会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for endianness control in a data processing system
    • 数据处理系统中字节序控制的方法和装置
    • US07404019B2
    • 2008-07-22
    • US10857208
    • 2004-05-26
    • William C. MoyerMichael D. Fitzsimmons
    • William C. MoyerMichael D. Fitzsimmons
    • G06F13/12G06F3/00G06F13/00
    • G06F13/4013G06F21/85G06F2221/2113G06F2221/2141
    • A method for providing endianness control in a data processing system includes initiating an access which accesses a peripheral, providing a first endianness control that corresponds to the peripheral, and completing the access using the endianness control to affect the endianness order of the information transferred during the access. In one embodiment, the first endianness control overrides a default endianness corresponding to the access. The default endianness may be provided by a master endianness control corresponding to a master requesting the current access. A data processing system includes a first bus master, first and second peripherals, first endianness control corresponding to the first peripheral and second endianness control corresponding to the second peripheral, and control circuitry which uses the first endianness control to control endianness for an access between the first bus master and the first peripheral. In one embodiment, the data processing system may include multiple masters.
    • 一种用于在数据处理系统中提供字节序控制的方法包括发起访问外围设备的访问,提供与外设相对应的第一字节序列控制,并使用字节序控制来完成访问,以影响在该时间间隔期间传送的信息的字节顺序 访问。 在一个实施例中,第一字节序列控制覆盖对应于访问的默认字节顺序。 默认字节顺序可以由对应于请求当前访问的主机的主字节顺序控制来提供。 数据处理系统包括第一总线主机,第一和第二外围设备,对应于与第二外围设备相对应的第一外设和第二终端控制的第一字节序列控制;以及控制电路,其使用第一字节序列控制来控制字节顺序 第一个总线主人和第一个外围设备。 在一个实施例中,数据处理系统可以包括多个主器件。
    • 4. 发明授权
    • Method and apparatus for responding to access errors in a data processing system
    • 用于在数据处理系统中响应访问错误的方法和装置
    • US07278062B2
    • 2007-10-02
    • US10339022
    • 2003-01-09
    • William C. MoyerMichael D. FitzsimmonsBrian M. MillarJohn J. Vaglica
    • William C. MoyerMichael D. FitzsimmonsBrian M. MillarJohn J. Vaglica
    • G06F11/00
    • G06F11/004G06F11/0745G06F11/0751G06F11/0793
    • In one embodiment, a data processing system (10) has a processor (14) coupled to a bus, where the data processing system (10) includes access error detection circuitry (26) and access error response circuitry (12), each coupled to the bus (58, 60). The access error detection circuitry detects an access error in the data processing system. The access error response circuitry initiates replacement of an existing value on the bus with a predetermined value when the access error has been detected, and continues to replace the existing value on the bus with the predetermined value when the access error has been detected and a persistent mode indicator has been asserted. The predetermined value may correspond to a predetermined instruction value (74) or a predetermined data value (76). In one embodiment, different values for the predetermined value may be used depending on the current operating mode of the data processing system.
    • 在一个实施例中,数据处理系统(10)具有耦合到总线的处理器(14),其中数据处理系统(10)包括访问错误检测电路(26)和访问错误响应电路(12),每个耦合到 公共汽车(58,60)。 访问错误检测电路检测数据处理系统中的访问错误。 当检测到访问错误时,访问错误响应电路以预定值启动总线上的现​​有值的替换,并且当已经检测到访问错误时,继续以预定值替换总线上的现​​有值,并且持续 模式指示器已被断言。 预定值可以对应于预定指令值(74)或预定数据值(76)。 在一个实施例中,可以根据数据处理系统的当前操作模式使用预定值的不同值。
    • 7. 发明授权
    • Data processing system with peripheral access protection and method therefor
    • 具有外设访问保护的数据处理系统及其方法
    • US07277972B2
    • 2007-10-02
    • US10094082
    • 2002-03-08
    • William C. MoyerMichael D. Fitzsimmons
    • William C. MoyerMichael D. Fitzsimmons
    • G06F13/14G06F12/14
    • G06F21/85
    • One embodiment of the present invention provides a flexible peripheral access protection mechanism within a data processing system (10) in order to obtain a more secure operating environment. For example, the data processing system may include a combination of secure (12) and unsecure bus masters (14, 15) needing to access shared peripherals (22, 24). One embodiment allows for the dynamic update by a secure bus master (12) of access permissions corresponding to each unsecure bus master for each peripheral. A secure bus master is therefore able to establish which unsecure bus masters have permission to access which peripheral in order to protect the data processing system from corruption due to errant or hostile software running on unsecure bus masters. Through the use of a bus master identifier (36), access to the requested peripheral is either allowed or denied based on the permissions established by the secure bus master.
    • 本发明的一个实施例提供了数据处理系统(10)内的灵活的周边访问保护机制,以便获得更安全的操作环境。 例如,数据处理系统可以包括需要访问共享外围设备(22,24)的安全(12)和不安全总线主控器(14,15)的组合。 一个实施例允许由安全总线主机(12)对与每个外设的每个不安全总线主机相对应的访问许可的动态更新。 因此,安全总线主机能够确定哪些不安全的总线主人有权访问哪些外围设备,以便保护数据处理系统免受由于不安全的总线主机上运行的错误或恶意软件的损坏。 通过使用总线主机标识符(36),可以根据安全总线主机建立的许可来允许或拒绝对请求的外设的访问。
    • 8. 发明授权
    • Integrated circuit security and method therefor
    • 集成电路安全及其方法
    • US07266848B2
    • 2007-09-04
    • US10100462
    • 2002-03-18
    • William C. MoyerMichael D. Fitzsimmons
    • William C. MoyerMichael D. Fitzsimmons
    • G06F21/00
    • G01R31/31719
    • The invention relates to an integrated circuit (IC), and more particularly to security to protect an IC (10) against unauthorized accesses. In one embodiment, an identifier is provided external to IC 10. A corresponding input IC security key (52) is then provided to IC 10 and compared to a stored IC security key (30). If the input IC security key (52) and the stored IC security key (30) do not match, access to protected functional circuitry (12) is prohibited. The present invention may use any debug interface, including standard debug interfaces using the JTAG 1149.1 interface defined by the IEEE.
    • 本发明涉及集成电路(IC),并且更具体地涉及用于保护IC(10)防止未授权访问的安全性。 在一个实施例中,在IC 10外部提供标识符。 然后将对应的输入IC安全密钥(52)提供给IC 10,并与存储的IC安全密钥(30)进行比较。 如果输入IC安全密钥(52)和存储的IC安全密钥(30)不匹配,则禁止对受保护功能电路(12)的访问。 本发明可以使用任何调试接口,包括使用IEEE定义的JTAG 1149.1接口的标准调试接口。
    • 10. 发明授权
    • Method of accessing memory via multiple slave ports
    • 通过多个从端口访问存储器的方法
    • US07185121B2
    • 2007-02-27
    • US11203935
    • 2005-08-15
    • Michael D. FitzsimmonsWilliam C. MoyerBrett W. Murdock
    • Michael D. FitzsimmonsWilliam C. MoyerBrett W. Murdock
    • G06F13/28
    • G06F13/4022Y02D10/14Y02D10/151
    • A crossbar switch (12) arbitrates for access from multiple bus masters (14, 16, 18, 20 and 22) to multiple addressed slave ports (3 and 4) that have overlapping address ranges. In one form, the address ranges are the same address range. The crossbar switch (12) uses shared slave port control circuitry (48), configuration registers (46) and slave port arbiter logic (34, 36, 38, 40, 42 and 44) to arbitrate for access when all the addressed ports are busy. A determination is made as to whether new access requests are higher or lower in priority than existing accesses. A determination on where to direct a new access request is made based upon a prediction of which of certain multiple accesses will complete first based on various factors including the number of data beats requested as well as wait state information. In one mode, the wait state information is determined dynamically.
    • 交叉开关(12)仲裁用于从多个总线主机(14,16,18,20和22)到具有重叠地址范围的多个寻址从端口(3和4)的访问。 在一种形式中,地址范围是相同的地址范围。 当所有寻址端口都忙时,交叉开关(12)使用共享从端口控制电路(48),配置寄存器(46)和从端口仲裁器逻辑(34,36,38,40,42和44)仲裁访问 。 确定新的访问请求是否比现有访问的优先级更高或更低。 基于对包括所请求的数据跳动的数量以及等待状态信息的各种因素的预测,首先将确定某个多个访问中的哪一个将首先完成,从而确定何时引导新的访问请求。 在一种模式中,动态地确定等待状态信息。