w Writing of new data of a first block size in a raid array that stores both parity and data in a second block size By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size. Full Article
w Writing of new data of a first block size in a raid array that stores both parity and data in a second block size By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size. Full Article
w Sliding-window multi-class striping By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A sequence of storage devices of a data store may include one or more stripesets for storing data stripes of different lengths and of different types. Each data stripe may be stored in a prefix or other portion of a stripeset. Each data stripe may be identified by an array of addresses that identify each page of the data stripe on each included storage device. When a first storage device of a stripeset becomes full, the stripeset may be shifted by removing the full storage device from the stripeset, and adding a next storage device of the data store to the stripeset. A class variable may be associated with storage devices of a stripeset to identify the type of data that the stripeset can store. The class variable may be increased (or otherwise modified) when a computer stores data of a different class in the stripeset. Full Article
w Virtualized data storage in a network computing environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device. Full Article
w Efficient processing of cache segment waiters By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT For a plurality of input/output (I/O) operations waiting to assemble complete data tracks from data segments, a process, separate from a process responsible for the data assembly into the complete data tracks, is initiated for waking a predetermined number of the waiting I/O operations. Full Article
w Block memory engine with memory corruption detection By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Techniques for handling version information using a copy engine. In one embodiment, an apparatus comprises a copy engine configured to perform one or more operations associated with a block memory operation in response to a command. Examples of block memory operations may include copy, clear, move, and/or compress operations. In one embodiment, the copy engine is configured to handle version information associated with the block memory operation based on the command. The one or more operations may include operating on data in a cache and/or modifying entries in a memory. In one embodiment, the copy engine is configured to compare version information in the command with stored version information. The copy engine may overwrite or preserve version information based on the command. The copy engine may be a coprocessing element. The copy engine may be configured to maintain coherency with other copy engines and/or processing elements. Full Article
w Memory system with fixed and variable pointers By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A memory system includes a volatile first storing unit, a nonvolatile second storing unit, and a controller. The controller performs data transfer, stores management information including a storage position of the data stored in the second storing unit into the first storing unit, and performs data management while updating the management information. The second storing unit has a management information storage area for storing management information storage information including management information in a latest state and a storage position of the management information. The storage position information is read by the controller during a startup operation of the memory system and includes a second pointer indicating a storage position of management information in a latest state in the management information storage area and a first pointer indicating a storage position of the second pointer. The first pointer is stored in a fixed area in the second storing unit and the second pointer is stored in an area excluding the fixed area in the second storing unit. Full Article
w Moving blocks of data between main memory and storage class memory By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. Full Article
w System cache with quota-based control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and apparatuses for implementing a system cache with quota-based control. Quotas may be assigned on a group ID basis to each group ID that is assigned to use the system cache. The quota does not reserve space in the system cache, but rather the quota may be used within any way within the system cache. The quota may prevent a given group ID from consuming more than a desired amount of the system cache. Once a group ID's quota has been reached, no additional allocation will be permitted for that group ID. The total amount of allocated quota for all group IDs can exceed the size of system cache, such that the system cache can be oversubscribed. The sticky state can be used to prioritize data retention within the system cache when oversubscription is being used. Full Article
w Automatically preventing large block writes from starving small block writes in a storage device By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A mechanism is provided in a storage device for performing a write operation. The mechanism configures a write buffer memory with a plurality of write buffer portions. Each write buffer portion is dedicated to a predetermined block size category within a plurality of block size categories. For each write operation from an initiator, the mechanism determines a block size category of the write operation. The mechanism performs each write operation by writing to a write buffer portion within the plurality of write buffer portions corresponding to the block size category of the write operation. Full Article
w Prefetch optimizer measuring execution time of instruction sequence cycling through each selectable hardware prefetch depth and cycling through disabling each software prefetch instruction of an instruction sequence of interest By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A prefetch optimizer tool for an information handling system (IHS) may improve effective memory access time by controlling both hardware prefetch operations and software prefetch operations. The prefetch optimizer tool selectively disables prefetch instructions in an instruction sequence of interest within an application. The tool measures execution times of the instruction sequence of interest when different prefetch instructions are disabled. The tool may hold hardware prefetch depth constant while cycling through disabling different prefetch instructions and taking corresponding execution time measurements. Alternatively, for each disabled prefetch instruction in the instruction sequence of interest, the tool may cycle through different hardware prefetch depths and take corresponding execution time measurements at each hardware prefetch depth. The tool selects a combination of hardware prefetch depth and prefetch instruction disablement that may improve the execution time in comparison with a baseline execution time. Full Article
w Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare. Full Article
w Management of multiple software images with shared memory blocks By www.freepatentsonline.com Published On :: Tue, 09 Jun 2015 08:00:00 EDT A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure. Full Article
w Using extended asynchronous data mover indirect data address words By www.freepatentsonline.com Published On :: Tue, 25 Aug 2015 08:00:00 EDT An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. Full Article
w Using extended asynchronous data mover indirect data address words By www.freepatentsonline.com Published On :: Tue, 01 Sep 2015 08:00:00 EDT An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. Full Article
w Methanol carbonylation process with rhodium catalyst and a metallic co-catalyst selected from transition metals, zinc, beryllium, indium, tin, strontium and barium By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A carbonylation process for making acetic acid using a metallic co-catalyst composition, effective as a rhodium stabilizer and/or rate promoter, at molar ratios of metal/rhodium of about 0.5 to 40. The process includes reacting methanol with carbon monoxide in the presence of a rhodium-based catalytic metal complex with about 1 to 20 weight percent methyl iodide, less than about 8 weight % water and about 0.5 to about 30 weight percent methyl acetate. The crude acetic acid is flashed and further purified. Full Article
w Methods for production of arginine biocarbonate at low pressure By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method of producing arginine bicarbonate is provided including reacting an arginine slurry with a source of carbon dioxide gas under elevated temperature and low pressure to form a solution of at least 50% arginine bicarbonate, and recovering arginine bicarbonate from the solution. Full Article
w Process for the (AMM)oxidation of lower molecular weight alkanes and alkenes By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A process for producing unsaturated carboxylic acids or unsaturated nitriles by vapor phase oxidation reaction of their corresponding C3 to C5 alkanes, C3 to C5 alkenes, and mixtures thereof, as a hydrocarbon starting material, wherein the process performance is monitored and the path of gasses through catalyst beds is altered. Improved catalyst lifetimes may be achieved. Full Article
w Hydrocarboxylation of aqueous formaldehyde using a dehydrating recycle stream to decrease water concentration By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a process for the production and purification of glycolic acid or glycolic acid derivatives by the carbonylation of aqueous formaldehyde. The water in the hydrocarboxylation zone is reduced via reaction with the ester bonds in a recycle stream comprising glycolic acid oligomers and/or methyl glycolate oligomers. Full Article
w Method to determine responsiveness of cancer to epidermal growth factor receptor targeting treatments By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed herein are methods and reagents for determining the responsiveness of cancer to an epidermal growth factor receptor (EGFR) targeting treatment. The detection of these mutations will allow for the administration of gefitinib, erlotinib and other tyrosine kinase inhibitors to those patients most likely to respond to the drug. Full Article
w Cytosine analogue, a method of preparation of a cytosine analogue, a DNA methyltransferase 1 inhibitor, a method for DNA methylation inhibition, the use of the analogue in the treatment of diseases associated with deviations from normal DNA methylation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A cytosine analog, a method of preparation of a cytosine analog, a DNA methyltransferase 1 inhibitor, and a method for DNA methylation inhibition, is provided for the treatment of diseases associated with deviations from normal DNA methylation. The analog of cytosine may be comprised of 1, N4, 5 and 6-substituted derivatives of cytosine or 5,6-dihydrocytosine, wherein the analog can be described by the chemical formula where R1 is H, R3, R4, 2'-deoxyribosyl, R4 is alkyl or aryl, X is N or C, wherein if X in the analog of formula I is N, then R5 is no substituent and if X in the analog of formula I and/or II is C or if X in the analog of formula II is N, then R5 and R6 are independently alkyl, aryl, hydroxyalkyl, aminoalkyl, hydroxyl, carboxyl, amino group, alkoxyl, aryloxyl, aminoalkyl, aminoaryl, thio group, sulfonyl, sulfinyl or halogen. Full Article
w Electronic device provided with cryptographic circuit and method of establishing the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention provides for an electronic device having cryptographic computation means arranged to generate cryptographic data within the device for enhancing security of communications therewith, the device including an onboard power supplying means arranged to provide for the driving of the said cryptographic computational means, and so as to provide a device by way of a manufacturing phase and a post manufacturing phase arranged for distribution and/or marketing of the device, and wherein the step of generating the cryptographic data occurs during the post manufacturing phase. Full Article
w Efficient storage of encrypted data in a dispersed storage network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. Full Article
w Drawing power over network cable By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A source device to provide power through a network cable and a user device is to draw power from the network cable. A database is to store a parameter associated with the user device. The source device is to access the stored parameter based on receipt of information related to the user device and is to compare at least one of a current power drawn and an additional power requested by the user device to a power limit of the user device based on the accessed parameters. The source device is to send a power message to the user device based on the comparison, the power message to relate to an amount of the power the user device is to draw. Full Article
w Method and apparatus for power management according to a situation mode By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure discloses a power management method, for setting a power supply arrangement of an electronic device intelligently, comprising providing at least two sensors, corresponding to at least one threshold respectively; detecting a state of the electronic device for generating a detecting signal respectively; comparing the at least two detecting signals with the at least one threshold corresponding to the at least two sensors respectively; generating at least two situation signals when the at least two detecting signals meet the at least one threshold corresponding to the at least two sensors respectively; looking up a look-up table according to the at least two detecting signals for generating a control command; and writing in at least one independent bit of a register according to the control command for changing or maintaining a power supply arrangement of at least one peripheral component. Full Article
w Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked. Full Article
w Power-saving network management server, network system, and method of determining supply of power By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result. Full Article
w Energy management device and power management system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage. Full Article
w Method and apparatus for power-efficiency management in a virtualized cluster system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements. Full Article
w Processor bridge power management By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power controller can set the power state of a processor bridge based on which processor modules are in a communicative state. In addition, for a power state where selected processor modules are expected to be non-communicative, the power controller can set the supplied voltage to have a reduced voltage guard band as compared to other power states. These power management techniques can reduce the power consumed by the processor. Full Article
w Power shifting in multicore platforms by varying SMT levels By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted. Full Article
w Power management of multiple compute units sharing a cache By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state. Full Article
w Power supply control system, method, and computer program product By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption. Full Article
w Security enclave processor power control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. Full Article
w Memory controller with transaction-queue-monitoring power mode circuitry By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device. Full Article
w Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component. Full Article
w Network security appliance By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted. Full Article
w Method and apparatus for rejecting untrusted network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method of accessing a communication system and a communication device for performing the same are disclosed. The method includes transmitting, by a communication device to a node of a communication system through a communication link between the communication device and the node, a request to negotiate basic capabilities for communicating with the node, receiving, by the communication device from the node, a response to the request to negotiate basic capabilities, and, transmitting, by the communication device to the node, a request to disconnect the communication link, when the response to the request to negotiate basic capabilities indicates that the node does not support authentication. Full Article
w Enabling web page tracking By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request permission before accessing a web page. An access request is received, and based on a user profile, the access request is approved such that the mobile device may access the web page. Access data that corresponds to the mobile device accessing the web page is collected so that it can be added to and stored in a database. Full Article
w Method of processing data to enable external storage thereof with minimized risk of information leakage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk. Full Article
w Secured wireless access system and related method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access. Full Article
w Techniques to transmit commands to a target device to reduce power consumption By www.freepatentsonline.com Published On :: Tue, 09 Jun 2015 08:00:00 EDT Techniques are described to transmit commands to a display device. The commands can be transmitted in header byte fields of secondary data packets. The commands can be used to cause a target device to capture a frame, enter or exit self refresh mode, or reduce power use of a connection. In addition, a request to exit main link standby mode can cause the target enter training mode without explicit command to exit main link standby mode. Full Article
w Apparatus and method for managing power of an electronic appliance By www.freepatentsonline.com Published On :: Tue, 21 Jul 2015 08:00:00 EDT There is provided a power management apparatus including: a managed appliance registering unit carrying out authentication on an electronic appliance connected to a power network and registering an electronic appliance for which the authentication has succeeded as a managed appliance, a control unit controlling operation of the managed appliance and supplying of power to the managed appliance, a managed appliance information acquiring unit acquiring, from the managed appliance, as managed appliance information, at least any of appliance information including identification information that is unique to the electronic appliance, information indicating an operation state of the electronic appliance, information indicating an usage state of the electronic appliance and power information of the electronic appliance, and an appliance state judging unit judging a state of the managed appliance based on the managed appliance information acquired by the managed appliance information acquiring unit. Full Article
w Biometric attribute anomaly detection system with adjusting notifications By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, methods and server for monitoring health and safety of individuals in a population and sending alert notifications when exceptions are detected include comparing biometric data obtained from the individuals to a biometric model generated for the individual through computer-learning methods. Biometric data may be gathered by wireless biometric sensor devices which transmit biometric data to receiver devices, which relay the biometric data to a server. The biometric model may be maintained in the server and include nominal and threshold biometric parameters for each individual based on biometric sensor data gathered or analyzed over a period of time. An alert may be issued by the server when an individual's biometric data is outside a threshold in the biometric model. The transmitted alert may depend upon the nature of the exception, user settings and past notification experience. Alerts may be escalated when not answered within defined durations. Full Article
w System and method for detecting and preventing drowsiness By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system for preventing drowsiness in a driver by employing a thermal grill. The system includes a detection module and an intervention module. The detection module monitors a driver's parameters to determine whether the driver is drowsy. If the driver is determined to be drowsy, the intervention module activates a thermal grill with interlaced hot and cold regions. This activation causes the hot regions to approach one temperature and the cold regions to approach another. Additionally, this activation leads to an uncomfortable sensation for the driver, alerts the driver, and prevents the driver from getting drowsy. Full Article
w Slice view By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method, apparatus, article of manufacture, and computer program product display multiple slices of a three-dimensional body in a computer drawing application. A first view of a 3D body is displayed. One or more slice sketches are defined on the first view. A single slice view of the three dimensional body is displayed. The single slice view simultaneously depicts all of the slices with a zero-depth representation of each slice. Full Article
w Region-growing algorithm By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A region growing algorithm for controlling leakage is presented including a processor configured to select a starting point for segmentation of data, initiate a propagation process by designating adjacent voxels around the starting point, determine whether any new voxels are segmented, count and analyze the segmented new voxels to determine leakage levels, and identify and record segmented new voxels from a previous iteration when the leakage levels exceed a predetermined threshold. The processor is further configured to perform labeling of the segmented new voxels of the previous iteration, select the segmented new voxels from the previous iteration when the leakage levels fall below the predetermined threshold, and create a voxel list based on acceptable segmented voxels found in the previous iteration. Full Article
w Velocity measurement of MR-imaged fluid flows By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Velocity of MR-imaged fluid flows is measured. Data representing a measure of distance traveled by flowing fluid appearing in at least two MR images of a subject's tissue taken at different respective imaging times is generated. Data representing at least one fluid velocity measurement of the flowing fluid is generated by calculating at least one instance of distance traveled by the fluid divided by elapsed time during travel based on different respective imaging times. Data representing at least one fluid velocity measurement is then output to at least one of: (a) a display screen, (b) a non-transitory data storage medium, and (c) a remotely located site. Full Article
w System and method for acquiring images from within a tissue By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods for imaging within depth layers of a tissue include illuminating light rays at different changing wavelengths (frequencies), collimating illuminated light rays using a collimator, and splitting light rays using a beam splitter, such that some of the light rays are directed towards a reference mirror and some of the rays are directed towards the tissue. The systems and methods further include reflecting light rays from the reference mirror towards the imager, filtering out non-collimated light rays reflected off the tissue by using a telecentric optical system, and reflecting collimated light rays reflected off the tissue towards the imager, thus creating an image of an interference pattern based on collimated light rays reflected off the tissue and off the reference mirror. The method may further include creating full 2D images from the interference pattern for each depth layer of the tissue using Fast Fourier transform. Full Article
w Biopsy marker with in situ-generated imaging properties By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An intracorporeal marker, for marking a site within living tissue of a host, includes an outer body portion of biodegradable material. An inner body portion is located in the outer body portion. The inner body portion includes biological material that becomes calcified in the living tissue of the host over time. An agent interacts with the biological material to promote calcification of the biological material of the inner body portion in the living tissue of the host. Full Article