at in a second different processing cycle. | 2014-04-10 |
20140101492 | ADAPTIVE PREVENTIVE MAINTENANCE FOR COMPUTING SYSTEMS - Systems, methods, and other embodiments associated with adaptively determining a preventive maintenance schedule based on historical system operation are described. The prognostic parameter values are continuously partitioned into a number of operating states based on observed maintenance costs associated with the prognostic parameter values. The operating states range from absolutely healthy, one or more degrees of degradation, to fully degraded. A system cost function is used as the discriminant function. The system cost function is an expected maintenance cost when a given preventive maintenance (PM) schedule is adopted. The system cost function calculates the expected cost based on the observed cost of operation in each of the operating states and a probability of the computing system being in each of the operating states as determined by the PM schedule. The PM schedule that minimizes the cost function is determined to be the optimal PM schedule. | 2014-04-10 |
20140101493 | METHODS AND SYSTEMS FOR OPTIMIZING INFORMATION TECHNOLOGY COSTS BASED ON OUTAGE COSTS - A method that includes monitoring, by a computing device including a processor, transaction activity level of a plurality of pre-defined IT transactions, and determining, by the computing device, that an IT outage has occurred when the activity level is below a threshold. | 2014-04-10 |
20140101494 | Chronic ATMs (new definition) - A method of tracking repeated performance problems in a machine is disclosed. The method comprises storing the faults in a computer memory, and assigning a classification value to the machine based on the frequency and number of the faults. Based on the classification value of the cash handing device it is determined whether the cash handing device needs to be serviced. The faults can be related to one of the hardware, the cash reject rate, image handling, crash rate, user claim rate, and check handling accuracy of the machine. | 2014-04-10 |
20140101495 | ENTERPRISE LEVEL DATA ELEMENT REVIEW SYSTEMS AND METHODOLOGIES - An enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating to ones of a multiplicity of data elements, a data element metadata modification subassembly receiving an output from the data access event collection subsystem and providing a script indicating which data elements have had a metadata modification over a given period of time, and a data element dancer operative to collect at least one of metadata and access permissions for a plurality of data elements which is substantially less than the multiplicity of data elements and is selected on the basis of the script. | 2014-04-10 |
20140101496 | STATE MACHINE BASED PARSING ALGORITHM ON A DATA-STATUS FIFO WITH MULTIPLE BANKS - In the L2 FIFO architecture incoming frames are stored in a multi bank FIFO to enable offloading the programmable real-time unit to do other tasks. The L2 FIFO buffers data coming from the L1 FIFO, reducing the polling time for received data. Status is always checked for errors before processing the data and updating the state variables. Implementing a state machine to perform some of the checks results in a PRU utilization that is not a function of the bytes that need to be processed. | 2014-04-10 |
20140101497 | EVENT NOTIFICATION SYSTEM, EVENT INFORMATION AGGREGATION SERVER, AND EVENT NOTIFICATION METHOD - Events which have occurred in storage systems can be managed easily regardless of complexity of a storage configuration. | 2014-04-10 |
20140101498 | METHOD FOR ESTIMATING BLOCK ERROR RATE AND COMMUNICATION DEVICE - A method for estimating a block error rate and a communication device are applied to the field of communications technologies. The method for estimating a block error rate includes: decoding N received coded code blocks to obtain multiple posterior probabilities APPs, where N is a natural number greater than 1; obtaining, according to the multiple posterior probabilities APPs and a preset policy, a result indicating that the decoding of each coded code block is correct or incorrect, where the preset policy includes: when a sum of absolute values of the multiple APPs is greater than or equal to a preset threshold, the decoding is correct; and obtaining a decoding block error rate according to a result indicating whether the decoding of the N coded code blocks is correct. In this way, the estimation of a decoding block error rate is implemented. | 2014-04-10 |
20140101499 | BIT ERROR RATE BASED WEAR LEVELING FOR SOLID STATE DRIVE MEMORY - According to exemplary embodiments, a system, is provided for bit error rate (BER)-based wear leveling in a solid state drive (SSD). A block-level BER value for a block in the SSD is determined. An adjusted PE cycle count for the block is incremented or decremented based on the block-level BER value. Wear leveling is then performed in the SSD based on the adjusted PE cycle count. | 2014-04-10 |
20140101500 | CIRCUITS AND METHODS FOR FUNCTIONAL TESTING OF INTEGRATED CIRCUIT CHIPS - Circuits and methods are provided for debugging an integrated circuit. An integrated circuit includes core circuitry, scan test circuitry, scan control circuitry, and debug control circuitry. The scan test circuitry includes scan chains with scan cells interspersed throughout the core circuitry. The scan control circuitry controls the scan test circuitry to scan test the core circuitry. The debug control circuitry utilizes the scan test circuitry and controls the scan control circuitry to debug failure conditions of the integrated circuit during normal use. The scan control circuitry applies a debug clock signal to a clock port of each scan cell of a given scan chain to store data values that are generated by the core circuitry into the scan cells. The scan control circuitry controls the scan test circuitry to scan shift out the stored data values generated by the core circuitry during the debug process. | 2014-04-10 |
20140101501 | SCAN TEST CIRCUITRY CONFIGURED TO PREVENT VIOLATION OF MULTIPLEXER SELECT SIGNAL CONSTRAINTS DURING SCAN TESTING - An integrated circuit comprises a decoder having a plurality of select signal outputs, a multiplexer having a plurality of select signal inputs subject to a specified select signal constraint, and scan test circuitry. The scan test circuitry comprises at least one scan chain having a plurality of scan cells coupled between respective ones of the select signal outputs of the decoder and respective ones of the select signal inputs of the multiplexer. The scan test circuitry is configured to control at least a given one of the scan cells so as to prevent violation of the select signal constraint in conjunction with scan testing. The multiplexer may be, for example, a one-hot multiplexer for which the select signal constraint indicates that only one of the select signal inputs should receive a logic high select signal at a particular time. | 2014-04-10 |
20140101502 | FALLING CLOCK EDGE JTAG BUS ROUTERS - The disclosure describes a novel method and apparatus for allowing a controller to access a bus router using a communication occurring in response to one edge of a clock to select one or more devices for access using a communication occurring on the opposite edge of the clock. Additional embodiments are also provided and described in the disclosure. | 2014-04-10 |
20140101503 | SCAN TOPOLOGY DISCOVERY IN TARGET SYSTEMS - Topology discovery of a target system having a plurality of components coupled with a scan topology may be performed by driving a low logic value on the data input signal and a data output signal of the scan topology. An input data value and an output data value for each of the plurality of components is sampled and recorded. A low logic value is then scanned through the scan path and recorded at each component. The scan topology may be determined based on the recorded data values and the recorded scan values. | 2014-04-10 |
20140101504 | JTAG BUS COMMUNICATION METHOD AND APPARATUS - The present disclosure describes using the JTAG Tap's TMS and/or TCK terminals as general purpose serial Input/Output (I/O) Manchester coded communication terminals. The Tap's TMS and/or TCK terminal can be used as a serial I/O communication channel between; (1) an IC and an external controller, (2) between a first and second IC, or (3) between a first and second core circuit within an IC. The use of the TMS and/or TCK terminal as serial I/O channels, as described, does not effect the standardized operation of the JTAG Tap, since the TMS and/or TCK I/O operations occur while the Tap is placed in a non-active steady state. | 2014-04-10 |
20140101505 | CLOCK CONTROL FOR REDUCING TIMING EXCEPTIONS IN SCAN TESTING OF AN INTEGRATED CIRCUIT - An integrated circuit comprises scan test circuitry and additional circuitry subject to testing utilizing the scan test circuitry. The scan test circuitry comprises a scan chain having a plurality of scan cells. The integrated circuit further comprises a clock distribution network configured to provide clock signals to respective portions of the integrated circuit. The clock distribution network comprises a clock tree having clock signal lines, and clock control elements arranged in respective selected ones of the clock signal lines of the clock tree, where the clock control elements are configured to separate at least one synchronous clock domain into multiple asynchronous clock domains during scan testing. The clock control elements may be configured to reduce a number of timing exceptions produced during scan testing relative to a number of timing exceptions that would otherwise be produced if scan testing were performed using the synchronous clock domain. | 2014-04-10 |
20140101506 | TEST ACCESS MECHANISM FOR DIAGNOSIS BASED ON PARTITIONING SCAN CHAINS - Disclosed are representative embodiments of methods, apparatus, and systems for partitioning-based Test Access Mechanisms (TAM). Test response data are captured by scan cells of a plurality scan chains in a circuit under test and are compared with test response data expected for a good CUT to generate check values. Based on the check values, partition pass/fail signals are generated by partitioning scheme generators. Each of the partitioning scheme generators is configured to generate one of the partition pass/fail signals for one of partitioning schemes. A partitioning scheme divides the scan cells into a set of non-overlapping partitions. Based on the partition pass/fail signals, a failure diagnosis process may be performed. | 2014-04-10 |
20140101507 | HIGH SPEED DATA TESTING WITHOUT HIGH SPEED BIT CLOCK - System and method for testing a high speed data path without generating a high speed bit clock, includes selecting a first high speed data path from a plurality of data paths for testing. Coherent clock data patterns are driven on one or more of remaining data paths of the plurality of data paths, wherein the coherent clock data patterns are in coherence with a low speed base clock. The first high speed data path is sampled by the coherent clock data patterns to generate a sampled first high speed data path, which is then tested at a speed of the low speed base clock. | 2014-04-10 |
20140101508 | HYBRID ERROR-CONTROL ALGORITHM - An embodiment of the invention includes an efficient error-control system and method for recovering packet losses, especially losses in distributing multicast video over broadband residential networks. Preferably, unlike most existing error-control algorithms designed for Internet multicast, the system and method does not employ substantial feedback suppression. Preferably, the system and method does not employ substantial multicasted retransmission. Preferably, the system and method does not employ substantial parity retransmission. Preferably, the system and method does not employ substantial local loss recovery. The system and method integrates two existing classes of error-control algorithms: Automatic Repeat Request (ARQ) and Forward Error Correction (FEC), to reduce traffic overhead and achieve scalability. | 2014-04-10 |
20140101509 | Systems and Methods for Parallel Retry Processing During Iterative Data Processing - Systems, circuits, devices and/or methods related to systems and methods for data processing, and more particularly to systems and methods for priority based data processing. | 2014-04-10 |
20140101510 | Low Density Parity Check Layer Decoder For Codes With Overlapped Circulants - The present inventions are related to systems and methods for decoding data in an LDPC layer decoder for LDPC codes with overlapped circulants. | 2014-04-10 |