Microprocessor mechanism for decompression of fuse correction data
    91.
    发明授权
    Microprocessor mechanism for decompression of fuse correction data 有权
    保险丝校正数据解压缩微处理机构

    公开(公告)号:US08879345B1

    公开(公告)日:2014-11-04

    申请号:US13972768

    申请日:2013-08-21

    CPC classification number: G11C17/16 G11C17/18 G11C29/785 G11C29/802

    Abstract: An apparatus includes a semiconductor fuse array and a plurality of cores. The semiconductor fuse array is disposed on a die, into which is programmed configuration data. The array has a first plurality of fuses and a second plurality of fuses. The first plurality of fuses stores the configuration data in an encoded and compressed format. The second plurality of fuses stores first compressed fuse correction data that indicates locations and values corresponding to a first one or more fuses within the first plurality of fuses whose states are to be changed from that which was previously stored. The plurality of cores is disposed on the die, where each of the plurality of cores is coupled to the array and accesses all of the compressed configuration data during power-up/reset, for initialization of elements within the each of the plurality of cores.

    Abstract translation: 一种装置包括半导体熔丝阵列和多个芯。 半导体熔丝阵列设置在芯片上,其中是编程配置数据。 阵列具有第一多个保险丝和第二多个保险丝。 第一组多个保险丝以编码和压缩格式存储配置数据。 第二多个保险丝存储第一压缩熔丝校正数据,其指示与其先前存储的状态将改变其状态的第一多个保险丝内的第一个或多个保险丝对应的位置和值。 多个芯设置在管芯上,其中多个芯中的每个芯耦合到阵列,并且在加电/复位期间访问所有压缩的配置数据,以用于初始化多个芯内的元件。

    UNCORE MICROCODE ROM
    92.
    发明申请

    公开(公告)号:US20140297993A1

    公开(公告)日:2014-10-02

    申请号:US14072428

    申请日:2013-11-05

    CPC classification number: G06F9/26 G06F9/30145 G06F9/30174

    Abstract: A microprocessor includes a plurality of processing cores each comprises a corresponding memory physically located inside the core and readable by the core but not readable by the other cores (“core memory”). The microprocessor also includes a memory physically located outside all of the cores and readable by all of the cores (“uncore memory”). For each core, the uncore memory and corresponding core memory collectively provide M words of storage for microcode instructions fetchable by the core as follows: the uncore memory provides J of the M words of microcode instruction storage, and the corresponding core memory provides K of the M words of microcode instruction storage. J, K and M are counting numbers, and M=J+K. The memories are non-architecturally-visible and accessed using a fetch address provided by a non-architectural program counter, and the microcode instructions are non-architectural instructions that implement architectural instructions.

    Abstract translation: 微处理器包括多个处理核心,每个处理核心包括物理上位于核心内并由核心读取但不能被其他核心(“核心存储器”)读取的对应存储器。 微处理器还包括物理上位于所有核心外的所有核心(“非存储器”)可读取的存储器。 对于每个核心,非核存储器和对应的核心存储器共同提供M个字节的存储器,用于由核心获取的微代码指令,如下:非存储器提供微代码指令存储器的M个字节的J,并且相应的核心存储器提供K M码的微码指令存储。 J,K和M是计数数,M = J + K。 存储器是非架构可见的,并且使用由非架构程序计数器提供的提取地址来访问,并且微代码指令是实施架构指令的非架构指令。

    Domain-differentiated power state coordination system

    公开(公告)号:US10175732B2

    公开(公告)日:2019-01-08

    申请号:US14980194

    申请日:2015-12-28

    Abstract: A multi-core microprocessor is organized into a plurality of resource-associated domains including core domains, group domains, and a global domain. Each domain relates to either local resources, group resources, or global resources that are respectively used by a single core, a group of cores, or all the cores. Each core has its own independently settable target operating state selected from a plurality of possible target operating states that designate configurations for the local resources, group resources, and global resources. Each core is provided with coordination logic configured to implement or request implementation of the core's target operating state, but only to the extent that implementation of the target operating state would not reduce performance of any other core below its own target operating state.

    Event-based apparatus and method for securing BIOS in a trusted computing system during execution

    公开(公告)号:US10089470B2

    公开(公告)日:2018-10-02

    申请号:US15380706

    申请日:2016-12-15

    Inventor: G. Glenn Henry

    Abstract: An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event detector, and a tamper detector. The BIOS ROM has BIOS contents that are stored as plaintext, and an encrypted message digest, where the encrypted message digest comprises an encrypted version of a first message digest that corresponds to the BIOS contents, and where and the encrypted version is generated via a symmetric key algorithm and a key. The event detector is configured to generate a BIOS check interrupt that interrupts normal operation of the computing system upon the occurrence of an event, where the event includes one or more occurrences of a change in system state. The tamper detector is operatively coupled to the BIOS ROM and is configured to access the BIOS contents and the encrypted message digest upon assertion of the BIOS check interrupt, and is configured to direct a microprocessor to generate a second message digest corresponding to the BIOS contents and a decrypted message digest corresponding to the encrypted message digest using the symmetric key algorithm and the key, and is configured to compare the second message digest with the decrypted message digest, and configured to preclude the operation of the microprocessor if the second message digest and the decrypted message digest are not equal. The microprocessor includes a dedicated crypto/hash unit disposed within execution logic, where the crypto/hash unit generates the second message digest and the decrypted message digest, and where the key is exclusively accessed by the crypto/hash unit. The microprocessor further has a random number generator disposed within the execution logic, where the random number generator generates a random number at completion of a current BIOS check, which is employed by the event detector to randomly set a number of occurrences of the event that are to occur before a following BIOS check.

    Event-based apparatus and method for securing BIOS in a trusted computing system during execution

    公开(公告)号:US10055588B2

    公开(公告)日:2018-08-21

    申请号:US15380825

    申请日:2016-12-15

    Inventor: G. Glenn Henry

    CPC classification number: G06F21/572 G06F21/554 G06F2221/2107 H04L9/3242

    Abstract: An apparatus is provided for protecting a basic input/output system (BIOS) in a computing system. The apparatus includes a BIOS read only memory (ROM), an event detector, and a tamper detector. The BIOS ROM has BIOS contents that are stored as plaintext, and an encrypted message digest, where the encrypted message digest comprises an encrypted version of a first message digest that corresponds to the BIOS contents, and where and the encrypted version is generated via a symmetric key algorithm and a key. The event detector is configured to generate a BIOS check interrupt that interrupts normal operation of the computing system upon the occurrence of an event, where the event includes one or more occurrences of a power glitch exceeding a specified threshold within a specified time period. The tamper detector is operatively coupled to the BIOS ROM and is configured to access the BIOS contents and the encrypted message digest upon assertion of the BIOS check interrupt, and is configured to direct a microprocessor to generate a second message digest corresponding to the BIOS contents and a decrypted message digest corresponding to the encrypted message digest using the symmetric key algorithm and the key, and is configured to compare the second message digest with the decrypted message digest, and configured to preclude the operation of the microprocessor if the second message digest and the decrypted message digest are not equal. The microprocessor includes a dedicated crypto/hash unit disposed within execution logic, where the crypto/hash unit generates the second message digest and the decrypted message digest, and where the key is exclusively accessed by the crypto/hash unit. The microprocessor further has a random number generator disposed within the execution logic, where the random number generator generates a random number at completion of a current BIOS check, which is employed by the event detector to randomly set a number of occurrences of the event that are to occur before a following BIOS check.

Patent Agency Ranking