44th week of 2012 patent applcation highlights part 62 |
Patent application number | Title | Published |
20120278536 | MEMORY DEVICE CAPABLE OF PREVENTING SPECIFIC DATA FROM BEING ERASED - According to one embodiment, a memory device includes a nonvolatile semiconductor memory, and control section. The nonvolatile semiconductor memory includes a first memory area, and second memory area other than the first memory area. The control section receives a first command from a host, and permits use of the second memory area on the basis of the first command. The control section receives a second command from the host, and transmits a parameter indicating the capacity of the first memory area to the host on the basis of the second command. The control section further receives a third command from the host, and accesses the first memory area on the basis of the third command. When use of the second memory area is permitted, the control section receives the third command from the host, and accesses the second memory area on the basis of the third command. | 2012-11-01 |
20120278537 | METHOD AND APPARATUS FOR I/O SCHEDULING IN DATA STORAGE DEVICE - An input/output (I/O) scheduling device comprises a plurality of trans-descriptor operators each corresponding to one of a plurality of hosts and configured to sustain a trans-descriptor and transmit the trans-descriptor to a hardware module, a transmitting scheduler configured to schedule transmission of trans-descriptors through communication with the plurality of trans-descriptor operators, and a receiving scheduler configured to schedule reception of trans-descriptors through communication with the trans-descriptor operators. | 2012-11-01 |
20120278538 | DATA STORAGE APPARATUS, MEMORY CONTROL DEVICE, AND METHOD FOR CONTROLLING FLASH MEMORIES - According to one embodiment, a data storage apparatus includes a memory module and a controller. The memory module has a plurality of flash memory chips. Data is written to or read from each flash memory chip having a specific page size as access unit. The controller is configured to supply memory control signals, which are independent of the common signal containing the data and addresses, to the flash memory chips, respectively, in order to write data larger than the specific data size to the memory module. In the memory module, the respective flash memory chips store the data, each at the same address, in response to the memory control signals. | 2012-11-01 |
20120278539 | MEMORY APPARATUS, MEMORY CONTROL APPARATUS, AND MEMORY CONTROL METHOD - A memory apparatus includes: a plurality of flash memory sections connected to a common data line; and a control section configured to perform control for data read/write on the plurality of flash memory sections, wherein the control section performs control so as to give a read instruction to a first flash memory section among the plurality of flash memory sections to output read data from the first flash memory section onto the common data line, and to give a write instruction to a second flash memory section other than the first flash memory section to write the read data obtained on the common data line into the second flash memory section with timing in accordance with timing of outputting the read data from the first flash memory section. | 2012-11-01 |
20120278540 | METHOD FOR PERFORMING HOST-DIRECTED OPERATIONS, AND ASSOCIATED MEMORY DEVICE AND CONTROLLER THEREOF - A method for performing host-directed operations is provided, where the method is applied to a controller of a Flash memory that includes a plurality of blocks. The method includes: in a test mode of the controller, when receiving a host command from a host device, extracting at least one portion of associated information of the host command, where the at least one portion of the associated information is an encoded result that is generated by performing encoding on a host-directed operation command; and analyzing the at least one portion of the associated information according to at least one predetermined rule, in order to perform a host-directed operation corresponding to the host-directed operation command. An associated memory device and a controller thereof are also provided. | 2012-11-01 |
20120278541 | MEMORY SYSTEM WITH IMPROVED COMMAND RECEPTION - According to one embodiment, a memory system includes a nonvolatile memory, a buffer, an interface unit, and a buffer control unit including a counter. The nonvolatile memory stores data. The buffer temporarily holds at least one data to be written in the nonvolatile memory. The interface unit receives a request from a host device. The counter is incremented every time a flush request is received to write, in the nonvolatile memory at once, the at least one data held in the buffer. The buffer control unit transfers the at least one data held in the buffer to the nonvolatile memory based on the count value of the counter. The interface unit can receive the next request when the buffer control unit has received the flush request. | 2012-11-01 |
20120278542 | COMPUTER SYSTEM AND SLEEP CONTROL METHOD THEREOF - A computer system and a sleep control method thereof are provided. The method includes following steps: when a computer system enters a sleep mode, storing a system parameter into a dynamic random access memory (DRAM) via a central processing unit (CPU); storing the system parameter in the DRAM to a flash memory via a bridge unit; and entering the sleep mode or a power off mode. According to the disclosure, to wake up the computer system is more rapidly and power saving. | 2012-11-01 |
20120278543 | Flash-Memory Device with RAID-type Controller - A smart flash drive has one or more levels of smart storage switches and a lower level of single-chip flash devices (SCFD's). A SCFD contains flash memory and controllers that perform low-level bad-block mapping and wear-leveling and logical-to-physical block mapping. The SCFD report their capacity, arrangement, and maximum wear-level count (WLC) and bad block number (BBN) to the upstream smart storage switch, which stores this information in a structure register. The smart storage switch selects the SCFD with the maximum BBN as the target and the SCFD with the lowest maximum WLC as the source of a swap for wear leveling when a WLC exceeds a threshold that rises over time. A top-level smart storage switch receives consolidated capacity, arrangement, WLC, and BBN information from lower-level smart storage switch. Data is striped and optionally scrambled by Redundant Array of Individual Disks (RAID) controllers in all levels of smart storage switches. | 2012-11-01 |
20120278544 | FLASH MEMORY CONTROLLER - A Flash memory controller is coupled to a first Flash memory package through a first Flash memory interface and to a second Flash memory package through the first Flash memory interface. The Flash memory controller is designed to receive a first instruction relating to the first Flash memory package and to perform a first process depending on the first instruction. The Flash memory controller is further designed to receive a second instruction relating to the second Flash memory package and to perform a second process depending on the second instruction. The Flash memory controller is further adapted for splitting the first process into at least two first sub-steps and for splitting the second process into at least two second sub-steps. The Flash memory controller is further adapted for executing the first and second sub-steps, and for interleaving execution of first and second sub-steps. | 2012-11-01 |
20120278545 | NON-VOLATILE MEMORY DEVICE WITH NON-EVENLY DISTRIBUTABLE DATA ACCESS - A memory system including a nonvolatile memory, and a memory control module. The nonvolatile memory includes memory cells arranged among physical memory blocks, wherein each physical memory block is of a predetermined size. The memory control module includes a write path module and a read path module. In response to the memory control module receiving data in a first format such that the data is evenly distributable among the physical memory blocks, the write path module modifies the first format of the data into a second format prior to writing the data to the physical memory blocks. The second format of the data is such that the data is no longer evenly distributable among the physical memory blocks. The read path module is configured to read the data from the nonvolatile memory in accordance with the second format. | 2012-11-01 |
20120278546 | Authentication and Securing of Write-Once, Read-Many (WORM) Memory Devices - These embodiments relate to authentication and securing of write-once, read-many (WORM) memory devices. In one embodiment, a memory device comprises a controller operable in first and second modes of operation after stored security information is validated, wherein in the first mode of operation, the memory device operates in a read-only mode, and wherein in the second mode of operation, the memory device operates in a write-once, read-many (WORM) mode. In another embodiment, the controller is operative to perform security methods. | 2012-11-01 |
20120278547 | Method and system for hierarchically managing storage resources - The disclosure discloses a method for hierarchically managing storage resources, which comprises: planning a storage space, establishing an address management index, and storing or reading data according to the index and a type of the data. The disclosure further discloses a system for hierarchically managing storage resources. Through the method and system of the disclosure, space can be better saved, storage requirements of data of different sizes can be met, and the storage space can be flexibly recorded and released. | 2012-11-01 |
20120278548 | OPTIMIZING EDRAM REFRESH RATES IN A HIGH PERFORMANCE CACHE ARCHITECTURE - Optimizing EDRAM refresh rates in a high performance cache architecture. An aspect of the invention includes receiving a plurality of first signals. A refresh request is transmitted via a refresh requestor to a cache memory at a first refresh rate which includes an interval, including a subset of the first signals. The first refresh rate corresponds to a maximum refresh rate. A refresh counter is reset based on receiving a second signal. The refresh counter is incremented after receiving each of a number of refresh requests. A current count is transmitted from a refresh counter to the refresh requestor based on receiving a third signal. The refresh request is transmitted at a second refresh rate, which is less than the first refresh rate. The refresh request is transmitted based on receiving the current count from the refresh counter and determining that the current count is greater than a refresh threshold. | 2012-11-01 |
20120278549 | ADAPTIVE POWER CONSERVATION IN STORAGE CLUSTERS - Each node and volume in a storage cluster makes a decision whether to reduce power consumption based on lack of requests from client applications and nodes over a time period. Node configuration parameters determine how long to wait until idling a node or volume, and how long to wait while idle before performing integrity checks. A bid value is calculated by each node and reflects how much it will cost for that node to write a file, read a file, or keep a copy. A node with the lowest bid wins, and nodes that are idle have a premium added to each bid to ensure that idle nodes are kept idle. In an archive mode, writes bids are reversed, nodes with less capacity submit lower bids, fuller nodes fill up faster and are then idled, while empty or near empty nodes may remain idle before winning a write bid. | 2012-11-01 |
20120278550 | SYSTEM ARCHITECTURE BASED ON RAID CONTROLLER COLLABORATION - Embodiments of the present invention provide a semiconductor storage device (SSD) system based on redundant array of independent disks (RAID) controller collaboration. Specifically, embodiments of the present invention provide a set (at least one) of RAID controllers coupled to a host system, wherein each of the set of RAID controllers is configured to collaborate with at least one other RAID controller within the set through at least one dedicated controller-to-controller channel to enable high bandwidth RAID storage. | 2012-11-01 |
20120278551 | METHOD AND SYSTEM FOR COUPLING SERIAL ATTACHED SCSI (SAS) DEVICES AND INTERNET SMALL COMPUTER SYSTEM INTERNET (iSCSI) DEVICES THROUGH SINGLE HOST BUS ADAPTER - An apparatus comprising an interface, a first port, and a second port. The interface may be configured to connect to a host computer. The first port may be configured to connect to a first set of storage devices using a first protocol. The second port may be configured to connect to a second set of storage devices using a second protocol. The apparatus may provide support for the first protocol and the second protocol to allow communication using both the first protocol and the second protocol through the interface. | 2012-11-01 |
20120278552 | REMOTE EXECUTION OF RAID IN LARGE TOPOLOGIES - A SAS expander for use in a SAS topology includes a receiving portion and a controller. The receiving portion is configured to receive a remote RAID instruction from a root host bus adapter. The controller is configured to execute the instruction to manage a RAID volume in accordance with a RAID management task specified by the instruction. | 2012-11-01 |
20120278553 | SYSTEM AND METHOD FOR MIGRATION OF DATA CLONES - Described herein is a system and method for migrating data from a source storage site to a destination storage site. The data may be comprised within storage objects (e.g., flexible volumes). A base storage object may comprise a parent storage object and a storage object clone may comprise a storage object that is derived from the base storage object. As such, a hierarchical relationship exists between the base storage object and the storage object clone. The storage object clone may comprise a writable point-in-time image of the parent storage object. If a migration of the base storage object and the storage object clone is performed, then the hierarchical relationship between the base storage object and the storage object clone is retained after the storage objects are migrated from the source storage site to the destination storage site. As such, the system and method for migrating data may enable storage space and network bandwidth savings. | 2012-11-01 |
20120278554 | HIERARCHICAL MEMORY ARCHITECTURE TO CONNECT MASS STORAGE DEVICES - A hierarchical memory storage using a concentrator device that is located between a processor and memory storage devices to provide a succession of memory devices and enable attachment of a memory depth to a processor controller with a limited pin count. | 2012-11-01 |
20120278555 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 2012-11-01 |
20120278556 | STORAGE APPARATUS AND CACHE CONTROL METHOD - Optimizing cache-resident area where cache residence control in units of LUs is employed to a storage apparatus that virtualizes the capacity by acquiring only a cache area of a size that is the same as the physical capacity assigned to the LU. An LU is a logical space resident in cache memory is configured by a set of pages acquired by dividing a pool volume as a physical space created by using a plurality of storage devices in a predetermined size. When the LU to be resident in the cache memory is created, a capacity corresponding to the size of the LU is not initially acquired in the cache memory, a cache capacity that is the same as the physical capacity allocated to a new page is acquired in the cache memory each time when the page is newly allocated, and the new page is resident in the cache memory. | 2012-11-01 |
20120278557 | Combined Transparent/Non-Transparent Cache - In one embodiment, a memory that is delineated into transparent and non-transparent portions. The transparent portion may be controlled by a control unit coupled to the memory, along with a corresponding tag memory. The non-transparent portion may be software controlled by directly accessing the non-transparent portion via an input address. In an embodiment, the memory may include a decoder configured to decode the address and select a location in either the transparent or non-transparent portion. Each request may include a non-transparent attribute identifying the request as either transparent or non-transparent. In an embodiment, the size of the transparent portion may be programmable. Based on the non-transparent attribute indicating transparent, the decoder may selectively mask bits of the address based on the size to ensure that the decoder only selects a location in the transparent portion. | 2012-11-01 |
20120278558 | Structure-Aware Caching - Techniques for structure-aware caching are provided. The techniques include decomposing a response from an origin server into one or more independently addressable objects, using a domain specific language to navigate the response to identify the one or more addressable objects and create one or more access paths to the one or more objects, and selecting a route to an object by navigating an internal structure of a cached object to discover one or more additional independently addressable objects. | 2012-11-01 |
20120278559 | PERFORMING A DATA WRITE ON A STORAGE DEVICE - A method of performing a data write on a storage device comprises instructing a device driver for the device to perform a write to the storage device, registering the device driver as a transaction participant with a transaction co-ordinator, executing a flashcopy of the storage device, performing the write on the storage device, and performing a two-phase commit between device driver and transaction co-ordinator. Preferably, the method comprises receiving an instruction to perform a rollback, and reversing the data write according to the flashcopy. In a further refinement, a method of scheduling a flashcopy of a storage device comprises receiving an instruction to perform a flashcopy, ascertaining the current transaction in relation to the device, registering the device driver for the device as a transaction participant in the current transaction with a transaction co-ordinator, receiving a transaction complete indication from the co-ordinator, and executing the flashcopy for the device. | 2012-11-01 |
20120278560 | PRE-FETCHING IN A STORAGE SYSTEM THAT MAINTAINS A MAPPING TREE - A storage system, a non-transitory computer readable medium and a method for pre-fetching. The method may include presenting, by a storage system and to at least one host computer, a logical address space; determining, by a fetch module, to fetch a certain data portion from a data storage device to a cache memory of the storage system; determining, by a pre-fetch module, whether to pre-fetch at least one additional data portion from at least one data storage device to the cache memory based upon at least one characteristic of a mapping tree that maps one or more contiguous ranges of addresses related to the logical address space and one or more contiguous ranges of addresses related to the physical address space; and pre-fetching the at least one additional data portions if it is determined to pre-fetch the at least one additional data portions. | 2012-11-01 |
20120278561 | COMPUTER SYSTEM AND CONTROL METHOD OF THE COMPUTER SYSTEM - To create one pool by using a plurality of storage apparatuses and to provide virtual volumes common to each of the storage apparatuses to the server. | 2012-11-01 |
20120278562 | BRANCH CIRCUIT MONITOR WITH PAGING REGISTER - The quantity of data stored in a branch circuit monitor and accessible by a data processing network is increased by logically dividing the monitor's memory into a plurality of registers each comprising a plurality of pages and addressing a page containing the desired data with an address corresponding to the identity of a page number stored in a page register and the identity of the register. | 2012-11-01 |
20120278563 | MEMORY DEVICE AND MEMORY SYSTEM - A memory device having at least one memory including a first memory. The first memory includes a core area having a data storage unit that is non-volatile and a peripheral circuit area having an input/output circuit. The data storage unit of the first memory stores setting information about a memory controller corresponding to the first memory. | 2012-11-01 |
20120278564 | SECURE ERASURE OF DATA FROM A NON-VOLATILE MEMORY - Method and apparatus for securely erasing data from a non-volatile memory, such as but not limited to a flash memory array. In accordance with various embodiments, an extended data set to be sanitized from the memory is identified. The extended data set includes multiple copies of data having a common logical address and different physical addresses within the memory. The extended data set is sanitized in relation to a characterization of the data set. The data sanitizing operation results in the extended data set being purged from the memory and other previously stored data in the memory being retained. | 2012-11-01 |
20120278565 | PROCESSING DEVICE, CONTROLLING UNIT, AND METHOD FOR PROCESSING - Each of the boards sequentially reads, in response to an execution instruction from a manager, the procedural steps from a memory, controls devices on the board through sequentially carrying out processing corresponding to each of the read procedural steps, and notifies a result of the carrying out the procedural steps to the manager. | 2012-11-01 |
20120278566 | Intelligent Partitioning of External Memory Devices - Multiple memory devices, such as hard drives, can be combined and logical partitions can be formed between the drives to allow a user to control regions on the drives that will be used for storing content, and also to provide redundancy of stored content in the event that one of the drives fails. Priority levels can be assigned to content recordings such that higher value content can be stored in more locations and easily accessible locations within the utilized drives. Users can control and organize how recorded content is stored between the drives such that an external drive may be removed from a first gateway device and attached to a second gateway device without losing the ability to access the recorded content from the first gateway device at a later time. In this manner, a user is provided with the ability to transport an external drive containing stored content recordings between multiple different gateway devices such that the recordings may be accessed at different locations or user premises. | 2012-11-01 |
20120278567 | ONLINE VOLUME MIGRATION USING MULTI-PATH INPUT / OUTPUT MASQUERADING - An apparatus for configuring data migration comprises a host computer, a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume, and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer; to copy a volume identifier associated with the mapped first volume to the memory, to retrieve, by the host computer, the copied volume identifier from the memory, to set a state of the second volume to inactive, to map the inactive second volume to the host computer, to set a state of the mapped first volume to inactive, to synchronize status data between the inactive first volume and the inactive second volume, after the copying, to start data migration from the inactive first volume to the inactive second volume, and after the starting, to set the state of the second volume to active. | 2012-11-01 |
20120278568 | TRANSPARENT INPUT / OUTPUT SWITCHING BETWEEN SYNCHRONOUSLY MIRRORED STORAGE VOLUMES - An apparatus for configuring transparent synchronous mirroring volume switching comprises a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer, to initiate synchronization of status data between the mapped first volume and the second volume, to set the mapped first volume to an active state and the second volume to an inactive state, to copy an identifier associated with the active first volume to a memory coupled to the inactive second volume, to retrieve, by the host computer, the copied identifier from the memory, and after the retrieving, to map the inactive second volume to the host computer. | 2012-11-01 |
20120278569 | STORAGE APPARATUS AND CONTROL METHOD THEREFOR - A storage apparatus providing a logical storage area for storing data to an external apparatus, includes a plurality of storage devices each providing a physical storage area for storing the data, the storage devices being different from each other in device property including data input/output performance, a capacity virtualization part managing the physical storage areas of the storage devices as unit physical storage areas each having a predetermined storage capacity and managing the unit physical storage areas in association with a plurality of unit logical storage areas forming the logical storage area, a tier controller managing the plurality of unit physical storage areas by classifying into a plurality of tiers the unit physical storage areas provided by the storage devices having the different device properties, and a redundant data management part managing redundant unit storage areas which are a plurality of the unit physical storage areas storing the same data. The data migration between the tiers is controlled according to, for example, an access frequency to the data from the external apparatus. | 2012-11-01 |
20120278570 | METHODS FOR SYNCHRONIZING STORAGE SYSTEM DATA - In accordance with one example, a method for comparing data units is disclosed comprising generating a first digest representing a first data unit stored in a first memory. A first encoded value is generated based, at least in part, on the first digest and a predetermined value. A second digest representing a second data unit stored in a second memory different from the first memory, is generated. A second encoded value is derived based, at least in part, on the second digest and the predetermined value. It is determined whether the first data unit and the second data unit are the same based, at least in part, on the first digest, the first predetermined value, the first encoded value, and the second digest, by first processor. If the second data unit is not the same as the first data unit, the first data unit is stored in the second memory. | 2012-11-01 |
20120278571 | MIGRATING VIRTUAL MACHINES ACROSS SITES - The invention relates to apparatus and methods for managing data swap in a migration of virtual memory data of a virtual machine. In one embodiment, an apparatus comprises a receiving unit configured to receive a migration instruction and the second site information; a copying unit configured to copy memory data to a sub-logical unit in the first storage device; and a notifying unit configured to send a notification to instruct the second host to read the memory data from a mirror logical unit of a sub-logical unit in the second storage device. The apparatus modifies a mirror direction between the first and second storage devices and modifies a path table related to the first and second storage devices. Data of the virtual machine can be migrated and swapped in a metro mirror manner, thereby the virtual machine data can be migrated across sites without affecting system operation. | 2012-11-01 |
20120278572 | ONLINE VOLUME MIGRATION USING MULTI-PATH INPUT / OUTPUT MASQUERADING - A method, including configuring data migration from a first volume to a second volume, which are coupled via a storage area network (SAN) to a host computer, with the first volume mapped to the host computer. A volume identifier associated with the first volume is copied to a memory coupled to the second volume, and the copied volume identifier is retrieved from the memory by the host computer. A state of the second volume is to inactive, and the inactive second volume is mapped to the host computer. A state of the first volume is set to inactive, and the status is data from the inactive first volume to the inactive second volume. After the copying, data migration is started from the inactive first volume to the inactive second volume, and after the starting, the state of the second volume is set to active. | 2012-11-01 |
20120278573 | ONLINE VIRTUAL MACHINE DISK MIGRATION - A method for migrating a virtual machine disk (VM disk) from first physical storage to second physical storage while the virtual machine (VM) is running, the method comprising: (a) taking a snapshot of the VM disk as represented by a first parent VM disk stored on the first physical storage, whereby a first child VM disk is created on one of the first or second physical storage; (b) copying the first parent VM disk to the second physical storage as a second parent VM disk; (c) re-parenting the first VM child disk to the second parent VM disk; and (d) consolidating the first child VM disk and the second parent VM disk. | 2012-11-01 |
20120278574 | METHOD OF CONSTRUCTING REPLICATION ENVIRONMENT AND STORAGE SYSTEM - A management computer collects a usage condition of a volume from a host computer and a storage apparatus at each site, consolidates management thereof, and prevents a volume from duplicating among applications as a copy source. This makes it possible to select a used volume in an application as a copy source without excess or deficiency and to create a copy pair configuration definition without duplication or incompatibility. If a replication environment is constructed in a large-scale storage system, the consolidated management of a usage condition of a volume collected from the host computer and the storage apparatus at each site makes it possible to create a copy pair configuration definition by a task constituted by a plurality of applications. | 2012-11-01 |
20120278575 | Method and Computer Program Product For Exchanging Message Data In A Distributed Computer System - A method for exchanging message data in a distributed computer system between a sending and a receiving hardware system. The sending hardware system includes a first memory system and a receiving hardware system which includes a second memory system with a second data buffer and a second memory region. The sending hardware system and the receiving hardware system are coupled via a non-transparent bridge unit. The method includes allocating empty memory, writing information about the empty memory, copying payload data directly from the sending hardware system to the empty memory locations, and writing information about the copied payload data to the second data buffer of the second memory system inside the receiving hardware system. A computer program product for carrying out the method is also provided. | 2012-11-01 |
20120278576 | EFFICIENT NON-BLOCKING K-COMPARE-SINGLE-SWAP OPERATION - The design of nonblocking linked data structures using single-location synchronization primitives such as compare-and-swap (CAS) is a complex affair that often requires severe restrictions on the way pointers are used. One way to address this problem is to provide stronger synchronization operations, for example, ones that atomically modify one memory location while simultaneously verifying the contents of others. We provide a simple and highly efficient nonblocking implementation of such an operation: an atomic k-word-compare single-swap operation (KCSS). Our implementation is obstruction-free. As a result, it is highly efficient in the uncontended case and relies on contention management mechanisms in the contended cases. It allows linked data structure manipulation without the complexity and restrictions of other solutions. Additionally, as a building block of some implementations of our techniques, we have developed the first nonblocking software implementation of load-linked/store-conditional that does not severely restrict word size. | 2012-11-01 |
20120278577 | METHOD AND APPARATUS FOR PROTECTED CONTENT DATA PROCESSING - Methods and an apparatuses that perform protected content data processing with limited access to system resources are described. One or more regions in a memory (including a source memory and a destination memory) can be allocated and unprocessed content data can be mapped to the source memory. A process can be initialized with the source and destination memories to process the content data. The process can be prevented from accessing resource other than the allocated regions in the memory. The processed content data can be stored in the destination memory. In one embodiment, the content data can include media content. A playing device can be instructed to play the media content based on the processed content data via the destination memory. | 2012-11-01 |
20120278578 | COST-AWARE REPLICATION OF INTERMEDIATE DATA IN DATAFLOWS - Described herein are methods, systems, apparatuses and products for cost-aware replication of intermediate data in dataflows. An aspect provides receiving at least one measurement indicative of a reliability cost associated with executing a dataflow; computing a degree of replication of at least one intermediate data set in the dataflow based on the reliability cost; and communicating at least one replication factor to at least one component of a system responsible for replication of the at least one intermediate data set in the dataflow; wherein the at least one intermediate data set is replicated according to the replication factor. Other embodiments are disclosed. | 2012-11-01 |
20120278579 | Self-Initiated Secure Erasure Responsive to an Unauthorized Power Down Event - Method and apparatus for self-initiated secure erasure of data from a non-volatile memory, such as a solid state drive (SSD). In accordance with various embodiments, the memory is operated in communication with a host device. A self-initiated, non-destructive secure erasure of the data stored in the memory is carried out responsive to a detection of an unauthorized power down event associated with the memory. | 2012-11-01 |
20120278580 | DATA STORAGE RECLAMATION SYSTEMS AND METHODS - Storage systems and methods are presented. In one embodiment, a storage reclamation method comprises performing a potential reclamation identification process, wherein the potential reclamation identification process includes determining if there is the potential for reclaiming storage resources; performing a reclamation process, wherein reclamation is performed on storage resources identified by the potential reclamation identification process as being eligible for reclamation, and wherein the storage resources correspond to free space associated with a data file; and performing a valid free space indication process, wherein a valid free space indication process includes forwarding a valid free space indication recognizable to an application as a valid free space indication when the application attempts to direct a read to the storage spaces reclaimed by the reclamation process. | 2012-11-01 |
20120278581 | METHOD AND SYSTEM FOR DYNAMIC MEMORY MANAGEMENT - A computer system which includes a plurality of threads and a garbage collector that traces memory objects and identifies memory objects according to a three-color abstraction. The computer system also includes two methods of deleting compiled code in a self-modifying multi-threaded computer system. The computer system also utilizes a method of handling links between fragments of code in a self-modifying multi-threaded computer system. The computer system also handles patches between two pieces of code. | 2012-11-01 |
20120278582 | MAGNETIC MEMORY ELEMENT, MAGNETIC MEMORY AND INITIALIZING METHOD - A magnetic memory element includes: a first magnetization free layer; a non-magnetic layer; a reference layer; a first magnetization fixed layer group; and a first blocking layer. The first magnetization free layer is composed of ferromagnetic material with perpendicular magnetic anisotropy and includes a first magnetization fixed region, a second magnetization fixed region and a magnetization free region. The non-magnetic layer is provided near the first magnetization free layer. The reference layer is composed of ferromagnetic material and provided on the non-magnetic layer. The first magnetization fixed layer group is provided near the first magnetization fixed region. The first blocking layer is provided being sandwiched between the first magnetization fixed layer group and the first magnetization fixed region or in the first magnetization fixed layer group. | 2012-11-01 |
20120278583 | ADAPTIVELY TIME-MULTIPLEXING MEMORY REFERENCES FROM MULTIPLE PROCESSOR CORES - The disclosed embodiments relate to a system for processing memory references received from multiple processor cores. During operation, the system monitors the memory references to determine whether memory references from different processor cores are interfering with each other as the memory references are processed by a memory system. If memory references from different processor cores are interfering with each other, the system time-multiplexes the processing of memory references between processor cores, so that a block of consecutive memory references from a given processor core is processed by the memory system before memory references from other processor cores are processed. | 2012-11-01 |
20120278584 | INFORMATION STORAGE SYSTEM AND STORAGE SYSTEM MANAGEMENT METHOD - An embodiment of this invention is an information storage system comprising a plurality of storage systems connected to be able to communicate. Each of the plurality of storage systems includes default storage system identification information which is the same to the plurality of storage systems, common volume identification information for uniquely identifying volumes provided by the plurality of storage systems to a host computer among the plurality of storage systems, and a controller configured to return the default storage system identification information to the host computer in response to a request from the host computer and to process a read or write request to a volume accompanying the common volume identification information from the host computer. | 2012-11-01 |
20120278585 | OPTIMIZING HEAP MEMORY USAGE - This disclosure provides a computing system and method to profile a program for finding potential optimization in heap usage by reducing lag and drag in lifetimes of heap memory blocks. The process consists of three steps. First, an instrumentation engine analyzes a given program, and inserts additional code at interesting locations to collect needed information. Second, when the instrumented program is executed on a set of test cases, runtime data is collected. Third, since this data could be relatively large for a complex and long running program, data is processed to present it to a user in useful ways so that the programmer can improve the heap utilization in the program. | 2012-11-01 |
20120278586 | Dynamic Data Partitioning For Optimal Resource Utilization In A Parallel Data Processing System - A method, computer program product, and system for dynamically distributing data for parallel processing in a computing system, comprising allocating a data buffer to each of a plurality of data partitions, where each data buffer stores data to be processed by its corresponding data partition, distributing data in multiple rounds to the data buffers for processing by the data partitions, where in each round the data is distributed based on a determined data processing capacity for each data partition, and where a greater amount of data is distributed to the data partitions with higher determined processing capacities, and periodically monitoring usage of each data buffer and re-determining the determined data processing capacity of each data partition based on its corresponding data buffer usage. | 2012-11-01 |
20120278587 | Dynamic Data Partitioning For Optimal Resource Utilization In A Parallel Data Processing System - A method, computer program product, and system for dynamically distributing data for parallel processing in a computing system, comprising allocating a data buffer to each of a plurality of data partitions, where each data buffer stores data to be processed by its corresponding data partition, distributing data in multiple rounds to the data buffers for processing by the data partitions, where in each round the data is distributed based on a determined data processing capacity for each data partition, and where a greater amount of data is distributed to the data partitions with higher determined processing capacities, and periodically monitoring usage of each data buffer and re-determining the determined data processing capacity of each data partition based on its corresponding data buffer usage. | 2012-11-01 |
20120278588 | HARDWARE ASSISTANCE FOR PAGE TABLE COHERENCE WITH GUEST PAGE MAPPINGS - Some embodiments of the present invention include a memory management unit (MMU) configured to, in response to a write access targeting a guest page mapping of a guest virtual page number (GVPN) to a guest physical page number (GPPN) within a guest page table, identify a first page mapping that associates the GVPN with a physical page number (PPN). The MMU is also configured to determine whether a traced write indication is associated with the first page mapping and, if so, record update information identifying the targeted guest page mapping. The update information is used to reestablish coherence between the guest page mapping and the first page mapping. The MMU is further configured to perform the write access. | 2012-11-01 |
20120278589 | STORAGE SYSTEM COMPRISING MULTIPLE MICROPROCESSORS AND METHOD FOR SHARING PROCESSING IN THIS STORAGE SYSTEM - The present invention provides a storage system in which each microprocessor is able to execute synchronous processing and asynchronous processing in accordance with the operating status of the storage system. Any one attribute, from among multiple attributes (operating modes) prepared beforehand, is set in each microprocessor in accordance with the operating status of the storage system. The attribute that is set in each microprocessor is regularly reviewed and changed. | 2012-11-01 |
20120278590 | RECONFIGURABLE PROCESSING SYSTEM AND METHOD - A reconfigurable processor is provided. The reconfigurable processor includes a plurality of functional blocks configured to perform corresponding operations. The reconfigurable processor also includes one or more data inputs coupled to the plurality of functional blocks to provide one or more operands to the plurality of functional blocks, and one or more data outputs to provide at least one result outputted from the plurality of functional blocks. Further, the reconfigurable processor includes a plurality of devices configured to inter-connect the plurality of functional blocks such that the plurality of functional blocks are independently provided with corresponding operands from the data inputs and individual results from the plurality of functional blocks are independently feedback as operands to the plurality of functional blocks to carry out one or more operation sequences | 2012-11-01 |
20120278591 | CROSSBAR SWITCH MODULE HAVING DATA MOVEMENT INSTRUCTION PROCESSOR MODULE AND METHODS FOR IMPLEMENTING THE SAME - A microprocessor is provided that has a datapath that is split into upper and lower portions. The microprocessor includes a centralized crossbar switch module having a single data movement module. The data movement module is capable of processing instructions that require operands to be exchanged between upper and lower 64-bit halves of the split architecture. The data movement module can access and process all instructions that require simultaneous access to the entire register contents of the upper and lower portions. The data movement module is configured to execute any one of a number of different instructions to perform data manipulation with respect to one or more “split-operands” (also referred to simply as “operands” herein). The data movement module can exchange data (bytes and/or bits) of operands for the upper and lower 64-bit halves so that bytes and/or bits of operands can be moved or rearranged to other positions during execution of a particular instruction. The data movement module can allow for various types of operand data movement/manipulation that may be required to implement instruction processing that may be required per various instructions, such as permute, pack, shuffle, vectored conditional move, extract, shift, rotate instructions, any other instruction in which operand data is manipulated, shifted, moved, re-ordered, shuffled or scrambled. | 2012-11-01 |
20120278592 | MICROPROCESSOR SYSTEMS AND METHODS FOR REGISTER FILE CHECKPOINTING - In a processor, a decode unit identifies instructions needing a checkpoint and enables selected checkpoints, and a register file unit includes a plurality of architectural registers; a first set of checkpoint registers corresponding to a first checkpoint, wherein each checkpoint register of the first set corresponds to a corresponding architectural register of the plurality of architectural registers; a first set of indicators corresponding to the first set of checkpoint registers which, for each checkpoint register in the first set of checkpoint registers, indicates whether the corresponding architectural register has been modified or is intended to be modified prior to enabling of the first checkpoint; and a second set of indicators corresponding to the first set of checkpoint registers which, for each checkpoint register in the first set of checkpoint registers, indicates whether the corresponding architectural register has been modified or is intended to be modified after enabling of the first checkpoint. | 2012-11-01 |
20120278593 | LOW COMPLEXITY OUT-OF-ORDER ISSUE LOGIC USING STATIC CIRCUITS - Instruction issue circuits are disclosed that are configured to issue multiple instructions within a superscalar pipeline of a microprocessor. The instruction issue circuit includes an instruction queue that stores instructions. A ready generation circuit is operably associated with the instruction queue and generates ready signals that indicate which instructions in the instruction queue are ready for execution. To simplify the instruction issue circuit, the instruction issue circuit has group blocks. Each group block receives a different group of the ready signals corresponding to a different group of the instructions. Each group block generates a group output indicating a group set within the corresponding group of the instructions that has a highest instruction execution priority and are ready for execution. By splitting the ready signals into groups, the groups of ready signals can be processed in parallel thereby reducing both the resulting delay and complexity of the instruction issue circuit. | 2012-11-01 |
20120278594 | PERFORMANCE BOTTLENECK IDENTIFICATION TOOL - A computer program product for identifying bottlenecks includes a computer readable storage medium with stored computer readable program instructions. The computer readable program instructions, when executed, provide a data collector module, a mapper module, and an analyzer module that are collectively configured to read mapped data and configuration files, and identify, based upon the mapped data and the configuration files, an undesirable bottleneck condition that causes a computer program to run inefficiently. A method includes reading a configuration file that includes data regarding processor components, and collecting data from hardware activity counters based upon the configuration file. The method also includes mapping the collected data to corresponding sections of code of a computer program, reading the mapped data and the configuration file, and identifying, based upon the reading of the mapped data and the configuration file, an undesirable bottleneck condition that causes the processor to run the computer program inefficiently. | 2012-11-01 |
20120278595 | DETERMINING EACH STALL REASON FOR EACH STALLED INSTRUCTION WITHIN A GROUP OF INSTRUCTIONS DURING A PIPELINE STALL - During a pipeline stall in an out of order processor, until a next to complete instruction group completes, a monitoring unit receives, from a completion unit of a processor, a next to finish indicator indicating the finish of an oldest previously unfinished instruction from among a plurality of instructions of a next to complete instruction group. The monitoring unit receives, from a plurality of functional units of the processor, a plurality of finish reports including completion reasons for a plurality of separate instructions. The monitoring unit determines at least one stall reason from among multiple stall reasons for the oldest instruction from a selection of completion reasons from a selection of finish reports aligned with the next to finish indicator from among the plurality of finish reports. Once the monitoring unit receives a complete indicator from the completion unit, indicating the completion of the next to complete instruction group, the monitoring unit stores each determined stall reason aligned with each next to finish indicator in memory. | 2012-11-01 |
20120278596 | APPARATUS AND METHOD FOR CHECKPOINT REPAIR IN A PROCESSING DEVICE - A data processing device maintains register map information that maps accesses to architectural registers, as identified by instructions being executed, to physical registers of the data processing device. In response to determining that an instruction, such as a speculatively-executing conditional branch, indicates a checkpoint, the data processing device stores the register map information for subsequent retrieval depending on the resolution of the instruction. In addition, in response to the checkpoint indication the data processing device generates new register map information such that accesses to the architectural registers are mapped to different physical registers. The data processing device maintains a list, referred to as a free register list, of physical registers available to be mapped to an architectural registers. | 2012-11-01 |
20120278597 | COMPATIBLE TRUST IN A COMPUTING DEVICE - A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image. | 2012-11-01 |
20120278598 | DISABLING COMMUNICATION PORTS - Example embodiments disclosed herein relate to enabling or disabling a port by writing to a reset write-once register. A boot process for a device is initiated. The reset write-once register is set, during the boot process, to disable or enable the port. | 2012-11-01 |
20120278599 | SYSTEM AND METHOD FOR AUTOMATED NETWORK CONFIGURATION - A method of configuring a data network with a controller, the data network including a plurality of hosts each associated with at least one of a plurality of switches, the method including receiving a request to boot an operating system image on one of the plurality of hosts, the operating system image having network connectivity requirements. Further, the method includes selecting a host out of the plurality of hosts on which to boot the operating system image. The method also includes booting the operating system image on the host, and configuring a switch out of the plurality of switches associated with the host based upon the network connectively requirements of the operating system image. Additionally, the method includes configuring networking attributes of a network interface in the host based upon the network connectivity requirements of the operating system image. | 2012-11-01 |
20120278600 | SYSTEM AND METHOD FOR ACCELERATED BOOT PERFORMANCE - Systems, methods and products are described that provide accelerated boot performance. One aspect includes initiating a booting process of a user operating system of a computer system; identifying a non-critical hardware device set for start up according to the user operating system; excluding the non-critical hardware device; and completing the booting process to provide the user operating system without starting an excluded non-critical hardware device. Other embodiments are described. | 2012-11-01 |
20120278601 | POWER-ON/OFF MANAGEMENT SYSTEM AND METHOD OF COMMUNICATION DEVICE - In a power-on/off management method of a communication device, a display screen of the communication device is powered off, and a signal transmitting function of the communication device is suspended, when a power key of the communication device is pressed upon the condition that the communication device is in a power-on state. A duration time of how long the display screen is powered off is determined, and the communication device is activated according to the duration time when the power key is pressed upon the condition that the display screen is powered off. | 2012-11-01 |
20120278602 | ELECTRONIC APPARATUS AND METHOD FOR PROVIDING FIRMWARE THEREOF - An electronic apparatus and a method for providing firmware thereof are provided. The electronic apparatus includes a plurality of components which perform a function of the electronic apparatus; a common memory unit which stores respective firmware for each of the plurality of components; a system bus which connects the plurality of components with the common memory unit; and a control unit which transmits from the common memory unit, after an apparatus boot, firmware corresponding to each of the plurality of components, wherein the plurality of components each establish respective connections to the system bus by executing a boot code when the electronic apparatus is booted. | 2012-11-01 |
20120278603 | DISPLAY DEVICE, REMOTE CONTROLLER, BOOTING METHOD OF THE DISPLAY DEVICE, AND METHOD FOR TRANSMITTING BOOT CONTROL SIGNAL - A display device, a remote controller, a booting method of the display device, and a method for transmitting a boot control signal are disclosed, in which a communication module receives a first booting mode signal and a second booting mode signal, and a controller controls booting in a first booting mode, upon receipt of the first booting mode signal and controls booting in a second booting mode, upon receipt of the second booting mode signal. | 2012-11-01 |
20120278604 | CONTROL METHOD APPLIED TO COMPUTER SYSTEM IN HYBRID SLEEP MODE - A control method applied to a computer system in a hybrid sleep mode is provided. The control method includes following steps: entering a first sleep mode of the computer after a system parameter is stored in a memory and a hard drive of the computer system; determining whether the computer system is resumed or not in a predetermined first period in the first sleep mode, if true, resuming the computer system by reading the system parameter from the memory; if false, entering a second sleep mode of the computer system; determining whether the computer is resumed or not in the second sleep mode; if true, resuming the computer system by reading the system parameter from the hard drive; and if false, keeping the computer system in the second sleep mode. | 2012-11-01 |
20120278605 | PORTABLE STORAGE DEVICE COMMUNICATING VIA A USB 3.0 PROTOCOL AND A COMPUTER SYSTEM HAVING THE SAME - The present invention relates to a portable storage device communicating via a USB 3.0 protocol and a computer system having the same. The computer system according to one embodiment of the present invention comprises a portable storage device and a computer. The portable storage device includes an operating system (OS) storage region for storing OS data and boot data which are not sent to the computer through a transmission channel used for data transmission via the USB 3.0 protocol, requested by a receiving channel used for receiving data via the USB 3.0 protocol, and loaded on the computer to drive the computer. | 2012-11-01 |
20120278606 | METHODS AND APPARATUSES FOR SECURELY OPERATING SHARED HOST DEVICES WITH PORTABLE APPARATUSES - The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable apparatus includes a data storage unit which stores an operating system and other software. In one example, a portable apparatus can provide a virtual operating environment on top of a host's operating system for a host device. In another example, a portable apparatus containing its operating system can directly boot a host device with one or more hardware profiles. Furthermore, a device-dependent protection against software piracy, a user-dependent protection against sensitive data leaks, a controllable host operating environment to prevent unwanted information exposure, and a secure restoration procedure to prevent virus infection between the host device users may be incorporated. Moreover, an authorization signature may also be utilized to authorize a connected-state guest operation environment in the host device. | 2012-11-01 |
20120278607 | AUTOMATIC NOTIFICATION BASED ON GENERIC STORAGE FRAMEWORK - According to one general aspect, a method may include associating a configuration value with at least one machine executable activity. The method may also include detecting that the configuration value has changed. In various embodiments, the method may include automatically determining which, if any, machine executable activities are directly dependent upon the changed configuration value. The method may further include automatically executing, by a processor, at least a portion of the machine executable activities that are directly dependent upon the changed configuration value. | 2012-11-01 |
20120278608 | INFORMATION PROCESSING APPARATUS, SECURE MODULE, INFORMATION PROCESSING METHOD AND COMPUTER PRODUCT - An information processing apparatus securely stores a program group comprising one or more programs and includes a first detector that detects an execution waiting state of a given program among the program group; a secure module that is configured such that information stored therein cannot be referred to by an external device, and when the execution waiting state is detected by the first detector, that encrypts the given program and writes the encrypted given program to a storage area that is different from that of the program group; a second detector that detects an execution request concerning the given program; a decrypter that decrypts the given program encrypted by the secure module and writes the decrypted given program to the storage area, when the execution request concerning the given program is detected by the second detector; and a program executor that executes the given program decrypted by the decrypter. | 2012-11-01 |
20120278609 | JOINT ENCRYPTION OF DATA - A method for joint generation of a ciphertext by devices of a data processing system includes providing, by a first device, a first message, representing secret data of the first device, generating an initial ciphertext comprising an initial blinded encrypted message, in which the first message is encrypted under a public key of a trusted entity, and an initial consistency component for validating the initial ciphertext using the bilinear map; and sending the initial ciphertext to a second device; wherein the second device provides a second message, representing secret data of the second device, generates an updated ciphertext comprising an updated blinded encrypted message and an updated consistency component for validating the updated ciphertext, and generating a final ciphertext comprising the final encrypted message and a final consistency component for validating the final ciphertext, wherein the final consistency component is generated using the updated consistency component and the bilinear map. | 2012-11-01 |
20120278610 | APPARATUS AND METHOD FOR SENDING ENCRYPTED DATA TO CONDITIONAL ACCESS MODULE OVER COMMON INTERFACE, CONDITIONAL ACCESS MODULE AND SYSTEM THEREOF - An apparatus and method for sending encrypted data to a conditional access module (CAM) over a common interface (CI). A plurality of data packets are formed, and one data packet of the plurality of data packets includes a header and a payload for storing the encrypted data. The data packets are sent to the CAM over a transport stream (TS) interface of the CI. Encrypted data in different file formats can be sent over the TS interface. An initialization message including information about a selected format can be sent to the CAM over a control interface of the CI, and the CAM can send data request messages over the control interface to request specific data. | 2012-11-01 |
20120278611 | VPN-BASED METHOD AND SYSTEM FOR MOBILE COMMUNICATION TERMINAL TO ACCESS DATA SECURELY - A VPN-based method for a mobile communication terminal to access data securely comprises: when a data security device is operating in the mobile communication terminal, the data security device allows the mobile communication terminal to access an intranet but inhibits the mobile communication terminal from accessing an external network; and when the data security device is not operating in the mobile communication terminal, a VPN server inhibits the mobile communication terminal from accessing the intranet. The data security device is disposed in the mobile communication terminal. The data security device cooperates with the VPN server to inhibit the user of the mobile communication terminal from sending protected files to the external network via a network when the data security device is deactivated and to inhibit applications running on the data security device from accessing networks outside the VPN resources to release the protected files to the external network. | 2012-11-01 |
20120278612 | Authenticating Digitally Encoded Products without Private Key Sharing - A method and a corresponding system for authenticating software products are proposed. A digital certificate and a corresponding private key required to sign each product are stored on a server computer. Whenever a user needs to sign a product, he/she logs on a client computer and transmits a corresponding request to the server computer. The server computer verifies whether the request has been received from an authorized subject; for example, an address of the client computer and an identifier of the user are compared with a predefined list. If the result of the verification is positive, the product is signed and returned to the client computer. For this purpose, a script called on the server computer includes either an instruction passing the access password to a signing tool as a parameter or an instruction causing the signing tool to import the access password from a registry of the server computer. | 2012-11-01 |
20120278613 | ELECTRONIC APPARATUS AND INTRODUCING METHOD THEREBY - An electronic apparatus capable of introducing an apparatus certificate of the electronic apparatus and an intermediate certificate of an intermediate certificate authority which signs the apparatus certificate is disclosed. The electronic apparatus includes a communication unit; a separation unit configured to separate the intermediate certificate and the apparatus certificate acquired by the communication unit from the intermediate certificate authority; an apparatus certificate verifying unit configured to verify a validity of the apparatus certificate separated by the separating unit; an intermediate certificate verifying unit configured to verify a validity of the intermediate certificate separated by the separating unit; and an introducing unit configured to introduce the apparatus certificate and the intermediate certificate only when both the apparatus certificate and the intermediate certificate are verified. | 2012-11-01 |
20120278614 | USER AUTHENTICATION SYSTEM, USER AUTHENTICATION APPARATUS, SMART CARD, AND USER AUTHENTICATION METHOD FOR UBIQUITOUS AUTHENTICATION MANAGEMENT - A user authorization system, a user authorization apparatus, a smart card, and a user authorization method for ubiquitous authorization management are disclosed. The user authorization system for ubiquitous authorization management according to the present disclosure comprises: a PKI (public key infrastructure) certificate issuing server for issuing a PKI (public key infrastructure) certificate matching a biometric signature of registered subscribers; a smart card for storing the biometric signature of the subscriber and the PKI (public key infrastructure) certificate from a user with the stored biometric signature of the subscriber, and generating a tunneling start signal in case the inputted biometric signature matches the stored biometric signature; a service server for providing various services for the authorized user on the basis of the PKI (public key infrastructure) certificate issued by the PKI (public key infrastructure) certificate issuing server; and a terminal, connected to the smart card through a wired or wireless communication method, for establishing a virtual private network(VPN) between the smart card and the service server in correspondence to the tunneling start signal received from the smart card, and transmitting an authorization information based on the PKI (public key infrastructure) certificate to the service server through the established VPN. | 2012-11-01 |
20120278615 | SECURTIY ASSOCIATION PREFETCH FOR SECURITY PROTCOL PROCESSING - Described embodiments provide a network processor that includes a security protocol processor for staged security processing of a packet having a security association (SA). An SA request module computes an address for the SA. The SA is fetched to a local memory. An SA prefetch control word (SPCW) is read from the SA in the local memory. The SPCW identifies one or more regions of the SA and the associated stages for the one or more regions. An SPCW parser generates one or more stage SPCWs (SSPCWs) from the SPCW. Each of the SSPCWs is stored in a corresponding SSPCW register. A prefetch module services each SSPCW register in accordance with a predefined algorithm. The prefetch module fetches a requested SA region and provides the requested SA region to a corresponding stage for the staged security processing of an associated portion of the packet. | 2012-11-01 |
20120278616 | System and Method for Securely Decrypting Files Wirelessly Transmitted to a Mobile Device - A method is provided for securely decrypting files that are wirelessly sent to a mobile device. A mobile device typically has a wireless interface, such as a cellular telephone or WiFi interface that can be used to accept an encrypted file from a first remote device. A decryption key representation is accepted from a second remote device via a personal proximity interface which can be a camera, microphone, or near-field radio frequency (RF) detector. In one aspect, the first device can, for example, be a multi-functional peripheral (MFP), a network server, or a computer. In another aspect, the first and second devices can be the same device, such as an MFP or a computer. A mobile device conversional application converts the decryption key representation to a digital decryption key, and the digital decryption key is then used to decrypt the encrypted file. | 2012-11-01 |
20120278617 | Method and System for Establishing a Trusted and Decentralized Peer-To-Peer Network - The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing devices; trusted chat sessions; and for other applications of trusted peer-to-peer networks. | 2012-11-01 |
20120278618 | METHODS OF AUTHORIZING A COMPUTER LICENSE - A system and method of authorizing a product including transmitting from an end user device a character string, including a Transaction ID, to a licensing authority. The licensing authority encrypts the Transaction ID using an encryption key associated with a product for which the end user is seeking authorization to produce an Authorization number. Each product is associated with a different encryption key resulting in a different Authorization number being produced for each product based on the same Transaction ID. The licensing authority then returns the Authorization number to the end user device. A decryption processor associated with the end user device decrypts the Authorization number using an unchangeable decryption key and compares the decrypted Authorization number with the Transaction ID. If the decrypted Authorization number matches the Transaction ID the product is authorized. | 2012-11-01 |
20120278619 | STREAMING VIDEO SERVER WITH VIRTUAL FILE SYSTEM AND METHODS FOR USE THEREWITH - A streaming video server generates a virtual file system that includes virtual addresses of a plurality of encrypted segments of a plurality of video programs at each of a plurality of bitrates, without storing the plurality of encrypted segments in persistent storage. A request is received from a client device to access a selected one of the plurality of video programs via a request to access the virtual file system. The plurality of encrypted segments of the selected one of the plurality of video programs are generated at a selected bitrate, in response to the request. | 2012-11-01 |
20120278620 | Forwarding E-Mail From A Wireless Device - A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients. | 2012-11-01 |
20120278621 | SYSTEM AND METHOD OF DATA INTERCEPTION AND CONVERSION IN A PROXY - An intercepting proxy server processes traffic between an enterprise user and a cloud application which provides Software as a Service (SaaS). The intercepting proxy server provides interception of real data elements in communications from the enterprise to the cloud and replacing them with obfuscating information by encrypting individual real data elements without disturbing the validity of the application protocol. To the processing cloud application real data are only visible as encrypted tokens. Tokens included in results returned from the cloud, are intercepted by the intercepting proxy server, and replaced with the corresponding sensitive real data. In this way, the enterprise is able to enjoy the benefits of the cloud application, while protecting the privacy of real data. | 2012-11-01 |
20120278622 | METHOD AND SYSTEM FOR ELECTRONIC CONTENT STORAGE AND RETRIEVAL WITH GALOIS FIELDS ON CLOUD COMPUTING NETWORKS - A method and system for electronic content storage and retrieval with Galois Fields on cloud computing networks. The electronic content is divided into plural portions and stored in plural cloud storage objects. Storage locations for the plural cloud storage objects are selected using a Galois field and the plural cloud storage objects are distributed across the cloud network. When the electronic content is requested, the plural portions are retrieved and transparently combined back into the original electronic content. No server network devices or target network devices can individually determine locations of all portions of the electronic content on the cloud communications network, thereby providing layers of security and privacy for the electronic content on the cloud communications network. | 2012-11-01 |
20120278623 | METHOD AND SYSTEM FOR SECRET COMMUNICATION BETWEEN NODES - The present invention discloses a method and system for secret communication between nodes in a wired Local Area Network (LAN). The method of secret communication between nodes in the wired LAN includes the following steps: 1) a sharing key is established; 2) the route probe is exchanged; 3) the data communication is classified; 4) the secret communication is processed among the nodes. According to the different communication situations among the nodes, the method of secret communication between nodes provided in the present invention can process the classification and select an appropriate secret communication strategy; compared with per-hop encryption, the calculation load of the exchange equipment is reduced, and the transmission delay of data packets is shortened; compared with the method that inter-station keys are established in pairs of nodes in order to protect the communication secret, the key number is reduced, and the key management is simplified. | 2012-11-01 |
20120278624 | INFORMATION PROCESSING APPARATUS, PRINT CONTROL APPARATUS, PRINT CONTROL SYSTEM, STORAGE MEDIUM OF STORING COMPUTER-READABLE PROGRAM, AND PROGRAM - An information processing apparatus, which encrypts print data (PDL), receives a personal identification code (PIN) input by a user, generates a random number (rnd), encrypts the generated random number by using the personal identification code or an encryption key generated based on the personal identification code, converts the personal identification code by using a predetermined function, and encrypts print data by using the random number as an encryption key, thereby maintaining security in the printing. | 2012-11-01 |
20120278625 | Social network based PKI authentication - A user device generates a social graph-based user certificate that conveys a trust level to other users of the social network. A user certificate for a user is obtained, the user having a user public key and corresponding user private key. A plurality of potential signers is identified within one or more social networks. The certificate is then sent to the identified plurality of potential signers. One or more signed versions of the user certificate may be received from at least some of the plurality of potential signers. The user device may assign a signer weight to each signed version of the user certificate, each corresponding signer weight associated with the signer of each signed version of the certificate. The user certificate, the user signature, one or more signed versions of the user certificate, and the user-assigned signer weights are distributed to one or more recipients. | 2012-11-01 |
20120278626 | DNSSEC Inline Signing - Systems and methods of performing incremental DNSSEC signing at a registry are described in which digital signature operations may be performed as part of a single transaction including DNS add, update, and/or delete operations and the like. Exemplary methods may include receiving a domain command from a requester, the domain command including an identifier of a domain. The received domain command may be executed with respect to data stored by the registry for the domain. As part of an individual transaction including the execution of the domain command, the registry may also sign DNSSEC records for the domain using a private key of an authoritative server. After the DNSSEC records have been signed, the registry may incrementally publish the signed DNSSEC records to a separate server. Exemplary methods may also include “took-aside” operations in which, for example, add, update, and/or delete operations may be executed on data stored in a registry database and reported to a requester, prior to applying digital-signatures to the DNSSEC data. After reporting that the instructions have been executed, the registry may generate a digital signature based on the add, update, and/or delete changes, and commit the digital signature to a registry resolution database. | 2012-11-01 |
20120278627 | Security based on subliminal and supraliminal channels for data objects - This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique. | 2012-11-01 |
20120278628 | Digital Signature Method and System - A digital signature method, a method for initialising a digital signature scheme, a system for digitally signing a message and a computer program product are described. At least the digital signature method involves a signer having a weak security parameter. The signer retrieves a cryptographic element from each of a plurality of computing entities. Each cryptographic element is a function of a commitment supplied by the signer and the commitment includes a cryptographic function of a weak security parameter provided by the signer. A strong cryptographic security parameter is generated using a plurality of said elements. A message is then signed according to the digital signature scheme using the strong cryptographic security parameter to generate a digital signature. | 2012-11-01 |
20120278629 | SYSTEM AND METHOD FOR SECURE AUTHENTICATION OF A "SMART" BATTERY BY A HOST - Systems and methods for providing a battery module | 2012-11-01 |
20120278630 | DEBUGGING PORT SECURITY INTERFACE - The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted. | 2012-11-01 |
20120278631 | DOCUMENT MANAGEMENT SYSTEM AND METHOD - A document management system and method are disclosed herein. An example of the document management system includes a composite document generation module that generates a composite document and a secret seed that is associated with an owner or initiator of the composite document, and a key derivation module that derives, from the secret seed and using a key derivation function, at least one of a key for encryption, a key for decryption, a key for signature, or a key for verification for a participant of a workflow associated with the composite document. | 2012-11-01 |
20120278632 | METHOD AND APPARATUS FOR SECURING PROGRAMMING DATA OF A PROGRAMMABLE DEVICE - Configuration data for a programmable integrated circuit device is at least partially encrypted according to at least one encryption scheme. A plurality of key stores store a plurality of decryption keys for the at least one encryption scheme. Control circuitry identifies a required key from the at least partially encrypted configuration data and generates a key selection signal. Key selection circuitry responsive to the key selection signal reads the plurality of key stores and provides the required key to the control circuitry. The control circuitry may include decryption circuitry that decrypts the at least partially encrypted configuration data using the required key. In some embodiments, different portions of the configuration data, which may represent separate partial reconfigurations of the device, require different decryption keys. Keys may be generated from combinations of the contents of the key stores. | 2012-11-01 |
20120278633 | METHOD AND SYSTEM FOR MANAGING INFORMATION ON MOBILE DEVICES - A system and method for protecting information on a mobile device. The method and apparatus obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier. | 2012-11-01 |
20120278634 | METHOD AND APPARATUS FOR SECURE ACCESS TO EXECUTION CONTEXT - An approach is provided for providing secure access to execution context. An execution security platform determines an execution context of a device, the execution context including at least in part one or more computation closures. The execution security platform also processes and/or facilitates a processing of the execution context, the one or more computation closures, or a combination thereof to cause, at least in part, decomposition of the execution context, the one or more computation closures, or a combination thereof into, at least in part, one or more context criteria and content information, The execution security platform further determines to encrypt the execution context, the one or more computation closures, the content information, or a combination thereof using the one or more context criteria as a public key of an identity-based encryption. | 2012-11-01 |
20120278635 | Cascaded Data Encryption Dependent on Attributes of Physical Memory - Apparatus and method for providing data security through cascaded encryption. In accordance with various embodiments, input data are encrypted in relation to a first auxiliary data value to provide first level ciphertext. The first level ciphertext are encrypted using a second auxiliary data value associated with a selected physical location in a memory to produce second level ciphertext, which are thereafter stored to the selected physical location. In some embodiments, migration of the stored data to a new target location comprises partial decryption and re-encryption of the data using a third auxiliary data value associated with a new target physical location to produce third level ciphertext, and the storage of the third level ciphertext to the new target physical location. | 2012-11-01 |