51st week of 2014 patent applcation highlights part 66 |
Patent application number | Title | Published |
20140372751 | Enabling Reliable Communications Between Computing Instances - Systems and methods for enabling reliable transactions of data communications are provided. A processing device according to one embodiment includes a management interface and a security module. The management interface is configured to initialize a transaction having a plurality of transaction elements. The transaction is a unit of work including a set of one or more logically related data elements or functions for accomplishing a single task. The management interface is further configured to determine at least one expected value for at least one transaction element and to compare at least one actual value with the at least one expected value to obtain a comparison element. The security module is configured to execute security processes based on the comparison element. | 2014-12-18 |
20140372752 | METHOD AND DATABASE SYSTEM FOR SECURE STORAGE AND COMMUNICATION OF INFORMATION - A secure communications system for the secure storage and communication of authenticated user identity and personal information. The system includes a database of anonymised, individually encrypted user records. Access to the records is only permissible using a user key which is stored in a user keychain on a client device. The keychain itself is password protected and cryptographically tied to the client device. | 2014-12-18 |
20140372753 | METHOD AND APPARATUS FOR PERFORMING DISTRIBUTED PRIVACY-PRESERVING COMPUTATIONS ON USER LOCATIONS - A location-trace comparison system can perform privacy-preserving computations on locations traces for two or more users, for example, to determine a location-visit overlap for these users. During operation, the system obtains location-event descriptions for locations that a local user has visited and/or is likely to visit, such that a respective location-event description indicates a location identifier and a time-interval identifier. The system encrypts the location-event descriptions to generate a corresponding set of encrypted local-user events, and receives encrypted remote-user events from a remote device, for at least one remote user. The system compares the encrypted location events to determine an overlap between the set of encrypted local-user events and the set of encrypted remote-user events. The system then determines, from the encrypted-event overlap, location-event descriptions for locations that the local and remote users have both visited and/or are both likely to visit during the same time interval. | 2014-12-18 |
20140372754 | IMAGE BASED KEY DERIVATION FUNCTION - Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data. | 2014-12-18 |
20140372755 | SYSTEM AND METHOD FOR CONTROLLING LIFESPAN OF INTERACTION REQUESTS - An apparatus for controlling lifespan of interaction requests includes a processor and a memory, the memory storing instructions that when executed by the processor cause the processor to detect when an interaction request is being initiated for send from a communications appliance, server, or system, activate an interface on the appliance, server, or system for configuring a time to live (TTL) for the interaction request, cause, via the configuration, the interaction request to expire if not answered within the TTL life span, and cause, via the configuration, the TTL constraint applied to the interaction request to be lifted if the interaction is answered within the TTL life span. | 2014-12-18 |
20140372756 | SECURE DATA PARSER METHOD AND SYSTEM - The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. | 2014-12-18 |
20140372757 | PRIMITIVE FUNCTIONS FOR USE IN REMOTE COMPUTER MANAGEMENT - The invention facilitates remote management of a computer via a network. Remote computer management capability can be expanded beyond that previously available through the addition of one or more new primitive functions that can be performed on a managed computer. | 2014-12-18 |
20140372758 | METHOD AND SYSTEM FOR SECURED COMMUNICATION OF CONTROL INFORMATION IN A WIRELESS NETWORK ENVIRONMENT - A method and system for securely communicating control information in a wireless network environment is provided. When a transmitting station has to transmit control information to a receiving station, the transmitting station determines whether the control information belongs to first type or second type. If the control information is the second type of control information, the transmitting station secures the second type of control information using a counter value, a Cipher based Message Authentication Code (CMAC) value and security keys computed for protecting the second type of control information. Upon securing the control information, the transmitting station transmits the secured control information to a receiving station. | 2014-12-18 |
20140372759 | COPY PROTECTION SCHEME FOR DIGITAL AUDIO AND VIDEO CONTENT AUTHENTICATED HDCP RECEIVERS - A method of delivering digital audio and video content and a HDCP source device are disclosed herein. In one embodiment the method includes: (1) receiving an encryption key from a potential receiver of the digital audio and video content, (2) authenticating the potential receiver is an HDCP compliant device and (3) in addition to the authenticating, verifying the potential receiver is a trusted device for receiving the digital audio and video content. | 2014-12-18 |
20140372760 | METHOD FOR THE ENCRYPTION OF DATA - To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each instance, and sending along a new key in the messages, in each instance, which key, after it has been received completely, becomes the key used, and, once again, another new key is exchanged. This allows dynamic encryption, which allows an interception-proof connection, starting from a secure initial exchange of keys, for example. | 2014-12-18 |
20140372761 | SYSTEM AND METHOD FOR SECURE CLOUD SERVICE DELIVERY WITH PRIORITIZED SERVICES IN A NETWORK ENVIRONMENT - An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities. | 2014-12-18 |
20140372762 | TRUSTED DEVICE - A trusted device, such as a wristwatch | 2014-12-18 |
20140372763 | DYNAMIC MEDIA ZONES SYSTEMS AND METHODS - Systems and methods are described for applying digital rights management techniques to manage zones in electronic content. In one embodiment, zones are defined in a piece of electronic content, and a license is associated with the electronic content that indicates how the zones are to be accessed or otherwise used. A digital rights management engine governs access to or other use of the zoned content in accordance with the license. | 2014-12-18 |
20140372764 | SCHEMA SIGNING - In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the database schema only when the object of the database schema is verified to have a valid digital signature associated with the trusted entity. In another embodiment, an object in a database schema may be verified as having a digital signature associated with at least one trusted entity. An application may be permitted access to the object of the database schema only when the digital signature for the object is verified to be associated with the at least one trusted entity. | 2014-12-18 |
20140372765 | Hashing Prefix-Free Values in a Signature Scheme - Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate. | 2014-12-18 |
20140372766 | AUTOMATED DOCUMENT NOTARIZATION - An automated notarization device includes a scanner, printer, hardware security module and camera. The hardware security module includes a secure processor and secure storage for data records and cryptographic keys, along with a secure real time clock. A person desiring to have a document notarized presents the document to the device, presents identification to the device, and has his/her picture and or video taken. Each of these items is stored in a data record, which is then displayed to the person for approval. Upon approval, the data record is provided to the hardware security module, which adds a timestamp to the data record and then digitally signs the data record. The resulting signed data record ties together the original document, and identification of the person, and a timestamp. Changes to any of these data elements can be detected by verifying the digital signature. | 2014-12-18 |
20140372767 | Pooling entropy to facilitate mobile device-based true random number generation - A mobile device operating system pools any available entropy. The resulting entropy pool is stored in device memory. When storing entropy in memory, preferably memory addresses are randomly allocated to prevent an attacker from capturing entropy that might have already been used to create a random number. The stored entropy pool provides a readily-available entropy source for any entropy required by the operating system or device applications. Then, when a cryptographic application requests a true random number, the operating system checks to determine whether the pool has available entropy and, if so, a portion of the entropy is provided to enable generation (e.g., by a TRNG) of a true random number that, in turn, may then be used for some cryptographic operation. After providing the entropy, the operating system clears the address locations that were used to provide it so that another entity cannot re-use the entropy. | 2014-12-18 |
20140372768 | MULTI-LAYER DATA SECURITY - Data may be encrypted using a public key. From a plurality of functions executable on the data, one or more functions may be selected. The selected one or more functions may be associated with the encrypted data. The selected one or more functions may provide exclusive access to the data. A data structure specifying conditions for access to the one or more functions may be created. An exclusive interface to provide access to the one or more functions may be created. The interface, upon determining that one or more conditions from the conditions are satisfied, may grant access to the one or more functions. The encrypted data, the associated one or more functions, the data structure, and the interface may be included into an object. | 2014-12-18 |
20140372769 | Automatic Protocol Selection in Mixed-Protocol Secure Computation - Secure multi-party computation may be performed utilizing mixed protocols in order to improve performance. In particular, embodiments implementing mixed protocols can reduce run time and thereby lower the cost of performing secure computation. Algorithms for optimizing selection from mixed protocols are disclosed, including an algorithm based on integer programming or an efficient heuristic algorithm for the selection problem. According to certain embodiments a selection engine is configured to receive as inputs, a function description and cost parameter(s). Based upon execution of the integer programming algorithm and the application of heuristics, the selection engine is configured to generate an output comprising a single cryptographic protocol (e.g. garbled circuit or homomorphic encryption). By employing mixed protocol selection according to embodiments, a compiler responsible for implementing secure computations can identify and select the fastest underlying mixed cryptographic protocols. | 2014-12-18 |
20140372770 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. | 2014-12-18 |
20140372771 | Piracy Prevention and Usage Control System Using Access-Controlled Encrypted Data Containers - This is a system for controlling and restricting access (reading, writing, creating, deleting, manipulating, and control) to data and data representations of arbitrary processing engines through the use of secure containers, an access processing engine, and cryptographic keys. | 2014-12-18 |
20140372772 | ON-CHIP INTEGRATED PROCESSING AND POWER GENERATION - A self-powered processing device comprises both a processing device and a power generator that are physically, electrically, and thermally coupled to one another. The power generator can be a fuel cell that can be manufactured from materials that can also support processing circuitry, such as silicon-based materials. A thermal coupling between the power generator and the processing device can include a thermoelectric either generating electrical power from the temperature differential or consuming electrical power to generate a temperature differential. A computing device with self-powered processing devices also includes energy storage devices to store excess energy produced by the self-powered processing device and provide it back during times of need. The self-powered processing device comprises either a wireless or wired network connection, the latter being connectable to a slot on a backplane that can aggregate multiple self-powered processing devices and provide fuel delivery paths for them. | 2014-12-18 |
20140372773 | POWER OVER ETHERNET ON DATA PAIRS AND SPARE PAIRS - Power Sourcing Equipment (PSE) provides a PoE supply voltage over data wires to a Powered Device (PD). A PSE controller controls a first FET that couples the PoE voltage to the data wire pairs and controls a second FET that couples the data wire pairs to the spare wire pairs. Upon powering up, the PSE controller keeps the two FETs open and performs a detection routine on any devices connected to the data pairs and spare pairs. If a PoE-compatible PD is detected as being coupled to the data pairs, the first switch is closed. If it is determined that the PoE voltage should also be coupled to the spare pairs, the second FET is also closed. The method prevents the PoE voltage from being applied to the spare pairs when the device connected to the spare pairs is not PoE compatible and maintains backwards compliance with IEEE PoE PDs. | 2014-12-18 |
20140372774 | Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services. | 2014-12-18 |
20140372775 | Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services. | 2014-12-18 |
20140372776 | METHOD AND APPARATUS FOR SELECTING THE OUTPUT OF PROGRAMMABLE POWER ADAPTER - An apparatus of programming an output of a programmable power adapter according to the present invention comprises a control circuit. The method according to the present invention sends a signal to a device. A resistor is coupled to the signal to determine the level of the signal. The resistor is installed in the device. The method according to the present invention checks the level of the signal in the programmable power adapter and determines an output voltage of the programmable power adapter in accordance with the level of the signal. The output voltage of the programmable power adapter is coupled to the device to provide a power for a load of the device. | 2014-12-18 |
20140372777 | ADAPTIVE LATENCY TOLERANCE FOR POWER MANAGEMENT OF MEMORY BUS INTERFACES - A method includes, in a memory system that includes a host and a storage device connected by a bus interface, assessing in the storage device a power supply state of the memory system. In the storage device a latency tolerance is selected for the bus interface based on the assessed power supply state. The selected latency tolerance is indicated from the storage device to the host, for application to the bus interface. | 2014-12-18 |
20140372778 | SERVER BACKPLANE - A server backplane includes a circuit board, a first connector, a second connector, a power connector, a plurality of hard disk drive interfaces to be coupled to HDDs, a HDD controller interface, and a controller coupled to the plurality of HDD interfaces and the HDD controller interface. The controller can detect the respective statuses of all the HDD according to report signals from the HDD controller interface and status signals from the HDD interfaces. | 2014-12-18 |
20140372779 | CONTROL SYSTEM AND METHOD FOR POWER SHUTDOWN OF ELECTRONIC DEVICE - A control system for power shutdown of an electronic device is provided. The electronic device includes a sound monitor. The sound monitor monitors a decibel level of sound generated by surrounding environment. The control system includes a sound acquiring module, a first determining module, and a control module. The sound acquiring module acquires the decibel level of the sound from the sound monitor. The first determining module determines whether or not the acquired decibel level of the sound is within a predetermined range. The control module controls the electronic device to enter a shutdown state when the acquired decibel level of the sound is within the predetermined range. An electronic device and a method for power shutdown are also provided. | 2014-12-18 |
20140372780 | POWER SUPPLY DEVICE - In a power supply device, the bridge circuit is configured by connecting, in parallel, a plurality of series circuits of an inverse-parallel connection circuit of a semiconductor switch and a diode. A control unit controls switching of a semiconductor switch so that a voltage v between AC terminals becomes zero voltage in equal periods α before and after a center point shifted from one zero crossing point in one cycle of the input current by a compensation period (angle) β calculated from a voltage applied to a resonance circuit constituted by the power receiving coil and a resonance capacitor C | 2014-12-18 |
20140372781 | ENERGY-EFFICIENT MEDIA EQUIPMENT DEVICE - Method and systems for operating a media equipment device having at least a full-power mode and an off-power mode are provided. A voltage supply to the media equipment device may be controlled by the media equipment device itself or by an external power management unit to automatically power-off the media equipment device, and power the device back on a future time. Prior to powering off the media equipment device, a portion of program schedule information stored in the volatile memory of the media equipment device may be mirrored to nonvolatile memory and may be restored on a priority basis after the media equipment device is powered back up. An external power management unit for controlling the media equipment device may also automatically detect and identify devices in the home based on a power signature of the device and manage the operation of the device based on the identification. | 2014-12-18 |
20140372782 | COMBINED DYNAMIC AND STATIC POWER AND PERFORMANCE OPTIMIZATION ON DATA CENTERS - Various datacenter or other computing center control apparatus and methods are disclosed. In one aspect, a method of computing is provided that includes defining plural processor performance bins where each processor performance bin has a processor performance state. At least one processor is assigned to each of the plural processor performance bins. Processor performance metrics of at least one of the processors are monitored while the at least one of the processors executes an incoming task. Processor power is modeled based on the monitored performance metrics. Future incoming tasks are assigned to one of the processor performance bins based on the modeled processor power. | 2014-12-18 |
20140372783 | SYSTEM AND METHOD FOR PROVIDING DYNAMIC CHARGE CURRENT BASED ON MAXIMUM CARD POWER - Aspects of the disclosure pertain to a system and method for providing dynamic charge current based on maximum expansion card power. Dynamic monitoring of overall power usage by an expansion card is performed. Based on the dynamic monitoring, power consumption of a charging circuit of the card is dynamically adjusted for maintaining the overall power consumption of the expansion card at or below a pre-determined power limit (e.g., at or below an expansion slot power limit). Further, based on the dynamic monitoring, an amount of charging current provided by a current limiting device of the charging circuit to an energy storage device of the charging circuit is dynamically adjusted. | 2014-12-18 |
20140372784 | ENERGY-EFFICIENT PIPELINE CIRCUIT TEMPLATES FOR HIGH-PERFORMANCE ASYNCHRONOUS CIRCUITS - Asynchronous circuits and techniques are described for asynchronous processing without synchronization to a common clock. Two specific energy-efficient pipeline templates for high throughput asynchronous circuits are provided as examples based on single-track handshake protocol. Each pipeline contains multiple stages of logic. The handshake overhead is minimized by eliminating validity and neutrality detection logic gates for all input tokens as well as for all intermediate logic nodes. Both of these templates can pack significant amount of logic within each pipeline block, while still maintaining a fast cycle time. | 2014-12-18 |
20140372785 | HIGH-SPEED I/O DATA SYSTEM - In embodiments of a high-speed I/O data system, a first computer chip includes a data transmission system, and a second computer chip includes a data reception system. A data channel communicates an NRZ data signal, and a clock channel communicates a forwarded clock signal, from the data transmission system to the data reception system. The data transmission system includes a first differential serializing transmitter to generate the NRZ data signal from pulsed data, and further includes a second differential serializing transmitter to generate a forwarded clock signal. A first multi-phase transmit clock generator generates transmit clock signals for the first and second differential serializing transmitters. The data reception system includes a data receiver and a de-serializer to receive and de-serialize the NRZ data signal, and includes a multi-phase receive clock generator to generate receive clock signals from the forwarded clock signal for the de-serializing data receiver. | 2014-12-18 |
20140372786 | Virtual Per-Processor Timers for Multiprocessor Systems - A system provides virtual per-processor timers based on a timer such as a platform timer. To virtualize a timer to be used by each processor independently, a data structure is maintained in memory for the timer. The data structure has an entry for each interrupt to be produced for each processor using the timer, specifying the processor and the due time, with the entries sorted by due time. If the virtualized timer is a platform timer that maintains context during power transitions, a processor can switch to the virtual per-processor timer upon a context-losing power transition. | 2014-12-18 |
20140372787 | METHODS FOR DYNAMICALLY ADAPTIVE BIT-LEVELING BY SWEEP SAMPLING WITH AUTOMATIC JITTER AVOIDANCE - A circuit and method for implementing a adaptive bit-leveling function in an integrated circuit interface is disclosed. During a calibration operation, a pre-loaded data bit pattern is continuously sent from a sending device and is continuously read from an external bus by a receiving device. A programmable delay line both advances and delays each individual data bit relative to a sampling point in time, and delay counts relative to a reference point in time are recorded for different sampled data bit values, enabling a delay to be determined that best samples a data bit at its midpoint. During the advancing and delaying of a data bit, jitter on the data bit signal may cause an ambiguity in the determination of the midpoint, and solutions are disclosed for detecting jitter and for resolving a midpoint for sampling a data bit even in the presence of the jitter. | 2014-12-18 |
20140372788 | HYPERVISOR REMEDIAL ACTION FOR A VIRTUAL MACHINE IN RESPONSE TO AN ERROR MESSAGE FROM THE VIRTUAL MACHINE - Exemplary methods, apparatuses, and systems include a hypervisor receiving an error message from an agent within a first virtual machine run by the hypervisor. In response to the error message, the hypervisor determines and initiates a corrective action for the hypervisor to take in response to the error message. An exemplary corrective action includes initiating a reset of the first virtual machine or a reset of a second virtual machine. | 2014-12-18 |
20140372789 | IMPLEMENTING ENHANCED ERROR HANDLING OF A SHARED ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing enhanced error handling for a hardware I/O adapter, such as a Single Root Input/Output Virtualization (SRIOV) adapter, in a virtualized system. The hardware I/O adapter is partitioned into multiple endpoints, with each Partitionable Endpoint (PE) corresponding to a function, and there is an adapter PE associated with the entire adapter. The endpoints are managed both independently for actions limited in scope to a single function, and as a group for actions with the scope of the adapter. An error or failure of the adapter PE freezes the adapter PE and propagates to the VF PEs associated with the adapter, causing the VF PEs to be frozen. An adapter driver and VF device drivers are informed of the error, and start recovery. The hypervisor locks out the VF device drivers at key points enabling adapter recovery to successfully complete. | 2014-12-18 |
20140372790 | SYSTEM AND METHOD FOR ASSIGNING MEMORY AVAILABLE FOR HIGH AVAILABILITY FAILOVER TO VIRTUAL MACHINES - Techniques for assigning memory available for high availability (HA) failover to virtual machines in a high availability (HA) cluster are described. In one embodiment, the memory available for HA failover is determined in at least one failover host computing system of the HA cluster. Further, the memory available for HA failover is assigned to one or more virtual machines in the HA cluster as input/output (I/O) cache memory. | 2014-12-18 |
20140372791 | INTERFACE CONTROL CIRCUIT, MEMORY SYSTEM, AND METHOD OF CONTROLLING AN INTERFACE CONTROL CIRCUIT - Disclosed is an interface control circuit including an error detection unit, an error correction unit, and an adjustment control unit. The error detection unit is configured to detect whether an error occurs in error correction coded data transmitted via an interface. The error correction unit is configured to execute error correction processing of correcting the error when the error occurs. The adjustment control unit is configured to start adjustment processing of adjusting a transmission characteristic of the interface when the error occurs. | 2014-12-18 |
20140372792 | METHOD FOR HEALING RESET ERRORS IN A MAGNETIC MEMORY - A method is provided for healing reset errors for a magnetic memory using destructive read with selective write-back, including for example, a self-referenced read of spin-torque bits in an MRAM. Memory cells are prepared for write back by one of identifying memory cells determined in error using an error correcting code and inverting the inversion bit for those memory cells determined in error; identifying memory cells determined in error using an error correcting code and resetting a portion of the memory cells to the first state; and resetting one or more memory cells to the first state. | 2014-12-18 |
20140372793 | Systems And Methods For Medium Error Reporting And Handling In Storage Devices - Systems and methods are provided that may be used to identify and report multiple information units (e.g., logical blocks) having medium errors within a given composite information structure (e.g., physical block) of a storage device (e.g., such as a hard drive) whenever any single information unit having an error within the same composite information structure is accessed. | 2014-12-18 |
20140372794 | IMPLEMENTING CONCURRENT DEVICE DRIVER MAINTENANCE AND RECOVERY FOR AN SRIOV ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing concurrent adapter driver maintenance and recovery for a Single Root Input/Output Virtualization (SRIOV) adapter in a computer system. An adapter driver at start up time performs configuration of the adapter and each of a set of virtual functions (VFs). The adapter driver writes critical adapter and VF configuration data to a scratchpad buffer. When device driver maintenance is needed, such as to load updated adapter driver firmware, all VF drivers are held off temporarily, current adapter driver is detached, and then the adapter driver is reloaded with the updated driver firmware. Then the adapter driver is restarted with the updated adapter driver firmware, and performs a reinitialization process. The adapter driver performs adapter and VF configuration restoring existing configuration using values read from the scratchpad buffer. | 2014-12-18 |
20140372795 | IMPLEMENTING DISTRIBUTED DEBUG DATA COLLECTION AND ANALYSIS FOR A SHARED ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing distributed debug data collection and analysis for a hardware I/O adapter, such as, a Single Root Input/Output Virtualization (SRIOV) adapter in a virtualized system. A predetermined event triggers a base error collection sequence. Adapter driver data is collected and virtual function (VF) device drivers are locked out responsive to triggering the base error collection sequence. Adapter debug data is collected and the adapter is reinitialized including an indication to VF drivers if VF error data is to be collected. The virtual function (VF) device drivers are unlocked allowing the VF device drivers to commence recovery of a respective virtual function (VF). | 2014-12-18 |
20140372796 | CHECKPOINTING A COMPUTER HARDWARE ARCHITECTURE STATE USING A STACK OR QUEUE - Various embodiments relating to saving and recovering a hardware architecture state are provided. In one embodiment, during a first mode of operation, entries in a first portion of a random-access memory (RAM) are manipulated. A current version of less than all of the entries of the first portion is saved to a checkpointed version in response to a checkpoint event that triggers operation in a second mode of operation. During the second mode of operation, entries in a second portion of the RAM are manipulated. The checkpointed version of less than all of the entries of the first portion is recovered as the current version in response to a restore event that triggers resumption of operation in the first mode. | 2014-12-18 |
20140372797 | PULSED-LATCH BASED RAZOR WITH 1-CYCLE ERROR RECOVERY SCHEME - Systems and methods for error recovery include determining an error in at least one stage of a plurality of stages during a first cycle on a hardware circuit, each of the plurality of stages having a main latch and a shadow latch. A first signal is transmitted to an output stage of the at least one stage to stall the main latch and the shadow latch of the output stage during a second cycle. A second signal is transmitted to an input stage of the at least one stage to stall the main latch of the input stage during the second cycle and to stall the main latch and the shadow latch of the input stage during a third cycle. Data is restored from the shadow latch to the main latch for the at least one stage and the input stage to recover from the error. | 2014-12-18 |
20140372798 | SECURITY SURVEILLANCE APPARATUS WITH NETWORKING AND VIDEO RECORDING FUNCTIONS AND FAILURE DETECTING AND REPAIRING METHOD FOR STORAGE DEVICE THEREOF - A security surveillance apparatus with a networking function and a video recording function and a failure detecting and repairing method for a storage device are provided. The failure detecting and repairing method includes the following steps. First, the storage device is powered and detected. Then, whether a file system of the storage device is abnormal is determined. When the file system is abnormal, the file system is repaired by a file system repairing procedure. Next, whether a multimedia file is abnormal is determined. When the multimedia file is abnormal, the multimedia file is repaired by a file repairing procedure. Finally, the storage device is mounted on the security surveillance apparatus. | 2014-12-18 |
20140372799 | System Differential Upgrade Method, Apparatus, and Mobile Terminal - A system differential upgrade method and apparatus, and a mobile terminal are provided. The method includes: obtaining an upgrade script and upgrade data; upgrading a file to be upgraded according to the upgrade script and the upgrade data; generating, according to the file processing command that is being executed currently in the upgrade script, and the file to be upgraded corresponding to the file processing command that is being executed currently, rollback data and a rollback script corresponding to the file to be upgraded; and when the upgrade fails, executing the rollback script according to the rollback data. The apparatus includes an obtaining module, an upgrading module, a generating module, and an executing module. According to the embodiments of the present invention, when an upgrade fails, the rollback script is executed according to the rollback data, which may restore a system to that before the upgrade. | 2014-12-18 |
20140372800 | Message Reconciliation During Disaster Recovery - A mechanism is provided for message reconciliation during disaster recovery in an asynchronous replication system. A message is intercepted at a gateway remote from a primary data centre to which the message is being sent. A copy of the message request is stored in a request message history remotely from the primary data centre. The message is forwarded to the primary data centre. A transaction history of the message request is stored at the primary data centre which is mirrored to a disaster recovery site with other data from the primary data centre. In response to determining that the primary data centre has failed, messages in the request message history are compared with messages in the transaction history as retrieved from the disaster recovery site. | 2014-12-18 |
20140372801 | IMPLEMENTING SHARED ADAPTER CONFIGURATION UPDATES CONCURRENT WITH MAINTENANCE ACTIONS IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing shared adapter configuration updates concurrent with maintenance actions for a Single Root Input/Output Virtualization (SRIOV) adapter in a computer system. A configuration of the adapter is decoupled from the state of the adapter during a recovery period. When a configuration request is received, the configuration request is validated. Responsive to a valid configuration request, the saved configuration state of the adapter is updated. Once the adapter completes recovery, the adapter is restored to the new configuration instead of the configuration prior to failure. | 2014-12-18 |
20140372802 | FAILURE DETECTION IN HIGH-PERFORMANCE CLUSTERS AND COMPUTERS USING CHAOTIC MAP COMPUTATIONS - A programmable media includes a processing unit capable of independent operation in a machine that is capable of executing 10 | 2014-12-18 |
20140372803 | APPARATUS AND METHOD FOR ANALYZING ABNORMAL STATES OF COMPONENT-BASED SYSTEM - The present invention relates to an apparatus and method that analyze the problems of abnormal states in a component-based system in which embedded systems including an autonomous control function are operated. In the method, an apparatus for analyzing abnormal states of a component-based system models, interaction between components, and creates an interaction model. An incoming/outgoing message table corresponding to the interaction model is generated. A state table to be used to identify state changes between the components and an analysis table to be used to analyze other components associated with one component are generated based on the incoming/outgoing message table. A knowledge template of a target system is generated based on the state table and analysis table. Each component is monitored by applying constraint conditions of the component to the knowledge template of the target system, and states of the component are detected based on results of monitoring. | 2014-12-18 |
20140372804 | SYSTEM AND METHOD FOR REMOTE MAINTENANCE OF USER UNITS - A system and method for remote maintenance of user units allows efficient diagnosis of failures in a reduced time. Each user unit transmits to a management server, via a network, state data related to hardware and software parameters associated to an operating mode of the user unit. The method includes: storing state data in a user unit memory, monitoring state data stored in the memory, and detecting at least one datum of a state indicating an operational failure of the user unit. When a failure is detected, state data corresponding to current states of the user unit at the moment of the failure and state data corresponding to states stored during a predetermined period before the failure are extracted and transmitted to the management server which determines a statistic correlation coefficient between the values of each state of a user unit and the values of states of other user units. | 2014-12-18 |
20140372805 | SELF-HEALING MANAGED CUSTOMER PREMISES EQUIPMENT - A system comprising at least one controller including a controller processor with a memory configured to execute self-healing rules. The self-healing rules may include at least one corrective measure and at least one failure symptom. The system may include an automated incident management device including a central processor with a memory to receive service management information from the at least one controller, correlate at least one corrective measure with at least one failure symptom, adjust the self-healing rules based on the correlation, and propagate the adjusted self-healing rules to the at least one controller. | 2014-12-18 |
20140372806 | VIRTUAL MACHINE SYSTEM AND INFORMATION STORING PROCESSING METHOD - A virtual machine system includes a first storage unit, a second storage unit, and a processor. The first storage unit includes a storage area allocated for a first virtual machine to operate. The second storage unit stores information stored in the first storage unit. The processor executes a process including detecting a failure of a first virtual machine, generating a second virtual machine when a failure of the first virtual machine is detected and making the second virtual machine perform storing information stored in the first storage unit into the second storage unit, and deleting the second virtual machine when the storing by the second virtual machine is completed. | 2014-12-18 |
20140372807 | Memory Leak Detection Using Transient Workload Detection And Clustering - Methods and apparatus for memory leak detection using clustering and trend detection are disclosed. Performance metrics are collected from an executing process. A first statistical analysis of at least one metric is used to identify trending and non-trending workload periods for the process. A second statistical analysis on the metrics for the non-trending workload periods is used to determine clusters of metrics corresponding to stable workload levels. A third statistical analysis is performed on each of the clusters to determine whether an upward trend in memory usage occurred. If an upward trend in memory usage is detected, a notification of a potential memory leak is generated. | 2014-12-18 |
20140372808 | Second Failure Data Capture in Co-Operating Multi-Image Systems - A method captures diagnostic trace information in a computer system having a plurality of software images. Information is received that is associated with a first failure in a first one of the plurality of software images. The received information is distributed to others of the plurality of software images. Further information is captured that is associated with a second failure in another one of the plurality of software images. The information associated with a first failure in a first one of said plurality of software images is combined with the information associated with a second failure in another of said plurality of software images, and the combined information is analyzed in order to determine a cause of the first failure. | 2014-12-18 |
20140372809 | GRAPHIC SELF-DIAGNOSTIC SYSTEM AND METHOD - A graphic self-diagnostic system comprises an input device for inputting a self-diagnostic request and rendering a request of a user; a graphic self-diagnostic device, comprising a failure database module, a failure scan module and a rendering module, for diagnosing one or more parts of the equipment being diagnosed and for generating the graphic diagnostic result; and an output device for outputting the graphic diagnostic result. | 2014-12-18 |
20140372810 | APPARATUS AND METHOD FOR MONITORING PERFORMANCE OF CORES BASED ON MULTI-CORE PROCESSOR - An apparatus and method for monitoring the performance of cores based on a multi-core processor. The apparatus includes a status information collection unit and a monitoring unit. The status information collection unit collects a plurality of pieces of status information extracted from respective cores, and stores the plurality of pieces of status information in respective memory areas provided for the cores. The monitoring unit receives the status information, sends the status information to a storage unit, and performs monitoring based on the status information. The monitoring unit is provided in any one of the cores. | 2014-12-18 |
20140372811 | SERVER-BASED NOTIFICATION OF ALARM EVENT SUBSEQUENT TO COMMUNICATION FAILURE WITH ARMED SECURITY SYSTEM - A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is armed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay. | 2014-12-18 |
20140372812 | SYSTEM AND METHOD FOR QUANTUM KEY DISTRIBUTION - A method and system for quantum key distribution (QKD) between a first location and a second location through an intermediate location. The system and method include executing a quantum phase between each of the first and second locations and the intermediate location to determine a first location raw data string at the first location, a first-intermediate raw data string at the intermediate location, a second location raw data string at the second location, and a second-intermediate raw data string at the intermediate location, respectively; calculating, at the intermediate location, announcement data based on a function of the first and second-intermediate raw data strings; announcing, at the intermediary location, the announcement data over a classical channel; and deriving, at each of the first and second locations, a secret key based on the available data and on communications between the first and second locations via a classical channel. | 2014-12-18 |
20140372813 | METHOD FOR VERIFYING BAD PATTERN IN TIME SERIES SENSING DATA AND APPARATUS THEREOF - A method for verifying bad pattern in time series sensing data by calculating a bad pattern error rate, which can be applied to the time series sensing data measured and produced from a predetermined sensor provided in predetermined equipment, and an apparatus thereof are provided. The method includes receiving information on the bad pattern applied to time series sensing data measured by a suspicious sensor, accessing the time series sensing data of each product, generated by the suspicious sensor during a verification period, calculating similarity measures between the bad pattern based on the bad pattern information and the time series sensing data for each product, and calculating an error rate of the bad pattern based on the similarity measures. | 2014-12-18 |
20140372814 | METHOD FOR TESTING A MEMORY AND MEMORY SYSTEM - A method for testing a memory includes performing an error correction code check (ECC check) on user data stored in the memory, inverting the user data stored in the memory, performing a further ECC check on the inverted user data stored in the memory, and inverting the inverted user data stored in the memory for restoring the user data in the memory. | 2014-12-18 |
20140372815 | APPARATUS AND METHOD TO REDUCE POWER DELIVERY NOISE FOR PARTIAL WRITES - Apparatus, systems, and methods to reduce power delivery noise for partial writes are described. In one embodiment, an apparatus comprises a processor and a memory control logic to insert one or more dummy unit intervals into data in a write operation when a number of state transitions between adjacent unit intervals exceeds a threshold. Other embodiments are also disclosed and claimed. | 2014-12-18 |
20140372816 | ACCESSING DATA STORED IN A COMMAND/ADDRESS REGISTER DEVICE - A register not connected to a data bus is read by transferring data across an address bus to a device connected to the data bus, from which the data is read by a device connected to the data bus. The register resides in a register device connected via the address bus to a memory device that is connected to both the address bus and the data bus. A host processor triggers the register device to transfer information over the address bus to a register on the memory device. The host processor then reads the information from the register of the memory device. | 2014-12-18 |
20140372817 | AUTOMATED CIRCUIT TRIPLICATION METHOD AND SYSTEM - In one general aspect, a non-transitory computer-readable storage medium can be configured to store instructions that when executed cause a processor to perform a process. The process can include defining a plurality of subsets from a representation of a circuit, and rank-ordering each subset from the plurality of subsets. The process can also include selecting at least one of the subsets for triplication based on the rank-ordering and a triplication condition. | 2014-12-18 |
20140372818 | Test-Per-Clock Based On Dynamically-Partitioned Reconfigurable Scan Chains - Aspects of the invention relate to a test-per-clock scheme based on dynamically-partitioned reconfigurable scan chains. Every clock cycle, scan chains configured by a control signal to operate in a shifting-launching mode shift in test stimuli one bit and immediately applies the newly formed test pattern to the circuit-under-test; and scan chains configured by the control signal to operate in a capturing-compacting-shifting mode shift out one bit of previously compacted test response data while compacting remaining bits of the previously compacted test response data with a currently-captured test response to form currently compacted test response data. A large number of scan chains may be configured by the control signal to work in a mission mode. After a predetermined number of clock cycles, a different control signal may be applied to reconfigure and partition the scan chains for applying different test stimuli. | 2014-12-18 |
20140372819 | Scan Chain Configuration For Test-Per-Clock Based On Circuit Topology - Aspects of the invention relate to generating scan chain configurations for test-per-clock based on circuit topology. With various implementations of the invention, weight vectors between scan chains in a circuit are first determined. Based on the weight vectors, a scan chain configuration is generated by assigning some scan chains in the scan chains to a stimuli group and some other scan chains in the scan chains to a compacting group. Here, the stimuli group comprises scan chains to operate in a shifting-launching mode, and the compacting group comprises scan chains to operate in a capturing-compacting-shifting mode. | 2014-12-18 |
20140372820 | Fault-Driven Scan Chain Configuration For Test-Per-Clock - Aspects of the invention relate to using fault-driven techniques to generate scan chain configurations for test-per-clock. A plurality of test cubes that detect a plurality of faults are first generated. Scan chains for loading specified bits of the test cubes are then assigned to a stimuli group. From the plurality of test cubes, a test cube that detects a large number of faults that do not propagate exclusively to scan chains in the stimuli group is selected. One or more scan chains that are not in the stimuli group and are needed for observing the large number of faults are assigned to a compacting group. The number of scan chains either in the compacting group or in both of the compacting group and the stimuli group may be limited to a predetermined number. | 2014-12-18 |
20140372821 | Scan Chain Stitching For Test-Per-Clock - Various aspects of the present invention relate to scan chain stitching techniques for test-per-clock. With various implementations of the invention, a plurality of scan cell partitions are generated based on combinational paths between scan cells. Scan cells may be assigned to one or more pairs of scan cell partitions based on combinational paths between the scan cells. Each pair of the scan cell partitions comprises one stimuli partition and one compacting partition. Using the plurality of scan cell partitions generated, scan chains are formed based on at least information of combinational paths between scan cell partitions in the plurality of scan cell partitions. The formed scan chains are to be dynamically divided into three groups during a test, which are configured to operate in a shifting-launching mode, a capturing-compacting-shifting mode and a mission mode, respectively. | 2014-12-18 |
20140372822 | Scheme for Masking Output of Scan Chains in Test Circuit - A method for masking scan chains in a test circuit of an integrated circuit is disclosed. A test pattern to be fed into the test circuit of the integrated circuit is generated. The generated test pattern can be used for detecting a primary fault, one or more secondary faults, and one or more tertiary faults. A mask to mask the output of the scan chains of the test circuit is generated. If a condition is not met, a mask that increases the total number of detectable faults is generated. If the condition is met, a mask that protects the primary fault of the test pattern is generated. | 2014-12-18 |
20140372823 | MANAGING IR DROP - An apparatus has a large block of synchronous logic arranged to include a first partition and a second partition. The first partition is configured to receive a first clock signal during a functional mode and during a test mode. The second partition is configured to receive the first clock signal during the functional mode, and the second partition configured to receive a second clock signal during a test mode. The second clock signal has the same frequency as the first clock signal. The second clock signal has a different phase from the first clock signal. | 2014-12-18 |
20140372824 | Test Generation For Test-Per-Clock - Aspects of the invention relate to test generation techniques for test-per-clock. Test cubes may be generated by adding constraints to a conventional automatic test pattern generator. During a test cube merging process, a first test cube is merged with one or more test cubes that are compatible with the first test cube to generate a second test cube. The second test cube is shifted by one bit along a direction of scan chain shifting to generate a third test cube. The third test cube is then merged with one or more test cubes in the test cubes that are compatible with the third test cube to generate a fourth test cube. The shifting and merging operations may be repeated for a predetermined number of times. | 2014-12-18 |
20140372825 | METHOD AND APPARATUS FOR ENCODING AND DECODING OF LOW DENSITY PARITY CHECK CODES - An encoding apparatus is provided. The encoding includes a low density parity check (LDPC) encoder which performs LDPC encoding on input bits based on a parity-check matrix to generate an LDPC codeword formed of 64,800 bits, in which the parity-check matrix includes an information word sub-matrix and a parity sub-matrix, the information word sub-matrix is formed of a group of a plurality of column blocks each including 360 columns, and the parity-check matrix and the information word sub-matrix are defined by various tables which represent positions of value one (1) present in every 360-th column. | 2014-12-18 |
20140372826 | APPARATUSES AND METHODS FOR ENCODING AND DECODING OF PARITY CHECK CODES - An encoding apparatus is provided. The encoding apparatus includes: a low density parity check (LDPC) encoder configured to generate an LDPC codeword formed of 16200 bits by performing LDPC encoding based on a parity check matrix, wherein the parity check matrix includes an information word sub-matrix and a parity sub-matrix, the information word sub-matrix being formed of a plurality of column groups each including 360 columns and being defined as a table indicating a position of one (1) present in each 360-th column. | 2014-12-18 |
20140372827 | PULSED-LATCH BASED RAZOR WITH 1-CYCLE ERROR RECOVERY SCHEME - Systems and methods for error recovery include determining an error in at least one stage of a plurality of stages during a first cycle on a hardware circuit, each of the plurality of stages having a main latch and a shadow latch. A first signal is transmitted to an output stage of the at least one stage to stall the main latch and the shadow latch of the output stage during a second cycle. A second signal is transmitted to an input stage of the at least one stage to stall the main latch of the input stage during the second cycle and to stall the main latch and the shadow latch of the input stage during a third cycle. Data is restored from the shadow latch to the main latch for the at least one stage and the input stage to recover from the error. | 2014-12-18 |
20140372828 | Systems and Methods for Hybrid Layer Data Decoding - The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for performing data decoding. | 2014-12-18 |
20140372829 | RISK PROTECTION STORAGE DEVICE AND RISK PROTECTION METHOD THEREOF - A storage device in accordance with the inventive concepts includes at least one nonvolatile memory device and a memory controller controlling the nonvolatile memory device. The memory controller includes at least one processor configured to control an operation of the storage device, and configured to perform at least one of a trim operation according a trim command and a garbage collection operation and a risk protection controller configured to perform a risk protection operation that disables at least one of the garbage collection operation or the trim operation according to a risk protection signal internally generated or a risk protection command input from the external device. | 2014-12-18 |
20140372830 | APPARATUSES AND METHODS FOR ERROR CORRECTION - This disclosure relates to error correction circuitry. In one aspect, an error correction circuit can serially receive a digit stream and parse the digit stream into substrings of a predetermined length of digits. Each of the substrings can include data digits and parity digits in certain embodiments. As the substring is received, parity can be tracked in defined regions of the substring. When the entire sub string has been received, an error in one of the data digits of the sub string can be corrected based on an indication of parity in at least one defined region in some embodiments. Then corrected data, which can include the corrected data digit and the other data digits of the substring, can be stored. According to certain embodiments, the error correction circuit can be implemented by asynchronous circuitry. | 2014-12-18 |
20140372831 | MEMORY CONTROLLER OPERATING METHOD FOR READ OPERATIONS IN SYSTEM HAVING NONVOLATILE MEMORY DEVICE - A memory controller operating method includes executing a read operation directed to read data including a correctable data unit and an uncorrectable data unit, the uncorrectable data unit containing data that is uncorrectable using a normal error correction operation. The method further including; performing the normal error correction operation on the correctable data unit to generate partial read data, communicating dummy data instead of the uncorrectable data unit along with the partial read data from the memory controller to a host, and performing an enhanced error correction operation on the uncorrectable data unit while at least in part the dummy data and partial data are being communicated from the memory controller to the host. | 2014-12-18 |
20140372832 | ONLINE DATA CONSISTENCY CHECKING IN A NETWORK STORAGE SYSTEM WITH OPTIONAL COMMITTAL OF REMEDIAL CHANGES - A network storage server includes a tool for detecting and fixing errors while the network storage server remains online (available for servicing client requests), which includes enabling a user to approve or disapprove remedial changes before the changes are committed. The technique bypasses the usual consistency point process for new or modified data blocks representing potential remedial changes. At a consistency point, dirty data blocks representing the potential remedial changes are written to a change log file residing outside the volume. The modified data blocks are written in sequential order to logical blocks of the change log file. In response to a user input indicating that a potential change should be committed, the corresponding modified data blocks are read from the change log file in the order in which they were written to the change log file, and they are written to persistent storage in that order. | 2014-12-18 |
20140372833 | DATA PROTECTING METHOD, MEMORY CONTROLLER AND MEMORY STORAGE DEVICE - A data protecting method, a memory controller, and a memory storage device are provided. The data protecting method includes following steps. A first flush command and a first write command instructing to write a first data are received from a host system. A first error correcting code and a corresponding second error correcting code having different protection capabilities are generated according to the first data. A second write command instructing to write a second data is received. After the first write command is received, a second flush command is received from the host system, and the second error correcting code corresponding to the first data is then written into a rewritable non-volatile memory module. A second error correcting code corresponding to the second data is not generated or is generated but not written into the rewritable non-volatile memory module. Thereby, data from the host system is protected. | 2014-12-18 |
20140372834 | Serial Interface Packet Information Detection and Control Method and Receiver Thereof - A serial interface packet information detection and control method for a Mobile Industry Processor Interface is disclosed. The serial interface packet information detection and control method includes receiving and decoding a packet; generating a control signal according to packet information of a header of the packet; and disabling a function register according to the control signal. | 2014-12-18 |
20140372835 | COMPUTING SYSTEM WITH DECODING ADJUSTMENT MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: an inter-device interface configured to receive a receiver signal for representing a serving signal; a communication unit, coupled to the inter-device interface, configured to: calculate a decoding result based on decoding the receiver signal, generate a parity portion adjustment for adjusting the decoding result, generate a systematic portion adjustment for adjusting the decoding result, and apply the parity portion adjustment and the systematic portion adjustment to the decoding result for determining the serving signal from the receiver signal. | 2014-12-18 |
20140372836 | Systems and Methods for Data Processing Control - The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for performing data encoding. | 2014-12-18 |
20140372837 | SEMICONDUCTOR INTEGRATED CIRCUIT AND METHOD OF PROCESSING IN SEMICONDUCTOR INTEGRATED CIRCUIT - A semiconductor integrated circuit includes: a first-combinational-circuit to output a state-value depending on an input signal and a parity-value of the state-value which are stored by a first-flip-flop-circuit; a first-parity-check-circuit to perform a parity check based on the state-value and the parity-value and output a first-parity-error; a second-flip-flop-circuit to store the state-value and the parity-value output by the first-combinational-circuit; a second-parity-check-circuit to perform a parity check based on the state-value and the parity-value stored in the second-flip-flop-circuit and output a second-parity-error; and a selector to, when the first-parity-error is not output but the second-parity-error is output, output the state-value stored in the first-flip-flop-circuit to the first-combinational-circuit, and when the first-parity-error is output but the second-parity-error is not output, output the state-value stored in the second-flip-flop-circuit to the first-combinational-circuit, wherein the first-combinational-circuit outputs a current state-value depending on the state-value output by the selector and the input signal. | 2014-12-18 |
20140372838 | Bad disk block self-detection method and apparatus, and computer storage medium - It is described a bad disk block self-detection method, including: each mounted chunk is partitioned into n sub-chunks, all sub-chunks having a same size, where n is an integer not less than 2; checking information is set at a fixed location of each sub-chunk, data is stored onto locations of each sub-chunk other than the fixed location, where the checking information is parity checking information for the data; and when the data is read or written, data verification is performed based on the checking information set at the fixed location of the read sub-chunk. It is also described a bad disk block self-detection apparatus and a computer storage medium. With the described above, the bad block on the disk can be detected rapidly, and it is able to instruct data migration and disk replacement. | 2014-12-18 |
20140372839 | SEMICONDUCTOR DEVICE, SEMICONDUCTOR SYSTEM AND CONTROL METHOD OF SEMICONDUCTOR DEVICE - A semiconductor device includes a mode register set suitable for generating a first internal control signal and a second internal control signal, a per-DRAM addressability (PDA) driving unit suitable for resetting the mode register set in response to the first internal control signal and an input value of data inputted through a data pad, and a cycle redundancy check (CRC) driving unit suitable for performing a CRC operation by checking whether or not data are correctly inputted through the data pad without an error in response to the first internal control signal and the second internal control signal. | 2014-12-18 |
20140372840 | Method and System for Detecting Errors in the Transfer of Data from a Transmitter to At Least One Receiver - A method for detecting errors in a transfer of data from a transmitter to at least one receiver includes coding the data together with address information identifying the receiver in a series of data packets and transferring the data and the address information using the data packets. The method also includes generating, at the transmitter, a check value for each data packet and transferring the check value with/in the data packet to the receiver. The method further includes comparing, at the receiver, the check value with an expectation value, wherein an error is detected in the event of a deviation. For each data packet to be transmitted, the method includes calculating a number sequence value from the address information using a first calculation rule, generating the check value from the sequence value using a second calculation rule and transmitting the data packet with the check value to the receiver. | 2014-12-18 |
20140372841 | SYSTEM AND METHOD FOR PRESENTING A SERIES OF VIDEOS IN RESPONSE TO A SELECTION OF A PICTURE - Methods and apparatuses for displaying a sequence including an image and a video in a web browser are provided. More particularly, systems and methods to present a series of videos in response to a selection of a picture made by a user are provided. A user may select view a first image and select a thumbnail of a second image. One or more videos corresponding to a path existing between a node associated with the first image and a node associated with the second image may then be presented to the user. Following the last video, the second image may then be displayed to the user. | 2014-12-18 |
20140372842 | Hierarchical Probabilistic Document Model Based Document Composition - A probabilistic content layout model generates pages. Each of a number of compositions flows over multiple of the pages, and one or more of the pages each has multiple breakpoints. Each breakpoint is defined in relation to a given composition, such that the breakpoint breaks the given composition on the page that includes the breakpoint and such that the given composition continues on, a subsequent page. | 2014-12-18 |
20140372843 | FAST BULK Z-ORDER FOR GRAPHIC ELEMENTS - A plurality of graphical elements may be represented as a document object model (DOM) having a plurality of nodes, each node representing a different graphical element, the DOM having an ordering of the nodes, each node having a z-value of front or back, indicating that the corresponding graphical element is to be displayed in a front layer for a z-value of front or a back layer for a z-value of back. The z-value of one or more of the plurality of nodes corresponding to one or more graphical elements to be moved to the front layer or back layer may be altered. The DOM can then be reordered so that the one or more graphical elements to be moved to the front layer or back layer are at the front or back of the DOM, while maintaining the ordering between nodes having z-values of front and the ordering between nodes having z-values of back. | 2014-12-18 |
20140372844 | INTERFACE FOR CAPTURING A DIGITAL IMAGE WITH REAL-TIME TEXT - The interface provides a means of capturing a composite digital image on a mobile computer, wherein a captured image is a composite of digital camera image data and text. The interface presents a real-time preview wherein the geometry, quality, and resolution of the preview are allowed to differ from the geometry, quality, and resolution of a captured image. The interface responds to computer characteristics' changes, data changes over time, and interface interactions by updating the preview in real-time, wherein text updates are introduced in an animated manner. The interface permits customization of the text's presentation, including position, scale, font, and style, where style includes color and other common attributes of text that affect visual presentation. The interface contextually adds sections based on the type of textual information composited. | 2014-12-18 |
20140372845 | PARTIAL DATA REPORT GENERATION WITH DATA COSTING NOTIFICATION - Embodiments of the present invention provide a method, system and computer program product for partial data report generation with data costing notification. In an embodiment of the invention, a method for partial data report generation with data costing notification is provided. The method includes registering a call back for an operation specified by a plug in to a diagnostic tool. The method also includes responding to invoking the plug in by generating markup with data provided by different operations of the plug in, and also with at least one hyperlink in lieu of data known to be temporally costly, the hyperlink comprising a textual indication of a temporal cost of retrieving the data known to be temporally costly and an address of an operation programmed to retrieve the data. | 2014-12-18 |
20140372846 | READER-CONFIGURABLE AUGMENTATION OF DOCUMENT CONTENT - Document content is parsed using a reader-defined content creation profile. The document content includes information and information layout specified by an author of the document content. The reader-defined content creation profile specifies document content creation preferences specified by a reader and applicable to augment the document content. A group of individual items of information usable to create augmented document content is identified, as specified by the reader-defined content creation profile, within the parsed document content. A new item of augmented document content is created, as specified by the reader-defined content creation profile, using at least a portion of the identified group of individual items of information. At least the created new item of augmented document content is rendered at a display location specified by the reader-defined content creation profile. | 2014-12-18 |
20140372847 | Optimizing Automated Interactions with Web Applications - Optimizing automated interactions with web pages by identifying, for each of multiple web pages, path information including an incoming hyperlink path having at least one hyperlink, where the incoming hyperlink path leads to the web page, and/or an outgoing hyperlink path having at least one hyperlink, where the outgoing hyperlink path emanates from the web page, determining whether the path information of each of the web pages meets a similarity condition, excluding from an interaction set of the web pages any of the web pages whose path information meets the similarity condition, and causing an automated interaction to be performed with any of the web pages in the interaction set. | 2014-12-18 |
20140372848 | Optimizing Automated Interactions with Web Applications - Optimizing automated interactions with web pages by identifying, for each of multiple web pages, path information including an incoming hyperlink path having at least one hyperlink, where the incoming hyperlink path leads to the web page, and/or an outgoing hyperlink path having at least one hyperlink, where the outgoing hyperlink path emanates from the web page, determining whether the path information of each of the web pages meets a similarity condition, excluding from an interaction set of the web pages any of the web pages whose path information meets the similarity condition, and causing an automated interaction to be performed with any of the web pages in the interaction set. | 2014-12-18 |
20140372849 | INTERACTIVE NOTEPAD FOR COMPUTING EQUATIONS IN CONTEXT - A system, method and computer program product for interactive computing of equations in context includes finding a beginning and an end of a line of text comprising an equals sign and determining if the line is an equation based on any predefined mathematical notation existing in the line; and determining a string variable name comprising all characters and spaces between any two of the predefined mathematical notation, the equals sign and the beginning and the end of the equation wherein the string variable name comprises any Unicode character including a space, a non-breakable space and a plurality of any Unicode characters including numbers, special and non-printed characters. Declaring in the user's electronic notes any computed and numerically unassigned variable(s) in context with the equation and any related variable(s) is further included. An interactive note computation may either be explicitly or implicitly initiated via a button or a contextual expression. | 2014-12-18 |
20140372850 | Telling Interactive, Self-Directed Stories with Spreadsheets - A spreadsheet storytelling engine is provided. The spreadsheet storytelling engine may run in the context of a spreadsheet application on any device, service, or general endpoint capable of running the spreadsheet application. The spreadsheet storytelling engine allows for the authoring and telling of a story. The story is a collection of operations that guide the consumer through a spreadsheet. The story allows the spreadsheet to be used to convey visualizations, data, calculations, or other objects in a spreadsheet in a way that may be simple, pleasant to look at, and/or visually engaging to help a consumer understand the information and internalize it in a way that is actionable without requiring the real time availability of the spreadsheet author. The spreadsheet storytelling engine is useful for purposes including, but not limited to, making presentations, creating tutorials, validating data, explaining how a model works, and generating interactive business intelligence dashboards. | 2014-12-18 |