G06F11/2268

HANDSHAKING METHOD AND DATA STORAGE SYSTEM
20240354212 · 2024-10-24 · ·

Disclosed is a handshaking method applied to a data storage system including a host system and a data storage device. The handshaking method includes the following steps: applying for a host memory buffer from the host system by the data storage device; transmitting, by the host system, a command descriptor to the host memory buffer, so that the data storage device performs standalone behavior based on the command descriptor in the host memory buffer, and transmits an operation log corresponding to the standalone behavior to the host memory buffer; and continuously monitoring, by the host system, the host memory buffer until the data storage device completes the standalone behavior and transmits a response descriptor to the host memory buffer. Therefore, the host memory buffer is used as a communication interface between the host system and the data storage device, so that the data storage device can perform more diverse operations.

COMBINED MODEL-BASED APPROACH AND DATA DRIVEN PREDICTION FOR TROUBLESHOOTING FAULTS IN PHYSICAL SYSTEMS
20180173599 · 2018-06-21 ·

A method for diagnosing and troubleshooting failures of components of a physical system with low troubleshooting cost, according to which for each component in the system, a Model-Based Diagnosis (MBD) is used for computing the probability of causing a system failure, based on currently observed system behavior or on knowledge about the system's structure. Then the probability of causing a system failure is computed, based on its age and its survival curves. Then, it is determined whether a faulty component C should be fixed or replaced by minimizing future troubleshooting costs, being the costs of the process of diagnosing and repairing an observed failure.

TEST METHOD BASED ON DATA SWITCH, DATA SWITCH AND STORAGE MEDIUM
20240385938 · 2024-11-21 ·

A test method based on a data switch is provided. In the method, a configuration instruction sent from the upper computer is received, and the configuration instruction comprises a direction parameter of data flow and a rate parameter, the data switch is configurated according to the direction parameter of data flow and the rate parameter, and a test based on the configured data switch is performed. The method can not only realize rate conversion of data transmission between the communication devices, but also improve convenience and flexibility of port configuration.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR NETWORK TESTING AND COLLECTING GENERATIVE ARTIFICIAL INTELLIGENCE TRAINING DATA
20240378125 · 2024-11-14 ·

In some examples, a system includes a test controller and a training data collector. The test controller is configured for receiving a test case including test case definition information defining a network test for a system under test (SUT); determining test system resource information for test system resources configured to execute the test case; and executing the test case on the SUT. The training data collector is configured for collecting at least a portion of the test case definition information; collecting SUT status information or SUT configuration information or both for the SUT; collecting metadata associated with the test case including at least one test context label; and processing collected data to produce artificial intelligence training data.

Protocol Aware Testing Engine for High Speed Link Integrity Testing
20180095844 · 2018-04-05 ·

Embodiments are generally directed to a protocol aware testing engine for high speed link integrity testing. An embodiment of a processor includes a processing core for processing data; and a protocol aware testing engine, wherein the protocol aware testing engine includes a protocol aware packet generator to generate test packets in compliance with an IO protocol, and a packet aligning and checking unit to align test packets generated by the packet generator with returned test packets and to compare the generated test packets with the returned data packets.

METHOD AND DEVICE FOR PERFORMING HARDWARE MODULE DIAGNOSTICS
20180089045 · 2018-03-29 ·

A computer implemented method, device and computer program device are provided that is under control of one or more processors that are configured with specific executable program instructions. The method identifies a candidate hardware (HW) module to be tested for a potential failure. The candidate HW module is connected through an intermediate HW module with a test management module. The test management module manages diagnostic testing for the potential failure. The method obtains first and second diagnostic tests. The first diagnostic test is associated with the intermediate HW module and the second diagnostic test is associated with the candidate HW module. The method applies the first diagnostic test to the intermediate HW module to verify operation of the intermediate HW module and applies the second diagnostic test to the candidate HW module based on verified operation of the intermediate HW module.

MANAGEMENT OF LOG DATA IN ELECTRONIC SYSTEMS
20180074933 · 2018-03-15 ·

The disclosed method comprises receiving operating environment data, such as resource availability data, from connected computing devices and services, analysing the data to create one or more policies governing log data storage and upload parameters, and sending the policies to the connected devices to enable them to limit resource consumption in the management of log data.

HIERARCHICAL DATA PROCESSOR TESTER

A hierarchical data processor test system (and method) is usable to configure a hierarchical plurality of similarity operators and process predetermined input test data through a data processor under test (DPUT) to produce corresponding DPUT output data. The test system is further usable to process the DPUT output data and the predetermined output test data through at least some of the plurality of similarity operators in hierarchical order, determine a highest order similarity operator that indicates a match between the DPUT output data and the predetermined output test data, and compute a confidence score based on the highest order similarity operator that indicated the match. Based on the confidence score exceeding a threshold, the test system also may include activating the DPUT for use by non-test data.

PROCESSING METHOD, COMMUNICATION SYSTEM, AND RECORDING MEDIUM
20180004618 · 2018-01-04 · ·

A processing method executed by a processor included in a first communication device, the method includes outputting, from a first communication interface of the first communication device, a plurality of data items to a communication path between the first communication interface and a second communication interface of the second communication device while changing a communication setting value regarding the first communication interface; acquiring error information related to the outputting; storing the acquired error information as error management information acquired by associating the communication setting value with the error information; specifying a predetermined number of continuous communication setting values at which an error is not detected based on the error management information; setting a target setting value of the specified communication setting values for the first communication interface; and executing a communication process between the first communication interface for which the target setting value is set and the second communication interface.

PUFS FROM SENSORS AND THEIR CALIBRATION
20180006830 · 2018-01-04 ·

Several methods may be used to exploit the natural physical variations of sensors, to generate cryptographic physically unclonable functions (PUF) that may strengthen the cybersecurity of microelectronic systems. One method comprises extracting a stream of bits from the calibration table of each sensor to generate reference patterns, called PUF challenges, which can be stored in secure servers. The authentication of the sensor is positive when the data streams that are generated on demand, called PUF responses, match the challenges. To prevent a malicious party from generating responses, instructions may be added as part of the PUF challenges to define which parts of the calibration tables are to be used for response generation. Another method is based on differential sensors, one of them having the calibration module disconnected. The response to a physical or chemical signal of such a sensor may then be used to authenticate a specific pair of sensors.