41st week of 2014 patent applcation highlights part 60 |
Patent application number | Title | Published |
20140304465 | DRAM AND ACCESS AND OPERATING METHOD THEREOF - An access method for a DRAM is provided. A row address is partitioned into a first portion and a second portion. The first portion of the row address is provided via an address bus and a first active command is provided via a command bus the DRAM. The second portion of the row address is provided via the address bus and a second active command is provided via the command bus to the DRAM, after the first active command is provided. The address bus is formed by a plurality of address lines, and a quantity of the address lines is smaller than the number of bits of the row address. | 2014-10-09 |
20140304466 | DRAM AND ACCESS AND OPERATING METHOD THEREOF - An operating access method for a DRAM is provided. A first address is obtained via an address bus and a first command is obtained via a command bus from a controller. A second address is obtained via the address bus and a second command is obtained via the command bus from the controller after the first command is obtained. The first address and the second address are combined to obtain a valid address, wherein the valid address is a row address when each of the first command and the second command is an active command. In addition, the valid address is a column address when the second command is an access command. | 2014-10-09 |
20140304467 | SHIFTABLE MEMORY EMPLOYING RING REGISTERS - Shiftable memory employs ring registers to shift a contiguous subset of data words stored in the ring registers within the shiftable memory. A shiftable memory includes a memory having built-in word-level shifting capability. The memory includes a plurality of ring registers to store data words. A contiguous subset of data words is shiftable between sets of the ring registers of the plurality from a first location to a second location within the memory. The contiguous subset of data words has a size that is smaller than a total size of the memory. The memory shifts only data words stored inside the contiguous subset when the contiguous subset is shifted. | 2014-10-09 |
20140304468 | DATA CONSOLIDATION USING A COMMON PORTION ACCESSIBLE BY MULTIPLE DEVICES - Multiple devices are provided access to a common, single instance of data and may use it without consuming resources beyond what would be required if only one device were using that data in a traditional configuration. In order to retain the device-specific differences, they are kept separate, but their relationship to the common data is maintained. All of this is done in a fashion that allows a given device to perceive and use its data as though it was its own separately accessible data. | 2014-10-09 |
20140304469 | DATA STORAGE - Storage drives configured as an m-way mirroring disk array with a primary set with a primary portion on each storage drive member in the array and (m−1) mirror sets with mirror portions on each storage drive member in the array to store duplicated data blocks of the primary set, each of the drives to have a primary portion and at least one mirror portion arranged in a stacked configuration. Generate primary write requests to write the data blocks to one or more of the primary portions of the primary set of the plurality of drives, and generate a corresponding mirroring requests to write the duplicated data blocks to corresponding mirror portions of the mirror sets of the drives, wherein, to preserve data redundancy, the primary portion and the corresponding one or more mirror portions with the duplicated data of the primary portion are to reside on different drives. | 2014-10-09 |
20140304470 | REVERSE MIRRORING IN RAID LEVEL 1 - Disclosed is a reverse mirroring RAID Level I system and method that decreases read access times. By recording mirrored data in a mirrored disk in a reverse order, spindle access time for data to be read from either the primary disk or the mirrored disk is reduced. As such, overall performance of the reverse mirroring technique is increased. | 2014-10-09 |
20140304471 | DEMOTE INSTRUCTION FOR RELINQUISHING CACHE LINE OWNERSHIP - A computer system microprocessor core having a cache subsystem executes a demote instruction to cause an exclusively owned demote instruction specified cache line owned by the same microprocessor core to be shared or read-only. | 2014-10-09 |
20140304472 | LOGICAL SECTOR MAPPING IN A FLASH STORAGE ARRAY - A system and method for efficiently performing user storage virtualization for data stored in a storage system including a plurality of solid-state storage devices. A data storage subsystem supports multiple mapping tables. Records within a mapping table are arranged in multiple levels. Each level stores pairs of a key value and a pointer value. The levels are sorted by time. New records are inserted in a created newest (youngest) level. No edits are performed in-place. All levels other than the youngest may be read only. The system may further include an overlay table which identifies those keys within the mapping table that are invalid. | 2014-10-09 |
20140304473 | METHOD AND SYSTEM FOR CACHE TIERING - A method and system for storing data for retrieval by an application running on a computer system including providing a tiered caching system including at least one cache tier and a base tier, storing data in at least one of said at least one cache tier and said base tier based on a policy, and presenting an application view of said data to the application by a means to organize data. The invention optionally provides an additional overflow tier, and preferably includes multiple cache tiers. | 2014-10-09 |
20140304474 | Conditional Notification Mechanism - The described embodiments comprise a computing device with a first processor core and a second processor core. In some embodiments, during operations, the first processor core receives, from the second processor core, an indication of a memory location and a flag. The first processor core then stores the flag in a first cache line in a cache in the first processor core and stores the indication of the memory location separately in a second cache line in the cache. Upon encountering a predetermined result when evaluating a condition for the indicated memory location, the first processor core updates the flag in the first cache line. Based on the update of the flag, the first processor core causes the second processor core to perform an operation. | 2014-10-09 |
20140304475 | DYNAMIC PARTIAL POWER DOWN OF MEMORY-SIDE CACHE IN A 2-LEVEL MEMORY HIERARCHY - A system and method are described for flushing a specified region of a memory side cache (MSC) within a multi-level memory hierarchy. For example, a computer system according to one embodiment comprises: a memory subsystem comprised of a non-volatile system memory and a volatile memory side cache (MSC) for caching portions of the non-volatile system memory; and a flush engine for flushing a specified region of the MSC to the non-volatile system memory in response to a deactivation condition associated with the specified region of the MSC. | 2014-10-09 |
20140304476 | MAINTAINING CACHE CONSISTENCY IN A CACHE FOR CACHE EVICTION POLICIES SUPPORTING DEPENDENCIES - For maintaining consistency for a cache that contains dependent objects in a computing environment, object dependencies for cached objects are managed by defining and maintaining object dependency lists for each one of the cached objects for identifying objects upon which the cached objects are dependent. Maintaining cache consistency for 2 types of cache eviction policies is supported by maintaining an object dependency lists for each one of the cached objects for identifying objects dependent upon the cached object. Each of the objects in an object dependency list is updated when the object is updated. | 2014-10-09 |
20140304477 | OBJECT LIVENESS TRACKING FOR USE IN PROCESSING DEVICE CACHE - A processing device comprises a processing device cache and a cache controller. The cache controller initiates a cache line eviction process and determines determine an object liveness value associated with a cache line in the processing device cache. The cache controller applies the object liveness value to a cache line eviction policy and evicts the cache line from the processing device cache based on the object liveness value and the cache line eviction policy. | 2014-10-09 |
20140304478 | Space Reclamation of Objects in a Persistent Cache - Disclosed herein are methods and structures for a computer cache that includes its own garbage collection component that reclaims space occupied by free objects in the cache such that the cache avoids retaining deleted objects thereby increasing cache hit ratios and further permits short-lived dirty objects to be deleted without requiring them to be written back to an underlying store. | 2014-10-09 |
20140304479 | GROUPING TRACKS FOR DESTAGING - Tracks are selected for destaging from a least recently used (LRU) list and the selected tracks are moved to a destaging wait list. The selected tracks are grouped and destaged from the destaging wait list. | 2014-10-09 |
20140304480 | NEIGHBOR BASED AND DYNAMIC HOT THRESHOLD BASED HOT DATA IDENTIFICATION - An address is received. One or more neighbors associated with the received address is/are determined. One or more neighboring hot metrics is/are determined for the one or more neighbors associated with the received address. A hot metric for the received address is determined based at least in part on the neighboring hot metrics. | 2014-10-09 |
20140304481 | INFORMATION PROCESSING SYSTEM, CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM - An information processing system that determines whether static data is already loaded into shared memory when a request is made to load static data into shared memory from a process out of a plurality of processes. When the information processing system determines that static data is not loaded into shared memory, after loading the data into shared memory, it notifies the requesting process with information identifying the static data. When the information processing system determines that the static data is already loaded into shared memory, it notifies the requesting process with information identifying the static data. | 2014-10-09 |
20140304482 | STORAGE SYSTEM AND DATA TRANSFER METHOD OF STORAGE SYSTEM - A storage system is described and includes a storage apparatus for storing data used by an external apparatus, first and second temporary data storage units, a host interface, a disk interface, and first and second controllers. The first controller is configured to select as a data transfer process, when the host interface receives a command from the external apparatus, one of a first data transfer process and a second data transfer process based on the command. The first data transfer process is a data transfer from the first temporary data storage unit to the external apparatus by the host interface. The second data transfer process is a data transfer from the first temporary data storage unit to the second temporary data storage unit by the second controller, and a data transfer from the second temporary data storage unit to the external apparatus by the host interface. | 2014-10-09 |
20140304483 | VOLUME EXTENT ALLOCATION - A method of and system for processing an extend request for a data set in a storage facility is disclosed. The method and system may include receiving the extend request. The extend request may include a new extent allocation amount for the data set. The data set may be associated with a number of volumes in the storage facility. The method and system may include apportioning the new extent allocation amount among fractional amounts. The method and system may include allocating the fractional amounts. | 2014-10-09 |
20140304484 | FLEXIBLY STORING DEFINED PRESETS FOR CONFIGURATION OF STORAGE CONTROLLER - Storing defined presets for configuration of a storage controller may include providing a storage controller interface to define a preset associated with an action of the storage controller; receiving preset parameter values for the preset via the interface; validating the preset parameter values to check that the preset is valid; storing the preset within the storage controller, and creating one or more preset objects from the preset, the preset object being accessible by the storage controller at run time. The preset may include a human-readable name; an action name indicating to which associated storage controller action the preset applies, and a set of parameter name-value pairs. | 2014-10-09 |
20140304485 | EMBEDDED MEMORY MANAGEMENT SCHEME FOR REAL-TIME APPLICATIONS - Memory is dynamically shared or allocated in an embedded computer system. The types of memory that are part of the system are first determined. Thereafter, the amount of memory available for use is determined. The type of memory required by a program or application is determined as is the amount of space that is required. If the amount of memory space that can be allocated to the program in a first type of requested memory is greater than or at least equal to the amount of memory space required by the computer program, the program is then loaded into the available memory. If the requested type of memory is not available or there is not enough of the requested memory available, other types of memory devices are considered and used, if sufficient space in one or more of them exists. | 2014-10-09 |
20140304486 | MIGRATING ENCODED DATA SLICES FROM A RE-PROVISIONED MEMORY DEVICE OF A DISPERSED STORAGE NETWORK MEMORY - A method begins by maintaining a memory assignment table for memory devices within the storage unit. The memory assignment table includes a field for memory identifier, a field for memory allocation, and a field for memory usability status. The method continues by utilizing the memory assignment table to perform one or more functions. One function includes selecting a first memory device to store incoming data. Another function includes determining when to decommission a second memory device based on memory usability status of the second memory device. A further function includes determining when to migrate data stored on a third memory device to another memory device. A still further function includes changing a storage protocol of data stored on a fourth memory device. | 2014-10-09 |
20140304487 | INFORMATION PROCESSING APPARATUS, MEMORY CONTROL DEVICE, AND DATA TRANSFER CONTROL METHOD - A nonvolatile memory manages stored data by using physical addresses. By using logical addresses associated with the physical addresses, an arithmetic processing unit outputs a process instruction to be performed on data stored in the nonvolatile memory. On the basis of the process instruction output by the arithmetic processing unit, an access control unit detects an instruction to move the data stored in the nonvolatile memory. An address conversion table control unit stores therein the association relationship between the physical addresses and the logical addresses. When the access control unit detects the instruction to move the data, the address conversion table control unit changes the association relationship such that a logical address at the move destination is associated with the physical address in which the data is stored. | 2014-10-09 |
20140304488 | LINEAR TO PHYSICAL ADDRESS TRANSLATION WITH SUPPORT FOR PAGE ATTRIBUTES - Embodiments of the invention are generally directed to systems, methods, and apparatuses for linear to physical address translation with support for page attributes. In some embodiments, a system receives an instruction to translate a memory pointer to a physical memory address for a memory location. The system may return the physical memory address and one or more page attributes. Other embodiments are described and claimed. | 2014-10-09 |
20140304489 | VARIABLE LENGTH ENCODING IN A STORAGE SYSTEM - A system and method for maintaining a mapping table in a data storage subsystem. A data storage subsystem supports multiple mapping tables including a plurality of entries. Each of the entries comprise a tuple including a key. A data storage controller is configured to encode each tuple in the mapping table using a variable length encoding. Additionally, the mapping table may be organized as a plurality of time ordered levels, with each level including one or more mapping table entries. Further, a particular encoding of a plurality of encodings for a given tuple may be selected based at least in part on a size of the given tuple as unencoded, a size of the given tuple as encoded, and a time to encode the given tuple. | 2014-10-09 |
20140304490 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - An application process is switched between asymmetric processor cores having no compatibility in instruction set architectures so that the process can be continuously executed. In an information processing device, when a request to switch an execution subject is generated while a first processor core is executing an application program, a switch process code makes the first processor core specify a basic block being executed at present. The switch process code makes the first processor core execute a first execution code until a branch instruction at the end of the specified basic block, and makes a second processor core execute a second execution code from an instruction at the head of a basic block to be executed next to the specified basic block. | 2014-10-09 |
20140304491 | PROCESSOR SYSTEM AND ACCELERATOR - It is provided a processor system comprising at least one processor core including a processor, a memory and an accelerator. The memory includes an instruction area, a synchronization flag area and a data area. The accelerator starts, even if the processor is executing another processing, acceleration processing and executes read instruction in a case where the read instruction is a flag checking instruction and a flag indicating the completion of predetermined processing has been written; and stores the data subjected to the acceleration processing after completion of the acceleration processing, and further writes a flag indicating the completion of the acceleration processing. The processor starts, even if the accelerator is executing another processing, read instruction corresponding to a flag in a case where the read instruction is the flag checking instruction and it is confirmed that the flag indicating the completion of the acceleration processing has been written. | 2014-10-09 |
20140304492 | METHOD AND APPARATUS TO INCREASE THE SPEED OF THE LOAD ACCESS AND DATA RETURN SPEED PATH USING EARLY LOWER ADDRESS BITS - A microprocessor implemented method for resolving dependencies for a load instruction in a load store queue (LSQ) is disclosed. The method comprises initiating a computation of a virtual address corresponding to the load instruction in a first clock cycle. It also comprises transmitting early calculated lower address bits of the virtual address to a load store queue (LSQ) in the same cycle as the initiating. Finally, it comprises performing a partial match in the LSQ responsive to and using the lower address bits to find a prior aliasing store, wherein the prior aliasing store stores to a same address as the load instruction. | 2014-10-09 |
20140304493 | METHODS AND SYSTEMS FOR PERFORMING A BINARY TRANSLATION - Systems and methods are provided in example embodiments for performing binary translation. A binary translation system converts, by a translator module, source instructions to target instructions. The binary translation system identifies a condition code block in the source instructions, where the condition code block includes a plurality of condition bits. In response to identifying the condition code block, the binary translation system provides an optimizer module to convert the condition code block. Then, the binary translation system performs a pre-execution on the condition code block to resolve the plurality of condition bits in the condition code block. | 2014-10-09 |
20140304494 | METHOD AND APPARATUS FOR CONFIGURING A COMPUTING ENVIRONMENT - A method that incorporates teachings of the present disclosure may include receiving, by a system comprising a processor, a request from a mobile communication device to configure a computing environment for executing a software application, identifying a deficiency in an availability of a resource of the computing environment responsive to receiving the request, adjusting an operation of the computing environment to change the availability of the resource responsive to identifying the resource deficiency, and providing an action of a plurality of associable actions to the computer environment for use in the software application, where the action replaces a received stimulation of a user input that is associated with the executing of the software application. Other embodiments are disclosed. | 2014-10-09 |
20140304495 | SYSTEM AND METHOD FOR EXPEDITING VIRTUAL I/O SERVER (VIOS) BOOT TIME IN A VIRTUAL COMPUTING ENVIRONMENT - An approach for management of boot time of a virtual machine is provided. In one aspect, a system boot time application identifies assigned resources of a virtual I/O server (VIOS) of a computing system. In addition, the system boot time application allocates additional resources from client logical partitions (LPARs) of the computing system to the assigned resources of VIOS during boot time of VIOS. The system boot time application further identifies cores of the computing system during the boot time of VIOS. The system boot time application also sets the cores in turbo core mode until boot time of VIOS is completed. In one aspect, the system boot time application reallocates the allocated additional resources from VIOS to the client LPARs once boot time of VIOS is completed. | 2014-10-09 |
20140304496 | ELECTRONIC DEVICE - According to one embodiment, an electronic device includes a non-volatile storage, a button, a rebooting module, a memory, a control module. The rebooting module reboots the device if continuous operation time of the button exceeds a first time. Date and time information indicating date and time is stored in the memory. The date and time information becomes an initial value at a time of rebooting the device by the rebooting module. The control module stores the date and time information in the non-volatile storage if continuous operation time of the button exceeds a second time which is shorter than the first time. | 2014-10-09 |
20140304497 | ELECTRONIC DEVICE HAVING FUNCTION OF BOOTING OPERATING SYSTEM BY BOOTLOADER, METHOD OF PERFORMING THE SAME FUNCTION, AND STORAGE MEDIUM - An electronic device configured to perform a function of booting an operating system by a bootloader which boots the operating system by loading the bootloader on a memory, a method of performing the same function, and a storage medium. The electronic device includes: a first memory including a boot partition region for storing at least one piece of bootloader data including the function of booting the operating system, and a user partition region for copying and storing at least some bootloader data among entire bootloader data stored in the boot partition region; and a controller that loads initial program loader data stored in the boot partition region of the first memory to a second memory to execute the loaded initial program loader data, and loads the at least some bootloader data copied in the user partition region of the first memory to the second memory and executes the loaded bootloader data according to execution of the initial program loader data. | 2014-10-09 |
20140304498 | SYSTEMS AND METHODS FOR NEXTPROTO NEGOTIATION EXTENSION HANDLING USING MIXED MODE - This disclosure is directed to systems and methods for handling the processing of a next protocol negotiation extension for a transport layer security (TLS) session. A device, intermediary to a client and a server, may receive a client hello message from the client in a handshake to establish a transport layer security (TLS) session with the server. The client hello message may include a next protocol negotiation extension. The device may include a first TLS processor that is software based and a second TLS processor that is hardware based. The device may determine that the client hello message includes the next protocol negotiation extension. The device may establish, responsive to the determination, the TLS session using the first TLS processor. The device may process, upon establishment of the TLS session using the first TLS processor, encrypted data for the TLS session using the second TLS processor. | 2014-10-09 |
20140304499 | SYSTEMS AND METHODS FOR SSL SESSION MANAGEMENT IN A CLUSTER SYSTEM - The present invention is directed towards systems and methods for managing one or more SSL sessions. A first node from a cluster of nodes intermediary between a client and a server may receive a first request from the client to use a first session established with the server. The first request may include a session identifier of the first session. The first node may determine that the first session is not identified in a cache of the first node. The first node may identify, via a hash table responsive to the determination, an owner node of the first session from the cluster using a key. The key may be determined based on the session identifier. The first node may send a second request to the identified owner node for session data of the first session. The session data may be for establishing a second session with the server. | 2014-10-09 |
20140304500 | Authentication and Initial Key Exchange in Ethernet Passive Optical Network over Coaxial Network - A method comprising generating an updated security key upon expiration of a key exchange timer, transferring the updated security key to a Coaxial Network Unit (CNU), retaining an original key, wherein the updated security key comprises a different key identification number than the original key, accepting and decrypting upstream traffic that employs either the original key or the updated key, after transferring the updated security key to the CNU, creating a key switchover timer, before the key switchover timer expires, verify that upstream traffic transferred from the CNU on a logical link uses the updated security key, and when upstream traffic is encrypted using the updated security key, begin using the updated security key to encrypt downstream traffic and clear the key switchover timer. | 2014-10-09 |
20140304501 | Method and System for Establishing a Trusted and Decentralized Peer-to-Peer Network - The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing devices; trusted chat sessions; and for other applications of trusted peer-to-peer networks. | 2014-10-09 |
20140304502 | Method and System for Obtaining Peripheral Information, and Location Proxy Server - A method for obtaining peripheral information method is disclosed herein and includes steps of: receiving a request for obtaining peripheral information, and the request for obtaining peripheral information includes a connection request for access to a third-party website; obtaining the current location information of a mobile terminal according to the connection request; obtaining a link of the third-party website; obtaining the current location information of a mobile terminal according to the connection request; obtaining a link of the third-party website according to domain name information of the third-party website and the current location information of the mobile terminal; making the mobile terminal jump to a page of the third-party website, so as to obtain peripheral information based on the current location of the mobile terminal and the information is provided by the third-party website. | 2014-10-09 |
20140304503 | SYSTEMS AND METHODS FOR SECURING DATA IN MOTION - Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which a secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself. | 2014-10-09 |
20140304504 | LOGICAL NETWORK SEPARATION METHOD AND APPARATUS - Disclosed are a logical network separation method and apparatus. The logical network separation method includes generating a first hash key on the basis of address information included in a service request packet, generating hash information on the basis of a transmission property of the service request packet corresponding to the first hash key when the same hash key as the first hash key is not in the hash table, and generating the policy about the reception of the service response packet corresponding to the service request packet on the basis of a destination of the service request packet. Accordingly, it is possible to block a cyber attack such as hacking, a malicious program, etc. | 2014-10-09 |
20140304505 | ABSTRACTION LAYER FOR DEFAULT ENCRYPTION WITH ORTHOGONAL ENCRYPTION LOGIC SESSION OBJECT; AND AUTOMATED AUTHENTICATION, WITH A METHOD FOR ONLINE LITIGATION - Embodiments herein provide methods, apparatus, computer program products, software and means for (1) an abstraction layer for default encryption, (2) with orthogonal encryption logic session object, and (3) automated authentication, (4) with a method for online litigation. In some cases subject matter disclosed herein relates to default data encryption; use a user's registration data to generate an encryption logic and related executable code, including servers and client applications; encryption as an automatic background task occurring through variable encryption logic, with authentication; embodiments are also described for conducting online litigation through pleadings formed as meta-files that trigger litigation related algorithms in order to automate and coordinate litigation. | 2014-10-09 |
20140304506 | NETWORK BASED MANAGEMENT OF PROTECTED DATA SETS - A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable outside of the system, and perhaps not even readable outside of the account. The particular data set corresponds to a particular entity assigned to the particular account and that includes keys corresponding to the particular entity. A security processor uses at least some of the plurality of keys to perform cryptographic processes in response to one or more trusted execution environment commands received from the particular entity. | 2014-10-09 |
20140304507 | CONTENT DELIVERY NETWORK ENCRYPTION - A system and method for delivering content to end users encrypted within a content delivery network (CDN) for content originators is disclosed. CDNs transport content for content originators to end user systems in a largely opaque manner. Caches and origin servers in the CDN are used to store content. Some or all of the content is encrypted within the CDN. When universal resource indicators (URIs) are received from an end user system, the CDN can determine the key used to decrypt the content object within the CDN before delivery. Where there is a cache miss, an origin server can be queried for the content object, which is encrypted in the CDN. | 2014-10-09 |
20140304508 | CONFIDENTIAL MESSAGE EXCHANGE USING BENIGN, CONTEXT-AWARE COVER MESSAGE GENERATION - Systems and methods are disclosed permitting a sender to send a secret and secure message to a recipient. An application on a sender device interfaces with known message generating tools to permit a user to generate a message. The local application encrypts the message (and optional attachments) based on public/private key pairing negotiated with the server given the recipient device id. The sender device transmits the cipher text to the server. The server generates a benign, text-based, context-appropriate message and delivers same to a recipient device by way of a known messaging service. The benign message provides a secret clue to the recipient that an encrypted message is available. Recipient may then access and decrypt the encrypted message, such as from the server in response to a successful challenge (e.g., password request). | 2014-10-09 |
20140304509 | Dual Interface Device For Access Control and a Method Therefor - The invention provides a low-cost access control device for identification and authentication in both the “digital” and “physical” worlds by contact-bound respectively contact-less interfaces and where individual users of the device can securely update access control credentials and cryptographic keys from a remote system without the need for any additional hardware or specialized software. The access control credentials and the at least one cryptographic key shall be readable by an access control system via the contact-less interface of the device, thereby enabling or denying the holder of the device access. | 2014-10-09 |
20140304510 | Secure authentication system with automatic cancellation of fraudulent operations - The present invention relates to a method and system to securely authenticate an operation request using a secure device. Automatic rejections are initiated on the basis of detection of mismatch of information by the secure device received from a server computer and an insecure terminal. The system and method further enables the user to manually confirm/reject operation requests by providing user inputs on an insecure terminal. | 2014-10-09 |
20140304511 | Sensor module and method for operating a sensor module - A sensor module for detecting at least one physical variable. The sensor module is configured to relay measured values, which characterize the at least one physical variable, to an external unit. The sensor module is configured to form a message authentication code and relay it to the external unit. The message authentication code allows the authenticity and integrity of at least one measured value to be checked. | 2014-10-09 |
20140304512 | METHOD AND SYSTEM FOR AUTHENTICATING AND PRESERVING DATA WITHIN A SECURE DATA REPOSITORY - A computer implemented method for identifying and linking a data originator and a data file or data batch from the originator through one or more data source systems. The system stores the data files and batches on a permanent basis for subsequent verification purposes, verifying the identity of the data file originator through originator-specific information from the data source system; and generating unique data entries associated with the originator identity, the file identity and/or a file verification cryptographic digest, and a unique originator signature. The data entries and signature are stored in encrypted form in a Relay Access Table (RAT), as are the public and private keys associated with both the data file and the originator. A certificate for verification of the data file is generated, that contains a digital signature, as well as a file cryptographic digest and metadata associated with filing conditions. | 2014-10-09 |
20140304513 | STORAGE DRIVE PROCESSING MULTIPLE COMMANDS FROM MULTIPLE SERVERS - One embodiment of the invention relates to a key/value storage device. The key/value storage device includes a storage medium for storing data, a network interface for receiving commands sent by multiple servers, and a controller. The controller processes a put command from a server to store a binary data object on the storage medium. The put command passes a key associated with the binary data object, and returns a unique digest of the binary data object to the server via the network interface. Another embodiment relates to a storage drive. The storage drive includes a network interface for receiving, and a controller for processing, multiple commands from multiple servers. Other embodiments, aspects and features are also disclosed. | 2014-10-09 |
20140304514 | APPLICATION PROGRAMMING INTERFACE FOR WEB APPLICATION PLATFORM SECURITY SYSTEM - The present invention includes a system for monitoring the transmission of digital files across a secured boundary of a private ecosystem. Because an application programming interface making calls to a web application platform controls the placement of security tokens, distinct programs on devices from which transmissions originate, or are bound, to place and update tokens is generally obviated. | 2014-10-09 |
20140304515 | CONTENT INTEGRITY AND INCREMENTAL SECURITY - A media signer produces an array of hash values including a respective hash value for each of multiple different portions of content. The media signer applies a hash function and an encryption key to the array of hash values to create a digital signature associated with the content. Prior to playback of the content, a media verifier retrieves the array of hash values for the different portions of content. The media verifier produces a hash value result for the retrieved array. Based on the hash value result for the retrieved array and a hash value result of the array in the received digital signature, the media verifier verifies the integrity of the retrieved array. If the retrieved array of hash values is found to be trustworthy, the media verifier determines the integrity of a portion of the content by verifying the portion's corresponding hash value from the “trustworthy” array. | 2014-10-09 |
20140304516 | Authentication and Binding of Multiple Devices - Systems and methods are described that relate to authentication and/or binding of multiple devices with varying security profiles. In one aspect, a first device with a higher security profile may vouch for the authenticity of a second device with a lower security profile when the second device requests access for content from a content provider. The vouching process may be implemented by allowing the first device to overlay its digital signature on a registration request that has been signed and transmitted by the second device. The second device with the lower security profile may access content from the content provider or source for a predetermined time period, even when the second device does not access content through the first device. | 2014-10-09 |
20140304517 | METHOD FOR SECURING CREDENTIALS IN A REMOTE REPOSITORY - A method of securing user credentials in a remote repository is provided. In accordance with one embodiment, there is provided a method comprising generating a first private key and a first public key pair from a registered password; generating a second private key and a second public key pair; generating a storage key from the second private key and the first public key; encrypting a set of credentials using the storage key; creating a encrypted credential signature from the encrypted set of credentials and the first private key; and storing the encrypted set of credentials, the encrypted credential signature, and the second public key in the remote repository. | 2014-10-09 |
20140304518 | MOBILE SOLUTION FOR SIGNING AND RETAINING THIRD-PARTY DOCUMENTS - Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives an electronic signature document on a mobile device, the signer may use a client module executing on the mobile device to import the document into the ESS. Once the document is imported into the ESS, the signer can access, review, and sign the document at the ESS via the mobile device. After signing the document, the signer can use the mobile device to cause the ESS to provide the signed document to one or more recipients. | 2014-10-09 |
20140304519 | METHOD AND SYSTEM FOR PRESERVING PRIVACY AND ACCOUNTABILITY - A computer implemented method, computer program product, server and clients for preserving privacy and accountability. The server receives from a first client computer pseudonymous, encrypted data and stores the pseudonymous, encrypted data. The -server further receives receiving at from a second client computer a data request for the pseudonymous, encrypted data and provides the pseudonymous, encrypted data to the second client computer in response to the data request. The server receives from the second client computer a signed key request for at least one key, wherein the at least one key is configured to decrypt the pseudonymous, encrypted data and wherein the signed key request comprises a public key of the second client computer. The server receives from the first client computer the at least one key, wherein the at least one key is encrypted with the public key of the second client computer and provides the at least one encrypted key to the second client computer in response to the signed key request. | 2014-10-09 |
20140304520 | DETECTION OF SECURE VARIABLE ALTERATION IN A COMPUTING DEVICE EQUIPPED WITH UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT FIRMWARE - A firmware-based mechanism for protecting against physical attacks on ROM areas holding Authenticated Variables. A first hash of contents of at least one Authenticated Variable is created by a computing device's UEFI-compliant firmware and stored in a non-volatile storage location. Subsequently a second hash of contents of the at least one Authenticated Variable is created by the firmware and compared by the firmware to the stored hash to identify unauthorized modifications of the at least one Authenticated Variable occurring after the creation of the first hash. | 2014-10-09 |
20140304521 | TAMPERPROOF REGULATION OF A PROCESS, PRODUCTION, AND ACTUATING INSTALLATION - A method for regulating process, production, and/or actuating installation includes recording observation data records at installation components of the installation by respective recording units of the installation. The method also includes transmitting the observation data records to a central control apparatus of the installation via a field bus. The method further includes forming, at the control apparatus, associated actuating data record based on the transmitted observation data records. The method also includes transmitting the actuating data records to actuating units of the installation via filed buses. The method also includes adjusting the installation components from the actuating units based on the transmitted actuating data records. The observation data records are encrypted at the respective recording units before transmitted to the control apparatus The actuating data records are formed from the encrypted observation data records without decrypting the encrypted observation data records during the process of forming the actuating data records. | 2014-10-09 |
20140304522 | METHOD AND APPARATUS OF SECURELY PROCESSING DATA FOR FILE BACKUP, DE-DUPLICATION, AND RESTORATION - Disclosed are an apparatus and method of de-duplicating at least one data file. One example method may include requesting a list of data rows stored in a database to be de-duplicated, receiving the list of the data rows based on a single filekey associated with the at least one data file, copying the at least one data file to a data storage memory, and deleting the data rows entries from a file registry of the database. | 2014-10-09 |
20140304523 | Protecting Computers Using an Identity-Based Router - A router is placed between a protected computer and devices with which the computer communicates, including peripherals and other computers. The router includes a list of authorized devices that are permitted to send data to the protected computer, against which requests to send data are checked. The router also communicates with a remote authentication service to authenticate devices requesting such permission. The authentication service may be a cloud-based identity service. | 2014-10-09 |
20140304524 | SYSTEM AND METHOD FOR ENCRYPTING SECONDARY COPIES OF DATA - A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information. | 2014-10-09 |
20140304525 | KEY/VALUE STORAGE DEVICE AND METHOD - One embodiment of the invention relates to a key/value storage device. The key/value storage device includes a storage medium for storing data, a network interface for receiving commands sent by multiple servers, and a controller. The controller processes a put command from a server to store a binary data object on the storage medium. The put command passes a key associated with the binary data object, and returns a unique digest of the binary data object to the server via the network interface. Another embodiment relates to a storage drive. The storage drive includes a network interface for receiving, and a controller for processing, multiple commands from multiple servers. Other embodiments, aspects and features are also disclosed. | 2014-10-09 |
20140304526 | DATA DEDUPLICATION IN A DISPERSED STORAGE SYSTEM - An efficient data deduplication method for use in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether a substantially identical data object has previously been encrypted and stored. The determination may be made, for example, by comparing an encryption key reference value relating to the data object to key reference information stored in DSN memory. If not detected, the data object is encrypted using an encryption key based on the data object. The encrypted data object is then compressed and stored. The encryption key and a key reference value are also stored as encoded key slices in DSN memory. If the data object was previously stored, it is encrypted using a retrieved encryption key that is substantially identical to the data object. The data object may then be compressed for storage using a pattern based data compression function. | 2014-10-09 |
20140304527 | EFFICIENT MEMORY UTILIZATION IN A DISPERSED STORAGE SYSTEM - A method for improving memory utilization in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether a substantially identical data portion of the data object has previously been encrypted and stored. The determination may be made, for example, by comparing a portion reference value relating to the data object to portion reference information stored in DSN memory. If not detected, the data object is encrypted using an encryption pattern sequence and encryption key, at least one of which substantially identical to at least a portion of the data portion. The encrypted data object is then compressed using a pattern based data compression function, and the compressed data object is stored. The portion reference value is also stored in DSN memory. | 2014-10-09 |
20140304528 | CONTROLLING SUPPLY OF POWER TO COMPUTING DEVICES WITH DYNAMICALLY VARIABLE ENERGY CAPACITY - Methods and apparatus relating to controlling the supply of power to computing devices with dynamically variable energy capacity are described. In one embodiment, logic causes modification to supply of power from a power source to one or more loads in response to a comparison of an output of the power source and a threshold value. The output of the power source may vary over a time period (e.g., oscillating) that causes the one or more loads to become inoperational. Other embodiments are also disclosed and claimed. | 2014-10-09 |
20140304529 | System and Method for Battery Power Transfer Between Mobile Devices - This disclosure describes a system and method for battery transfer between mobile devices. The method can comprise the step of placing a first mobile device in transferring mode using an application running on a first mobile device. The method can also comprise the step of transferring power from the first mobile device to a second mobile device through a link. The system, in one embodiment, can comprise computer readable storage having a computer readable program code embodied therein, wherein the computer readable program code is adapted to be executed by a computer processor to implement the method described above. | 2014-10-09 |
20140304530 | POWER MANAGEMENT FOR DATA PORTS - According to some embodiments, a communication interface | 2014-10-09 |
20140304531 | POWER SUPPLY APPARATUS, POWER SUPPLY METHOD, AND STORAGE MEDIUM - A power supply apparatus that wirelessly supplies power includes a detection unit configured to detect a power receiving apparatus, a receiving unit configured to receive, from the power receiving apparatus detected by the detection unit, identification information identifying the power receiving apparatus, a power-supply control unit configured to compare the identification information received by the receiving unit with identification information stored in a storage unit and identifying an allowed device for which power supply is allowed, thereby allowing power supply to the power receiving apparatus when both identification information match each other, and a power supply unit configured to perform the power supply to the power receiving apparatus for which the power supply is allowed by the power-supply control unit. | 2014-10-09 |
20140304532 | SERVER SYSTEMS HAVING SEGREGATED POWER CIRCUITS FOR HIGH AVAILABILITY APPLICATIONS - A method for replacing or repairing a non hot swappable component according to one embodiment includes supplying power to a first motherboard partition, a first storage partition, a second motherboard partition, and a second storage partition concurrently. The first storage partition is accessed and utilized with the second motherboard partition. The power to the first motherboard partition s selectively severed, and a non hot swappable component that has failed is removed from the first motherboard partition and replaced with a functioning component. Power is restored to the first motherboard partition. | 2014-10-09 |
20140304533 | MEMORY DEVICE, HOST DEVICE, MEMORY SYSTEM, MEMORY DEVICE CONTROL METHOD, HOST DEVICE CONTROL METHOD AND MEMORY SYSTEM CONTROL METHOD - A memory card | 2014-10-09 |
20140304534 | NETWORK POWER MANAGEMENT SYSTEM - A power management device can include a housing, a power input associated with the housing, and a plurality of power outputs associated with the housing. At least certain power outputs can be connectable to one or more electrical loads external to the housing and to the power input. In some embodiments, a communications bus and one or more power control sections can be associated with the housing. In some embodiments, one or more power control sections can communicate with the communications bus and with one or more corresponding power outputs among the plurality of power outputs. In some embodiments, a power information display can communicate with the communications bus. If desired, a power information determining section can be associated with the housing and in communication with the communications bus. The power information determining section may communicate power-related information to the power information display. | 2014-10-09 |
20140304535 | ACCESS POINT ROTATION FOR SHARING POWER LOAD - Aspects of the disclosure provide a method for sharing power load in a network. The method includes identifying a first device to serve as an AP of the network in a next time interval, providing network information from a second device that presently serves as the AP to the first device. When the first device starts to serve as the AP of the network, the second device can be configured to enter into a power save state in order to reduce power consumption by the second device in the next time interval. | 2014-10-09 |
20140304536 | STATISTICAL APPROACH TO POWER MANAGEMENT FOR ELECTRONIC DEVICES - Power savings is provided to users of various electronic devices by monitoring the times and locations at which those users activate, deactivate, or otherwise change an operational state of one or more functional elements of a device. Other contextual or environmental information can be captured as well when the user performs such an action. One or more statistical analysis or prediction algorithms can be used to determine when and/or where the user is likely to repeat the one or more actions, where a confidence level of the prediction can be impacted at least in part by the environmental and contextual factors. When a prediction has a minimum level of confidence, a corresponding action can be performed automatically by the device when the relevant factors are met. Changes in behavior can be monitored such that the predictions can be refined over time. | 2014-10-09 |
20140304537 | METHOD AND APPARATUS FOR MITIGATING EFFECTS OF MEMORY SCRUB OPERATIONS ON IDLE TIME POWER SAVINGS MODES - An approach for saving power in a memory subsystem that uses memory access idle timer to enable low power mode and memory scrub operation within computing system has been provided. The computing system determines that a memory subsystem is switched out of low power operation mode due to a memory scrub operation. In addition, the computing system bypasses the low power operation mode of an idle timer of the memory subsystem such that the memory subsystem is returned to the low power operation mode upon completion of the memory scrub operation. The computing system further sets a scrub flag of the memory subsystem to a high state, and clears the scrub flag to a low state to track if the idle timer should be bypassed. | 2014-10-09 |
20140304538 | METHOD AND DEVICE FOR PROLONGING SLEEPING TIME OF CPU - This application discloses a method for prolonging sleeping time of CPU. After CPU enters sleeping state, interrupt controller delays reporting deferrable external interrupts to the CPU, with the delay time set or as default. This application also provides a device corresponding to the method. This application can prolong the sleeping time of CPU in all kinds of intelligent electronic devices, and make the CPU enter a deep sleeping mode, thereby reducing power consumption substantially without affecting system performance. | 2014-10-09 |
20140304539 | INFORMATION PROCESSING APPARATUS AND POWER SUPPLY CONTROL METHOD - In standby mode, memory contents are saved to a hard disk. After AC power has been removed by disconnecting the AC plug, when the AC power is restored the data saved on the hard disk is automatically restored into memory to set the power-saving mode back to the standby mode. When the power is turned on next, quick resumption from standby mode can be accomplished. | 2014-10-09 |
20140304540 | OPERATING SYSTEM INDEPENDENT NETWORK EVENT HANDLING - Methods and apparatuses for re-instantiating a firmware environment that includes one or more firmware functions available at pre-boot time when transitioning the computing device from a wake state to a sleep state. A network event received by the computing device while in a sleep state may be handled by the firmware environment independent of the operating system and without returning the entire computing device to the wake state. | 2014-10-09 |
20140304541 | Method for preventing over-heating of a device within a data processing system - A method for providing over-heating protection of a target device within an information processing system is disclosed. A determination is made whether or not a power status of the information processing system is set to turn on a main power of a power supply device. If the power status of the information processing system is set to turn on a main power of a power supply device, a power switch of the target device is turned on; otherwise, another determining is made whether or not the target device is set to operate based on a user's setting. If the target device is set to operate based on the user's setting, the power switch of the target device is turned on; otherwise, the power switch of the target device is turned off. | 2014-10-09 |
20140304542 | REPORT UPDATED THRESHOLD LEVEL BASED ON PARAMETER - Example embodiments disclosed herein relate to reporting a first updated threshold level related to a battery. A parameter related to power to be drawn by the computing device for the first OS to enter a hibernate state is monitored. The first updated threshold level are set based on the parameter. The first updated threshold level is reported to the first OS. The first OS is to vary the first battery level threshold based on the first updated threshold level. | 2014-10-09 |
20140304543 | FABRIC MULTIPATHING BASED ON DYNAMIC LATENCY-BASED CALCULATIONS - In one embodiment, a system for determining latency in paths includes logic integrated with and/or executable by a processor, the logic being adapted to synchronize clocks of two devices connected via two or more link aggregation (LAG) ports and/or multiple devices within paths through a network fabric, determine a transit delay for each LAG port and/or path, store the transit delay for each LAG port to a LAG structure along with an identifier for the LAG port and/or for each path to an equal cost multi-path (ECMP) structure along with an identifier of the path, sort the LAG ports according to each LAG port's transit delay and mark a LAG port having the lowest latency, and sort the paths according to each path's transit delay and mark a path having the lowest latency, wherein each path has an equal path cost factor. | 2014-10-09 |
20140304544 | NETWORK SYSTEM, NODE DEVICE GROUP, SENSOR DEVICE GROUP, AND METHOD FOR TRANSMITTING AND RECEIVING SENSOR DATA - Each node device has a sensor data saving information list storage section for storing a sensor data saving information list indicates a proper node device for saving each of sensor data among node devices according to an attribute of the sensor data. A sensor data arrangement section transfers each of the sensor data saved in sensor data storage sections of the node devices to the proper node device for saving the sensor data based on the sensor data saving information list. | 2014-10-09 |
20140304545 | RECOVERING A FAILURE IN A DATA PROCESSING SYSTEM - A technique of recovering a failure in a data processing system comprises restoring a checkpointed state in a last window, and resending all the input messages received at the second node during the failed window boundary. | 2014-10-09 |
20140304546 | SYSTEM AND METHOD FOR RECOVERING FROM A CONFIGURATION ERROR - A system and method for recovering from a configuration error are disclosed. A Basic Input Output System (BIOS) configures a memory associated with a node of an information handling system and enables a progress monitoring process during configuration of the memory. The memory is disabled if the BIOS determines that a configuration error occurred and a memory reference code associated with the memory is modified in order to prevent a reset of the information handling system. | 2014-10-09 |
20140304547 | DRIVE ARRAY APPARATUS, CONTROLLER, DATA STORAGE APPARATUS AND METHOD FOR REBUILDING DRIVE ARRAY - According to one embodiment, a drive array apparatus includes a plurality of data storage drives constituting a drive array and a controller. The controller divides all data storage areas of each of the data storage drives into a plurality of logical unit areas and associates and manages each of the logical unit areas and each of the data storage drives. The controller identifies a logical unit area of an error occurrence object based on a notification from a data storage drive where an error occurred, restores data of the identified logical unit area, and performs reconfiguration processing of the drive array. | 2014-10-09 |
20140304548 | INTELLIGENT AND EFFICIENT RAID REBUILD TECHNIQUE - A method for servicing a redundant array of independent storage drives (i.e., RAID) includes performing a service call on the RAID by performing the following steps: (1) determining whether the RAID includes one or more consumed spare storage drives; (2) in the event the RAID includes one or more consumed spare storage drives, physically replacing the one or more consumed spare storage drive with one or more non-consumed spare storage drives; and (3) initiating a copy process that copies data from a storage drive that is predicted to fail to a non-consumed spare storage drive associated with the RAID. The service call may then be terminated. After the service call is terminated, the method waits for an indication that a number of non-consumed spare storage drives in the RAID has fallen below a selected threshold. A corresponding apparatus and computer program product are also disclosed. | 2014-10-09 |
20140304549 | RECOVERING A FAILURE IN A DATA PROCESSING SYSTEM - A technique of recovering a failure in a data processing system comprises recording a number of input channels and sequence numbers for a number of input tuples transferred to a recipient task, recording a number of output channels and sequence numbers for a number of output tuples, and if a failure occurs, resolving the input and output channels. | 2014-10-09 |
20140304550 | Error Detection for Files - Aspects of the subject matter described herein relate to error detection for files. In aspects, before allowing updates to a clean file, a flag marking the file as dirty is written to non-volatile storage. Thereafter, the file may be updated as long as desired. Periodically or at some other time, the file may be marked as clean after all outstanding updates to the file and error codes associated with the file are written to storage. While waiting for outstanding updates and error codes to be written to storage, if additional requests to update the file are received, the file may be marked as dirty again prior to allowing the additional requests to update the file. The request to write a clean flag regarding the file may be done lazily. | 2014-10-09 |
20140304551 | PROGRAM ANALYSIS SUPPORTING DEVICE AND CONTROL DEVICE - A program analysis supporting device includes an analysis-condition-setting operation unit a variable-dependency-relation extracting unit and a variable-dependency-relation-display processing unit, in which the analysis-condition-setting operation unit sets a first condition related to a device for which a further forward or backward device dependency relation is not extracted or a second condition related to a device for which a further forward or backward device dependency relation is extracted, the variable-dependency-relation extracting unit extracts a forward or backward device dependency relation from the ladder program starting from the set start point not to extract a further forward or backward device dependency relation concerning a device matching the first condition and to extract a further forward or backward device dependency relation concerning a device matching the second condition and generates a first extraction result, and the variable-dependency-relation-display processing unit displays a device dependency relation according to the first extraction result. | 2014-10-09 |
20140304552 | DRIVE CONTROL DEVICE - A drive control device includes: an embedded microcontroller including a program for outputting a drive control signal to a driving unit; a first timer circuit for outputting a cyclic signal to the embedded microcontroller, wherein the embedded microcontroller reads the cyclic signal outputted from the first timer circuit and transmits the cyclic signal to output a transmission signal as part of operation of the program; and a second timer circuit provided externally to the embedded microcontroller, wherein the transmission signal is inputted to the second timer circuit, the second timer circuit obtains temporal change of the transmission signal for a time set in advance, and the second timer circuit outputs, based on the obtained result, a signal indicating one of different operation states of the embedded microcontroller depending on whether or not there is continuous temporal change of the transmission signal. | 2014-10-09 |
20140304553 | Grouping Failure Events with Adaptive Polling and Sliding Window Buffering - Embodiments detect and group multiple failure events to enable batch processing of those failure events, such as in a virtual datacenter executing a plurality of virtual machines (VMs). A long timer, adaptive short timer, and adaptive polling frequency enable a computing device to efficiently detect and group the failure events that may be related (e.g., resulting from one failure). The grouped failure events are processed in parallel thereby reducing the time for recovery from the failure events. | 2014-10-09 |
20140304554 | ENABLING COMMUNICATION OVER CROSS-COUPLED LINKS BETWEEN INDEPENDENTLY MANAGED COMPUTE AND STORAGE NETWORKS - Embodiments relate to providing communication over cross-coupled links between independently managed compute and storage networks. An aspect includes coupling an independently managed local subsystem with an independently managed remote subsystem over cross-coupled links, whereby each subsystem includes compute entities and storage entities. Unique identifiers are assigned to all the compute entities and the storage entities in the local network and the remote network. A determination is then made as to whether each entity is in the local subsystem or the remote subsystem. Accordingly, a global broadcast tree is built to bridge the compute entities in the local subsystem to the storage entities in both the local and remote subsystem. Responsive to an error in a layer of the local subsystem external to a cross-coupled link, the cross-coupled link in the local subsystem is disabled. Accordingly, the remote subsystem may detect that the link has failed. | 2014-10-09 |
20140304555 | UNIVERSAL SERIAL BUS TESTING DEVICE - A USB testing device is provided for an electronic device having a USB port. The USB testing device includes a first USB control unit, a second USB control unit, and a micro-processor. When the first USB control unit has received power, the first USB control unit processes a connection test via a first data port. When the second USB control unit has received the power, the second USB control unit processes a connection test via a second data port. When the USB testing device is connected to the USB port, the micro-processor provides power to the first USB control unit. When the first USB control unit receives power, the first USB control unit provides power to the second USB control unit after waiting for a predetermined period of time. The electronic device determines whether the first and second data ports are operating properly. | 2014-10-09 |
20140304556 | Performing Automated System Tests - A method, system and program product for performing automated tests on a system under test. A set of test blocks is provided, with each test block triggering at least one user activity on the system under test. The following is performed iteratively to execute multiple test blocks consecutively: defining a subset of executable test blocks; scoring the executable test blocks based on at least one scoring parameter; selecting a test block to be executed out of the subset of executable test blocks by randomly selecting a test block based on the scores, where the probability of selection of a test block depends on the score; executing the selected test block; updating the data of the status repository based on data of the system under test; and updating the data of the history log by adding data regarding the executed test block and the results of the test block execution. | 2014-10-09 |
20140304557 | PRIMARY MEMORY MODULE WITH RECORD OF USAGE HISTORY - A counter of a primary memory module provides a count indicative of the number of times the primary memory module has ever been read/written by a processor. With the count, an operating mode of the primary memory module is evaluated to optimize memory allocation performed by the data processing system, adjust the operating mode of the primary memory module, and send a warning message to a user, for example. | 2014-10-09 |
20140304558 | TRANSIENT CONDITION MANAGEMENT UTILIZING A POSTED ERROR DETECTION PROCESSING PROTOCOL - In a data processing system, a memory subsystem detects whether or not at least one potentially transient condition is present that would prevent timely servicing of one or more memory access requests directed to the associated system memory. In response to detecting at least one such potentially transient condition, the memory system identifies a first read request affected by the at least one potentially transient condition. In response to identifying the read request, the memory subsystem signals to a request source to issue a second read request for the same target address by transmitting to the request source dummy data and a data error indicator. | 2014-10-09 |
20140304559 | AGGREGATED PAGE FAULT SIGNALING AND HANDLINE - A processor of an aspect includes an instruction pipeline to process a multiple memory address instruction that indicates multiple memory addresses. The processor also includes multiple page fault aggregation logic coupled with the instruction pipeline. The multiple page fault aggregation logic is to aggregate page fault information for multiple page faults that are each associated with one of the multiple memory addresses of the instruction. The multiple page fault aggregation logic is to provide the aggregated page fault information to a page fault communication interface. Other processors, apparatus, methods, and systems are also disclosed. | 2014-10-09 |
20140304560 | SHUTDOWNS AND DATA RECOVERY TO AVOID READ ERRORS WEAK PAGES IN A NON-VOLATILE MEMORY SYSTEM - A memory apparatus and methods are provided for preventing read errors on weak pages in a non-volatile memory system. In one example, a method includes identifying a weak page in a non-volatile memory device along a word line, wherein the weak page is partially written with at least some data; buffering data associated with the weak page to a weak page buffer that is coupled in communication with the non-volatile memory device; determining that an amount of data in the weak page buffer has reached a predetermined data level; and writing the data from the weak page buffer into the weak page along the word line in the non-volatile memory device. | 2014-10-09 |
20140304561 | SHARED FUSE WRAPPER ARCHITECTURE FOR MEMORY REPAIR - A memory repair mechanism for the memories clustered across the multiple power domains and can be switched on and off independent of each other, thereby enabling low power operation. Enhancements in the shared Fuse Wrapper Architecture enable sharing of a plurality of parallel links connecting the memory blocks of each power domains to the Shared Fuse Wrapper architecture. | 2014-10-09 |
20140304562 | Method for Testing Paths to Pull-Up and Pull-Down of Input/Output Pads - A SCAN chain architecture for each path in a circuit having combinational paths includes a control mechanism to control one or more flip flops and multiplexers to direct operational or test signals. Operational signals are sent along at least one combinational path to a pull-up/pull-down for at least one input/output pad and an operational voltage is recorded. Test signals are sent along at least one alternative path to an alternative input/output and a test voltage is recorded. The operational voltage is compared to the test voltage to identify a combinational path fault. | 2014-10-09 |
20140304563 | POSITION INDEPENDENT TESTING OF CIRCUITS - Scan distributor, collector, and controller circuitry connect to the functional inputs and outputs of core circuitry on integrated circuits to provide testing through those functional inputs and outputs. Multiplexer and demultiplexer circuits select between the scan circuitry and the functional inputs and outputs. The core circuitry can also be provided with built-in scan distributor, collector, and controller circuitry to avoid having to add it external of the core circuitry. With appropriately placed built-in scan distributor and collector circuits, connecting together the functional inputs and outputs of the core circuitry also connects together the scan distributor and collector circuitry in each core. This can provide a hierarchy of scan circuitry and reduce the need for separate test interconnects and multiplexers. | 2014-10-09 |
20140304564 | SCAN FRAME BASED TEST ACCESS MECHANISMS - Testing of an electrical device is achieved by providing a test access mechanism within the device that can receive scan frames from an external tester. The received scan frames contain stimulus data to be applied to circuitry within the device to be tested, a command for enabling a test control operation, and a frame marker bit to indicate the end of the scan frame pattern. The inputting of scan frames can occur continuously and simultaneous with a commanded test control operation. | 2014-10-09 |