CONTINUOUS HASH VERIFICATION
    13.
    发明申请

    公开(公告)号:US20200059478A1

    公开(公告)日:2020-02-20

    申请号:US16609879

    申请日:2018-05-01

    Applicant: ARM IP LIMITED

    Inventor: Milosch MERIAC

    Abstract: There is described a method and data processing apparatus for verifying part or all of a downloading file, the file comprising a sequence of bytes, one or more bytes defining a block, the file having a final hash state calculated by a hash algorithm over the blocks in ascending order from first to last, each block having a starting hash state calculated by the hash algorithm, said method comprising: receiving the final hash state; receiving one or more blocks orderable in descending order starting from the last block; receiving, for each received block, the starting hash state for that block; calculating, for each received block, an ending hash state by running the hash algorithm from the starting hash state of the received block; confirming the starting hash state for each received block when the ending hash state is the same as the final hash state or a confirmed starting hash state; and flagging an error when an ending hash state does not match the final hash state or a confirmed starting hash state.

    DATA STREAM ASSEMBLY CONTROL
    14.
    发明申请

    公开(公告)号:US20180314438A1

    公开(公告)日:2018-11-01

    申请号:US15771250

    申请日:2015-12-23

    Applicant: ARM IP LIMITED

    CPC classification number: H03M7/30

    Abstract: Technology for operating a data-source device for assembling a data stream compliant with a data stream constraint. The technology comprises acquiring a plurality of data items by accessing data in a memory and/or transforming data. Prior to completion of the accessing data in a memory, an accessor is selected based on an estimate of access constraint. Prior to completion of the transforming data, a transformer is selected based on an estimate of transformation constraint, wherein the transportation constraint comprises any data acquisition constraint. The access and transformation constraints are dependent upon system state it the data-source system. The data items are positioned in the data stream, and, responsive to achieving compliance with the data stream constraint, the data strewn is communicated.

    METHOD FOR MITIGATING A DoS ATTACK ON A DEVICE

    公开(公告)号:US20170237770A1

    公开(公告)日:2017-08-17

    申请号:US15433288

    申请日:2017-02-15

    Applicant: ARM IP Limited

    Inventor: Milosch MERIAC

    CPC classification number: H04L63/1458 H04L63/0876 H04L63/10 H04L67/12

    Abstract: There is described a method for mitigating a power-denial of service attack on a first device by a second device, the method comprising: transmitting, from the first device to the second device, a first communication comprising a first task to be solved by the second device; receiving, at the first device from the second device, a second communication comprising one of a proposed solution to the first task and at least one trust credential; verifying, at the first device, the second communication; responsive to an unsuccessful verification of the second communication, transmitting, from the first device to the second device a third communication comprising a second task to be solved by the second device.

    METHOD AND DEVICE FOR UPDATING SOFTWARE EXECUTED FROM NON-VOLATILE MEMORY
    20.
    发明申请
    METHOD AND DEVICE FOR UPDATING SOFTWARE EXECUTED FROM NON-VOLATILE MEMORY 有权
    用于更新从非易失性存储器执行的软件的方法和设备

    公开(公告)号:US20150355900A1

    公开(公告)日:2015-12-10

    申请号:US14735522

    申请日:2015-06-10

    Applicant: ARM IP LIMITED

    Abstract: A data processing device 2 has a processor 4 which executes software directly from non-volatile memory 6, 8. The processor 4 has a runtime component 20 which dynamically maps software element identifiers specified by the software to corresponding software elements in memory 6, 8. Mapping information 22 is used to determine which software elements identifiers correspond to which software elements. This provides a level of indirection which can be used to make software updates more efficient, by updating only parts of the software while leaving old parts of the software as they are. Updated software elements can be stored to memory and the mapping information updated to point to the new elements, while existing mappings may be retained.

    Abstract translation: 数据处理设备2具有直接从非易失性存储器6,8执行软件的处理器4.处理器4具有运行时组件20,其将由软件指定的软件元素标识符动态映射到存储器6,8中的相应软件元素。 映射信息22用于确定哪些软件元素标识符对应于哪些软件元素。 这提供了一定程度的间接,可以通过只更新软件的一部分,同时保留软件的旧部分,从而使软件更新更加高效。 更新的软件元素可以存储到内存中,映射信息更新为指向新的元素,而现有的映射可能被保留。

Patent Agency Ranking