49th week of 2014 patent applcation highlights part 73 |
Patent application number | Title | Published |
20140359232 | SYSTEM AND METHOD OF A SHARED MEMORY HASH TABLE WITH NOTIFICATIONS - A method and apparatus of a device that includes a shared memory hash table that notifies one or more readers of changes to the shared memory hash table is described. In an exemplary embodiment, a device modifies a value in the shared memory hash table, where the value has a corresponding key. The device further stores a notification in a notification queue that indicates the value has changed. In addition, the device invalidates a previous entry in the notification queue that indicates the value has been modified. The device signals to the reader that a notification is ready to be processed. | 2014-12-04 |
20140359233 | READ-WRITE CONTROL METHOD FOR MEMORY, AND CORRESPONDING MEMORY AND SERVER - Described are a read-write control method for memory, and a corresponding memory and server. The method comprises: dividing a storage resource of the memory by taking a block as a unit; to write data, combining the data to be written into a data block, writing the data block in a free segment of the memory, and recording an identifier and a corresponding index of the data, the index of the written data is an offset indicating a memory location of the data in the memory; to read data, reading the data from the offset of the memory according to an identifier and a index of the data to be read. When read-write control is performed on the memory, the number of the times that the I/O operation is performed on the memory is reduced during data writing, thereby improving the efficiency of the write operation on the memory. | 2014-12-04 |
20140359234 | SYSTEMS AND METHODS TO SAVE AND RESTORE A WRITE GATHER PIPE - Systems and methods for efficient data transfer in a data processing system that includes saving and restoring residual data of a write gather facility. Specifically, a method is provided for data processing that includes writing an address to a register. The method further includes initiating a save operation of residual data within the write gather facility. The writing of the address to the register causes the initiation of the save operation. The residual data is one byte to any number of bytes less than a predetermined number of bytes gathered in the write gather facility. | 2014-12-04 |
20140359235 | SYSTEM AND METHOD FOR MANAGING AND PRODUCING A DATASET IMAGE ACROSS MULTIPLE STORAGE SYSTEMS - An application may store data to a dataset comprising a plurality of volumes stored on a plurality of storage systems. The application may request a dataset image of the dataset, the dataset image comprising a volume image of each volume of the dataset. A dataset image manager operates with a plurality of volume image managers in parallel to produce the dataset image, each volume image manager executing on a storage system. The plurality of volume image managers respond by performing requested operations and sending responses to the dataset image manager in parallel. Each volume image manager on a storage system may manage and produce a volume image for each volume of the dataset stored to the storage system. If a volume image for any volume of the dataset fails, or a timeout period expires, a cleanup procedure is performed to delete any successful volume images. | 2014-12-04 |
20140359236 | SYSTEM AND METHOD FOR MANAGING AND PRODUCING STORAGE OBJECT IMAGES ON A STORAGE SYSTEM - An application may store data to a dataset comprising a plurality of volumes stored on a plurality of storage systems. The application may request a dataset image of the dataset, the dataset image comprising a volume image of each volume of the dataset. A dataset image manager operates with a plurality of volume image managers in parallel to produce the dataset image, each volume image manager executing on a storage system. The plurality of volume image managers respond by performing requested operations and sending responses to the dataset image manager in parallel. Each volume image manager on a storage system may manage and produce a volume image for each volume of the dataset stored to the storage system. If a volume image for any volume of the dataset fails, or a timeout period expires, a cleanup procedure is performed to delete any successful volume images. | 2014-12-04 |
20140359237 | VARIABLE PARTITIONING IN A HYBRID MEMORY SUBSYSTEM - “A memory module includes a volatile memory, a non-volatile memory, and a memory controller adapted to present to a host system external to the memory module an address space that includes an address space of the volatile memory and excludes all addresses of the non-volatile memory capacity. The module includes logic to copy the contents of the volatile memory to memory locations of the nonvolatile memory capacity reserved for backup of the volatile memory, using power from a backup power interface, when suitable power from the host system is unavailable, wherein the memory controller reserves for backup of the volatile memory an amount of nonvolatile memory storage capacity that is at least twice a memory storage capacity of the volatile memory.” | 2014-12-04 |
20140359238 | STORAGE APPARATUS AND VOLUME MANAGEMENT METHOD - The storage apparatus comprises a storage unit storing data read/written by the host apparatus, and a control unit controlling writing of the data to the storage unit. The control unit configures one or more pools from the storage unit and divides one of the pools into first pages having an area of a first size and divides the first pages into second pages having the second area, and manages the pages, manages a data storage area of a first volume storing the data by using the first-size area and manages a data storage area of a second volume storing the data by using the second-size area, assigns the first page to the data storage area of the first volume, and assigns the first page in units of the second volume and assigns the second page obtained by dividing the first page to the data storage area of the second volume. | 2014-12-04 |
20140359239 | APPARATUS FOR HARDWARE ACCELERATED RUNTIME INTEGRITY MEASUREMENT - Techniques are described for providing processor-based dedicated fixed function hardware to perform runtime integrity measurements for detecting attacks on system supervisory software, such as a hypervisor or native Operating System (OS). The dedicated fixed function hardware is provided with memory addresses of the system supervisory software for monitoring. After obtaining the memory addresses and other information required to facilitate integrity monitoring, the dedicated fixed function hardware activates a lock-out to prevent reception of any additional information, such as information from a corrupted version of the system supervisory software. The dedicated fixed function hardware then automatically performs periodic integrity measurements of the system supervisory software. Upon detection of an integrity failure, the dedicated fixed function hardware uses out-of-band signaling to report that an integrity failure has occurred. | 2014-12-04 |
20140359240 | VIRTUALIZING PROCESSOR MEMORY PROTECTION WITH "L1 ITERATE AND L2 DROP/REPOPULATE" - A computing system includes a guest domain access control register (DACR), and guest first and second level page tables, the page tables containing domain identifiers used to obtain domain access information and access permission information, and the domain access information and the access permission information providing an effective guest access permission. The computing system provides a shadow page table, in which domain identifiers are used to identify domain access information in a processor DACR that are mapped from domain access information in the guest DACR, and in which access permissions are mapped from effective access permission information in the guest page tables and guest DACR. A memory management unit in the processor traverses the shadow page table, accesses the processor DACR, and combines the mapped domain access information in the processor with the mapped access permission in the shadow page table to reflect the guest intended effective access permissions. | 2014-12-04 |
20140359241 | MEMORY DATA MANAGEMENT - A method and computer-readable storage media are provided for rearranging data in physical memory units. In one embodiment, a method may include monitoring utilization counters. The method may further include, comparing the utilization counters for a match with an instance in a first table containing one or more instances when data may be rearranged in the physical memory units. The table may further include where the data should be relocated by a rearrangement. The method may also include, continuing to monitor the utilization counters if a match is not found with an instance in the first table. The method may further include, rearranging the data in the physical memory units if a match between the utilization counters and an instance in the first table is found. | 2014-12-04 |
20140359242 | MEMORY DEVICE WITH RELAXED TIMING PARAMETER ACCORDING TO TEMPERATURE, OPERATING METHOD THEREOF, AND MEMORY CONTROLLER AND MEMORY SYSTEM USING THE MEMORY DEVICE - A memory device used with a relaxed timing requirement specification according to temperatures, an operation method thereof, and a memory controller and a memory system using the memory device are provided. The memory device has a first timing characteristic at a first temperature and a second timing characteristic that is longer than the first timing characteristic at a second temperature. If a temperature of the memory device is higher than a reference temperature, the memory controller controls the first timing characteristic as a timing requirement specification of the memory device. If the temperature of the memory device is lower than the reference temperature, the memory controller controls the second timing characteristic as the timing requirement specification of the memory device. | 2014-12-04 |
20140359243 | Optimal Volume Placement Across Remote Replication Relationships - A mechanism is provided in a data processing system for volume placement across remote replication relationships. Responsive to applying a volume placement optimization to a source storage pool having at least one volume with a replication target in a target storage pool, the mechanism determines whether the source storage pool and the target storage pool have identical storage volume membership. Responsive to determining the source storage pool and the target storage pool not having the same storage volume membership, the mechanism generates workload performance data for each non-shared storage volume in the target storage pool that does not have a corresponding member of the source storage pool. The mechanism generates a hardware profile for hardware of the target storage pool. The mechanism generates a volume placement optimization for the storage volumes in the target storage pool based on the workload performance data for each non-shared storage volume in the target storage pool and the hardware profile for the hardware of the target storage pool. | 2014-12-04 |
20140359244 | DE-DUPLICATION WITH PARTITIONING ADVICE AND AUTOMATION - Migrating a sub-volume in data storage with at least two de-duplication domains, each of the domains having at least one sub-volume. A first sub-volume is assigned to a de-duplication domain and a first content summary is computed for the first sub-volume. Similarly, a second sub-volume is assigned to a second de-duplication domains and a second content summary is computed for the second sub-volume. A first content affinity is calculated between the first sub-volume and a third sub-volume, and a second content affinity is calculated between the second sub-volume and the third sub-volume. A domain placement is selected for the third sub-volume based on comparison of the first content affinity and the second content affinity. | 2014-12-04 |
20140359245 | I/O LATENCY AND IOPS PERFORMANCE IN THIN PROVISIONED VOLUMES - A storage system receives an anticipatory write command corresponding to a potential subsequent write command to be received by the storage system, wherein the anticipatory write command indicates an anticipated region of logical address space that may be written to by the potential subsequent write command. The storage system determines that physical storage is not allocated to the anticipated region of logical address space. The storage system allocates physical storage to the anticipated region of logical address space from a pool of available storage managed by the storage system. The storage system creates an association between the anticipated region of logical address space and the allocated physical storage in a virtual-to-physical mapping. | 2014-12-04 |
20140359246 | SYSTEM AND METHOD FOR MONITORING MEMORY STACK SIZE - A system and method for monitoring a memory stack size is provided, and more particularly, a method for monitoring a memory stack size, whereby the size of a memory stack applied to an operating system of a controller for a vehicle is monitored so that an overflow phenomenon of the memory stack can be prevented. That is, an accurate usage amount of a memory stack of the entire control system for a hybrid vehicle is efficiently and effectively monitored so that, when the control system reaches a risk level of stack overflow, fail-safe logic is executed and an overflow phenomenon of the memory stack as a result can be prevented. | 2014-12-04 |
20140359247 | METHOD FOR DATA MANAGEMENT - A method for data management adapted for a host controller to store device context data of a universal serial bus (USB) device is provided, and the host controller includes a memory. The method includes following steps: storing a device slot index table in the memory; allocating a plurality of memory blocks in the memory according to state information of the USB device when it is detected that the USB device is coupled to the host controller, so as to store the device context data of the USB device, and storing an initial address of the memory blocks in the device slot index table; and releasing the memory blocks and erasing the initial address of the memory blocks stored in the device slot index table when it is detected that the USB device is detached from the host controller. | 2014-12-04 |
20140359248 | MEMORY ALLOCATION IMPROVEMENTS - In one embodiment, a memory allocator of a memory manager can service memory allocation requests within a specific size-range from a section of pre-reserved virtual memory. The pre-reserved virtual memory allows allocation requests within a specific size range to be allocated in the pre-reserved region, such that the virtual memory address of a memory allocation serviced from the pre-reserved region can indicate elements of metadata associated with the allocations that would otherwise contribute to overhead for the allocation. | 2014-12-04 |
20140359249 | SYSTEM AND METHOD TO STORE DATA IN AN ADJUSTABLY PARTITIONABLE MEMORY ARRAY - The disclosure relates to an electronic memory system, and more specifically, to a system for storing data in an adjustably partitionable memory array, and a method to store data in an adjustably partitionable memory array. According to an embodiment of the disclosure, a system to store data in an adjustably partitionable memory array is provided, the system including a plurality of memory cells arranged in an array of rows and columns, a plurality of bit lines, and a plurality of switches, wherein each bit line is electrically coupled to a column of memory cells and each bit line comprises a switch configured to allow the respective bit line to be partitioned by opening of the switch. | 2014-12-04 |
20140359250 | TYPE INFERENCE FOR INFERRING SCALAR/VECTOR COMPONENTS - Methods and systems are provided for inferring types in a computer program. In one example, a method comprises: identifying a type of at least one expression of the computer program; and annotating the at least one expression in the computer program when the type of the at least one expression is at least one of a varying type and a uniform type. | 2014-12-04 |
20140359251 | SIGNAL PROCESSING DEVICE AND SIGNAL PROCESSING METHOD - A signal processing device including: one or more vector processors configured to perform vector processing to a signal using a parameter, one or more scalar processors configured to perform scalar processing for generating the parameter, a first circuit coupled to the one or more vector processors and the one or more scalar processors and configured to transfer the parameter from the one or more scalar processors to the one or more vector processors, and a second circuit coupled to the one or more vector processors and another circuit that inputs the signal to the second circuit, and configured to transfer the signal among the one or more vector processors and the other circuit. | 2014-12-04 |
20140359252 | DIGITAL SIGNAL PROCESSOR - A multicore processor is achieved by a processor assembly, comprising a first processor having a first core and at least a first and a second unit, each being selected from the group of vector execution units, memory units and accelerators, said first core and first and second units being interconnected by a first network, and a second processor having a second core wherein the first core is arranged to enable the second core to control at least one of the units in the first processor. Each processors generally comprises a combination of execution units, memory units and accelerators, which may be controlled and/or accessed by units in the other processor. | 2014-12-04 |
20140359253 | INCREASING MACROSCALAR INSTRUCTION LEVEL PARALLELISM - A processor may include a vector functional unit that supports concurrent operations on multiple data elements of a maximum element size. The functional unit may also support concurrent execution of multiple distinct vector program instructions, where the multiple vector instructions each operate on multiple data elements of less than the maximum element size. | 2014-12-04 |
20140359254 | Logical cell array and bus system - A logic cell array having a number of logic cells and a segmented bus system for logic cell communication, the bus system including different segment lines having shorter and longer segments for connecting two points in order to be able to minimize the number of bus elements traversed between separate communication start and end points. | 2014-12-04 |
20140359255 | Coarse-Grained Data Processor Having Both Global and Direct Interconnects - A data processor having a plurality of coarse-grained data processing elements arranged in rows and columns, an interconnect structure comprising both global and direct interconnects, the global interconnects interconnecting the coarse-grained data processing elements globally and the direct interconnects interconnecting adjacent data processing elements. | 2014-12-04 |
20140359256 | COUPLED DYNAMICAL SYSTEMS FOR CHAOS COMPUTING - The present invention provides systems and methods for coupled dynamical systems for chaos computing. For example, a system for the coupled dynamical system comprises a first, second, and third circuit. The first circuit comprising a plurality of single dynamical systems forms a coupled dynamical system that reduces local noises in the plurality of single dynamical systems by diffusing the local noises across the coupled dynamical system. The second circuit, connected to the first circuit, receives the data and control inputs and builds an encoding map that translates the data and control inputs to an initial condition on an unstable manifold of the plurality of single dynamical systems in the coupled dynamical system. After the coupled dynamical system evolves, a third circuit, connected to the first circuit, samples a state of one of the plurality of single dynamical systems in the coupled dynamical system and builds a decoding map. | 2014-12-04 |
20140359257 | SYSTEMS AND METHODS FOR ACCURATE INITIALIZATION FROM LOW-POWER AND POWER-OFF STATES - This paper describes various embodiments that relate to personal computer systems, and accurate initialization of computer hardware of personal computer systems from a low-power and/or power-off state. According to one embodiment of the invention, a computer system includes a device operative to be powered down to the power-off state dependent upon an amount of user activity on the computer system. The computer system also includes a device controller operative to initialize the device from the power-off state to a power-on state responsive to user activity on the computer system. The device controller has at least one sensor device operative to determining a physical variable related to the device, and operating characteristics of the device are related to the physical variable. | 2014-12-04 |
20140359258 | Declarative Configuration Elements - Systems and methods for desired state configuration (DSC) are disclosed. DSC provides the ability to perform declarative configuration natively within a shell language and to use early-bound schematized data constructs embedded in a late-bound shell language. This allows declarative programming elements to be incorporated into imperative languages, such as scripts for configuration management. Script may combine the power of an imperative shell language with the ease of use of a declarative language and may use both imperative and declarative syntax in the same language. | 2014-12-04 |
20140359259 | Communication with a Virtual Trusted Runtime BIOS - A computing system and a method of communicating with a virtual trusted runtime BIOS. The computing system can include hardware and a virtual machine monitor. A virtual trusted runtime BIOS can be managed by the virtual machine monitor. A communication channel can communicate with the virtual trusted runtime BIOS. The communication channel can be secured by a secure socket layer. | 2014-12-04 |
20140359260 | IMAGE FORMING APPARATUS HAVING HIBERNATION FUNCTION, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An image forming apparatus which has a hibernation function and is capable of selecting a suitable startup method even in a case where device connection states are different at power-off and at next startup. A hibernation image created based on data stored in a memory of the image forming apparatus and a first device connection state indicative of whether the device is connected to the image forming apparatus are stored in a flash disk. After that, when power to the image forming apparatus is turned off and the power is turned on again, a second device connection state indicative of whether the device is connected to the image forming apparatus is obtained. When the first and second connection states are different, the image forming apparatus is started without using the hibernation image, and when they are the same, the image forming apparatus is started using the hibernation image. | 2014-12-04 |
20140359261 | ENVIRONMENTALIZATION TECHNIQUE FOR PROMOTION OF APPLICATION PROGRAMMING INTERFACE (API) SERVER IN LIFECYCLE SUCCESSION OF DEPLOYMENTS - Example methods, systems, and techniques of managing a succession of deployments of an application programming interface (API) server configuration are provided. An example method includes defining a first configuration of the API server. The first configuration includes a deployment package that encodes at least policy, listener and external connection components of the defined first configuration together with environment settings particular to operation of the API server in a development environment deployment thereof. The method also includes preparing a second configuration of the API server. The second configuration includes (i) a policy package derived from the first configuration and (ii) a separable environment package particular to a testing environment deployment of the API server. The method further includes preparing a third configuration of the API server. The third configuration includes (i) the derived policy package and (ii) a separable environment package particular to a production environment deployment of the API server. | 2014-12-04 |
20140359262 | WIRELESS HANDHELD DEVICE STARTUP METHOD AND WIRELESS HANDHELD DEVICE - The present disclosure discloses a startup method and a wireless handheld device. The present disclosure relates to the field of communications technologies. The startup method includes: when a wireless handheld device is started, if it is detected that a K | 2014-12-04 |
20140359263 | BOOT FROM LOGICAL VOLUME SPANNING PLURALITY OF PCI DEVICES - A first driver may interface with an operating system (OS). A second driver may interface with a plurality of Peripheral Component Interconnect (PCI) devices. The first driver may expose the plurality of PCI devices as a single logical volume to the OS. The OS may boot from the single logical volume that spans the plurality of PCI devices. | 2014-12-04 |
20140359264 | METHOD FOR LOW POWER BOOT FOR MICROCONTROLLER - A microcontroller includes a clock generator having an internal reference clock, a system mode controller establishing an operating mode, a flash memory having an internal clock and a non-volatile option register, and a boot mode selection logic circuit coupled to the system mode controller and the flash memory. The logic circuit outputs a boot mode selection signal instructing the microcontroller to boot in a very low power run (VLPR) mode or a RUN mode. The system mode controller enters the VLPR or RUN mode in response. The flash memory bypasses and disables its internal clock prior to calibration of the flash memory in the VLPR mode and prior to initialization of the flash memory in the RUN mode. The flash memory subsequently uses an external clock signal based on the output of the internal reference clock. | 2014-12-04 |
20140359265 | FAST MODELING USING INTERPOLATED STARTING POINTS - Techniques are disclosed relating to forward and inverse modeling of geophysical formations using interpolation. In one embodiment, a method includes generating a system of equations based on a background model that describes a geophysical formation. In this embodiment, the method also includes generating a first set of solutions for the system of equations using an initial set of base points from geophysical survey data obtained from the geophysical formation and interpolating, using the first set of solutions, to produce a set of solution approximations for a second set of data points from the geophysical survey data. In this embodiment, the method also includes generating a model of the geophysical formation, using the second set of data points and the set of solution approximations, where the model includes a second set of solutions for the system of equations. | 2014-12-04 |
20140359266 | OPTIMIZING BOOT TIME OF A STORAGE SYSTEM - Systems and methods herein provide a storage system that optimizes the boot time when the storage system is rebooted. One embodiment includes a storage controller operable to determine a topology of one or more storage devices. The storage controller stores the topology in memory. When the storage controller detects a system reboot event, it provides the stored topology to the host and directs the host to reboot with the stored topology. | 2014-12-04 |
20140359267 | METHOD OF CONTROLLING COMPUTER SYSTEM AND COMPUTER SYSTEM - A computer system with a plurality of processors having a hardware-assisted virtualization and a memory, the computer system including a first processor group of the processors having hardware-assisted virtualization set disabled, and a second processor group of the processors and having hardware-assisted virtualization set enabled, the method having: booting a first OS by assigning the first processor group to the first OS; booting a virtual machine monitor to boot a virtual machine by assigning the second processor group to the virtual machine monitor; performed by the virtual machine monitor, booting a second OS by assigning a certain area of the memory to the second OS; and performed by the virtual machine monitor, setting a data path through which the first OS and second OS communicate with each other, the data path being set in the memory. | 2014-12-04 |
20140359268 | Methods of Securely Changing the Root Key of a Chip, and Related Electronic Devices and Chips - Disclosed are methods and apparatus for changing a security key on a computer chip that has a CPU, a first OTPROM (OTPROM1) storing a root key of the chip or derivative thereof (RKPUB1), and a second OTPROM (OTPROM2) on which the chip manufacturer stores nothing. A ROM of the chip stores a first software program (SW1). A device manufacturer can take that chip and interface it to a mass memory of a memory block of an electronic device, then execute a second software program (SW2) that is stored on the mass memory only if SW2 is authenticated by SW1 using the RKPUB1. Then a new root key of the chip or derivative thereof (RKPUB2) is provided (via SW2 or a USB connection for example) which is stored to the OTPROM2 via a security service portion of SW1. Thereafter RKPUB2 can be used to authenticate SW2. | 2014-12-04 |
20140359269 | TECHNIQUES FOR DYNAMIC SYSTEM PERFORMANCE TUNING - Systems and methods consistent with the present disclosure include techniques for dynamic system performance tuning (DSPT). Techniques for DSPT include identifying an active software application during a user session and applying an application-specific profile that defines different system-hardware operating states of a computing system to enhance the performance of the active software application. | 2014-12-04 |
20140359270 | ATTESTATION PROTOCOL FOR SECURELY BOOTING A GUEST OPERATING SYSTEM - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 2014-12-04 |
20140359271 | ELASTIC AUTO-PARALLELIZATION FOR STREAM PROCESSING APPLICATIONS - A method for adjusting a data parallel region of a stream processing application includes measuring congestion of each parallel channel of the data parallel region, measuring a total throughput of all the parallel channels, and adjusting the number of parallel channels based on the current measured congestion and throughput. | 2014-12-04 |
20140359272 | SECURE MULTI-PARTY DEVICE PAIRING USING SENSOR DATA - Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources. | 2014-12-04 |
20140359273 | METHOD AND APPARATUS FOR INPUTTING DATA - Embodiments of the present invention provide a method and an apparatus for inputting data. The present invention relates to the communications field and aims to improve security of input information. The method includes: acquiring, by a virtual machine manager, input data; performing, by the virtual machine manager, encryption processing on the input data according to an encryption rule of a security connection to obtain encrypted data, where the security connection refers to a connection that is established between an application interface and a server and used for data transmission; and sending, by the virtual machine manager, the encrypted data to the server. The present invention is applicable to a data input scenario. | 2014-12-04 |
20140359274 | SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security. | 2014-12-04 |
20140359275 | Method And Apparatus Securing Traffic Over MPLS Networks - Multi-protocol label switching (MPLS) data is typically sent non-encrypted over MPLS-based networks. If encryption is applied to MPLS data frames and MPLS labels are encrypted, each node receiving any of the MPLS data frame would have to perform decryption in order to direct the data frames to a next node, therefore resulting in extra processing and data latency. According to an example embodiment, encryption and decryption mechanisms for MPLS data include encrypting/decrypting payload data while keeping the MPLS labels in the clear (i.e., unencrypted). A MPLS encryption label is also employed within the MPLS label stack to indicate that encryption is applied. The MPLS encryption label is inserted in the MPLS label stack when encrypting the payload and is removed when decrypting the payload. | 2014-12-04 |
20140359276 | SECURING DATA IN A DISPERSED STORAGE NETWORK - A method begins by a source processing module securing data based on a key stream to produce secured data, where the key stream is derived from a unilateral encryption key accessible only to the source processing module, and sending the secure data to an intermediator processing module, where desecuring the secured data is divided into two partial desecuring stages. The method continues with the intermediator processing module partially desecuring the secure data in accordance with a first partial desecuring stage to produce partially desecured data and sending the partially desecured data to a destination processing module. The method continues with the destination processing module further partially desecuring the partially desecured data in accordance with a second desecuring stage to recover the data, where the destination processing module does not have access to the encryption key or to the key stream. | 2014-12-04 |
20140359277 | NETWORK SECURITY USING ENCRYPTED SUBFIELDS - In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a packet containing at least one encrypted subfield from a second network device, the subfield encrypted based on a key received at the second network device from the secure device, and determining if the encrypted subfield matches the encrypted rule. An apparatus and logic are also disclosed herein. | 2014-12-04 |
20140359278 | Secure Remote Subscription Management - A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU) with a connectivity identifier, such as a Provisional Connectivity Identifier (PCID), which may be used to establish an initial network connection to an Initial Connectivity Operator (ICO) for initial secure remote registration, provisioning, and activation. A connection to the ICO may be used to remotely provision the WTRU with credentials associated with the Selected Home Operator (SHO). A credential, such as a cryptographic keyset, which may be included in the Trusted Physical Unit (TPU), may be allocated to the SHO and may be activated. The WTRU may establish a network connection to the SHO and may receive services using the remotely managed credentials. Secure remote subscription management may be repeated to associate the WTRU with another SHO. | 2014-12-04 |
20140359279 | METHOD AND SYSTEM FOR AUTHENTICATING PEER DEVICES USING EAP - A system and method for authenticating a peer device onto a network using Extensible Authentication Protocol (EAP). The key lifetime associated with the keying material generated in the peer device and the authentication server is communicated from the authenticator to the peer device within the EAP Success message. The peer device, having been provided with the key lifetime, can anticipate the termination of its authenticated session and initiate re-authentication prior to expiry of the key lifetime. | 2014-12-04 |
20140359280 | CERTIFICATING AUTHORITY TRUST EVALUATION - In many information security scenarios, a certificate issued by a certificating authority may be presented to a client in order to assert a trust level of a certificated item, such as a message or a web page. However, due to a decentralized structure and incomplete coordination among certificating authorities, the presence and exploitation of security vulnerabilities to issue untrustworthy certificates may be difficult to determine, particularly for an individual client. Presented herein are techniques for providing a certificating authority trust service that collects and evaluates certificates submitted to clients by certificating authorities, and advises the clients of a certificating authority trust level for respective certificating authorities (e.g., determined as a consensus of the evaluated certificates issued by the certificating authority). The clients may use a certificating authority trust set distributed by the certificating authority trust service to determine whether to trust a certificate issued from a particular certificating authority. | 2014-12-04 |
20140359281 | CERTIFICATE EVALUATION FOR CERTIFICATE AUTHORITY REPUTATION ADVISING - In many information security scenarios, a certificate issued by a certificate authority on behalf of a domain is presented to a client in order to verify the identity of the domain. However, due to a decentralized structure and incomplete coordination among certificate authorities, the presence and exploitation of security vulnerabilities to issue untrustworthy certificates may be difficult for an individual client to determine. Presented herein are techniques for advising clients of the trustworthiness of respective certificate authorities by evaluating the certificates issued by such certificate authorities for suspicious indicators, such as hashcode collisions with other certificates and public key re-use. A trust level may be identified of respective certificate authorities according to the presence or absence of suspicious indicators in the certificates issued by the certificate authority, and a certificate authority trust set may be distributed to advise clients of the trustworthiness of certificates issued by the respective certificate authorities. | 2014-12-04 |
20140359282 | SYSTEMS AND METHODS FOR ENABLING SEARCHABLE ENCRYPTION - A system and method for enabling searchable encryption of encrypted documents stored by a client on one or more storage providers includes a broker server in communication with the client and the one or more storage providers. The broker server is adapted to transfer the encrypted documents between the client and the one or more storage providers and to maintain information indicating where the encrypted documents are transferred. The broker server further stores information for at least one encrypted index for the encrypted documents and a test function for a searchable encryption mechanism used to encrypt the at least one encrypted index. | 2014-12-04 |
20140359283 | INTERLOCKING APPLICATIONS AND FILES - A file system monitoring layer is positioned between a virtual file system (VFS) encryption layer and a lower level file system layer. The file system monitoring layer stores a list of applications that are allowed to access encrypted files stored in the lower level file system. The monitoring layer receives from the VFS encryption layer a request by an application to access an encrypted file. If the application is not listed on the list, the VFS encryption layer is instructed to provide the application a denial of service. If the application is listed, the VFS encryption layer is instructed to decrypt the encrypted file for the application. | 2014-12-04 |
20140359284 | COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION - A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository and automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. Additionally, the program destroys the key after termination of each encryption/decryption session. | 2014-12-04 |
20140359285 | METHOD AND SYSTEM FOR TRANSFERRING DATA INSTRUCTIONS THROUGH A HOST FILE SYSTEM - A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a command and passed to a host file system process. The packet, now associated with a second command, is received from the host file system process. The encryption instruction and the payload of data are extracted from the packet. At least a portion of the payload of data is encrypted based on the encryption instruction. A method for decrypting data may receive a packet and generate a decryption instruction. At least a portion of the packet is decrypted using at least the decryption instruction. The second packet comprising the decrypted packet is passed to a host file system process. A third packet comprising the decrypted packet is received from the host file system process. The decrypted packet is extracted from the third packet. | 2014-12-04 |
20140359286 | CONTACT MANAGEMENT METHOD, APPARATUS AND SYSTEM FOR THIRD-PARTY APPLICATION - A contact management method, apparatus and system for a third-party application are described. The contact management method includes: detecting an instruction to obtain a contact, wherein the instruction is input by a user operating the third-patty application; reading contact data in an address book in responsive to the instruction to obtain the contact; encrypting the contact data and obtaining an encrypted contact data; importing the encrypted contact data into a contact data table of the third-party application; and uploading the encrypted contact data in the contact data table to a cloud server, so that a mapping relationship between account information of the user and the encrypted contact data is established at the cloud server, wherein the account information of the user is used for logging in the third-party application. In the method, the apparatus and the system, safety and reliability of the contact data can be improved. | 2014-12-04 |
20140359287 | METHOD AND SYSTEM FOR RECONSTRUCTION OF A DATA OBJECT FROM DISTRIBUTED REDUNDANT DATA PARTS - A data object is encoded in a redundant code. The redundant code defines a decoding scheme for reconstructing the data object from a sub-set of the encoded data parts. At least the sub-set of the encoded data parts is encrypted using a homomorphic encryption scheme, which allows equivalents of the arithmetic operations of a reconstruction process to be performed on encrypted encoded data parts. The data parts are stored distributed over a plurality of source terminals of a communication network, for use by a target terminal of the communication network. Upon a retrieval command from the target terminal, an upload management module determines which source terminals are available and the upload management module determines causes a selected set of terminals to transmit the encrypted encoded data parts each via its own connection to the network to a decoder server. The decoder server performs homomorphic equivalent operations of arithmetic operations of the reconstruction process and downloads the results to the target terminal. In this way the target terminal does not need to perform the entire reconstruction, without requiring decryption outside the target terminal. | 2014-12-04 |
20140359288 | AUTHENTICATION DEVICES, KEY GENERATOR DEVICES, METHODS FOR CONTROLLING AN AUTHENTICATION DEVICE, AND METHODS FOR CONTROLLING A KEY GENERATOR - An authentication device may be provided. The authentication device may include a memory configured to store: a first public key; and first data signed using a first private key corresponding to the first public key, the signed data including a second public key. The authentication device may further include a first verification circuit configured to verify the first data using the first public key; and a second verification circuit configured to verify second data using the second public key, the second data signed using a second private key corresponding to the second public key. | 2014-12-04 |
20140359289 | METHOD FOR DERIVING A VERIFICATION TOKEN FROM A CREDENTIAL - A method for deriving a verification token from a credential may be provided. The credential may be a set of attributes certified by an issuer to a user using a public key of the issuer. The method may comprise generating the verification token out of the credential and binding the verification token to a context string, wherein the verification token may comprise at least one commitment. A commitment may be a blinded version of an attribute. The method may also comprise generating an opening key for the verification token enabling a generation of a confirmation for a validity of the attribute. | 2014-12-04 |
20140359290 | AUTHENTICATION - A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. | 2014-12-04 |
20140359291 | Registry - A system, method, server processing system, and computer program product for operating a registry. In one aspect, the server processing system is configured to: receive, from a user processing system in data communication with the server processing system, document data relating to an entity; receive, from the user processing system, access data indicative of an accessing party to be provided access to the document data if a defined trigger event occurs; store, in a data store associated with the server processing system, a registry for the entity indicative of the document data and the access data; determine that a defined trigger event has occurred; and in response to determining that that a defined trigger event has occurred, provide the accessing party read-only access to the document data via an access processing system in data communication with the server processing system. | 2014-12-04 |
20140359292 | ELECTRONIC KEY REGISTRATION METHOD AND ELECTRONIC KEY REGISTRATION SYSTEM - A method for registering a first electronic key, which is capable of controlling a communication subject, to a controller of the communication subject, the method including: performing an initial production process including storing identification information unique to the communication subject in the controller, and storing an encryption key generation code unique to the first electronic key and an encryption key that is used to verify the first electronic key in the first electronic key; and performing an initial registration process including writing the identification information stored in the controller to the first electronic key, obtaining the encryption key generation code from the first electronic key, generating the encryption key with an encryption key generation logic that uses the encryption key generation code, storing the encryption key in the controller, and storing encryption key information related to the encryption key in a database in association with the identification information. | 2014-12-04 |
20140359293 | METHOD AND DEVICE FOR SECURE NOTIFICATION OF IDENTITY - A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of a device to notify or detect the presence of the device in a network. Each certificate is associated with an identity which is excluded from the communication of the hash of the certificate. The received hash is compared to hashes of certificates stored in an electronic device to determine an identity. The identity may represent an electronic device or a user of the electronic device. | 2014-12-04 |
20140359294 | CONFIGURABLE, SECURE QUICK RESPONSE CODE CREATION AND USE - Systems, software, and methods are provided for configurable, encrypted, secure QR code creation and use. Furthermore, these codes can be used by many entities to provide improved monitoring for a variety of systems. | 2014-12-04 |
20140359295 | METHOD OF TRANSFERRING THE CONTROL OF A SECURITY MODULE FROM A FIRST ENTITY TO A SECOND ENTITY - A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain controlled by the first entity by at least one first secret control key specific to the first entity, and a second security domain, the second domain containing a private key and a certificate of a public key of a controlling authority. The method includes: receiving a request to obtain the certificate; sending the certificate; receiving data encrypted by the public key of the certificate, the data including at least one second secret control key specific to the second entity; decrypting the data; verifying the data; and if the verification is positive, replacing the at least one first secret control key by the at least one second secret control key. | 2014-12-04 |
20140359296 | METHODS TO IMPROVE SECURE FLASH PROGRAMMING - Methods are provided for securely loading software objects into an electronic control unit. The methods include receiving a first software object comprising a second level public key certificate, a first encryption signature and a first set of software. Once the first software object is received, validating the first second level public key is validated with the embedded root public key, the first encryption signature with the first second level public key certificate, and the first set of software with the first encryption signature. When the first set of software is valid, then the first second level public key certificate and the first set of software are stored to non-volatile memory. Once stored, a consecutive software object is received comprising only a consecutive encryption signature and a consecutive set of software from the programming source. The consecutive encryption signature is validated with the stored second level public key certificate, and the consecutive set of software is validated with the consecutive encryption signature. | 2014-12-04 |
20140359297 | Systems and Methods for Intermediate Message Authentication in a Switched-Path Network - Systems, methods, and devices are provided for intermediate authentication of a message transmitted through a switched-path network, such as an optical transport network (OTN). In one method, a message transmitted through communication nodes of a switched-path network may be authenticated, at least partially, by authentication logic of one or more of the communication nodes. The one or more communication nodes may identify whether a prior communication node has tampered with or corrupted the message or may generate an authentication tag to enable an authentication authority to authenticate the message. | 2014-12-04 |
20140359298 | SYSTEMS AND METHODS TO SECURE USER IDENTIFICATION - A computing apparatus configured to verify a digital signature applied on a set of data received from a user device, including a user ID assigned by a partner system to uniquely identify a user of the user device among customers of the partner system, and a user device identifier identifying the user device. The digital signature is generated via applying a cryptographic one-way hash function on a combination of the set of data and a secret, shared between the computing apparatus and the partner system via a secure communication channel separate from a channel used to receive the set of data. | 2014-12-04 |
20140359299 | Method for Determination of User's Identity - Method and system for determination of user's identity described herein, ensures a secure user authentication process using mobile device, e.g. a phone. Method can be used with any service provider resource site, not limited to a website on Internet accessed from the personal computer. The only technological pre-requisite for such a resource site, is capability to display a dynamically generated login/enrollment image. Method can be implemented for any operating system, browser or software API. | 2014-12-04 |
20140359300 | INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND PROGRAM OF DEVICE - At the time of input of authentication information, even when the hand and the input screen are seen from the third person, guess of authentication information is made difficult. A plurality of keys serving as input means are divided into a first region and a second region. Then, the first region and the second region are caused to transit between a first state and a second state distinguished from each other depending on the displayed contents. When a region where a key to be inputted for the input of authentication information is arranged is in the second state, input to the above-mentioned plurality of keys is recognized as dummy. | 2014-12-04 |
20140359301 | UNIFORM MODULAR FRAMEWORK FOR A HOST COMPUTER SYSTEM - A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session. | 2014-12-04 |
20140359302 | System and Method for Intercept of UEFI Block I/O Protocol Services for BIOS Based Hard Drive Encryption Support - An information handling system and method performs Unified Extensible Firmware Interface (UEFI) interception and pre-processing of data associated with block input/output (I/O) commands targeting encrypted storage devices. A UEFI interceptor block (IB) I/O driver intercepts each block I/O command targeting block addresses on a storage device and identifies whether any of the target block addresses is encrypted. In response to identifying an encrypted block address among the target block addresses, the UEFI IB I/O driver forwards data associated with the encrypted block address to an encryption-decryption module to perform one of an encryption and a decryption of the data. Final handling of the block I/O command is performed using a block I/O driver chained to the UEFI IB I/O driver. Data associated with I/O commands targeting encrypted block addresses is first processed by the encryption-decryption module before final handling of the I/O command is performed by the block I/O driver. | 2014-12-04 |
20140359303 | Secure Original Equipment Manufacturer (OEM) Identifier for OEM Devices - An authorized information handling system (IHS) generates unique identifier codes for an OEM (programmable) device designed as a component for an IHS. An identifier generation and validation (IGV) controller in the authorized IHS generates a unique encrypted sequence by encrypting identification (ID) data read from the OEM device. The IGV controller generates a unique OEM identifier code by further encrypting the encrypted sequence using a first OEM proprietary code. The IGV controller writes the first identifier code to a pre-specified storage location of the OEM device. According to one embodiment, the IGV controller generates the unique OEM identifier code using a second reversible encryption-decryption component that comprises an Exclusive-OR (XOR) scrambler engine and generates the unique encrypted sequence using a first reversible encryption-decryption component that comprises an LFSR based scrambler, which utilizes polynomial coefficients that are securely generated and maintained. | 2014-12-04 |
20140359304 | TRUSTED MANAGER BRIDGE - A system and method for securing processing devices includes a police bridge disposed in one or more data busses between a central processing and input/output peripherals, components or components. The police bridge is suitably disposed between northbridge logic and southbridge logic. Alternatively, or in addition to such placement, a police bridge is suitably place between southbridge logic and super I/O logic. A police bridge is suitably a system-on-chip or fixed or programmable hardware. The police bridge monitors or controls its associated bus to determine whether acceptable data, with an associated certificate in other embodiments, is being communicated and signaling is generated accordingly. | 2014-12-04 |
20140359305 | APPLICATION INTEGRITY PROTECTION VIA SECURE INTERACTION AND PROCESSING - The present disclosure is directed to application integrity protection via secure interaction and processing. For example, interaction with a user interface in a device may result in input information being generated. Following encryption, the input information may be conveyed to an application executing in a secure processing environment. The encrypted input information may be received, decrypted and processed by the application. An example application may include a secure controller component, a secure model component and a secure view component. The secure controller component may, for example, provide change instructions to the secure model component based on the decrypted input information. The secure model component may then, if necessary, provide a change notification to the secure view component based on the change instructions. The secure view component may then generate output information, which may be encrypted prior to being provided to the user interface for decryption, processing and presentation. | 2014-12-04 |
20140359306 | SYSTEM, INFORMATION PROCESSING APPARATUS, SECURE MODULE, AND VERIFICATION METHOD - A system includes a secure module structured to prevent information stored therein from being externally referenced; and an information processing apparatus configured to enable communication with the secure module. The information processing apparatus includes a first computer configured to execute a first verification process of verifying whether an application under execution by the information processing apparatus is in a secure state. The secure module includes a second computer, and a storage unit configured to store at least any one among a first feature amount obtained by extracting a feature of execution code of the first verification process, and execution code of an authentication process of authenticating the first verification process. The second computer is configured to execute a second verification process of verifying whether the first verification process under execution by the first computer is in a secure state, based on stored contents of the storage unit. | 2014-12-04 |
20140359307 | IMAGE FORMING APPARATUS PERFORMING CONTROL OF BROWSING OF A FILE BY A TERMINAL, TERMINAL, FILE BROWSING CONTROL SYSTEM, IMAGE FORMING METHOD, AND RECORDING MEDIUM - There is provided an image forming apparatus that eliminates the need for separately preparing an encrypted file for each user. To achieve this, the image forming apparatus performs control of browsing of a browsing file that is browsed at a terminal. The document acquisition portion of the image forming apparatus acquires document data. The document encryption portion encrypts the document data with a public key as the browsing file. The position information setting portion sets position information to permit browsing of the browsing file encrypted by the document encryption portion in a viewer for causing the browsing file to be browsed at the terminal. In the case where it has been determined that the position information coincides with a current position, a browsing execution portion at the terminal uses a secret key to decrypt the browsing file for causing it to be browsed. | 2014-12-04 |
20140359308 | DISPLAY DEVICE WITH MOBILE HIGH-DEFINITION LINK PORT AND SIGNAL PROCESSING METHOD THEREOF - A signal processing method for a display device is provided. The display device is capable of connecting a portable consumer electronic device via a high-definition link (MHL) port. Via the communication bus (CBUS) in the MHL port, a set of encryption codes is provided to the portable consumer electronic device. Based on an encrypted identification fed back from the portable consumer electronic device, it is determined whether the portable consumer electronic device passes authentication. If the portable consumer electronic device passes the authentication, when a human interface device provides a user command to the display device, the user command is encrypted according to the set of encryption codes to generate an encrypted user command compliant to the CBUS specification. Via the CBUS of the MHL port, the encrypted user command is provided to the portable consumer electronic device. | 2014-12-04 |
20140359309 | DELETION OF CONTENT IN STORAGE SYSTEMS - The invention notably relates to a computerized system ( | 2014-12-04 |
20140359310 | SUBSYSTEM-LEVEL POWER MANAGEMENT IN A MULTI-NODE VIRTUAL MACHINE ENVIRONMENT - A computer-implemented method includes capping the amount of power available to each of a plurality of compute nodes, and managing power allocation among subsystems within each of the compute nodes according to the requirements of workloads assigned to each of the compute nodes. The method further comprises reporting an actual performance level and performance capability for each subsystem within each of the plurality of compute nodes, and monitoring parametric data for a particular workload. A target compute node is identified from among the compute nodes, wherein the target compute node would be capable of performing the particular workload if power was reallocated from a first subsystem to a second subsystem within the target compute node. The particular workload is then assigned to the target compute node. Optionally, assigning the particular workload may include migrating the workload to the target compute node from another of the compute nodes. | 2014-12-04 |
20140359311 | Controlling Power Delivery To A Processor Via A Bypass - In one embodiment, a processor includes a plurality of domains each to operate at an independently controllable voltage and frequency, a plurality of linear regulators each to receive a first voltage from an off-chip source and controllable to provide a regulated voltage to at least one of the plurality of domains, and a plurality of selectors each coupled to one of the domains, where each selector is configured to provide a regulated voltage from one of the linear regulators or a bypass voltage to a corresponding domain. Other embodiments are described and claimed. | 2014-12-04 |
20140359312 | POWER ON WITH NEAR FIELD COMMUNICATION - A system for powering up a computer having a central processing unit (CPU), which CPU includes an operating system (OS), when the CPU is in an Sx state in which the (OS) is not powered up. There is a near field communication (NFC) detector for detecting an NFC signal, and an embedded controller physically separate from said CPU, the embedded controller responsive to the NFC signal and adapted to power up the CPU out of said Sx state. | 2014-12-04 |
20140359313 | IMPLEMENTATION OF AN AIR TUBE BUTTON - An approach is described for implementing an air tube button in a computing system. An associated apparatus may include an air tube having an aperture located on a panel of the computing system. The apparatus further may include an airflow sensor located in the air tube and a fan configured for facilitating airflow though the air tube. The airflow sensor may be an anemometer, an air pressure gauge, or a mass flow meter. The apparatus further may include a service processor subsystem connected to the airflow sensor. The service processor subsystem may be configured for implementing a virtual signal having a default logical high value. The service processor subsystem further may be configured for establishing a baseline value by determining average airflow detected by the airflow sensor over a unit of time and commencing sampling of the airflow sensor to obtain airflow values at uniform time intervals. | 2014-12-04 |
20140359314 | COMPUTER SYSTEM AND ITS POWER ADAPTER WITH IMAGE PROJECTION FUNCTION - A computer system and its power adapter with image projection function are provided. The computer system includes an electronic device and a power adapter. The power adapter includes a waveform-transforming module and an image-projecting module electrically connected to the waveform-transforming module. When the power adapter electrically connects to both a power source and the electronic device, the waveform-transforming module provides power to the electronic device and the image-projecting module, and the electronic device provides image signals to the image-projecting module. | 2014-12-04 |
20140359315 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a configuration information acquiring unit, an operation information acquiring unit, an estimating unit, and a first power calculator. The configuration information acquiring unit acquires configuration information representing a configuration of a device. The operation information acquiring unit acquires operation information representing an operation state of the device. The estimating unit estimates a first device maximum power and a first device minimum power in accordance with the configuration information, the first device maximum power being a maximum power consumed by the device, the first device minimum power being a minimum power consumed by the device. The first power calculator calculates a first power consumed by the device, in accordance with the first device maximum power, the first device minimum power, and the operation information. | 2014-12-04 |
20140359316 | METHOD AND APPARATUS FOR CONTROLLING OPERATION VOLTAGE OF PROCESSOR CORE, AND PROCESSOR SYSTEM INCLUDING THE SAME - A method and an apparatus for controlling an operation voltage of a processor core and a processor system including the same are provided. The apparatus for controlling an operation voltage of a processor core includes a voltage supplier and an operation voltage searching core. The voltage supplier supplies the operation voltage to the processor core. The operation voltage searching core requests the processor core to execute a program, and controls the operation voltage based on whether the program has been normally operated. | 2014-12-04 |
20140359317 | MOTHERBOARD WITH CONNECTOR COMPATIBLE FOR DIFFERENT INTERFACE STANDARDS - A motherboard includes a first connector, a first signal module, a second signal module, a power module, and a switch module. The first connector is used to couple external devices to the motherboard. The first signal module and the second signal module are compatible for external devices under different interface standards. The first signal module outputs different signals to control the switch module corresponding to the external device. The switch module connects the first signal module or the second signal module to the first connector corresponding to the control signals received from the control module. | 2014-12-04 |
20140359318 | POWER ADAPTERS - Power adapters are disclosed. An example power adapter includes a housing. The example power adapter also includes a power converter to convert an input power to an output power. The example power adapter also includes a communication pod carried by the housing, the port to receive data from a first device. The example power adapter also includes a terminal to transfer power from the power converter to the second device, and to transmit the data received from the first device to the second device. The example power adapter also includes a communication line to communicate the data from the communication port to the terminal. | 2014-12-04 |
20140359319 | POWER DISTRIBUTION INSIDE CABLE - Circuits, methods, and apparatus that provide for the powering of active components in connector inserts at each end of a cable may in various ways. For example, where a host is coupled to a device that is not self-powered, the host may provide power for circuitry at each end of the cable. In various embodiments of the present invention, the device may request higher voltage from the host, such that more power can be delivered. In these cases, the device may regulate the voltage received from the host to a lower voltage, and then provide the lower voltage to circuitry at one or both ends of the cable. Where the host is connected to a device that is self-powered, the host and the self-powered device may power their respective connector insert circuits. | 2014-12-04 |
20140359320 | POWER OVER ETHERNET METHOD, APPARATUS, DEVICE, AND SYSTEM - The application pertains to a method for an Ethernet power souring equipment to provide electric power to one or more Ethernet powered devices. A controlling apparatus determines a power supply mode of the Ethernet power sourcing equipment, and determines high-power Ethernet powered device(s) and low-power Ethernet powered device(s) among the Ethernet powered devices. The controlling apparatus sets a power supply priority for each of the Ethernet powered devices. In one power supply mode, the power supply priority of a high-power Ethernet powered device is same as or lower than the lowest priority of the low-power Ethernet powered device(s). When a new Ethernet powered device is connected to the Ethernet power sourcing equipment, the controlling apparatus determines whether to supply electric power to the new Ethernet powered device according to its power supply priority. | 2014-12-04 |
20140359321 | PREVENTIVE APPARATUS AND METHOD FOR PROTECTING SERVER - A preventive apparatus and a preventive method for preventing an automatic server shutdown are described. The preventive apparatus includes a power consumption determination unit and a controller. The power consumption determination unit compares the power consumption of the server with a preset power consumption value and determines whether the power consumption of the server has reached the preset power consumption value. If the power consumption of the server has reached or exceeded the preset power consumption value, the controller sends a command to the server to control the server to decrease the operating frequency of internal power device or component, to achieve a reduced power consumption in the server. | 2014-12-04 |
20140359322 | SERIAL ADVANCED TECHNOLOGY ATTACHMENT INTERFACES AND METHODS FOR POWER MANAGEMENT THEREOF - At least one example embodiment discloses a method of managing a power between a host serial advanced technology attachment (SATA) interface and a device SATA interface. The method includes first requesting to enter one of power saving states, defined by a SATA protocol, and second requesting to enter a deep power saving state if one of the host SATA interface and the device SATA interface operates at the first requested power saving state. The first requesting to enter one of power saving states and the second requesting to enter a deep power saving state are performed by one of the host SATA interface and the device SATA interface. | 2014-12-04 |
20140359323 | SYSTEM AND METHOD FOR CLOSED LOOP PHYSICAL RESOURCE CONTROL IN LARGE, MULTIPLE-PROCESSOR INSTALLATIONS - A system and method for closed loop power supply control in large, multiple processor installations are provided. | 2014-12-04 |
20140359324 | SYSTEM AND METHOD FOR INTELLIGENT MULTIMEDIA-BASED THERMAL POWER MANAGEMENT IN A PORTABLE COMPUTING DEVICE - Various embodiments of methods and systems for intelligent multimedia-based thermal power management implemented in a portable computing device (“PCD”) are disclosed. To reduce or increase power consumption in the PCD, embodiments adjust one or more visual multimedia parameters, the settings of which contribute to power consumption associated with an overall multimedia workload. The selection of visual multimedia parameters for setting adjustment is a function of the change in user experience versus the change in power consumption that will likely result from the setting adjustment. Exemplary visual multimedia parameters for which settings may be adjusted by certain embodiments include, but are not limited to, color depth, display brightness, GPU processing resolution, image dynamics algorithm selection, resolution scaling ratios and frames per second processing rates. | 2014-12-04 |
20140359325 | METHOD, DEVICE AND SYSTEM FOR ENERGY MANAGEMENT - The present application relates to carrying out energy management based on context information. In the method, apparatus and system according to the application, a context vector ( | 2014-12-04 |
20140359326 | EMBEDDED CONTROLLER FOR POWER-SAVING AND METHOD THEREOF - An embedded controller for power-saving and a method thereof are provided. The embedded controller is used for executing a plurality of tasks and includes a timer module and a control unit. The timer module includes a plurality of timers, and each of timers is corresponding to one of the tasks respectively. The control unit is coupled to the timer module and respectively sets a wake-up period according to each task. When the wake-up period of each timer is expired, each timer respectively generates a wake-up signal to the control unit. The control unit controls the embedded controller to transfer to an active model from an idle model according to the wake-up signals respectively. After executing the tasks corresponding to the wake-up signals respectively, the control unit controls the embedded controller to transfer to the idle model from the active model. | 2014-12-04 |
20140359327 | ELECTRONIC APPARATUS THAT PERFORMS COOLING DURING POWER-OFF, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - A technique for controlling a power supply of an electronic apparatus, which makes it possible to positively cool the inside of the apparatus after turning off a main switch of the apparatus, thereby making it possible to reduce unnecessary power consumption. A battery is rechargeable by an AC power supply. A fan cools the apparatus by being driven by power supply from the AC power supply or the battery. A CPU of a system controller determines a power supply off time of the apparatus according to a state of the apparatus when the main switch is turned off. When the determined power supply off time is reached, the power supply controller switches the power supply from the AC power supply to the battery to continue driving the fan. Further, when the state of the apparatus satisfies predetermined conditions, the power supply controller stops driving of the fan. | 2014-12-04 |
20140359328 | METHOD AND SYSTEM FOR RUN-TIME REALLOCATION OF LEAKAGE CURRENT AND DYNAMIC POWER SUPPLY CURRENT - A method and system for dynamic or run-time reallocation of leakage current and dynamic power supply current of a processor. In one embodiment of the invention, the processor uses the variation in the leakage current of the processor to reduce the maximum current dissipation or power supply current of the processor (ICC | 2014-12-04 |
20140359329 | ADAPTIVE POWER SWITCH CIRCUIT - An adaptive power-switch circuit suitable for an electronic device includes a multi-gate power switch module, a monitoring module and a driving controller circuit. The multi-gate power switch module includes to plurality of power switch units connected in parallel. The power switch units include a gate control terminal respectively. The monitoring module is used to monitor an operating load of the electronic device. The driving control circuit is coupled to the monitoring module to selectively disable the gate controlling terminals to form a plurality of configurations. The driving control circuit selects one of the configurations to operate the multi-gate power switch module according to the operating load. | 2014-12-04 |
20140359330 | REDUCED POWER MODE OF A CACHE UNIT - In an embodiment, a processor includes a plurality of cores and a cache unit reserved for a first core of the plurality of cores. The cache unit may include a first cache slice, a second cache slice, and power logic to switch operation of the cache unit between a first operating mode and a second operating mode. The first operating mode may include use of both the first cache slice and the second cache slice. The second operating mode may include use of the first cache slice and disabling the second cache slice. Other embodiments are described and claimed. | 2014-12-04 |
20140359331 | RACK AND POWER CONTROLLING METHOD THEREOF - The disclosure provides a rack, including nodes and power supplies, and a power controlling method thereof, including the following steps. Power information of each node is collected to calculate a total power consumption value of the nodes. A power supply enabling demand is calculated according to the total power consumption value and a maximum power supply value of the power supply. State information of each of the power supplies is read to obtain a first sequence of the power supplies. According to the power supply enabling demand and the first sequence, two of the power supplies are enabled and set as a master power supply and a secondary power supply, and the rest of the power supplies are disabled. While the master power supply provides a work voltage to the nodes, the secondary power supply does not supply the work voltage to the nodes. | 2014-12-04 |