18th week of 2014 patent applcation highlights part 72 |
Patent application number | Title | Published |
20140122856 | MEMORY COMPATIBILITY SYSTEM AND METHOD - An apparatus including a first connector configured to fit into a first socket in a processing system, the first connector and first socket conforming to a first standard, a second socket configured to accept a memory module therein, the second socket and the memory module conforming to a second standard, a memory buffer module communicatively coupled to the first connector and the second socket, the memory buffer module configured to receive signals associated with the first standard from the first connector and output signals associated with the second standard to the second socket, and a virtualization module communicatively coupled to the memory buffer module, the first connector, and the second socket, the virtualization module configured to receive first initialization data associated with the second standard from the second socket and output second initialization data associated with the first standard to the processing system. | 2014-05-01 |
20140122857 | APPARATUS, SYSTEM AND METHOD FOR MOTHERBOARD PERSONALIZATION - An apparatus, system, and method are disclosed for motherboard personalization. An access module | 2014-05-01 |
20140122858 | METHOD FOR ACCELERATING BOOT-UP AND COMPUTER SYSTEM DEVICE - A method for accelerating boot-up and a computer system device are provided. The method includes following steps. An adjusting procedure/program is executed, and the adjusting procedure/program includes adjusting at least one target procedure/program to be at least one delay-executing procedure/program according to a default list. After a boot-up process of the computer system device is completed, and after a default waiting period has passed, the at least one delay-executing procedure/program is executed. Since the service and/or application procedures/programs irrelevant to the boot-up process are not executed during the boot-up process, the boot-up of the computer system device is accelerated effectively. | 2014-05-01 |
20140122859 | CONFIGURING CONFIGURATION SETTINGS USING A USER CONTEXT - An illustrative embodiment of a computer-implemented process for configuring configuration settings authenticates a user of a predetermined system to form an authenticated user and obtains configurable configuration settings associated with the authenticated user for the predetermined system to form obtained settings. The obtained settings are used in a further portion of a power-on process to configure the predetermined system, whereby configuring the predetermined system alters available resources and associated resource consumption of the predetermined system subject to the obtained settings. | 2014-05-01 |
20140122860 | CLOUD SYSTEM AND BOOT DEPLOYMENT METHOD FOR THE CLOUD SYSTEM - A cloud system and boot deployment method is provided to offer flexible and rapid host allocation and operating environment deployment. The cloud system comprises a boot server, a storage machine and a host. The required data for the boot deployment procedure is saved in the storage machine in advance. When the host is assigned the boot operation, a user makes a boot request via the management interface of the boot server to the host. The boot server sets up or transfers the file system according to user request and accesses corresponding images and root file system in the storage machine for performing the boot deployment procedure on the host. When there are different application service requests, the boot server respectively applied shared or proprietary images and root file systems for executing boot deployment operations according to each application request. | 2014-05-01 |
20140122861 | DYNAMIC TUNING OF INTERNAL PARAMETERS FOR SOLID-STATE DISK BASED ON WORKLOAD ACCESS PATTERNS - A system and method for tuning a solid state disk memory includes computing a metric representing a usage trend of a solid state disk memory. Whether one or more parameters need to be adjusted to provide a change in performance is determined. The parameter is adjusted in accordance with the metric to impact the performance of running workloads. These steps are repeated after an elapsed time interval. | 2014-05-01 |
20140122862 | CONFIGURATION FILE UPDATER - A method for updating configuration information includes, in a computing device including a processor, memory, and an operating system, initiating an update to at least one configuration setting of the computing device. The update may be downloaded from at least one update data source. The update may include configuration update data and configuration update metadata. The update may be verified by comparing the configuration update metadata with metadata associated with a current version of the at least one configuration setting. The update may be installed if it is verified. The update to the at least one configuration setting may be installed based on an intent from an unsecure component of the computing device. The unsecure component may include content consuming application installed on the device, a component of a computing platform of the device, and/or an update-seeker application installed on the device. | 2014-05-01 |
20140122863 | ACTIVITY ENABLED ACCESS - For activity enabled access, a method creates a schedule of a scheduled time that a physical condition is to be completed by a user. The method further measures the physical condition and sets a lock that prevents access to functionality at the scheduled time in response to the physical condition not exceeding a physical threshold. The method further releases the lock in response to the physical condition exceeding the physical threshold by the scheduled time. | 2014-05-01 |
20140122864 | RECONFIGURABLE SENSING PLATFORM FOR SOFTWARE DEFINED INSTRUMENTATION - A reconfigurable sensor front-end includes a logic block having a storage circuit to store hardware description information and a reconfigurable block including a plurality of circuits. The plurality of circuits are to be set in a first configuration based on the hardware description information and are to be set in a second configuration when the hardware description information changes. The first hardware description information corresponds to a first sensor and the changed hardware description information corresponding to a second sensor. | 2014-05-01 |
20140122865 | SYSTEMS AND METHODS FOR SPLIT PROXYING OF SSL VIA WAN APPLIANCES - The present invention is directed towards systems and methods for split proxying Secure Socket Layer (SSL) communications via intermediaries deployed between a client and a server. The method includes establishing, by a server-side intermediary, a SSL session with a server. A client-side intermediary may establish a second SSL session with a client using SSL configuration information received from the server-side intermediary. Both intermediaries may communicate via a third SSL session. The server-side intermediary may decrypt data received from the server using the first SSL session's session key. The server-side intermediary may transmit to the client-side intermediary, via the third SSL session, data encrypted using the third SSL session's session key. The client-side intermediary may decrypt the encrypted data using the third SSL session's session key. The client-side intermediary may transmit to the client the data encrypted using the second SSL session's session key. | 2014-05-01 |
20140122866 | Crypto Proxy for Cloud Storage Services - In one embodiment, a proxy receives, from a client node, a file to be stored by a cloud storage server, where the proxy and the client node are part of a private network that does not include the cloud storage server. The proxy retrieves an encryption key associated with a user of the client node and encrypts the file using the encryption key. The proxy then transmits the encrypted file to the cloud storage server. | 2014-05-01 |
20140122867 | ENCRYPTION AND DECRYPTION OF USER DATA ACROSS TIERED SELF-ENCRYPTING STORAGE DEVICES - A method and system for automated encryption and decryption of user data across tiered self-encrypting storage devices is disclosed. A storage tier is created using self-encrypting devices. When a user logs on to an enterprise, the enterprise gateway authenticates the user with login credentials. A protocol packet is sent over the IP network to the storage tiering software. The protocol packet contains the user credentials, the storage devices that are mapped into user account. The storage tiering software identifies the list of mapped drives and maps them into devices and blocks. Further, the storage tiering software cascades all devices that contain user data. Selective decryption of the user data is then performed and is stored in a cache of each device and this data will be ready for user to use. The decrypted data from the cache will be erased when user logs off the enterprise. | 2014-05-01 |
20140122868 | AUTHENTICATOR - According to one embodiment, a method for authenticating a device, wherein the device holds secret identification information, encrypted secret identification information, and key management information, and an authenticator holds an identification key, the method includes reading, by the authenticator, the encrypted secret identification information and the key management information from the device, and obtaining, by the authenticator, a family key by using the key management information, the family key being capable of being decrypted with the identification key. The method further includes obtaining, by the authenticator, the secret identification information by decrypting the encrypted secret identification information with the family key. | 2014-05-01 |
20140122869 | SYSTEM AND METHOD FOR PROVIDING A CERTIFICATE FOR NETWORK ACCESS - Provided is a system and method for providing a certificate, and more specifically a certificate for network access upon a second system. The method includes receiving from a user a request made with a first device for network access, the request including a voucher. At least one characteristic of the first device is also determined. Upon verification of the voucher and in response to the first device having at least one characteristic corresponding to at least one predefined device criteria, the user is provided with a certificate with at least one characteristic for network access. An associated system for providing a Certificate is also provided. | 2014-05-01 |
20140122870 | Utilizing X.509 Authentication for Single Sign-On Between Disparate Servers - An authentication scheme may be utilized for a single sign-on operation between servers. One or more servers (e.g., a SHAREPOINT server) receives a data request directed to a disparate server (e.g., an SAP server). A root certificate (e.g., an X.509 root certificate) is loaded for accessing the disparate server. A user certificate is dynamically generated for identifying a logged-in user. The user certificate is signed with the root certificate and sent to the disparate server for binding with the data request. The data request is sent to the disparate server for authentication using the user certificate. The disparate server accesses a mapping table to map a subject name in the user certificate. When an entry for the logged-in user is found in the mapping table, data operations are enabled between the servers. An open web protocol response containing the requested data is then received from the disparate server. | 2014-05-01 |
20140122871 | SECURITY INFORMATION SHARING SYSTEM AND EXECUTION METHOD THEREOF - The present invention provides a security information sharing system and an execution method thereof which realizes information sharing based on Internet or Local Area Network. The security information sharing system comprises at least a digital key and a digital box and has features as follows: (a) a certification program is executed by a terminal device with the digital key's USB connector inserted into the terminal device's USB port; (b) a data storage device is accessed by the terminal device via the network unit with the data storage device checked via terminal device's connection unit, the digital box's network unit, and a decoding program. | 2014-05-01 |
20140122872 | METHOD FOR EXPORTING ON A SECURE SERVER DATA COMPRISED ON A UICC COMPRISED IN A TERMINAL - A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC. | 2014-05-01 |
20140122873 | CRYPTOGRAPHIC ENFORCEMENT BASED ON MUTUAL ATTESTATION FOR CLOUD SERVICES - In accordance with embodiments disclosed herein, there are provided systems, apparatuses, and methods for implementing cryptographic enforcement based on mutual attestation for cloud services. For example, in one embodiment, such means may include receiving, at the service provider, a request from a client, the request being for services from the service provider to the client; sending to a trust broker, from the service provider, a trust policy of the service provider against which trustworthiness attributes and capabilities of both the service provider and the client are to be evaluated by the trust broker; receiving, at the service provider, a certificate from the trust broker attesting to compliance of the service provider with the trust policy; sending the certificate from the service provider to the client for affirming mutual attestation of both the service provider and the client in compliance with the trust policy according to evaluation by the trust broker; establishing a connection between the service provider and the client for the service provider to render the requested services to the client; and encrypting information exchanged between the service provider and the client in fulfillment of the request for services from the client. Other related embodiments are further described. | 2014-05-01 |
20140122874 | Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System - Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include identifying a Security Association (SA) between a User Equipment (UE) and a Proxy Call Session Control Function (P-CSCF) of an Internet Protocol (IP) Multimedia Subsystem (IMS) over a Gm interface during a registration procedure, correlating the SA with a ciphering key (CK) exchanged between the P-CSCF and a Serving CSCF (S-CSCF) of the IMS over an Mw interface during the registration procedure, and storing an indication of the correlated SA and CK in a deciphering record. | 2014-05-01 |
20140122875 | CONTAINER-BASED MANAGEMENT AT A USER DEVICE - An approach for facilitating container-based management at a user device is disclosed. In some embodiments, a request to establish a session between the user device and a network service may be provided to the network service. One or more session keys associated with the session and associated with a container at the user device may be obtained from the network service responsive to the session request. Storage, access, or a combination thereof of data at the user device may be effectuated, via the container at the user device, based on the session keys. | 2014-05-01 |
20140122876 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS - Portions of split data belonging to a set of data are sent over different data paths to their destinations. The data set is cryptographically spat into portions of the data set, and each portion is transported over a choice of multiple data paths to its destination. For example, a message is physically separated into portions of a message which are encrypted and sent over more than one network path to reach a destination. As a result, a snooper in a network may only be able view a partial set of random, disjoint, and incoherent portions of the message which are also encrypted. The portions of the message are split up in such a way that even if the snooper captured some of the portions of data, it would be difficult to reconstruct the message without also capturing most other partial portions of the message spread throughout the entire infrastructure of the network. | 2014-05-01 |
20140122877 | IMAGE FORMING APPARATUS, INFORMATION PROCESSING METHOD, AND CONTROL METHOD - An image forming apparatus using a service of a server apparatus decrypts encrypted common authentication information of the image forming apparatus based on secret key information for decrypting the common authentication information, and then requests encrypted individual authentication information of the image forming apparatus from the server apparatus based on decrypted common authentication information and identification information for identifying the image forming apparatus. The image forming apparatus obtains the individual authentication information from the server apparatus, requests the server apparatus for use permission information of the service based on the decrypted individual authentication information and on service use information, and obtains the use permission information from the server apparatus. | 2014-05-01 |
20140122878 | SECURITY MANAGEMENT IN M2M AREA NETWORK - The disclosure is related to a machine to machine (M2M) device and a security management method thereof. The M2M device includes an identification circuit. The identification circuit may be configured to encrypt data collected from a sensor with a device identification (ID) of the M2M device and at least one subscriber ID of the identification circuit and to generate a data packet in a predetermined communication standard format by including the encrypted data in a payload of the data packet. | 2014-05-01 |
20140122879 | SECURE COMPUTING SYSTEM - A secured computing system comprising a secure computing device capable of securing a host-computing device positioned nearby. The system further comprises a processing device, a battery charging circuit and a power measurement device, secured peripherals, radios such as 3G, 4G, Wi-Fi, Wi-Max, and LTE, a processing device to perform the required instructions and algorithms for configuring and performing security functions, processing device support components such as memory and co-processors to support the processing device. Finally, the system includes embedded software such as the source or executable files necessary to perform the instructions or algorithms to perform security functions. | 2014-05-01 |
20140122880 | System and Method for Facilitating Communications Based on Trusted Relationships - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for facilitating communications based on a trusted relationships. A system configured to practice the method first receives a communication request from a second communication device for a specific resource, wherein the communication request is based, at least in part, on trust information generated by a previously established trusted relationship. The system confirms, via an access to a trust database and using the trust information, (1) an identity of a sender of the communication request and (2) access permissions for a requested resource. Then, if the identity and the access permissions are confirmed, the system establishes communications between the first communications device and the second communications device in response to the communication request according to the specific resource. The trust information can include a trust user ID and a trust key. | 2014-05-01 |
20140122881 | METHOD AND SYSTEM FOR CONTROLLING A DEVICE - A system and method for controlling a device. Data that was encrypted using a first encryption scheme is decrypted, then re-encrypted using a second encryption scheme. The re-encrypted data is then decrypted. | 2014-05-01 |
20140122882 | METHODS AND APPARATUS FOR DATA SECURITY IN MOBILE AD HOC NETWORKS - Systems and techniques for key management in mobile ad hoc networks are described. Pseudonyms are defined for group members of mobile ad hoc networks such that a pseudonym in a message can be deterministically identified with the sending device only by the sending device and the message recipient. Key management for a group is performed by a group manager, and key management may include key renewal and revocation. Key renewal is performed by a group manager, with the group manager using a set of couple pseudonyms, including a couple pseudonym between the manger and each group member. Key renewal employs a renewal key used to encrypt the updated group key, and the group manager updates the group key be transmitting a message to each group member in proximity, with the message being identified using the couple pseudonym of the manager and the group member. | 2014-05-01 |
20140122883 | Secure Electronic Mail System - An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage. | 2014-05-01 |
20140122884 | Decoupled cryptographic schemes using a visual channel - A visual data transfer channel is established between a mobile device and a computing entity to facilitate a decoupled cryptographic scheme. The mobile device stores a private key. In operation, a first code is received by the mobile device over the channel. The first code encodes a cryptographic value that secures other information that has been received or generated at the computing entity. The mobile device private key is then applied to the cryptographic value to generate a second cryptographic value, which is encoded to generate a second code. The second code is then rendered on the mobile device display, from which it can then be transmitted back over the visual channel to the computing entity. At the computing entity, the second cryptographic value is recovered from the second code. | 2014-05-01 |
20140122885 | METHOD AND SYSTEM FOR MANAGING DEVICE IDENTIFICATION - The present disclosure provides a method and a system for managing the identification of devices (DID). A network device may provide the network device information to a server through a network. The server may generate a DID corresponding to the network device, and record the DID and the network device information into a device database. In addition, the network device and the server may share a shared key, which may be used to encrypt the DID and the network device information before the data transmission for enhancing security of the method. Moreover, the server may generate and record an exclusive key (Device Key) for data encryption before the data transmission with the network device, and transmit the Device Key to the network device. Therefore, the Device Key management may be accomplished simultaneously with the DID management to enhance data transmission security between the network device and the server. | 2014-05-01 |
20140122886 | DATA FEDERATION SYSTEM AND METHOD FOR SOCIALITY STORAGE SERVICE IN CLOUD COMPUTING - Provided is a data federation system for a sociality storage service in cloud computing, the data federation system including an instance management unit to collect instance information from a cloud system for integrating cloud storage services provided to individuals, a service authentication unit to authenticate a state of the cloud storage services using the collected instance information, a storage synchronization unit to integrate cloud storages to collect data of the authenticated cloud storage services, and an index management unit to organize the collected data based on a state value of at least one of a file and a folder in the integrated cloud storage. | 2014-05-01 |
20140122887 | INFORMATION PROCESSING APPARATUS, INFORMATION STORAGE APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD AND PROGRAM - There is provided an information processing apparatus including: a data processing unit, on which a medium as an information storage apparatus is mounted, which controls reproduction of content stored on the medium, wherein the data processing unit executes host device ID registration processing for outputting a host device ID, which is an identifier of the host device, to the medium and storing the host device ID on the medium, receives the host device ID, which is stored on the medium, from the medium after execution of the host device ID registration processing, executes connection consistency confirmation processing for executing matching processing between the received host ID and the host device ID of the host device, and executes or continues content reproduction under a condition that the matching processing has been established in the connection consistency confirmation processing, or stops the content reproduction if the matching processing has not been established. | 2014-05-01 |
20140122888 | METHOD FOR PASSWORD BASED AUTHENTICATION AND APPARATUS EXECUTING THE METHOD - Provided are an authentication method and an apparatus for the method. An authentication method includes generating, at a terminal, an identifier (ID)-based secret key using an ID of a user of the terminal and key generation factors exchanged with a server, encrypting, at the terminal, a password of the user using a symmetric key encryption algorithm taking the generated secret key as a symmetric key, and requesting authentication for the terminal user by transmitting the encrypted password to the server, and receiving, at the terminal, a response to the authentication request from the server. | 2014-05-01 |
20140122889 | SYSTEMS, METHODS, AND APPARATUS FOR MARKING, VERIFYING, AND AUTHENTICATING CONSUMER PRODUCTS - Methods for marking a consumer good at a distribution point are described that enable field authentication of the consumer good at an authentication point without connection to a remote database. Methods for authenticating a marked consumer good are described by scanning encrypted indicia without connecting to a remote database are described. Authentication methods for marked consumer goods, apparatus for carrying out the authentication methods, and systems based on the authentication methods are described. | 2014-05-01 |
20140122890 | METHOD AND SYSTEM FOR SECURING THE EXCHANGE OF DATA BETWEEN A CLIENT MODULE AND A SERVER MODULE - A method for securing the exchange of data between a client module and a server module includes steps where: the token module initializes a token and the client module sends the data, which includes a unique identifier and the initialized token to a first security module of the server module; the first security module and the second security module exchange security data bilaterally with one another; the server module transforms the received token; the client module receives the server data, verifies the token and transforms the latter; the client module sends the data, which includes the transformed token to the second security module of the server module, which receives the data, and verifies the identifier and the transformed token; and the second security module communicates with the destination module. | 2014-05-01 |
20140122891 | GENERATING A SECURE SIGNATURE UTILIZING A PLURALITY OF KEY SHARES - A method begins by a module to generate a secure signature on an item by selecting a first key representation index of a set of key representation indexes, wherein a first mathematical encoding of a private key generates a first plurality of key shares as a first key representation. The method continues with the module determining whether a first plurality of signature contributions have been received in response to a signature request for the item based on the first key representation index, wherein one of a first set of dispersed storage (DS) units executes a first mathematical signature function using one of the first plurality of key shares on the item to produce a signature contribution of the first plurality of signature contributions and when the first plurality of signature contributions have been received, generating the secure signature on the item from the first plurality of signature contributions. | 2014-05-01 |
20140122892 | INSURING INTEGRITY OF REMOTE PROCEDURE CALLS USED IN A CLIENT AND SERVER STORAGE SYSTEM - A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure specific parameters of an RPC and then encrypting the resulting hash value. The computed message integrity check is appended to the RPC to thereby provide a level of security approaching or equal to the level of Integrity defined by the RPCSEC_GSS protocol specification. | 2014-05-01 |
20140122893 | Multi-Tier Wireless Home Mesh Network with a Secure Network Discovery Protocol - An apparatus, system and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh networking environment comprising a collection of nodes that operate as a decentralized, ad hoc wireless network with multiple sub-networks or tiers that are responsible for different functions within the network. Each node of the multi-tier network is configured to forward data to other nodes and is assigned to a particular tier based on the node's performance capabilities. A further embodiment includes identification of a wireless home mesh network. Once identified, one or more proprietary messages may be exchanged in a secure manner to establish connections with a home electronics device as either a mobile node or a stationary node of the home network. A home electronics device may wirelessly communicate to route data within one or more nodes of the wireless home mesh network. Other embodiments are described and claimed. | 2014-05-01 |
20140122894 | PRINT MEDIUM, CARD CREATION METHOD, AND PROGRAM - There is provided a print medium, whereon a public key used for authentication in a public-key authentication scheme is displayed as character information. | 2014-05-01 |
20140122895 | Providing Security Support for Digital Rights Management in Different Formats - In accordance with some embodiments, technologies may be provided that is adaptable to any existing and potentially future digital rights management application. Thus, it is not necessary to provide duplicate systems to handle disparate digital rights formats in some embodiments. | 2014-05-01 |
20140122896 | DATA ENCRYPTION METHOD - A data encryption method, adapted to a node computing device in a cloud server system comprises following steps. A primary data is received. A dimension of an encrypted matrix is computed. An encryption length is computed, and data segments matching the encryption length are extracted from the primary data sequentially according to the encryption length. A plurality of encrypted segments is obtained by encrypting the extracted data segments respectively through the encrypted matrix. | 2014-05-01 |
20140122897 | SECURING DEVICE ENVIRONMENT FOR TRUST PROVISIONING - Integrity management architecture is extended with trusted hash provisioning. The trusted hash provisioning ensures the integrity of a computing device. Thus, a multipurpose device can be as secure as a dedicated single-purpose device. The trusted hash provisioning includes determining a hash mask, and computing a trusted hash computation based on signatures of components identified as included within the scope of the hash. The computed trusted hash computation is used to determine integrity of the computing device. | 2014-05-01 |
20140122898 | HASH VALUE GENERATION APPARATUS - For enabling improvement in throughput for generating a hash value, a hash value generation apparatus comprises: a θ operation unit configured to execute a θ operation included in a round process of a SHA-3 algorithm; a ρ operation unit configured to execute a ρ operation included in the round process; a π operation unit configured to execute a π operation included in the round process; a χ operation unit configured to execute a χ operation included in the round process; and an τ operation unit configured to execute an τ operation included in the round process, wherein the θ operation unit receives data for each sheet structure, and starts to execute the θ operation upon receiving data of three sheet structures. | 2014-05-01 |
20140122899 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, COMPUTER PROGRAM, AND INFORMATION PROCESSING SYSTEM - There is provided an information processing apparatus including circuitry configured to generate, in a state in which a function F which can calculate a same result for a plurality of different values x | 2014-05-01 |
20140122900 | PROVIDING SEARCHING OVER ENCRYPTED KEYWORDS IN A DATABASE - The present invention relates to a computer-implemented method, system and computer readable medium for providing a searching over encrypted keywords in a database. The method comprises the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to said keyword, storing said at least one encrypted keyword in said database; generating a plurality of different trapdoors for said keyword, verifying said plurality of different trapdoors with said plurality of different encrypted keywords corresponding to said keyword and determining said keyword if said plurality of different trapdoors match with one said encrypted keyword corresponding to said keyword else determining said keyword is not found. | 2014-05-01 |
20140122901 | Device and Method For Secure Memory Access - In a secure computing environment, a method, system and device are provided for loading stored encryption key data from a protected non-volatile memory of a portable device. A boot loader program is initiated after the portable device is powered on, encryption key data is loaded from the protected non-volatile memory of the portable device, and access to the protected non-volatile memory is disabled after a predetermined time after the portable device is powered on. In this way, the encryption key data is loaded from the protected non-volatile memory of a portable device before the boot operating system is loaded. | 2014-05-01 |
20140122902 | INFORMATION PROCESSING APPARATUS - According to one embodiment, a first processor of an information processing apparatus switches between a secure mode and a non-secure mode and reports its mode. When the first processor is in the secure mode, a second processor accesses to a protected area of a storage module. A boot program for the first processor and a program which activates the first processor in the non-secure mode are verified. Furthermore, a program which activates the first processor in the secure mode is encrypted, and its decryption key is stored in the protected area of the storage module. | 2014-05-01 |
20140122903 | SEMICONDUCTOR DEVICE AND ENCRYPTION KEY WRITING METHOD - A semiconductor device includes a CPU, an EEPROM, and a ROM. The ROM includes an encryption area and a non-encryption area and the encrypted firmware is stored in the encryption area. The semiconductor device includes a decrypter which holds the encryption key, decrypts the encrypted firmware, and supplies the decrypted firmware to the CPU. The EEPROM includes a system area to which an access from the CPU is forbidden in a user mode. The encryption key is divided into split keys of plural bit strings, and stored in the distributed address areas in the system area. An encryption key reading program which is not encrypted is stored in the non-encryption area of the ROM. Executing the encryption key reading program, the CPU reads and reconfigures plural split keys stored in the EEPROM in a distributed manner to restore the encryption key and supplies the restored encryption key to the decrypter. | 2014-05-01 |
20140122904 | DYNAMICALLY SCALING VOLTAGE/FREQUENCY - Disclosed are various embodiments providing processing circuitry that generates an output for each clock cycle of a clock signal using a logic block, the logic block being powered by a supply voltage. The processing circuitry detects whether the output has stabilized at a point in time before the end of a clock cycle of the clock signal, the point in time being based at least upon a delay line. In response to detecting whether the output has stabilized at the point in time, the processing circuitry dynamically adjusts at least one or the supply voltage or a frequency of the clock signal. | 2014-05-01 |
20140122905 | POWER START-UP DEVICE AND POWER START-UP METHOD - A power start-up device and a power start-up method are provided, wherein the power start-up device comprises a detecting module, a status control module, a prompt module and a power management module. The detecting module is used for detecting a power actuating signal caused by a power switch. The status control module is coupled to the detecting module, for receiving the power actuating signal, and determining a number of times of pressing the power switch and a period of pressing the power switch, in order to generate a prompt adjustment signal and a power control signal. The prompt module is coupled to the status control module, for receiving the prompt adjustment signal in order to send out and transform a user prompt signal. The power management module is coupled to the status control module, for controlling a power supply of a computer system according to the power control signal. | 2014-05-01 |
20140122906 | Data Center Uninterruptible Power Distribution Architecture - Apparatus and associated method and computer program products involve a highly efficient uninterruptible power distribution architecture to support modular processing units. As an illustrative example, a modular processing unit includes an corresponding uninterruptible power system in which only one AC-to-DC rectification occurs between the utility AC grid and the processing circuit (e.g., microprocessor) loads. In an illustrative data center facility, a power distribution architecture includes a modular array of rack-mountable processing units, each of which has processing circuitry to handle network-related processing tasks. Associated with each modular processing unit is an uninterruptible power supply (UPS) to supply operating power to the network processing circuitry. Each UPS includes a battery selectively connectable across a DC bus, and a AC-to-DC rectifier that converts an AC input voltage to a single output voltage on the DC bus. The regulated DC bus voltage may be close to the battery's fully charged voltage. | 2014-05-01 |
20140122907 | DEVICE WITH POWER CONTROL FEATURE INVOLVING BACKUP POWER RESERVOIR CIRCUIT - Power-backup capabilities are provided by implementing a variety of different methods, systems and devices. According to one such implementation, an energy storage device such as a capacitive storage circuit is powered relative to the powering of one or more additional circuits from a common power supply to limit the draw upon the power supply. Certain applications involve delaying or otherwise modifying the powering of the capacitive storage circuit, which may involve an initial startup of the capacitive storage circuit. | 2014-05-01 |
20140122908 | Hardware Automatic Performance State Transitions in System on Processor Sleep and Wake Events - In an embodiment, a power management unit (PMU) may automatically transition (in hardware) the performance states of one or more performance domains in a system. The target performance states to which the performance domains are to transition may be programmable in the PMU by software, and software may signal the PMU that a processor in the system is to enter the sleep state. The PMU may control the transition of the performance domains to the target performance states, and may cause the processor to enter the sleep state. In an embodiment, the PMU may be programmable with a second set of target performance states to which the performance domains are to transition when the processor exits the sleep state. The PMU may control the transition of the performance domains to the second targeted performance states and cause the processor to exit the sleep state. | 2014-05-01 |
20140122909 | HIGH VOLTAGE DEDICATED CHARGING PORT - Circuitry in an electronic device may be attached to external device, such as a power supply, to receive a voltage at a desired voltage level from the external device. The circuitry may assert one of several electrical configurations on the cabling that electrically connects the portable device to the external device to indicate to the external device a desired voltage level. | 2014-05-01 |
20140122910 | RACK SERVER SYSTEM AND OPERATION METHOD THEREOF - An operation method of a rack server system includes receiving power information for each of a plurality of nodes, calculating a maximum power consumption value of the rack server system and a total power consumption value of the nodes upon the power information, determining whether a ratio value between the maximum power consumption value and the total power consumption value exceeds a predetermined ratio value and adjusting operation statuses of the nodes, for making the rack server system enter a power saving mode when the ratio value does not exceed the predetermined ratio value. Further, a rack server system includes multiple nodes and a rack management controller. The nodes include a power supply, a base board management controller coupled to the power supply and a connection interface coupled to the baseboard management controller. The rack management controller is coupled to the baseboard management controller through the connection interfaces. | 2014-05-01 |
20140122911 | Electronic Device with Enhanced Method of Displaying Notifications - There is disclosed an electronic device comprising a receiver, a display, an application processor and a sensor hub. The receiver is configured to receive notifications from a remote device. The display is configured to provide information including notifications. The application processor and the sensor hub are in communication with the display. The application processor is configured to provide instructions for displaying full screen information at the display during a non-sleep mode of the electronic device. The full screen information includes a first notification associated with information received by the electronic device during the non-sleep mode. The sensor hub is configured to provide instructions for displaying partial screen information at the display during a sleep mode of the electronic device. The partial screen information includes a second notification associated with information received by the electronic device during the sleep mode. | 2014-05-01 |
20140122912 | INFORMATION PROCESSING APPARATUS AND OPERATION CONTROL METHOD - According to one embodiment, an information processing apparatus detects whether or not a person is in front of a screen of a display arranged on a front surface of a second housing. When the second housing is set at a first position where the screen of the display and an upper surface of a first housing are exposed, the apparatus enables a control function for controlling a state of the display to transit from an ON state to an OFF state based on the detection result. When the second housing is set at a second position where the screen of the display is exposed and at least a part of the upper surface is covered with a back surface of the second housing, the apparatus disables the control function. | 2014-05-01 |
20140122913 | DEBUGGING DEVICE - A debugging device includes a power detection unit used for detecting a power supply status of a power supply unit of a server to generate a power detection signal, a boot status detection unit, a control unit, a first display unit and a second display unit. The boot status detection unit is coupled to a control chip, for receiving a boot inspection signal to generate a boot status detection signal. The control unit is coupled to the power detection unit and the boot status detection unit, for receiving the power detection signal and the boot status detection signal to generate a plurality of first control signals and a second control signal. The first display unit is coupled to the control unit, for receiving and displaying the first control signals. The second display unit is coupled to the control unit, for receiving and displaying the second control signal. | 2014-05-01 |
20140122914 | VOLTAGE DETECTION SYSTEM FOR MEMORY MODULE - A voltage detection system for a number of memory slots includes a platform controller hub (PCH) chip and an integrated baseboard management controller (iBMC) chip. The PCH chip obtains a type of an actual voltage of each memory slot, and outputs a corresponding control signal to the iBMC chip. The iBMC chip obtains the type of the actual voltage of each memory slot according to the corresponding control signal, and diagnoses the memory set with the type of actual voltage type of the corresponding memory set. | 2014-05-01 |
20140122915 | Backplane Clock Synchronization - Techniques and systems for synchronizing a clock via a backplane. An apparatus includes a backplane, a clock coupled to or included in the backplane, a synchronization interface, and at least one processing element coupled to the clock via the backplane and coupled to or including the synchronization interface. The at least one processing element may be configured to compare first time information received from the clock via the backplane with second time information received from the synchronization interface. The second time information may be associated with an external clock. The at least one processing element may determine adjustment information based on the comparison and synchronize the clock with an external clock using the adjustment information, via the backplane. The apparatus may be a PXIe chassis. The clock output may be sent to modules plugged into the backplane in order to synchronize them with an external chassis clock, for example. | 2014-05-01 |
20140122916 | REDUCING THE OVERHEAD ASSOCIATED WITH FREQUENCY CHANGES IN PROCESSORS - In many cases, processors may change frequency sufficiently often to result in significant performance and power consumption losses. These performance and power consumption losses may be mitigated by changing the frequency using a squashing technique rather than using a phase locked loop technique. The squashing technique involves simply eliminated clock pulses to reduce the frequency. This can be done more quickly, resulting in less overhead in some cases. | 2014-05-01 |
20140122917 | ELECTRONIC DEVICE AND CLOCK RATES CONTROLLING METHOD OF OVERCLOCKING OPERATION - An electronic device and a method for controlling over clocking of CPU are provided. A temperature sensing element is coupled with the CPU and used for sensing the temperature of the CPU. A control circuit is coupled with the temperature sensing element and the CPU used for determining whether the temperature of the CPU is higher than a first threshold temperature. When the temperature of the CPU is higher than the first threshold temperature, the control circuit controls the CPU to enter an idle mode and determines whether the temperature of the CPU is lower than a second threshold temperature. When the temperature of the CPU is lower than the second threshold temperature, the CPU is controlled to return to a normal mode. The first threshold temperature is higher than the second threshold temperature, and the clock rate of the CPU is maintained at same clock rate. | 2014-05-01 |
20140122918 | Method and Apparatus For Web Based Storage On Demand - Rapid demanding for storage capacity at internet era requires a much flexible and powerful storage infrastructure. Present invention disclosed a type of storage system based a model of centrally controlled distributed scalable virtual machine. In this model, one or more service pools including virtual storage service pool and application service pools can be automatically created to meet the demands for more storage capacity from various applications. Specially this model provide a solid foundation for distributing storage volumes for supporting storage on-demand and sharing with exceptional management capabilities. In addition, this model provides a flexible fault recovery topology beyond the traditional recovery plan. | 2014-05-01 |
20140122919 | STORAGE SYSTEM AND DATA PROCESSING METHOD - The present invention comprises a management computer which exchanges information with storage apparatuses and host computers of primary sites and a secondary site via a management network and which manages a data processing performance and a data processing status of each of the sites, wherein, when any of the primary sites is subject to disaster, the management computer selects a normal primary site for which a data transfer time of a restoration target application is within a recovery time objective as a restoration site which possesses processing performance for restoring the application, and remote-copies restoration copy data, which exists at the secondary site, to the storage apparatus of the primary site selected as the restoration site, via a data network. | 2014-05-01 |
20140122920 | HIGH AVAILABILITY SYSTEM ALLOWING CONDITIONALLY RESERVED COMPUTING RESOURCE USE AND RECLAMATION UPON A FAILOVER - In one embodiment, a method determines a first set of virtual machines and a second set of virtual machines. The first set of virtual machines is associated with a first priority level and the second set of virtual machines is associated with a second priority level. A first set of computing resources and a second set of computing resources are associated with hosts. Upon determining a failure of a host, the method performs: generating a power off request for one or more of the second set of virtual machines powered on the second set of computing resources and generating a power on request for one or more virtual machines from the first set of virtual machines that were powered on the failed host, the power on request powering on the one or more virtual machines from the first set of virtual machines on the second set of computing resources. | 2014-05-01 |
20140122921 | DATA STORE CAPABLE OF EFFICIENT STORING OF KEYS - Embodiments relate to a computer implemented information processing system, method and program product for data access. The information processing system includes a data store having a top tier store and at least another tier store with the top tier store including a counter for each entry of a symbol and another tier store including a representative frequency value defined for the another tier store. A sorter is also provided configured to sort the symbol in the top tier store and the another tier stores according to a value generated in the counter for the assessed symbol. The said sorter is also configured to restore entry of the symbol in the top tier store, in response to a symbol having moved from said top tier store to another tier store, by using the representative frequency value defined for said another store to which said symbol was moved. | 2014-05-01 |
20140122922 | METHODS AND STRUCTURE TO ASSURE DATA INTEGRITY IN A STORAGE DEVICE CACHE IN THE PRESENCE OF INTERMITTENT FAILURES OF CACHE MEMORY SUBSYSTEM - Methods and structure for enabling re-training of a DDR memory controller in a storage device without loss of data in the DDR memory devices of the cache memory in response to detecting failure of the memory subsystem during operation of the storage device. In response to detecting a failure of the memory subsystem, the memory controller is reset without resetting the memory devices. The memory controller is then re-trained for operation with the memory device. During the re-training, self-refresh mode of the memory devices is disabled and manual refresh is performed by a processor of the storage device to thereby retain any user data in the memory device. | 2014-05-01 |
20140122923 | Sector Failure Prediction Method and Related System - A method and system is disclosed for identification and removal of a memory sector prone to failure. The method performs satisfaction checks on the memory sector and monitors and stores returned Unsatisfied Checks (USC) for analysis by a pattern recognition algorithm. Once a first global iteration is pattern matched with a second global iteration from the sector, the method determines the period of the repetitive pattern. The method then identifies, as the sector prone to failure, the sector having the defined pattern and period. Once identified, the method uses a power management scheme to remove the sector prone to failure from further use by the memory system and displays to a user the details of the action taken. | 2014-05-01 |
20140122924 | PROCESSING AN UNSUCCESSFUL WRITE REQUEST IN A DISPERSED STORAGE NETWORK - A method begins by a first device of a dispersed storage network (DSN), when a number of successful write requests of a set of write requests is equal to or greater than a threshold number but less than all, identifying one or more unsuccessful write requests of the set of write requests. The method continues with first device sending the one or more unsuccessful write requests to an auxiliary writing unit of the DSN. The method continues with the auxiliary writing unit, for an unsuccessful write request, identifying a storage unit of the DSN to produce an identified storage unit, sending the unsuccessful write request to the identified storage unit, and verifying successful execution of the unsuccessful write request by the identified storage unit. | 2014-05-01 |
20140122925 | VERIFYING DATA OF A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module of a storage unit receiving, over time, access requests regarding reading or writing of various data blocks. The method continues with the DS processing module establishing an internal verification access rate for verifying data blocks stored in a memory device of the storage unit based on a rate of the access requests and a maximum access rate of the memory device. The method continues with the DS processing module generating internal verification requests in accordance with the internal verification access rate, coordinating the internal verification requests and the access requests for accessing the memory device, and accessing the memory device based on the internal verification requests to verify the data blocks. | 2014-05-01 |
20140122926 | SIMULATION ENGINE FOR USE IN DISASTER RECOVERY VIRTUALIZATION - An approach is provided for determining disaster recovery capacity. A simulation hypervisor receives streaming metric data, which represents the current production workload of a primary site, from the primary site. The metric data is combined with production data of the backup site by the simulation hypervisor to simulate a recovery event. Using data from the simulating, disaster recovery planning can be performed. | 2014-05-01 |
20140122927 | METHOD AND SYSTEM FOR PROVIDING IMMUNITY TO COMPUTERS - A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and the type of package required to fix the error. The assessment module sends a request regarding the type of package required to fix the error to the recovery module. The recovery module sends the package required to fix the error to the maintenance module, which fixes the error in the system. | 2014-05-01 |
20140122928 | Network Processor Online Logic Test - A method of testing a multi-core network processor comprises placing the multi-core network processor in an online environment. A test is performed on a core of the multi-core network processor when the core is idle, and the core is released from the test when it is completed and resumes processing data in the online environment. In another embodiment, a network processor comprises a computer readable instructions module and a processing core. The computer readable instructions module is configured to store test instructions, and the processing core is configured to operate in an online environment and execute the test instructions to test the processing core when the processing core is idle. In yet another embodiment, an apparatus comprises a multi-core network processor that is configured to execute test instructions to perform a test on a core of the multi-core network processor when the core is idle. | 2014-05-01 |
20140122929 | DISTRIBUTED ON-CHIP DEBUG TRIGGERING - A method and apparatus for distributed on-chip debug triggering is presented. A first bus includes a plurality of lines and a debugging state machine configurable to monitor the plurality of lines of the first bus. One or more nodes are configurable to detect triggering events and provide, in response to detecting one or more triggering events, signals to the debugging state machine using a first subset of the plurality of lines that is allocated to the node(s). | 2014-05-01 |
20140122930 | PERFORMING DIAGNOSTIC TESTS IN A DATA CENTER - Diagnostic tests are performed in a data center that includes servers of various types and a management console, where each server provides an error log in a format specific to the type of the server. The management console receives an error log indicating an error produced by a hardware component, parses the error log into an error notification that describes the error and a type of the hardware component, and provides the error notification to other servers. Each of the other servers determines whether the server includes a hardware component of the same type, and if so, performs one or more diagnostic tests on the hardware component and reports results of the diagnostic tests to the management console. | 2014-05-01 |
20140122931 | PERFORMING DIAGNOSTIC TESTS IN A DATA CENTER - Diagnostic tests are performed in a data center that includes servers of various types and a management console, where each server provides an error log in a format specific to the type of the server. The management console receives an error log indicating an error produced by a hardware component, parses the error log into an error notification that describes the error and a type of the hardware component, and provides the error notification to other servers. Each of the other servers determines whether the server includes a hardware component of the same type, and if so, performs one or more diagnostic tests on the hardware component and reports results of the diagnostic tests to the management console. | 2014-05-01 |
20140122932 | ANALYSIS SYSTEM AND METHOD FOR INTELLIGENT CUSTOMER SERVICE BASED ON COMMON SEQUENCE PATTERN - The present invention provides a method and system for information analysis. The method extracts a plurality of metadata from a source information set so as to generate a metadata set, the metadata comprising error log information that forms an error sequence in the metadata set; and generates a common error sequence set for a plurality of the metadata sets. By means of the method, it is possible to easily obtain a global error sequence pattern, and easily compare a new error with a previous error sequence pattern so as to prevent, diagnose and recover the new error. | 2014-05-01 |
20140122933 | Method, Node, and Monitoring Center Detecting Network Fault - The present invention discloses a method, a node, and a monitoring center for detecting a network fault and relates to the field of network communications. The method includes: when a node receives a voice stream, receiving a source identifier, a codec type, and voice quality parameters; acquiring, according to the codec type and the voice quality parameters, a fault score corresponding to the node; and detecting, according to the fault score corresponding to the node, whether a network fault occurs on a network between the node and a source corresponding to the source identifier. The monitoring center includes: a first receiving module, a first acquiring module, and a first detecting module; and the node includes: a second acquiring module, a third acquiring module, and a second detecting module. In the present invention, a network fault that occurs on a network can be detected in time. | 2014-05-01 |
20140122934 | Data Synchronization Method and Apparatus - Embodiments of the present invention provide a data synchronization method and apparatus. The method includes: scanning a code to capture a synchronization instruction; replacing the captured synchronization instruction with a trap instruction; and when the code runs to the trap instruction, trapping a code execution right into a distributed shared memory (DSM) unit, where the DSM unit implements a concurrent multi-write protocol, but implements a single-write protocol when executing the synchronization instruction, thereby supporting the concurrent multi-write protocol and solving the synchronization problem caused by the concurrent multi-write protocol. | 2014-05-01 |
20140122935 | Diagnosing a Problem of a Software Product Running in a Cloud Environment - The present invention provides a method for diagnosing a problem of a software product running in a cloud environment and a corresponding apparatus, the method comprising: receiving a problem in the operation of the monitored software product from a diagnosis agent deployed on a node in the cloud environment; capturing the cloud environment including the software product, and deploying the captured cloud environment in a diagnosis cloud, and the step comprising: deploying the image of each node of the cloud environment in the diagnosis cloud; and applying corresponding configuration data for a cluster system deployed in the cloud environment to configure each node in the diagnosis cloud. The method and apparatus of the present invention can diagnose problems of a software product running in a cloud environment, and rebuild the cloud environment to facilitate the diagnosis of the problems. | 2014-05-01 |
20140122936 | AUTOMATED TOP DOWN PROCESS TO MINIMIZE TEST CONFIGURATIONS FOR MULTI-FEATURE PRODUCTS - Systems and methods of conducting interoperability assessments provide for generating a feature interoperability matrix based on feature data and interoperability data, wherein the feature data defines a plurality of features of a product and the interoperability data indicates levels of interoperability of the plurality of features. A validation set can be generated based on the feature interoperability matrix, wherein the validation set includes a plurality of feature combinations. A subfeature interoperability matrix can be used to convert the validation set into a test plan for the product, wherein the test plan minimizes test configurations for the product. | 2014-05-01 |
20140122937 | MONITORING METHOD AND APPARATUS FOR ARINC 653-BASED OPERATING SYSTEM - Disclosed herein is a monitoring method and apparatus for an ARINC 653-based operating system. In the monitoring method for an ARINC 653-based operating system according to the present invention, a client system transfers information about a breakpoint to a target system. The breakpoint information is set in the target system. A Micro Controller Unit (MCU) reads a Program Counter (PC). If the breakpoint information matches the PC, an interrupt is caused. A function contained in the breakpoint information matching the PC is executed. | 2014-05-01 |
20140122938 | TEST APPARATUS - A test apparatus for a server includes a first connection unit coupled to a mother board of the server, a second connection unit coupled to a device under test, a data transmission unit, a processing unit, and a network unit. According to a selection signal, the data transmission unit switches one of data transmission modes to perform data transmission between the first connection unit and the second connection unit. The processing unit controls the data transmission unit to perform a first test program for the mother board through the first connection unit, or perform a second test program for the device under test through the first connection unit and the second connection unit. The network unit receives a control signal generated by an external apparatus, so that the external apparatus controls the processing unit to perform the first test program and the second test program through the network unit. | 2014-05-01 |
20140122939 | Tracking Specific JAVA Native Interface Invocations of System and Library Calls - Methods and systems may track the invocation path of a system or a library call from Java native interface (JNI) in Java applications. A native call of interest having an associated failure condition, an invocation path associated with the native call of interest, and a Java boundary crossover method (Java method invoking a JNI method) within the invocation path may all identified based on failure diagnostic information. The identified information may also be fed to a Java virtual machine (JVM). When the application is re-run, a check can be made prior to execution of the JNI method, as to whether the Java boundary crossover method is being executed. If so, then the execution stack may be compared to the invocation path of interest. | 2014-05-01 |
20140122940 | RECORDING THE CORE DATA OF A COMPUTER PROCESS WHICH PROVIDES TRACE DATA - A method, apparatus and computer program for recording the core data of a computer process, the computer process comprising trace points and core data is provided for each such trace point. A first set of core data comprising an image of a memory for the computer process is stored in response to a first set of trace data being produced for the computer process for a first trace point. A second set of core data is stored in response to a second set of trace data being produced for the computer process for a second trace, where the second set of core data comprises a record of any change in current memory contents for the computer process with respect to the first set of core data. | 2014-05-01 |
20140122941 | AUXILIARY METHOD, APPARATUS AND SYSTEM FOR DIAGNOSING FAILURE OF VIRTUAL MACHINE - Embodiments of the present invention relate to an auxiliary method, apparatus, and system for diagnosing a failure of a virtual machine. An operation and maintenance system receives a failure message when a virtual machine fails; obtains running information of the virtual machine according to identifier information carried in the message, where the running information is used for diagnosing the failure of the virtual machine; generates graphic multi-dimensional display information of the virtual machine according to the running information; and sends the display information to a user end for displaying. The present invention provides an auxiliary method for diagnosing a failure of a virtual machine. The method may provide correlation analysis for diagnosing a failure of a virtual machine, allow the user end to diagnose the cause of the failure of the virtual machine in a comprehensive multi-dimensional manner, and improve the convenience and accuracy of diagnosing the virtual machine. | 2014-05-01 |
20140122942 | ERROR SIGNAL HANDLING UNIT, DEVICE AND METHOD FOR OUTPUTTING AN ERROR CONDITION SIGNAL - An error signal handling unit includes an error handler configured to receive an error signal indicating an error condition. The error handler is further configured to receive a recovery signal indicating a mitigation of the error condition or indicating that a mitigation of the error condition is possible. Furthermore, the error handler is further configured to output an error condition signal based on the error signal in response to a reception of the error signal if within a given delay time from the reception of the error signal, the error handler does not receive the recovery signal, and otherwise omit outputting the error condition signal. | 2014-05-01 |
20140122943 | COMPUTER-READABLE RECORDING MEDIUM, LOG ACQUISITION DEVICE, AND LOG ACQUISITION METHOD - According to one aspect, a non-transitory computer-readable recording medium stores therein a log acquisition program causing a computer to execute a process. The process includes receiving information for designating multiple functions of an application for which logs are to be acquired and designating a log detail level with respect to each of the multiple functions; and acquiring a log of the application with a corresponding log detail level with respect to each of the multiple functions designated. | 2014-05-01 |
20140122944 | Documentation of Faults in a Fault Memory of a Motor Vehicle - A process operates a communication network of a motor vehicle having a control device connected to a data bus. The process includes the steps of: a) determining a global supply voltage of the voltage source, b) checking whether the determined global supply voltage exceeds a specified upper voltage threshold or falls below a specified lower voltage threshold, c) providing information representing the determined global supply voltage and/or the exceeding or falling-below to control devices, d) when a fault is detected by a respective control device, checking by use of the provided information whether the global supply voltage exceeds or falls below the respective voltage threshold, and e) when an exceeding or falling-below the concerned voltage threshold by the global supply voltage is present, a respective control device, when detecting a fault, instead of information representing the detected fault, writes into its fault memory information representing the exceeding or falling-below the concerned voltage threshold by the global supply voltage as a possible cause of the fault. | 2014-05-01 |
20140122945 | VERIFICATION DEVICE, VERIFICATION METHOD AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a verification device includes an encoding rule generating unit, a test data generating unit, an error rule generating unit, a determined value generating unit, and a verifying unit. The encoding rule generating unit is configured to generate an encoding rule based on a definition document for a structured document. The test data generating unit is configured to generate test data in which all combinations of state transitions are expressed in bits in accordance with an encoding rule. The error rule generating unit is configured to add an error rule to the encoding rule. The determined value generating unit is configured to generate a determined value indicating whether a transition is normal. The verifying unit is configured to determine that a decoding device is not normal when the determined value and an output determined value resulting from inputting the test data to the decoding device are different. | 2014-05-01 |
20140122946 | NETWORK MANAGEMENT FOR WIRELESS APPLIANCES IN A MOBILE DATA NETWORK - A network management system utilizes an element manager at the RNC level to reduce the workload and efficiently manage multiple wireless appliances in a mobile data network. Management communications from the network management system flow through the element manager to all devices under the RNC level appliance hosting the element manager. The element manager provides for fault management, performance monitoring and configuration of the many breakout appliances and reports necessary information back to the network management system. | 2014-05-01 |
20140122947 | Sequential Circuit with Error Detection - Sequential circuits with error-detection are provided. They may, for example, be used to replace traditional master-slave flip-flops, e.g., in critical path circuits to detect and initiate correction of late transitions at the input of the sequential. In some embodiments, such sequentials may comprise a transition detector with a time borrowing latch. | 2014-05-01 |
20140122948 | MEMORY TEST SYSTEM AND MEMORY TEST METHOD - A memory test system and a memory test method are provided. The memory test system includes a control unit, a data reading channel, a data writing channel and a test channel. The control unit generates and outputs a first read and a first write command. The data reading channel and the data writing channel coupled to the memory unit, and the control unit respectively reads data from the memory unit at a first time and writes the data back to the memory unit at a second time according to the first read command and the first write command. The test channel receives the data from the data reading channel through an input end and outputs the data back to the data writing channel through an output end after a time delay. The time delay is substantially equal to a time interval between the first time and the second time. | 2014-05-01 |
20140122949 | EFFICIENT SCAN LATCH SYSTEMS AND METHODS - Systems and methods for latches are presented. In one embodiment a system includes scan in propagation component, data propagation component, and control component. The scan in propagation component is operable to select between a scan in value and a recirculation value. The data propagation component is operable to select between a data value and results forwarded from the scan in propagation component, wherein results of the data propagation component are forwarded as the recirculation value to the scan in propagation component. The control component is operable to control an indication of a selection by the scan in propagation component and the data propagation component. | 2014-05-01 |
20140122950 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE - A semiconductor integrated circuit device includes first and second semiconductor chips incorporated in one package. The first semiconductor chip is subjected to a scan test. The second semiconductor chip is connected to an input-output terminal of the first semiconductor chip inside the package. The first semiconductor chip includes an input-output circuit, an output state maintaining circuit, and an input switch circuit. The input-output circuit performs input and output of data through the input-output terminal. The output state maintaining circuit maintains an output state of the input-output circuit during execution of the scan test. The input switch circuit inputs the data supplied through the input-output terminal into the input-output circuit during a normal operation. The input switch circuit inputs any data into the input-output circuit during execution of the scan test. | 2014-05-01 |
20140122951 | SCAN TEST OF DIE LOGIC IN 3D ICs USING TSV PROBING - A test architecture for 3D ICs is provided in which Through-Silicon-Vias and die logic can be tested pre-bonding dies in the stack for the 3D ICs. Post-bond scan test architecture is reconfigured to be accessed during pre-bond testing through using stratigically placed MUXs and TSVs. By connecting post-bond architecture including scan flops and boundary registers to gated scan flops used in TSV testing, an internal chain of scan flops such as typically used in post-bond testing can be selectively connected to gated scan flops connected to one end of each TSV for pre-bond testing of the internal logic through the TSVs. | 2014-05-01 |
20140122952 | BOUNDARY SCAN CHAIN FOR STACKED MEMORY - A boundary scan chain for stacked memory. An embodiment of a memory device includes a system element and a memory stack including one or more memory die layers, each memory die layer including input-output (I/O) cells and a boundary scan chain for the I/O cells. A boundary scan chain of a memory die layer includes a scan chain portion for each of the I/O cells, the scan chain portion for an I/O cell including a first scan logic multiplexer a scan logic latch, an input of the scan logic latch being coupled with an output of the first scan logic multiplexer, and a decoder to provide command signals to the boundary scan chain. | 2014-05-01 |
20140122953 | BLOCKING THE EFFECTS OF SCAN CHAIN TESTING UPON A CHANGE IN SCAN CHAIN TOPOLOGY - A system comprises a plurality of components, scan chain selection logic coupled to the components, and override selection logic coupled to the scan chain selection logic. The scan chain selection logic selects various of the components to be members of a scan chain under the direction of a host computer. The override selection logic detects a change in the scan chain and, as a result, blocks the entire scan chain from progressing. | 2014-05-01 |
20140122954 | CORE CIRCUIT TEST ARCHITECTURE - A scan test architecture facilitates low power testing of semiconductor circuits by selectively dividing the serial scan paths into shorter sections. Multiplexers between the sections control connecting the sections into longer or shorted paths. Select and enable signals control the operation of the scan path sections. The output of each scan path passes through a multiplexer to compare circuits on the semiconductor substrate. The compare circuits also receive expected data and mask data. The compare circuits provide a fail flag output from the semiconductor substrate. | 2014-05-01 |
20140122955 | PRBS TEST MEMORY INTERFACE CONSIDERING DDR BURST OPERATION - A method of testing an interconnect between an electronic component and an external memory comprises receiving a data word having data bits and translating the data word into multiple cycles. The multiple cycles are transmitted through the interconnect to the external memory one after another such that a value of the data bit being transmitted is switched for each cycle. In another embodiment, an electronic component comprises an interface, a translation unit, and a test module. The translation module is configured to receive a burst from the external memory through the interface and is configured to translate the burst into a data word. The test module is configured to receive the data word from the translation module and is configured to compare the data word to a test pattern to detect an interconnect defect. | 2014-05-01 |