16th week of 2012 patent applcation highlights part 62 |
Patent application number | Title | Published |
20120096175 | DYNAMIC ADJUSTMENT OF CONNECTION SETUP REQUEST PARAMETERS - The number of connection setup request packets that are accepted for processing by a network element are dynamically adjusted based on the run time capacity of the network element. The number of accepted connection setup request packets that can be initiated for processing are dynamically modified based on the processor utilization and average latency of completion of processing the connection setup requests. The network element can apply a scheduling policy to those connection setup request packets to differentiate the processing treatment of different types of connection setup requests. | 2012-04-19 |
20120096176 | SYSTEM AND METHOD FOR PUSHING CONTENT TO A TERMINAL UTILIZING A NETWORK-INITIATED DATA SERVICE TECHNIQUE - A system is provided for pushing content to a terminal located within a mobile network or a private network. The system includes a network node, such as a Session Initiation Protocol (SIP) proxy, located across a public network from the network including the terminal. The network node is capable of subscribing to a push service on behalf of the terminal such that the network node is also capable of receiving push content in accordance with the push service. Thereafter, the network node is capable of establishing a network-initiated data session with the terminal. In response to the network-initiated data session, the network node is further capable of registering the terminal such that the terminal is capable of receiving the push content based upon the registration. | 2012-04-19 |
20120096177 | METHODS, APPARATUSES, AND RELATED COMPUTER PROGRAM PRODUCT FOR NETWORK ELEMENT RECOVERY - It is disclosed a method (and related apparatus) comprising establishing a control session by transmitting and receiving control session-related messages, transmitting restart information indicating a restart of a network element, receiving at least one protocol-related message of a first control session including session-related detail information, transmitting a restoration request message based on the session-related detail information, receiving at least one session parameter necessary for restoring the at least one first session, and restoring the at least one first session based on the received session-related detail information and the at least one session parameter. It is further disclosed a method (and related apparatus) comprising receiving restart information indicating a restart of a network element, processing at least one protocol-related message of a first control session to include session-related detail information, and transmitting at least one session parameter necessary for restoring the at least one first session, and the at least one protocol related message. | 2012-04-19 |
20120096178 | Load Balancing of Data Transmissions - In an embodiment, a method is provided for transmitting data. In this method, a number from a sequence of numbers is identified, and each number from the sequence is associated with a time interval. A random number is generated and it is compared with the identified number. In reference to the time interval associated with the identified number, transmission of the data to the electronic device is initiated based on the comparison. | 2012-04-19 |
20120096179 | Method For Processing Initial SIP Requests By Backends Of A SIP Cluster In The Presence Of A Fault, And Associated Processing Device - A device (D) is devoted to processing initial SIP requests for an end-processing software module (B | 2012-04-19 |
20120096180 | Achieving Lossless Data Streaming in a Scan Based Industrial Process Control System - A system for lossless sequence of events data streaming in a scan based process control system is provided. The system comprises a digital interface component, the digital interface component configured to receive a plurality of sequence of events data collected during one scan period, to produce a sequence of events data buffer comprising a plurality of sequence of events data, and to make the sequence of events data buffer available to at least one system component. The digital interface component comprises a storage component, the storage component configured to store a sequence of events data buffer. The system further comprises a processing component that accesses the sequence of events data from the storage component and processes the sequence of events data. | 2012-04-19 |
20120096181 | ROUTING MESSAGES OVER A NETWORK OF INTERCONNECTED DEVICES OF A NETWORKED CONTROL SYSTEM - The invention relates to routing messages over a network of interconnected devices of a networked control system, particularly to routing messages for individually controlling devices of a networked control system such as light sources of a lighting system. A basic idea of the invention is to determine a routing path for a message from a sender device to a destination device through the grid of interconnected devices of a networked control system, and to change the routing path, when a faulty device is contained in the routing path, in order to route the message around the faulty device, instead of determining an entirely new routing path. Thus, an efficient routing of a message over a network of interconnected device may be provided. An embodiment of the invention provides a method for routing messages over a network of interconnected devices ( | 2012-04-19 |
20120096182 | METHOD AND APPARATUS FOR COMPUTING A BACKUP PATH USING FATE-SHARING INFORMATION - To address shortcomings in the prior art, the invention uses fate sharing information to compute backup paths. Fate sharing information relates groups of nodes or links according to common characteristics, attributes, or shared resources (e.g., a shared power supply, close proximity, same physical link). In one embodiment, fate-sharing information includes costs associated with groups of nodes or links. When a primary path contains a link or node that is in a fate-sharing group, the other links or nodes in the fate-sharing group are assigned the cost associated with that fate-sharing group. The node computing the backup path takes into account the assigned cost together with other node and link costs. Discovering the existence of the relationships and assigning costs to the groups may be done manually or automatically. | 2012-04-19 |
20120096183 | DYNAMIC REROUTING OF SERVICE REQUESTS BETWEEN SERVICE ENDPOINTS FOR WEB SERVICES IN A COMPOSITE SERVICE - Technologies are described herein for rerouting a service request between service endpoints. The service request is received, at a first web service, from a second web service. The first web service and the second web service may be components of a composite service. The service request is routed to an initial service endpoint configured to respond to the service request according to a service level agreement between the first web service and the second web service. Service criteria associated with the initial service endpoint are monitored. A determination is made as to whether the service criteria meet a performance threshold specified by the service level agreement. If the service criteria do not meet the performance threshold specified by the service level agreement, then the service request is rerouted from the initial service endpoint to an alternate service endpoint. | 2012-04-19 |
20120096184 | Management of Network Membership - Systems and techniques relating to management of membership in mobile, wireless ad hoc networks are described. A described technique includes transmitting, by a device that is not a member of an ad hoc network, a request to join the ad hoc network to a given device of the ad hoc network. The method also includes receiving from the given device information including a set of addresses of devices of the ad hoc network that is locally stored at the given device. In addition, the method includes obtaining an address for the requesting device to be different from any address of the received set of addresses. | 2012-04-19 |
20120096185 | METHODS, SYSTEMS, AND APPARATUS FOR PROCESSING MESSAGING DATA SETS USING STRUCTURED DATA SETS - In one embodiment, a plurality of data conversion modules are bound to a processing engine and a first messaging data set is provided to a conversion module from the plurality of conversion modules. The messaging data set conforms to a messaging format. A structured data set based on a first data portion and a second data portion of the first messaging data set are received and value different from the value of the first data portion is stored within a first element of the structured data set. The value of the second data portion is stored within a second data element of the structured data set. A second messaging data set is then generated based on the structured data set. | 2012-04-19 |
20120096186 | Method for Pear to Pear Signal Synchronization and Wireless Communication Device and System Using the Same - A method for P2P signal synchronization and P2P wireless communication device and system using the same. The method includes the following steps. A first P2P wireless communication device having an effective range acts as a master device. At least one second P2P wireless communication device located in the effective range is paired and connected with the first P2P wireless communication device. When the first P2P wireless communication device acts as the master device, the first P2P wireless communication device broadcasts a synchronization signal. After the at least one second P2P wireless communication device receives the synchronization signal, at least one second P2P wireless communication device is switched to the master device and broadcasts the synchronization signal. | 2012-04-19 |
20120096187 | EMBEDDED SYSTEM AND METHOD FOR CONTROLLING ELECTRONIC DEVICES USING THE EMBEDDED SYSTEM - An embedded system acquires hardware device information of an electronic device via a universal serial bus (USB) port, sets parameter information for each hardware device of the electronic device, and generates a control file recording one or more control commands that are generated according to the parameter information. The control file is sent to the electronic device by the embedded system via the USB port, and executed by the electronic device, to control one or more hardware device of the electronic device according to the one or more commands. | 2012-04-19 |
20120096188 | Device pairing via intermediary device - A first device may include and/or involve at least one contact sensor, and logic to facilitate pairing between a second device and a third device as a result of contact between the contact sensor and at least one of the second and third devices. | 2012-04-19 |
20120096189 | Method and System for Allowing a Media Player to Determine if it Supports the Capabilities of an Accessory - A method and system for allowing a media player to determine if it supports the capabilities of an accessory are disclosed. The method and system comprise requesting information about the capabilities of the accessory by the media player and providing information about the capabilities of the accessory by the accessory to the media player. The method and system further include utilizing the information to determine if the capabilities of the accessory are supported by the media player. Accordingly, a method and system in accordance with the present invention provides a system that allows a media player to obtain information from an accessory about the accessory's capability. A media player can then utilize this information to allow for the maximum functionality of the accessory when connected to the media player. | 2012-04-19 |
20120096190 | SYSTEMS AND METHODS FOR DETECTING SUPPORTED SMALL FORM-FACTOR PLUGGABLE (SFP) DEVICES - Systems and methods for detecting supported small form-factor pluggable (SFP) devices in an adapter are provided. One system includes multiple ports, each port configured to be coupled to a SFP device, a tracking device configured to store data representing a list of supported SFP devices for the adapter, and a processor coupled to each of the plurality of ports and the tracking device. The processor is configured to scan each port at start-up, determine if any of the ports is coupled to a non-supported SFP device, and disable any ports that are coupled to a non-supported SFP device. One method includes scanning each port at start-up, determining if any of the ports is coupled to a non-supported SFP device, and disabling any ports that are coupled to a non-supported SFP device. Also provided are computer storage mediums including computer code for performing the above method. | 2012-04-19 |
20120096191 | METHODS AND APPARATUS FOR DECREASING POWER CONSUMPTION AND BUS ACTIVITY - Methods and apparatus for enhancing efficiency (e.g., reducing power consumption and bus activity) in a data bus. In an exemplary embodiment, methods and apparatus for intelligently trimming (and adding or re-adding) queue heads resident in a host device associated with various client device processes are disclosed. By selectively trimming inactive or dormant queue heads, the host expends less resources and time polling the queue heads during routine operations. Similarly, queue heads which are newly active, or acquired are intelligently added to ensure proper bus operation. Inactive queue heads are brought back into the polling process only when requested, thereby keeping the list of queue heads to be polled or examined as short as possible at all times. | 2012-04-19 |
20120096192 | STORAGE APPARATUS AND VIRTUAL PORT MIGRATION METHOD FOR STORAGE APPARATUS - The object of the present invention is to provide a technique in which, in a storage apparatus using a PCI Express switch in an internal network, an EP can be shared among processors even if the EP is incompatible with the MR-IOV. A storage apparatus according to the present invention is provided with a first interface device which controls data input/output to and from a higher-level apparatus, and the first interface device is further provided with multiple virtual function units which provide virtual ports. The first interface device enables any of the virtual function units and does not enable any of the other virtual function units (see FIG. | 2012-04-19 |
20120096193 | COMMUNICATION APPARATUS, INFORMATION PROCESSING APPARATUS, AND COMMUNICATION CONTROL METHOD - In a communication apparatus data is inputted to an input section. A priority determination section determines priority of the data inputted by the input section. If the priority of the data determined by the priority determination section is higher than a determined value, then a speed control section sets a transmission speed of the data outputted from an output section to a high value. On the other hand, if the priority of the data determined by the priority determination section is lower than the determined value, then the speed control section sets the transmission speed of the data outputted from the output section to a low value. The output section outputs the data at the set transmission speed. | 2012-04-19 |
20120096194 | UNIVERSAL SERIAL BUS DEVICE AND BULK TRANSFER CONTROL CIRCUIT AND CONTROL METHOD THEREOF - A bulk transfer control method of a universal serial bus (USB) device includes a timer for counting transmission time of a buck transfer. When the transmission time counted reaches a transmission time setting value, a trigger signal is issued to a transfer end event generator. Then, the transfer end event generator issues a transfer end event signal to a data processing unit so as to end the bulk transfer. Moreover, a USB device and its bulk transfer control circuit are also provided. | 2012-04-19 |
20120096195 | DATA TRANSFER DEVICE AND DATA TRANSFER METHOD - A data transfer device includes a storage controller that stores received response data in a buffer with respect to each piece of identification information included in the response data when receiving the response data from a first device, the response data being transferred from the first device in response to a transfer request transferred from a second device, a counting unit that counts a number of pieces of the response data stored in the buffer by the storage controller with respect to each piece of the identification information, and a determination unit that determines whether the number counted by the counting unit reaches a specified value preliminarily set with respect to each piece of the identification information. | 2012-04-19 |
20120096196 | COMMUNICATION CONTROL APPARATUS, NETWORK, AND NETWORK SYSTEM - A memory access request is received from a first lower-level device among a plurality of lower-level devices and, when an address of the memory access request is an address in a given range, the memory access request is converted into a setting request from the upper-level device to a second lower-level device among the lower-level devices, the second lower-level device corresponding to the address of the memory access request. | 2012-04-19 |
20120096197 | Management of a USB Host Device - A host device is managed that communicates with a peripheral device via an interface on the basis of a high frequency clock; the host device is in a suspended state in which the high frequency clock is deactivated. At the host device, an activation state of the peripheral device is detected ( | 2012-04-19 |
20120096198 | SYSTEM AND METHOD FOR DISTRIBUTING USER INTERFACE DEVICE CONFIGURATIONS - A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to collect a plurality of User Interface (UI) device configurations, receive a request from a computing device to download one or more of the plurality of UI device configurations, and transmit to the computing device the one or more UI device configurations requested to configure one or more UI devices of the computing device. Other embodiments are disclosed. | 2012-04-19 |
20120096199 | BUS SYSTEM INCLUDING ID CONVERTER AND CONVERTING METHOD THEREOF - A bus system includes a plurality of master devices each of which issues a transaction request having a first transaction identifier with a first bit width and a slave device responding to the transaction request having a second transaction identifier with a second bit width and supplying a transaction response having the second transaction identifier to the plurality of master devices. The embodiment further comprises a bus configured to connect one of the plurality of master devices and the slave device; and an ID converter configured to connect the bus and the slave device and to map the first transaction identifier to the second transaction identifier for providing the second transaction identifier to the slave device and map the second transaction identifier to the first transaction identifier for providing the first transaction identifier to the one of the plurality of master devices. | 2012-04-19 |
20120096200 | BUS SYSTEM AND OPERATING METHOD THEREOF - A system-on-chip bus system and an operating method of the same are provided. The bus system includes a master device, a slave device and an interconnector coupled between the master device and the slave device. The interconnector includes a synchronization/compaction block to control traffic provided from a master device to a slave device. When a write request traffic and a corresponding write data traffic are all provided from the master device, the synchronization/compaction block may transfer the two traffics to the salve device. | 2012-04-19 |
20120096201 | Cooperative Writes over the Address Channel of a Bus - A method of communicating over a bus is disclosed. The bus includes a write address channel, a write channel, and a read address channel. The method includes sending an address from a sending device to a receiving device via the write address channel. The method further includes concurrently sending a portion of a payload to the receiving device via the write channel and another portion of the payload to the receiving device via the read address channel. When sending multiple sequential portions of the payload via the bus concurrently, the sending device is configured to give data ordering preference to the write channel over the read address channel by sending a first sequential portion of the multiple sequential portions via the write channel and sending a subsequent sequential portion of the multiple sequential portions via the read address channel. | 2012-04-19 |
20120096202 | AUXILIARY WRITES OVER ADDRESS CHANNEL - A method for communicating via a bus including a first channel, a second channel, and a third channel is disclosed. The method includes addressing a slave device via the first channel, receiving from the slave device via the second channel, and writing to the slave device via the third channel. The method further includes selecting between first and second bus transmission modes. In the first bus transmission mode, payload write data is to be sent to the slave device via the first channel or the third channel. In the second bus transmission mode, during a first clock cycle, second payload write data associated with a second write operation is to be sent to the slave device via the first channel and first payload write data associated with a first write operation is to be concurrently sent to the slave device via the third channel. | 2012-04-19 |
20120096203 | Method and Apparatus for Realizing Remote Access of Terminal to USB Device - An apparatus and method for realizing remote access to a Universal Serial Bus (USB) device are provided. The apparatus includes a USB Hub, an application processor, and a power adapter. The USB Hub is configured to receive a USB service access request sent by a remote terminal and forwarded by a wireless Internet data card, and to forward the USB service access request to the application processor. The application processor is configured to receive the USB service access request, to authenticate the remote terminal according to the USB service access request, and to permit the remote terminal to access a USB device connected to the USB Hub after the authentication is passed. The power adapter is configured to provide an operational power supply to the USB Hub and the application processor. | 2012-04-19 |
20120096204 | Formal Verification of Random Priority-Based Arbiters Using Property Strengthening and Underapproximations - A mechanism is provide for formally verifying random priority-based arbiters. A determination is made as to whether a random priority-based arbiter is blocking one of a set of output ports or a set of input ports. Responsive to the first predetermined time period expiring before the processor determines whether the random priority-based arbiter is blocking, a determination is made as to whether the random priority-based arbiter is blocking one of the set of output ports or the set of input ports within a second predetermined time period using the random seed and at least one of property strengthening or underapproximation. Responsive to the processor determining that the random priority-based arbiter satisfies a non-blocking specification such that not one of the set of output ports or the set of input ports is blocked within the second predetermined time period, the random priority-based arbiter is validated as satisfying the non-blocking specification. | 2012-04-19 |
20120096205 | INTER-VIRTUAL MACHINE PROFILING - Disclosed is a virtual machine system where hardware timer interrupts are processed by a first virtual machine. The first virtual machine writes a timer value to a shared memory location while processing the hardware timer interrupt. The timer value may be based on a kernel timing parameter maintained by the operating system of the first virtual machine. A second virtual machine may read the shared timer value from the shared memory location in order to time inter-virtual machine processes such as I/O processing and I/O requests. | 2012-04-19 |
20120096206 | INTER-VIRTUAL MACHINE INTERRUPT COALESCING - Disclosed is a system with multiple virtual machines passing I/O requests via a shared memory space. A flag in shared memory is set to a first state in response to a first hypervisor I/O interrupt to indicate that an I/O processing routine is active (running). I/O requests are retrieved from an I/O queue in the shared memory by the I/O processing routine. Based on an indicator that there are no I/O requests remaining in said I/O queue, the shared flag is set to a second state to indicate that the I/O processing routine is deactivated (sleeping). In response to said shared flag being in the second state, when new I/O requests are going to be made, a second hypervisor I/O interrupt is generated. In response to said shared flag being in said first state, I/O requests are inserted into the I/O queue without generating a second hypervisor I/O interrupt. | 2012-04-19 |
20120096207 | OPERATING MODE CONTROL FOR PORTABLE DEVICE - An embodiment of the invention provides an operating mode setting method for a portable device. The method includes: connecting the portable device to a dock; acquiring an ID of the dock; and changing an operating mode of the portable device to a first mode corresponding to the ID. | 2012-04-19 |
20120096208 | METHOD AND SYSTEM FOR RECORDING ANALOG AUDIO FROM A VINYL RECORD TURNTABLE TO A HANDHELD COMPUTING DEVICE - A turntable with a dock for handheld computing devices is disclosed. The turntable includes a housing having a record player with an analog output. An analog-to-digital converter has an analog input operatively connected to the analog output and a digital output. A serial interface device is operatively connected to the digital output of the analog-to-digital converter. A moveable dock connected to the housing is configured and arranged to support a handheld computing device therein. | 2012-04-19 |
20120096209 | Multi peripheral accelerating apparatus - A multi peripheral accelerating apparatus includes a processor device disposed on a main board, a primary memory and a controller disposed on the main board and electrically connected to the processor device for exchanging information with the processor device, a secondary memory disposed on the main board and electrically connected to the controller, and one or more peripherals disposed on the main board and electrically connected to the controller for allowing the information to be transmitted or exchanged from the peripherals to the secondary memory when the processor device is transmitting or exchanging information with the primary memory. | 2012-04-19 |
20120096210 | STAR COUPLER FOR A BUS SYSTEM, BUS SYSTEM HAVING SUCH A STAR COUPLER AND METHOD FOR INTERCHANGING SIGNALS IN A BUS SYSTEM - A star coupler has the ability to distinguish signals arriving via connections according to the time slot in which they arrive and to forward these signals to at least one other connection on the basis of the connection via which the signals arrive and on the basis of the time slot. An assignment in which the star coupler once treats the bus system as a single bus system and virtually divides the bus system into two subsystems in another time slot is possible in particular. | 2012-04-19 |
20120096211 | PERFORMANCE AND POWER OPTIMIZED COMPUTER SYSTEM ARCHITECTURES AND METHODS LEVERAGING POWER OPTIMIZED TREE FABRIC INTERCONNECT - A performance and power optimized computer system architecture and method leveraging power optimized tree fabric interconnect are disclosed. One embodiment builds low power server clusters leveraging the fabric with tiled building blocks while another embodiment implements storage solutions or cooling solutions. Yet another embodiment uses the fabric to switch non-Ethernet packets, switch multiple protocols for network processors and other devices. | 2012-04-19 |
20120096212 | USE OF COMPLETER KNOWLEDGE OF MEMORY REGION ORDERING REQUIREMENTS TO MODIFY TRANSACTION ATTRIBUTES - A method and system of relaxing the ordering of a read completion by setting an ordering attribute in the read completion. The relaxed ordering allows the read completion to bypass pending writes. | 2012-04-19 |
20120096213 | CACHE MEMORY DEVICE, CACHE MEMORY CONTROL METHOD, PROGRAM AND INTEGRATED CIRCUIT - To aim to provide a cache memory device that performs a line size determination process for determining a refill size, in advance of a refill process that is performed at cache miss time. According to the line size determination process, the number of reads/writes of a management target line that belongs to a set is acquired (S | 2012-04-19 |
20120096214 | Working Method for Information Security Device with CF Interface and Working System Thereof - A working method for information security device with CF interface and working system thereof are disclosed in the invention. The method includes that the card reading apparatus sends instruction to the information security device with CF interface, and the information security device with CF interface determines the object being operated by the instruction, if the object is flash module in the information security device with CF interface, the information security device with CF interface operates the flash module as normal, or else if the object is information security chip of the information security device with CF interface, the information security device with CF interface performs information security operation on the information security chip;
| 2012-04-19 |
20120096215 | MEMORY CONTROLLER AND METHOD FOR ACCESSING A PLURALITY OF NON-VOLATILE MEMORY ARRAYS - A memory controller ( | 2012-04-19 |
20120096216 | Indexing Method for Flash Memory - An indexing method is based on a tree structure of a flash memory, which includes a plurality of pages. The indexing method stores an entry in the leaf node and an entry in an index node designating the leaf node, in the same page, and changes the maximum number of entries that are stored in the leaf node of the page and the maximum number of entries that are stored in the index node of the page on the basis of the number of entries in the leaf node and the number of entries in the index node, respectively. | 2012-04-19 |
20120096217 | FILE SYSTEM-AWARE SOLID-STATE STORAGE MANAGEMENT SYSTEM - A file system-aware SSD management system including an SSD management module that incorporates both file system information and information related to the underlying physical solid-state storage media into its operations is described. Also described are related methods for performing data management operations in a file system-aware manner. By incorporating both file system and physical storage information, the system may achieve various advantages over conventional systems, such as enhanced I/O performance, simplified SSD firmware, and extended SSD lifespan. Moreover, by moving solid-state management functions above the firmware level, the system may enable the simultaneous management of a pool of multiple SSDs. | 2012-04-19 |
20120096218 | APPARATUS AND METHODS FOR TUNING A MEMORY INTERFACE - The disclosure relates to an integrated circuit including programmable control logic configured to generate at least one data pattern sequence from a number of stored data patterns and using the generated at least one data pattern sequence to at least one of read from and write to at least one memory device. A method includes generating at least one data pattern sequence from a number of stored data patterns and writing and reading the data pattern sequence from and to a memory device. | 2012-04-19 |
20120096219 | CONTENT ADDRESSABLE STORAGE WITH REDUCED LATENCY - A system and method for storing data in a content-addressable system is provided. The system includes a content-addressable storage system and a persistent cache. The persistent cache includes a temporary address generator that is configured to generate a temporary address which is associated with data to be stored in the persistent cache, and a non-content-addressable storage system configured to store and retrieve data in the persistent cache using the temporary address. The persistent cache further comprises an address translator configured to map a temporary address associated with the data in the non-content addressable storage system with a content address associated with the data in the content-addressable storage system. | 2012-04-19 |
20120096220 | BIT WEAVING TECHNIQUE FOR COMPRESSING PACKET CLASSIFIERS - An improved technique is provided for compressing a packet classifier for a computer network system. A set of packet classification rules is first partitioned into one or more partitions. For each partition, columns of bits in each of the ternary strings of a given partition are reordered, the ternary strings within each partition are consolidated into one or more replacement strings and then the columns of bits of the replacement strings are rearranged back to the starting order. The rearranged replacement strings from each of the partitions are appended together to form a compressed packet classifier which may be instantiated in a content-addressable memory device. | 2012-04-19 |
20120096221 | HIERARCHICAL IMMUTABLE CONTENT-ADDRESSABLE MEMORY PROCESSOR - Improved memory management is provided according to a Hierarchical Immutable Content Addressable Memory Processor (HICAMP) architecture. In HICAMP, physical memory is organized as two or more physical memory blocks, each physical memory block having a fixed storage capacity. An indication of which of the physical memory blocks is active at any point in time is provided. A memory controller provides a non-duplicating write capability, where data to be written to the physical memory is compared to contents of all active physical memory blocks at the time of writing, to ensure that no two active memory blocks have the same data after completion of the non-duplicating write. | 2012-04-19 |
20120096222 | METHODS FOR IMPLEMENTATION OF AN ARRAY OF REMOVABLE DISK DRIVES - Embodiments provide systems and methods for storing data on two or more removable disk drives. The two or more removable disk drives are inserted into a modular drive bay having two or more drive ports. Embodiments of the modular drive bay include a switch to redirect operations to a drive port. By arraying the drive ports, the removable disk drives may be replaced without needing to readdress the removable disk drives when new removable disk drives are inserted. Thus, the modular drive bay does not require configuration changes when new removable disk drives are inserted. | 2012-04-19 |
20120096223 | LOW-POWER AUDIO DECODING AND PLAYBACK USING CACHED IMAGES - A particular method includes loading one or more memory images into a multi-way cache. The memory images are associated with an audio decoder, and the multi-way cache is accessible to a processor. Each of the memory images is sized not to exceed a page size of the multi-way cache. | 2012-04-19 |
20120096224 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 2012-04-19 |
20120096225 | DYNAMIC CACHE CONFIGURATION USING SEPARATE READ AND WRITE CACHES - Data from storage devices is stored in a read cache, having a read cache size, and a write cache, having a write cache size. The read cache and the write cache are separate caches. Cache configuration of the read cache and the write cache are automatically and dynamically adjusted based, at least in part, upon cache performance parameters. Cache performance parameters include one or more of preference scores, frequency of read and write operations, read and write performance of a storage device, localization information, and contiguous read and write performance. Dynamic cache configuration includes one or more of adjusting read cache size and/or write cache size and adjusting read cache block size and/or write cache block size. | 2012-04-19 |
20120096226 | TWO LEVEL REPLACEMENT SCHEME OPTIMIZES FOR PERFORMANCE, POWER, AND AREA - A two-level replacement scheme is provided for selecting an entry in a cache memory to replace when a cache miss takes place and the memory is full. The scheme divides the tags associated with each memory location of the cache into two or more groups, each group relating to a subset of memory locations of the cache. The scheme uses a first algorithm to select one of the groups and passes the tags for the group through a second algorithm. The second algorithm produces a local index which, when combined with a group index, produces a replacement index that identifies a memory location in the cache to replace. | 2012-04-19 |
20120096227 | CACHE PREFETCH LEARNING - An apparatus generally having a processor, a cache and a circuit is disclosed. The processor may be configured to generate (i) a plurality of access addresses and (ii) a plurality of program counter values corresponding to the access addresses. The cache may be configured to present in response to the access addresses (i) a plurality of data words and (ii) a plurality of address information corresponding to the data words. The circuit may be configured to record a plurality of events in a file in response to a plurality of cache misses. A first of the events in the file due to a first of the cache misses generally includes (i) a first of the program counter values, (ii) a first of the address information and (iii) a first time to prefetch a first of the data word from a memory to the cache. | 2012-04-19 |
20120096228 | System and Method for the Synchronization of a File in a Cache - The present invention provides a system and method for bi-directional synchronization of a cache. One embodiment of the system of this invention includes a software program stored on a computer readable medium. The software program can be executed by a computer processor to receive a database asset from a database; store the database asset as a cached file in a cache; determine if the cached file has been modified; and if the cached file has been modified, communicate the cached file directly to the database. The software program can poll a cached file to determine if the cached file has changed. Thus, bi-directional synchronization can occur. | 2012-04-19 |
20120096229 | STORAGE CONTROL APPARATUS AND STORAGE CONTROL APPARATUS MEMORY CONTROL METHOD - A storage control apparatus of the present invention is able to duplicatively manage data in a cache memory even during maintenance work. When a memory package CMPK | 2012-04-19 |
20120096230 | METHOD AND SYSTEM FOR CREATING SNAPCLONE LOGICAL DISKS - Embodiments of the present invention are directed to a logical disk provided by a storage system. The logical disk comprises a number of data segments mapped to physical data-storage, metadata, stored in an electronic memory and/or mass-storage devices, that includes, for each segment of the logical disk, a three-bit field, and a set of operations, carried out by a storage-system controller, that can be directed to the logical disk by an entity that accesses the storage system, including a snapclone operation that generates a snapclone of the logical disk and a snapshot operation that generates a snapshot of the logical disk, an existing snapshot of the logical disk, or a snapclone of the logical disk. | 2012-04-19 |
20120096231 | DATA MIGRATION SYSTEM AND DATA MIGRATION METHOD - A second storage maps a migration source volume to a virtual volume of a migration destination volume according to storage virtualization technology. A host system including a host switches an access path from an access path to the migration source volume to an access path to the migration destination volume. The second storage executes copy processing of migrating, from the migration source volume to the migration destination volume, data in an assigned area of a virtual volume according to thin provisioning of the migration source volume based on the information contained in the first thin provisioning information in the first storage, and copying that data from the migration destination volume to a virtual volume according to thin provisioning of a copy destination volume in the second storage. The second storage associates the virtual volume of the copy destination volume with the migration destination volume in substitute for the original virtual volume. | 2012-04-19 |
20120096232 | COMPUTER SYSTEM AND CONTROL METHOD FOR THE COMPUTER SYSTEM - A computer system including a first storage system connected to a first host computer, a second storage system connected to a second host computer and a third storage system connected to the first and second storage systems. The second storage system sets transfer setting before an occurrence of a failure, the transfer setting being provided with a dedicated storage area to be used for transferring data to the third storage system by asynchronous copy in response to a failure at the first host computer. Before the start of data transfer between the second storage system and third storage system to be executed after an occurrence of the failure, the second storage system checks the dedicated storage area, data transfer line and transfer setting information, and if an abnormal state is detected, this abnormal state is reported to the host computer as information attached to the transfer setting. | 2012-04-19 |
20120096233 | Apparatus and Method for On-Demand In-Memory Database Management Platform - A method and apparatus for constructing a memory-based database service platform, in which database can be on-loaded and off-loaded or unloaded as needed, and can reserve schedule and size of memory and other resources, including CPUs, network, backup, mirroring and recovery recourses. With the service platform, multiple different types of databases can be chosen by specifying data storage type and data operation interfaces, such as Relational Database (RDB), Biometric Database (BDB), Time Series Database (TDB), Data Driven Database (DDDB) and File-based Database (FDB) etc. Database types can be chosen either by user directly or by platform automatically or semi-automatically based on data types and data operation characteristics. | 2012-04-19 |
20120096234 | INFORMATION REPRESENTATION AND CODING FOR NONVOLATILE MEMORIES - A memory device having a plurality of cells, each of which stores a value, where the values of the cells are mapped to discrete levels and the discrete levels represent data, is programmed by determining a maximum number of cell levels in the memory device, and determining the set of values that are associated with each of the cell levels. The maximum number of cell levels for the memory device is determined by an adaptive programming system connected to the memory device, based on a plurality of cell values attained by at least one cell of the memory device, in response to voltage applied by the adaptive programming system to the cells of the memory device. The adaptive programming system associates, for each of the cell levels, a different set of cell values of the plurality of cell values attained by the cells to which voltage is applied. This technique increases the number of cell levels that can be configured in a memory device as compared with conventional techniques, and increases the number of data values that can be programmed into the cells of a memory device. | 2012-04-19 |
20120096235 | Allocation of Storage Space for Critical Data Sets - Described are embodiments of an invention for allocating storage space in a storage system for critical data sets. The computing environment includes at least one server including a processor and memory. The server is coupled to storage. The memory further includes a storage manager including an allocation module and an alert module. The storage manager defines a common area for storing non-critical data sets and critical data sets in the storage group. The storage manager also defines a critical reserve area for storing only critical data sets in the first storage group. A predefined percentage of available storage space is reserved for the critical reserve area. The predefined percentage of available space is determined by comparing the available storage space within the critical reserve area to the storage space in the storage group. Upon allocating additional storage to the storage group, the allocation module allocates an amount of the additional storage space to the critical reserve area such that the predefined percentage of available storage space is maintained in the critical reserve area. | 2012-04-19 |
20120096236 | USING AN ALIAS VOLUME NAME FOR A VOLUME TO ALLOCATE SPACE TO A DATA SET - Provided are a computer program product, system, and method for using an alias volume name for a volume to allocate space to a data set. An assignment of a plurality of volumes to a data set is maintained, wherein the volumes are configured in a storage system. A request is received to extend the data set. A determination is made as to whether one of the volumes previously assigned to the data set has an allocation amount of available space in the storage system in response to the request to extend the data set. An alias volume name is assigned to the data set for the previously assigned volume determined to have the allocation amount of available space, wherein the alias volume name provides an alternative name for the previously assigned volume. The allocation amount of available space is assigned to the data set for the alias volume name. | 2012-04-19 |
20120096237 | METHOD OF IMPROVING PERFORMANCE OF A DATA STORAGE DEVICE - Methods are provided for efficiently storing data to a data storage device or subsystem. The data storage device may be a Solid-State Device (SSD), and may be implemented as part of a RAID (Redundant Array of Independent Disks) or other subsystem. When existing data is read and updated, and must be re-stored, the data is assembled and stored as if it were new data, and is written in a sequential manner, instead of being written to the same storage location. A newer generation number distinguishes it from the previous version. If the storage subsystem employs data striping, stripe size may be matched with the size of a logical collection of data (e.g., an extent), so that each such logical collection of data is wholly stored on just device in the storage subsystem. Concurrent device access may be supported by concurrently writing substripes of data to each device/extent. | 2012-04-19 |
20120096238 | Circuit and method for parallel perforation in speed rate matching - The present invention discloses a circuit and a method for parallel perforation in rate matching, which can reduce the perforation processing time delay to satisfy the requirements of a Long Term Evolution (LTE). Both the circuit and the method can adopt three selector arrays and three register groups. Specifically, the first selector array is configured to remove null bits in input data and output the remaining data to the first register group; the second selector array is configured to combine the first register group and the third register group and then output the combined data to the second register group; during the combination, the valid data in the third register group are preferentially selected, and then the data in the first register group are selected; when the second register group is full, the data therein are output to the exterior as the results of the perforation processing. Further, the third selector array is configured to output remaining valid data in the first selector group to the third register group if the valid data in the first selector group are not used out while combining the first register group and is the third register group by the second selector array. | 2012-04-19 |
20120096239 | Low Power Execution of a Multithreaded Program - Technologies for low power execution of one or more threads of a multithreaded program by one or more processing elements are generally disclosed. | 2012-04-19 |
20120096240 | Application Performance with Support for Re-Initiating Unconfirmed Software-Initiated Threads in Hardware - A method, system and computer-usable medium are disclosed for managing prefetch streams in a virtual machine environment. Compiled application code in a first core, which comprises a Special Purpose Register (SPR) and a plurality of first prefetch engines, initiates a prefetch stream request. If the prefetch stream request cannot be initiated due to unavailability of a first prefetch engine, then an indicator bit indicating a Prefetch Stream Dispatch Fault is set in the SPR, causing a Hypervisor to interrupt the execution of the prefetch stream request. The Hypervisor then calls its associated operating system (OS), which determines prefetch engine availability for a second core comprising a plurality of second prefetch engines. If a second prefetch engine is available, then the OS migrates the prefetch stream request from the first core to the second core, where it is initiated on an available second prefetch engine. | 2012-04-19 |
20120096241 | Performance of Emerging Applications in a Virtualized Environment Using Transient Instruction Streams - A method, system and computer-usable medium are disclosed for managing transient instruction streams. Transient flags are defined in Branch-and-Link (BRL) instructions that are known to be infrequently executed. A bit is likewise set in a Special Purpose Register (SPR) of the hardware (e.g., a core) that is executing an instruction request thread. Subsequent fetches or prefetches in the request thread are treated as transient and are not written to lower-level caches. If an instruction is non-transient, and if a lower-level cache is non-inclusive of the L1 instruction cache, a fetch or prefetch miss that is obtained from memory may be written in both the L1 and the lower-level cache. If it is not inclusive, a cast-out from the L1 instruction cache may be written in the lower-level cache. | 2012-04-19 |
20120096242 | Method and Apparatus for Performing Control of Flow in a Graphics Processor Architecture - Methods and systems for performing control of flow in a graphics processor architecture are provided. For example, in at least one embodiment, a computing system includes a memory storing a plurality of instructions and a graphics processing unit. The graphics processing unit is configured to process the instructions according to a multi-stage scalar pipeline and store condition code values in the branch control stack. The graphics processing unit is further configured to process branch instructions using condition code values stored in the condition register at the top of the branch control stack. | 2012-04-19 |
20120096243 | MULTITHREADED PROCESSOR WITH MULTIPLE CONCURRENT PIPELINES PER THREAD - A multithreaded processor comprises a plurality of hardware thread units, an instruction decoder coupled to the thread units for decoding instructions received therefrom, and a plurality of execution units for executing the decoded instructions. The multithreaded processor is configured for controlling an instruction issuance sequence for threads associated with respective ones of the hardware thread units. On a given processor clock cycle, only a designated one of the threads is permitted to issue one or more instructions, but the designated thread that is permitted to issue instructions varies over a plurality of clock cycles in accordance with the instruction issuance sequence. The instructions are pipelined in a manner which permits at least a given one of the threads to support multiple concurrent instruction pipelines. | 2012-04-19 |
20120096244 | METHOD, SYSTEM, AND PRODUCT FOR PERFORMING UNIFORMLY FINE-GRAIN DATA PARALLEL COMPUTING - A method is disclosed that includes computing, using at least one uniformly fine-grain data parallel computing unit, a mean-square error regression within a regression clustering algorithm. The mean-square error regression is represented in the form of at least one summation of a vector-vector multiplication. A computer program product and a computer system are also disclosed. | 2012-04-19 |
20120096245 | COMPUTING DEVICE, PARALLEL COMPUTER SYSTEM, AND METHOD OF CONTROLLING COMPUTER DEVICE - A computing device includes a receiving unit that receives control information indicating an instruction to be executed on a process that is distributed or an instruction contained in the process that is distributed, from a control information creating device that transmits the control information to each computing device on a network. The computing device further includes a processor configured to suspend execution of an instruction when the instruction to be executed on the process occurs or the instruction contained in the process that is distributed is executed, and execute the suspended instruction when the suspended instruction is associated with the instruction indicated by the control information that is received by the receiving unit. | 2012-04-19 |
20120096246 | NONVOLATILE STORAGE USING LOW LATENCY AND HIGH LATENCY MEMORY - Nonvolatile storage includes first and second memory types with different read latencies. FLASH memory and phase change memory are examples. A first portion of a data block is stored in the phase change memory and a second portion of the data block is stored in the FLASH memory. The first portion of the data block is accessed prior to the second portion of the data block during a read operation. | 2012-04-19 |
20120096247 | RECONFIGURABLE PROCESSOR AND METHOD FOR PROCESSING LOOP HAVING MEMORY DEPENDENCY - Provided are a reconfigurable processor, which is capable of reducing the probability of an incorrect computation by analyzing the dependence between memory access instructions and allocating the memory access instructions between a plurality of processing elements (PEs) based on the results of the analysis, and a method of controlling the reconfigurable processor. The reconfigurable processor extracts an execution trace from simulation results, and analyzes the memory dependence between instructions included in different iterations based on parts of the execution trace of memory access instructions. | 2012-04-19 |
20120096248 | POWER-CAP SETTINGS - When the maximum power consumption of a computer exceeds a currently selected power-consumption cap, a cap setting corresponding to the currently selected power-consumption cap is reduced in addition, power-cap settings corresponding to power-consumption caps between said currently selected power-consumption cap and said maximum power consumption are reduced. | 2012-04-19 |
20120096249 | Activating Applications Based on Accelerometer Data - In some implementations, a computer-implemented method includes storing a plurality of acceleration profiles in a mobile device; receiving accelerometer data from an accelerometer in the mobile device; correlating the accelerometer data with one accelerometer profile in the plurality of accelerometer profiles; and activating a user application of the mobile device that is associated with the correlated accelerometer profile. Each acceleration profile can correspond to a sequence of acceleration forces a mobile device would be subjected to when carried with a user during an activity that corresponds to the correlated acceleration profile. | 2012-04-19 |
20120096250 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 2012-04-19 |
20120096251 | MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters. | 2012-04-19 |
20120096252 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A method includes storing, to a volatile memory coupled to a processor executing a first operating system kernel, a planned system configuration, and tagging the planned system configuration. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 2012-04-19 |
20120096253 | METHOD FOR AUTOMATICALLY SETTING UP SYSTEM - A method for automatically optimizing a configuration of a BIOS is suitable for configurating a computer system. During a BIOS power-on self test, a running operating system predetermined index is obtained from a memory. An optimal system setting parameter corresponding to the running operating system predetermined index is obtained. The computer system is automatically set up according to the optimal system setting parameter. A booting process is performed to start an operating system. An operating system index of the operating system is obtained. The operating system index is compared with the running operating system predetermined index. When the operating system index is not equal to the running operating system predetermined index, a system setting warning is issued. The running operating system predetermined index is updated by using the operating system index as the updated running operating system predetermined index in the memory. | 2012-04-19 |
20120096254 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RETRIEVING DATA AT BOOT TIME - The invention provides a system for retrieving at boot time user data stored on a computer. The computer comprises a processor coupled through a system bus to I/O devices and to a system memory, the computer further having a basic input output system (BIOS) unit operatively coupled to the system bus for loading a computer operating system during a computer boot procedure, wherein the system memory being accessible to the computer operating system via the system bus. The system comprises a boot adapter for connecting the system bus to a boot bus, a boot memory coupled to the boot bus wherein the boot memory comprises storage locations for storing the predefined user data, and program code means coupled to the BIOS unit. The program code means are operative for loading a boot operating system during the computer boot procedure, the boot operating system having instructions for accessing the boot memory during the computer boot procedure. | 2012-04-19 |
20120096255 | SERVER AND METHOD FOR MANAGING I2C BUS OF THE SERVER - In a method for managing an inter-integrated circuit (I2C) bus of a server, a bus flag is set for the I2C bus using a BMC. When the BMC requires to detect a temperature of a memory of the server, the temperature is detected by accessing a SPD chip of the server through the I2C bus if a value of the bus flag is a first value. The value of the bus flag is changed to a second value when the memory requires to be initialized by a BIOS, and a delay for a predetermined time period occurs. Configuration information of the memory is acquired by the BIOS from the SPD chip through the I2C bus when the predetermined time period is elapsed, and the memory is initialized by the BIOS according to the configuration information. The value is reset to the first value after the memory is initialized. | 2012-04-19 |
20120096256 | MOBILE DEVICE AND METHOD FOR SUPPORTING HIBERNATION FUNCTION - A method and apparatus for supporting a hibernation function in a mobile device are provided. In the method, the mobile device detects a wakeup event in a hibernation mode and, in response to the wakeup event, loads a snapshot image into a volatile memory from a snapshot image region of a nonvolatile memory. After the loading of the snapshot image, the mobile device determines whether there is a system status has been modified. If the system status has not been modified, the mobile device finishes a system boot. If the system status has been modified, the mobile device performs data synchronization and then finishes the system boot. | 2012-04-19 |
20120096257 | Apparatus and Method for Protecting Storage Data of a Computing Apparatus in an Enterprise Network System - The present invention relates to data security, in particular relates to data protection for storage data, and more particularly relates to encrypting and decrypting process to data on a removable non-volatile storage in an enterprise network. There is provided an apparatus and a method for protecting storage data of a computing apparatus within an enterprise network system, the method comprising: intercepting data transferred between an application of the computing apparatus and a storage; determining whether the data intercepted at the data transfer interception step is confidential data; obtaining a key automatically generated for the confidential data; and encrypting and decrypting the confidential data with the obtained key. | 2012-04-19 |
20120096258 | SERVICE SYSTEM - A service server can: associate identification tags which identify users, with other-user identification tags, and store said identification tags; and associate the identification tags with identification data uniquely identifying users in service servers, and an encryption key for identification data and store said identification tags. A control server device stores a table for storing encryption data, encrypted identifiers of service servers used by users. The gateway server device receives an other-user identification tag associated with an identification tag and stored in a service server. If the other-user identification tag is associated and stored, the encryption key, the encryption data, which is associated with identification data related to the other-user identification tag and stored in the control server device, is decoded, the service server that can be used by users of the other-user identification tags is obtained; and is determined whether the first identification tag should be associated with the other-user identification tag. | 2012-04-19 |
20120096259 | SYSTEM AND METHOD FOR PERFORMING MUTUAL AUTHENTICATION - A system and method for performing mutual authentication verifies a username and a password of a handheld device by a server, and verifies an identity of the server by the handheld device if the handheld device passes the username and password verification. The system and method further verifies an identity of the handheld device by the server if the identity of the server is valid, and gives an access authority to the handheld device if the identity of the handheld device is valid. | 2012-04-19 |
20120096260 | CONTENT TRANSMISSION DEVICE, CONTENT TRANSMISSION METHOD, AND COMPUTER PROGRAM USED THEREWITH - A content transmission device for transmitting content, whose copying is controlled, includes an authentication section for performing an authentication procedure between the content transmission device and a content receiving device, a first copy-control-information processing section for processing first copy control information describing copy control information concerning the content, a second copy-control-information processing section for processing second copy control information including content information different from the first copy control information, and a content transmission section for generating and transmitting, to the content receiving device, a packet including a header including the first copy control information and the second copy control information, and a payload obtained by encrypting the content with a predetermined content key. | 2012-04-19 |
20120096261 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO ENCRYPTED NETWORK COMMUNICATION CHANNELS - An apparatus and method are described for performing content filtering of encrypted network transactions. For example, in one embodiment, for an encrypted Internet transaction (such as an HTTPS transaction), a local cache lookup is performed using the network address of the requested Internet transaction to determine if name resolution data associated with the transaction is stored in a name resolution data cache. If name resolution data associated with the transaction is stored in the name resolution data cache, then the name resolution data is compared with a whitelist of acceptable Internet names. The requested Internet transaction is allowed only if a match is found between the name resolution data and one of the Internet names on the whitelist. | 2012-04-19 |
20120096262 | System and method of generating encryption/decryption keys and encrypting/decrypting a derivative work - A derivative work is encrypted using master keys generated from source data extracted from digital sources used to create the derivative work. A software application permits a mix artist to encrypt and stream a derivative work to a worldwide web server, where it is made available to consumers. A software application permits the consumers to acquire and decrypt an encrypted derivative work if the consumer has possession of a corresponding digital source for each of the digital sources used to encrypt the derivative work. | 2012-04-19 |
20120096263 | Security service control method and wireless local area network terminal - A security service control method and a WLAN terminal are provided, and the method includes: stopping a WPI service between a WLAN terminal and an AP when the WLAN terminal creates a security service of an IP layer and/or a layer above the IP layer, wherein the WPI service comprises: encrypting a data link layer message to be transmitted, and decrypting a received data link layer message. After the WPI service is stopped, when the WLAN terminal cancels the security service of the IP layer and/or the layer above the IP layer, the WLAN terminal completes processes of removing association, association, user authentication and key negotiation in turn with the WLAN AP, and uses a session key obtained through the key negotiation to recover the WPI service. The calculating resources can be saved by using the present invention. | 2012-04-19 |
20120096264 | JAVA STORE TELEVISION - A non-transitory computer readable storage medium including computer readable code that, when executed by a processor, is configured to receive, from a user network device, a first request to execute an application on the user network device. The first request includes a user identification, routing information, and requested application information, encrypted using a public key. The user network device is configured to display the application on a television display device. The code is further configured to decrypt the routing information and requested application information using a private key, send a second request for subscription information to a service provider, receive the subscription information from the service provider, and determine that a license corresponding to the application is associated with the user. The code is further configured to generate and send an application package configured to deploy the application using a Java Runtime Environment on the user network device. | 2012-04-19 |
20120096265 | Method and apparatus for communicating information between a security panel and a security server - A security panel includes a processor, memory, and a network interface having a unique MAC address, and is configured to communicate over a network with a server. A method for registering the security panel with the server includes contacting the server utilizing a network address stored in the memory. A dealer ID, a line number, and a unique account number is sent to the server. The dealer ID, the line number, and the unique account number are stored in the memory. An encryption key is received for encryption of additional communication between the security panel and the server. The unique MAC address is sent to the server in an encrypted session to verify the security panel to the server. | 2012-04-19 |
20120096266 | AUTHENTICATION SYSTEM - The authentication system includes a user node, a plurality of service nodes, an authentication database storage unit, an authentication unit, a user info nation database storage unit, and a key distribution unit. Each service node is configured to provide a service corresponding to its domain. The authentication database storage unit is configured to store a secret key of the user node for each domain. The user information database storage unit is configured to store an account used for associating a domain with the user node. The key distribution unit is configured to, upon receiving a domain change request from the user node and then confirming that the user information database stores the account associating the user node with a desired domain to which the user node intends to belong, obtain the secret key of the user node associated with the desired domain from the authentication database storage unit, and send the obtained secret key to the user node. The authentication unit is configured to create a session key, and encrypt the created session key with the secret key corresponding to the desired domain, and send the encrypted session key to the user node. | 2012-04-19 |
20120096267 | CREDENTIAL GENERATION SYSTEM AND METHOD FOR COMMUNICATIONS DEVICES AND DEVICE MANAGEMENT SERVERS - Systems and methods are described for establishing credentials at a device and at a device management server for the purpose of exchanging secure credentials in order to mutually authenticate the device and the server. A credential generation algorithm is described which uses a plurality of seeds, including the hardware identity of the device, the server identity, and a shared private key, to generate two sets of credentials, one to be used by the device and the other to be used by the device management server. The credentials are exchanged between the device and the server during any session, thereby assuring mutual authentication. | 2012-04-19 |
20120096268 | ELECTRONIC FILE SENDING METHOD - An electronic file sending method is provided to securely and easily send en electronic file to a receiver. A receiving apparatus receives from a sending apparatus an electronic mail including an encrypted electronic file. The sending apparatus uses a public key of a management server to encrypt a decryption password that is necessary to decrypt the encrypted electronic file and sends the encrypted decryption password to the management server. In association with a file identifier of the electronic file, the management server stores the decryption password and an electronic mail address of a correct receiver, who is a receiver of the receiving apparatus. The receiving apparatus sends to the management server the file identifier of the electronic file and the electronic mail address of the receiver. The management server uses a public key of the receiving apparatus to encrypt the password and sends the encrypted password to the receiving apparatus. | 2012-04-19 |
20120096269 | DYNAMICALLY SCALABLE VIRTUAL GATEWAY APPLIANCE - A Virtual Elastic Gateway Appliance (VEGA) that implements all the capability of a security gateway in a set of virtual appliances for operation in a virtualized, cloud environment is provided. The virtual appliances are divided into various components to provide key exchange and data protection in separate virtual appliances allowing each to be scaled elastically and independently. Security management of the virtual gateway is under control of the client while the cloud provider can meter use of virtual resources. Shared state operation and tunneled key exchange ensure robust operation in a dynamic environment. | 2012-04-19 |
20120096270 | END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY - End-to-end security between clients and a server, and traffic visibility to intermediate network devices, achieved through combined mode, single pass encryption and authentication using two keys is disclosed. In various embodiments, a combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag using an authentication key in parallel with the generation of the cipher text using an encryption key, where the authentication and encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in AES-GMAC mode Using a two key, single pass combined mode algorithm preserves network performance using a limited number of HW gates, while allowing an intermediate device access to the encryption key for deciphering the data, without providing that device the ability to compromise data integrity, which is preserved between the end to end devices. | 2012-04-19 |
20120096271 | Remote Access to Hosted Virtual Machines By Enterprise Users - An end user of an enterprise is enabled to receive secure remote presentation access to the assigned virtual machines in a hosted public cloud through the cloud provider's virtualization hosts and remote presentation gateway. Thus an enterprise administrator may purchase computing capacity from the cloud provider and further sub-divide the purchased computing capacity among enterprise end users. The cloud provider need not create shadow accounts for each end user of the enterprise. The cloud provider AD and the enterprise AD do not need to trust each other. The cloud provider also need not expose host information to the tenants. Authorization may be provided by using a combination of a custom authorization plug-in at the terminal services gateway and an indirection listener component at the virtualization host. The host details may also be abstracted when the client connects to the remote presentation gateway so as to protect the fabric from attack and enabling the tenant virtual machines to freely move across the cloud provider's virtualization hosts. | 2012-04-19 |
20120096272 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 2012-04-19 |
20120096273 | AUTHENTICATED ENCRYPTION FOR DIGITAL SIGNATURES WITH MESSAGE RECOVERY - A framework is proposed for authenticated encryption for digital signatures with message recovery whereby authentication is achieved without a redundancy requirement. The Elliptic Curve Pintsov-Vanstone Signature scheme is modified through the use of authenticated encryption, thereby enabling authentication using a message authentication code. The authenticated encryption may be performed within a single function or as two separate functions. The authenticated encryption may also be applied to associated data in the message to be signed. | 2012-04-19 |
20120096274 | AUTHENTICATED ENCRYPTION FOR DIGITAL SIGNATURES WITH MESSAGE RECOVERY - A framework is proposed for authenticated encryption for digital signatures with message recovery whereby authentication is achieved without a redundancy requirement. The Elliptic Curve Pintsov-Vanstone Signature scheme is modified through the use of authenticated encryption, thereby enabling authentication using a message authentication code. The authenticated encryption may be performed within a single function or as two separate functions. The authenticated encryption may also be applied to associated data in the message to be signed. | 2012-04-19 |