51st week of 2012 patent applcation highlights part 66 |
Patent application number | Title | Published |
20120324201 | Effectively limitless apparent free space on storage device - A primary physical storage device has effectively limitless apparent free space. Responsive to receiving a request to dynamically allocate an amount of desired free space on the primary device to store new data on the primary device, and responsive to determining that an amount of actual free space on the primary device is insufficient to permit such allocation, existing data stored on the primary device is moved to a secondary storage device. The first existing data appears to still be stored on the primary device. Responsive to receiving a request to retrieve existing data from the primary device, and to determining that the existing data has been moved to the secondary device, the existing data is moved back to the primary device. The existing data was originally stored on the primary device, and is currently stored on the primary device or has been moved to the secondary device. | 2012-12-20 |
20120324202 | STORAGE SYSTEM COMPRISING MULTIPLE STORAGE CONTROL APPARATUS - A pool, which is configured by multiple actual areas, is formed on the basis of two or more storage devices. A second storage control apparatus (DKC) determines, for each storage device, an unused capacity to be given to a first DKC with respect to each first DKC based on an unused capacity of each storage device and a request value of each storage device for each first DKC, and gives, for each first DKC, the unused capacity for each storage device determined with respect to the first DKC, to this first DKC. The request value of the storage device is based on a performance value, which is a value related to the performance of this storage device. The total capacity of multiple actual areas allocated to the virtual volumes by the first DKC is equal to or less than the unused capacity given with respect to each storage device. | 2012-12-20 |
20120324203 | STORAGE DEVICE - A storage device | 2012-12-20 |
20120324204 | Memory Having information Refinement Detection Function, Information Detection Method Using Memory, Device Including Memory, Information Detection Method, Method For Using Memory, And Memory Address Comparison Circuit - There is provided an externally readable memory for storing information in each memory address, and this memory is provided with an information refinement detection function; this memory comprises: an input means for entering first input data for comparing data items stored in the memory and second input data for comparing addresses in the memory, wherein the first and second comparison data are externally; means for determining matches/mismatches of both data items stored in the memory and addresses of the memory according to both of the input data provided by the input means, and further performing logic operations on both of the match/mismatch determination results; and means for outputting addresses with positive results of the logic operations. This memory may be applicable in a broad range of fields including intelligent information search as well as artificial intelligence. | 2012-12-20 |
20120324205 | MEMORY MANAGEMENT TABLE PROCESSING METHOD, MEMORY CONTROLLER, AND MEMORY STORAGE APPARATUS - A memory management table processing method for storing a plurality of entries belonging to a plurality of memory management tables into a buffer memory of a memory storage apparatus is provided, wherein each of the entries has at least one invalid bit. The present method includes following steps. An area corresponding to each of the memory management tables is configured in the buffer memory. Invalid bit information corresponding to each of the memory management tables is recorded. The invalid bit in each of the entries is removed according to the invalid bit information corresponding to each of the memory management tables, so as to generate a valid data stream corresponding to each of the entries. Each of the valid data streams is written into the corresponding area in the buffer memory. Accordingly, the storage space of the buffer memory can be efficiently utilized. | 2012-12-20 |
20120324206 | COMPUTER OPERATION CONTROL METHOD, PROGRAM, AND SYSTEM - A computer implemented control method, article of manufacture, and computer implemented system for determining whether stack allocation is possible. The method includes: allocating an object created by a method frame to a stack. The allocation is performed in response to: calling a first and second instruction in the method frame; the first instruction causes an escape of the object, and the second instruction cancels the escape of the object; the object does not escape to a thread other than a thread to which the object has escaped, at the point in time when the escape is cancelled; the first instruction has been called before the second instruction is called; and the object does not escape in accordance with an instruction other than the first instruction in the method frame, regardless of whether the object escapes in accordance with the first instruction. | 2012-12-20 |
20120324207 | Encapsulated Instruction Set - A method of encapsulating a long instruction in a set of short instructions for execution on a processor, the long instruction having k bits and each short instruction having l bits where l2012-12-20 | |
20120324208 | Effective Validation of Execution Units Within a Processor - A mechanism is provided for effectively validating execution units within a processor. A branch test pattern is generated for execution by an execution unit that is under validation testing. An execution pattern is selected from a set of execution patterns thereby forming a selected execution pattern. The selected execution pattern is loaded into a condition register. The branch test pattern is executed by an execution unit based on the selected execution pattern in the condition register. Responsive to the branch test pattern ending, values output from the execution unit during execution of the branch test pattern are compared to a set of expected results. Responsive to a match of the comparison, the process is repeated for each execution pattern in the set of execution patterns. Responsive to a match of the comparison for the execution patterns in the set of execution patterns, the execution unit is validated. | 2012-12-20 |
20120324209 | BRANCH TARGET BUFFER ADDRESSING IN A DATA PROCESSOR - A data processor includes a branch target buffer (BTB) having a plurality of BTB entries grouped in ways. The BTB entries in one of the ways include a short tag address and the BTB entries in another one of the ways include a full tag address. | 2012-12-20 |
20120324210 | CONFIGURATION VALUE MANAGEMENT APPARATUS AND MANAGEMENT METHOD - Virtual configuration values are generated in accordance with the model of a specified image forming apparatus using a model-based configuration value schema that defines a configuration value schema for each model of multiple image forming apparatuses and tenant configuration values in which a user has set configuration values for the multiple image forming apparatuses. In the case where a new settings item is present in the generated virtual configuration values, the new settings item is applied to settings items in the tenant configuration values. | 2012-12-20 |
20120324211 | UNIVERSAL OPERATING SYSTEM TO HARDWARE PLATFORM INTERFACE FOR GAMING MACHINES - Gaming machines and systems having a universal interface layer linking a gaming platform to a hardware platform are disclosed. In particular, the universal interface layer is configured such that the gaming platform is hardware platform independent and such that the hardware platform is gaming platform independent. Platform independence can facilitate the interchangeability of one platform without a corresponding need to modify the other platform. The gaming platform can include various gaming modules and an operating system, while the universal interface layer can include firmware, various additional gaming modules, hardware specific drivers and various APIs to facilitate communication between the gaming platform and other universal interface layer components. A safe storage manager can be included to utilize a non-volatile storage component to store data regarding a gaming machine state, with the state being recoverable after a substantial interruption to the machine. | 2012-12-20 |
20120324212 | CACHING BASED OPERATING SYSTEM INSTALLATION - An image of system software is installed by loading an executable image of the system software using a boot loader, where the executable image includes a kernel and a plurality of files used by the kernel. The kernel of the system software is executed to generate the image of the system software that includes a copy of the kernel. Generating the image of the system software involves the steps of generating a plurality of pointers that each point to a different one of the files, retrieving the files using the pointers, and storing a copy of the kernel and the files in a storage device from which the system software is to be booted as the image of the system software. | 2012-12-20 |
20120324213 | SWITCHING BETWEEN A FIRST OPERATIONAL MODE AND A SECOND OPERATIONAL MODE USING A NATURAL MOTION GESTURE - A mobile device is operative to change from a first operational mode to a second or third operational mode based on a user's natural motion gesture. The first operational mode may include a voice input mode in which a user provides a voice input to the mobile device. After providing the voice input to the mobile device, the user then makes a natural motion gesture and a determination is made as to whether the natural motion gesture places the mobile device in the second or third operational mode. The second operational mode includes an augmented reality display mode in which the mobile device displays images recorded from a camera overlaid with computer-generated images corresponding to results output in response to the voice input. The third operational mode includes a reading display mode in which the mobile device displays, without augmented reality, results output in response to the voice input. | 2012-12-20 |
20120324214 | Method and Apparatus to Provide Attestation with PCR Reuse and Existing Infrastructure - The exemplary embodiments or the invention provide at least a method, apparatus, and program of computer instructions to perform operations including receiving a challenge from a prover device, reading and saving an old value of a selected platform configuration register, obtaining at least one measurement or property and forming a new platform configuration register value, where the forming includes calculating a cryptographic hash over the old value of the platform configuration register and the obtained at least one measurement or property, triggering, with the trusted software, an attestation by sending a challenge to a trusted platform module/mobile platform module, and sending by the prover device a device certificate, attestation, at least one measurement or property, and old platform configuration register value to the verifier. Further, the exemplary embodiments or the invention teach sending a challenge to a trusted software of a prover device, and receiving by the verifier device a device certificate, attestation, at least one measurement or property, and an old platform configuration register value from the prover device, checking by the verifier device that extending the old platform configuration register value with the at least one measurement or property results in a new platform configuration register value that has been attested, and using the new platform configuration register value in attestation of the prover device. | 2012-12-20 |
20120324215 | DATA SECURITY METHOD AND APPARATUS USING A CHARACTERISTIC PRESERVING ENCRYPTION - Provided is a data security method and apparatus using a characteristic preserving encryption. The data security apparatus includes an interface communicating with a user terminal or a database server, an input unit receiving information, an output unit outputting information, an encryption unit encrypting data in the data security method, a storage unit storing information, and a control unit controlling functions of the interface, the input unit, the output unit, the encryption unit or the storing unit. | 2012-12-20 |
20120324216 | TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK - Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers is provided. According to one embodiment, a request to establish an IP connection between two locations of a subscriber is received at a service management system (SMS) of the service provider. A tunnel is established between service processing switches coupled in communication through a public network. First and second packet routing nodes within the service processing switches are associated with the first and second locations, respectively. An encryption configuration decision is bound with a routing configuration of the packet routing nodes, by, when the request is to establish a secure IP connection, configuring, the packet routing nodes to cause all packets transmitted to the other location to be encrypted and to cause all packets received from the other location to be decrypted. | 2012-12-20 |
20120324217 | SYSTEM AND METHODS FOR FACILITATING SECURE COMMUNICATIONS ON A WEBSITE - A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is disclosed. The security server encodes the received message and sends the encoded message or a representation of the encoded message for posting on the website so that one or more users of the website have the ability to request that the security server make the message available after the encoded message has been decoded. | 2012-12-20 |
20120324218 | Peer-to-Peer Trusted Network Using Shared Symmetric Keys - A unique, strong, shared, symmetric network-wide key (or a limited number of group-wide keys) is generated by a central authority and initially provisioned to nodes in a network, which use it for ensuing traffic encryption. Nodes establish trust by sending each other authentication messages encrypted with the shared secret key, and thereupon adding each other to their respective trust lists. Also, an optional rekeying scheme whereby an existing shared secret key can be replaced by a new secret key that is introduced by the central authority and automatically propagated from node to node through the network. | 2012-12-20 |
20120324219 | Method and System for Resolving a Naming Conflict - A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties. | 2012-12-20 |
20120324220 | DIGITAL FINGERPRINTING VIA SQL FILESTREAM WITH COMMON TEXT EXCLUSION - A method provides data loss protection of sensitive data using digital fingerprinting. The method includes assigning a security level to each document of a plurality of documents associated with a data loss protection server, and storing the plurality of documents in a digital asset management server, wherein only a single copy of each document of plurality of documents is stored in the digital asset management server. The method also includes sending a query to the digital asset management server from the data loss protection server, and receiving a query response by the data loss protection server from the digital asset management server, the query response including at least one document file. The method further includes creating a digital fingerprint of the at least one document file by the data loss protection server. | 2012-12-20 |
20120324221 | Identification of a Compromised Content Player - A system and method for identifying the player that leaked content encryption keys by loading a set of player keys into individual content players and determining the number of encryptions and the number of encryption keys to use in multiple encrypting critical content. The method produces copies of critical data content packets, each copy of which is separately encrypted using any one of a set of encryption keys that are related to one another through a mathematical algorithm. The related set of encryption keys and data describing key relationship and content player identity are transmitted to a previously determined license management agency. The transmitted encrypted content is written to a receiving device or file, or streamed to an individual player for non-synchronous playback. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2012-12-20 |
20120324222 | MULTIPLE INDEPENDENT LEVELS OF SECURITY (MILS) HOST TO MULTILEVEL SECURE (MLS) OFFLOAD COMMUNICATIONS UNIT - Systems and methods for use in secure network communication. A physical network interface receives a network packet associated with a security level. The network packet is transmitted from the physical network interface to a security policy component. The network packet is routed to a stack offload engine by the security policy component based on a network address associated with the network packet and the security level associated with the network packet. The network packet is provided by the stack offload engine to a software application via trusted memory interface that transfers the packet to a memory portion of a plurality of memory portions. The memory portion corresponds to the security level. | 2012-12-20 |
20120324223 | SYSTEMS AND METHODS FOR MAINTAINING DATA SECURITY ACROSS MULTIPLE ACTIVE DOMAINS - Systems and methods for maintaining data security across multiple active domains are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The primary domain includes a centralized key manager. In one embodiment, each domain includes its own local data vault and a replica of each data vault associated with every remote domain. Any domain can access the data vaults (local and replica) and retrieve a token created by any other domain. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found in the data vaults. | 2012-12-20 |
20120324224 | STATELESS HUMAN DETECTION FOR REAL-TIME MESSAGING SYSTEMS - Stateless human detection for real-time systems allows a real-time message system to challenge incoming messages suspected of being generated by an automated application. When a suspect message is detected, a challenge is presented to a sender of the message. The challenge is designed to require human intervention to provide a correct answer to the challenge. A challenge packet is sent with the challenge and includes a challenge answer and, possibly, a server identifier, a challenge identifier and/or a time stamp that can be used to prevent attacks on the challenge. The challenge packet is encrypted so that the sender cannot access the contents thereof. When the sender provides a response to the challenge, the sender returns the challenge packet. The challenge packet is decrypted and the challenge answer is compared to a sender answer. If the answers match, the sender is allowed subsequent access to the messaging system. | 2012-12-20 |
20120324225 | CERTIFICATE-BASED MUTUAL AUTHENTICATION FOR DATA SECURITY - Systems and methods for maintaining data security using client roles, API keys, and certificate-based mutual authentication are presented. A method of protecting sensitive data includes both client authorization techniques and the mutual exchange and verification of certificates between client and server. In one embodiment, access by a client to a server is further limited by temporal constraints, volume constraints, and an end user identity filter. | 2012-12-20 |
20120324226 | TRANSACTION AUDITING FOR DATA SECURITY DEVICES - Data security devices are provided which store user data and interact with terminal devices to provide information about the stored user data. Security device has memory for storing user data, an interface for transmission of data communications connectable to a data communications network, and a controller. The controller processes a request from the terminal device for information about said user data by first generating a message. The message is generated to permit verification, using secret data, that the message was generated by the controller. The controller sends the message to the terminal device for communication to a publication entity for publication of the message. The controller then receives from the terminal device a cryptographic construction. The controller checks validity of the cryptographic construction for said message, and subsequent supply of the information requested about the user data to the terminal device is then dependent on said cryptographic construction. | 2012-12-20 |
20120324227 | System For Generating Fingerprints Based On Information Extracted By A Content Delivery Network Server - A dynamic multimedia fingerprinting system is provided. A user requests multimedia content from a Web cache server that verifies that the user is authorized to download the content. A custom fingerprint specific to the user is generated and dynamically inserted into the content as the content is delivered to the user. The custom fingerprint can be generated on the Web cache server or at the content provider's server. The system allows a content provider to specify where the custom fingerprint is inserted into the content or where the fingerprint is to replace a placeholder within the content. | 2012-12-20 |
20120324228 | PLATFORM THAT FACILITATES PRESERVATION OF USER PRIVACY - Described herein are technologies pertaining to preserving privacy of users of mobile computing devices. Two users of two mobile computing devices share a quantization scheme for quantizing location data using a predefined quantization interval. The two users additionally share a private key that is utilized to encrypt locations obtained by the two computing devices that have been quantized using the shared quantization scheme. Encrypted, quantized locations are compared in a cloud computing service in connection with answering location-based queries, where the comparison is undertaken without the cloud computing service decrypting the encrypted, quantized locations. | 2012-12-20 |
20120324229 | SYSTEM AND METHOD FOR GENERATING KEYLESS DIGITAL MULTI-SIGNATURES - A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees based on the signature generation requests, and constructing a search tree including the subtrees. The method also includes assigning explicit length tags to leaf nodes of the search tree to balance the search tree and applying a hash function to each of the search tree nodes. The root hash value and the height of the search tree make up a generated aggregate signature request, followed by receiving an aggregate signature based on the aggregate signature request. The keyless digital multi-signature is generated based on the aggregate signature and contains an implicit length tag to verify that the number of signature generation requests is limited. The aggregate signature is generated if the height of the search tree does not exceed a predetermined height limitation. | 2012-12-20 |
20120324230 | SYSTEM FOR ENABLING DIGITAL SIGNATURE AUDITING - A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system. | 2012-12-20 |
20120324231 | ATTRIBUTES IN CRYPTOGRAPHIC CREDENTIALS - Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as prime numbers E in accordance with a predetermined mapping and a cryptographic credential is generated encoding E. To prove that an attribute encoded in a cryptographic credential associated with a proving module of the system is a member of a predetermined set of user attributes, without revealing the attribute in question, the proving module determines the product Q of respective prime numbers corresponding to the attributes in the set in accordance with the predetermined mapping of attributes to prime numbers. The proving module demonstrates to the receiving module possession of a cryptographic credential encoding a secret value that is the prime number E, and then whether this secret value divides the product value Q. | 2012-12-20 |
20120324232 | Author Signatures for Legal Purposes - Methods and apparatus, including computer program products, implementing and using techniques for establishing trust in an electronic document. An electronic document is received. State dependent content in the electronic document is identified. The state dependent content is content that is renderable to have a several appearances. The electronic document is presented to a user, which includes disclosing the presence of any identified state dependent content in the electronic document. | 2012-12-20 |
20120324233 | Verifying Requests for Access to a Service Provider Using an Authentication Component - The subject disclosure is directed towards processing requests for accessing a service provider. After examining at least one security token, a public key and a portion of attribute information are identified. An authentication component is accessed and applied to the public key. A unique user identifier is employed in generating the public key. The authentication component is generated using information from at least one revoked security token or at least one valid security token. The authentication component is configured to prove validity of the at least one security token. | 2012-12-20 |
20120324234 | FLEXIBLE METHOD OF USER AUTHENTICATION - A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices in communication with the workstation. The system then determines predetermined user authorisation methods each requiring data only from available user information entry devices. The user then selects one of the determined authorisation methods for use in user authorisation. Optionally, each authorisation method is associated with a security level relating to user access to resources. Once the authorisation method is selected, the user provides user authorisation information in accordance with a determined user authorisation method and registration proceeds. | 2012-12-20 |
20120324235 | SYSTEM AND METHOD FOR REMOTE SELF-ENROLLMENT IN BIOMETRIC DATABASES - Methods and systems for remotely enrolling enrollees into biometric databases are provided. The method includes acquiring biometric data from one or more biometric sensors and authenticating an enrollee associated with the biometric data. The method includes enrolling the authenticated enrollee associated with the biometric data. The acquiring occurs externally from equipment that requires an identification. The method includes verifying individual samplings of the biometric data for quality at the time of enrollment based on a pre-determined threshold and verifying whether the enrollee presenting the biometric data is authenticated at the time of enrollment. The method includes signing a request of a third party with a private key associated with the third party, the signing denoting that the biometric data is verified for a transaction between the third party and the enrollee. The method includes sending the signed third party request to the third party to complete authenticating of the transaction. | 2012-12-20 |
20120324236 | Trusted Snapshot Generation - A hypervisor provides a snapshot protocol that generates a verifiable snapshot of a target machine. The verifiable snapshot includes a snapshot and a signed quote. In one implementation, a challenger requests a snapshot of the target machine. In response to the snapshot request, the hypervisor initiates Copy-on-Write (CoW) protection for the target machine. The hypervisor snapshots and hashes each of the memory pages and the virtual central processing unit (CPU) of the target machine. The hypervisor generates a composite hash by merging all individual memory page hashes and the CPU state hash. The hypervisor requests a quote including integrity indicators of all trusted components and the composite hash. The quote uses a cryptographic signature from a trusted platform module, which ensures that any compromise of the integrity of the snapshot is detectable. The snapshot and signed quote are returned to the challenger for verification. | 2012-12-20 |
20120324237 | CLOUD KEY DIRECTORY FOR FEDERATING DATA EXCHANGES - Embodiments are directed to facilitating data transfer using an anonymous directory and to providing attribute-based data access to identified users. In an embodiment, a computer system instantiates an anonymous directory that stores data in various client-specific directories for different clients. The anonymous directory is configured to provide data access according to access controls defined and managed by the client. The computer system receives a data request from a user that identifies the user and specifies a portion of data that is to be returned to the user. The computer system determines which of the client's data is to be returned to the user based on the client's specified access controls. The access controls grant access to specified data in some of the client-specific directories, based on the user's identity. The computer system then provides the determined data to the user. | 2012-12-20 |
20120324238 | INFORMATION PROCESSING APPARATUS, VERIFICATION METHOD, AND STORAGE MEDIUM STORING VERIFICATION PROGRAM - A novel information processing apparatus prevents unauthorized software from running with a hash value whose bit length is longer than each register in a transfer platform module | 2012-12-20 |
20120324239 | METHOD AND DEVICE FOR OPERATING A VIRTUAL MACHINE IN ACCORDANCE WITH AN ASSOCIATED INFORMATION ON ASSIGNMENT OF RIGHTS - Virtual machines are used in the utilization of distributed computer infrastructures to be able to distribute the workload to individual computers in as flexible a manner as possible. For this purpose, it is necessary to restrict the use of the virtual machine in a robust manner by regulatory or administrative defaults. A method protects a virtual machine during the migration, storage or operation thereof by way of digital rights management and encryption. For this purpose, the hypervisor or the virtual machine monitor as well as the virtual machine are expanded by corresponding functionalities. | 2012-12-20 |
20120324240 | SECURE SEARCH SYSTEM, PUBLIC PARAMETER GENERATION DEVICE, ENCRYPTION DEVICE, USER SECRET KEY GENERATION DEVICE, QUERY ISSUING DEVICE, SEARCH DEVICE, COMPUTER PROGRAM, SECURE SEARCH METHOD, PUBLIC PARAMETER GENERATION METHOD, ENCRYPTION METHOD, USER SECRET KEY GENERATION METHOD, QUERY ISSUING METHOD, AND SEARCH METHOD - In a secure search system to be used by a plurality of users, the size of a ciphertext is reduced and the need to generate a new ciphertext when a new user is added is eliminated. A public parameter generation device | 2012-12-20 |
20120324241 | SEMICONDUCTOR DEVICE - A semiconductor device in related art has a problem that security on confidential information stored is insufficient. A semiconductor device of the present invention has a unique code which is unique to a device and generates unique code corresponding information from the unique code. The semiconductor device has a memory region in which specific information obtained by encrypting confidential information is stored in a region associated with the unique code corresponding information. The specific information read from the memory region is encrypted with the unique code corresponding information to generate the confidential information. | 2012-12-20 |
20120324242 | METHOD AND SYSTEM FOR FULLY ENCRYPTED REPOSITORY - According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device. | 2012-12-20 |
20120324243 | CRYPTOGRAPHIC PROCESSING APPARATUS, CRYPTOGRAPHIC PROCESSING METHOD, AND COMPUTER PROGRAM THEREFOR - A processing unit transforms first input information into first nonlinear transformed information that is transformed into first linear transformed information, and transforms second input information into second nonlinear transformed information that is transformed into second linear transformed information. An exclusive- or section performs an exclusive- or operation based on the first and second linear transformed information. When the first nonlinear and linear transformed information are expressed as a first and second sequence vector, respectively, and the second nonlinear and linear transformed information are expressed as a third and fourth sequence vector, respectively, then a first row vector chosen from a first inverse matrix of a first matrix that transforms the first sequence vector to the second sequence vector, and a second row vector chosen from a second inverse matrix of a second matrix that transforms the third sequence vector to the fourth sequence vector, are linearly independent. | 2012-12-20 |
20120324244 | KIOSK DISTRIBUTION OF LICENSED CONTENT TO PORTABLE DEVICE WITHIN DVD AVAILABILITY WINDOW - A system and method are disclosed for kiosk distribution of licensed content to one or more portable devices. The system stores and distributes licensed content in such a manner as to be compatible with the DVD window such that MFN contract provisions are not triggered during the window. Therefore consumers can use the system to purchase additional content or watch content that has been previously purchased without any blackout period as experienced using other content distribution methods such as Internet video streaming or other types of digital download services. | 2012-12-20 |
20120324245 | WIRELESS CLOUD-BASED COMPUTING FOR RURAL AND DEVELOPING AREAS - A framework that enables a local computing cloud infrastructure for rural (and third world) populations with the ability to connect into the global cloud. The framework include is a low cost architecture of long distance, wireless based, renewable energy powered, and small datacenter (DC) (referred to as a pico-DC) nodes that can fully operate off-grid, both power-wise and Internet connection-wise at a very low cost. Additionally, the framework includes power management and storage techniques that effectively enable low power and efficient power use. Thus, systems are self-sufficient, low maintenance and weather proof with no need for power or data connections. | 2012-12-20 |
20120324246 | SHARED NON-VOLATILE STORAGE FOR DIGITAL POWER CONTROL - Systems and methods may be implemented in a power device subsystem topology to provide an arbitration and communication scheme between a single consolidated non-volatile random access (NVRAM) memory device and multiple discrete digital power controller devices in a manner that provides data protection and the ability to update the full NVRAM content when needed. | 2012-12-20 |
20120324247 | POWER SUPPLY CIRCUIT FOR CPU - An exemplary power supply circuit includes a voltage adjustment module electrically coupled to a CPU, a first jumper block, a second jumper block, a first jumper, and a second jumper. The first jumper block includes a first pin electrically coupled to a power source, a second pin electrically coupled to the voltage adjustment module, and a third pin grounded. The first (second) jumper electrically connects the first pin of the first (second) jumper block to the second pin of the first (second) jumper block or electrically connects the second pin of the first (second) jumper block to the third pin of the first (second) jumper block, thereby changing signal output by the second pin of the first (second) jumper. The voltage adjustment module adjusts a phase number power supply to supply corresponding phase power to the CPU based on the voltages output by the second pins. | 2012-12-20 |
20120324248 | METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING POWER AND PERFORMANCE BALANCING BETWEEN MULTIPLE PROCESSING ELEMENTS - An apparatus, method and system is described herein for efficiently balancing performance and power between processing elements based on measured workloads. If a workload of a processing element indicates that it is a bottleneck, then its performance may be increased. However, if a platform or integrated circuit including the processing element is already operating at a power or thermal limit, the increase in performance is counterbalanced by a reduction or cap in another processing elements performance to maintain compliance with the power or thermal limit. As a result, bottlenecks are identified and alleviated by balancing power allocation, even when multiple processing elements are operating at a power or thermal limit. | 2012-12-20 |
20120324249 | COMPUTER MOTHERBOARD - A motherboard includes a CPU socket, a BIOS chip, a Southbridge chip, and a voltage regulator module (VRM). The BIOS chip is configured for rendering a BIOS UI. The BIOS UI includes a voltage setting menu, the voltage setting menu includes a number of voltage setting options, each of which, when selected, determines a unique voltage setting. The Southbridge chip is configured for storing the voltage setting and generating a unique voltage setting signal corresponding to the voltage setting. The VRM is configured for converting an input voltage into a supply voltage for the CPU socket according to the voltage setting signal. | 2012-12-20 |
20120324250 | Architecturally Homogeneous Power-Performance Heterogeneous Multicore Processor - For multicore power performance management, a first core has a first architecture and is designed for a first voltage-frequency domain. A second core has the first architecture and that is designed for a second voltage-frequency domain. | 2012-12-20 |
20120324251 | OPTIMIZED HIBERNATE MODE FOR WIRELESS DEVICE - A system and method for reducing in boot time in an electronic device. In one embodiment, a command to power off the electronic device is received. An amount of information stored in at least one of the plurality of memory banks of RAM containing data is calculated. A determination is made as to whether the RAM has sufficient storage space to store compacted data and also form a RAM disk in a portion of the RAM, wherein the step of determining is based at least in part on the amount of information calculated. A RAM disk is initiated in an available memory bank of RAM. The RAM is compacted and a hibernate command is executed wherein the RAM disk is a target for storing the compacted RAM. Power is maintained to memory banks that form the RAM disk and the processor of the portable communication device is set to a power collapse mode. | 2012-12-20 |
20120324252 | DYNAMIC BATTERY CAPACITY ALLOCATION FOR DATA RETENTION AMONG MOBILE COMPUTERS AND ELECTRONIC DEVICES - Systems devices and/or methods that facilitate dynamic battery capacity allocation are presented. Extended use times or smaller form factors can be achieved for devices employing dynamic battery capacity allocation. By determining factors that can include the type of memory, the usage of the memory, and/or the user's preference to continue to use a device rather than retain data in a volatile memory for a period of time before supplying alternative power, the device can be available for use for longer periods of time on a battery or a smaller battery can be used to achieve similar use time. | 2012-12-20 |
20120324253 | DYNAMIC VOLTAGE TRANSITIONS - The operating voltage of an integrated circuit (e.g., a processor) is changed in response to one or more conditions (e.g., a laptop computer is connected to an AC power source). Both the operating frequency and the operating voltage of the integrated circuit are changed. The voltage regulator providing the operating voltage to the integrated circuit is caused to transition between voltage levels using one or more intermediate steps. The integrated circuit continues to operate in the normal manner both at the new voltage and throughout the voltage transition. | 2012-12-20 |
20120324254 | DRAWING POWER OVER NETWORK CABLE - A source device to provide power through a network cable and a user device is to draw power from the network cable. A database is to store a parameter associated with the user device. The source device is to access the stored parameter based on receipt of information related to the user device and is to compare at least one of a current power drawn and an additional power requested by the user device to a power limit of the user device based on the accessed parameters. The source device is to send a power message to the user device based on the comparison, the power message to relate to an amount of the power the user device is to draw. | 2012-12-20 |
20120324255 | SECONDARY POWER UTILIZATION DURING PEAK POWER TIMES - Systems and methods for selectively utilizing secondary power sources during peak power times are provided for. The method includes receiving a notification of a peak power time, and discontinuing use of a primary power supply and beginning use of a secondary power supply based upon the notification. | 2012-12-20 |
20120324256 | DISPLAY MANAGEMENT FOR MULTI-SCREEN COMPUTING ENVIRONMENTS - Embodiments of the present invention provide a method, system and computer program product for power management for a multi-display computing environment. In an embodiment of the invention, a computer data processing system can be configured for power management for a multi-display computing environment. The system can include a computer with at least one processor and memory, a video display adapter disposed in the computer and multiple different displays driven by the adapter. The system also can include a selective power management module coupled to the computer and configured to selectively apply power management to only one of the displays in which a period of inactivity is detected, while not applying power management to remaining ones of the displays. | 2012-12-20 |
20120324257 | POWER SUPPLY - A power supply according to various embodiments of the disclosure is configured to detect an event and, in response to the event, alternately supply power to a plurality of provided devices via a provided bus at a first current level or at a second current level, the second current level less than the first current level. Among other things, embodiments in this disclosure help allow additional devices to be used on a bus, even where the total power consumption of the devices would normally exceed a maximum defined by a bus architecture. Furthermore, various embodiments help allow a single gauge of wire to be used throughout a bus network (even where long lengths of wire are required) while still providing sufficient power to the devices connected to the bus. | 2012-12-20 |
20120324258 | POWER STATE MANAGEMENT OF AN INPUT/OUTPUT SERVICING COMPONENT OF A PROCESSOR SYSTEM - A method of regulating power states in a processing system may begin with a processor component reporting a present processor power state to an input-output hub, where the present processor power state corresponds to one of a plurality of different processor power states ranging from an active state to an inactive state. The input-output hub receives data indicative of the present processor power state and, in response to receiving the present processor power state, establishes a lowest allowable hub power state that corresponds to one of a plurality of different hub power states ranging from an active state to an inactive state. The method continues by determining a present hub power state for the input-output hub, wherein depth of the present hub power state is less than or equal to depth of the lowest allowable hub power state. | 2012-12-20 |
20120324259 | POWER AND LOAD MANAGEMENT BASED ON CONTEXTUAL INFORMATION - A power context system is described herein that makes decisions related to device power usage based on factors such as location, load, available alternatives, cost of power, and cost of bandwidth. The system incorporates contextual knowledge about the situation in which a device is being used. Using the context of location, devices can make smarter decisions about deciding which processes to migrate to the cloud, load balancing between applications, and switching to power saving modes depending on how far the user is from a power source. As the cloud becomes more frequently used, load balancing by utilizing distributed data warehouses to move processes to different locations in the world depending on factors such as accessibility, locales, and cost of electricity are considerations for power management. Power management of mobile devices is becoming important as integration with the cloud yields expectations of devices being able to reliably access and persist data. | 2012-12-20 |
20120324260 | ELECTRONIC APPARATUS FOR SAVING POWER, AND METHOD OF SAVING POWER IN AN APPARATUS - According to one embodiment, a transceiver acquires actual consumption data and predicted consumption data for each time slot, from a power supply management system. A data analysis block analyzes the actual consumption data and the predicted consumption data, and generates graph data representing a graph showing a result of the analysis. A display control block causes a display device to display the graph and a power-save line in the graph. A power-save line control block moves the power-save line to a desired position and utilizes a value associated with the desired position as a value at which to start power saving. A command signal output block outputs a power-save command signal to an apparatus which should save power, if the actual consumption data and/or the predicted consumption data exceed the value indicated by the power-save line. | 2012-12-20 |
20120324261 | USB 3.0 HOST WITH LOW POWER CONSUMPTION AND METHOD FOR REDUCING POWER CONSUMPTION OF A USB 3.0 HOST - A USB 3.0 host with low power consumption includes a super speed circuit, a non-super speed circuit, and a control module. The super speed circuit is used for transmitting data at a first transmission speed. A default state of the super speed circuit is turning-off. The non-super speed circuit is used for transmitting data at a second transmission speed, a third transmission speed, or a fourth transmission speed. The first transmission speed is faster than the second transmission speed, the third transmission speed, and the fourth transmission speed. The control module is used for detecting whether a USB peripheral device is connected to the USB 3.0 host, and controlling turning-on and turning-off of the super speed circuit. | 2012-12-20 |
20120324262 | Automatic Power Saving for Communication Systems - Various embodiments of a power saving scheme in data communication are provided. In one aspect, a method transmits a plurality of symbols each of which containing an overhead portion and at least a portion of a respective data transmission unit (DTU). In particular, the method transmits the overhead portion of a first symbol of the plurality of symbols and the at least a portion of a respective DTU of the first symbol when the at least a portion of the respective DTU of the first symbol contains payload data. The method transmits the overhead portion of a second symbol of the plurality of symbols without transmitting the at least a portion of a respective DTU of the second symbol when the at least a portion of the respective DTU of the second symbol contains no payload data. | 2012-12-20 |
20120324263 | Priority-Based Power Capping in Data Processing Systems - A mechanism is provided for priority-based power capping. A power management controller identifies a set of priorities for a set of partitions of the data processing system. The power management controller determines whether a measured power of the data processing system exceeds a power cap for the data processing system. Responsive to the measured power exceeding the power cap, the power management controller sends a set of commands to a set of component actuators to adjust one or more of a set of operation parameters for a set of components associated with the set of partitions using the set of priorities. The set of component actuators adjust the one or more of the set of operational parameters associated with the set of component in order to reduce a power consumption of the data processing system. | 2012-12-20 |
20120324264 | Priority-Based Power Capping in Data Processing Systems - A mechanism is provided for priority-based power capping. A power management controller identifies a set of priorities for a set of partitions of the data processing system. The power management controller determines whether a measured power of the data processing system exceeds a power cap for the data processing system. Responsive to the measured power exceeding the power cap, the power management controller sends a set of commands to a set of component actuators to adjust one or more of a set of operation parameters for a set of components associated with the set of partitions using the set of priorities. The set of component actuators adjust the one or more of the set of operational parameters associated with the set of component in order to reduce a power consumption of the data processing system. | 2012-12-20 |
20120324265 | COORDINATED LINK POWER MANAGEMENT - A method, apparatus, and system for coordinated link power management. Some embodiments of a method include receiving an exit latency for each of a group of link states for a link, with a device being coupled to an interconnect via the first link. A latency tolerance value is determined and communicated, and a platform latency is received. The method further provides for determining a link budget for the device, the link budget indicating an amount of time available for an exit from a link state for the device; and selecting one of the link states based at least in part on the link budget. | 2012-12-20 |
20120324266 | Microarchitecture Controller For Thin-Film Thermoelectric Cooling - A device having multiple cores executes an algorithm to control Thin-Film Thermoelectric Coolers (TFTEC) that employ the Peltier effect to remove heat from the various cores of the multi-core processor. The algorithms may combine Thread Migration (TM) and Dynamic Voltage/Frequency Scaling (DVFS) to provide Dynamic Thermal Management (DTM) and TFTEC control. | 2012-12-20 |
20120324267 | POWER OPTIMIZATION FOR DATA SERVICES - Systems and methods for optimizing the power of a battery in a mobile device are provided. The systems and methods include receiving a request from at least one of a plurality of applications running on the mobile device. The systems and methods further include determining user characteristics from interacting with at least one of the applications and determining a user dwell time threshold based upon the user's interactions with an application. The systems and methods further include buffering requests if the user dwell time is less than the user dwell threshold level. | 2012-12-20 |
20120324268 | INFORMATION PROCESSING APPARATUS, METHOD, AND STORAGE MEDIUM - A novel information processing apparatus maintains file system information in a secondary storage device during power saving mode. The information processing apparatus keeps storing file information and mounting information in the secondary storage device without releasing it in shutdown process | 2012-12-20 |
20120324269 | MICROCONTROLLER AND METHOD FOR CONTROLLING POWER INDICATOR - A microcontroller (MCU) and method controls a power indicator. The MCU reads an input voltage of a power supply device, reads an output voltage of the power supply device, and reads a power of the supply device. The MCU determines if the read input voltage of the power supply device falls within a predetermined input voltage range, determines if the read output voltage of the power supply device falls within a predetermined output voltage range, and determines if the read power of the power supply device falls within a predetermined power range. The MCU controls the power indictor to indicate a light according to a determination result of the power supply device. | 2012-12-20 |
20120324270 | SYNCHRONOUS NETWORK - A network node of a synchronous network, wherein said network node comprises a timing circuit which recovers a reference clock from a reception signal received by said network node from an upstream network node of said synchronous network and uses the recovered reference clock for a transmission signal transmitted by said network node to a downstream network node of said synchronous network; and a clock stability monitoring circuit which monitors internal control parameters (CP) of said timing circuit to detect an instability of the reference clock distributed within said synchronous network. | 2012-12-20 |
20120324271 | FAULT PROCESSING SYSTEM - Aspects of the invention provide for a fault processing system. In one embodiment, the fault processing system includes: a first processing engine wrapper having: an inbound pipe configured to obtain a first claimcheck data packet; a processing engine component configured to: process a first context message derived from the first claimcheck data packet according to a fault rule selected from: a fault detection rule, a fault location rule, a fault isolation rule, or a fault restoration rule; and generate a second context message, the second context message including data processed according to the selected fault rule; and an outbound pipe configured to provide a second claimcheck data packet derived from the second context message. | 2012-12-20 |
20120324272 | OPTICAL COMMUNICATION SYSTEM, INTERFACE BOARD AND CONTROL METHOD PERFORMED IN INTERFACE BOARD - An embodiment of the invention is an optical communication system including: a plurality of interface boards which transmit and receive optical signals to and from interface boards facing the plurality of interface boards; and a monitoring control device which monitors states of the plurality of interface boards. A first interface board of the plurality of interface boards includes: a replacement unit capable of monitoring the states of the plurality of interface boards on behalf of the monitoring control device and independently receiving supply of power; and a control unit configured to start the replacement unit in a case where a fault occurs in the monitoring control device and stop or halt the replacement unit in a case where there is no fault in the monitoring control device. | 2012-12-20 |
20120324273 | DATA ROUTING FOR POWER OUTAGE MANAGEMENT - In one embodiment, a particular node in a computer network, that is, one receiving electrical power from a grid source, may determine routing metrics to a plurality of neighbor nodes of the particular node in the computer network. In addition, the node also determines power grid connectivity of the plurality of neighbor nodes. Traffic may be routed from the particular node to one or more select neighbor nodes having preferred routing metrics, until a power outage condition at the particular node is detected, at which time the traffic (e.g., last gasp messages) may be routed from the particular node to one or more select neighbor nodes having diverse power grid connectivity from the particular node. In this manner, traffic may be routed via a device that is not also experiencing the power outage condition. | 2012-12-20 |
20120324274 | STORAGE SYSTEM AND CONTROL METHOD FOR A STORAGE SYSTEM - It is provided a storage system for storing write data requested by a host computer, comprising: a data storage device, first and second cache memories, first and second non-volatile memories and at least one power storage device, wherein the storage system stores the requested write data in the data storage device, without storing the requested write data in neither the first cache memory nor the second cache memory in a case where the amount of charge of the at least one power storage device is smaller than the predetermined amount of power, and stores the requested write data in at least one of the first and second cache memories, and then store the requested write data in the data storage device in a case where the amount of charge of the at least one power storage device is equal to or larger than the predetermined amount of power. | 2012-12-20 |
20120324275 | DISPERSED STORAGE UNIT SELECTION - A dispersed storage device for use within a dispersed storage network operates to select a set of dispersed storage units for storage of a data object by slicing an encoded data segment of a data object into error coded data slices, determining slice metadata for the error coded data slices, determining memory characteristics of dispersed storage units capable of storing the error coded data slices and selecting the set of dispersed storage units for storing the error coded data slices based on the slice metadata and the memory characteristics. | 2012-12-20 |
20120324276 | INTELLIGENT BIT RECOVERY FOR FLASH MEMORY - A method and system intelligent bit recovery is provided. The intelligent bit recovery determines which bits are toggling, and examines a subset of the potential bit patterns to determine which in the subset of potential bit patterns is valid. The subset is a fraction of the potential bit patterns, and is based on an understanding of the flash memory and the problems that may cause the toggling bits. The intelligent bit recovery may analyze at least one aspect of the flash memory to identify which problem is potentially causing the toggling bits, and to select the subset of potential bit patterns as solutions for the determined problem. Or, the intelligent bit recovery selects potential bit patterns for multiple potential problems. In either way, the subset of potential bit patterns examined by the intelligent bit recovery is a small fraction of the entire set of potential bit patterns. | 2012-12-20 |
20120324277 | SYSTEM AND METHOD FOR DETECTING COPYBACK PROGRAMMING PROBLEMS - Methods and systems are disclosed herein for detecting problems related to copyback programming. After the copyback data is read into the internal flash buffer, a part of the copyback data stored in the internal flash buffer (such as spare data) is analyzed to determine whether there are any errors in a part of the copyback data read. The analysis may be used by the flash memory in one or more ways related to the current copyback operation, subsequent copyback operations, subsequent treatment of the data in the current copyback operation, and subsequent treatment of the section in memory associated with the source page. | 2012-12-20 |
20120324278 | METHOD AND APPARATUS FOR IMPROVING ACCESS TO AN ATM DURING A DISASTER - A method and apparatus that allow a user to easily operate a self-service device despite the presence of damage is provided. Anticipated damage includes extreme environmental conditions such as earthquakes, flooding, strong winds, tsunamis, etc. These conditions may cause a failure in a portion of the self-service device. Improved ruggedness and redundant components are coordinated by suitable software to provide service despite damage to the self-service device. Additionally, access to some user accounts despite the loss of connectivity to a server maintaining user accounts is provided. | 2012-12-20 |
20120324279 | Method and Apparatus of Backing up Subversion Repository - The present disclosure provides a method and apparatus for backing up a subversion repository. In one embodiment, a method of backing up a subversion repository wherein a version attribute of a backup repository is preset and identifies a latest version of the backup repository, the method comprises: synchronizing the backup repository based on the version attribute of the backup repository; in an event of successful synchronization, updating the version attribute of the backup repository with an identification of a synchronized version; and in an event of unsuccessful synchronization, determining that a current version to be a non-synchronizable version, backing up an original repository by duplicating a copy of the original repository, and updating the version attribute of the backup repository with an identifier of the non-synchronizable version. | 2012-12-20 |
20120324280 | SYSTEM AND METHOD FOR DATA DISASTER RECOVERY - A system includes a production computer machine that includes an operating system and a driver stack. The driver stack includes a file system layer, a recovery driver, a storage layer, a driver layer, a bus driver layer, and a storage device. The system also includes a backup computer processor coupled to the production computer machine via the recovery driver. The recovery driver is configured to commence a recovery of data from the backup computer processor, receive a disk access request from the file system layer, determine if the disk access request accesses data that has not yet been recovered from the backup computer processor, and initiate an on-demand recovery request from the backup computer processor when the data has not been recovered from the backup computer processor. | 2012-12-20 |
20120324281 | Recovery Node Testing - There is disclosed a recovery node testing system and method. The system and method include copying a protected server image associated with a protected server to a test node and creating a test environment for the test node, the test environment including at least one of the network characteristics of the protected server. The test node may then be activated using the protected server image which may then be connected to the virtual network. Once connected, at least one test is performed on the test node to confirm that the protected server image operating on the test node responds in the same manner as the protected server. | 2012-12-20 |
20120324282 | EVENT BASED MODEL FOR MANAGING APPLICATION HEALTH AND FAILURE RECOVERY FOR ASYNCHRONOUS PROCESSING SYSTEMS - A method for event management in asynchronous work processing including timing at least one step in an asynchronous work process, wherein the at least one step is performed by an application and the at least one step has an expected time of completion; determining an error preventing step completion in response to the expected time of completion expiring; correcting the error; and re-performing the at least one step. | 2012-12-20 |
20120324283 | Delivery with Reconciliation on Client Side - The invention relates to a system for data synchronization between two or more computer terminals including, at least one client terminal, a server terminal, a communication network connecting said client and server terminals, a data string being created on said client terminal, said client terminal being configured to send the data string to the server terminal for synchronization between the two terminals, characterized in that upon synchronization failure, reconciliation data with the latest synchronization information including said data string, is configured to be stored in a database on the client terminal and resent later according to a retry counter. | 2012-12-20 |
20120324284 | TRIPLE PARITY TECHNIQUE FOR ENABLING EFFICIENT RECOVERY FROM TRIPLE FAILURES IN A STORAGE ARRAY - A triple parity (TP) technique reduces overhead of computing diagonal and anti-diagonal parity for a storage array adapted to enable efficient recovery from the concurrent failure of three storage devices in the array. The diagonal parity is computed along diagonal parity sets that collectively span all data disks and a row parity disk of the array. The parity for all of the diagonal parity sets except one is stored on the diagonal parity disk. Similarly, the anti-diagonal parity is computed along anti-diagonal parity sets that collectively span all data disks and a row parity disk of the array. The parity for all of the anti-diagonal parity sets except one is stored on the anti-diagonal parity disk. The TP technique provides a uniform stripe depth and an optimal amount of parity information. | 2012-12-20 |
20120324285 | METHOD, APPARATUS AND SYSTEM FOR DATA DISASTER TOLERANCE - A method, apparatus and system for data disaster tolerance are provided in embodiments of this disclosure, the method comprising: receiving node failure information from a node; detecting along a predecessor direction and a successor direction of a failure node indicated in the node failure information according to a pre-stored node sequence to determine a first effective predecessor node and a first effective successor node, and all failure nodes between the first effective predecessor node and the first effective successor node; instructing those of all effective nodes that have local content registration index stored on the failure nodes and the first effective successor node to perform a primary index recovery process, respectively, so as to recover primary indexes of all of the failure nodes into the primary index of the first effective successor node. | 2012-12-20 |
20120324286 | UTILIZING AUXILIARY VARIABLES IN MODELING TEST SPACE FOR SYSTEM BEHAVIOR - Systems and methods for modeling test space for verifying system behavior, using one or more auxiliary variables, are provided. The method comprises implementing a functional coverage model including: one or more attributes, wherein respective values for the attributes are assigned according to a test plan, and one or more constraints defining restrictions on value combinations assigned to the attributes, wherein the restrictions are Boolean expressions defining whether said value combinations are valid; determining a set of valid value combinations for the attributes that satisfy the restrictions to define the test space for verifying the system behavior; and determining relevant auxiliary variables and a corresponding function for said auxiliary variables to reduce the complexity associated with modeling the test space. | 2012-12-20 |
20120324287 | COMPUTING DEVICE AND METHOD FOR EXECUTING TEST PROGRAMS IN COMMAND-LINE INTERFACE - A computing device and method executes one or more test programs in a command-line interface (CLI). The computing device downloads one or more test programs for testing one or more parts from a server. The computing device sends the one or more test programs to the SUT via a specific cable, wherein the specific cable can transmit the one or more test programs at different baud rates. The computing device starts the CLI and control the SUT to execute the one or more test programs via the CLI, and receives a test report from the SUT after the one or more parts has been tested. | 2012-12-20 |
20120324288 | COMPUTING DEVICE AND METHOD FOR TESTING REDUNDANT ARRAY OF INDEPENDENT DISKS DEVICE - A computing device and method tests a redundant array of independent disks (RAID) device. The computing device controls a power supply device to cut off power of the RAID device, and controls the power supply device to provide the power to the RAID device after a predetermined time. The computing device reads an original test file from the RAID device and determines if the read file is identical to the original test file stored in the computing device. The computing device displays a test result of the RAID device on a display device of the computing device. | 2012-12-20 |
20120324289 | METHOD AND APPARATUS FOR TESTING DATA WAREHOUSES - Disclosed is a method of qualifying a change to software modules in a data warehouse comprising a database storing a plurality of data sets and said plurality of warehouse software modules, the method comprising determining if a change has been made to any of the software modules; selecting the software modules which are affiliated with the change to construct a reduced schedule of software modules; identifying the tests which are affiliated with the change to thereby identify a reduced set of tests; executing the reduced schedule of warehouse software; running the reduced set of tests; and if no warehouse software execution errors arise and no warehouse test execution errors or failures arise, qualifying the change to the one or more software modules as a success. | 2012-12-20 |
20120324290 | Key Based Cluster Log Coalescing - An approach is provided to trace a software program running in a multi-nodal complex computing environment. A trace request is sent from a requestor node to the nodes with the trace request associated with the software program and also associated with a transaction identifier. The software program is executed on the nodes. While the program is executing, trace data entries resulting from the execution of the software program are logged at the respective nodes with each trace data entry being associated with the transaction identifier. A log request is subsequently sent from the requestor node to the other nodes. The resulting trace data is then received by the requestor node from the target nodes and logged in a transaction based log. The transaction-based log is then provided to a user of the requestor node. | 2012-12-20 |
20120324291 | TIME-GAP DEFECT DETECTION APPARATUS AND METHOD - A programmatic time-gap defect correction apparatus and method corrects errors which may go undetected by a computer system. Buffer underruns or overruns, which may incur errors in data transfers, yet remain undetected and uncorrected in a computer system, are corrected by an error avoidance module in accordance with the invention. Bytes transferred to and from buffers, used by an I/O controllers to temporarily store data while being transferred between synchronous and asynchronous devices, are counted and an error condition is forced based on the count. If the count exceeds the capacity of the buffer, an error condition is forced, thereby reducing chances that errors are incurred into the data transfer. | 2012-12-20 |
20120324292 | DYNAMIC COMPUTER PROCESS PROBE - An apparatus, system, and method are disclosed for probing a computer process. A probe parameter module determines a process identifier, a probe interval, and a probe action. The process identifier uniquely identifies a computer process. A start timer module starts a timer with a timer interval in response to the computer process entering an executing state on a processor core. The timer interval is based on the probe interval and on an amount of time elapsed between a probe start time and the computer process entering the executing state on the processor core. An action module executes the probe action in response to the timer satisfying the timer interval while the computer process is in the executing state on the processor core. | 2012-12-20 |
20120324293 | CONFIGURING A GENERIC COMPUTING DEVICE UTILIZING SPECIFIC COMPUTING DEVICE OPERATION INFORMATION - A method begins with the specific computing device token sending a distributed storage network (DSN) access request to DSN memory via the generic computing device. The DSN access request identifies specific computing device operation information that is stored as one or more of-sets of encoded data slices in the DSN memory. The method continues with the specific computing device token receiving the one or more of sets of encoded data slices from the DSN memory via the generic computing device and decoding the one or more of sets of encoded data slices to retrieve the specific computing device operation information. The method continues with enabling the generic computing device to function as a specific computing device in accordance with the specific computing device operation information. | 2012-12-20 |
20120324294 | MEMORY DIAGNOSTIC METHOD, MEMORY DIAGNOSTIC DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - In a memory diagnostic method, a fixed domain stores data that are not changed during process execution. A variable domain stores data that are subject to writing during process execution. A fixed domain diagnostic part adds an error-detecting code to data to be stored in the fixed domain. The fixed domain diagnostic part compares an error-detecting code calculated from data read from the fixed domain with the added error-detecting code to determine whether there is any data error. A variable domain diagnostic part temporarily stores data stored in the variable domain in a memory region different from the memory storing the data, and writes known data in the variable domain where the temporarily stored data were stored. The variable domain diagnostic part reads data from the region where the known data were written and determines whether the data is the same as the written known data. | 2012-12-20 |
20120324295 | METHOD FOR VISUALIZING A PROGRAM EXECUTION - A method for visualizing execution of a program includes the steps of representing the program graphically as a flow diagram, and applying a marking to elements of the flow diagram as a function of state data of a state of the program that is being executed or has been executed. | 2012-12-20 |
20120324296 | SYSTEM AND METHOD FOR BUS NETWORK FAULT DETECTION - Systems for helping identify faults on a bus, as well as to determine the topology of a bus network, are disclosed. A system according to one embodiment includes a bus interface for connecting to a bus and a switch coupled to the bus interface, the switch configured to alternate between an open state and a closed state. The system is connected to the bus via the bus interface when the switch is in the closed state, and the system is disconnected from the bus via the bus interface when the switch is in the open state. | 2012-12-20 |
20120324297 | FRAMEWORK FOR MANAGING FAILURES IN OUTBOUND MESSAGES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN), a request from a requesting node for an establishment of a first service data flow (SDF); generating a first rule set for implementing the first SDF in response to the request; transmitting a first rule of the rule set to a first node for installation of the first rule; waiting for a period of time for a response from the first node; determining from the response whether installation of the first rule at the first node failed or succeeded; and if installation of the first rule succeeded, transmitting a second rule of the first rule set to a second node for installation of the second rule. | 2012-12-20 |
20120324298 | MEMORY DEVICE REPAIR APPARATUS, SYSTEMS, AND METHODS - Apparatus, systems, and methods are disclosed, such as those that operate within a memory device to replace one or more selected failing memory cells with one or more repair memory cells and to correct data digits read from other failing memory cells in the memory device using a different method. Additional apparatus, systems, and methods are disclosed. | 2012-12-20 |
20120324299 | FLASH STORAGE WEAR LEVELING DEVICE AND METHOD - A flash storage device performs wear-leveling by tracking data errors that occur when dynamic data is read from a storage block of the flash storage device and moving the dynamic data to an available storage block of the flash storage device. Additionally, the flash storage device identifies a storage block containing static data and moves the static data to the storage block previously containing the dynamic data. | 2012-12-20 |
20120324300 | COMPUTER SYSTEM, ACTIVE SYSTEM COMPUTER, AND STANDBY SYSTEM COMPUTER - Upon a receipt of an advance notice, an active system computer on which asynchronous replication is performed with a standby system computer stops a business application and transmits to the standby system computer transmission start information indicating start of data synchronization, data accumulated in a transmission queue | 2012-12-20 |