Probabilistic processor monitoring

    公开(公告)号:US10810098B2

    公开(公告)日:2020-10-20

    申请号:US15749108

    申请日:2016-07-29

    Applicant: ARM IP Limited

    Abstract: A first processing component samples and lossily accumulates statistical activity data by generating at least one data bucket by segmenting a memory window in a memory and providing a map of the segmented memory window; sampling to detect activity in the data bucket and surjectively populating the map with statistical activity data; and responsive to a trigger, passing at least part of a population of the map to a second processing component. The second processing component receives and stores the at least part of the population of the surjective map, compares it with at least one previously stored map population; and on detecting anomalous patterning, performs an “anomaly detected” action.

    Methods for Delivering an Authenticatable Management Activity to Remote Devices

    公开(公告)号:US20210266308A1

    公开(公告)日:2021-08-26

    申请号:US17255087

    申请日:2019-05-24

    Applicant: Arm IP Limited

    Abstract: Methods for delivering an authenticatable management activity to a group of remote devices in a networked computing environment is described herein. An authenticatable management activity may be any activity which requires internal state changes to be made at a remote device, such as software or firmware updates, system configuration operations, access control list update operations, file transfer operations, changes to user data etc., and which requires an operators approval of the activity before being performed. In addition to an operators approval of the activity, the management activity is required to be signed by an operator, such that the operator authorising the management activity is authenticated.

    Methods for verifying data integrity

    公开(公告)号:US11146400B2

    公开(公告)日:2021-10-12

    申请号:US16820233

    申请日:2020-03-16

    Abstract: A method for verifying the integrity of data in a message by a data processing device, the message comprising a plurality of packets, the method comprising: receiving, at the device from a first resource, a manifest associated with the message, the manifest comprising a plurality of group check values for the plurality of packets; receiving, at the device, from the first or a different resource, the message; generating a first progression of rolling hashes for the plurality of packets; deriving group check values from the first progression of rolling hashes for groups of the plurality of packets along one or more paths; verifying the integrity of the data in the message based on or in response to a determination that the derived group check values correspond to the plurality of group check values in the manifest.

    METHODS FOR VERIFYING DATA INTEGRITY
    7.
    发明申请

    公开(公告)号:US20200288322A1

    公开(公告)日:2020-09-10

    申请号:US16820233

    申请日:2020-03-16

    Abstract: A method for verifying the integrity of data in a message by a data processing device, the message comprising a plurality of packets, the method comprising: receiving, at the device from a first resource, a manifest associated with the message, the manifest comprising a plurality of group check values for the plurality of packets; receiving, at the device, from the first or a different resource, the message; generating a first progression of rolling hashes for the plurality of packets; deriving group check values from the first progression of rolling hashes for groups of the plurality of packets along one or more paths; verifying the integrity of the data in the message based on or in response to a determination that the derived group check values correspond to the plurality of group check values in the manifest.

    Proximity authentication protocol

    公开(公告)号:US10154411B2

    公开(公告)日:2018-12-11

    申请号:US15447729

    申请日:2017-03-02

    Applicant: ARM IP Limited

    Abstract: A machine implemented method of authenticating a communication channel between a first device and a second device by providing proof of proximity between both devices, the method comprising: generating, at the first device, an acoustic authentication signal to be received at the second device via a solid body acoustic coupling established between the first device and the second device thereby providing proof of proximity between both devices and so authenticating the communication channel between the first device and the second device.

    Managing interaction constraints
    10.
    发明授权

    公开(公告)号:US11218855B2

    公开(公告)日:2022-01-04

    申请号:US15214035

    申请日:2016-07-19

    Applicant: ARM IP Limited

    Abstract: A method for operating an electronic device to configure a subject device, the method comprising steps of: receiving an intent from a subject device, wherein the received intent comprises an action identifier identifying an action the subject device wishes to perform; receiving action data about the received intent from an intent store, wherein the action data comprises an action associated with each action identifier, and at least one constraint associated with the action; and generating invocation data to perform the action, wherein the invocation data comprises the action identifier, and zero or more parameters.

Patent Agency Ranking