会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Limited Functionality Mode for Secure, Remote, Decoupled Computer Ownership
    • 有限的功能模式,用于安全,远程,去耦计算机所有权
    • US20090183245A1
    • 2009-07-16
    • US11972351
    • 2008-01-10
    • Gary H. SimpsonGeoffrey StronginAndrew R. RawsonGarth D. HillmanRalf Findeisen
    • Gary H. SimpsonGeoffrey StronginAndrew R. RawsonGarth D. HillmanRalf Findeisen
    • H04L9/32
    • G06F21/62G06F21/70G06F2221/2137
    • In one embodiment, a computer system comprises one or more components and a secure computing environment coupled to the components. The secure computing environment is configured to program at least one of the components to enter a limited functionality mode responsive to expiration of a use right to the computer system, wherein operation of the computer system in the limited functionality mode is reduced compared to operation when the use right has not expired. The secure computing environment is configured to monitor the components in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity and to cause the computer system to enter a second mode in which operation of the computer system is reduced compared to operation in the limited functionality mode in response. In another embodiment, the secure computing environment detects a non-temporal event that indicates a violation of an owner-imposed restriction and enters a limited functionality mode.
    • 在一个实施例中,计算机系统包括耦合到组件的一个或多个组件和安全计算环境。 安全计算环境被配置为响应于对计算机系统的使用权限到期而对组件中的至少一个进行编程以进入有限的功能模式,其中与有限功能模式下的操作相比,有限功能模式中的计算机系统的操作被减少 使用权尚未到期。 安全计算环境被配置为以有限功能模式监视组件以检测受限制的功能模式配置已被未经授权的实体修改并且使得计算机系统进入计算机系统的操作减少的第二模式 与在有限功能模式下的操作相比。 在另一个实施例中,安全计算环境检测指示违反所有者施加的限制的非时间事件并进入有限的功能模式。
    • 6. 发明申请
    • Known Good Code for On-Chip Device Management
    • 已知的片上设备管理良好代码
    • US20100174890A1
    • 2010-07-08
    • US11957930
    • 2007-12-17
    • Garth D. HillmanGeoffrey StronginAndrew R. RawsonGary H. SimpsonRalf Findeisen
    • Garth D. HillmanGeoffrey StronginAndrew R. RawsonGary H. SimpsonRalf Findeisen
    • G06F9/30G06F9/44
    • G06F9/30145G06F9/30174G06F9/30178G06F9/30181G06F9/328G06F9/3885G06F21/572G06F21/76
    • In one embodiment, a processor comprises a programmable map and a circuit. The programmable map is configured to store data that identifies at least one instruction for which an architectural modification of an instruction set architecture implemented by the processor has been defined, wherein the processor does not implement the modification. The circuitry is configured to detect the instruction or its memory operands and cause a transition to Known Good Code (KGC), wherein the KGC is protected from unauthorized modification and is provided from an authenticated entity. The KGC comprises code that, when executed, emulates the modification. In another embodiment, an integrated circuit comprises at least one processor core; at least one other circuit; and a KGC source configured to supply KGC to the processor core for execution. The KGC comprises interface code for the other circuit whereby an application executing on the processor core interfaces to the other circuit through the KGC.
    • 在一个实施例中,处理器包括可编程映射和电路。 可编程映射被配置为存储标识至少一个指令的数据,对于该指令已经定义了由处理器实现的指令集架构的架构修改,其中处理器不实现修改。 电路被配置为检测指令或其存储器操作数并且导致转换到已知的良好代码(KGC),其中KGC被保护免受未经授权的修改,并且从认证实体提供。 KGC包括在执行时模拟修改的代码。 在另一实施例中,集成电路包括至少一个处理器核心; 至少一个其他电路; 以及配置为向处理器核心提供KGC以供执行的KGC源。 KGC包括用于另一电路的接口代码,由此在处理器核上执行的应用程序通过KGC与另一电路接口。
    • 7. 发明授权
    • Uses of known good code for implementing processor architectural modifications
    • 使用已知的良好代码来实现处理器架构修改
    • US07831813B2
    • 2010-11-09
    • US11957848
    • 2007-12-17
    • Garth D. HillmanGeoffrey StronginAndrew R. RawsonGary H. SimpsonRalf Findeisen
    • Garth D. HillmanGeoffrey StronginAndrew R. RawsonGary H. SimpsonRalf Findeisen
    • G06F9/455
    • G06F9/30174G06F9/30178G06F9/30181G06F21/57
    • In one embodiment, a processor comprises a programmable map and a circuit. The programmable map is configured to store data that identifies at least one instruction for which an architectural modification of an instruction set architecture implemented by the processor has been defined, wherein the processor does not implement the modification. The circuitry is configured to detect the instruction or its memory operands and cause a transition to Known Good Code (KGC), wherein the KGC is protected from unauthorized modification and is provided from an authenticated entity. The KGC comprises code that, when executed, emulates the modification. In another embodiment, an integrated circuit comprises at least one processor core; at least one other circuit; and a KGC source configured to supply KGC to the processor core for execution. The KGC comprises interface code for the other circuit whereby an application executing on the processor core interfaces to the other circuit through the KGC.
    • 在一个实施例中,处理器包括可编程映射和电路。 可编程映射被配置为存储标识至少一个指令的数据,对于该指令已经定义了由处理器实现的指令集架构的架构修改,其中处理器不实现修改。 电路被配置为检测指令或其存储器操作数并且导致转换到已知的良好代码(KGC),其中KGC被保护免受未经授权的修改,并且从认证实体提供。 KGC包括在执行时模拟修改的代码。 在另一实施例中,集成电路包括至少一个处理器核心; 至少一个其他电路; 以及配置为向处理器核心提供KGC以供执行的KGC源。 KGC包括用于另一电路的接口代码,由此在处理器核上执行的应用程序通过KGC与另一电路接口。
    • 8. 发明申请
    • Uses of Known Good Code for Implementing Processor Architectural Modifications
    • 使用已知的良好代码实现处理器架构修改
    • US20090158015A1
    • 2009-06-18
    • US11957848
    • 2007-12-17
    • Garth D. HillmanGeoffrey StronginAndrew R. RawsonGary H. SimpsonRalf Findeisen
    • Garth D. HillmanGeoffrey StronginAndrew R. RawsonGary H. SimpsonRalf Findeisen
    • G06F9/30
    • G06F9/30174G06F9/30178G06F9/30181G06F21/57
    • In one embodiment, a processor comprises a programmable map and a circuit. The programmable map is configured to store data that identifies at least one instruction for which an architectural modification of an instruction set architecture implemented by the processor has been defined, wherein the processor does not implement the modification. The circuitry is configured to detect the instruction or its memory operands and cause a transition to Known Good Code (KGC), wherein the KGC is protected from unauthorized modification and is provided from an authenticated entity. The KGC comprises code that, when executed, emulates the modification. In another embodiment, an integrated circuit comprises at least one processor core; at least one other circuit; and a KGC source configured to supply KGC to the processor core for execution. The KGC comprises interface code for the other circuit whereby an application executing on the processor core interfaces to the other circuit through the KGC.
    • 在一个实施例中,处理器包括可编程映射和电路。 可编程映射被配置为存储标识至少一个指令的数据,对于该指令已经定义了由处理器实现的指令集架构的架构修改,其中处理器不实现修改。 电路被配置为检测指令或其存储器操作数并且导致转换到已知的良好代码(KGC),其中KGC被保护免受未经授权的修改,并且从认证实体提供。 KGC包括在执行时模拟修改的代码。 在另一实施例中,集成电路包括至少一个处理器核心; 至少一个其他电路; 以及配置为向处理器核心提供KGC以供执行的KGC源。 KGC包括用于另一电路的接口代码,由此在处理器核上执行的应用程序通过KGC与另一电路接口。