Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


18th week of 2011 patent applcation highlights part 75
Patent application numberTitlePublished
20110107092PERFORMANCE BASED AUTHENTICATION METHOD AND APPARATUS FOR SECURE COMMUNICATION - An apparatus includes a first module and a second module. The first module provides a challenge. The second module performs a signature function in response to the challenge. The first module authenticates the second module based on a time required by the second module to complete the signature function and/or an amount of power consumed by the second module to complete the signature function.2011-05-05
20110107093System and Method for Providing an User's Security when Setting-up a Connection Over Insecure Networks - A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.2011-05-05
20110107094DISTRIBUTED STORAGE NETWORK EMPLOYING MULTIPLE ENCODING LAYERS IN DATA ROUTING - A distributed storage processing unit creates multiple different data slices from the same data object, and generates a message including one or more of the different data slices. The distributed storage processing unit identifies a chain of distributed storage units, and encrypts the message into multiple nested layers using, for example, public keys of public/private key pairs associated with each of the storage units in the chain. The distributed storage processing unit sends the layered, encrypted message to the first storage unit in the chain, which decodes and removes the outermost layer, and forwards the message to the next storage unit in the chain. This process continues until the message reaches the endpoint distributed storage unit, which decodes the innermost layer and stores the data slice encoded in the message.2011-05-05
20110107095SYSTEM AND METHOD FOR OBTAINING AN AUTHORIZATION KEY TO USE A PRODUCT - A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based on a cryptographic algorithm.2011-05-05
20110107096Method, apparatus and system for managing DRM content - A method and an apparatus manages DRM (digital rights management) content with a forward lock so that the DRM content can also be used in other devices. The method comprises receiving DRM content with a forward lock from a content provider server. The DRM content is encoded by using an encoding key based on a user input such that the encoded DRM content cannot be decoded by another device without the encoding key. The encoded DRM content is transmitted to another mobile device after establishing a communication channel with the other mobile device.2011-05-05
20110107097METHOD FOR ENCODED DATA EXCHANGE AND COMMUNICATION SYSTEM - In a system and method for encrypted data exchange between entities (users) of a communication system using cryptography based on elliptic curves, in response to a challenge of a first user a scalar multiplication is calculated by the second user, wherein only part of the result of the scalar multiplication is sent back as response to the first user.2011-05-05
20110107098Methods and Systems for Controlling Traffic on a Communication Network - Methods and systems for controlling traffic on a communication network are provided. In accordance with some embodiments, methods for controlling traffic on a communication network are provided, the methods comprising—receiving, at a processor in a receiver, a query message for permission to send a data flow to the receiver; sending a permission message from the receiver; defecting that at least one of a message and a data packet being sent to the receiver has been dropped; and causing the path for sending the data flow to be changed.2011-05-05
20110107099PRE-AUTHENTICATION METHOD, AUTHENTICATION SYSTEM AND AUTHENTICATION APPARATUS - A pre-authentication method and an authentication system related to the mobile communications field are disclosed. The pre-authentication method includes: when a mobile node (MN) enters a visited network other than a home network, the MN obtains the identity information of the visited network, selects, according to the identity information of the visited network, a first pre-auth-key-file corresponding to the visited network and a first ticket corresponding to the visited network, where the first ticket carries the first pre-auth-key-file, and authenticates the visited authentication, authorization and accounting (VAAA) server according to the first pre-auth-key-file.2011-05-05
20110107100METHOD AND SYSTEM FOR PROVIDING SECURE CODES FOR MARKING ON ITEMS - A method and system for creating a group of marking codes for marking items in a code generation and validation system and validating the marking codes. The code generation and validation system includes a first subsystem and a second subsystem, where first and second keys in each of the subsystems are respectively used to encode a first input message in the first subsystem with an output message being the second input message in the second subsystem to solve the problem of data integrity of the validated data.2011-05-05
20110107101PASSWORD-AUTHENTICATED ASYMMETRIC KEY EXCHANGE - Communicating keys between network devices on a network using asymmetric cryptographic techniques, for which asymmetric keys may be derived from a single (same) password. Knowledge or partial knowledge of the password may be the only information shared between parties prior to execution of a key exchange, and may be the only criteria by which one party will base trust in the other. A first network device may encrypt a key using a password-based key derived from a password, and authenticate a second device based on the second network device's ability to decrypt the encrypted key using a key derived from the same password. Knowledge of the password may be conveyed by the second device to the first device—a session key may be generated as a function of the decrypted key, and a function of this session key may be communicated from the second device to the first device.2011-05-05
20110107102METHOD FOR AUTHENTICATING AN ENTITY BY A VERIFIER - A method for authenticating an entity by a verifier, the entity having an identifier, the verifier having a pair of private and public keys, comprising: sending to the entity a first random number selected by the verifier; a step wherein the entity encrypts a value by means of the public key of the verifier, said value including the first random number and an authentication datum on which the identifier of the entity depends; and the entity of said encrypted value sending a reply to authenticate said entity. The invention can be applied to the field of low-cost cryptography, especially the field of radio-identification.2011-05-05
20110107103SYSTEMS AND METHODS FOR SECURE DISTRIBUTED STORAGE - Embodiments relate to systems and methods for secure distributed storage. In aspects, a set of remote storage hosts, such as personal computers, servers, media devices, cell phones, or others, can subscribe or register to provide storage via a cloud-based or other distributed network. Source data from an originating computer, such as a data file, can be decomposed into data storage subunits, each of which is encrypted via a cloud management system or other logic or control. The data storage subunits can comprise data blocks or even or uneven size. The set of encrypted data storage subunits can be registered to a table or other record, and disseminated to the remote storage hosts. In the event of data loss at the originating computer or at other times, the remotely stored data storage subunits can be extracted, decrypted, and reassembled to reconstruct the original source data.2011-05-05
20110107104METHOD, SYSTEM, AND DEVICE FOR NEGOTIATING SA ON IPv6 NETWORK - A method, system, and device for negotiating a security association (SA) on an Internet Protocol version 6 (IPv6) network are disclosed. In this method, the initiator and the responder generate an SA through the interaction of two messages. Compared with the conventional procedure for setting up an SA based on the Internet Key Exchange Protocol (IKE), the interaction procedure in the present invention is simplified significantly. Therefore, the negotiation is faster and more convenient. In addition, with the present invention, cryptographically generated address parameters (CGA Params) are carried in the message and the CGA may be verified so that the invader cannot spoof the address.2011-05-05
20110107105MESSAGE SENDING/RECEIVING METHOD - Provided is a message sending method for sending a message by a process of a computer including a processor and a memory. The method includes the steps of: randomizing a signature generation key sk_s with a random number r to calculate a randomized signature generation key sk′_s=SigningKeyRandomize(sk2011-05-05
20110107106File-Distribution Apparatus and Recording Medium Having File-Distribution Authorization Program Recorded Therein - A file-distribution apparatus includes a file-distribution unit configured to distribute an image file received from an image-forming device to a terminal device, a source-reference-information storage unit configured to store source-reference authorization information, and a security-management unit configured to determine whether a source-apparatus identifier corresponding to the image file is included in the source-reference information, and thus permits distribution of the image file if the determination is affirmative, and denies distribution of the image file if the determination is negative.2011-05-05
20110107107Multisigning - A Protocol For Robust Multiple Party Digital Signatures - Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.2011-05-05
20110107108CONTENT RECORDER/PLAYER AND CONTENT WRITING AND READING METHOD - A content recorder/player. The content recorder/player includes a first data-storage medium including a first data-storage area, a second data-storage medium including a second data-storage area, and a control section. The control section is configured: to encrypt information groups having a predetermined relationship for writing into the first data-storage area; to generate and to encrypt an individual information group from which the information having the predetermined relationship is omitted, and to perform writing thereof into the second data-storage area; to read and to decrypt the individual information group, and to read and to decrypt an information group recorded on a first recording-destination location; and to restore, from an information group read from the second data-storage area, and from an information group read from the first data-storage area, an information group correlated with the content data based on the predetermined relationship, and to transmit the restored information group to an external device.2011-05-05
20110107109STORAGE SYSTEM AND METHOD FOR MANAGING DATA SECURITY THEREOF - A method for managing data security of a storage system includes dividing a storage unit of the storage system into a data access block and a key block. An encryption key input is used to set the encryption key, the data access block is encrypted using the set encryption key, and the set encryption key is stored in the key block. The data access block may be decrypted using the decryption key under the condition that the decryption key corresponds to the set encryption key.2011-05-05
20110107110INFORMATION PROCESSING APPARATUS, CONTROL METHOD AND COMPUTER-READABLE MEDIUM - An information processing apparatus that performs mapping of a data field in a database to a document template holding a variable area according to a mapping rule defined in the variable area, thereby generating print data for each record in the database, the information processing apparatus comprises: an accepting unit configured to accept designation from a user regarding whether or not to perform encryption of the data field referred to by the mapping rule, for each data field; a determination unit configured to determine whether or not to encrypt content that is to be applied to the variable area based on the data field for which encryption designation is accepted by the accepting unit and the mapping rule; and a generation unit configured to encrypt the content that is to be applied to the variable area and that is determined to be encrypted by the determination unit.2011-05-05
20110107111INFORMATION CARRIER COMPRISING ACCESS INFORMATION AND DUMMY INFORMATION - The invention relates to an information carrier for holding user information, the information carrier comprising access information for accessing the user information, the access information being stored in a pre-determined first region on the information carrier. The information carrier further comprises at least one further region different from the first region, the further region comprising dummy information.2011-05-05
20110107112DISTRIBUTED STORAGE NETWORK AND METHOD FOR ENCRYPTING AND DECRYPTING DATA USING HASH FUNCTIONS - A distributed storage network received a data segment. The data segment is partitioned into two or more portions. A first portion hash is calculated from the first portion of data and used to encrypt the second portion of data. A hash of the encrypted second portion of data is then used to either encrypt the next portion of data (in this case, a third portion of data) or to circle back to the beginning and encrypt the first portion of the data if the second portion of data is the last in data segment. This iterative process continues until all portions of the data segment are encrypted in a sequence. In essence, the data portions of the segment are sequentially processed in some order to encrypt the various portions in that progressing order. A reverse order is used to derive the hash values and decrypt the encrypted data portions into decrypted original data to recreate the data segment.2011-05-05
20110107113DISTRIBUTED STORAGE NETWORK DATA REVISION CONTROL - Multiple revisions of an encoded data slice are generated, with each revision having the same slice name. Each of the data slices represents the same original data portion, but each is encoded so that no single data slice can be used to reconstruct the original data portion. Appropriate revision numbers are associated with each encoded data slice, and the encoded data slices and associated revision numbers are transmitted for storage in selected storage units of a distributed storage network. If write confirmations are received from at least a write threshold number of storage units, a commit command is transmitted so that the most recently written data slices will be available for access. After a commit command is issued, a current directory used to access the encoded data slices can be sliced, encoded, and stored in the same way as the data slices.2011-05-05
20110107114ELECTRONIC DEVICE AND METHOD FOR SECURITY MONITORING THEREOF - A method for security monitoring of an electronic device includes determining whether a storage system of the electronic device is a secured storage system according to a signal of a first switch of the electronic device, determining whether an encryption key of the secured storage system is modifiable according to a detected signal of a second switch of the electronic device. Decrypting the secured storage system using a decryption key if the decryption key is the same as a preset decryption key in the secured storage system.2011-05-05
20110107115HARDWARE BASED P-STATE CONTROL - A performance state control system includes a processor and a voltage regulator coupled to the processor. The voltage regulator provides a regulated voltage to the processor, as instructed by the processor. A logic circuit coupled to the processor and the voltage regulator detects that the processor is in an operating power state, determines a time that the processor is in the operating state and instructs the processor to execute a performance state determination algorithm when the time that the processor is in the operating state exceeds a pre-determined threshold value.2011-05-05
20110107116System and Method for Power Over Ethernet Enabled Network Management - A system and method for power over Ethernet enabled network management. An intermediary device is positioned between a computing device and a network. The intermediary device can be designed to wake up a part of the computing device (e.g., network interface) through the application of power via power over Ethernet. The transition of the part of the computing device from a sleep state to an active state can facilitate the further initiation of a management function. For example, the transition of a network interface of the computing device from a sleep state to an active state can facilitate the processing of a wake on LAN message, retrieval of information, maintenance, or other communication need.2011-05-05
20110107117METHOD AND APPARATUS FOR ACTIVATING DEVICE - Method and apparatus for activating a slave device are provided. The method including: receiving communication medium scan signals comprising a slave device identifier; controlling a main power supply when the slave device is in an inactive state; determining whether the slave device is completely booted; and executing an upper layer communication when the slave device is completely booted.2011-05-05
20110107118SYSTEM AND METHOD FOR TESTING HYBRID SLEEP MODES OF AN ELECTRONIC DEVICE - A system and method for testing hybrid sleep modes of an electronic device sets a switch time of switching a suspending to RAM (S3) sleep mode to a suspending to disk (S4) sleep mode. A computer sends a power management event (PME) signal to control the electronic device to be in the S3 sleep mode. If a system time of the electronic device reaches a switch time of switching the S3 sleep mode to the S4 sleep mode, the computer detects if the electronic device is in the S4 sleep mode. If the electronic device is in the S4 sleep mode, the computer sends an awake signal to control the electronic device to be in a normal work mode. A display of the computer displays that the electronic device is in the S3 sleep mode, the S4 mode, or the normal work mode.2011-05-05
20110107119POWER SUPPLY APPARATUS, POWER RECEIVING APPARATUS, POWER SUPPLY SYSTEM, AND POWER SUPPLY METHOD - Provided is a power supply apparatus including a direct-current power source connected to a bus line on which an information signal representing information is superposed upon direct-current power including first direct-current power and second direct-current power, the direct-current power source arranged to always outputting to the bus line the second direct-current power of a positive voltage, the second direct-current power being superposed, on the bus line, upon the first direct-current power output for a predetermined first period. The voltage of the second direct-current power is lower than the minimum voltage of the first direct-current power.2011-05-05
20110107120INFORMATION PROCESSING APPARATUS, POWER SUPPLY CONTROL METHOD, PROGRAM AND POWER SUPPLY CONTROL SYSTEM - There is provided an information processing apparatus including a first connection unit with power supply type information, a second connection unit with power supply type information, a connection state determination unit for determining whether the connection states of the first and second connection units have changed, a power supply identification information acquisition unit for selectively acquiring the power supply type information from the first power supply apparatus and from the second power supply apparatus if the connection state determination unit determines that the connection states have changed, a power supply identification information management unit for managing connected-power-supply identification information, and a power supply control unit for controlling a feed from the power supply apparatuses connected to the first and second connection units and a charge on the first power supply apparatus connected to the first connection unit.2011-05-05
20110107121POWER SUPPLY AND COMPUTER HAVING EXTERNAL POWER SOURCE - A power supply having an external power source, for receiving a power energy of an input voltage and converting to an external power source and an internal power source which is used in a computer, is disclosed. The power supply includes a body, a power converting module disposed inside the body for receiving the power energy of the input voltage and converting to the external power source and the internal power source, a power input device connected to a power input terminal of the power converting module for transferring the input voltage to the powering converting module, an internal power output device connected to an internal power output terminal of the power converting module and a motherboard of the computer, and an external power output device having one end connected to an external power output terminal of the power converting module and having the other end connected to a computer body of the computer or outside of the body, for transferring the external power source to a portable electronic apparatus.2011-05-05
20110107122POWER SUPPLY AND POWER SUPPLY SYSTEM INCORPORATING A PLURALITY OF POWER SUPPLIES - Disclosed is a power supply for receiving an input voltage and generating an output voltage and an output current, which includes a power converter for receiving the input voltage and generating an intermediate output voltage, an output protection circuit connected to an output terminal of the power converter and including a plurality of switch circuits connected in parallel with each other. The output protection circuit is configured to limit the flowing direction of the output current by the switching operations of the switch circuits. The power supply further includes a control unit connected to the output protection circuit for issuing a plurality of control signals to the switch circuits, in which at least two of the control signals are set to allow at least two of the switch circuits to be turned off with different timings.2011-05-05
20110107123POWER CONTROL SYSTEM FOR DISTRIBUTING POWER TO POWER DEMANDING FACILITY - A power control system includes a distribution unit distributing power supplied from a power system to a plurality of power demanding facilities, and a measurement unit measuring a value of running power between the power system and the distribution unit. A power control instruction is transmitted to a power demanding facility in the event of the condition of TLP2011-05-05
20110107124METHOD AND SYSTEM FOR DISCOVERING A POWER SOURCE ON A PERIPHERAL BUS - Improved techniques to recognize a power source on a peripheral bus and/or determine power available from the power source via the peripheral bus are disclosed. Typically, the peripheral bus is supported by a cable connected between a host device and an electronic device. In this case, the host device is a power source (e.g., power adapter or battery pack) and the cable is used to provide power from the power source to the electronic device. Hence, by understanding the power available from the power source, the electronic device can manage its power utilization so as to operate in a stable and reliable manner. The electronic device is, for example, a portable computing device. Examples of portable computing devices include a Portable Digital Assistant (PDA) and a portable media player.2011-05-05
20110107125COMPUTER SYSTEM - A computer system includes a monitor, and a motherboard. The monitor includes a display screen, a switch set on the monitor, and a first video connector. The first video connector includes a first monitor identity pin, and a first ground pin. The motherboard includes a second video connector. The second video connector includes a second monitor identity pin electrically connected to the first monitor identity pin, and a second ground pin electrically connected to the first ground pin. The second monitor identity pin and the second ground pin are correspondingly connected to a power signal line and a ground line of the motherboard. The switch is connected between the first monitor identity pin and the first ground pin, to control the motherboard to power on or power off.2011-05-05
20110107126System and method for minimizing power consumption for a workload in a data center - A system and method are disclosed for minimizing power consumption for a workload in a data center having two or more computers. The system and method execute a server-centric management tool that provides a workload-power cost function to predict a cost of running a workload on a server. The workload-power cost function is executed by the processor and includes as an input a unique designation of the server. The workload-power cost function includes as an output the cost of running the workload on the server. The system and method provide the output of the workload-power cost function to a workload placement tool to efficiently place the workload.2011-05-05
20110107127NETWORK RELAY APPARATUS - A network relay apparatus which conducts data transfer by using a plurality of network LSIs includes a transfer engine unit having at least two network LSIs and a central control unit which controls the operation state of the network relay apparatus. The transfer engine unit includes the network LSIs capable of changing over at least one of a clock and an operation which differ every function block, a load judgment unit for judging a load laid upon each of function blocks in the network LSI, and a frequency voltage control unit for individually changing over at least one of the clock and operation voltage supplied to each function block on the basis of the load judged by the load judgment unit.2011-05-05
20110107128IMAGE FORMING APPARATUS - Provided is an image forming apparatus that realizes a distributed control system with a reduced number of power lines, and that has highly reliable power supply and an effective power saving mode. To accomplish this, the image forming apparatus employs a distributed control system including a master CPU, a plurality of sub master CPUs, and a plurality of slave CPUs. The master CPU supplies 5-V power to the sub master CPUs and the slave CPUs in the power saving mode, and supplies 24-V power thereto in a normal mode. Also, the sub master CPUs determine the operating mode in accordance with the level of the supplied power voltage, and operate accordingly.2011-05-05
20110107129METHODS AND APPARATUS FOR LOAD-BASED POWER MANAGEMENT IN A STORAGE SYSTEM - Apparatus and method for managing power consumption of circuits within a Serial Attached SCSI (SAS) device. A SAS device having a plurality of PHY logic circuits includes a queue manager and a power manager. The queue manager is operable to determine a current workload based on queued entries for the plurality of PHY logic circuits. Based on the current workload, the power manager is operable to set identified ones of the plurality of PHY logic circuits into a low power mode. In some embodiments, PHY logic circuits may be restored to full power operation responsive to changes in the current workload and/or responsive to receipt of a signal from another SAS device coupled to the SAS device. In other embodiments the power manager is further operable to manage power consumption of link and/or DMA logic circuits of the SAS device.2011-05-05
20110107130METHOD AND DEVICE FOR WAKING USERS OF A BUS SYSTEM, AND CORRESPONDING USERS - A device for waking up users of a bus system includes an evaluator having at least one clock-pulse generator and configured to selectively evaluate the wake-up information used to activate the users. The wake-up information to be evaluated has the structure of a standard CAN message. The activating procedure is initiated only in response to the presence of wake-up information that is specified for the respective user.2011-05-05
20110107131SAVING POWER WHEN IN OR TRANSITIONING TO A STATIC MODE OF A PROCESSOR - A method for reducing power utilized by a processor including the steps of determining that a processor is transitioning from a computing mode to a mode is which system clock to the processor is disabled, and reducing core voltage to the processor to a value sufficient to maintain state during the mode in which system clock is disabled.2011-05-05
20110107132METHOD FOR DETECTING THE IMPROPER REMOVAL OF ELECTRONIC EQUIPMENT - A method for detecting an improper removal of the electronic equipment. In the method, having received a command from a higher-level device, the electronic equipment (card reader) executes processing operations in accordance with the command. The electronic equipment includes a first RAM for saving electronic information including the confidential data, a detection means (such as a switching circuit) for detecting the improper removal of the electronic equipment, a power supply control IC for shutting off a power supply to the RAM in accordance with a signal coming from the detection means, and a second RAM being separate from and independent of the first RAM. Data saved in the RAM is not deleted even if the power supply is shut off by the power supply control IC. Then, the detection means is activated after the confidential data saved in the first RAM is copied to the second RAM.2011-05-05
20110107133SYSTEM AND METHOD FOR IMPLEMENTING A CLOUD COMPUTER - One embodiment is a clocking system for a computing environment. The system comprises a first set of processes executing in a first computing environment; a first local clock mechanism associated with the first set of processes; and a first communications channel for connecting the first local clock mechanism with the first set of processes. The first local clock mechanism stores clock rates of the first set of processes, wherein each clock rate is specified by function and source and destination combination, the first local clock mechanism further coordinating the clock speeds of the first set of processes as necessary.2011-05-05
20110107134INFORMATION RECORDING MEDIUM, METHOD FOR RECORDING INFORMATION ON INFORMATION RECORDING MEDIUM, METHOD FOR REPRODUCING INFORMATION FROM INFORMATION RECORDING MEDIUM, AND METHOD FOR MANUFACTURING INFORMATION RECORDING MEDIUM - The present invention provides a measure for getting read/write control information stored within a space of a predetermined size in a format that ensures compatibility with media of a lower order or an older generation even if the size of the read/write control information increases significantly as the storage densities of information storage media rise in the near future. On an information storage medium, a data sequence is writable as a combination of marks and spaces. The medium has at least one information storage layer, which has an information storage area to store information and a control information area for use to perform a read/write operation on the at least one information storage layer. The control information area stores at least one set of control information, which includes a first kind of write pulse information including information to be used as a reference value and a second kind of write pulse information including information to be used as an offset value. If the pulse width or pulse position of a write pulse is definable with a precision of 1T/n (where T is a channel clock pulse width and n is a positive integer), the size of the offset value is large enough to define at least an n/2 range.2011-05-05
20110107135INTELLIGENT ROLLING UPGRADE FOR DATA STORAGE SYSTEMS - Various method, system, and computer program product embodiments for facilitating upgrades in a computing storage environment are provided. In one such embodiment, one of an available plurality of rolling upgrade policies registering at least one selectable upgrade parameter for an upgrade window is selected. A node down tolerance factor is set for at least one node in the computing storage environment. The node down tolerance factor specifies a percentage of elements of the at least one node taken offline to apply the selected one of the available plurality of rolling upgrade policies during the upgrade window.2011-05-05
20110107136Fault Surveillance and Automatic Fail-Over Processing in Broker-Based Messaging Systems and Methods - An exemplary method includes attempting, by a message broker subsystem, to deliver one or more messages intended for a recipient software application to the recipient software application during a predetermined fault interval, determining, by the message broker subsystem, that the recipient software application is in a fault state after failing to deliver the one or more messages to the recipient software application during the predetermined fault interval, and automatically performing, by the message broker subsystem, a fail-over process on one or more other messages intended for the recipient software application in response to the determination that the recipient software application is in the fault state. Corresponding methods and systems are also disclosed.2011-05-05
20110107137System and method for providing automated support to electronic devices - A system and method for providing automated support services includes at least one electronic device that experiences an error condition. An error notification regarding the error condition is then provided to a support server. The support server assigns an error identifier to the error condition, and provides the error identifier to the electronic device. The support server also creates a solution map that associates the error identifier with a solution identifier corresponding to an effective solution for the detected error condition. A solution database is implemented to store the solution to the error condition. A solution manager of the electronic device may then utilize the error identifier to automatically identify, download, and install the solution from the solution database to thereby remedy the error condition.2011-05-05
20110107138SERVER SWITCHING METHOD AND SERVER SYSTEM EQUIPPED THEREWITH - There is disclosed a high speed switching method for a disk image delivery system fail-over. A management server sends a disk image of an active server in advance to a standby server. When receiving a report that the active server has failed, the management server judges whether or not it is possible for the standby server to perform the service of the failed active server based on service provision management server information held by the management server and if possible, instructs the standby server to perform the service of the active server. Even if the disk image delivered in advance is different from the disk image of the failed active server, switching of the service to the standby server can be performed more quickly through resetting the setting values of unique information and installing the additional pieces of software on the standby server by the management server than redelivering an appropriate disk image.2011-05-05
20110107139TIMER BOUNDED ARBITRATION PROTOCOL FOR RESOURCE CONTROL - Example apparatus, methods, and computers prevent a split brain scenario in a pair of high availability servers by maintaining single writer access to a resource by controlling the resource according to a timer bounded arbitration protocol that controls self-termination of a writer process. One example method includes monitoring control of an arbitration (ARB) block by an active file system manager (FSM) and selectively causing a selection of a standby metadata controller (MDC) when control of the ARB block does not satisfy the timer bounded ARB protocol. The example method also includes selectively forcing a hardware reset of an apparatus running the active FSM and selectively establishing an FSM on a selected redundant MDC as a replacement FSM.2011-05-05
20110107140SELECTIVE WRITE PROTECT FOR DISASTER RECOVERY TESTING - Various method, system, and computer program product embodiments for implementing selective write-protect by a processor in a data storage system within a plurality of redundant storage systems for disaster recovery testing are provided. In one such embodiment, a write-protect state is initiated within at least one of the plurality of redundant storage systems. An available plurality of categories, including at least one write-protect exclusion category, is configured within a management interface of the data storage system, such that during the disaster recovery testing a storage volume categorized in the write-protect exclusion category is excluded from write protection.2011-05-05
20110107141DATA STORAGE DEVICE, CONTROLLER, AND DATA ACCESS METHOD FOR A DOWNGRADE MEMORY - The invention provides a data storage device. In one embodiment, the data storage device is coupled to a host, and comprises a downgrade memory and a controller. The downgrade memory comprises a plurality of blocks, wherein each of the blocks comprises a plurality of pages, each of the pages comprises a plurality of sectors, and some of the sectors are defect sectors. The controller generates a defect table for recording a plurality of defect addresses of the defect sectors in the blocks, receives a plurality of data sectors to be written to the downgrade memory from the host, determines a plurality of first physical sector addresses for storing the data sectors according to the defect table, and sends write commands to the downgrade memory to direct the downgrade memory to write the data sectors to the downgrade memory according to the first physical sector addresses.2011-05-05
20110107142ULTRASONIC DIAGNOSTIC METHOD AND SYSTEM FOR SUPPORTING SELF DIAGNOSIS AND RESTORATION FUNCTION - An ultrasonic diagnostic method and system are provided. The ultrasonic diagnostic method includes performing booting of a system using a kernel, after a Basic Input/Output System (BIOS) is executed and an error is not recorded in a memory; recording an error in the memory when the error occurs in executing an ultrasonic diagnostic program; transmitting the recorded error to a server via a network; and receiving, from the server, a recovery file used to restore the ultrasonic diagnostic program, and restoring the ultrasonic diagnostic program using the received recovery file.2011-05-05
20110107143CACHE SYSTEM - A write-back cache system includes: a dirty bit section configured to store a dirty indication data indicating that cache data is in a dirty state; and an OR calculation circuit connected with a front-stage to the dirty bit section. The OR calculation circuit includes: a first input node configured to receive a write request signal indicating a write request of a cache data; a second input node configured to receive a correctable error determination signal of the cache data indicating that a correctable error is present in the cache data; and an output node configured to output a signal such that the dirty indication data is stored in the dirty bit section, when receiving at least, one of the write request signal and the correctable error determination signal.2011-05-05
20110107144STORAGE CONTROLLER AND DATA ERASING METHOD FOR STORAGE DEVICE - A storage controller changes a block size to carry out a shredding process. A data shredder uses a large block size BSZ2011-05-05
20110107146Trace Reconstruction for Silicon Validation of Asynchronous Systems-on-Chip - A test system collects passing event data and failing event data, and merges the collected data into passing subsequences and failing subsequences, respectively. The test system identifies an overlap area between the passing subsequence and the failing subsequence in regards to time slices and tracepoint slices, and creates passing transactions and failing transactions using the event data corresponding to the overlap area. Next, the test system detects a timing discrepancy between the first passing transaction relative to the second passing transaction compared with the first failing transaction relative to the second failing transaction. The test system then reports the detected timing discrepancy, which allows a test engineer to perturb the test program in order to more frequently catch intermittent failures caused by asynchronous timing conditions.2011-05-05
20110107147APPLICATION PORTAL TESTING - A first test script that includes at least one first step for executing a test of a test portal is provided in a computing device. An indication that an event has occurred in response to the test is received in the computing device. A second test script that includes at least one second step for executing the test is generated in the computing device, the at least one second step being at least in part a response to the event.2011-05-05
20110107148FAULT MANAGEMENT IN VIRTUAL COMPUTING ENVIRONMENTS - A method and system for fault management in virtual computing environments are provided. The system includes: a monitor of fault events from virtual machines and host devices in a virtual computing environment and a monitor of situation events in the virtual computing environment wherein the situation events refer to a virtual machine name and a host device name. A universal faults component determines if a fault event affects both virtual machines and host devices and a correlating component correlates fault events relating to virtual machines and host devices as relating to the same problem. Host machine fault events correlated to a problem are marked as a root event and virtual machine fault events correlated to a problem are marked as symptoms with a link to the root event.2011-05-05
20110107149METHOD AND APPARATUS FOR IDENTIFYING ACCESS STATES FOR VARIABLES - A method, apparatus, and computer instructions in a processor for selectively performing operations on data. An operation to be performed on data is identified to form an identified operation. A determination is made as to whether metadata identifying a state of the data is associated with the data. A determination is made as to whether the identified operation can be performed on the data based on the state of the data, in response to the metadata being associated with the data. The operation is performed on the data if the state of the data allows for the operation to be performed. The processor selectively performs the operations based on the state of the data.2011-05-05
20110107150GOVERNANCE IN WORK FLOW SOFTWARE - The disclosure presents categorization of users into groups comprising expert users and novice users. A system and method analyzes the users' inputted data in helpdesk troubleshooting software to determine the deviation of novice users from expert users, or the deviation of novice users to a preconfigured behavior as determined by management policy. Other embodiments are also disclosed.2011-05-05
20110107151Method and System of Deadlock Detection in a Parallel Program - A method and system of deadlock detection in a parallel program, the method comprising: recording lock events during the operation of the parallel program and a first order relation among the lock events; converting information relevant to the operation of the parallel program into gate lock events and recording the gate lock events; establishing a second order relation among the gate lock events and lock events associated with the gate lock events and adding the second order relation to the first order relation; constructing a lock graph corresponding to the operation procedure of the parallel program based on the added first order relation; and performing deadlock detection on the constructed lock graph. The deadlock detection method of the invention can improve the accuracy of deadlock detection without depending on the deadlock detection algorithm per se, and can be applied with facility to various development environments and reduce development costs.2011-05-05
20110107152METHODS AND SYSTEMS FOR MONITORING QUALITY OF A VIDEO/AUDIO PLAYBACK DEVICE - A computer-implemented method, executable software product, and system for performing a test of an audio/video playback device are described. The audio/video playback device includes at least one main processor, interfaces, and additional processors. The main processor(s) communicate with the additional processors through the interfaces. The method, software product, and system include monitoring at least part of the interfaces for communications between the main processor(s) and the additional processors. The method, system and software product also include storing the communications in a raw format during the test. The method, software product and system also include translating the communications from the raw format to human-readable format after the test concludes and displaying the human-readable format of the communications. In some aspects, the method and system also include reading and storing run time data during the test such that the reading and storing is Heisenberg-friendly.2011-05-05
20110107153SYSTEM AND METHOD FOR MONITORING EXPLORATORY TESTING BY A PLURALITY OF TESTERS - A system and method for monitoring exploratory testing by a plurality of testers of software containing a graphical user interface is disclosed. The method includes recording interactions of each of the plurality of testers with a graphical user interface (GUI) under test. The recorded interactions of each tester can be stored in an interaction database. An interaction footprint map is created from the interaction database to show which portions of the GUI under test have had interaction with at least one of the testers. The interaction footprint map is displayed in relation to the GUI for at least one end user.2011-05-05
20110107154SYSTEM AND METHOD FOR AUTOMATED AND ADAPTIVE THRESHOLD SETTING TO SEPARATELY CONTROL FALSE POSITIVE AND FALSE NEGATIVE PERFORMANCE PREDICTION ERRORS - Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.2011-05-05
20110107155NETWORK FAULT DETECTION APPARATUS AND METHOD - A network fault detection apparatus includes: data distribution learning units (2011-05-05
20110107156COMPUTER, COMPUTER SYSTEM, AND APPLICATION EXECUTION METHOD - A computer receives one or more processing requests from at least one or more clients through a network and executes an application for processing the received processing requests using a Java servlet. The processing requests each contain one or more addresses as the destinations of the processing requests. The computer is connected to a database including the following information: application information in which an identifier that uniquely identifies each application and binary logic for executing the application are brought into correspondence with each other; and adapter information in which the identifier and each of the addresses are brought into correspondence with each other. When the computer receives the processing request, it identifies the binary logic based on an address contained in the received processing request and executes the identified binary logic and thereby executes the application.2011-05-05
20110107157REGISTER ACCESS CONTROL METHOD AND CIRCUIT - A register access control circuit and method includes extracting data written to a plurality of registers by specifying the common address in response to read access to a common address, comparing the data extracted from the respective registers, and outputting the data extracted from one of the registers as read data when the data extracted from the respective registers match.2011-05-05
20110107158RADIATION-HARDENED PROCESSING SYSTEM - A processing system including an FPGA having a dual port RAM and for use in hostile environments. The FPGA includes three portions: a C&DH portion; a first scratch pad portion receiving a first set of data, processing the first set of data, and outputting a first set of processed data to a first location of the RAM; and a second scratch pad portion receiving a second set of data identical to the first set of data, processing the second set of data in the same way that the first set of data is processed, and outputting a second set of processed data to a second location of the RAM. The C&DH portion compares the first set of processed data to the second set of processed data and, if the first set of processed data is the same as the second set of processed data, outputs one set of processed data.2011-05-05
20110107159METHODS AND APPARATUS FOR DETECTING REMOTE CONTROL ERRORS IN CONTROLLED DEVICES - Apparatus, systems and methods are described that facilitate the detection of errors within a remote control for a controlled device. A remote control detects an error condition during operation and transmits information regarding the error to a controlled device. The information regarding the error may be analyzed to determine the source of the problem in the remote control and/or possible solutions.2011-05-05
20110107160TIME-BASED TECHNIQUES FOR DETECTING AN IMMINENT READ FAILURE IN A MEMORY ARRAY - A technique for detecting an imminent read failure in a memory array includes determining a first incident count for a memory array that does not exhibit an uncorrectable error correcting code (ECC) read during an array integrity check. In this case, the first incident count corresponds to an initial number of ECC corrections that are performed when the array integrity check of the memory array initially fails. The technique also includes determining a current count for the memory array when the memory array does not exhibit an uncorrectable ECC read during subsequent array integrity checks. In this case, the current count corresponds to a subsequent number of error correcting code (ECC) corrections required during the subsequent array integrity checks. An indication of an imminent read failure for the memory array is provided when the current count exceeds the first incident count by a predetermined amount.2011-05-05
20110107161THRESHOLD VOLTAGE TECHNIQUES FOR DETECTING AN IMMINENT READ FAILURE IN A MEMORY ARRAY - A technique for detecting an imminent read failure in a memory array includes determining whether a memory array, which does not exhibit an uncorrectable error correcting code (ECC) read during an initial array integrity check at a normal read verify voltage level, exhibits an uncorrectable ECC read during a subsequent array integrity check at a margin read verify voltage level. The technique also includes providing an indication of an imminent read failure for the memory array when the memory array exhibits an uncorrectable ECC read during the subsequent array integrity check. In this case, the margin read verify voltage level is different from the normal read verify voltage level.2011-05-05
20110107162PARALLELIZATION METHOD, SYSTEM AND PROGRAM - A computer-implemented method, system, and article of manufacture for parallelizing a code configured by coupling a functional block having an internal state and a functional block without any internal state. The method includes: creating and storing a graphical representation where functional blocks are chosen as nodes and connections between functional blocks are chosen as links; visiting the nodes on the graphical representation sequentially, detecting inputs from functional blocks without any internal state to functional blocks having an internal state and storing these functional blocks as a set of use blocks, and detecting inputs from functional blocks having an internal state to functional blocks without any internal state and storing these functional blocks as a set of definition blocks; and forming strands of functional blocks based on information on the set of use blocks and information on the set of definition blocks stored in association with the functional blocks.2011-05-05
20110107163REDUCED SIGNALING INTERFACE METHOD & APPARATUS - This disclosure describes a reduced pin bus that can be used on integrated circuits or embedded cores within integrated circuits. The bus may be used for serial access to circuits where the availability of pins on ICs or terminals on cores is limited. The bus may be used for a variety of serial communication operations such as, but not limited to, serial communication related test, emulation, debug, and/or trace operations of an IC or core design. Other aspects of the disclosure include the use of reduced pin buses for emulation, debug, and trace operations and for functional operations. In a fifth aspect of the present disclosure, an interface select circuit, FIGS. 2011-05-05
20110107164Method for Reconstructing Sparse Signals from Sign Measurements Using Greedy Search - A signal x is reconstructed from sparse sign measurements y. Estimated measurements {tilde over (y)} are obtained from a previous estimate 2011-05-05
20110107165DISTRIBUTED STORAGE NETWORK FOR MODIFICATION OF A DATA OBJECT - A distributed storage network generates a plurality of data segments from a data object and stores each of the plurality of data segments as a plurality of encoded data slices generated from an error encoding dispersal function. When the distributed storage network receives a modification request for the data object, it determines a size of the plurality of data segments of the data object from a segment size field and identifies one of the plurality of data segments requiring modification. The identified data segment is reconstructed from the plurality of encoded data slices and modified in accordance with the modification request.2011-05-05
20110107166Error recovery within integrated circuit - An integrated circuit includes one or more portions having error detection and error correction circuits and which is operated with operating parameters giving finite non-zero error rate as well as one or more portions formed and operated to provide a zero error rate.2011-05-05
20110107167METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING FREQUENCY CHANNEL INFORMATION - A method of transmitting frequency channel information by a device to which a frequency band is allocated so as to implement frequency sharing without affecting primary services. The method includes: modulating a stream having content into a main signal; generating a channel information signal related to the frequency band allocated to the device; and combining and transmitting the modulated main signal and the channel information signal. Accordingly, frequency sharing can be used for various primary services by enabling a terminal device to obtain information on a used frequency band without increasing the complexity of the terminal device.2011-05-05
20110107168APPARATUS AND METHOD FOR GENERATING ARQ FEEDBACK MESSAGE IN WIRELESS COMMUNICATION SYSTEM - An apparatus and a method for generating an Automatic Repeat reQuest (ARQ) feedback message in a wireless communication system are provided. The method includes generating first feedback information of at least one ARQ block, determining whether any ARQ blocks include at least one successfully received ARQ sub-block, when the at least one erroneous ARQ block includes at least one successfully received ARQ sub-block, adding second feedback information of the ARQ sub-blocks to the first feedback information of the ARQ blocks using a field indicating whether the second feedback information is added and a field indicating the erroneous ARQ blocks including the at least one successfully received ARQ sub-block, and sending the first feedback information with the second feedback information added, to the transmitting stage.2011-05-05
20110107169ACTIVATION OF SEMI-PERSISTENT RESOURCE ALLOCATIONS IN A MOBILE COMMUNICATION NETWORK - The invention relates to a method for allocating radio resources to a mobile terminal for data transmission in a mobile communication system as performed by a mobile terminal and a base station, respectively. Moreover, the invention relates to a mobile terminal and a base station to perform such method, as well as an implementation of the method in software. The invention further provides a mobile communication system in which radio resources are allocated to a mobile terminal for uplink transmission. In order to avoid false activation of a semi-persistent resource allocation the invention defines new conditions under which a mobile terminal activates a semi-persistent resource allocation. Unlike for example in prior-art systems, a mobile terminal only activates a semi-persistent resource allocation, if it can confirm the activation command received from the access network. Preferably, the activation command and its confirmation are resource assignments.2011-05-05
20110107170METHOD AND APPARATUS FOR RETRANSMISSION - Provided is a method in which a terminal conducts an operation for retransmission using a frame divided into downlink subframes and uplink subframes, the method including: receiving a data burst transmitted from a base station; determining a feedback frame offset based on the relationship between a range determined based on division information of the frame and a downlink subframe index in which the data burst has been transmitted; determining indices of a frame and uplink subframe for transmitting a feedback signal based on the frame offset; transmitting the feedback signal to the base station in the determined indices of the frame and uplink subframe; and if an NACK message is included in the feedback signal, receiving the data burst retransmitted from the base station.2011-05-05
20110107171RECEPTION METHOD AND RECEPTION DEVICE - In a multicarrier wireless communication system adopting forward error correction codes, a reception method adapted to a receiver 2011-05-05
20110107172DOCSIS MAC-PHY Downstream Convergence Layer - Techniques are provided herein for transmitting data across multiple carriers using Motion Picture Experts Group (MPEG) Transport Stream (TS) packet multiplexing. At a processing device coupled to at least one subscriber device data associated with the at least one subscriber device are received. The data are encapsulated into MPEG-TS packets, where the MPEG-TS packet headers identify a single data channel for the at least one subscriber device. The MPEG-TS packets are multiplexed across a plurality of radio-frequency (RF) carriers for transmission, and the MPEG-TS packets are transmitted using the plurality of RF carriers. Each of the plurality of RF carriers have the same RF modulation, use the same symbol rate, and are driven by the same clock such that the carriers are synchronous. Techniques are also provided recover the data at the subscriber device.2011-05-05
20110107173APPARATUS AND METHOD FOR GENERATING A PARITY CHECK MATRIX IN A COMMUNICATION SYSTEM USING LINEAR BLOCK CODES, AND A TRANSMISSION/RECEPTION APPARATUS AND METHOD USING THE SAME - A method and apparatus are provided for generating a parity check matrix used to generate a linear block code in a communication system. The method includes determining a basic parameter of a second parity check matrix satisfying a rule predetermined with respect to a given first parity check matrix, generating a submatrix corresponding to a parity part of the second parity check matrix, using the basic parameter; and generating a submatrix corresponding to an information word part of the second parity check matrix, using the first parity check matrix and the basic parameter.2011-05-05
20110107174METHOD AND APPARATUS FOR INTERCHANGING MULTIPATH SIGNALS IN A SC-FDMA SYSTEM - The present invention provides a MIMO transmitter and a MIMO receiver, used in SC-FDMA system, which make interchanging for multiple paths of modulated symbol sequences in order to acquire diversity gain while ensure PAPR of single antenna. MIMO transmitter interchanges partial symbols of at least one error-correction codeword of at least one of the multipath modulated symbol sequences and partial symbols of at least one error-correction codeword of at least one of the other of the multipath modulated symbol sequences so as to obtain interchanged multipath modulated symbol sequences; MIMO receiver executes inverse-interchanging which is inverse to the interchanging in a MIMO transmitter for multipath interchanged signals received from multiple transmitting antennas. The present invention could reduce the BLER of the entire SC-FDMA system, and obtain diversity gain while ensure PAPR of single antenna.2011-05-05
20110107175LDPC (Low Density Parity Check) codes with corresponding parity check matrices selectively constructed with CSI (Cyclic Shifted Identity) and null sub-matrices - LDPC (Low Density Parity Check) codes with corresponding parity check matrices selectively constructed with CSI (Cyclic Shifted Identity) and null sub-matrices. An LDPC matrix corresponding to an LDPC code is employed within a communication device to encode and/or decode coded signals for use in any of a number of communication systems. The LDPC matrix is composed of a number of sub-matrices and may be partitioned into a left hand side matrix and a right hand side matrix. The right hand side matrix may include two sub-matrix diagonals therein that are composed entirely of CSI (Cyclic Shifted Identity) sub-matrices; one of these two sub-matrix diagonals is located on the center sub-matrix diagonal and the other is located just to the left thereof. All other sub-matrices of the right hand side matrix may be null sub-matrices (i.e., all elements therein are values of zero “0”).2011-05-05
20110107176METHOD AND APPARATUS FOR TRANSMITTING BROADCAST SIGNAL IN TRANSMITTER - A transmitting system, a receiving system, and a method of processing broadcast signals are disclosed. The method for transmitting a broadcast signal includes encoding mobile data for forward error correction (FEC) to build Reed-Solomon (RS) frames, dividing the built RS frames into a number of RS frame portions, dividing one of the RS frame portions into Serially Concatenated Convolutional Code (SCCC) blocks, mapping the SCCC blocks including the convolution-coded data to mobile data blocks according to a SCCC block mode which identifies relationship between the mobile data blocks and the SCCC blocks, forming a data group including the mobile data blocks, forming mobile data packets including data in the data group and, multiplexing a specified number of the mobile data packets, a first scalable number of the mobile data packets, and a second scalable number of main data packets.2011-05-05
20110107177Low Density Parity Check (LDPC) Code - Low density parity check code (LDPC) base parity check matrices and the method for use thereof in communication systems. The method of expanding the base check parity matrix is described. Examples of expanded LDPC codes with different code lengths and expansion factors are also shown.2011-05-05
20110107178DECODER, PERPENDICULAR MAGNETIC RECORDING AND REPRODUCING DEVICE, RECEIVING DEVICE, AND DECODING METHOD - An objective of the present invention is to provide a decoder, a perpendicular magnetic recording and reproducing device, a receiving device, and a decoding method that are used for performing decoding resistant to burst errors such as a pole-erase phenomenon, where the burst errors do not have amplitude fluctuation, without the addition of a special code (redundant code) for detecting burst errors. The present invention is a decoder, a perpendicular magnetic recording and reproducing device, a receiving device, and a decoding method that perform a decoding process on an encoded data signal, wherein a parity check is performed on the encoded data signal that is encoded with a low density parity check code to output burst information.2011-05-05
20110107179METHOD AND APPARATUS FOR ERROR CORRECTION ON A MOBILE DEVICE - A method and apparatus for distributing dynamically reconfigurable content to a mobile device is provided. One embodiment of a method for encoding a data stream to enable error correction by a receiver of the data stream includes storing a block of the data stream in a first memory array, processing the first memory array to produce a second memory array, inverting the second memory array, and storing the second memory array, as inverted, as a third memory array.2011-05-05
20110107180INTENTIONALLY INTRODUCED STORAGE DEVIATIONS IN A DISPERSED STORAGE NETWORK - A method begins by a processing module receiving a first request to store a program. The method continues with the processing module determining first error coding dispersal storage function parameters and encoding a data segment of the program. The method continues with the processing module determining whether a second request to store the program is received. The method continues with the processing module encoding a second data segment of the program in accordance with the first error coding dispersal storage function parameters when the second request is not received. The method continues with the processing module changing the first error coding dispersal storage function parameters based on the another request to produce second error coding dispersal storage function parameters when the second request is received. The method continues with the processing module encoding the second data segment in accordance with the second error coding dispersal storage function parameters.2011-05-05
20110107181DATA DISTRIBUTION UTILIZING UNIQUE WRITE PARAMETERS IN A DISPERSED STORAGE SYSTEM - A method begins by a processing module receiving a plurality of record requests to record a broadcast of data. The method continues with the processing module encoding the data using an error coding dispersal storage function to produce a plurality of sets of encoded data slices. The method continues with the processing module generating a list of requesting device identities corresponding to the plurality of requests and storing the plurality of sets of encoded data slices and the list of requesting device identities in a dispersed storage network memory. The method continues with the processing module receiving a playback request from a device identified in the list of requesting device identities, generating a unique retrieval matrix for the device, and outputting a unique plurality of sets of encoded data slices from the plurality of sets of encoded data slices in accordance with the unique retrieval matrix.2011-05-05
20110107182DISPERSED STORAGE UNIT SOLICITATION METHOD AND APPARATUS - A method begins by a dispersed storage processing module obtaining data for storage. The method continues with the dispersed storage processing module soliciting dispersed storage (DS) units to store encoded data slices of the data. The method continues with the dispersed storage processing module receiving favorable responses from a set of DS units. The method continues with the dispersed storage processing module encoding the data in accordance with an error coding dispersal storage function and in accordance with the favorable responses.2011-05-05
20110107183INTERLEAVING SCHEME FOR AN LDPC CODED 16 APSK SYSTEM - An approach is provided for interleaving low density parity check (LDPC) encoded bits in 16ASPK modulation systems. By assigning the bits determining modulation symbols based on different bit degrees, one can efficiently find the desirable tradeoff between error performance and error floor provided by the LDPC codes in use.2011-05-05
20110107184DATA DISTRIBUTION UTILIZING UNIQUE READ PARAMETERS IN A DISPERSED STORAGE SYSTEM - A method begins by a processing module receiving a plurality of requests to record a broadcast of data. The method continues with the processing module encoding the data using an error coding dispersal storage function to produce a plurality of sets of encoded data slices when the data is broadcast and in response to a request of the plurality of requests. The method continues with the processing module generating a unique retrieval matrix for each of the plurality of requests based on an identity of a requesting device and the error coding dispersal storage function to produce a plurality of unique retrieval matrixes. The method continues with the processing module storing the plurality of sets of encoded data slices and the plurality of unique retrieval matrixes in a dispersed storage network memory as a plurality of unique copies of the data.2011-05-05
20110107185MEDIA CONTENT DISTRIBUTION IN A SOCIAL NETWORK UTILIZING DISPERSED STORAGE - A method begins by a dispersed storage processing module receiving media content determining social media metadata regarding the media content. The method continues with the dispersed storage processing module encoding the media content in accordance with an error coding dispersal storage function to produce a plurality of sets of encoded data slices, identifying a plurality of memories to store the plurality of sets of encoded data slices, and sending the plurality of sets of encoded data slices to the plurality of memories when the social media metadata indicates that the media content is to be available for a local social network.2011-05-05
20110107186METHOD, APPARATUS, AND STORAGE MEDIUM FOR PROCESSING WRITE DEFECT IN DATA STORAGE APPARATUS - A method is provided for correcting a write defect in a data storage apparatus comprising a storage medium. The method comprises reading information from a track of the storage medium in which a write defect occurs, calculating a number of error-corrected error correction code symbols in sectors of the track based on the read information, determining a number of sectors on which write defect correction is to be performed by comparing the calculated number of error-corrected error correction code symbols with a threshold, and performing a rewrite operation on the track, beginning at a starting sector determined by the number of sectors on which write defect correction is to be performed.2011-05-05
20110107187High Density Tape Drive Multi-Channel Low Density Parity Check Coding Control - An LDPC coding system includes a number of LDPC encoders and a number of LDPC decoders. The number of encoders/decoders is between one and one fewer than the total number of tracks on the high density tape are provided. The LDPC encoders are operable to break data from an incoming data sector into the data blocks to be written to the high density tape. The LDPC decoders are operable to assemble the data blocks into data sectors.2011-05-05
20110107188SYSTEM AND METHOD OF DECODING DATA - A decoder is disclosed that can reduce power consumption at different stages of a decoding process. At a first stage where the decoder calculates residual values, the decoder can reduce power consumption by calculating residual values using less than a full set of division circuits. A reduced number of division circuits may be sufficient to successfully calculate residuals associated with the codeword to complete the decoding process. Division circuits that are not used may be disabled to reduce power consumption. At another stage of the decoding process where the decoder generates coefficients that are used to identify locations of errors in the codeword, the decoding process can limit power consumption by reducing the number of iterations of a polynomial generator by incorporating termination decision circuitry.2011-05-05
20110107189APPARATUS AND METHOD FOR TRANSMITTING DATA IN COMMUNICATION SYSTEM - An apparatus for transmitting data in a communication system includes: a first repeater configured to repeat information bits of data to be transmitted a first repetition number of times; an interleaver configured to interleave the information bits repeated the first repetition number of times; an accumulator configured to accumulate-code the interleaved information bits; a second repeater configured to repeat the accumulate-coded information bits a second repetition number of times; a puncturer configured to puncture the information bits repeated the second repetition number of times; and a P/S converter configured to convert the punctured information bits and the information bits of the data and output RA-coded information bits.2011-05-05
20110107190OBSCURING INFORMATION IN MESSAGES USING COMPRESSION WITH SITE-SPECIFIC PREBUILT DICTIONARY - Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring.2011-05-05
20110107191Method of detecting error in a semiconductor memory device - A semiconductor memory device and a memory system including the same are provided. The semiconductor memory device may include a first memory cell array block generating first data, a second memory cell array block generating second data, and first and second error detection code generators. The first error detection code generator may generate a first error detection code and may combine a portion of bits of the first error detection code with a portion of bits of a second error detection code to generate a first final error detection signal. The second error detection code generator may generate the second error detection code and may combine the remaining bits other than the portion of bits of the second error detection code with the remaining bits other than the portion of bits of the first error detection code to generate a second final error detection signal.2011-05-05
20110107192Authoring Tool and Method for Creating an Electrical Document - An authoring tool for creating an electronic document, a method for creating the electronic document, a data storage medium for instructing a computer to execute the method for creating the electronic document and a data storage medium for instructing a computer to display the electronic document. The authoring tool comprises; a template module for selecting a template for the electronic document, the template comprising one or more display pages; a content management module for arranging one or more media files on each display page with selected interrelationships between the media files; a generating module for creating an electronic page file for each display page, wherein the media files are embedded in the respective electronic page files based on the selected interrelationships and in a manner such that each electronic page file includes interrelationship data defining the interrelationships of the embedded media files in said each electronic page file with other media files in said each electronic page file and with other media files in other electronic page files of the electronic document; and a binding module for electronically binding the respective electronic page files so as to create the electronic document.2011-05-05
Website © 2025 Advameg, Inc.