会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Hardware-facilitated secure software execution environment
    • 硬件安全软件执行环境
    • US20100122095A1
    • 2010-05-13
    • US11707951
    • 2007-02-20
    • Mark T. JonesPeter M. AthanasCameron D. PattersonJoshua N. EdmisonAnthony MaharBenjamin J. MuzalBarry L. PolakowskiJonathan P. Graf
    • Mark T. JonesPeter M. AthanasCameron D. PattersonJoshua N. EdmisonAnthony MaharBenjamin J. MuzalBarry L. PolakowskiJonathan P. Graf
    • G06F21/22G06F12/14H04L9/28H04L9/14
    • G06F21/53G06F21/72
    • A hardware-facilitated secure software execution environment provides protection of both program instructions and data against unauthorized access and/or execution to maintain confidentiality and integrity of the software or the data during distribution, in external memories, and during execution. The secure computing environment is achieved by using a hardware-based security method and apparatus to provide protection against software privacy and tampering. A Harvard architecture CPU core is instantiated on the same silicon chip along with encryption management unit (EMU) circuitry and secure key management unit (SKU) circuitry. Credential information acquired from one or more sources is combined by the SKU circuitry to generate one or more security keys provided to the EMU for use in decrypting encrypted program instructions and/or data that is obtained from a non-secure, off-chip source such as an external RAM, an information storage device or other network source. In a non-limiting illustrative example implementation, the EMU decrypts a single memory page of encrypted instructions or data per a corresponding encryption key provided by the SKU. Although instantiated on the same chip, the CPU core does not have direct access to the SKU circuitry or to encryption key information generated by the SKU.
    • 硬件便利的安全软件执行环境提供对程序指令和数据的保护,以防止未经授权的访问和/或执行,以在分发,外部存储器和执行期间保持软件或数据的机密性和完整性。 安全计算环境通过使用基于硬件的安全方法和装置来提供防止软件隐私和篡改的保护来实现。 哈佛架构CPU内核与加密管理单元(EMU)电路和安全密钥管理单元(SKU)电路一起在同一硅芯片上实例化。 从一个或多个源获取的凭证信息由SKU电路组合以产生提供给EMU的一个或多个安全密钥,用于解密加密的程序指令和/或从非安全的片外来源获得的数据,例如 作为外部RAM,信息存储设备或其他网络源。 在非限制性说明性示例实现中,EMU根据由SKU提供的相应加密密钥对加密指令的单个存储器页面或数据进行解密。 虽然在同一芯片上实例化,但是CPU内核不能直接访问SKU电路或者由SKU生成的加密密钥信息。
    • 4. 发明授权
    • Hetergeneous method for determining module placement in FPGAs
    • 用于确定FPGA中模块放置的Hetergeneous方法
    • US06457164B1
    • 2002-09-24
    • US09608694
    • 2000-06-29
    • L. James HwangEric F. DellingerSujoy MitraSundararajarao MohanCameron D. PattersonRalph D. Wittig
    • L. James HwangEric F. DellingerSujoy MitraSundararajarao MohanCameron D. PattersonRalph D. Wittig
    • G06F1750
    • G06F17/5072
    • The invention provides parametric modules called Self Implementing Modules (SIMs) for use in programmable logic devices such as FPGAS. The invention further provides tools and methods for generating and using SIMs. SIMs implement themselves at the time the design is elaborated, targeting a specified FPGA according to specified parameters. In one embodiment, a SIM references or includes one or more floorplanners each of which may employ one or more placement algorithms. Such placement algorithms might include, for example: a linear ordering algorithm that places datapath logic bitwise in a regular linear pattern; a rectangular mesh algorithm that implements memory in a grid pattern in distributed RAM; a columnar algorithm for counters and other arithmetic logic; or a simulated annealing algorithm for random logic such as control logic. Therefore, a design including more than one SIM can utilize a plurality of placement algorithms at the same or different levels of hierarchy. The design as a whole can therefore utilize a non-uniform global placement strategy.
    • 本发明提供了在诸如FPGAS之类的可编程逻辑器件中使用的称为自实现模块(SIM)的参数模块。 本发明还提供了用于生成和使用SIM的工具和方法。 在设计时,SIMs实现自己,根据指定的参数对指定的FPGA进行定位。 在一个实施例中,SIM引用或包括一个或多个楼层布置器,每个楼层布置器可以采用一个或多个布置算法。 这样的放置算法可以包括例如:将数据路径逻辑按位地放置在规则线性模式中的线性排序算法; 在分布式RAM中实现网格图案中的存储器的矩形网格算法; 计数器和其他算术逻辑的柱状算法; 或用于诸如控制逻辑的随机逻辑的模拟退火算法。 因此,包括多于一个SIM的设计可以利用相同或不同层级的多个放置算法。 因此,整体设计可以利用不均匀的全球布局策略。
    • 5. 发明授权
    • Method for structured layout in a hardware description language
    • 硬件描述语言中结构化布局的方法
    • US06430732B1
    • 2002-08-06
    • US09246253
    • 1999-02-08
    • L. James HwangCameron D. PattersonSujoy Mitra
    • L. James HwangCameron D. PattersonSujoy Mitra
    • G06F1750
    • G06F17/5072
    • A method is provided for structured layout of design objects in a hardware description language (HDL). Standard features of the HDL are used to specify a first-level design object and the placement of other design objects in the first-level design object. A first-level design object is declared, wherein the first design object has no input or output ports and has one or more slots available for one or more second-level design objects. Values are assigned to attributes of the first-level design object to indicate placement for the second-level design objects within the first-level design object. The second-level design objects are declared as elements within the first-level design object, and the first- and second-level design objects are thereafter compiled.
    • 提供了一种用于硬件描述语言(HDL)中的设计对象的结构化布局的方法。 HDL的标准功能用于指定一级设计对象和其他设计对象在第一级设计对象中的放置。 声明第一级设计对象,其中第一设计对象没有输入或输出端口,并且具有一个或多个可用于一个或多个二级设计对象的时隙。 值被分配给第一级设计对象的属性,以指示第一级设计对象中的二级设计对象的放置。 二级设计对象在第一级设计对象中被声明为元素,之后编译第一级和第二级设计对象。
    • 6. 发明授权
    • Core template package for creating run-time reconfigurable cores
    • 用于创建运行时可重构核心的核心模板包
    • US07143418B1
    • 2006-11-28
    • US10013764
    • 2001-12-10
    • Cameron D. Patterson
    • Cameron D. Patterson
    • G06F9/00
    • G06F17/5027G06F8/447
    • A method and apparatus for creating run-time reconfigurable cores using a core template package. The core template package provides an object-oriented application programming interface for specifying run-time reconfigurable (RTR) electronic circuit designs in a RTR application program. A run-time parameterizable (RTP) core library includes a plurality of predefined RTP core classes that implement selected functions in an electronic circuit design when invoked from an RTR application program. An RTP core template package includes a plurality of template classes. Each template class has a predefined set of method interfaces and fields. The RTP core template package further includes an RTP core template class that includes methods for building, connecting and traversing a hierarchy of RTP core objects based on the template classes and the predefined RTP core classes.
    • 一种用于使用核心模板包创建运行时可重构核心的方法和装置。 核心模板包提供了一种面向对象的应用程序编程接口,用于在RTR应用程序中指定运行时可重配置(RTR)电子电路设计。 运行时可参数化(RTP)核心库包括多个预定义的RTP核心类,其在从RTR应用程序调用时实现电子电路设计中的所选功能。 RTP核心模板包包括多个模板类。 每个模板类都有一组预定义的方法接口和字段。 RTP核心模板包还包括RTP核心模板类,其包括基于模板类和预定义的RTP核心类构建,连接和遍历RTP核心对象的层次结构的方法。
    • 8. 发明授权
    • Hardware-facilitated secure software execution environment
    • 硬件安全软件执行环境
    • US08473754B2
    • 2013-06-25
    • US11707951
    • 2007-02-20
    • Mark T. JonesPeter M. AthanasCameron D. PattersonJoshua N. EdmisonAnthony MaharBenjamin J. MuzalBarry L. PolakowskiJonathan P. Graf
    • Mark T. JonesPeter M. AthanasCameron D. PattersonJoshua N. EdmisonAnthony MaharBenjamin J. MuzalBarry L. PolakowskiJonathan P. Graf
    • G06F11/30H04L9/32H04L9/00H04K1/00
    • G06F21/53G06F21/72
    • A hardware-facilitated secure software execution environment provides protection of both program instructions and data against unauthorized access and/or execution to maintain confidentiality and integrity of the software or the data during distribution, in external memories, and during execution. The secure computing environment is achieved by using a hardware-based security method and apparatus to provide protection against software privacy and tampering. A Harvard architecture CPU core is instantiated on the same silicon chip along with encryption management unit (EMU) circuitry and secure key management unit (SKU) circuitry. Credential information acquired from one or more sources is combined by the SKU circuitry to generate one or more security keys provided to the EMU for use in decrypting encrypted program instructions and/or data that is obtained from a non-secure, off-chip source such as an external RAM, an information storage device or other network source. In a non-limiting illustrative example implementation, the EMU decrypts a single memory page of encrypted instructions or data per a corresponding encryption key provided by the SKU. Although instantiated on the same chip, the CPU core does not have direct access to the SKU circuitry or to encryption key information generated by the SKU.
    • 硬件便利的安全软件执行环境提供对程序指令和数据的保护,以防止未经授权的访问和/或执行,以在分发,外部存储器和执行期间保持软件或数据的机密性和完整性。 安全计算环境通过使用基于硬件的安全方法和装置来提供防止软件隐私和篡改的保护来实现。 哈佛架构CPU内核与加密管理单元(EMU)电路和安全密钥管理单元(SKU)电路一起在同一硅芯片上实例化。 从一个或多个源获取的凭证信息由SKU电路组合以产生提供给EMU的一个或多个安全密钥,用于解密加密的程序指令和/或从非安全的片外来源获得的数据,例如 作为外部RAM,信息存储设备或其他网络源。 在非限制性说明性示例实现中,EMU根据由SKU提供的相应加密密钥对加密指令的单个存储器页面或数据进行解密。 虽然在同一芯片上实例化,但是CPU内核不能直接访问SKU电路或者由SKU生成的加密密钥信息。