会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and system for random data access for security applications
    • 用于安全应用的随机数据访问的方法和系统
    • US07959073B2
    • 2011-06-14
    • US12826062
    • 2010-06-29
    • Xuemin ChenIue-Shuenn I. ChenFrancis Chi-Wai CheungLongyin Wei
    • Xuemin ChenIue-Shuenn I. ChenFrancis Chi-Wai CheungLongyin Wei
    • G06Q40/00G07D11/00G07F19/00
    • H04L9/3239G06F21/71G06F21/79H04L9/3249
    • A method for securely handling processing of information in a chip may include randomly selecting one of a plurality of data processes based on a random process index. A time interval may be randomly allocated on the chip, for processing the randomly selected one of the plurality of data processes. When the randomly allocated time interval has elapsed, the randomly selected one of the plurality of data processes may be initiated. The randomly selected one of the plurality of data processes may include one or both of accessing data and acquiring the data. Data may be verified by the randomly selected one of the plurality of data processes prior to the processing of the data. The data may be verified utilizing at least one digital signature verification algorithm, such as a Rivest-Shamir-Adelman (RSA) algorithm and/or a secure hash algorithm (SHA-1).
    • 用于安全地处理芯片中的信息处理的方法可以包括基于随机过程索引随机选择多个数据处理中的一个。 时间间隔可以随机地分配在芯片上,用于处理多个数据处理中的随机选择的一个。 当随机分配的时间间隔已经过去时,可以启动多个数据处理中的随机选择的一个。 多个数据处理中的随机选择的一个可以包括访问数据和获取数据中的一个或两个。 在处理数据之前,可以通过随机选择的多个数据处理之一来验证数据。 可以使用诸如Rivest-Shamir-Adelman(RSA)算法和/或安全散列算法(SHA-1)的至少一个数字签名验证算法来验证数据。
    • 3. 发明申请
    • METHOD AND SYSTEM FOR RANDOM DATA ACCESS FOR SECURITY APPLICATIONS
    • 用于安全应用的随机数据访问的方法和系统
    • US20100306556A1
    • 2010-12-02
    • US12826062
    • 2010-06-29
    • Xuemin ChenIue-Shuenn I. ChenFrancis Chi-Wai CheungLongyin Wei
    • Xuemin ChenIue-Shuenn I. ChenFrancis Chi-Wai CheungLongyin Wei
    • G06F12/14
    • H04L9/3239G06F21/71G06F21/79H04L9/3249
    • A method for securely handling processing of information in a chip may include randomly selecting one of a plurality of data processes based on a random process index. A time interval may be randomly allocated on the chip, for processing the randomly selected one of the plurality of data processes. When the randomly allocated time interval has elapsed, the randomly selected one of the plurality of data processes may be initiated. The randomly selected one of the plurality of data processes may include one or both of accessing data and acquiring the data. Data may be verified by the randomly selected one of the plurality of data processes prior to the processing of the data. The data may be verified utilizing at least one digital signature verification algorithm, such as a Rivest-Shamir-Adelman (RSA) algorithm and/or a secure hash algorithm (SHA-1).
    • 用于安全地处理芯片中的信息处理的方法可以包括基于随机过程索引随机选择多个数据处理中的一个。 时间间隔可以随机地分配在芯片上,用于处理多个数据处理中的随机选择的一个。 当随机分配的时间间隔已经过去时,可以启动多个数据处理中的随机选择的一个。 多个数据处理中的随机选择的一个可以包括访问数据和获取数据中的一个或两个。 在处理数据之前,可以通过随机选择的多个数据处理之一来验证数据。 可以使用诸如Rivest-Shamir-Adelman(RSA)算法和/或安全散列算法(SHA-1)的至少一个数字签名验证算法来验证数据。
    • 5. 发明授权
    • System and method for partitioning multiple logical memory regions with access control by a central control agent
    • 用于通过中央控制代理对具有访问控制的多个逻辑存储区进行分区的系统和方法
    • US08719526B2
    • 2014-05-06
    • US11325730
    • 2006-01-05
    • Iue-Shuenn I. ChenBrian F. Schoner
    • Iue-Shuenn I. ChenBrian F. Schoner
    • G06F12/00G06F13/00
    • G06F12/1458
    • A method for securely handling processing of information may include controlling from within a chip, access to at least one portion of an on-chip memory by a plurality of on-chip clients that have pre-determined access to the at least one portion of the on-chip memory. The pre-determined access may be governed by pre-determined access rules that are hard-coded within the chip. At least one of the plurality of on-chip clients may access at least a portion of the on-chip memory. The on-chip memory may be accessible by at least another one of the plurality of on-chip clients. The pre-determined access rules may comprise at least one address range within the on-chip memory corresponding to at least one of the plurality of on-chip clients.
    • 用于安全地处理信息处理的方法可以包括通过多个片上客户机来控制芯片内的至少一部分片上存储器,所述多个片上客户机具有对所述芯片的至少一部分的预定访问权 片上存储器 预定访问可以由在芯片内硬编码的预定访问规则来管理。 多个片上客户端中的至少一个可以访问片上存储器的至少一部分。 片上存储器可以由多个片上客户端中的至少另一个片上存储器访问。 预定访问规则可以包括对应于多个片上客户端中的至少一个的片上存储器内的至少一个地址范围。
    • 8. 发明授权
    • Method and system for handling operation of multiple devices within a single system-on-chip (SoC) integrated circuit (IC)
    • 单芯片(SoC)集成电路(IC)中多个器件的操作方法和系统
    • US07636838B2
    • 2009-12-22
    • US11326065
    • 2006-01-05
    • Iue-Shuenn I. Chen
    • Iue-Shuenn I. Chen
    • G06F15/177
    • G06F21/575G06F21/77
    • A method for securely handling processing of information may include deactivating within a chip, at least one of a plurality of functions that accesses an on-chip memory and generates output data from input data during operation of the chip. Configuration settings that provide maximum performance when accessing the on-chip memory may be determined using an enabled one of the plurality of functions. Access to the on-chip memory may be enabled using the determined configuration settings during the operation of the chip. Access to the on-chip memory by the plurality of functions that accesses the on-chip memory and generates the output data from the input data may be activated during operation of the chip. The on-chip memory may be accessed using the determined configuration settings by the at least one of the plurality of functions subsequent to the activating.
    • 用于安全地处理信息处理的方法可以包括:在芯片操作期间,在芯片内去激活访问片上存储器并且从输入数据产生输出数据的多个功能中的至少一个。 可以使用多个功能中的一个功能来确定访问片上存储器时提供最大性能的配置设置。 可以在芯片的操作期间使用确定的配置设置来启用对片上存储器的访问。 通过访问片上存储器并从输入数据产生输出数据的多个功能访问片上存储器可以在芯片的操作期间被激活。 片上存储器可以使用所确定的配置设置通过激活之后的多个功能中的至少一个来访问。
    • 10. 发明申请
    • Storage Device Content Authentication
    • 存储设备内容认证
    • US20110202776A1
    • 2011-08-18
    • US13094093
    • 2011-04-26
    • Sherman (Xuemin) ChenSteve W. RodgersIue-Shuenn I. ChenFrancis Chi-Wai Cheung
    • Sherman (Xuemin) ChenSteve W. RodgersIue-Shuenn I. ChenFrancis Chi-Wai Cheung
    • G06F12/14
    • G11B20/00086G06F21/64G06Q20/3674H04L9/3236H04L2209/60
    • Systems and methods that support storage device content authentication are provided. A system that verifies storage device content received from a storage device may comprise, for example, a security processor coupled to the storage device. The security processor may be adapted to receive a partitioned storage device region from the storage device. The partitioned storage device region may comprise, for example, regional content and first hashed regional content. The security processor may generate, for example, second hashed regional content by performing a hashing function on the regional content received by the security processor. The security processor may compare, for example, the first hashed regional content to the second hashed regional content. The security processor may verify the regional content received by the security processor if the first hashed regional content is the same as the second hashed regional content.
    • 提供支持存储设备内容认证的系统和方法。 验证从存储设备接收的存储设备内容的系统可以包括例如耦合到存储设备的安全处理器。 安全处理器可以适于从存储设备接收分区的存储设备区域。 分区存储设备区域可以包括例如区域内容和首先散列的区域内容。 安全处理器可以通过对由安全处理器接收的区域内容执行散列函数来生成例如第二散列的区域内容。 安全处理器可以将例如第一散列的区域内容与第二散列的区域内容进行比较。 如果第一散列的区域内容与第二散列的区域内容相同,则安全处理器可以验证由安全处理器接收的区域内容。