46th week of 2010 patent applcation highlights part 57 |
Patent application number | Title | Published |
20100293287 | WIRELESS MULTIMEDIA TRANSPORT METHOD AND APPARATUS - Apparatus and methods for wireless data transmission in a multimedia network are disclosed. Disclosed is a network having a source coupled to a sink using a virtual channel that includes a wireless communication channel. A source end of the system provides a packetizing data stream having a stream of payloads such that each payload is associated with its respective originating source stream. The system configured to encode the packetized data stream for wireless transport. A non-wireless source end of the system receives quality of service information from downstream. Thereby enabling adjustments to the source content and packetized data streams. | 2010-11-18 |
20100293288 | WIRELESS SENSOR NODE ARCHITECTURE WITH AUTONOMOUS STREAMING - The present invention relates to a sensor device or sensor node and a method of controlling operation of the sensor device, wherein the sensor device comprises at least one autonomous streaming module and wherein predetermined internal events of the autonomous streaming module or predetermined external events from streaming data at an interface to a smart shell of the autonomous streaming module are detected, and an operational mode of a component or subsystem within the smart shell of the autonomous streaming module is controlled in response to the detection. | 2010-11-18 |
20100293289 | PEER-TO-PEER MOBILITY MANAGEMENT IN HETEROGENEOUS IPV4 NETWORKSAPP 1784n - Peer-to-peer mobility management in heterogeneous IP networks provides a peer-to-peer mobility module operable to intercept a data packet received at a communication protocol layer of an Internet Protocol communication stack. A translation table may be stored on memory device. The translation table stores real address of one or more network interfaces and a corresponding virtual address. The peer-to-peer mobility module may be further operable to modify the intercepted data packet using the real address and virtual address stored on the translation table. | 2010-11-18 |
20100293290 | RELAY DEVICE, TERMINAL, PRIORITY COMMUNICATION CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM - To smoothly deliver data while guaranteeing real-time properties on home network which takes into account data capturing from public network, a relay device connects one or plural delivery servers having content stored therein, one or plural video display terminals and one or plural other PCs, the video display terminal including a user IF which receives the content stored on the delivery server and acquires information for specifying content according to an input of a user, an acquiring unit which acquires specifying information for specifying the delivery server having stored therein the content specified by the information, and a transmitting unit which transmits the specifying information acquired by the acquiring unit, to the relay device, and the relay device performs data transfer between the delivery server and the video display terminal at a predetermined priority set on the basis of the specifying information received from the video display terminal. | 2010-11-18 |
20100293291 | SEGMENTATION AND REASSEMBLY OF DATA FRAMES - A system and method of transmitting data frames between a plurality of input ports to a plurality of output ports is described. The input ports segment portions of the received data frames to provide smaller data cells which are individually transmitted to an output port associated with a destination of the segmented data frame. Based upon information provided in the data cells received at the output port, the output port determines the ordinal positions of the received data cells within the segmented data frame and reassembles the data frame which was segmented at the input port. The output port then forwards the reassembled frame toward the associated destination. | 2010-11-18 |
20100293292 | ROUTING-PROFILE-BASED ACARS ROUTING SYSTEM - A system for routing ACARS messages towards a plurality of transmission media, configured to be loaded onboard an aircraft, including: a database including a plurality of routing profiles, each profile being formed by a list indicating a rank of preference for each transmission medium, and a selection mechanism extracting, from an ACARS message sending request, a routing profile identifier, and selecting in the routing profile stored in the database, corresponding to the identifier, a transmission medium, according to its rank of preference, the thereby selected transmission medium then being used for transmitting the message. | 2010-11-18 |
20100293293 | Systems and Methods for Fractional Routing Redundancy - Systems and methods for fractional routing are described. An exemplary method may include receiving, by a first router, data information regarding routing by a first portion of a third router, receiving, by a second router, data information regarding routing by a second portion of a third router, wherein the data information regarding routing by the first portion and data information regarding routing by the second portion is not the same, routing, by the first router, data associated with the routing by the first portion of the third router, and routing by the second router, data associated with the routing by the second portion of the third router. | 2010-11-18 |
20100293294 | PEER-TO-PEER COMMUNICATION OPTIMIZATION - A peer-to-peer communication optimizer uses both peer locality and content diversity in a peer group to reduce network usage cost associated with using remote peers in a peer-to-peer system while reducing impact on the download time relative to peer-to-peer protocols operating with locality optimization alone or no localization of peers. The optimizer intercepts control messages in the peer-to-peer system and substitutes peer lists that meet both diversity indicator and network usage cost thresholds. Transparent embodiments operate without requirement to change peer or tracker implementations. Such embodiments include control message redirection, interception, and modification transparent to the client and tracker applications. Other embodiments include proxy designation. Still other embodiments include the use of gateway peers selected as function of diversity of content and network topology. Still other embodiments involve modification to one or more of client and/or tracker software and potentially the use of a standard interface for network topology determination. | 2010-11-18 |
20100293295 | LIMITED BROADCAST, PEERING AMONG DHTs, BROADCAST PUT OF LIMITED CONTENT ONLY - In system of networks that are not fully meshed with each other and that are capable of processing distributed hash table (DHT) Put and Get messages, message flooding of GET messages is limited by maintaining a list of DHTs the GET has visited. Also, PUT messages include not only the storage location key in the home network but also a list of networks that the PUT has visited, in essence establishing a dynamically changing path within the PUT back to the home network. | 2010-11-18 |
20100293296 | GLOBAL SERVER LOAD BALANCING - A global server load balancing (GSLB) switch serves as a proxy to an authoritative DNS communicates with numerous site switches which are coupled to host servers serving specific applications. The GSLB switch receives from site switches operational information regarding host servers within the site switches neighborhood. When a client program requests a resolution of a host name, the GSLB switch, acting as a proxy of an authoritative DNS, returns one or more ordered IP addresses for the host name. The IP addresses are ordered using metrics that include the information collected from the site switches. In one instance, the GSLB switch places the address that is deemed “best” at the top of the list. | 2010-11-18 |
20100293297 | INTER-WORKING BETWEEN NETWORK ADDRESS TYPE (ANAT) ENDPOINTS AND INTERACTIVE CONNECTIVITY ESTABLISHMENT (ICE) ENDPOINTS - A method for inter-working between an alternative network address type (ANAT) endpoint and an interactive connectivity establishment (ICE) is provided. The method may include identifying one or more network addresses operable to be used to communicate with a alternative network address type (ANAT) endpoint. One or more candidates operable to be used for interactive connectivity establishment (ICE) traversal may also be identified. A preferred network address may be determined from the one or more network addresses based on an ANAT endpoint preference. A corresponding candidate may be determined based on the ANAT endpoint preference. The corresponding candidate may use a candidate address to communicate. A media stream may be established between the preferred network address and the corresponding candidate address. | 2010-11-18 |
20100293298 | COOKIE INVALIDATION OR EXPIRATION BY A SWITCH - A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided. | 2010-11-18 |
20100293299 | EXCHANGING CONTROL CODES BETWEEN SIP/IMS AND UPNP NETWORK ELEMENTS - Method for exchanging control codes between a SIP (Session Initiation Protocol) enabled first network element ( | 2010-11-18 |
20100293300 | COMMUNICATION APPARATUS, CONTROL METHOD OF COMMUNICATION APPARATUS, AND PROGRAM - A communication apparatus includes a participating device, an identification device, and a notification device. The participating device is capable of participating in a first network and a second network. The identification device is configured to identify a security state of the first network. When the security state identified by the identification device is a predetermined state, the notification device notifies, to the second network, information related to the first network or information related to an apparatus connecting to the first network. When the security state identified by the identification device is not the predetermined state, the notification device does not notify, to the second network, information related to the first network or information related to an apparatus connecting to the first network. | 2010-11-18 |
20100293301 | Dynamically Composing Data Stream Processing Applications - Techniques for dynamically modifying inter-connections between components in an application are provided. The techniques include receiving a data producer profile for each output port within a software application to be executed on one or more processors, receiving a data subscription profile for each input port of each component of the application, establishing connections between the output ports and the input ports of the components in the application based on a comparison of each data producer profile and each data subscription profile, executing the application on one or more processors to process streams of data, receiving either or both of a new data producer profile or a new data subscription profile during the execution of the application, and establishing at least one new connection between an output port and an input port based upon a revised comparison of the received data profiles that include the new data profile. | 2010-11-18 |
20100293302 | Information Processing Apparatus - An information processing apparatus includes a connector that conforms to a Universal Serial Bus standard. The information processing apparatus detects voltages at signal terminals of the connector a plurality of times, and judges a type of an apparatus connected to the connector by using detection results obtained the plurality of times. | 2010-11-18 |
20100293303 | METHOD OF TRANSFERRING DATA BETWEEN VEHICLE AND PORTABLE TERMINAL AND INTERFACE DEVICE THEREFOR - A method of transferring data between a vehicle and a portable terminal and an interface device therefor are provided. According to the method and the device, compatibility can be maintained by normalizing data transfer interface between the vehicle and various portable terminals and an image taken inside or outside the vehicle can be provided to the portable terminal. In addition, interface enabling data communication with a device having an additional function such as an automobile black box can be provided. | 2010-11-18 |
20100293304 | CONTROLLER AND METHOD FOR STATISTICAL ALLOCATION OF MULTICHANNEL DIRECT MEMORY ACCESS BANDWIDTH - A DMA controller and a method for statistical allocation of multichannel DMA bandwidth. In one embodiment, the DMA controller includes: ( | 2010-11-18 |
20100293305 | DATA STORAGE DEVICE TO CONTROL SIGNAL STRENGTH OF MEMORY CHANNEL AND SETTING METHOD THEREOF - A data storage device includes a plurality of memory devices and a memory controller. The memory controller exchanges data with the plurality of memory devices via a plurality of channels and adjusts drive strength of the plurality of channels by referring to at least one of the number of the plurality of memory devices and current temperature. | 2010-11-18 |
20100293306 | CONNECTION DEVICE RESTRICTION PROGRAM AND DEVICE - A connection device restriction program for preventing use of uncalled-for connection devices. A permission list setting unit sets a connection permission list holding information defining connection devices whose connection is to be permitted, and a list memory stores the connection permission list. When a connection device is connected to one of first to third connection ports, a connection restriction unit acquires device information from the connection device, and collates the device information with the connection permission list to determine whether or not the connection device corresponds to any one of the connection-permitted devices. If the connection device corresponds to any one of the connection-permitted devices, connection of the device is permitted; if not, connection of the device is forbidden. | 2010-11-18 |
20100293307 | PROGRAMMABLE ROUTING MODULE - A programmable routing module is disclosed for interconnecting field wiring with a control system. The routing module includes a field connection to connect field signals from a controlled process to the routing module, an I/O connection to connect I/O signals from the control system to the routing module, and a configurable interconnection system that selectively couples particular field and I/O signals with one another. | 2010-11-18 |
20100293308 | METHOD, SYSTEM, AND INTEGRATED CHIP FOR SERIAL DATA TRANSMISSION - The invention provides a method for serial data transmission. First, a chip select signal is enabled to a device for serial data transmission. Data stored in a first buffer of a controller is then transmitted to a second buffer of the device. A clock signal is then halted after data stored in the first buffer is completely transmitted. The first buffer is then refreshed with data newly received by the controller while the clock signal is halted. The clock signal is the restarted to operate the device after the first buffer is refreshed. Refreshed data stored in the first buffer is then transmitted to the second buffer while the clock signal is oscillating. | 2010-11-18 |
20100293309 | Production Tool For Low-Level Format Of A Storage Device - A production tool for low-level format of a storage device is disclosed. The production tool includes an input connector connectable and an output connector, both of which conform to an interface standard. At least a redundant pin of the input connector is unconnected with a corresponding redundant pin of the output connector, and the redundant pin of the output connector is electrically connected to receive a provided predetermined signal, the presence of which indicating a low-level format mode. | 2010-11-18 |
20100293310 | DATA PROCESSING UNIT, CONTROL METHOD THEREFOR AND PROGRAM - A data processing unit to that reliably avoids a deadlock condition regardless of status of a ring bus occupied with normal data packets. The data processing unit comprises ring bus, a plurality of data processing units connected to the ring bus, for mutually performing data exchange using a packet circulated on the ring bus and a injection unit for injecting a special packet distinguished from the packet on the ring bus so as to circulate the special packet on the ring bus, wherein the plurality of data processing units respectively comprise for confirming whether or not a transmission destination data processing unit of the data is capable of receiving data by using the special packet, and a transmission unit for transmitting the data to the transmission destination data processing unit using the special packet. | 2010-11-18 |
20100293311 | DEVICE AND METHOD FOR MANIPULATING COMMUNICATION MESSAGES - A device for manipulating communication messages in a communication system is provided, which communication system includes a data bus, and a plurality of nodes connected thereto, and an arrangement for transmitting messages in message frames at fixedly predefined communication cycles. The device is connected in the data bus between at least one node for which the messages to be manipulated are intended and the other nodes of the communication system. The device has an arrangement for intercepting the messages before they reach the at least one node, an arrangement for manipulating the intercepted messages, and an arrangement for transmitting the manipulated messages to the at least one node. | 2010-11-18 |
20100293312 | Network Communications Processor Architecture - Described embodiments provide a system having a plurality of processor cores and common memory in direct communication with the cores. A source processing core communicates with a task destination core by generating a task message for the task destination core. The task source core transmits the task message directly to a receiving processing core adjacent to the task source core. If the receiving processing core is not the task destination core, the receiving processing core passes the task message unchanged to a processing core adjacent the receiving processing core. If the receiving processing core is the task destination core, the task destination core processes the message. | 2010-11-18 |
20100293313 | SYSTEMS AND METHODS FOR A CORE MANAGEMENT SYSTEM FOR PARALLEL PROCESSING OF AN EVOLUTIONARY ALGORITHM - Systems and methods are provided for a core management system for parallel processing of an evolutionary algorithm. The systems and methods may include identifying, for a processing environment, a plurality of arriving processors available for utilization; configuring a first number of the plurality of arriving processors as master processors for the processing environment; configuring a respective second number of the plurality of arriving processors as slave processors, where each master processor is assigned one or more of the slave processors for the processing environment, where each master processor maintains timing data associated with available processing resources at the respective master processor, where each master processor is operative to calculate a respective target number of slaves based upon the respective timing data; and reconfiguring a current number of slave processors assigned to one or more respective master processors based upon the respective timing data calculated for the one or more respective master processors. | 2010-11-18 |
20100293314 | COMPUTER SYSTEM AND METHOD OF CONTROLLING COMPUTER SYSTEM - CPU architecture is modified so that content of the interrupt mask register can be changed directly based on a decoding result of an instruction decoder of a CPU. Such modification does not require a great deal of labor in changing a CPU design. In addition, an extended CALL instruction and an extended software interrupt instruction are added to the CPU, and each of the extended CALL instruction and the extended software interrupt instruction additionally has a function of changing the value of the interrupt mask register. Atomicity is achieved by: allowing such a single instruction to concurrently execute a call of a process and a value change of the interrupt mask register; and disabling other interrupts during execution of the single instruction. | 2010-11-18 |
20100293315 | COMMUNICATION SYSTEM HAVING A CAN BUS AND A METHOD FOR OPERATING SUCH A COMMUNICATION SYSTEM - A communication system having one CAN bus and at least two devices interconnected by the CAN bus is described, at least one of the devices including: i) a CAN controller, which is suitable for transmitting CAN data frames over the CAN bus using a first physical protocol in a first operating mode; ii) an asynchronous serial communication interface unit, which is suitable for transmitting ASC data frames over the CAN bus using a second physical protocol in a second operating mode; iii) a first switching means, which is suitable for switching the first operating mode and the second operating mode depending on at least one agreement in effect between the device and at least one of the other devices; and iv) another switching means, which is suitable for switching the device to a third (restricted) operating mode, which differs from the first operating mode and the second operating mode, for powering up the device. | 2010-11-18 |
20100293316 | Migration of Switch in a Storage Area Network - A method, system and computer program product for migrating at least one switch in a storage area network is disclosed. The migration is done by analysing the I/O traffic to identify patterns in the I/O traffic of the switch; forecasting future I/O workload of the switch based on one or more identified patterns in the I/O traffic, determining appropriate timing for migration based on the identified patterns and administrator inputs; processing the storage area network configuration data to identify the storage network physical and logical access paths to the or each selected switch to create a first connectivity map; generating a second connectivity map based on the first connectivity map and administrator inputs; and migrating the or each switch migration based on the second connectivity map and the appropriate timing. The migration may comprise routing the I/O traffic from the switch to be migrated to the alternate switches in the storage area network. The migration may further comprising transforming zones on the switch to be migrated and deploying the transformed zones to the new switch | 2010-11-18 |
20100293317 | PCM MEMORIES FOR STORAGE BUS INTERFACES - A memory controller for a phase change memory (PCM) that can be used on a storage bus interface is described. In one example, the memory controller includes an external bus interface coupled to an external bus to communicate read and write instructions with an external device, a memory array interface coupled to a memory array to perform reads and writes on a memory array, and an overwrite module to write a desired value to a desired address of the memory array. | 2010-11-18 |
20100293318 | METHOD FOR MEMORY MANAGEMENT - The invention relates to a method for memory management, in which memory usage data relating to the use of the memory is recorded. The memory usage data is determined in response to a number of memory write and/or read accesses. | 2010-11-18 |
20100293319 | Solid state drive device - The solid state drive device includes a memory device including a plurality of flash memories and a memory controller connected with a host and configured to control the memory device. The memory controller includes first and second cores, a host interface configured to interface with the host, and a flash memory controller configured to control the plurality of flash memories. The first core is configured to control transmission and reception of data to and from the host. The second core is configured to control transmission and reception of data to and from the memory device. | 2010-11-18 |
20100293320 | METHOD AND APPARATUS FOR BYTE-ACCESS IN BLOCK-BASED FLASH MEMORY - Techniques are described herein for managing data in a block-based flash memory device which avoid the need to perform sector erase operations each time data stored in the flash memory device is updated. As a result, a large number of write operations can be performed before a sector erase operation is needed. In addition, the block-based flash memory can emulate both programming and erasing on a byte-by-byte basis, like that provided by an EEPROM. | 2010-11-18 |
20100293321 | SYSTEMS AND METHOD FOR FLASH MEMORY MANAGEMENT - A system and method for merging sectors of a flash memory module, the method includes: receiving multiple sectors, each received sector is associated with a current erase block out of multiple (L) erase blocks; accumulating the received sectors in a sector buffer, the sector buffer is stored in a non-volatile memory module; maintaining a merged sector map indicative of a sectors of the sector buffer that have been merged and sectors of the sector buffer waiting to be merged; finding a first sector waiting to be merged according to the merged sector map; merging the first sector and other sectors that belong to a same erase block as the first sector; and updating the merged sector map to indicate that that the first second and the other sectors that belonged to the same erase block were merged. | 2010-11-18 |
20100293322 | SEMICONDUCTOR RECORDING APPARATUS AND SEMICONDUCTOR RECORDING SYSTEM - A semiconductor recording apparatus includes a logical-to-physical conversion table | 2010-11-18 |
20100293323 | Semiconductor and Flash Memory Systems - A flash memory device and a flash memory system are disclosed. The flash memory device includes a first non-volatile memory including a plurality of page data cells, storing page data, and reading and outputting the stored page data when a read command is applied from an external portion; and a second non-volatile memory including a plurality of spare data cells respectively adjacent to the plurality of page data cells, storing spare data, scanning the spare data and temporarily storing corresponding information when a file system is mounted, reading and outputting the stored spare data when the read command is applied. | 2010-11-18 |
20100293324 | DIRECT LOGICAL BLOCK ADDRESSING FLASH MEMORY MASS STORAGE ARCHITECTURE - A nonvolatile semiconductor mass storage system and architecture can be substituted for a rotating hard disk. The system and architecture avoid an erase cycle each time information stored in the mass storage is changed. Erase cycles are avoided by programming an altered data file into an empty mass storage block rather than over itself as a hard disk would. Periodically, the mass storage will need to be cleaned up. These advantages are achieved through the use of several flags, and a map to correlate a logical block address of a block to a physical address of that block. In particular, flags are provided for defective blocks, used blocks, and old versions of a block. An array of volatile memory is addressable according to the logical address and stores the physical address. | 2010-11-18 |
20100293325 | MEMORY DEVICES AND SYSTEMS INCLUDING MULTI-SPEED ACCESS OF MEMORY MODULES - A system, comprising: a plurality of modules, each module comprising a plurality of integrated circuits devices coupled to a module bus and a channel interface that communicates with a memory controller, at least a first module having a portion of its total module address space composed of first type memory cells having a first maximum access speed, and at least a second module having a portion of its total module address space composed of second type memory cells having a second maximum access speed slower than the first access speed. | 2010-11-18 |
20100293326 | MEMORY DEVICE CONTROL FOR SELF-REFRESH MODE - To ensure that a memory device operates in self-refresh mode, the memory controller includes (1) a normal-mode output buffer for driving a clock enable signal CKE onto the memory device's CKE input and (2) a power island for driving a clock enable signal CKE_prime onto that same input. To power down the memory controller, the normal-mode output buffer drives signal CKE low, then the power island drives signal CKE_prime low, then the memory controller (except for the power island) is powered down. The power island continues to drive the memory device's CKE input low to ensure that the memory device stays in self-refresh mode while the memory controller is powered substantially off. To resume normal operations, the power module powers up the memory controller, then the normal-mode output buffer drives signal CKE low, then the power island is disabled, then the memory controller resumes normal operations of the memory device. | 2010-11-18 |
20100293327 | TCAM Management Approach That Minimize Movements - Methods for efficiently managing a ternary content-addressable memory (TCAM) by minimizing movements of TCAM entries include determining a first node and a second node in the TCAM, determining if there is a free TCAM entry between the first node and the second node, and storing the new entry in the free TCAM entry. Upon determining that a free TCAM entry does not exist between the first node and the second node, further determining a chain of nodes and then determining if there is a free TCAM entry in the chain of nodes. Upon determining that there is a free TCAM entry within the chain of nodes, moving the TCAM entries identified as the nodes in the chain of nodes to generate a free node nearest to the new entry and inserting the new entry in the free node. Moving the TCAM entries identified as the nodes in the chain of nodes preserves the order of the nodes. | 2010-11-18 |
20100293328 | MANAGING FIRST LEVEL STORAGE IN A MULTI-HOST ENVIRONMENT - A virtual tape server (VTS) and a method for managing shared first level storage, such as a disk cache, among multiple virtual tape servers are provided. Such a system and method manage first level storage to accommodate two or more host processing systems by maintaining adequate free space in the cache for each host and by preventing one host, such as a mainframe, from taking over free space from another host, such as a Linux system. | 2010-11-18 |
20100293329 | MULTI-STREAM RESTORE SYSTEM AND METHOD - A computer system and process restores files on multiple disk drives from a plurality of backup files on a plurality of media types and at a plurality of locations. The system receives at a processor a restore command, and partitions the restore command into two or more sub-jobs. The system determines a location for each of the plurality of media types, and matches each sub-job with a different media type at a different location. The system then restores the files from each different media type at a different location to the multiple disk drives in parallel. | 2010-11-18 |
20100293330 | DISPLAYING TRANSITION IMAGES DURING A SLIDE TRANSITION - One or more transition images are displayed during a transition period between a display of slides within a presentation. The displayed transition images include images of different slides that are contained within the presentation. The transition images provide the audience with a glimpse of slides that are displayed within the presentation. For example, the transition images may include images from previous and future slides that are contained within the presentation. The transition images may also be cached in order to more efficiently display the transition images during the transition period. | 2010-11-18 |
20100293331 | STORAGE SYSTEM AND DATA MANAGEMENT METHOD - A storage system, which is coupled to a computer, includes a storage device, a controller, a plurality of cache memory units, and a connecting unit. Each of the plurality of cache memory units includes: a cache memory for storing data; an auxiliary storage device for holding a content of data even after shutdown of power; and a cache controller for controlling an input/output of data to/from the cache memory and the auxiliary storage device. The cache controller store data stored in the cache memory, which is divided into a plurality of parts, into a plurality of the auxiliary storage devices included in the plurality of cache memory units. | 2010-11-18 |
20100293332 | CACHE ENUMERATION AND INDEXING - In response to a request including a state object, which can indicate a state of an enumeration of a cache, the enumeration can be continued by using the state object to identify and send cache data. Also, an enumeration of cache units can be performed by traversing a data structure that includes object nodes, which correspond to cache units, and internal nodes. An enumeration state stack can indicate a current state of the enumeration, and can include state nodes that correspond to internal nodes in the data structure. Additionally, a cache index data structure can include a higher level table and a lower level table. The higher level table can have a leaf node pointing to the lower level table, and the lower level table can have a leaf node pointing to one of the cache units. Moreover, the lower level table can be associated with a tag. | 2010-11-18 |
20100293333 | MULTIPLE CACHE DIRECTORIES - A first portion of an identifier can be used to assign the identifier to a slot in a first directory. The identifier can identify a cache unit in a cache. It can be determined whether assignment of the identifier to the slot in the first directory will result in the identifier and one or more other identifiers being assigned to the same slot in the first directory. If so, then the technique can include (1) using a second portion of the identifier to assign the identifier to a slot in a second directory; and (2) assigning the one or more other identifiers to one or more slots in the second directory. In addition, it can be determined whether a directory in a cache lookup data structure includes more than one pointer. If not, then a parent pointer that points to the subject directory can be removed. | 2010-11-18 |
20100293334 | LOCATION UPDATES FOR A DISTRIBUTED DATA STORE - Version indicators within an existing range can be associated with a data partition in a distributed data store. A partition reconfiguration can be associated with one of multiple partitions in the data store, and a new version indicator that is outside the existing range can be assigned to the reconfigured partition. Additionally, a broadcast message can be sent to multiple nodes, which can include storage nodes and/or client nodes that are configured to communicate with storage nodes to access data in a distributed data store. The broadcast message can include updated location information for data in the data store. In addition, a response message can be sent to a requesting node of the multiple nodes in response to receiving from that node a message that requests updated location information for the data. The response message can include the requested updated location information. | 2010-11-18 |
20100293335 | Cache Management - A method for cache management in an environment based on Common Information Model is described. Cache elements in the cache are associated with a time attribute and historical data. Cache elements having a time attribute lying in a certain range are polled for from the server and updated at predetermined time points. A new time attribute is calculated for each cache element based on its historical data and this new time attribute assists in adapting the polling frequency for the cache element to its importance and change characteristics. Asynchronous notifications from the server preempt the polling based on the time attribute for a cache element and instead, polling for the cache element is based on the asynchronous notification. A system for cache management includes a client and a server, the client having a cache that is managed based on each cache element's importance and change characteristics. | 2010-11-18 |
20100293336 | SYSTEM AND METHOD OF INCREASING CACHE SIZE - A system and method for increasing cache size is provided. Generally, the system contains a storage device having storage blocks therein and a memory. A processor is also provided, which is configured by the memory to perform the steps of: categorizing storage blocks within the storage device as within a first category of storage blocks if the storage blocks that are available to the system for storing data when needed; categorizing storage blocks within the storage device as within a second category of storage blocks if the storage blocks contain application data therein; and categorizing storage blocks within the storage device as within a third category of storage blocks if the storage blocks are storing cached data and are available for storing application data if no first category of storage blocks are available to the system. | 2010-11-18 |
20100293337 | SYSTEMS AND METHODS OF TIERED CACHING - The disclosure is related to data storage systems having multiple cache and to management of cache activity in data storage systems having multiple cache. In a particular embodiment, a data storage device includes a volatile memory having a first read cache and a first write cache, a non-volatile memory having a second read cache and a second write cache and a controller coupled to the volatile memory and the non-volatile memory. The memory can be configured to selectively transfer read data from the first read cache to the second read cache based on a least recently used indicator of the read data and selectively transfer write data from the first write cache to the second write cache based on a least recently written indicator of the write data. | 2010-11-18 |
20100293338 | CACHE CLEANUP AND LATCHING - A low priority queue can be configured to list low priority removal candidates to be removed from a cache, with the low priority removal candidates being sorted in an order of priority for removal. A high priority queue can be configured to list high priority removal candidates to be removed from the cache. In response to receiving a request for one or more candidates for removal from the cache, one or more high priority removal candidates from the high priority queue can be returned if the high priority queue lists any high priority removal candidates. If no more high priority removal candidates remain in the high priority queue, then one or more low priority removal candidates from the low priority queue can be returned in the order of priority for removal. Write-only latches can also be used during write operations in a cache lookup data structure. | 2010-11-18 |
20100293339 | DATA PROCESSING SYSTEM, PROCESSOR AND METHOD FOR VARYING A DATA PREFETCH SIZE BASED UPON DATA USAGE - A method of data processing in a processor includes maintaining a usage history indicating demand usage of prefetched data retrieved into cache memory. An amount of data to prefetch by a data prefetch request is selected based upon the usage history. The data prefetch request is transmitted to a memory hierarchy to prefetch the selected amount of data into cache memory. | 2010-11-18 |
20100293340 | Wake-and-Go Mechanism with System Bus Response - A wake-and-go mechanism is provided for a data processing system. The wake-and-go mechanism is configured to issue a look-ahead load command on a system bus to read a data value from a target address and perform a comparison operation to determine whether the data value at the target address indicates that an event for which a thread is waiting has occurred. In response to the comparison resulting in a determination that the event has not occurred, the wake-and-go engine populates a wake-and-go storage array with the target address and snooping the target address on the system bus without data exclusivity. In response to the comparison resulting in a determination that the event has occurred, the wake-and-go engine issues a load command on the system bus to read the data value from the target address with data exclusivity. | 2010-11-18 |
20100293341 | Wake-and-Go Mechanism with Exclusive System Bus Response - A wake-and-go mechanism is configured to issue a look-ahead load command on a system bus to read a data value from a target address and perform a comparison operation to determine whether the data value at the target address indicates that an event for which a thread is waiting has occurred. In response to the comparison resulting in a determination that the event has not occurred, the wake-and-go engine populates the wake-and-go storage array with the target address. In response to the comparison resulting in a determination that the event has occurred, the wake-and-go engine issues a load command on the system bus to read the data value from the target address with data exclusivity and determines whether the wake-and-go engine obtains a lock for the target address. Responsive to obtaining the lock for the target address, the wake-and-go engine holds the lock for the thread. | 2010-11-18 |
20100293342 | DATA PROCESSING APPARATUS - Apparatus comprises a processor configured for operation under a sequence of instructions from an instruction set, wherein said processor comprises: means for conditionally inhibiting at least one type of trap, interrupt or exception (TIE) event, wherein, when operating under a sequence of instructions, said inhibition means is inaccessible by said instructions to inhibit the or each type of TIE event, without interrupting said sequence. A data processing apparatus includes a processor adapted to operate under control of program code comprising instructions selected from an instruction set, the apparatus comprising: a predefined memory space providing a predefined addressable memory for storing program code and data, a larger memory space providing a larger addressable memory, means for accessing program code and data within the predefined memory space, and means for controlling the access means so as to enable the access means to access program code located within the larger memory space. | 2010-11-18 |
20100293343 | SCHEDULING BASED ON TURNAROUND EVENT - Transmission of a signal is scheduled to avoid sending the signal during a designated event associated with another signal. For example, the time at which a signal is transmitted may be scheduled to avoid a turnaround time period of a bidirectional signal path. This technique may be employed, for example, in a memory system where a memory controller communicates with one or more memory devices or memory modules. Here, the memory system may be configured to avoid sending memory request signals during a driver turnaround window corresponding to when a bidirectional memory data interface switches from being driven by the memory controller to being driven by a memory device/module, or vice versa. | 2010-11-18 |
20100293344 | APPARATUS AND METHOD FOR SELECTING A POSITION WHERE DATA IS STORED - An apparatus and method are provided for selecting a specific position from a plurality of positions in a memory to which data elements are cyclically written. A specific data element is stored in the plurality of positions. The apparatus comprises a determination unit for determining whether the plurality of positions include any position in a specific area of the memory to which data elements are written in a current cycle. The apparatus further comprises a selection unit for selecting at least one position in the specific area out of the plurality of positions as the specific position if the determination unit determines that the plurality of positions include any position in the specific area, and for selecting at least one position out of the plurality of positions as the specific position if the determination unit determines that the plurality of positions do not include any position in the specific area. | 2010-11-18 |
20100293345 | NETWORK COMMUNICATIONS PROCESSOR ARCHITECTURE WITH MEMORY LOAD BALANCING - Described embodiments provide a memory system including a plurality of addressable memory arrays. Data in the arrays is accessed by receiving a logical address of data in the addressable memory array and computing a hash value based on at least a part of the logical address. One of the addressable memory arrays is selected based on the hash value. Data in the selected addressable memory array is accessed using a physical address based on at least part of the logical address not used to compute the hash value. The hash value is generated by a hash function to provide essentially random selection of each of the addressable memory arrays. | 2010-11-18 |
20100293346 | Storage System Construction Managing Device And Construction Management Method - The device of the present invention manages changes in the construction of a storage system in a unified manner, and optimally disposes resources. The servers are logically divided into a plurality of virtual servers, the switches are logically divided into a plurality of zones, and the storage devices are logically divided into a plurality of virtual storage devices. The respective logical devices are respectively managed by respective managing parts. These respective managing parts are connected to a managing device via a network used for management. The managing device re-disposes resources in application program units on the basis of the load states of the respective resources in the storage system. | 2010-11-18 |
20100293347 | LOAD/STORE ORDERING IN A THREADED OUT-OF-ORDER PROCESSOR - Systems and methods for efficient load-store ordering. A processor comprises a store buffer that includes an array. The store buffer dynamically allocates any entry of the array for an out-of-order (o-o-o) issued store instruction independent of a corresponding thread. Circuitry within the store buffer determines a first set of entries of the array entries that have store instructions older in program order than a particular load instruction, wherein the store instructions have a same thread identifier and address as the load instruction. From the first set, the logic locates a single final match entry of the first set corresponding to the youngest store instruction of the first set, which may be used for read-after-write (RAW) hazard detection. | 2010-11-18 |
20100293348 | APPARATUS AND METHOD OF REARRANGING DATA AND NONVOLITILE DATA STORAGE APPARATUS - A storage apparatus includes one or more memory units each having a plurality of memory blocks to store a file having data corresponding to a plurality of clusters, and a controller to store the file in the memory units such that such that the data of at least two sequential addresses of the clusters are stored in the memory blocks of different memory units. | 2010-11-18 |
20100293349 | CONVERTING LUNS INTO FILES OR FILES INTO LUNS IN REAL TIME - A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN. | 2010-11-18 |
20100293350 | METHOD OF OPERATING AN INTEGRATED CIRCUIT, INTEGRATED CIRCUIT AND MEMORY MODULE - According to one embodiment of the present invention, a method of operating an integrated circuit including a plurality of resistance changing memory cells grouped into physical memory units is provided. The method includes: Monitoring writing access numbers assigned to the physical memory units, each writing access number reflecting the number of writing accesses to the physical memory unit to which the writing access number is assigned; if the value of a writing access number assigned to a first physical memory unit exceeds a writing access threshold value, a data exchange process is carried out during which the data content stored within the first physical memory unit is exchanged with the data content of a second physical memory unit having a writing access number of a lower value. | 2010-11-18 |
20100293351 | COMPUTER SYSTEM FOR ACCESSING STORED DATA - A computer system comprising:
| 2010-11-18 |
20100293352 | SEMICONDUCTOR MEMORY DEVICE - The semiconductor memory device proposed in the present invention comprises the buffer control circuit which, when writing the data, controls the data input buffer so that the data from the same timing as the clock when the writing command is input is written in the activated memory bank, and which, when reading the data, controls the data output buffer so that the data with the read latency of more than 3 clock cycles after when the reading command is input is read from the activated memory bank. | 2010-11-18 |
20100293353 | TASK QUEUING IN A NETWORK COMMUNICATIONS PROCESSOR ARCHITECTURE - Described embodiments provide a method of assigning tasks to queues of a processing core. Tasks are assigned to a queue by sending, by a source processing core, a new task having a task identifier. A destination processing core receives the new task and determines whether another task having the same identifier exists in any of the queues corresponding to the destination processing core. If another task with the same identifier as the new task exists, the destination processing core assigns the new task to the queue containing a task with the same identifier as the new task. If no task with the same identifier as the new task exists in the queues, the destination processing core assigns the new task to the queue having the fewest tasks. The source processing core writes the new task to the assigned queue. The destination processing core executes the tasks in its queues. | 2010-11-18 |
20100293354 | APPARATUS AND METHOD FOR MINIMIZING DATA STORAGE MEDIA FRAGMENTATION - A method of minimizing data storage medium fragmentation, wherein the method provides a data storage library comprising (N) data storage media, wherein (N) is greater than or equal to 1. The method establishes a threshold fragmentation index, and determines, for each value of (i), an actual fragmentation index for an (i)th data storage medium, wherein (i) is greater than or equal to 1 and less than or equal to (N). The method receives a data set from a host computer in communication with the data storage library, and writes the data set to an (i)th data storage medium based upon an (i)th actual fragmentation index. | 2010-11-18 |
20100293355 | Fast data access through page manipulation - A system and a method of accessing a memory are described. The system includes a memory, an interface configured to transfer data (e.g. a data packet), an aligner configured to receive the data and to generate aligned data, and a page buffer module configured to store the aligned data and, when the page buffer module is full with aligned data, transferring the aligned data to the memory. The method includes receiving data at an interface, aligning the data to generate aligned data, storing aligned data in a page buffer module configured to store aligned data for a write access and retrieved data from a read access, writing aligned data to a memory, and transferring retrieved data to the interface. Data can be transferred by the interface at a first rate and aligned data can be written to or retrieved from the memory at substantially the first rate. | 2010-11-18 |
20100293356 | METHOD AND SYSTEM FOR MANAGING HARDWARE RESOURCES TO IMPLEMENT SYSTEM FUNCTIONS USING AN ADAPTIVE COMPUTING ARCHITECTURE - The present invention concerns a new category of integrated circuitry and a new methodology for adaptive or reconfigurable computing. The exemplary IC embodiment includes a plurality of heterogeneous computational elements coupled to an interconnection network. The plurality of heterogeneous computational elements include corresponding computational elements having fixed and differing architectures, such as fixed architectures for different functions such as memory, addition, multiplication, complex multiplication, subtraction, configuration, reconfiguration, control, input, output, and field programmability. In response to configuration information, the interconnection network is operative in real-time to configure and reconfigure the plurality of heterogeneous computational elements for a plurality of different functional modes, including linear algorithmic operations, non-linear algorithmic operations, finite state machine operations, memory operations, and bit-level manipulations. The various fixed architectures are selected to comparatively minimize power consumption and increase performance of the adaptive computing integrated circuit, particularly suitable for mobile, hand-held or other battery-powered computing applications. In an exemplary embodiment, some or all of the computational elements are alternately configured to implement two or more functions. | 2010-11-18 |
20100293357 | Method and apparatus for providing platform independent secure domain - A platform independent secure domain providing apparatus, which determines whether an execution environment is to be in a secure domain and a non-secure domain by a secure bit. The apparatus includes a secure monitor that is adapted to generate a branch instruction when a call to a secure code is sensed, turn on the secure bit when the branch instruction has been successfully executed, and turn off the secure bit when the execution of the secure code is finished, an instruction bypass read only memory (ROM) adapted to receive the branch instruction from the secure monitor, and a processor adapted to execute the branch instruction that is fetched from the instruction bypass ROM. | 2010-11-18 |
20100293358 | DYNAMIC PROCESSOR-SET MANAGEMENT - A dynamic processor-set management method provides for transferring a process from a shared processor set to a dedicated processor set when that process meets a first utilization-related criterion. The method also provides for transferring a process between from a dedicated processor set to a shared processor set when that process meets a second utilization-related criterion. The processor sets are mapped to processor cores that execute the processes. | 2010-11-18 |
20100293359 | General Purpose Register Cloning - A clone set of General Purpose Registers (GPRs) is created to be used by a set of helper thread binaries, which is created from a set of main thread binaries. When the set of main thread binaries enters a wait state, the set of helper thread binaries uses the clone set of GPRs to continue using unused execution units within a processor core. The set of helper threads are thus able to warm up local cache memory with data that will be needed when execution of the set of main thread binaries resumes. | 2010-11-18 |
20100293360 | AUTOMATION DEVICE WITH CONTROL PROGRAM AND METHOD FOR PROGRAMMING THEREOF - An automation device with an execution mechanism for control programs and also a web-services stack for communication with other automation devices and/or automation software, as well as a method for programming thereof are disclosed. For programming and configuration of the control program, the invention provides that the automation device has an integrated, web-based programming interface. According to the method, a connection is set up between the web browser and a web-based programming interface integrated in the automation device, a programmer/configuration application is displayed in the web browser, at least one control program is generated by use of a programming language, and a web service is configured for access to the at least one control program. | 2010-11-18 |
20100293361 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING ELECTRONIC DEVICE - An electronic device including a power key, a time counter which measures how long the power key is continuously pressed, and first and second controllers is provided. The first controller can be suspended while performing a software process upon identifying a length of time measured by the time counter as not being longer than a first given time length, and can be in control so that a power supply is turned off upon identifying the measured length of time as being longer than a second given time length which is longer than the first given time length and as not being longer than a third given time length which is longer than the second given time length. The second controller can send a resetting signal to the first controller upon identifying the measured length of time as being longer than the third given time length. | 2010-11-18 |
20100293362 | Portable device containing programs and user data usable on almost MAC or Windows computer - A removable computer information storage device which is formatted for operation on a portable or stationary computer system currently operating on Apple (MAC) or IBM (Windows) software without on-board mechanical or operational software necessary for the transition of the two systems. | 2010-11-18 |
20100293363 | METHOD FOR CONFIGURING FIELD DEVICES - The disclosure relates to a method for configuring field devices in a process automation system wherein the field devices are connected to other automation components by means of a field bus. In order to minimize the load placed on the field bus, a copy of the current configuration of each field device is stored in a configuration tool, the appropriate set of configuration and parameter data is transmitted to each field device during initial start-up and modifications in relation to the previous copy of the configuration and parameter data are transmitted to the respective field device. | 2010-11-18 |
20100293364 | Device Software Customization - Systems, methods, and other embodiments associated with device software configuration are described. One example method is executed by a personal electronic device (PED) having a read only memory (ROM) configured with a boot loader, a BASE ROM partition, and a customization file store partition (CFSP). The method includes receiving a customization package and storing it in the CFSP. The method includes invoking a one-time installation process to customize PED software, settings, characteristics, and so on, based on the CFSP contents. The method includes invoking a boot-time installation process to configure a file system filter driver on the PED to control access to CFSP contents based, at least in part, on a file attribute associated with the CFSP content. | 2010-11-18 |
20100293365 | METHOD AND APPARATUS FOR SYSTEM AND SOFTWARE QUICK LAUNCH - A method includes launching a software application having a standard start-up mode, determining whether or not a set of application launch settings have been saved for the software application, running the software application in an alternative start-up mode if the set of application launch settings have been saved, and displaying images that are generated by a main portion of the software application. Another method includes begin performing a booting-up of a processor based system, determining whether or not a set of system launch settings have been saved, reading the set of system launch settings to determine an identity of a software application that should be automatically launched if the set of system launch settings have been saved, and automatically initiating a launching of the software application. A system and one or more computer programs are adapted to cause a processor based system to execute the above steps. | 2010-11-18 |
20100293366 | FREQUENCY AND SYMBOL LOCKING USING SIGNAL GENERATED CLOCK FREQUENCY AND SYMBOL IDENTIFICATION - Methods and systems are described for displaying video data after a hot plug event during a start-up dead period. In particular, approaches for receiving data, determining whether link training can be performed and, if not, self-configuring a receiver to display the information in a proper format even during the dead period. | 2010-11-18 |
20100293367 | System and Method for Optimizing Performance of an Information Handling System Component - Systems and methods for optimizing performance of an information handling system component communicatively coupled to the information handling system are disclosed. An information handling system may include a data gathering module and an operating condition controller module. The data gathering module may be configured to retrieve an operating condition characterization value from the component. That operating condition characterization value may be substantially based on a predetermined characteristic of the component. The operating condition controller module may be configured to modify an operating condition of the component based at least on the retrieved operating condition characterization value. | 2010-11-18 |
20100293368 | Signaling System for Telecommunications - A pair of devices ( | 2010-11-18 |
20100293369 | METHOD FOR REACTIVATION OF A SECURE COMMUNICATION LINK - The invention relates to a method of reactivating a safe communication connection between client computers and a server after restarting the server, wherein safe communication connections are provided between the server and the client computers for the transmission of data. After restarting, or rebooting the server, a data packet is therefore transmitted ( | 2010-11-18 |
20100293370 | AUTHENTICATION ACCESS METHOD AND AUTHENTICATION ACCESS SYSTEM FOR WIRELESS MULTI-HOP NETWORK - Authentication access method and authentication access system for wireless multi-hop network. Terminal equipment and coordinator have the capability of port control, the coordinator broadcasts a beacon frame, and the terminal equipment selects an authentication and key management suite and transmits a connecting request command to the coordinator. The coordinator performs authentication with the terminal equipment according to the authentication and key management suite which is selected by the terminal equipment, after authenticated, transmits a connecting response command to the terminal equipment. The terminal equipment and the coordinator control the port according to the authentication result, therefore the authenticated access for the wireless multi-hop network is realized. The invention solves the security problem of the wireless multi-hop network authentication method. | 2010-11-18 |
20100293371 | GENERATING PKI EMAIL ACCOUNTS ON A WEB-BASED EMAIL SYSTEM - The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive PKI encrypted emails over a computer network, such as the Internet. The systems and methods preferably include a Web-based Email System and a Certificate Authority that coordinate their actions to make the process of creating, maintaining and using the PKI Account as easy as possible for the Email User. In a preferred embodiment, a Keystore System may also be used to enhance the management and use of digital keypairs. | 2010-11-18 |
20100293372 | ASYMMETRIC CRYPTOGRAPHY FOR WIRELESS SYSTEMS - A method for authenticating messages in a communication network includes forming a super message having a plurality of individual messages such that at least two of the individual messages are intended for separate receiving entities. The method further includes creating a message authentication code (MAC) using a private key, such that the MAC is configured to permit authentication of the super message using a public key. | 2010-11-18 |
20100293373 | INTEGRITY SERVICE USING REGENERATED TRUST INTEGRITY GATHER PROGRAM - An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value. | 2010-11-18 |
20100293374 | Secure Portable Memory Storage Device - A wireless secure authentication system for portable memory storage devices to prevent unauthorized transfer of stored data. The system includes a memory device such as a USB storage device that is capable of data storage. A wireless receiver and/or transmitter on the device receives and/or transmits an external signal from and/or to an external remote device, such as RFID card, bluetooth receiver, cellular telephone or any other wireless device. The device does not allow data to be accessed in the memory of the device until it receives an appropriate signal from the external device. Once the appropriate signal has been received, data transfer is allowed. In the event that the signal is lost, the data transfer is terminated and access to the data is not permitted. Examples of the system includes a USB memory device that requires a RFID card with an encrypted signal to be within a dedicated perimeter from the device. | 2010-11-18 |
20100293375 | METHOD FOR THE REMOTE ANALYSIS OF A COOKING APPLIANCE, AND A COOKING APPLICATION FOR CONDUCTING SAID METHOD - The invention relates to a method for storing data in a memory of a cooking appliance and/or for reading data from the memory of the cooking appliance, wherein the cooking appliance comprises at least one interface to a server. In a first step, data of the cooking appliance is stored in the memory, and in a second step, following authentication by the server in relation to the cooking appliance, data is read from the memory by the server via encoded data transmission. The invention further relates to a cooking appliance, comprising at least one memory, a user interface, and at least one interface to at least one server in order to carry out such a method for the purpose of transmitting data between the memory and at least the server. | 2010-11-18 |
20100293376 | METHOD FOR AUTHENTICATING A CLENT MOBILE TERMINAL WITH A REMOTE SERVER - The disclosure relates to a method and a device for authenticating a client mobile terminal on a remote server of said terminal, with said server sending a challenge to said mobile terminal in advance, said mobile terminal having to respond to the challenge, to authenticate at the same time, by transmitting a response consisting in encoding said challenge combined with a secret key known to said terminal and the same time to the server, wherein the secret key is hidden in a media file recorded in the mobile terminal using steganography. | 2010-11-18 |
20100293377 | Methods and Apparatus for Performing Authentication and Decryption - Methods and apparatus are provided for performing authentication and decryption operations. A record including multiple encrypted blocks is received. An encrypted block in the record is extracted and decrypted first in order to obtain context information for performing authentication operations. Each remaining block is then decrypted and authenticated by using the available context information. Authentication operations can be performed without having to wait for the decryption of all of the blocks in the record. | 2010-11-18 |
20100293378 | METHOD, DEVICE AND SYSTEM OF ID BASED WIRELESS MULTI-HOP NETWORK AUTHENTICATION ACCESS - A method, device and system of ID based wireless multi-hop network authentication access are provided, which are used for security application protocol when the WAPI frame method (TePA, Triple-Element and Peer Authentication based access control method) is applied over the specific network including the wireless LAN, wireless WAN and wireless private network. The method includes the following steps: defining non-controlled port and controlled port; the coordinator broadcasts the beacon frame, the terminal device sends the connection request command; the coordinator and the terminal device perform the authentication procedure; the coordinator opens the controlled port and sends the connection response command at the same time if the authentication is successful; the terminal device receives the connection response command and opens the controlled port in order to access the network. The method of the present invention solves the technical problem of the presence of the security trouble in the present wireless multi-hop network authentication access method, improves the security and performance of accessing the wireless multi-hop network from the terminal device, and ensures the communication safety between the terminal device and the coordinator. | 2010-11-18 |
20100293379 | METHOD FOR SECURE DATA TRANSMISSION IN WIRELESS SENSOR NETWORK - A method for secure data transmission in wireless sensor network includes that: the network user determines a master key and inputs it into a central node and a device node; after the central node and the device node have authorized each other, the central node generates a new session key and sends it to the device node; while the central node and the device node communicate with each other, the data sending party uses the new session key to encrypt the data for transmission and verify the integrity of the data, and the data receiving party uses the session key to decrypt the data and verify the integrity of the data. The advantages of the present invention are that: the consumption of computation resource and the communication overhead are greatly reduced without affecting the security performance of the network, the problem of the authorization between the central node and the device node is solved, and the method for generating, transmitting and updating the key realizes the encryption of the data for transmission and the verification of the data integrity, and thus it ensures the security of the data transmission in wireless sensor network. | 2010-11-18 |
20100293380 | QUANTUM CRYPTOGRAPHY APPARATUS - The method involves exchange of a quantum signal between a first quantum node and a second quantum node as is usual in known quantum key distribution (QKD) scheme. The first quantum node communicates details of the quantum signal it sent or received with a first remote node. The first remote node thus has all the information to required to take the place of the first quantum node in the key agreement step with the second quantum node. The first quantum node may be arranged to transmit the quantum signal to the second quantum node, in which ease the invention provides a distributed quantum transmitter with the control logic in the first remote node being distributed remotely from the actual quantum transmitter in the first quantum node. Communications between the first remote node and first quantum node may comprise or be protected by a quantum key derived by conventional QKD. | 2010-11-18 |
20100293381 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 2010-11-18 |
20100293382 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 2010-11-18 |
20100293383 | Storage device authentication - Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest. | 2010-11-18 |
20100293384 | Digital Signatures - Technologies are generally described for secure digital signatures that employ hardware public physically unclonable functions. Each unique digital signature generator can be implemented as hardware such that manufacturing variations provide measurable performance differences resulting in unique, unclonable devices or systems. For example, slight timing variations through a large number of logic gates may be used as a hardware public physically unclonable function of the digital signature unit. The hardware digital signature unit can be parameterized such that its physical characteristics may be publicly distributed to signature verifiers. The verifiers may then simulate randomly selected portions of the signature for verification. | 2010-11-18 |
20100293385 | HTTP-BASED AUTHENTICATION - A system and method for authenticating an HTTP message. A relying party may respond to a request from a requester by sending an HTTP message with authentication specifications to the requester. The requester responds with a new request that adheres to a scheme specified by the relying party. A framework allows for a security token to be located in an HTTP header or a message body, with various options such as fragmenting the token available. An option allows for cryptographically binding the security token to the body of a message. An authentication framework provides for an implementation by an HTTP stack or by an application. | 2010-11-18 |
20100293386 | DISTRIBUTION AND PRINTING OF TRAVEL DOCUMENTS - A system for generating and printing travel documents for a customer associated with a journey having one or more parts, the system comprising: a travel documentation distribution module capable of generating travel documentation for the customer and capable of passing the documents for storage on a customer device at the request of the customer; and a printer located in the vicinity of a starting point of one of the parts of the journey which is capable of responding to a short range communication from the customer device to print the travel documents for said part of the journey for the customer. | 2010-11-18 |