24th week of 2010 patent applcation highlights part 71 |
Patent application number | Title | Published |
20100153689 | Processor instruction used to determine whether to perform a memory-related trap - Instruction execution includes fetching an instruction that comprises a first set of one or more bits identifying the instruction, and a second set of one or more bits associated with a first address value. It further includes executing the instruction to determine whether to perform a trap, wherein executing the instruction includes selecting from a plurality of tests at least one test for determining whether to perform a trap and carrying out the at least one test. The second set of one or more bits is used in the determination of whether to perform the trap; and the plurality of tests includes a matrix test that determines whether a data value being stored as pointed to by the first address value is escaping from one of a plurality of managed memory types to another one of the plurality of managed memory types and generates a trap in the event that the data value is determined to be escaping from one of the plurality of managed memory types to another one of the plurality of managed memory types, wherein the matrix test is based on a matrix associated with garbage collection and a matrix entry located using at least some of the first set of one or more bits and at least some of the second set of one or more bits. | 2010-06-17 |
20100153690 | USING REGISTER RENAME MAPS TO FACILITATE PRECISE EXCEPTION SEMANTICS - One embodiment of the present invention provides a system that facilitates precise exception semantics. The system includes a processor that uses register rename maps to support out-of-order execution, where the register rename maps track mappings between native architectural registers and physical registers for a program executing on the processor. These register rename maps include: 1) a working rename map that maps architectural registers associated with a decoded instruction to corresponding physical registers; 2) a retire rename map that tracks and preserves a set of physical registers that are associated with retired instructions; and 3) a checkpoint rename map that stores a mapping between a set of architectural registers and a set of physical registers for a preceding checkpoint in the program. When the program signals an exception, the processor uses the checkpoint rename map to roll back program execution to the preceding checkpoint. | 2010-06-17 |
20100153691 | LOWER POWER ASSEMBLER - A method for processing data using a time-stationary multiple-instruction word processing apparatus, arranged to execute a plurality of instructions in parallel, said method comprising the following steps: generating a set of multiple-instruction words (INS(i), INS(i+1), INS(i+2)), wherein each multiple-instruction word comprises a plurality of instruction fields, wherein each instruction field encodes control information for a corresponding resource of the processing apparatus, and wherein bit changes between an instruction field related to a no-operation instruction, and a corresponding instruction field of an adjacent multiple-instruction word are minimised; storing input data in a register file (RF | 2010-06-17 |
20100153692 | Media Action Script Acceleration Apparatus - Exemplary apparatus, method, and system embodiments provide for accelerated hardware processing of an action script for a graphical image for visual display. An exemplary apparatus comprises: a first memory; and a plurality of processors to separate the action script from other data, to convert a plurality of descriptive elements of the action script into a plurality of hardware-level operational or control codes, and to perform one or more operations corresponding to an operational code of the plurality of operational codes using corresponding data to generate pixel data for the graphical image. In an exemplary embodiment, at least one processor further is to parse the action script into the plurality of descriptive elements and the corresponding data, and to extract data from the action script and to store the extracted data in the first memory as a plurality of control words having the corresponding data in predetermined fields. | 2010-06-17 |
20100153693 | CODE EXECUTION WITH AUTOMATED DOMAIN SWITCHING - Within the field of computing, many scenarios involve the execution of an instruction set within a domain that is configured to support an execution context. However, various portions of the instruction set may be preferably executed in different domains, such as for promoting performance and for providing debugging features like the ability to simulate execution of a debuggee function without incurring side-effects in the debuggee. Portions of the instruction set may therefore be executed in different domains by inserting domain switch points in the instruction set specifying a target domain. The instruction set may then initiate execution in an initial domain, and upon reaching a domain switch point, may transition to the target domain. In some embodiments, the domain switch points may be automatically inserted into the target instruction set based on various domain switch criterion, such as performance, reliability, and affinity of an instruction with a particular domain. | 2010-06-17 |
20100153694 | PROGRAM AND INFORMATION PROCESSING APPARATUS - A computer readable medium includes: storing an evaluation value and relating, to a plurality of evaluating target information, the evaluation value indicative of a possibility that a second processing for sequentially executing a first processing that is predetermined for each of the evaluating target information is successful; updating the evaluation value related to the evaluating target information based on a content of a third processing that is predetermined for the evaluating target information or information to be a processing target of the first processing corresponding to the evaluating target information when the third processing is executed; and determining an executing order in a sequential execution of the second processing for each of the evaluating target information based on the evaluation value. | 2010-06-17 |
20100153695 | DATA HANDLING PREFERENCES AND POLICIES WITHIN SECURITY POLICY ASSERTION LANGUAGE - Whether user-side privacy preferences and service-side privacy policies are matched is determined utilizing an extended security policy assertion language. Both privacy policies, i.e. how data recipients promise to treat data, and privacy preferences, i.e. how data providers expect their data to be treated, are expressed with the same language. Decisions are made through evaluation of queries based on preference and policy assertions. | 2010-06-17 |
20100153696 | Pre-boot securing of operating system (OS) for endpoint evaluation - Methods and apparatus involve evaluating endpoint computing assets. The endpoint has both a traditional operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the traditional operating system identifies a last evaluation status of the computing device at a time just prior to shutting down. Upon a next booting, the pre-boot operating system loads and examines [reads] the last evaluation status. If the last evaluation status requires any completion action in order to comply with a predetermined computing policy, either or both the operating systems attend to its effectuation, including communication/handoff by way of one or more security agents. In a variety of ways, effectuation occurs by: determining a present location of the computing device, quarantining the computing device from certain network traffic; VPN enforcement; patching applications; firewall involvement; etc. Computer program products are also disclosed. | 2010-06-17 |
20100153697 | Methods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node - Methods and systems for providing embedded user authentication and/or providing computing services using an information handling system configured as flexible computing node, and which may be implemented to perform preboot authentication of users. The flexible computing node may also be configured to provision the appropriate work environment for a given user based on one or more user parameters (e.g. entitlements, location, network connection, and/or other parameters). | 2010-06-17 |
20100153698 | HARD DISK TEMPERATURE MONITORING DEVICE AND HARD DISK TEMPERATURE MONITORING METHOD - A hard disk temperature monitoring device for monitoring a temperature of a hard disk in a computer system is provided. A hard disk stores an operating system. A basic input/output system (BIOS) has a setting configuration. When the setting configuration is a first setting value, operation of the hard disk is restored. When the setting configuration is a second setting value, the operation of the hard disk is stopped. A thermal sensor detects a temperature of the hard disk. A keyboard controller (KBC) is electrically connected to the thermal sensor via a data transmission channel for detecting the temperature of the hard disk in real time. If the KBC detects that the temperature of the hard disk rises to a first predetermined temperature, the setting configuration is set to the second setting value, and the BIOS stops the operation of the hard disk according to the second setting value. | 2010-06-17 |
20100153699 | SUPPRESSING POWER SUPPLY NOISE USING DATA SCRAMBLING IN DOUBLE DATA RATE MEMORY SYSTEMS - Embodiments are generally directed to systems, methods, and apparatuses for suppressing power supply noise using data scrambling in double data rate memory systems. In some embodiments, an integrated circuit includes a transmit data path to transmit data to one or more memory devices. The transmit data path may include scrambling logic to generate, in parallel, N pseudo random outputs that are uncorrelated with each other. The output data and the pseudo random outputs are input to XOR logic. The transmit data path transmits the output the of XOR logic which has a substantially white frequency spectrum. Other embodiments are described and claimed. | 2010-06-17 |
20100153700 | Multicore Processor And Method Of Use That Configures Core Functions Based On Executing Instructions - A processor having multiple cores coordinates functions performed on the cores to automatically, dynamically and repeatedly reconfigure the cores for optimal performance based on characteristics of currently executing software. A core running a thread detects a multi-core characteristic of the thread and assigns one or more other cores to the thread to dynamically combine the cores into what functionally amounts to a common core for more efficient execution of the thread. | 2010-06-17 |
20100153701 | Layer two encryption for data center interconnectivity - Systems, methods, and other embodiments associated with layer two (L | 2010-06-17 |
20100153702 | TLS KEY AND CGI SESSION ID PAIRING - The prevention of impersonation attacks based on hijacked common gateway interface (CGI) session IDs is disclosed. In accordance with one embodiment, a secured communication channel is formed between a server and a client using an initial transport layer security (TLS) key. Additionally, an authenticated CGI session is formed over the secured communication channel based on an initial CGI session identifier (ID). Further, the initial CGI session ID and the initial TLS key are combined into a pair. Next, incoming data that includes an incoming CGI session ID is received via a secured communication channel. An incoming TLS key of the secured communication channel that carries the incoming CGI session ID is then retrieved. Based on the retrieved incoming TLS key, the incoming data is permitted to execute on the server when the incoming TLS key matches the initial TLS key of the pair. | 2010-06-17 |
20100153703 | STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING - Methods and systems for storing data securely in a secure data storage network are disclosed. One method includes receiving at a secure storage appliance a block of data for storage on a volume, the volume associated with a plurality of shares distributed across a plurality of physical storage devices. The method also includes cryptographically splitting the block of data received by the secure storage appliance into a plurality of secondary data blocks. The method further includes encrypting each of the plurality of secondary data blocks with a different session key, each session key associated with at least one of the plurality of shares. The method also includes storing each data block and associated session key at the corresponding share, remote from the secure storage appliance. | 2010-06-17 |
20100153704 | Trusted Bypass For Secure Communication - A device having an encryption module in communication with first and second communication ports may facilitate connecting to an access network, without requiring a non-secure hard drive to initiate the network access. The encryption module may define a normal mode and a bypass mode. In normal mode, data from the first port may be sent encrypted to the second port, for communicating securely in an encrypted environment. In bypass mode, data from the first port may be sent unencrypted to the second port. The data being sent may be intercepted and presented to the user for approval in a human readable format. The user may confirm that the data is appropriate for being sent unencrypted. This data may be sent unencrypted in response to a request for information (e.g., an assent to terms and conditions) from the access network, such as at a hotel or public wireless hotspot, for example. | 2010-06-17 |
20100153705 | ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, AND DECRYPTION METHOD - It is possible to provide an encryption device, a decryption device, an encryption method, and a decryption method capable of effectively performing encryption and decryption by using the packet type judgment result. An encryption/decryption device ( | 2010-06-17 |
20100153706 | Securing IP Traffic - A method of securing IP traffic sent from a first host to a second host attached respectively to first and second access points. The method comprises establishing a shared secret between said first and second hosts, and for each packet to be sent, using the next value in a pseudo-random number sequence as an interface identifier part of the source IP address. | 2010-06-17 |
20100153707 | Systems and Methods for Real-Time Verification of A Personal Identification Number - The present invention is directed to improved methods and systems for verifying a person's personal identification data. In one embodiment, the system includes programmatic modules stored on computer readable media. The programmatic modules receive login credentials from a computing device and verify credentials, generate and communicate a request form for accessing personal identification data associated with a person, receive input data from a computing device in response to a request form, test input data in relation to a minimum required data set for requesting personal identification data, format input data into an electronic request in accordance with a predefined format, store, search, and identify a consent form, which establishes a valid consent by a person to access personal identification data, associate the electronic request for a person's personal identification data with a consent form, and transmit the electronic request in accordance with a predefined format to another computing device. | 2010-06-17 |
20100153708 | Server Assisted Portable Device - A method for allowing or disallowing host access to data stored in a portable device is discussed. The method uses a password and network server. Access to the data is allowed if the password is correct and messages received from the server are positive. If the portable device receives a negative message from the server, then access is disallowed, even if the password is correct. In another embodiment of the invention, a password is provided to the portable device; the password is encrypted in the portable device, and sent to the network server. Upon requests for data from the host computer, the portable device encrypts the data and sends the encrypted data to the host computer. A network server receives an encryption of the password from the portable device, and if the password is correct, then the network server sends the decryption key for the data to the host computer. | 2010-06-17 |
20100153709 | Trust Establishment From Forward Link Only To Non-Forward Link Only Devices - In the present system three methods are provided for establishing trust between an accessory device and a host device, without placing trust in the device/host owner, so that content protection for subscriber-based mobile broadcast services is provided. That is, a secure link may be established between the accessory device and the host device so when the accessory device receives encrypted content via a forward link only network, the accessory device may decrypt the content at the forward link only stack and then re-encrypt it or re-secure it using the master key or some other derived key based on the master key (or the session key) and then send it to the host device which can decrypt it play it back. | 2010-06-17 |
20100153710 | METHOD OF PREVENTING UNAUTHENTICATED VIEWING USING UNIQUE INFORMATION OF SECURE MICRO - A method of verifying a validity of a Secure Micro (SM) is provided. The method of verifying a validity of an SM, the method including: storing and maintaining a validity verification message used to verify the validity of the SM, the validity verification message being generated by a Trusted Authority (TA) based on unique information of the SM, and the SM and the TA sharing the unique information of the SM; and verifying the validity of the SM using the validity verification message and the unique information shared by the SM, when an SM client is executed. | 2010-06-17 |
20100153711 | DOWNLOADABLE CONDITIONAL ACCESS SYSTEM EFFICIENTLY DETECTING DUPLICATED DCAS HOST - A technology that may efficiently detect a duplicated Downloadable Conditional Access System (DCAS) host in a DCAS is provided. | 2010-06-17 |
20100153712 | SIGNATURE SCHEMES USING BILINEAR MAPPINGS - Methods and systems are provided for generating and verifying signatures of digital messages communicated between signers and verifiers. Using bilinear mappings, such as Weil or Tate pairings, these methods and systems enable generation and verification of efficient multisignatures, identity-based ring signatures, hierarchical proxy signatures, and hierarchical online/offline signatures. | 2010-06-17 |
20100153713 | Systems and methods for detecting exposure of private keys - A system and method can include comparing entities associated with public certificates and private keys in a keystore to detect compromised private keys. This increases security of systems implementing public key cryptography over a network. The comparison can be triggered by a trigger event in one embodiment. If a private key belonging to a certificate authority is detected, a notification can be generated. Alternatively or in addition, a revocation request can be generated for public certificates corresponding to the compromised private key. | 2010-06-17 |
20100153714 | USE OF MODULAR ROOTS TO PERFORM AUTHENTICATION INCLUDING, BUT NOT LIMITED TO, AUTHENTICATION OF VALIDITY OF DIGITAL CERTIFICATES - Authentication of elements (e.g. digital certificates | 2010-06-17 |
20100153715 | PACKET HANDLING IN A MOBILE IP ARCHITECTURE - A method of handling IP packets transmitted from a correspondent node to a mobile node via an intermediate node using the IPsec security protocol. The method comprises, at the correspondent node, identifying specified selector information within the part of the packet to be encrypted, and incorporating the identified information or a digest thereof into a header part of the packet which is to be sent unencrypted, transmitting the packet from the correspondent node to said intermediate node, and, at the intermediate node, receiving the transmitted packet and identifying a policy to be applied to the packet using said information or digest contained in the packet, and applying the policy to the packet. | 2010-06-17 |
20100153716 | SYSTEM AND METHOD OF MANAGING FILES AND MOBILE TERMINAL DEVICE - In a system to realize prevention of leakage and loss of confidential information by inhibiting writing into a secondary storage device or writing into external storage media, created confidential data is archived by a secure method without being lost if communication is not available and a file server cannot save the information. For this purpose, first, a designated folder is created on a non-volatile storing memory being built in a mobile terminal and created confidential data is saved in the folder. Then, a filter driver controls access to the designated folder to prevent leakage of information by an application in a mobile phone by a malicious user. Further, a function to remove data in the designated folder in the mobile terminal from a mobile terminal management server through a telephone network prevents loss of saved confidential data due to loss of the mobile terminal. | 2010-06-17 |
20100153717 | Security device and building block functions - A method and system of securing content is described, the method including establishing communication between a secure module source and a content rendering device, loading a dynamically generated pseudo-unique secure module to the content rendering device from the secure module source, establishing communication between the secure module source and the dynamically generated pseudo-unique secure module, and transferring a decryption key from the secure module source to the dynamically generated pseudo-unique secure module, thereby enabling decryption of encrypted content, the encrypted content being encrypted according to the decryption key. Related methods and apparatus are also described. | 2010-06-17 |
20100153718 | METHOD AND SYSTEM USING A PORTABLE OBJECT FOR PROVIDING AN EXTENSION TO A SERVER - The present invention concerns a method and a system for extending a server connected with at least one client(s), characterized in that it consists in providing said extension on the client side by means of a portable object which is connected to said client and which performs at least one of the server's operation(s) in part or entirely. | 2010-06-17 |
20100153719 | Lightweight Authentication Method and System for Low-Cost Devices Without Pseudorandom Number Generator - An algorithm or an authentication system for a low-cost authenticating device such as a radio frequency identification (RFID) tag, or a sensor node are provided, by which authentication is processed efficiently without requiring a random number. A claimant entity attempting to be authenticated and a verifying entity to authenticate the claimant entity, share a plurality of secret keys so that authentication is processed as the claimant entity responds to a challenge by the verifying entity. The verifying entity and the claimant entity perform authentication using Learning Parity with Noise (LPN) problem. The claimant entity may generate an encrypted value for use in the authentication, using a basic Boolean Exclusive OR and a logical AND operations. | 2010-06-17 |
20100153720 | MOBILE SYSTEM, SERVICE SYSTEM, AND SERVICE PROVIDING METHOD TO SECURELY TRANSMIT PRIVATE INFORMATION FOR USE IN SERVICE - A mobile system, a service system, and a service providing method for securely transmitting private information for use in a service are provided. The mobile system maintains at least one user data and identification data with respect to the user data used for processing at least one service, sets a session key for the service system, and encrypts service data identified based on the identification data to transmit to the service system. | 2010-06-17 |
20100153721 | Portable Electronic Devices, Systems, Methods and Computer Program Products for Accessing Remote Secure Elements - Portable electronic devices are provided including a virtual secure element module configured to access a remote secure element server. The virtual secure element module being configured to access the remote secure element server from the portable electronic device to provide a predetermined level of security for secure transactions. Related systems, methods and computer program products are also provided. | 2010-06-17 |
20100153722 | METHOD AND SYSTEM TO PROVE IDENTITY OF OWNER OF AN AVATAR IN VIRTUAL WORLD - The present application provides an method and system for verifying a user's identity within a virtual world environment. The verification is to be in real-time and avoids the possibility of providing credential (e.g., biometric information) that were previously authentication, by sending to the user a time-sensitive challenge and requiring the user to provide the requested credentials (e.g., biometric information) within a predetermined time period. Therefore, the present invention is best positioned for environments where trusted identification of a user is needed online to facilitate secure transactions. | 2010-06-17 |
20100153723 | METHOD AND SYSTEM FOR ENCRYPTION OF DATA - A method for transmitting a message securely between two entities, a sender and a receiver remotely located from each other and a system for carrying out the method is disclosed. The method includes using an array containing numbers based on the infinite sequence of value of ‘pi’; selecting a pattern and tracing and extracting the selected pattern along the numbers in the array sequentially to form a decimal number string. The decimal string is partitioned and converted to binary which is used as a cipher for coding the message by XORing. | 2010-06-17 |
20100153724 | SYSTEM AND METHOD FOR A KEY BLOCK BASED AUTHENTICATION - The present invention relates to a system ( | 2010-06-17 |
20100153725 | TRAFFIC ENCRYPTION KEY UPDATING METHOD USING SYSTEM SYNCHRONIZATION AND APPARATUS USING THE SAME - Provided are a TEK update method using system synchronization, and an apparatus using the same. The method and apparatus according to the present invention periodically update a TEK used for traffic encryption in a DOCSIS system by using system synchronization. As described, the TEK can be updated by using system synchronization without performing a TEK update negotiation process. | 2010-06-17 |
20100153726 | AUTHENTICATION METHOD, SYSTEM, AND APPARATUS THEREOF FOR INTER-DOMAIN INFORMATION COMMUNICATION - The present invention provides an authentication method for inter-domain information communication applied to first and second domains. The method instructs a first electronic device belonging to the first domain to request, through an intermediary node device simultaneously registered in the first and second domains, to obtain a first key from a second key distribution center in the second domain for transmission to a second electronic device in the second domain, and instructs the second electronic device to request, through the intermediary node device, to obtain a second key from a first key distribution center in the first domain for transmission to the first electronic device. Therefore, the first and second electronic devices are instructed to generate a shared third key using the first and second keys to perform secure information communication authentication. | 2010-06-17 |
20100153727 | ENHANCED SECURITY FOR DIRECT LINK COMMUNICATIONS - A method for secure direct link communications between multiple wireless transmit/receive units (WTRUs). The WTRUs exchange nonces that are used for generating a common nonce. A group identification information element (GIIE) is generated from at least the common nonce and is forwarded to an authentication server. The authentication server generates a group direct link master key (GDLMK) from the GIIE to match WTRUs as part of a key agreement group. Group key encryption key (GKEK) and a group key confirmation key (GKCK) are also generated based on the common nonce and are used to encrypt and sign the GDLMK so that base stations do not have access to the GDLMK. Also disclosed is a method for selecting a key management suite (KMS) to generate temporal keys. A KMS index (KMSI) may be set according to a selected KMS, transmitted to another WTRU and used to establish a direct link. | 2010-06-17 |
20100153728 | ACCELERATION OF KEY AGREEMENT PROTOCOLS - The generation of a shared secret key K in the implementation of a key agreement protocol, for example MQV, may be optimized for accelerated computation by selecting the ephemeral public key and the long-term public key of a correspondent to be identical. One correspondent determines whether the pair of public keys of the other correspondent are identical. If it is, a simplified representation of the shared key K is used which reduces the number of scalar multiplication operations for an additive group or exponentiation operations for a multiplicative group. Further optimisation may be obtained by performing simultaneous scalar multiplication or simultaneous exponentiation in the computation of K. | 2010-06-17 |
20100153729 | METHOD OF AUTHENTICATING PRINTER CONSUMABLE - A method for authenticating a printer consumable in which an encrypted random number and its first signature are passed from a printer authentication chip to a consumable authentication chip, in the consumable chip: the encrypted random number and first signature are decrypted; a second signature of the random number is calculated and compared with the first signature to produce a match at which a first number produced by encrypting the random number and a memory vector is passed to the printer chip, and in the printer chip, a second number is produced by encrypting the random number and memory vector and compared with the first number to produce a match and valid consumable chip, or a mismatch and invalid consumable chip. The memory vector comprises updatable consumable state data whose manner of updating is protected by requiring clearing of the memory vector when change of the updating manner is attempted. | 2010-06-17 |
20100153730 | Conditional access method and system for in broadcast transmissions - A method for conditionally allowing fruition of broadcast contents, broadcast by a contents broadcaster ( | 2010-06-17 |
20100153731 | Lightweight Authentication Method, System, and Key Exchange Protocol For Low-Cost Electronic Devices - An algorithm or an authentication system for a low-cost authenticating device such as a radio frequency identification (RFID) tag, or a sensor node are provided, by which authentication is processed efficiently without requiring complicated hardware. A claimant entity attempting to be authenticated and a verifying entity to authenticate the claimant entity, share a plurality of secret keys so that authentication is processed as the claimant entity responds to a challenge by the verifying entity. The verifying entity and the claimant entity perform authentication using Learning Parity with Noise (LPN) problem. The verifying entity and the claimant entity generate keys independently from one another, and exchange the generated keys. The claimant entity may generate an encrypted value for use in the authentication, using a basic Boolean Exclusive OR and a logical AND operations. | 2010-06-17 |
20100153732 | CACHE-BASED METHOD OF HASH-TREE MANAGEMENT FOR PROTECTING DATA INTEGRITY - The present disclosure relates to accessing data stored in a secure manner in an unsecure memory, based on signatures forming an integrity check tree comprising a root signature stored in a secure storage space, and lower-level signatures stored in the unsecure memory. One embodiment calculates a first-level signature from the data in a group comprising a changed datum, and temporarily stores the signature calculated in a secure memory. The embodiment calculates a signature to check the integrity of a lower-level signature by using the signature to be checked and a second signature belonging to a same group as the signature to be checked, read as a priority in the secure memory and in the unsecure memory if it has different values in the secure and unsecure memories. | 2010-06-17 |
20100153733 | METHOD AND SYSTEM FOR AUTHENTICATING INTERNET USER IDENTITY - A method and system for authenticating an Internet user identity by cross-referencing and comparing at least two independent sources of information. A first geographical location of computer signature of an internet user is identified and the geographical location of a communication voice device of said internet user is identified to determine a second location. The first and second locations are compared for geographical proximity to confirm the identity of the internet user. Based upon geographical proximity of said locations, a score is assigned to the internet user, and access to a website is allowed or limited based upon said score. Alternatively, additional authentication information can be required or access can be terminated. | 2010-06-17 |
20100153734 | Utilizing data reduction in steganographic and cryptographic system - The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step. The present invention also relates to a system for securing a data signal including: computer devices for applying a data reduction technique to reduce the data signal into a reduced data signal; means to subtract the reduced data signal from the data signal to produce a remainder signal; means to apply a first cryptographic technique to encrypt the reduced data signal to produce an encrypted, reduced data signal; means to apply a second cryptographic technique to encrypt the remainder signal to produce an encrypted remainder signal; and means to add the encrypted, reduced data signal to the encrypted remainder signal to produce an output signal. | 2010-06-17 |
20100153735 | Entering an identifier with security improved by time based randomization of input steps based upon time - A secure method, apparatus or computer program incorporates a method for entering private information such as a user identifier, password or other secret code comprising at least one symbol or character. According to method in one illustrated embodiment, the user selects characters for input starting from presentation of an initial suggested character, moving under user control to presentation of a user's desired input character, and then followed by the selection by the user of that presented character as a character for data input. The method includes randomizing the timing of the display and/or reaction time to user input so that the number and timing of the key presses required to select any specific desired character for input is made unpredictable. This makes it difficult during entry of information to determine by covert means what specific information is being entered. | 2010-06-17 |
20100153736 | METHOD FOR ISOLATING SPECIAL FUNCTIONALITIES IN FIELD DEVICES USED IN AUTOMATION TECHNOLOGY - A method for activating special functionalities in field devices used in automation technology uses an activation code, encrypted with a private key and containing an activation option and field-device-specific information transferred to a field device. Decrypting of the activation code occurs with a public key stored in the field device. Then, the field-device-specific information contained in the activation code is compared with information stored in the field device. If these two pieces of information, match, then the activation option in the activation code is ascertained, and the corresponding special functionality is activated. This method makes it possible to activate special functionalities securely in field devices. | 2010-06-17 |
20100153737 | Method of Projecting a Secure USB Key - A method of protecting a secure USB key comprising: a step of obtaining at least one parameter concerning the use of a function that can be executed on said key; a step of detecting at least one blocking condition that depends on said parameter, and where appropriate, a first check step suitable for preventing the execution of said function; a step of detecting at least one determined event independent of said function; and a second check step suitable for authorizing the execution of said first check step only in the event of said determined event being detected, said second check step being active even when said blocking condition is not satisfied. | 2010-06-17 |
20100153738 | AUTHORIZED ANONYMOUS AUTHENTICATION - A method, program and system for processing data is disclosed. The method, program and system comprising the steps of: (a) receiving (e.g., during an enrollment process) a first biometric data and a first personal key, (b) processing the first biometric data and the first personal key through an irreversible cryptographic algorithm, sometimes after: (i) generating one or more variants from the first biometric data, (ii) processing the first personal key through a reversible cryptographic algorithm, and (iii) adding salt to the first biometric data or first personal key, (c) receiving (e.g., during an authentication process) a second biometric data and a second personal key, (d) processing the second biometric data and the second personal key through the irreversible cryptographic algorithm, (e) comparing the second processed data to the first processed data, and (f) generating a signal pertaining to the comparison of the second processed data to the first processed data, such as: (i) a confirmation reflecting authentication when the second processed data matches the first processed data (sometimes allowing access to a facility or system) or (ii) a denial reflecting no confirmation when the second processed data does not match the first processed data. | 2010-06-17 |
20100153739 | Securable independent electronic document - In accordance with embodiments within, a secure independent electronic document apparatus, it's system, method, and manufacture is taught. With an authenticable and tamper detectable electronic container supporting platform vendor and authentication independence, character text data sections supporting digital signatures, data automation and nested embedding, as well as graphical image data, or other free format data sections supporting many data processing operations, imaging representation comprised within a container using a secure and independent system, the secure independent electronic document presents a solution for digital electronic information distribution, commerce, trade and exchange. | 2010-06-17 |
20100153740 | DATA RECOVERY USING ERROR STRIP IDENTIFIERS - A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary data blocks by performing splitting and encrypting operations on a primary data block received from the client for storage on the virtual disk and reconstitute the primary data block from at least a portion of the plurality of secondary data blocks stored in shares on corresponding physical storage devices in response to a request from the client. Write counters written with the secondary data blocks are used to determine whether the secondary data blocks were stored correctly. | 2010-06-17 |
20100153741 | ENCRYPTING SYSTEM AND METHOD FOR NUMERICAL CONTROL DEVICES - An encrypting system for numerical control devices includes a function module, a code module, a memory, and a controller. The function module includes function programs. Each of the function programs presetting a service life. The code module encrypts and decrypts the service life of each of the function programs. The memory stores the service life encrypted by the code module. The controller reads the encrypted service life from the memory according to an input instruction and controlling the code module to decrypt the encrypted service life, and comparing the decrypted service life with the current date to control the function program to be executed in response to the service life of the function program being valid. | 2010-06-17 |
20100153742 | METHOD AND APPARATUS FOR ENCRYPTING/DECRYPTING PACKET DATA OF PRECISE TIME SYNCHRONIZATION PROTOCOL AND TIME SYNCHRONIZATION SYSTEM - A method and an apparatus for encrypting/decrypting packet data of a precise time synchronization protocol and a time synchronization system are illustrated. The method is suitable for the time synchronization system using a precise time protocol. The time synchronization system includes a master node and a slave node, wherein the slave node synchronizes its time with the master node. In the method for encrypting/decrypting packet data of the precise time synchronization protocol, an encryption/decryption hardware device is disposed on the hardware protocol layer of each of the master node and the slave node. The hardware protocol layer is under the data link layer, and includes the data link layer. A synchronization message is encrypted by using the encryption/decryption hardware devices of the master node to generate a frame data, and the frame data is decrypted by using the encryption/decryption hardware devices of the slave node to obtain the synchronization message. | 2010-06-17 |
20100153743 | ELECTRONIC DEVICE AND METHOD TO CONTROL OUTPUT THEREOF - An electronic device and a method to control an output thereof are provided. The electronic device includes a controller to control whether to output non-encrypted multimedia data to an external device based on whether the external device is communicatively connected to the electronic device, and an interface to output the non-encrypted multimedia data to the external device under the control of the controller. | 2010-06-17 |
20100153744 | CRYPTOGRAPHIC PROCESSING APPARATUS - A cryptographic processing apparatus includes: at least one register configured to store data for operation; a first operation block configured to execute an operation in accordance with data stored in the register; a second operation block configured to execute a logic operation between one of a register-stored value and a key and an operation result of the first operation block; and a decode block configured to decode binary data in units of the predetermined number of bits to convert the binary data into decode data having the number of bits higher than the number of bits of the binary data. | 2010-06-17 |
20100153745 | Methods and devices for instruction level software encryption - A method of encrypting compiled computer code instructions to be decrypted instruction by instruction during execution. The computer code instructions are encrypted using a chaining mode so that an encrypted instruction depends on the values of the instruction, the value of the preceding instruction and a pseudo-random number. As it may happen that the instruction can be arrived at from more than one preceding instruction, at least one of the preceding instructions is associated with a random number compensator for use during decryption of the encrypted instruction, so that the decryption of the encrypted instruction yields the same result regardless of which the preceding instruction was. Also provided are an encryption device, a decryption device and method, and a digital support medium storing encrypted compiled computer code instructions. | 2010-06-17 |
20100153746 | MEMORY CONTROLLER, SECURE MEMORY CARD, AND SECURE MEMORY CARD SYSTEM - The present patent application is for solving a problem of occurrence of efforts required to replace a signature and consumption of time induced by the efforts. | 2010-06-17 |
20100153747 | PARALLEL ENCRYPTION/DECRYPTION - The present disclosure includes methods and devices for parallel encryption/decryption. In one or more embodiments, an encryption/decryption device includes an input logic circuit, an output logic circuit, and a number of encryption/decryption circuits arranged in parallel between the input logic circuit and the output logic circuit. For example, each encryption/decryption circuit can be capable of processing data at an encryption/decryption rate, and the number of encryption/decryption circuits can be equal to or greater than an interface throughput rate divided by the encryption/decryption rate. | 2010-06-17 |
20100153748 | Method for reencryption of a database - The present invention relates to a method for encryption of the content in a database, for accomplishing increased protection against unauthorised access to the data. The method assures that every row and item is re-encrypted with a valid key. More specifically this process, the so-called KeyLife process, is executed every time a row is inserted, updated or retrieved after a scanning operation. The key life value, defining the number of days a key is valid for each item, could differ for the items, and could typically be between 30 and 90 days. The scanning operation, checking the validity of the presently used keys, the so-called KeyLife checking, is executed each time a new key generation is created. | 2010-06-17 |
20100153749 | DEVICE-ACCESS CONTROL PROGRAM, DEVICE-ACCESS CONTROL PROCESS, AND INFORMATION PROCESSING APPARATUS FOR CONTROLLING ACCESS TO DEVICE - In a computer on which operating systems (OSs) run in parallel: a key storage with a memory area different from that used by the Oss stores keys for use by the OSs in encryption-related processing of data which is to be inputted into or outputted from a device, in correspondence with the OSs; and an encryption processor encrypts first data outputted from a first OS by using a first key corresponding to the first OS in response to a first request by the first OS for access to the device before transferring the first data to the device, and decrypts second data being encrypted and outputted from the device, by using a second key corresponding to a second OS in response to a second request by the second OS for access to the device before transferring the second data to the second OS. | 2010-06-17 |
20100153750 | Method and system for providing dynamic power sharing to network devices - Embodiments include a network switch for use in a local area network that interconnects the switch and one or more network powered devices, the switch also being operatively connected to at least one power supply that powers the switch, the switch comprising a plurality of ports to which network powered devices are connected, at least one management module for controlling the operation of the switch, the module having memory for storing information relating to the power and operating requirements of each connected network device, and a processor for controlling the distribution of power from the power supply among the ports, including selectively time slicing power provided to at least selected ones of the ports. | 2010-06-17 |
20100153751 | Network equipment - A network equipment for a powered device of a PoE system is adapted to be connected to multiple network lines, each transmitting a network signal, and a DC power that is carried on the network signal, and that has a magnitude smaller than a power necessary for driving power-consuming components of the powered device. The network equipment includes: multiple Ethernet network ports, each coupled to a respective network line; a transformer module coupled to the Ethernet network ports, and configured to separate the DC powers from the network signals; a power module coupled to the transformer module for combining the DC powers into a supplying power; and a signal processing circuit coupled to the power module for receiving at least a portion of the supplying power, and coupled to the transformer module for processing the network signals. The supplying power has a magnitude sufficient for driving the power-consuming components. | 2010-06-17 |
20100153752 | Computers Having a Biometric Authentication Device - A portable computer having a biometric authentication device is disclosed. The portable computer also includes a processor, a power supply unit having a first power system and a second power system, a power control circuit for controlling the power supply unit, and a start-up button for generating a startup signal for starting the portable computer. The biometric authentication device sends a power request signal to the power control circuit to activate the second power system upon a detection of a human user in a state where the second power system is deactivated and electric power is being supplied by the first power system. The biometric authentication device can perform an authentication operation while receiving electric power from the second power system, and the power control circuit causes the portable computer to transition to a power-on state in response to an authentication success by the biometric authentication device. | 2010-06-17 |
20100153753 | POWER CIRCUIT, INFORMATION PROCESSING APPARATUS, AND POWER CONTROL METHOD - A power circuit, information processing apparatus, and power control method are provided. The power circuit includes a determining unit configured to determine whether a control signal provided to control a power source has a fixed frequency characteristic, and an adjusting unit configured to randomly change time when a voltage transmitted to the power source is changed within a prescribed range when the determining unit determines that the control signal has the fixed frequency characteristic. | 2010-06-17 |
20100153754 | METHOD FOR TRANSFORMING VOLTAGE IDENTIFICATION CODE OF A MICROPROCESSOR - The disclosure is related to a method for transforming voltage identification codes of a microprocessor. The method comprises the steps of: receiving a first voltage identification code of a first voltage regulation standard, wherein the first voltage identification code is in correspondence with a first voltage; and transforming the first voltage identification code into a second voltage identification code of a second voltage regulation standard, wherein the second voltage identification code is in correspondence with a second voltage, and the second voltage is the same as the first voltage. | 2010-06-17 |
20100153755 | VID PROCESSOR, VOLTAGE GENERATING CIRCUIT AND GENERATING METHOD - A VID processor includes a plurality of buffers, comparators, multiplexers and a core processing unit. The buffer may store a plurality of parameter values and a plurality of offset values. The buffers storing the parameter values may be coupled to the corresponding comparators, and other buffers may be coupled to the corresponding multiplexers. The comparator may compare the VID with the parameter values in the coupled buffer and output a selecting signal to the corresponding multiplexer according to the comparison outcome. Thus, the multiplexer may select and output one of the offset values to the core processing unit from the coupled buffer to allow the core processing unit to adjust the VID according to the output of the multiplexer. | 2010-06-17 |
20100153756 | LOAD ADAPTIVE POWER DELIVERY - Embodiments disclosed herein include a power monitor and controller which are used to control the operation of a voltage regulator depending on an operating mode or state of a load device, such as a hard disk drive. By controlling the voltage regulator in this manner, voltage regulator efficiency may be improved for any load condition, thus reducing power losses in the system. | 2010-06-17 |
20100153757 | BALANCING POWER SUPPLY AND DEMAND - A method and apparatus to balance adapter power supply and computing device power demand. In one embodiment, power to/from battery pack(s) maybe controlled by adjusting the output voltage of the power adapter via the current input to the power adapter through a feedback pin to meet power demand of electrical loads. Another embodiment provides a way to adjust the activities of the electrical loads such that neither adapter power rating nor the electrical load power limit is exceeded while avoiding system shutdown. | 2010-06-17 |
20100153758 | METHOD AND APPARATUS FOR OPTIMIZING POWER CONSUMPTION IN A MULTIPROCESSOR ENVIRONMENT - A method and apparatus for reducing net power consumption in a computer system includes identifying a plurality of processing states operable to execute a task. A processing state and current drain pattern is selected that is most power efficient. A selected processing state may include one or more processing elements of the computer system such as one or more processors or accelerators and indicates the manner in which one or more portions of the received task may be distributed among the processing elements of the computer system. The current drain pattern selected may be a constant current drain pattern or a pulsed current drain pattern and may be selected to optimize power consumption when executing the task among the one or more processing elements. | 2010-06-17 |
20100153759 | POWER GATING TECHNIQUE TO REDUCE POWER IN FUNCTIONAL AND TEST MODES - A method and apparatus of a power gating technique to reduce power in functional and test modes are disclosed. In one embodiment, a method includes separating a power domain of a module to two distinctive sets of sub-power domains, powering a combinational logic with one of the two distinctive sets of power domains, and powering a sequential logic with the other of the two distinctive sets of power domains. The method may reduce an active and leakage power in a functional mode by gating power of the combinational logic and not gating power of the sequential logic. A system state may be retained in the sequential logic because the sequential logic remains powered during the functional mode without requiring a retention flop, an on-chip memory and/or an off-chip memory. A wake up time of the module may be reduced through the retention of the system state in the sequential logic. | 2010-06-17 |
20100153760 | Power Settings in Wireless Ultra-Wide band Universal Serial Bus - Various embodiments enable a host controller, through its Protocol Adaption Layer (PAL) driver, to efficiently manage power consumption by employing “sleep mode” and “active mode” power settings. In some embodiments, the PAL driver may employ sleep mode settings to transition the host controller from an idle state to an energy conserving sleep state. In further embodiments, the PAL driver may use active mode settings to govern communications between the host controller and various devices, such as WUSB devices and others, thereby conserving power. | 2010-06-17 |
20100153761 | MULTIPROCESSOR CONTROL UNIT, CONTROL METHOD PERFORMED BY THE SAME, AND INTEGRATED CIRCUIT - A multiprocessor control unit according to the present invention comprises acquisition means for acquiring first non processing time information on a first non processing time represented for each processor, wherein the first non processing time represents a time in which a first block is not executed in a first barrier establish time from barrier synchronization start until barrier synchronization establishment of the first program block, and acquiring second non processing time information on a second non processing time represented for each processor, wherein the second non processing time represents a time in which a second block is not processed in a second barrier establish time from barrier synchronization start until barrier synchronization establishment of the second program block; and power control means for controlling power supply to the plurality of processors while the first and second program blocks are consecutively executed in parallel, using the first and second non processing time information acquired by the acquisition means. | 2010-06-17 |
20100153762 | METHOD AND APPARATUS FOR ADAPTIVE BLUETOOTH LOW POWER DISCOVERY AND WAKE UP - A method of low power discovery (LPD) that extends the battery life of a portable Wi Fi device or portable media player (PMP) using IEEE 802.11 interface by ensuring that PMP host processor is only on when in designated 802.11 coverage or when needed by a user, by employing probabilistic channel scanning-comprising:
| 2010-06-17 |
20100153763 | Method and apparatus to modulate multi-core usage for energy efficient platform operations - An energy efficient multi-core computing device and method are disclosed. According to embodiments of the invention, the processing load on a multi-core computing device may be monitored to determine whether one or more cores on the device may be dynamically shut down. Conversely, any core that is shut down may be dynamically powered up if the processing load on the device increases. Embodiments of the present invention therefore provide significant energy savings on multi-core platforms by minimizing the active cores on the device without affecting the device's processing capabilities. | 2010-06-17 |
20100153764 | Human Stimulus Activation and Deactivation of a Screensaver - Devices and methods are disclosed which relate to an electronic device having a human stimulus receptor which, when activated, suspends activation of a screensaver. The screensaver is activated to conserve the power and life of the electronic device. When latently viewing the electronic device, however, the human stimulus receptor is activated. A countdown starts counting down a pre-determined amount of time once the human stimulus receptor is inactive. At the expiration of the countdown, the screensaver is activated. The human stimulus receptor responds to skin conductivity, natural muscular twitch, pulse, skin temperature, and/or eye movement. Only when the electronic device no longer detects any of these human stimuli will the countdown begin. A user may set the predetermined amount of time. | 2010-06-17 |
20100153765 | POWER STATE DEPENDENT WAKE-UP ALARM - A method of operating a computing device to allow events to be conditionally executed based on a power state of the device at the time of execution of the events. Conditional execution may be implemented using multiple timers, each associated with a power state. A timer such as an “AC timer” or a “DC timer” associated with a respective power state may be used to wake up the device when, upon expiration, or time-out, of the timer, a current power state of the device and the power state associated with the timer match. An Advanced Configuration Power Interface (ACPI) may be employed to abstract implementation of the timers from underlying hardware of the device. The operating system and software applications may request establishing wake-up behavior of the device as commands to program conditional events, which may then be translated into commands to embedded controller to set the timers. | 2010-06-17 |
20100153766 | MEMORY CONTROLLER AND DEVICE WITH DATA STROBE CALIBRATION - A memory controller comprises a DQ path, a DQS path, a delay element, a flip flop, and an adjustment unit. The DQ path receives and passes a data signal, and outputs a delayed data signal. The DQS path receives and passes a data strobe signal. The delay element is coupled to the DQS path, receiving the data strobe signal to generate a compensated data strobe signal having a calibrated latency. The calibrated latency is determined by an adjustment signal. The flip flop is coupled to the data signal path and the delay element, sampling the delayed data signal by the compensated data strobe signal to generate an output data. The adjustment unit generates the adjustment signal according to the output data. The adjustment unit performs a calibration to adjust the adjustment signal, thus the calibrated latency is adjusted. | 2010-06-17 |
20100153767 | Small computer system interface input output (SCSI IO) referral - The present invention is a method for communication between an initiator system and a block storage cluster. The method includes receiving a command at a first storage system of a block storage cluster. The command is transmitted by the initiator system to the first storage system via a network and includes a request for data. The method further includes transferring the stored data from the first storage system to the initiator system via the network when data requested in the data request is stored by the first storage system. The method further includes transmitting a referral response from the first storage system to the initiator system when a portion of the data requested in the data request is not stored by the first storage system, but is stored by a second storage system of the block storage cluster. The referral response indicates to the initiator system that: a) not all of the requested data was transferred; and b) that the second storage system stores the portion of the requested data. | 2010-06-17 |
20100153768 | METHOD AND SYSTEM FOR PROVIDING IMMUNITY TO COMPUTERS - A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and the type of package required to fix the error. The assessment module sends a request regarding the type of package required to fix the error to the recovery module. The recovery module sends the package required to fix the error to the maintenance module, which fixes the error in the system. | 2010-06-17 |
20100153769 | METHOD AND APPARATUS FOR ENHANCED DESIGN OF MULTI-TIER SYSTEMS - A system and method for performing enhanced modeling of multi-tiered architectures is presented. The system and method enable selection of a preferred design for a multi-tiered architecture of components based on a set of established criteria, and may employ certain vectors and functions in component attributes, and such attributes may include scalability and scope of fault attributes. | 2010-06-17 |
20100153770 | REAL-TIME IMAGE MONITORING AND RECORDING SYSTEM AND METHOD - A real-time image monitoring and recording system includes a plurality of IP cameras and a plurality of surveillance servers. The IP cameras and the surveillance servers can process anycast packets. The surveillance servers control the IP cameras and store data generated by the IP cameras. Peer-to-peer connection exists between the surveillance server and its neighboring surveillance servers. Any surveillance server stores configuration data of its neighboring surveillance servers rather than the configuration data of all the surveillance servers. | 2010-06-17 |
20100153771 | PEER-TO-PEER EXCHANGE OF DATA RESOURCES IN A CONTROL SYSTEM - System(s) and method(s) are provided for peer-to-peer exchange of data in a control system. Decentralized storage and multi-access paths provide complete sets of data without dependence on a specific or pre-defined data source or access paths. Data is characterized as data resources with disparate granularity. The control system includes a plurality of layers that act as logic units communicatively coupled through access network(s). Server(s) resides in a service layer, whereas client(s) associated with respective visualization terminal(s) are part of a visualization layer. Peer-to-peer distribution of data resource(s) can be based on available access network(s) resources and optimization of response time(s) in the control system. When client requests a data resource, all the locations of the data resource and the quickest source to retrieve it are automatically determined. The client stores copy of data resource. Peer-to-peer distribution of data resource(s) can be implemented within the service layer or the visualization layer. | 2010-06-17 |
20100153772 | COUNT DATA RECORDING DEVICE, AND METHOD AND PROGRAM FOR RECORDING COUNT DATA - The count data recording device includes: a storage unit that includes N memory areas storing the count data pieces; a data writing unit that writes a count data piece to the storage unit; a data reading unit that reads the count data piece from the storage unit; and a data restoring unit that detects a corruption in the count data pieces stored in the storage unit and restores the corruption, wherein the data writing unit records the count data piece using the memory area included in the range of the minor loop according to the predetermined order and shifts the range of the minor loop backward after recording the count data piece using a last memory area within the minor loop, and wherein the data restoring unit: derives a sorted count data sequence so that values of the count data pieces vary monotonously; derives a count data difference value sequence; and detects and restores the corruption in the count data pieces based on the sorted count data sequence and the count data difference value sequence. | 2010-06-17 |
20100153773 | METHOD AND SYSTEM FOR REPAIRING DAMAGED DISK FILE SYSTEMS - The present principles include methods and apparatus for repairing corrupted files systems of storage devices. In accordance with aspects of the present principles, a listing of sectors to which data is most recently written is retrieved upon interruption of writing operations on a storage medium. The listing is employed to implement a targeted search for sectors that are most likely to be corrupted. The sectors providing in the listing are examined and sectors including errors are identified. Thereafter, the errors are corrected. | 2010-06-17 |
20100153774 | DATA STORAGE SYSTEM, METHOD AND DATA STORAGE AND BACKKUP SYSTEM - A data storage system, method and a data storage and backup system are provided. The data storage method comprises defining a local storage of the data processing system as a journal vault; storing data in the journal vault by journaling; sending the data from the journal vault to a transmitter; and transmitting the data from the transmitter to a secondary storage. The present invention enhances a write function of a low performance storage device by journaling. In a case where the present invention is applied to a backup system, the performance of the whole backup system can be improved significantly, and the backup system can be extended to a remote site easily. When a storage of a production system fails, the storage system of the present invention can be switched to “production mode” and service resumes to be provided with the shortest downtime. | 2010-06-17 |
20100153775 | REPLACEMENT DATA STORAGE CIRCUIT STORING ADDRESS OF DEFECTIVE MEMORY CELL - A replacement data storage circuit stores an address of a defective memory cell. The replacement data storage circuit includes a plurality of word lines, a plurality of bit lines, and a plurality of replacement data memory cells. The replacement data memory cells are connected to the word lines and the bit lines to store an address of a defective memory cell. Each of the word lines is connected to a plurality of replacement data memory cells and each of the bit lines is connected to one replacement data memory cell. | 2010-06-17 |
20100153776 | USING SAFEPOINTS TO PROVIDE PRECISE EXCEPTION SEMANTICS FOR A VIRTUAL MACHINE - One embodiment of the present invention provides a system that provides precise exception semantics for a virtual machine. During operation, the system receives a program comprised of instructions that are specified in a machine instruction set architecture of the virtual machine, and translates these instructions into native instructions for the processor that the virtual machine is executing upon. While performing this translation, the system inserts one or more safepoints into the translated native instructions. The system then executes these native instructions on the processor. During execution, if the system detects that an exception was signaled by a native instruction, the system reverts the virtual machine to a previous safepoint to ensure that the virtual machine will precisely emulate the exception behavior of the virtual machine's instruction set architecture. The system uses a gated store buffer to ensure that any stores that occurred after the previous safepoint are discarded when reverting the virtual machine to the previous safepoint. | 2010-06-17 |
20100153777 | PROGRAM UPDATING SYSTEM HAVING CORRECTION STORAGE UNITS AND METHOD THEREOF - A program updating system having correction storage units and methods thereof are described. The control unit checks the first setting section of the first storage unit to determine whether the first setting data associated with the second storage unit is stored in the first setting section. When the first setting data is stored in the first setting section, the control unit reads the first setting data and writes the first setting data to the second storage unit. The first setting data includes a first correcting address and a first correcting code corresponding to the first correcting address. The second storage unit stores a first setting data transmitted from the first setting section. The control unit compares an executed address of the original program with the first correcting address. When the executed address is identical to the first correcting address, the control unit replaces a first error code corresponding to the executed address with the first correcting code. | 2010-06-17 |
20100153778 | Transient Transaction Execution With On-Demand Persistency - The subject matter disclosed herein provides methods and apparatus, including computer program products for handing transactions. The method may include, for example, processing, at a state correlation engine, a plurality of transactions; saving the effects of at least one of the transactions to a persistence, when the at least one transaction includes a reliable interaction with an external application; saving other transactions to a buffer rather than to the persistence; and reading the at least one transaction from the persistence and continuously executing rules representing the other transactions in response to a failure causing a recovery. Related systems, apparatus, methods, and/or articles are also described. | 2010-06-17 |
20100153779 | CONFIGURABLE RECOVERY OF ABORTED SESSION DATA - A method and system for recovering data from an aborted session via a rule application. A first session having a first document ID is initiated. After an interruption of the first session, a second session having a second document ID is initiated. The first and second document IDs are determined to be identical. The first session is determined to be open in a callee application after the interruption. A rule that associates a recovery action with a data item of the first document is applied by detecting the data item of the first document and selecting the recovery action from multiple predefined recovery actions. The data item of the first document is an identification of a calling application that provides the first and second documents or a value entered by a user of the calling application. The callee application performs the selected recovery action. | 2010-06-17 |
20100153780 | TECHNIQUES FOR GENERATING A REUSABLE TEST SCRIPT FOR A MULTIPLE USER PERFORMANCE TEST - Techniques for generating a reusable script for a multiple user performance test of a network application. A description of a multiple user performance test is generated based upon a group of data describing a functional test and a group of data describing commands of a performance test tool. In one embodiment, a functional test tool generates signals based on the description of a multiple user performance test to simulate to a performance test tool multiple users' interactions with a user interface of the performance test tool to manage a performance test session to test the network application. In another embodiment, the functional test tool generates signals simulating user interactions with a user interface of the network application during the performance test session. | 2010-06-17 |
20100153781 | SERVER-TO-SERVER INTEGRITY CHECKING - A method performed by a primary server includes receiving integrity criteria and sending a health check request to a secondary server based on the received integrity criteria. The method also includes receiving integrity information from the secondary server and checking the integrity information against the integrity criteria. The method further includes initiating a non-compliance action if the integrity information does not comply with the integrity criteria. | 2010-06-17 |
20100153782 | System and Method for Effort Estimation - Methods and systems are provided to estimate the time to implement a regression test. A productivity table may be defined and stored in a host computer system, where the productivity table indicates the time expected to perform a plurality of automation script types at a plurality of complexity levels. The host computer system may receive a list of test flows to be used in conducting a regression test and a selection of a complexity level for each of the listed test flows. Complexity levels may be defined by, and a complexity level for a test flow may be selected based upon a variety of system- and test-related criteria. The total implementation time may be determined based on the complexity levels assigned to test flows in the regression test, the type of scripts used, and the productivity table. | 2010-06-17 |
20100153783 | Method and apparatus for system analysis - A system analyzing method for analyzing a transaction system includes firstly extracting a transaction, which is processed by a plurality of servers cooperating with each other in the transaction system, from a message log in which parameters of messages have been subjected to name merge, by using a transaction model which is generated from a set of messages transmitted between the servers during processing of the transaction, and secondly extracting a transaction from a message log from which no transaction is extracted in the firstly extracting, by using a value of a parameter inherited between the servers among parameters in messages included in the message log. | 2010-06-17 |
20100153784 | SEMICONDUCTOR INTEGRATED CIRCUITS AND METHOD OF DETECTING FAULTS OF PROCESSORS - A semiconductor integrated circuit comprising a processor having an output signal of instruction log information and being operable in a program in memory is disclosed. The semiconductor integrated circuit comprises trace determination circuit for comparing an instruction code that corresponds to the instruction log information from a processor with an instruction code that is read from the memory to detect faults. | 2010-06-17 |
20100153785 | METHODS, MEDIA, AND SYSTEMS FOR DETECTING AN ANOMALOUS SEQUENCE OF FUNCTION CALLS - Methods, media, and systems for detecting an anomalous sequence of function calls are provided. The methods can include compressing a sequence of function calls made by the execution of a program using a compression model; and determining the presence of an anomalous sequence of function calls in the sequence of function calls based on the extent to which the sequence of function calls is compressed. The methods can further include executing at least one known program; observing at least one sequence of function calls made by the execution of the at least one known program; assigning each type of function call in the at least one sequence of function calls made by the at least one known program a unique identifier; and creating at least part of the compression model by recording at least one sequence of unique identifiers. | 2010-06-17 |
20100153786 | Processor, multiprocessor, and debugging method - A processor, a multiprocessor, and a debugging method for solving the conventional problems, one of which is very difficult to switch among debug programs and start the selected program within a certain time. The above convention problem can be solved by a processor that includes a debug unit block, a multimode debug interrupt control block, and an execution block. The debug unit block monitors the execution of the debug target user program and issues a debug interrupt when a predetermined debug condition is satisfied. The control block, upon receiving such a debug interrupt, specifies a debug mode that selects a predetermined debug program. When the debug unit block issues such a debug interrupt, the execution block selects and executes a debug program according to the debug mode specified by the control block. | 2010-06-17 |
20100153787 | METHODS AND APPARATUS TO DETECT AN ERROR CONDITION IN A COMMUNICATION NETWORK - Methods and apparatus to detect an error condition in a communication network are disclosed herein. An example method of detecting an error condition in a communication network includes collecting first metric data from a first endpoint device, the first metric data being related to a first connection between the first endpoint device and a communication network; collecting second metric data from a second endpoint device, the second metric data being related to a second connection between the second endpoint device and the communication network; determining if at least one of the first and second metric data are indicative of the error condition; when the at least one of the first and second metric data are indicative of the error condition, identifying a point of correlation between the first and second connections; identifying a network element based on the point of correlation; and performing an evaluation of the network element. | 2010-06-17 |
20100153788 | SEMICONDUCTOR DEVICE - The present invention aims at providing an integrated circuit device which can perform on-chip tracing by using a system installed with the same chip as that of a mass produced product, and comprises: at least one or more kinds of first chips equipped with a circuit for performing data processing; and a second chip equipped with a circuit for tracing the operation of said circuit installed a the first chip, wherein a signal between said first chip and said second chip is transmitted by signal transmission utilizing electromagnetic induction. | 2010-06-17 |