Test Sequence At Power-up Or Initialization Patents (Class 714/36)
  • Patent number: 10896093
    Abstract: A method and system for improving system maintenance is provided. The method includes detecting software applications, associated processes, and associated services being currently executed via a server system. A script describing the software applications, associated processes, and associated services is generated and a server system reboot process is detected. After the reboot process has executed, it is detected that the server system is currently operational and the script is executed. Each software application is associated with processes and services and it is detected if each software application is fully operational. In response, an operation process associated with the server system is executed.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: January 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Erik Rueger
  • Patent number: 10802076
    Abstract: An oscillator includes a resonator, a circuit device that is electrically coupled to the resonator and generates a clock signal, and an output terminal that is electrically coupled to the circuit device and outputs the clock signal. The circuit device includes an abnormality detection circuit, and when an abnormal state is detected by the abnormality detection circuit, the circuit device changes a signal characteristic of the clock signal.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: October 13, 2020
    Assignee: Seiko Epson Corporation
    Inventor: Jun Uehara
  • Patent number: 10783088
    Abstract: Methods, systems, and computer devices are included for data backup. An example method includes receiving an activation signal from a hardware input of a data storage device that is operating in a read-only mode. In response to receiving the activation signal, a backup application is provided from the data storage device to a computing device that is communicatively coupled to the data storage device. An authenticated session is established between the data storage device and the backup application that is executed on the computing device. Backup data from the computing device is received via the authenticated session. The authenticated session causes the data storage device to operate in at least a write mode with respect to the received backup data during the authenticated session. The received backup data is written to the data storage device. If the authenticated session is terminated, the data storage device returns to a read-only mode.
    Type: Grant
    Filed: December 21, 2017
    Date of Patent: September 22, 2020
    Assignee: RED HAT, INC.
    Inventor: Stan Silvert
  • Patent number: 10614232
    Abstract: A system and method improves digital security in a computer by adding an electronic circuit. The electronic circuit stores sensitive data in an un-erasable state such that the sensitive data may not be altered. The electronic circuit limits transfer of the sensitive data only once after each power-up or after each reset of the computer. The electronic circuit prevents access to the sensitive data by an authorized program. The electronic circuit utilizes its own storage medium and a random access memory, the latter of which can receive and store the sensitive data from the non-transitory computer storage medium. The method includes hosting on the computer a software driver and a copy-of-copy of first security key obtained from the sensitive data stored on the electronic circuit. The software driver is operable to install a software module on the computer using the copy-of-copy of first security key to encrypt each installed file.
    Type: Grant
    Filed: September 10, 2018
    Date of Patent: April 7, 2020
    Inventor: John Almeida
  • Patent number: 10552057
    Abstract: A method, non-transitory computer readable medium and storage server computing device that determines when a generated storage operation corresponds with one of a set of predefined storage operations. The storage operation is executed and a result of the execution of the storage operation is withheld from a file system, when the determining indicates that the storage operation corresponds with one of the set of predefined storage operations. A determination is made when a consistency point operation has completed. The result of the execution of the storage operation is presented to the file system, when the determining indicates that a consistency point operation has completed. This technology reduces the number of storage operations that are required to be journaled to maintain consistency of a file system, thereby reducing the runtime resources required to facilitate the journaling and replay resource required to replay the storage operations in a journal following a recovery.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: February 4, 2020
    Assignee: NetApp, Inc.
    Inventors: Ram Kesavan, Ananthan Subramanian, Hiroshi Ishii, Abdul Basit, Joseph Brown, Jr., Rohit Singh
  • Patent number: 10552812
    Abstract: This disclosure provides a computer implemented method comprising: determining whether an input to a program matches a predetermined scenario; and recording, at least partially in response to the determination that the input matches the predetermined scenario, execution information of execution of at least part of the program, the execution of the at least part of the program being in response to the input.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Si Bin Fan, Xiao Feng Guan, You Peng Huang, Zhao Juan Li, Rong Xiang, Rong Zhao
  • Patent number: 10546279
    Abstract: This disclosure provides a computer implemented method comprising: determining whether an input to a program matches a predetermined scenario; and recording, at least partially in response to the determination that the input matches the predetermined scenario, execution information of execution of at least part of the program, the execution of the at least part of the program being in response to the input.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Si Bin Fan, Xiao Feng Guan, You Peng Huang, Zhao Juan Li, Rong Xiang, Rong Zhao
  • Patent number: 10534620
    Abstract: Systems and methods for establishing Core Root of Trust Measurement (CRTM) for Basic Input/Output (BIOS) image recovery are described. In some embodiments, an Information Handling System (IHS) may include a processor and a BIOS coupled to the processor, the BIOS having program instructions that, upon execution, cause the IHS to: during a boot process, verify integrity of a BIOS recovery image using a CRTM, and determine whether to restore the BIOS recovery image in response to the verification.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: January 14, 2020
    Assignee: Dell Products, L.P.
    Inventors: Balasingh Ponraj Samuel, Ricardo L. Martinez, Richard M. Tonry, Wai-Ming Richard Chan
  • Patent number: 10445238
    Abstract: Methods and apparatus are provided for executing a transaction in a data processing system, responsive to each memory access of the transaction, a transaction log is updated in a persistent memory. After execution of the transaction and when the transaction log is complete, the transaction log is marked as ‘pending’. When all values modified in the transaction have been written back to the persistent memory, the transaction log is marked as ‘free’. When, following a reboot, a transaction log is marked as ‘pending’, data stored in the transaction log is copied to the persistent memory at addresses indicated in the transaction log. After the copying is complete, the transaction log is marked as ‘free’. Cache values modified in the transaction may be written back to persistent memory when evicted, and values read in the transaction may be read from the cache rather than from the transaction log.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: October 15, 2019
    Assignee: Arm Limited
    Inventors: Stephan Diestelhorst, Wei Wang
  • Patent number: 10268822
    Abstract: According to one example for verifying firmware module execution privilege, a firmware is booted on a processor. At least one firmware module in the firmware marked as a test module is identified, and verification with a production public key of metadata associated with the firmware is attempted. In an example, in the event that the metadata verifies successfully with the production public key, the firmware boot is halted when the processor determines that access to a video interface is available, and a user is alerted that a test module has attempted execution in a production firmware.
    Type: Grant
    Filed: December 1, 2014
    Date of Patent: April 23, 2019
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Christopher H Stewart, Venkatesh Yarraguntla, Dallas M Barlow
  • Patent number: 10204232
    Abstract: The apparatus includes a management unit configured to manage an access right that is assigned to each of a plurality of users, and a storage unit configured to store a plurality of scenarios including the adjusting operation of the apparatus and a first access level that is assigned to each of the scenarios. Furthermore, the apparatus determines whether or not a scenario can be executed with the access right given to a user, by comparing the access right of the user with the first access level stored in the storage unit, and displays, before the scenario is executed, at least one of the plurality of scenarios on a display unit such that the determination result can be displayed identifiably.
    Type: Grant
    Filed: August 1, 2013
    Date of Patent: February 12, 2019
    Assignee: Canon Kabushiki Kaisha
    Inventor: Nobuyuki Kojima
  • Patent number: 10181042
    Abstract: A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space. The system includes SED management software configured to be loaded in the pre-boot region of the SED. The SED management software includes a pre-boot operating system (OS) and an unlocking program. The unlocking program is configured (a) to execute within the pre-boot OS, and (b) upon successful authentication of a user, to unlock the nominal space of the SED. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: January 15, 2019
    Assignee: Softex, Incorporated
    Inventors: Apurva M. Bhansali, Mehul R. Patel, Kamal M. Dhanani, Rajnish S. Chauhan, David Cheung
  • Patent number: 10146627
    Abstract: Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.
    Type: Grant
    Filed: October 5, 2017
    Date of Patent: December 4, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Yang Yu, Chang-Eun Choi, Kyung Ho Kim, Walter Jun, Wonchuri Zoo, Robert Brennan
  • Patent number: 10120696
    Abstract: A method and a device for controlling usability of a communication device having a processing unit including a memory for storing computer code, a modem, an access circuit connected to the modem for cellular network authentication and access, and a secure element connected to the access circuit. A boot of the processing unit and the secure element can be initiated at power up of the device. A boot service in the secure element can be executed, and a current state of a state machine in the secure element can be determined. Thereafter, a partition of an operating system can be booted, where the partition is selected dependent on said current state of the state machine.
    Type: Grant
    Filed: March 19, 2015
    Date of Patent: November 6, 2018
    Assignees: Sony Corporation, Sony Mobile Communications Inc.
    Inventor: David Berthet
  • Patent number: 10083045
    Abstract: In an approach to allowing a computer to boot from a user trusted device (UTD), the computer comprises a data storage device storing operating system (OS) services, and a version of an OS loader. The UTD is connectable to the computer and stores a boot loader, detectable by a firmware executing at the computer, and an OS loader, and wherein the UTD prevents an unauthenticated user to modify the boot loader and the OS loader stored thereon. The computer then, upon connection, lets the boot loader be detected by the firmware for execution of the boot loader at least partly at the computer, to cause to transfer the OS loader from the UTD to the computer, and executes the transferred OS loader at least partly from the computer, to execute at least one crypto driver for the OS, to start the OS services and complete booting of the computer.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventor: Thomas Gschwind
  • Patent number: 9927990
    Abstract: According to an embodiment, a memory system includes: a non-volatile memory; an encoding unit that generates a code word in which zero and one occur at different occurrence rates by encoding data; and a control unit that writes k third data items and fourth data items into the non-volatile memory. The k is an integer larger than or equal to zero and smaller than or equal to n. The n is an integer larger than or equal to two. The k third data items are obtained by encoding k second data items with the encoding unit among first data items including n second data items and having a first data length. The fourth data items are obtained by removing data corresponding to the k third data items from the first data items. The third data items are generated by encoding the second data items with encoders, respectively.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: March 27, 2018
    Assignee: TOSHIBA MEMORY CORPORATION
    Inventors: Osamu Torii, Tokumasa Hara, Hironori Uchikawa
  • Patent number: 9921929
    Abstract: Systems, methods, computer readable media and apparatuses for executing one or more test cases associated with verifying a functionality of a computer system, software application, or the like are presented. The test cases may be received by a system and may be prioritized and integrated into an existing queue of test cases based on the determined priority. In some examples, a configuration for a computing device to execute the test cases may be identified and transmitted to one or more computing devices available to or scheduled to execute the test cases. Accordingly, the test cases may be dynamically allocated to available computing devices for execution. In some arrangements, one or more reports may be generated and/or transmitted reporting the results of the execution of the test cases. The reports may be accessible via the system and/or may be transmitted to a user via, for example, an email message.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: March 20, 2018
    Assignee: Bank of America Corporation
    Inventor: Jay Holden
  • Patent number: 9916443
    Abstract: Various techniques for detection of malware that attempt to exploit a memory allocation vulnerability are disclosed. In some embodiments, a system, process, and/or computer program product for detecting an attempt to exploit a memory allocation vulnerability includes receiving a malware sample; monitoring an array operation performed by the malware sample using a memory monitoring component; and determining whether the array operation performed by the malware sample is suspicious. For example, an array operation, such as a vector operation performed by an application that is executed using an ActionScript virtual machine, can be monitored to detect any suspicious vector operations.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: March 13, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Bo Qu, ChienHua Lu, Tao Yan, Jiangxia Liu
  • Patent number: 9870802
    Abstract: Some embodiments provide a method for editing a composite presentation in a media-editing application. The method receives a media file to import into the media-editing application from an external device. The method creates a set of media clip data structures to represent the media file. At least one of the data structures references the media file on the external device. Before the media file is imported from the external device, the method uses the media clip data structure to edit a composite presentation with the media file. After the media file is imported from the external device, automatically modifying the data structure to refer to a copy of the media file on a local device.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: January 16, 2018
    Assignee: APPLE INC.
    Inventors: Kenneth M. Carson, Nils Angquist, Sean C. Perkins, Satoshi Yamamoto, Andrew S. Demkin, Simon J. D. Gornall, Colleen Pendergast
  • Patent number: 9823972
    Abstract: Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.
    Type: Grant
    Filed: March 19, 2015
    Date of Patent: November 21, 2017
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Yang Yu, Chang-Eun Choi, Kyung Ho Kim, Walter Jun, Wonchuri Zoo, Robert Brennan
  • Patent number: 9824226
    Abstract: Methods, systems and storage media are disclosed for enhanced system boot processing that authenticates boot code based on biometric information of the user before loading the boot code to system memory. For at least some embodiments, the biometric authentication augments authentication of boot code based on a unique platform identifier. The enhanced boot code authentication occurs before loading of the operating system, and may be performed during a Unified Extensible Firmware Interface (UEFI) boot sequence. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: November 21, 2017
    Assignee: INTEL CORPORATION
    Inventors: Qian Ouyang, Jian J. Wang, Vincent J. Zimmer, Michael A. Rothman, Chao B. Zhang
  • Patent number: 9716646
    Abstract: In accordance with embodiments disclosed herein, there is provided systems and methods for using thresholds to gate timing packet generation in a tracing system (TS). For example, the method may include generating and outputting a trace data (TD) packet into a packet log. The method also includes generating and outputting a timing packet (TM) corresponding to the TD packet into the packet log when a number of clock cycles elapsed since an output of a previous TM packet exceeds a clock threshold value.
    Type: Grant
    Filed: July 17, 2014
    Date of Patent: July 25, 2017
    Assignee: Intel Corporation
    Inventors: Tsvika Kurts, Beeman C. Strong, Ofer Levy, Gabi Malka, Zeev Sperber
  • Patent number: 9678852
    Abstract: An apparatus for processing data is disclosed in which the operations of data processing circuitry are monitored by one or more trace data sources which generate items of trace data indicative of the data processing operations performed by the data processing circuitry. Trace data source identifiers in a resulting trace stream indicate the source of items of trace data and a selected trace data source identifier is included in the trace stream in response to a received flush request signal. All items of trace data generated before the apparatus received the flush request signal are included in the trace stream before the selected trace data source identifier, such that the conclusion of the response of the apparatus to the flush request signal can be identified.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: June 13, 2017
    Assignee: ARM Limited
    Inventor: John Michael Horley
  • Patent number: 9665380
    Abstract: A technique for booting a computing device using a boot image that is downloaded from a distributed network booting system involves identifying a tracker computing device that manages a plurality of computing devices that store all or a portion of the boot image, receiving from the tracker computing device information about one or more computing devices from which to download the boot image, and downloading the boot image from the one or more computing devices.
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: May 30, 2017
    Assignee: VMware, Inc.
    Inventors: Daniel Kerry Hiltgen, Suresh Sundriyal, Wit Riewrangboonya
  • Patent number: 9600325
    Abstract: Aspects of the present invention are directed at providing safe and efficient ways for a program to perform a one-time initialization of a data item in a multi-threaded environment. In accordance with one embodiment, a method is provided that allows a program to perform a synchronized initialization of a data item that may be accessed by multiple threads. More specifically, the method includes receiving a request to initialize the data item from a current thread. In response to receiving the request, the method determines whether the current thread is the first thread to attempt to initialize the data item. If the current thread is the first thread to attempt to initialize the data item, the method enforces mutual exclusion and blocks other attempts to initialize the data item made by concurrent threads. Then, the current thread is allowed to execute program code provided by the program to initialize the data item.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: March 21, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Arun Kishan, Neill M. Clift
  • Patent number: 9575819
    Abstract: A technique is described for generating error buffer that includes errors from both a program and event handlers called by the program. A program in an event-driven environment triggers an event. In response to the triggered event, the program calls event handlers related to the event. The event handlers are executed and error messages generated during the execution are stored in a local error buffer. Upon completion of the event handlers, the local error buffers are returned to the program and the program merges the local error buffers with an error buffer associated with the program.
    Type: Grant
    Filed: September 6, 2013
    Date of Patent: February 21, 2017
    Assignee: SAP SE
    Inventors: Stefan Baeuerle, Timm Falter, Daniel Hutzel
  • Patent number: 9343181
    Abstract: Techniques for handling errors on memory modules are provided. An uncorrected error from a pair of memory modules may be received. Memory modules other than the pair of memory modules producing the error may be de-configured. Diagnostic tests may be run on the faded pair of memory modules. The memory module of the pair of memory modules that caused the uncorrected error may be determined.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: May 17, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Shivanna Suhas, Ramaiah Mahesh, Suresh Brinda Yelandur, Malhotra Sunil
  • Patent number: 9323541
    Abstract: Technologies are provided in example embodiments for determining that a module is to be loaded, the module being associated with module code, determining that the module is a frozen module, the frozen module being associated with frozen module code, determining that a module fingerprint of the module fails to correspond with a frozen module fingerprint of the frozen module, and causing loading of the frozen module code instead of the module code.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: April 26, 2016
    Assignee: Intel Corporation
    Inventors: Qin Long, Ting Ye, Vincent Zimmer, Jiewen Yao
  • Patent number: 9288222
    Abstract: A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer system to access the Internet. A method for protecting a computer system includes reading stored status information indicating whether network connectivity was available the last time an operating system of the computer system was operational, when the stored status information indicates that network connectivity was not available, obtaining a software patch, and executing and applying the software patch.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: March 15, 2016
    Assignee: McAfee, Inc.
    Inventors: Akos Horvath, Alessandro Faieta
  • Patent number: 9251347
    Abstract: In one embodiment, a method includes initializing a portion of a computing system in a pre-boot environment using a basic input/output system (BIOS) stored in a non-volatile storage of the computing system, launching a boot manager to enable a launch of an operating system (OS) payload, and if the OS payload is not successfully launched, executing an OS payload portion and an antivirus stack stored in the non-volatile storage to restore an integrity of the mass storage. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: February 2, 2016
    Assignee: Intel Corporation
    Inventors: Mallik Bulusu, Robert Swanson, Vincent Zimmer, Robert Bruce Bahnsen
  • Patent number: 9218253
    Abstract: Example embodiments relate to embedded restoration memory. In one example implementation according to aspects of the present disclosure, a computing device may include a processor for executing instructions, a memory for storing instructions, a storage device having a user operating system, and a restoration memory embedded in the computing device and having a restoration module and a restoration image. The restoration operating system may exist independently of the user operating system and may be inaccessible to the user operating system. Additionally, the restoration module may cause the computing device to install the restoration image from the restoration memory onto the storage device upon the occurrence of a trigger event.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: December 22, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Anthony M. DiMarzio, Jr.
  • Patent number: 9202059
    Abstract: A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space. The system includes SED management software configured to be loaded in the pre-boot region of the SED. The SED management software includes a pre-boot operating system (OS) and an unlocking program. The unlocking program is configured (a) to execute within the pre-boot OS, and (b) upon successful authentication of a user, to unlock the nominal space of the SED. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: December 1, 2015
    Inventors: Apurva M. Bhansali, Mehul R. Patel, Kamal M. Dhanani, Rajnish S. Chauhan, David Cheung
  • Patent number: 9195556
    Abstract: In a method for testing a booting of servers, the servers are controlled to boot to perform a booting test, and are controlled to quit the booting test. A current state of the booting test is stored in a test log, if the booting of one of the servers is unsuccessful. A system log of each server is saved in the storage device if a first component list of each server is identical to the second component list of the server. The servers are controlled to quit the booting test, and a current state of the booting test is recorded in the test log if the component list of one of the servers is not identical to the second component list the server.
    Type: Grant
    Filed: December 24, 2013
    Date of Patent: November 24, 2015
    Assignee: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: Ming-Shang Tsai, Cheng-Yu Tsai, Chung-Lun Hsu, Ho-Cheng Yang, Jui-Kun Hsieh
  • Patent number: 9183140
    Abstract: Higher-level redundancy information computation enables a Solid-State Disk (SSD) controller to provide higher-level redundancy capabilities to maintain reliable operation in a context of failures of non-volatile (e.g. flash) memory elements during operation of an SSD. A first portion of higher-level redundancy information is computed using parity coding via an XOR of all pages in a portion of data to be protected by the higher-level redundancy information. A second portion of the higher-level redundancy information is computed using a weighted-sum technique, each page in the portion being assigned a unique non-zero “index” as a weight when computing the weighted-sum. Arithmetic is performed over a finite field (such as a Galois Field). The portions of the higher-level redundancy information are computable in any order, such as an order based on order of read operation completion of non-volatile memory elements.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: November 10, 2015
    Assignee: Seagate Technology LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Leonid Baryudin, Timothy Lawrence Canepa, Earl T. Cohen
  • Patent number: 9177011
    Abstract: A system and a method for locating application-specific data that has been previously deleted and located in an address of the data storage device marked as being available for storing new data. The method includes accessing unidentified data from at least one data storage device; examining the unidentified data to detect at least one application-specific data pattern associated with at least one application; for each detected application-specific data pattern, executing an application-specific validation process to determine whether the unidentified data includes valid data associated with a corresponding application; and if it is determined that the unidentified data includes valid data associated with the corresponding application, then recovering the valid data.
    Type: Grant
    Filed: December 12, 2012
    Date of Patent: November 3, 2015
    Assignee: Magnet Forensics Inc.
    Inventor: Jad John Saliba
  • Patent number: 9146737
    Abstract: Systems and methods for detecting concurrency bugs are provided. In some embodiments, context-aware communication graphs that represent inter-thread communication are collected during test runs, and may be labeled according to whether the test run was correct or failed. Graph edges that are likely to be associated with failed behavior are determined, and probable reconstructions of failed behavior are constructed to assist in debugging. In some embodiments, software instrumentation is used to collect the communication graphs. In some embodiments, hardware configured to collect the communication graphs is provided.
    Type: Grant
    Filed: August 20, 2014
    Date of Patent: September 29, 2015
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Luis Ceze, Brandon Lucia
  • Patent number: 9146754
    Abstract: A booting method and a computer system thereof, suitable for rebooting the computer system when a setting value of a basic input output system (BIOS) is modified, are provided. When a modified setting value causes a situation in which a main power is cut off in advance and the computer system is rebooted, a control command is sent to a signal generator for controlling the signal generator to generate a control signal through the BIOS. Then, the control signal is transmitted to a switch by the signal generator for controlling the switch to be turned on or turned off. Afterwards, a power-failure signal transmitted by a chipset is changed by the switch, such that a power supply provides the main power continuously to reboot the computer system.
    Type: Grant
    Filed: December 17, 2008
    Date of Patent: September 29, 2015
    Assignee: ASUSTeK COMPUTER INC.
    Inventors: Chuan-Te Chang, Nan-Kun Lo
  • Patent number: 9086740
    Abstract: An operation input device includes a base part including a placement surface on which an inductor is placed; a displacement member including a first surface facing the placement surface and a second surface configured to receive application of a force, and configured to cause the inductance of the inductor to vary with the approach of the first surface to the placement surface due to the application of the force on the second surface; a support member configured to support the displacement member in such a manner as to allow the displacement of the displacement member; a detection part configured to detect a variation in the inductance by feeding a first pulse signal to the inductor; and a control part configured to generate a magnetic field to displace the second surface by feeding a second pulse signal different in phase from the first pulse signal to the inductor.
    Type: Grant
    Filed: October 15, 2010
    Date of Patent: July 21, 2015
    Assignee: MITSUMI ELECRIC CO., LTD.
    Inventor: Kenichi Furukawa
  • Patent number: 9063851
    Abstract: Some aspects of the present disclosure provide for a system and method for fault mitigation of a non-volatile memory (NVM) store subject to error correction code (ECC) checking. A simple and robust means to test the integrity of failsafe code stored within the non-volatile memory prior to execution are disclosed. In some embodiments, the failsafe code comprises program elements to communicate the memory failure to other parts of the system, or to execute an orderly shutdown. In the event that an ECC error occurs, the failsafe code can be verified, and upon successful verification, executed.
    Type: Grant
    Filed: November 7, 2012
    Date of Patent: June 23, 2015
    Assignee: Infineon Technologies AG
    Inventors: Dragos Poenaru, Thomas LeMense, Thomas Lange
  • Patent number: 9053323
    Abstract: A trusted component update system comprises verify logic configured to validate integrity of an update to a trusted component of a computing device, and logic disposed in the trusted component and configured to validate integrity of the verify logic.
    Type: Grant
    Filed: April 13, 2007
    Date of Patent: June 9, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Boris Balacheff, Valiuddin Y. Ali, Lan Wang
  • Patent number: 9037912
    Abstract: Disclosed are various embodiments of a computing device for acquiring a shipment manifest for a component assembly, the shipment manifest including expected asset data associated with the component assembly and a component of the component assembly. The computing device serves, via a network interface, a boot image executable by the component of the component assembly, the component including a processor. Empirical asset data associated with the component is obtained, via the network, by the computing device, the empirical asset data being supplied by the boot image. The computing device determines a validation response for the component assembly based at least upon a comparison of the empirical asset data with expected asset data.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: May 19, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Matthew D. Klein, Michael David Marr
  • Patent number: 9025784
    Abstract: Aspects for monitoring audible tones indicative of operational status of each planar in a multiple planar chassis are described. Included in the aspects is the monitoring of a speaker channel of each planar of a plurality of planars in a common chassis for state changes of beep tones. An operational status of a specific planar emitting the beep tones is identified based on the state changes.
    Type: Grant
    Filed: April 19, 2012
    Date of Patent: May 5, 2015
    Assignee: International Business Machines Corporation
    Inventors: Carl A. Morrell, William B. Schwartz
  • Publication number: 20150121141
    Abstract: In a method for testing booting of servers, the servers are controlled to boot and perform a booting test, and are controlled to quit the booting test and a current state of the booting test is stored in a test log, if the booting of one of the servers is unsuccessful. System logs of all of the servers are saved if the booting times of all of the servers do not exceed the first predefined time. An alarm device is controlled to alarm if the booting time of one of the servers exceeds the first predefined time but does not exceed the second predefined time. And the servers are controlled to quit the booting test if the booting time of one of the servers exceeds the first predefined time and further exceeds the second predefined time.
    Type: Application
    Filed: December 20, 2013
    Publication date: April 30, 2015
    Applicant: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: JUI-KUN HSIEH, HO-CHENG YANG, CHUNG-LUN HSU, CHENG-YU TSAI, MING-SHANG TSAI
  • Publication number: 20150121142
    Abstract: In a method for testing a booting of servers, the servers are controlled to boot to perform a booting test, and are controlled to quit the booting test. A current state of the booting test is stored in a test log, if the booting of one of the servers is unsuccessful. A system log of each server is saved in the storage device if a first component list of each server is identical to the second component list of the server. The servers are controlled to quit the booting test, and a current state of the booting test is recorded in the test log if the component list of one of the servers is not identical to the second component list the server.
    Type: Application
    Filed: December 24, 2013
    Publication date: April 30, 2015
    Applicant: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: MING-SHANG TSAI, CHENG-YU TSAI, CHUNG-LUN HSU, HO-CHENG YANG, JUI-KUN HSIEH
  • Publication number: 20150106655
    Abstract: A fault diagnosing method based on a simulated vaccine is provided. The fault diagnosing method comprises steps of: establishing a dynamic simulation model for simulating a start-up operation and a steady-state operation of a technological process according to process information, an operating procedure and historical data of the technological process; running the dynamic simulation model; extracting data within a first predetermined time from the simulated normal sample set to generate a normal simulated vaccine, and extracting data within a second predetermined time from the simulated fault sample set to generate a fault simulated vaccine; acquiring the historical data of the technological process; obtaining an immune antibody coefficient of the normal simulated vaccine, and generating a normal antibody library; and obtaining an immune antibody coefficient of the fault simulated vaccine, and generating a fault antibody library according to the fault simulated vaccine.
    Type: Application
    Filed: November 29, 2012
    Publication date: April 16, 2015
    Inventors: Jingsong Zhao, Yiyang Dai, Yidan Shu, Jianfeng Zhu
  • Publication number: 20150095706
    Abstract: A method comprises a system comprising a host device coupled to a first remote device actively operating according to a state diagram that the host device and all remote devices follow during operation of the system. The method further comprises powering up a second remote device while the host device and first remote device are actively operating according to the state diagram. The second remote device determines whether to initialize to a standard protocol or to an advanced protocol. Upon determining to initialize to the advanced protocol, the second remote device then waits for a synchronization point sequence.
    Type: Application
    Filed: December 15, 2014
    Publication date: April 2, 2015
    Inventor: Gary L. Swoboda
  • Publication number: 20150089293
    Abstract: A processing device boots or wakes using non-volatile logic element (NVL) array(s) that store a machine state. A standard boot sequence is used to restore a first portion of data. A second portion of data is restored, in parallel with the standard boot sequence, from the NVL array(s). A data corruption check is performed on the second portion of data. If the second data is valid, a standard boot sequence is used to restore a third portion of data. If the second data is invalid or the boot is an initial boot, a standard boot sequence is executed to determine the second portion of data, which is then stored in the NVL array(s). The processing device restores the second portion of the data during a portion of the boot/wake process that is not reading data from other non-volatile devices to avoid overloading the respective power domain.
    Type: Application
    Filed: June 19, 2014
    Publication date: March 26, 2015
    Inventors: Andreas Waechter, Mark Jung, Steven Craig Bartling, Sudhanshu Khanna
  • Publication number: 20150074461
    Abstract: A method and a relevant apparatus for starting a boot program are provided. The method includes: when a boot request is detected, determining whether a first physical block in a NAND flash is a bad block; reading first boot data stored in the first physical block if the first physical block is not a bad block; determining whether the read first boot data has a data error; re-reading the first boot data from a first backup block when the read first boot data has a data error; determining whether the first boot data that is re-read from the first backup block has a data error; when the first boot data that is re-read from the first backup block has no data error, continuing to process other boot data that needs to be read to start the boot program, until start of the boot program is complete.
    Type: Application
    Filed: September 8, 2014
    Publication date: March 12, 2015
    Inventor: Bingxu YU
  • Publication number: 20150074460
    Abstract: A computer debug module for use in a computer at least includes a power sequence monitor module. The power sequence monitor module includes a monitor unit, a register, and an output control unit. The monitor unit is configured to monitor a plurality of power sequence signals relative to the computer and generate a monitor result. The register is configured to store the monitor result. When the power sequence monitor module operates in a debug mode, the output control unit generates a detection signal according to the stored monitor result and transmits the detection signal to an output device.
    Type: Application
    Filed: November 8, 2013
    Publication date: March 12, 2015
    Applicant: NUVOTON TECHNOLOGY CORPORATION
    Inventors: Shih-Hao YEH, Shih-Hsuan YEN
  • Patent number: 8972786
    Abstract: During starting of a field device for pressure measurement, flow measurement and/or fill level measurement, which field device including a memory that includes a boot memory region in which a boot function is stored, and an operating memory region in which an operating function is stored, the following steps are carried out: carrying out the boot function; determining whether a memory check of the operating memory region is to be carried out; carrying out a memory check of the operating memory region when it has been determined that a memory check is to be carried out; and carrying out the operating function.
    Type: Grant
    Filed: October 18, 2012
    Date of Patent: March 3, 2015
    Assignee: VEGA Grieshaber KG
    Inventors: Andreas Isenmann, Martin Gaiser