16th week of 2009 patent applcation highlights part 56 |
Patent application number | Title | Published |
20090100230 | System and method to protect data stored in a storage system - In an example of an embodiment of the invention, a system for recording data generated by a client server and transmitted to a storage system is provided. The system comprises a storage system and a processor located remotely from the storage system and linked to the storage system via a network. The processor determines that a selected data processing operation is to be performed with respect to data stored in the storage system, and determines that a record of at least some of the data stored in the storage system is required prior to performing the selected data processing operation. The processor also generates a command comprising a request to generate a record of the at least some of the stored data, the command being generated in accordance with a well-known standard, and transmits the command to the storage system to generate the record, via the network in accordance with Internet Protocol (IP). Examples of other systems and methods are also disclosed. | 2009-04-16 |
20090100231 | CACHE MEMORY SYSTEM, AND CONTROL METHOD THEREFOR - A cache memory system which readily accepts software control for processing includes: a cache memory provided between a processor and memory; and a TAC (Transfer and Attribute Controller) for controlling the cache memory. The TAC receives a command which indicates a transfer and an attribute operation of cache data and a target for the operation, resulting from the execution of a predetermined instruction by the processor, so as to request the operation indicated by the command against the address to the cache memory. | 2009-04-16 |
20090100232 | Processor, information processing device and cache control method of processor - A processor having a cache memory provided therein controls use of the cache memory based on operation mode information which changeably designates use/no-use of a cache memory and on designation of cache memory use in an access instruction word in a program at the time of an access to a main storage memory from the program in operation. | 2009-04-16 |
20090100233 | PERSISTENT MEMORY MODULE - A persistent memory module ( | 2009-04-16 |
20090100234 | Data Access System and Data Access Method - A data access system and a data access method achieving effects of power saving and access synchronization during data access are provided. The data access system includes a data processing unit, a bridge device and a memory device. The data processing unit sends an access request signal to initiate data access of at least one unit data. The access of unit data is completed within a plurality of clock cycles of a reference clock signal. The bridge device generates an access signal according to the access request signal, the reference clock signal and a leading time. A pulse of the access signal is determined by the leading time within the clock cycles. The memory device executes the access of the unit data according to the access signal. | 2009-04-16 |
20090100235 | STORAGE SYSTEM AND DATA ERASING METHOD - This storage system includes a server management unit for managing in a server a maximum overwrite count and an overwrite count for overwriting the overwrite data in a disk cache, a controller cache for temporarily storing overwrite data sent from the server in the storage subsystem, a storage management unit for managing a maximum overwrite count and an overwrite count for overwriting overwrite data sent from the server in the controller cache so as to overwrite overwrite data sent from the controller cache in the hard disk drive according to the number of the maximum overwrite count, and an address management unit for managing the respective addresses of the disk cache, the controller cache and the hard disk drive storing the same file to be erased. | 2009-04-16 |
20090100236 | COPYING DATA ONTO A SECONDARY STORAGE DEVICE - The illustrative embodiments described herein provide an apparatus for copying data onto a secondary storage device. In one embodiment, a process identifies data associated with a data processing system to form a first set of data. The first set of data is stored on a primary storage device. The process copies the first set of data from the primary storage device to the secondary storage device to form a second set of data. The process also restricts an operating system in the data processing system from accessing the secondary storage device. | 2009-04-16 |
20090100237 | Storage system that dynamically allocates real area to virtual area in virtual volume - Either all or part of mapping information, which is stored in a volatile memory, is written to a nonvolatile storage area. When the target of the write to the nonvolatile storage area is a portion of the mapping information, an information element required to restore the mapping information, from among a plurality of information elements constituting the mapping information, is written to the nonvolatile storage area as the portion of the mapping information. | 2009-04-16 |
20090100238 | Memory card and memory card control changeover method - A disclosed memory card includes: a control unit; a nonvolatile memory; and a program memory, wherein the program memory stores control programs for plural standards, the control programs controlling data access between the nonvolatile memory and an external device as a memory card. | 2009-04-16 |
20090100239 | DATA UPDATE HISTORY STORAGE APPARATUS AND DATA UPDATE HISTORY STORAGE METHOD - Provided is a storage apparatus that stores data update histories using an existing file system without modifying the source code of the existing file system. The storage apparatus includes an I/O command catcher that changes, when an I/O command is issued from a program stored in a memory and arbitrary update data is stored in a data area address corresponding to a buffer address storing the arbitrary update data, authorized access set for the arbitrary update data in a page management unit to readable; and a page exception catcher that issues, when the authorized access of the arbitrary update data is changed to readable, a page exception report, acquires a data area address corresponding to the buffer address storing the arbitrary update data in the address management unit, and stores the update data and its update history in an update queue. | 2009-04-16 |
20090100240 | AUTHENTICATION METHOD, CORRESPONDING PORTABLE OBJECT AND COMPUTER SOFTWARE PROGRAM - A method is provided for authenticating a carrier of a portable object having a memory for memorising at least one item of secret information. The method includes: authentication processing of a signature provided by said carrier, taking account of said secret information; supplying an item of information for the authentication decision, positive or negative, implementing, in a non volatile memory of said portable object, an incorrect signature indicator which may adopt a value indicating a normal situation and at least one value indicating an abnormal situation. The step of implementing including: after said information supplying step, writing, in said incorrect signature indicator, a value indicating an abnormal situation, if said authentication decision is negative; and before said authentication step, and if said incorrect signature indicator contains a value indicating an abnormal situation, a step generating a delay. The writing step also includes memorising at least one item of context-related information. | 2009-04-16 |
20090100241 | Method for Removing a Mass Storage System From a Computer Network, and Computer Program Product and Computer Network for Carrying our the Method - A method for removing a mass storage system from a composite computer system. The composite computer system comprises a multiplicity of mass storage systems which respectively provide at least one file system for storing data, at least one component computer for carrying out one or more processes, a network which connects the multiplicity of mass storage systems to the at least one component computer and an access controller which controls access by the processes to the file systems which have been provided. A mass storage system to be removed is first of all selected. All of the file systems provided by the selected mass storage system are then marked. The marked file systems are released by copying data and diverting access by processes to the copied data from the marked file system to at least one file system which has not been marked. After the releasing operation has been concluded, it is signaled that the selected mass storage system can be removed from the composite computer system. | 2009-04-16 |
20090100242 | Data Processing Method for Use in Embedded System - A data processing method for an embedded system is provided. The embedded system includes a first processor, a second processor, a nonvolatile memory, and a volatile memory. The data processing method includes steps of initiating data transfer of compressed data from the nonvolatile memory to the volatile memory by the first processor, and decompressing the compressed data in the volatile memory by the second processor; and further writing the decompressed data to the volatile memory by the second processor. | 2009-04-16 |
20090100243 | High Performance, Lock-Free Virtual Storage Manager - A virtual storage technique is provided to manage a cell pool or a set of cell pools which can be used to satisfy variable-size storage requests. The algorithm uses no locks and relies on an atomic compare-and-swap instruction to serialize updates to the fields that can be simultaneously requested by multiple threads or processes. A free chain is used to manage cells which have already been obtained and freed, while there is an active extent that is used to hand out cells which have not previously been obtained. The algorithm is based on all cell pool extents being the same size, which allows the control information for the extent to be easily located on the extent boundary (e.g. at a 1 MB boundary). Control information for each cell is stored independently of the cell storage in a control array that resides at the head of the extent, along with other control information. This avoids cell overrun from damaging the cell pool control information. The result is a high performance storage manager with good serviceability characteristics. | 2009-04-16 |
20090100244 | Adaptive hybrid density memory storage device and control method thereof - The present invention discloses a control method of an adaptive hybrid density memory storage device suitable for locating a data to the storage device. The storage device includes a high density memory unit and a low density memory unit. The method is characterized in that the property of the data is determined by its length, and the data is written to the high density memory unit or the low density memory unit according to the property of the data and the relative wearing rate and the amount of data processed by the storage device. | 2009-04-16 |
20090100245 | Device and method for memory addressing - An addressing device and method is provided to enable an electronic system having a less addressing capability to address a memory device having a larger storage space, thereby reducing the manufacture cost of the electronic system. The addressing device includes an address decoder and an address translator. The address decoder receives a first access address belonging to a smaller address space, and determines whether to map the first access address to the larger storage space of the memory device. The address translator is coupled to the address decoder. When the first access address is mapped to the storage space of the memory device, the address translator translates the first access address into a second access address of the larger storage space according to an adjustable base address. | 2009-04-16 |
20090100246 | INFORMATION RETRIEVING APPARATUS AND METHOD - The present invention provides an information retrieving apparatus and method each of which stores predetermined information at addresses of a Main Table RAM associated with retrieval key data by substituting data indicative of each specific position of the retrieval key data in retrieval range defining data in which a range targeted for retrieval is defined by setting the retrieval range defining data as information indicative of the data being arbitrary data, with a fixed value defined in advance and performing conversion on the retrieval key data by predetermined hash functions; allows a mask Table to store position information indicative of the specific position; when retrieval key data targeted for retrieval is inputted, reads the position information from the mask Table and reads from the Main Table RAM through a data selector, the information stored at the addresses associated therewith by substituting the data indicative of each specific position indicated by the position information of the retrieval key data with the fixed value and converting the same by the hash functions, and determines whether each read information is of the predetermined information. | 2009-04-16 |
20090100247 | SIMD PERMUTATIONS WITH EXTENDED RANGE IN A DATA PROCESSOR - A processor in a data processing system executes a permutation instruction which identifies a first source register, at least one other source register, and a destination register. The first source register stores at least one in-range index value for the at least one other source register and at least one out-of-range index value for the at least one other source register. The at least one other source register stores a plurality of vector element values, wherein each in-range index value indicates which vector element value of the at least one other source register is to be stored into a corresponding vector element of the destination register. Each out-of-range index value is used to indicate which one of at least two predetermined constant values is to be stored into a corresponding vector element of the destination register. Partial table lookups using a permutation instruction shortens the time required to retrieve data. | 2009-04-16 |
20090100248 | Hierarchical System, and its Management Method and Program - A lower system structure reports performance information to an upper system structure. When detecting performance deterioration of the system structure on the basis of the reported performance information, the upper system structure optimizes resource redistribution of the system structure that the upper system structure manages. If the performance is improved by the optimization in the managed system structure, the optimization results is applied to the resource control of the lower system structure, and the lower system structure redistributes the resources according to the resource control. If the performance is not improved by the optimization, the lower system structure reports the performance information to the upper system structure, which optimizes the resource redistribution. | 2009-04-16 |
20090100249 | METHOD AND APPARATUS FOR ALLOCATING ARCHITECTURAL REGISTER RESOURCES AMONG THREADS IN A MULTI-THREADED MICROPROCESSOR CORE - One embodiment of a microprocessor core capable of executing a plurality of threads substantially simultaneously includes a plurality of register resources available for use by the threads, where the register resources are fewer in number than the number threads multiplied by a number of architectural register resources required per thread, and a supervisor for allocating the register resources among the plurality of threads. | 2009-04-16 |
20090100250 | SWITCHING BETWEEN MULTIPLE SOFTWARE ENTITIES USING DIFFERENT OPERATING MODES OF A PROCESSOR - The computer program includes a virtualization software that is executable on the new processor in the legacy mode. The new processor includes a legacy instruction set for a legacy operating mode and a new instruction set for a new operation mode. The switching includes switching from the new instruction set to the legacy instruction set and switching paging tables. Each of the new operating mode and the legacy operating mode has separate paging tables. The switch routine is incorporated in a switch page that is locked in physical memory. The switch page has a first section to store a part of switching instructions conforming to the new instruction set and a second section to store another part of the switching instructions conforming to the legacy instruction set. | 2009-04-16 |
20090100251 | PARALLEL CONTEXT ADAPTIVE BINARY ARITHMETIC CODING - A method for performing parallel processing of at least two bins in an arithmetic coded bin stream includes: utilizing a current range to calculate a range for a first bin in the bin stream; simultaneously utilizing the current range to forward predict a plurality of possible ranges and low values for a second bin in the bin stream when the first bin is an MPS; when the range for the first bin is calculated, utilizing the calculated range to select a resultant range from the plurality of possible ranges and low values for the second bin. | 2009-04-16 |
20090100252 | VECTOR PROCESSING SYSTEM - A vector processing system for executing vector instructions, each instruction defining multiple pairs of values, an operation to be executed on each of said value pairs and a scalar modifier, the vector processing system comprising a plurality of parallel processing units, each arranged to receive one of said pairs of values and to implement the defined operation on said value pair to generate a respective result; and a scalar result unit for receiving the results of the parallel processing units and for using said results in a manner defined by the scalar modifier to generate a single output value for said instruction. | 2009-04-16 |
20090100253 | METHODS FOR PERFORMING EXTENDED TABLE LOOKUPS - A permutation instruction generates vector elements for a destination register using identified source and destination registers. A plurality of partial table lookups corresponding to an extended table produces a plurality of intermediate results. At least one source register stores a plurality of index values corresponding to the extended table. Out-of-range index values are values that are not contained in at least one additional source register and result in a predetermined constant value being stored into a predetermined vector element of the destination register. The index values are adjusted between the partial table lookups. A final result is formed by performing a logic function with the plurality of intermediate results. The final result is thereby formed without a full table lookup of each element of the final result. | 2009-04-16 |
20090100254 | DEBUG INSTRUCTION FOR USE IN A DATA PROCESSING SYSTEM - A method includes providing a debug instruction and providing a debug control register field, where if the debug control register field has a first value, the debug instruction executes a debug operation and where if the debug control register field has a second value, the debug instruction is to be executed as a no-operation (NOP) instruction. A data processing system includes instruction fetch circuitry for receiving a debug instruction, a debug control register field, and debug execution control circuitry for controlling execution of the debug instruction in a first manner if the debug control register field has a first value and in a second manner if the debug control register field has a second value, where in the first manner a debug operation is performed and in the second manner no debug operation is performed. | 2009-04-16 |
20090100255 | Guaranteed core access in a multiple core processing system - Exclusive access to a core or part of a core, or to multiple cores, but in any case less than all of the cores, of a multiple core processing system. The access can be requested by an instruction, or by a routine. Once granted, the access provides exclusive access to the core so that a program can be run which requires substantially uninterrupted access to the core. | 2009-04-16 |
20090100256 | Device and Method for Device Configuration - A device and method is used to configure devices. The device includes a memory storing scheduling data and configuration data. The device also includes at least one selectively configurable device component, wherein the device configures the at least one component as a function of the scheduling data and the configuration data. The method includes the steps of receiving scheduling data and storing the scheduling data along with configuration data on a memory of a device. The method also includes the step of selectively configuring a component of the device, wherein the configuration is a function of the scheduling data and the configuration data. | 2009-04-16 |
20090100257 | Framework for Dynamic Configuration of Hardware Resources - Among other things, dynamically selecting or configuring one or more hardware resources to render a particular display data includes obtaining a request for rendering display data. The request includes a specification describing a desired rendering process. Based on the specification and the display data, hardware is selected or configured. The display data is rendered using the selected or configured hardware. | 2009-04-16 |
20090100258 | Mobile terminal aware of external device and control method for the same - A mobile terminal controlling an external device according to its type and a control method for the same are disclosed. The mobile terminal can automatically initiate battery charging or communication according to the type of an attached external device. The external device can be, for example, a charger or storage device. When a charger is attached, the mobile terminal automatically performs battery charging using the charger. When an external storage device is attached, the mobile terminal automatically performs serial communication with the external storage device. | 2009-04-16 |
20090100259 | MANAGEMENT NETWORK SECURITY FRAMEWORK AND ITS INFORMATION PROCESSING METHOD - A management network security framework and its information processing method are disclosed. The management network security framework under the present disclosure includes a management station and a managed device. The method under the present disclosure includes: a secure transfer channel is established between the management station and the managed device; the managed device authenticates the management station; and information is exchanged between the management station and the managed device through the secure transfer channel. The embodiment of the present disclosure combines the AAA system, the upper-layer management protocol and the lower-layer security protocol organically. | 2009-04-16 |
20090100260 | Location source authentication - A method and system to validate the source of the location data, such that access to location based service is protected based on a location. When the source of the location data is verified, an authentication, and/or a temporary key pair are generated for the computational device to successfully get the location based service. Moreover, the Location Based Service is assured of providing service to the computational device only at the authorized location. A method and system for managing access to the location based service is also disclosed. A request is received to authenticate the source of the location either by the computational device or by the location based service provider. Access to the location based service is granted when the location is an authorized location. Once access is granted, the temporary key pair is used for successful transactions. Moreover, the validity of the location source is constantly validated by expiring the temporary key pair with time duration. | 2009-04-16 |
20090100261 | METHOD AND SYSTEM FOR MEDIATION OF AUTHENTICATION WITHIN A COMMUNICATION NETWORK - A method, a system, and a computer software product provide mediation of authentication within a communication network. The method comprises the steps of sending a request to mediate authentication between a first node | 2009-04-16 |
20090100262 | APPARATUS AND METHOD FOR DETECTING DUPLICATION OF PORTABLE SUBSCRIBER STATION IN PORTABLE INTERNET SYSTEM - An apparatus and method for detecting duplication of a portable subscriber station (PSS) in a portable Internet system are provided. A master key of a PSS and a master key of an AAA server are identically updated whenever the PSS succeeds in authentication. It is possible to determine whether the PSS is duplicated or not by comparing the master key of the PSS with the master key of the AAA server during an authentication procedure. In addition, it is possible to find out whether duplication for the corresponding PSS is made by a user's own volition or by a third party by additionally performing an authentication procedure which requires an input of a password for a PSS which is doubted as duplicated. | 2009-04-16 |
20090100263 | METHODS AND SYSTEMS FOR ENCOURAGING SECURE COMMUNICATIONS - Embodiments of the present invention enable a user to engage in secure communications using digital certificates and other cryptographic technologies in an easy way with a minimum of distracting interaction. In some embodiments of the present invention, webmail is enabled to allow users to obtain and use S/MIME certificates to secure his or her e-mails. Embodiments of the present invention can also be implemented to other forms of messaging, such as text messages, instant messages, etc. | 2009-04-16 |
20090100264 | COMMUNICATION DEVICE AND COMMUNICATION SYSTEM - A communication device is secure against an impersonation attack as well. The communication device secretly communicates, with an external device, target data with use of a key shared with the external device. Without being known to a third party, the communication device generates a key shared with the external device using a scheme of which security is proved. Validity of the external device is determined by authentication with use of a key dependent function that is shared with the external device and is dependent on the shared key. If the external device is determined to be valid, for secretly communicating the target data, verification data for verifying validity of the target data is generated from the target data with use of the key dependent function. | 2009-04-16 |
20090100265 | Communication System and Authentication Card - One of the objects of the present invention is to provide a communication system in which biometrics can be utilized without leaking to a third person so that a strict personal authentication can be conducted. The communication system includes, storing a correspondence table in a card, storing a reference password which is formed by converting a part of biometrics of an authorized user in the card by using the correspondence table, reading a part of biometrics of a user by the card, converting a part of the biometrics of the user into a password by the card using the correspondence table, and checking the password against the reference password by the card, wherein the card and the user are authenticated if a the password and the reference password match in the step of checking. | 2009-04-16 |
20090100266 | SERVICE PROVISION SYSTEM AND COMMUNICATION TERMINAL - A first memory unit is arranged outside a block that is under security control. The block includes: a second memory unit; an acquisition unit for acquiring biological information on a living body from a captured image of a location of the living body; an encryption unit for encrypting attribute information with an encryption key; a registration unit for registering encrypted attribute information encrypted by the encryption unit into the first memory unit, and registering the biological information and the encryption key into the second memory unit; and a presentation unit for decrypting the encrypted attribute information with the encryption key and presenting the attribute information decrypted to the service provision server if the biological information registered in the second memory unit and biological information acquired by the acquisition unit coincide with each other. | 2009-04-16 |
20090100267 | Signatures with confidential message recovery - A portion of the signed message in an ECPVS is kept truly confidential by dividing the message being signed into at least three parts, wherein one portion is visible, another portion is recoverable by any entity and carries the necessary redundancy for verification, and at least one additional portion is kept confidential. The additional portion is kept confidential by encrypting such portion using a key generated from information specific to that verifying entity. In this way, any entity with access to the signer's public key can verify the signature by checking for a specific characteristic, such as a certain amount of redundancy in the one recovered portion, but cannot recover the confidential portion, only the specific entity can do so. Message recovery is also provided in an elliptic curve signature using a modification of the well analyzed ECDSA signing equation instead of, e.g. the Schnorr equation used in traditional PV signature schemes. | 2009-04-16 |
20090100268 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 2009-04-16 |
20090100269 | BIOMETRIC AUTHENTICATION METHOD, COMPUTER PROGRAM, AUTHENTICATION SERVER, CORRESPONDING TERMINAL AND PORTABLE OBJECT - A biometric authentication method and apparatus are provided. A user to be authenticated uses a portable object including at least one biometric sensor. The portable object is adapted to cooperate with a terminal. The method includes: capturing, by the portable object, a biometric sample to be compared coming from the user to be authenticated; transmitting, by the portable object, the biometric sample, in a secure form to an authentication server; and determining, by the authentication server, a signature to be authenticated using said biometric sample, then comparing the signature with a reference signature. | 2009-04-16 |
20090100270 | BIOMETRIC AUTHENTICATION FOR REMOTE INITIATION OF ACTIONS AND SERVICES - In one aspect, the invention relates to generating a trusted communication channel with a client. An agent module is provided at the client along with a task set including one or more tasks. One or more client components needed to complete each of the tasks of the task set is determined, and it is further determined whether each of the needed client components is trustworthy. An equivalent component for components determined to be untrustworthy may be provided. | 2009-04-16 |
20090100271 | Counterfeit Prevention System based on Random Processes and Cryptography - A first portion of a label is formed using a chaotic process that cannot be controlled and forms a portion of the label using the chaotic information. A prospective counterfeiter cannot control the first portion of the label, and hence can only form a different random portion. A private encryption key is used to encrypt information indicative of the random portion. That encrypted information is placed on the same label. That encrypted information can be decrypted by a user using a public key, and compared with the random portion. If they agree, then the label is genuine, and the product has not been counterfeited. Since the random information cannot be replicated exactly, there is no way to copy this label and its encrypted portion exactly onto another product or label. | 2009-04-16 |
20090100272 | ANTI-ROLL-BACK MECHANISM FOR COUNTER - A method of maintaining a version counter indicative of a version of memory content stored in a processing device. The method comprises selectively operating the device in a first or second mode. Access to the first mode is limited to authorised users and controlled separately from access to the second mode. In the first mode at least an initial integrity protection value is generated for cryptographically protecting an initial counter value of said version counter during operation of the processing device in the second mode; wherein the initial counter value is selected from a sequence of counter values, and the initial integrity protection value is stored as a current integrity protection value in a storage medium. In the second mode, a current counter value is incremented to a subsequent counter value; wherein incrementing includes removing the current integrity protection value from said storage medium. | 2009-04-16 |
20090100273 | PREVENT DATA STORAGE DEVICE CIRCUITRY SWAP - A device comprises a data storage media storing data content and a digital signature. At least a portion of the digital signature is encrypted on the data storage media. The device also includes a removable control circuitry including a unique key. If the unique key corresponds to the encrypted portion of the digital signature, the removable control circuitry allows access to the data content. If the unique key does not correspond to the encrypted portion of the digital signature, the removable control circuitry prevents access to the data content. Embodiments of the invention may be useful to prevent a user from accessing the data content without the original control circuitry used to write the data content. For example, embodiments of the invention may prevent a user from using a different control circuitry that would readily allow unauthorized copying and distribution of the data content. | 2009-04-16 |
20090100274 | SYSTEM AND METHOD FOR IMPLEMENTING FAIRNESS IN THE POWERING OF COMPUTING DEVICES IN A POWER OVER ETHERNET APPLICATION - A system and method for implementing fairness in the powering of computing devices in a power over Ethernet (PoE) application. Power supplies in a power sourcing equipment are often oversubscribed. This oversubscription can lead to starvation of certain computing devices that have power requests that are not granted relative to competing requests. A fairness consideration can be implemented to ensure that starvation conditions are avoided. | 2009-04-16 |
20090100275 | Dynamic port power allocation apparatus and methods - Methods and apparatus for dynamically adjusting the amount of power (or current) distributed to one or more connected devices via electrical interfaces. In one embodiment, the apparatus comprises a first module adapted to detect current drawn by a first set of ports, and a second module adapted to adjust the current provided to a second set of ports based on the detected current. The second module is also optionally adapted to distribute unreserved current among the devices according to an allocation protocol. In the exemplary context of a plurality of interconnected serial bus devices, the invention enables a device to draw more current than that required to be reserved for that device (such as to comply with a specification such as USB), yet without increasing the total amount of power which must be dedicated to the serial ports as a whole. Power supply efficiency may also be advantageously optimized. | 2009-04-16 |
20090100276 | SYSTEM AND METHOD FOR CONTROLLING VOLTAGE LEVEL AND CLOCK FREQUENCY SUPPLIED TO A SYSTEM - A system that includes at least one component adapted to execute at least one application, characterized by including a controller adapted to receive at least one load indication of at least one component of the system and to selectively alter at least one control parameter of a voltage and clock frequency management scheme; whereas the system is adapted to apply the voltage and clock frequency management scheme. A method for controlling voltage level and clock frequency supplied to a system, the method includes receiving at least one load indication of at least one component of the system; characterized repeating the stages of: selectively altering at least one control parameter of a voltage and clock frequency management scheme; and applying the voltage and clock frequency management scheme. | 2009-04-16 |
20090100277 | Electrical power sharing circuit - An electrical power sharing circuit applied in a computer system includes first and second sense units and first and second control units. The first and second sense units are electrically connected to a central processing unit (CPU) and a graphical processing unit (GPU) of the computer system and thus generate first and second sense values, respectively. The first control unit is electrically connected to the first and second sense units, the CPU and the GPU and receives the first and second sense values. The second control unit is electrically connected to the first and second sense units and the first control unit, receives the first and second sense values and provides a reference value to the first control unit. The first control unit controls performances of the CPU and the GPU according to the reference value. | 2009-04-16 |
20090100278 | Method and Apparatus for Managing Power Consumption Relating to a Differential Serial Communication Link - Briefly, a method, apparatus and system for managing power corresponding to a differential serial communication link that has a link width defined for example by one or more lanes wherein the lanes are adapted to communicate clock recovery information in a data stream, determines, during normal operating conditions, such as conditions other than power on, reset or link fault conditions, a desired link width for the serial communication link and then changes the link width accordingly. | 2009-04-16 |
20090100279 | COMPUTER PROVIDING MOTION PICTURE MODE AND METHOD OF SETTING UP SYSTEM-MODE WHILE PLAYING MOTION PICTURES - The present invention relates to a computer providing a motion picture mode including at least one storage unit configured to store system state information when the computer enters the motion picture mode and to store motion picture data, the storage unit including a random access memory (RAM) and a hard disk drive (HDD), a graphic processing unit configured to process image data and to display processed data on a screen, an audio outputting unit configured to process and output audio signals, and a control unit configured to control modules included in the computer and a system mode of the computer. The control unit is configured to determine whether conditions for entering the motion picture mode have been satisfied, and to change the system mode to the motion picture mode if the conditions for the motion picture mode are satisfied. | 2009-04-16 |
20090100280 | METHOD AND SYSTEM FOR IMPROVING PCI-E L1 ASPM EXIT LATENCY - The disclosed systems and methods relate to improving PCI Express (PCI-E) L1 Active State Power Management (ASPM) exit latency by speculatively initiating early L1 exit based on a network stimulus. Aspects of the present invention may enable a higher level of performance and responsiveness while supporting the benefits of ASPM. Aspects of the present invention may minimize operational cost by reducing latency in processes that utilize a PCI-E interface. Aspects of the present invention may be embodied in a Network Interface Controller (NIC) or any other device with a PCI-E interface that supports ASPM. | 2009-04-16 |
20090100281 | COMMUNICATION DEVICE AND COMMUNICATION METHOD - A communication method includes transmitting a first transition notification of a sleep mode to make allotment of a channel time unnecessary to a first host, and communicating first data to a second host in a first transition state which the first host transits to the sleep mode. | 2009-04-16 |
20090100282 | METHOD AND APPARATUS FOR DETECTING COMPONENT REMOVAL WHILE OPERATING IN A BATTERY BACKUP MODE - A method to detect component removal while operating in a battery backup mode, comprising providing power from a battery backup unit (“BBU”) to a control card memory device, and measuring the current drawn by the control card memory device. If the current drawn by the control card memory device is less than or equals a pre-determined disconnect current, the method determines if a BBU release pin has been asserted. If the BBU release pin has been asserted, the method encodes in an event log a battery backup removal event. If the BBU release pin has not been asserted, the method encodes in the event log a control card removal event. | 2009-04-16 |
20090100283 | Method for switching between two redundant oscillator signals within an alignment element - A method for switching between two oscillator signals within an alignment element, wherein one of the two oscillator signals one is selected as a first master signal in order to provide an output stepping signal at an output of the alignment element. Said method comprises the steps of:
| 2009-04-16 |
20090100284 | System and Method for Synchronizing Redundant Data In A Storage Array - Systems and methods for synchronizing redundant data in a storage array are disclosed. In accordance with a method, a pointer indicating the amount of data synchronized between a first storage resource to a second storage resource may be maintained and a power event may be detected. In response to the detection of the power event, an attempt may be made to flush a write cache associated with the second storage resource to transfer data from the write cache to a non-volatile storage area of the second storage resource. A determination may be made whether the attempt to flush the write cache is successful. In response to determining that the attempt to flush the write cache is successful, a flag may be set to indicate that the pointer accurately indicates the amount of data mirrored from the first storage resource to the non-volatile storage area of the second storage resource. | 2009-04-16 |
20090100285 | Internal Clock Signal Generating Circuits Including Frequency Division and Phase Control and Related Methods, Systems, and Devices - An integrated circuit device may include a main clock signal input pad configured to receive a main clock signal having a main clock frequency, a high speed clock signal input pad configured to receive a high speed clock signal having a high speed clock frequency greater than the main clock frequency, a frequency divider, and a phase controller. The frequency divider may be configured to generate a plurality of preliminary internal clock signals responsive to the high speed clock signal wherein each of the preliminary internal clock signals has the same main clock frequency and a different phase. The phase controller may be configured to select one of the preliminary internal clock signals having a phase most closely matched with a phase of the main clock signal, and to translate the preliminary internal clock signals to internal clock signals so that the preliminary internal clock signal having the phase most closely matched with the phase of the main clock signal is translated as a primary internal clock signal, so that the internal clock signals have the main clock frequency. Related methods, systems, and devices are also discussed. | 2009-04-16 |
20090100286 | METHODS AND DEVICES FOR TREATING AND PROCESSING DATA - A data processing unit having a field of clocked logic cells (PAEs) which is operable in different configuration states and a clock preselecting means for preselecting logic cell clocking. The clock preselecting means is designed in such a way that, depending on the state, a first clock is preselected at least at a first cell (PAE) and an additional clock is preselected at least at an additional cell. | 2009-04-16 |
20090100287 | Monitoring Apparatus and a Monitoring Method Thereof - A monitoring apparatus and a monitoring method thereof are disclosed. The monitoring apparatus is used to monitor a computer. The monitoring apparatus comprises a control unit, and a first non-volatile memory unit. If the computer has an abnormal operation before loading an operating system, the control unit is used to store an error code according to the abnormal operation in the first non-volatile memory unit and execute a recovery process according to the error code. | 2009-04-16 |
20090100288 | FAST SOFTWARE FAULT DETECTION AND NOTIFICATION TO A BACKUP UNIT - A method and system for quickly informing a backup unit that a primary unit has failed. Normally an exception handler is activated when a software failure occurs and network controller chips or the ASIC interface to a signal bus can operate even though there is a software failure. A software failure notification packet is programmed and stored in a location that is not affected by a software system failure. When a software failure occurs, control is shifted to the exception handler. The exception handler sends a pre-established and pre-addressed packet to the network controller card which transmits this packet to the backup unit. Upon receipt of the packet, the backup unit goes into operation. In some alternate embodiments that include multiple line cards in a single unit, the exception handler sends a signal to a backup unit via a signal bus or a data bus. | 2009-04-16 |
20090100289 | Method and System for Handling Failover in a Distributed Environment that Uses Session Affinity - In response to detecting a failed server, subscription message processing of a failover server is stopped. A subscription queue of the failed server is opened. A marker message is published to all subscribers of a particular messaging topic. The marker message includes an identification of the failover server managing the subscription queue of the failed server. Messages within the subscription queue of the failed server are processed. In response to determining that a message in the subscription queue of the failed server is the marker message, the subscription queue of the failed server is closed. Then, the failover server resumes processing of its original subscription queue looking for the marker message, while processing yet unseen messages from the queue. Once the marker message is found in the original subscription queue, normal operation is resumed. | 2009-04-16 |
20090100290 | MEMORY CONTROLLER, NONVOLATILE MEMORY DEVICE, NONVOLATILE MEMORY SYSTEM, AND DATA WRITING METHOD - A nonvolatile memory device comprises a nonvolatile memory and a memory controller. The nonvolatile memory includes the same memory cells striding over a plurality of pages. A page information instruction part has the page structure information of the nonvolatile memory. According to this information, a related page identification part identifies a page (related page) in which the data may change. The relation data stored in the related page are temporarily stored into a save memory before an error occurs, and if an error exists, these relation data are used to repair the data that have changed. By this method, in a memory device using a nonvolatile memory including the same memory cells striding over a plurality of pages, even if an error occurs during data writing, the error is repaired and the reliability can be ensured. | 2009-04-16 |
20090100291 | MEMORY DEVICE AND METHOD FOR REPAIRING A SEMICONDUCTOR MEMORY - A block repair device is used in a Dynamic Random Access Memory (DRAM) having a primary array with a defective cell and a redundant array with a redundant row. The block repair device stores a block repair configuration that determines the dimensions (e.g., the number of rows and columns spanned) of a repair block. Routing circuitry is configured by the stored block repair configuration to output some row and column address bits from received row and column addresses in a selected ratio. Comparison circuitry compares the row and column address bits output by the routing circuitry with the address of the defective cell that defines the repair block. When a match occurs, the comparison circuitry implements a block repair by activating the redundant row and by causing data to be written to or read from the activated redundant row instead of the primary array. | 2009-04-16 |
20090100292 | Method and Device for Monitoring the Functionality of an Automation System of a Plant - There is described a method for monitoring the functionality of an automation system of a plant comprising at least one main processor, parts of the plant being monitored and controlled using a user software, which is constructed of a number of program modules and which is run on the main processor. A co-processor is assigned to the main processor, and a message is transmitted from the main processor to the co-processor. When received, this message is used by the co-processor to start a monitoring time. When a subsequent message is received, this monitoring time is reset before said monitoring time has elapsed, otherwise a fault is identified once the monitoring time has elapsed. | 2009-04-16 |
20090100293 | METHOD AND SYSTEM FOR PREDICTING TURBOMACHINERY FAILURE EVENTS EMPLOYING GENETIC ALGORITHM - A method for predicting or detecting an event in turbomachinery includes the steps of obtaining operational data from at least one machine and at least one peer machine. The operational data comprises a plurality of performance metrics. A genetic algorithm (GA) analyzes the operational data, and generates a plurality of clauses, which are used to characterize the operational data. The clauses are evaluated as being either “true” or “false”. A fitness function identifies a fitness value for each of the clauses. A perturbation is applied to selected clauses to create additional clauses, which are then added to the clauses group. The steps of applying a fitness function, selecting a plurality of clauses, and applying a perturbation can be repeated until a predetermined fitness value is reached. The selected clauses are then applied to the operational data from the machine to detect or predict a past, present or future event. | 2009-04-16 |
20090100294 | System and Method for Path Saturation for Computer Storage Performance Analysis - A system and method for path saturation in a storage area network so that the throughput of the storage area network may be determined. The system and method includes a software utility suite that uses either a system administration scripting language, e.g., Perl or Korn shell, or by compiled or machine language software. The software utility suite includes a set of software tools to be installed on one or more computer systems sharing access to a data storage system, such as a storage area network (SAN). The software tools running on these separate computer systems communicate and collaborate in a peer-to-peer fashion in order to coordinate loading, testing and measurement of storage throughput on the shared data storage system. The software tools further coordinate the collection, storage and presentation of results data obtained through such loading, testing and measurement of the storage throughput of the shared data storage system. | 2009-04-16 |
20090100295 | RELIABLE MEMORY MODULE TESTING AND MANUFACTURING METHOD - A method of testing memory modules comprising jumping through all addressable memory blocks a first and second time is disclosed. Each jumped-to address is determined by first XORing the last two bits of the previous address, and then XORing the first result with a bit representation of the previous jump direction for a second result. The second result determines the direction of the next jump, either upwards or downwards. Each jumped-to address is XORed with its contents, and the result is written to the address. For initially empty and defect-free memory, this results in all 1 values written for the first time jumping, and all 0 values written for the second time jumping. Finally, after the second time jumping, all addressable memory values are checked, and any non-0 value addresses are identified as defective memory cells. | 2009-04-16 |
20090100296 | System and method for verifying the transmit path of an input/output component - A system and method for verifying the transmit path of an input/output device such as a network interface circuit. The device's operation with various different input sources (e.g., hosts, input buses) and output sources (e.g., output buses, networks) is modeled in a verification layer that employs multiple queues to simulate receipt of input data, submission to an output port and transmission from the device. Call backs are employed to signal completion of events related to receipt of data at the device and modeling of data processing within the verification layer. As call backs are resolved, corresponding tasks are executed to advance the processing of the data through the verification layer. A device-specific algorithm is executed in the verification layer to predict the ordering of output from the device, and that output is compared to the predicted output by a transmission checker. | 2009-04-16 |
20090100297 | System and method for verifying the receive path of an input/output component - A system and method for verifying the receive path of an input/output device such as a network interface circuit. The device's operation with various different input sources (e.g., networks) and output sources (e.g., hosts, host buses) is modeled in a verification layer that employs multiple queues to simulate receipt of packets, calculation of destination addresses and storage of the packet data by the device. Call backs are employed to signal completion of events related to storage of packet data by the device and modeling of data processing within the verification layer. Processing of tokens within the verification layer to mimic the device's processing of corresponding packets is performed according to a dynamic DMA policy modeled on the device's policy. The policy is dynamic and can be updated or replaced during verification without interrupting the verification process. | 2009-04-16 |
20090100298 | System and method for tracing cable interconnections between multiple systems - Techniques to ascertain physical cabling connections of electronic systems are provided for situations where there are numerous systems interconnected by a very large number of electrical or optical cables. A cable identifying code is inserted into a message sent from a local endpoint system to remote endpoint system over the identified cable. Each intermediate system that is in the interconnection path between the two endpoint systems of interest appends its code for the cable connected to the I/O port from which the message will egress that system and be sent to the next system along the path. The remote endpoint system receives the message which now contains codes for all the cables transited along the path, extract the codes, and thereby determines the exact cabling used in the interconnection of the two endpoint systems. | 2009-04-16 |
20090100299 | Methods and Apparatus for Patternizing Device Responses - A device response template generator software program includes an interactive graphical-user-interface (GUI) for sending commands to devices under test and to capture and display the command responses. The GUI enables patternization of the command response to that the information contained in the response can be read, in the form of variable values, automatically, during subsequent execution of the commands by the same device or a group of devices. These values of the variables may be analyzed and may also be sent to other running testing scenarios. | 2009-04-16 |
20090100300 | METHOD AND APPARATUS FOR INTERLEAVING DATA IN A MOBILE COMMUNICATION SYSTEM - An interleaving method to which time-first-mapping is applied for a plurality of channel-coded and rate-matched code blocks considering a modulation scheme in a mobile communication system is provided. The interleaving method includes determining sizes of a horizontal area and a vertical area of an interleaver memory, selecting a defined number of adjacent coded symbols in a same code block according to a modulation scheme, generating modulation groups in a vertical direction, sequentially writing the modulation groups in the horizontal area on a row-by-row basis, and sequentially reading the symbols written in the interleaver memory on a column-by-column basis. | 2009-04-16 |
20090100301 | RECEPTION DEVICE, RECEPTION METHOD, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM - A reception device configured to receive a signal of a transmitted bit string transmitted from a transmission device which transmits a bit string includes: a receiving unit arranged to receive a signal from the transmission device and output a received bit string corresponding to the transmitted bit string; a storing unit arranged to store an error rate table wherein said received bit string is correlated with an error rate of post-data which is data of one bit or greater received following the received bit string being in error; and an error correcting unit arranged to perform error correcting of the post-data of the received bit string. | 2009-04-16 |
20090100302 | APPARATUS AND METHOD FOR DISK READ CHECKING - An apparatus and method for controlling a disk drive is provided. A disk lubricant sweep component for periodically initiates a disk lubricant spreading action. A disk data read check component checks data at one or more LBAs during the disk lubricant sweep. The apparatus may cache data from LBAs that have been checked by the disk data read check component and found correct and record LBAs that have been found correct, so that they can be omitted from subsequent operation of the read check component. The apparatus may further comprise an error checking and correcting component for checking and correcting data found incorrect by reason of a soft error, and an error reporting component for reporting on one or more LBAs that have been checked and found incorrect by reason of a hard error. | 2009-04-16 |
20090100303 | Adjustable test pattern results latency - A digital test instrument and a test method provide adjustable results latency. A digital test instrument includes a pattern controller configured to generate a sequence of test patterns, responsive, at least in part, to a pass/fail result, a pattern memory configured to supply the generated sequence of test patterns to a unit under test, a pattern results collection unit configured to receive at least one result value from the unit under test and to determine a pass/fail result for at least one supplied test pattern, and a synchronization unit configured to provide a no-result indication to the pattern controller during a preset number of pattern cycles following the start of a test, the preset number of pattern cycles based on a results latency of the test instrument, and to provide pass/fail results to the pattern controller after the preset number of pattern cycles. | 2009-04-16 |
20090100304 | Hardware and Software Co-test Method for FPGA - A hardware and software co-test method for FPGA comprises the following steps of: setting up a HW/SW co-test system comprising a PC, a software part, HW/SW communication modules, a hardware accelerator for testing a DUT FPGA which is mapped with a configuration file of DUT; predefining a table of test vectors for FPGA by software part in PC; generating configuration files based on the tables of test vector for I/O module, CLB and routing matrix, and then sending the configuration file into DUT FPGA to configure the FPGA; testing DUT FPGA in terms of the tables of test vector for lo I/O module, CLB and routing matrix, and returning results to the software part; and comparing the test results with expected data in the software part, generating a test report, and during the above steps, the error cells in the FPGA are capable of being automatically positioned. | 2009-04-16 |
20090100305 | REPROGRAMMABLE BUILT-IN-SELF-TEST INTEGRATED CIRCUIT AND TEST METHOD FOR THE SAME - The present invention discloses a reprogrammable built-in-self-test integrated circuit and a test method for the same, wherein test programs are directly stored in the application program memory of the logic chip of a SoC IC, and an external test apparatus is used to load the test programs into the application program memory via a serial transmission interface, and an application CPU is used to read and execute the test programs to perform the bonding-wire connectivity between the logic chip and the memory chip. In the present invention, test vectors can still be flexibly revised after tapeout to increase test coverage. As the test programs are directly stored in the existing application program memory without using additional memory space, and as the test programs are executed by the existing application CPU without using an extra built-in-self-test circuit, the present invention can effectively reduce test cost. | 2009-04-16 |
20090100306 | ELECTRONIC UNIT | 2009-04-16 |
20090100307 | SYSTEMS AND METHODS FOR PROVIDING NONVOLATILE MEMORY MANAGEMENT IN WIRELESS PHONES - The present invention is related to memory management, and in particular, to methods and systems for accessing and managing nonvolatile, such as in a wireless phone. A wireless phone memory controller is disclosed that, comprises a first interface circuit configured to be coupled to wireless phone nonvolatile memory, a second interface circuit configured to be coupled to wireless phone volatile memory, a first processor interface configured to be coupled to a first wireless phone processor, wherein the first processor interface is configured to provide the first processor with access to the wireless phone volatile memory, a second processor interface configured to be coupled to a second wireless phone processor, and a controller circuit configured to copy at least a portion of wireless phone nonvolatile memory data to the wireless phone volatile memory. | 2009-04-16 |
20090100308 | DIGITAL VOICE COMMUNICATION METHOD AND DIGITAL VOICE COMMUNICATION APPARTUS - The present invention provides a digital voice communication apparatus and method capable of suppressing noise even when error data has occurred in digital voice communications. A data receiving unit divides received data into ADPCM frame data and outputs the same together with frame error information about an error of each ADPCM frame data. A G. 726 decoder performs decoding defined in G. 726 of the ITU-T recommendation to convert the ADPCM frame data to PCM system-based data and outputs the same data to a Claw error correction processing unit. When no error is contained in the frame data, the μ-law error correction processing unit outputs the inputted frame data to a G. 711 decoder as it is. When the error is contained in the frame data, the μ-law error correction processing unit sets a substitution range, based on maximum and minimum values of normal frame data located immediately before the frame data and substitutes the error-contained frame data with data lying within the substitution range. | 2009-04-16 |
20090100309 | METHODS AND DEVICES FOR ENCODING DATA IN COMMUNICATION SYSTEMS - Methods and apparatuses for encoding data in a wireless communication system including receiving an information sequence, and encoding the received information sequence to generate three subblocks of sequences. A first subblock of the three subblocks is the information sequence, a second subblock of the three subblocks is an encoded sequence, and a third subblock of the three subblocks is an interleaved and encoded sequence. The method further includes permuting the three subblocks of encoded sequences separately by subblock permutation, and continuously mapping the three subblocks into a circular buffer, the circular buffer including a first part, a second part, and a third part. Further, the method includes bit-selecting bits from the circular buffer, in a circular order corresponding to the first part, the second part, and the third part, to generate a first redundancy version and a second redundancy version, wherein bit-selection for a first redundancy version of the plurality of redundancy versions begins at a first position in the circular buffer, bit-selection for each successive redundancy version of the plurality of redundancy versions begins after a last position in the circular buffer corresponding to a previous redundancy version, and wherein, when a complete codeword is selected, bit-selection is offset from the first position by a fixed number of bits X. Finally, the method includes transmitting at least one redundancy version of the plurality of redundancy versions to at least one receiving device. | 2009-04-16 |
20090100310 | Apparatus and method for hybrid automatic repeat request (HARQ) in wireless communication system - An apparatus and a method for Hybrid Automatic Repeat reQuest (HARQ) in a wireless communication system are provided. A receiver includes a Media Access Control (MAC) layer part for error-checking each MAC Packet Data Units (PDUs) extracted from a physical layer burst, and generating HARQ combination control information according to a result of the error check; a receiving part for receiving a retransmit burst; and a combiner for selecting one or more Forward Error Correction (FEC) blocks from the retransmit burst according to the HARQ combination control information, and HARQ-combining the selected one or more FEC blocks. | 2009-04-16 |
20090100311 | Method of Constructing Low Density Parity Check Code, Method of Decoding the Same and Transmission System For the Same - The present invention relates to a method of constructing a low density Parity Check code, a method of decoding the same and a transmission system using the same. The method comprises steps of: constructing a low density Parity Check matrix of the low density Parity Check code by using a fixed pattern; blocking data sent from an information source ( | 2009-04-16 |
20090100312 | APPARATUS AND METHOD FOR DECODING LOW-DENSITY PARITY CHECK CODE - There is provided with a decoding apparatus for decoding a low-density parity check code defined by a parity check matrix, includes: a first operation unit configured to carry out a row operation for each row of the parity check matrix; a calculation unit configured to calculate a reliability coefficient with respect to establishment of a parity check equation defined by said each row, respectively; a second operation unit configured to carry out a column operation for said each row; and a controller configured to iteratively execute one set which includes respective processing by the first operation unit, the calculation unit and the second operation unit and omit the processing by the first operation unit and the calculation unit for a row for which the reliability coefficient has satisfied a threshold. | 2009-04-16 |
20090100313 | METHODS AND APPARATUSES OF MATHEMATICAL PROCESSING - Disclosed is a pipelined iterative process and system. Data is received at an input port and is processed in a symbolwise fashion. Processing of each symbol is performed other than relying on completing the processing of an immediately preceding symbol such that operation of the system or process is independent of an order of the input symbols. | 2009-04-16 |
20090100314 | MODIFICATION OF ERROR STATISTICS BEHIND EQUALIZER TO IMPROVE INTER-WORKING WITH DIFFERENT FEC CODES - This invention relates to a receiver circuit which comprises an equalizer ( | 2009-04-16 |
20090100315 | METHODS AND APPARATUS FOR PROVIDING ERROR CORRECTION TO UNWRITTEN PAGES AND FOR IDENTIFYING UNWRITTEN PAGES IN FLASH MEMORY - Provided are methods for error correction coding (ECC) for flash memory pages which have been erased but have not been programmed. In one method, each ECC code word is bitwise inverted before being programmed into a page, and bitwise inverted again after being read back from the page before entering the decoder. Thus an unwritten page, whose bits are all ones when random errors are absent, appears to the decoder as all zeros, which form a valid code word(s) in linear block codes. In another method, in both page programming and page read, the parity section of each ECC code word is bitwise XORed with the complement of a parity calculated from a message whose bits are all ones. Thus an unwritten page appears to the decoder as a valid ECC code word(s) when random errors are absent. Further provided is an apparatus for determining after a page read whether or not the read page has been programmed by comparing the number of read code word symbols which do not have the default erased value and the maximum number of symbol errors correctable by the ECC. | 2009-04-16 |
20090100316 | METHOD AND APPARATUS FOR GENERATION AND USAGE OF EXTENDED GOLAY CODES - A wireless device comprises a code-assignment module configured for assigning Golay codes to be used for spreading, a spreading module configured for spreading data with the Golay codes to produce a signal, wherein the Golay codes are randomly used to spread the data, and a transmitter configured for transmitting the signal. The wireless device may transmit a first beacon signal via a set of quasi-omni beam patterns, and a second beacon signal via a set directional beam patterns. The first beacon signal has a first transmission rate that is higher than the second beacon signal's the transmission rate. Extended Golay codes having zero periodic cross-correlation may be generated from a Golay code and a set of short sequences. A data block transmitted by the wireless device may comprise Golay codes and data portions, wherein every data portion is between two Golay codes and every Golay code is between two data portions. | 2009-04-16 |
20090100317 | METHOD AND APPARATUS FOR SINGLE CARRIER AND OFDM SUB-BLOCK TRANSMISSION - A wireless device comprises a code-assignment module configured for assigning Golay codes to be used for spreading, a spreading module configured for spreading data with the Golay codes to produce a signal, wherein the Golay codes are randomly used to spread the data, and a transmitter configured for transmitting the signal. The wireless device may transmit a first beacon signal via a set of quasi-omni beam patterns, and a second beacon signal via a set directional beam patterns. The first beacon signal has a first transmission rate that is higher than the second beacon signal's the transmission rate. Extended Golay codes having zero periodic cross-correlation may be generated from a Golay code and a set of short sequences. A data block transmitted by the wireless device may comprise Golay codes and data portions, wherein every data portion is between two Golay codes and every Golay code is between two data portions. | 2009-04-16 |
20090100318 | Four-Stage Pipeline Based VDSL2 Viterbi Decoder - A novel method to divide the whole decoding process of the Viterbi decoder into four pipeline stages and the Viterbi decoder therefore. With an appropriate choice on the system clock, the invention trade-off the decoding speed with the hardware cost so that the designed Viterbi decoder is able to satisfy the decoding speed requirement for the highest speed profile in VDSL2 systems, 30 MHz profile. At the same time, with four-stage pipeline to just enough to meet the speed requirement, the hardware cost for the new designed Viterbi decoder is reduced compared with single-staged decoding. | 2009-04-16 |
20090100319 | Decoder using a memory for storing state metrics implementing a decoder trellis - A method for developing a circuit is disclosed. The method generally comprises the steps of (A) generating a solution space having a dimension for each of a plurality of parameters for the circuit, (B) evaluating a plurality of instances of the circuit in the solution space through a software simulation, (C) evaluating the instances through a hardware simulation, and (D) updating the instances in response to the software simulation and the hardware simulation to approach an optimum instance of the instances for the circuit. | 2009-04-16 |
20090100320 | END-TO-END CYCLIC REDUNDANCY CHECK PROTECTION FOR HIGH INTEGRITY FIBER TRANSFERS - A method, transceiver, and computer program storage product transfer data over fiber between a first transceiver and a second transceiver. The second transceiver is determined to support a high integrity cyclic redundancy check associated with substantially an entire data set in a Fibre Channel Protocol exchange between the first transceiver and the second transceiver. A last data frame in a plurality of data frames is formatted for communication to the second transceiver during the Fibre Channel Protocol exchange. The last data frame includes a plurality of data and at least one cyclic redundancy check field associated with the plurality data and at least one additional cyclic redundancy check field associated with the plurality of data frames. | 2009-04-16 |
20090100321 | UNIVERSAL CONTEXTUAL ACTIONS MENU ACROSS WINDOWS APPLICATIONS - A universal way of providing contextual actions on electronic business forms or rich documents in a consistent manner irrespective of the document format or its hosting application utilizes metadata along with the actual data that will invoke the same context menu in any application. Actions can be taken on the document or GUI data field regardless of the hosting application or the document format. This seamless behavior is provided through first provisioning the context data in the document or the GUI field as a hyperlink with a custom protocol. The contextual information available at predetermined places in the document is preserved during document format transformation or document transition. Second, providing relevant actions to the user in a consistent manner at the predetermined places in the document is accomplished by creating and registering a Protocol Handler that will be invoked when a user clicks on the hyperlink. | 2009-04-16 |
20090100322 | RETRIEVING DATA RELATING TO A WEB PAGE PRIOR TO INITIATING VIEWING OF THE WEB PAGE - Data is stored in a server database relating to the availability and/or technical requirements for accessing web pages accessible at specific URLs. When a user browses a web page that includes hyperlinks to one or more other pages, stored availability/technical requirements data is retrieved from the server database and presented to the user to enable the user to decide whether or not to attempt to access one or more of the hyperlinked pages. The stored data may be retrieved for all hyperlinks on a web page when the page is first presented to the user or may be retrieved for a particular hyperlink only when a user has tentatively selected the particular hyperlink by a user action such as hovering a pointer icon over the hyperlink. | 2009-04-16 |
20090100323 | LINK GENERATOR - A method of linking digital text based electronically stored documents to geographical spatial maps has the steps of compiling a group of digital text documents; and providing a link creator, the link creator generates hyperlinks in the digital text documents relating to a location or a structure and connecting the generated hyperlinks to geographic features or locations in a mapping application. The method further includes the step of identifying keywords or phrases in the digital text documents; creating a direct link between the keyword or phrase and the geographical location or feature on the map application and searching a keyword or phrase in the digital text documents to create a subset of documents containing the keyword linked to a geographical feature or location. The link generator has a computer generated hyperlink creator program for generating hyperlinks in digital text documents and connecting the hyperlink to geographic features and locations in digital mapping applications. | 2009-04-16 |
20090100324 | System and computer program product for copying and pasting displayed elements of a range of cells in an electronic spreadsheet - The present invention is directed to a method, system and computer program for copying and pasting, in an electronic multidimensional spreadsheet, displayed elements of a source range of cells onto a destination range of cells, the source range of cells including one or more elements displayed on a user interface and one or more hidden elements, the elements being contiguous and aligned along a given spreadsheet dimension. The method includes (A) detecting a command for copying at least one displayed element from a selected source range of cells onto a selected destination range of cells; (B) identifying the selected source range of cells; (C) identifying the at least one displayed element in the selected source range of cells; (D) identifying at least one hidden element in the selected source range of cells; (E) copying the displayed element and hidden element onto a temporary range of cells; and (F) copying the temporary range of cells onto the destination range of cells. | 2009-04-16 |
20090100325 | System and method in an electronic spreadsheet for copying and pasting displayed elements of a range of cells - The present invention is directed to a method, system and computer program for copying and pasting, in an electronic multidimensional spreadsheet, displayed elements of a source range of cells onto a destination range of cells, the source range of cells including one or more elements displayed on a user interface and one or more hidden elements, the elements being contiguous and aligned along a given spreadsheet dimension. The method includes (A) detecting a command for copying at least one displayed element from a selected source range of cells onto a selected destination range of cells; (B) identifying the selected source range of cells; (C) identifying the at least one displayed element in the selected source range of cells; (D) identifying at least one hidden element in the selected source range of cells; (E) copying the displayed element and hidden element onto a temporary range of cells; and (F) copying the temporary range of cells onto the destination range of cells. | 2009-04-16 |
20090100326 | SYSTEM AND METHOD FOR AUTOMATED FORM COMPLETION - The invention enables automated form completion and comprises a combination of a graphical user interface, a database, one or more forms, a logic engine, and operational protocol. After a user's information is collected, the logic engine automatically creates an FDF file of the completed form, which may be sent electronically to predetermined recipients. | 2009-04-16 |
20090100327 | DOCUMENT INFORMATION PROCESSING APPARATUS AND DOCUMENT INFORMATION PROCESSING PROGRAM - A document information processing apparatus is obtained in which there is no need to provide the consistency of management between the instances of documents and their metadata, that is, there is no fear that inconsistency in management might be caused, thereby eliminating the possibility of loading the system, which would otherwise result from the provision of managerial consistency, as well as making it possible to improve their versatility. The apparatus includes a document input and output section that is able to at least input or output a document as an image data, an operation timing detection section that detects predetermined operation timing for the document, a metadata acquisition section that acquires metadata of the document based on the operation timing, and a metadata description section that describes the metadata in a predetermined format based on instance data of the document at predetermined timing with respect to the input or output of the document. | 2009-04-16 |
20090100328 | METHOD FOR OBTAINING ACCESSIBILITY INFORMATION, COMPUTER PROGRAM AND ACCESSIBILITY INFORMATION DEVICE - A method for obtaining accessibility information in a content of a rich internet application and a computer program and an accessibility information device. The method for obtaining accessibility information includes the steps of executing an object of the content displayed on a display screen, estimating a role of the object using reference model information prepared beforehand concerning a plurality of objects, and outputting the estimated role of the object as the accessibility information. | 2009-04-16 |
20090100329 | Method of Deploying a Web Widget In a Desktop Widget Platform - One embodiment of a method is described for deploying a web widget, intended for use inside a web browser, in a desktop widget platform by way of a widget template modified to load the content of the web widget. The widget template is created according to the development specification of a specific desktop widget platform using generic properties and a placeholder in the source code for displaying HTML content. For any particular web widget, the generic properties of the template are modified to reflect the specific properties inferred by the web widget snippet, the placeholder is replaced with the snippet, and the resulting modified widget template is prepared for installation into the desktop widget platform where it will be deployed as a desktop widget. Other embodiments are described and presented. | 2009-04-16 |