-
公开(公告)号:US11194899B2
公开(公告)日:2021-12-07
申请号:US15578387
申请日:2016-05-31
Applicant: Arm IP Limited
Inventor: Alessandro Angelino , Milosch Meriac
IPC: G06F21/54 , G06F21/74 , G06F21/78 , G06F21/79 , G06F21/51 , G06F21/70 , G06F21/52 , G06F21/50 , G06F21/71 , G06F8/61 , G06F9/455 , G06F8/654 , G06F21/57
Abstract: A data processing apparatus having a first secure area and a second secure area coupled by a monitor is provided. The monitor applies security credentials to processing circuitry transitioning from the first secure area to the second secure area to enable the processing circuitry to perform functions in the second secure area. A call gateway comprising a transition instruction and access parameters stored in a trusted storage device is used by the monitor to determine when to applying the security credentials to the processing circuitry. The access parameters comprising a target function or a memory location.
-
公开(公告)号:US20210266308A1
公开(公告)日:2021-08-26
申请号:US17255087
申请日:2019-05-24
Applicant: Arm IP Limited
Inventor: Robert George Taylor , Brendan James Moran , Milosch Meriac , Geraint David Luff
Abstract: Methods for delivering an authenticatable management activity to a group of remote devices in a networked computing environment is described herein. An authenticatable management activity may be any activity which requires internal state changes to be made at a remote device, such as software or firmware updates, system configuration operations, access control list update operations, file transfer operations, changes to user data etc., and which requires an operators approval of the activity before being performed. In addition to an operators approval of the activity, the management activity is required to be signed by an operator, such that the operator authorising the management activity is authenticated.
-
公开(公告)号:US10956577B2
公开(公告)日:2021-03-23
申请号:US16113241
申请日:2018-08-27
Applicant: Arm IP Limited
Inventor: Alessandro Angelino , Milosch Meriac , Brendan James Moran
Abstract: An apparatus and methods are provided to defending device against attacks. When it is determined that a device is under attack, a determination is made as to whether a layout of objects within said at least one resource at said device is protecting said device against said attack. The determination is then transferred to a remote server together with a layout of the resource at the device. When it is determined that the layout of objects within the at least one resource at the device is not protecting the device against the attack, then the layout of the at least one resource is changed. Either the remote server or the device may determine whether to change the layout in response to the attack.
-
公开(公告)号:US10514903B2
公开(公告)日:2019-12-24
申请号:US15409833
申请日:2017-01-19
Applicant: ARM IP LIMITED
Inventor: James Crosby , Hugo John Martin Vincent , Milosch Meriac , Marcus Chang
Abstract: A data processing device has a processor which executes software directly from non-volatile memory. The processor has a runtime component which dynamically maps software element identifiers specified by the software to corresponding software elements in memory. Mapping information is used to determine which software elements identifiers correspond to which software elements. This provides a level of indirection which can be used to make software updates more efficient, by updating only parts of the software while leaving old parts of the software as they are. Updated software elements can be stored to memory and the mapping information updated to point to the new elements, while existing mappings may be retained.
-
公开(公告)号:US10459716B2
公开(公告)日:2019-10-29
申请号:US15756129
申请日:2016-08-23
Applicant: Arm IP Limited
Inventor: Brendan Moran , Milosch Meriac
Abstract: A machine-implemented method or data processing component for controlling the processing of digital content from plural sources by at least one data processing device comprises receiving at least two digital content manifests at the data processing device; receiving at least one digital content payload at the data processing device; and responsive to the at least two digital content manifests, performing an atomic action using the at least one digital content payload.
-
公开(公告)号:US20190159035A1
公开(公告)日:2019-05-23
申请号:US16191024
申请日:2018-11-14
Applicant: Arm IP Limited
Inventor: Samuel Marc Town , Milosch Meriac
IPC: H04W12/12
Abstract: A method, electronic apparatus and computer program for device obfuscation in electronic networks, comprising determining at least one device type of at least one physical device operable to be at least intermittently attached to a wireless network; generating a pattern of wireless network activity associated with the at least one device type; exposing over the wireless network a plurality of non-functional messages conforming to the pattern; and operating a purported sender and receiver of each of the plurality of messages to obscure at least one of an exploitable characteristic and an exploitable state of the at least one device type with respect to the wireless network.
-
17.
公开(公告)号:US10129033B2
公开(公告)日:2018-11-13
申请号:US15850550
申请日:2017-12-21
Applicant: ARM IP Limited
Inventor: Geraint David Luff , Milosch Meriac
IPC: G06F7/04 , H04L9/32 , H04L29/06 , H04L29/08 , G06F17/30 , G06F21/62 , G06F12/0813 , H04L9/14 , H04L9/30 , G16H10/65 , G16H80/00 , G06F19/00
Abstract: A method of accessing a remote resource (4) from a data processing device (2) includes obtaining a first URL corresponding to the remote resource (4), obtaining secret data corresponding to the first URL, using the secret data to generate an obscured URL at the data processing device (2), and accessing the remote resource using the obscured URL. This allows the user of the device (2) to see a first URL which is intelligible and provides useful information about the device, without sharing that information with the network. The obscured URL identifies the actual location of the remote resource and can be an unintelligible stream of digits or letters.
-
公开(公告)号:US20180246714A1
公开(公告)日:2018-08-30
申请号:US15756129
申请日:2016-08-23
Applicant: Arm IP Limited
Inventor: Brendan Moran , Milosch Meriac
Abstract: A machine-implemented method or data processing component for controlling the processing of digital content from plural sources by at least one data processing device comprises receiving at least two digital content manifests at the data processing device; receiving at least one digital content payload at the data processing device; and responsive to the at least two digital content manifests, performing an atomic action using the at least one digital content payload.
-
19.
公开(公告)号:US20180115532A1
公开(公告)日:2018-04-26
申请号:US15850550
申请日:2017-12-21
Applicant: ARM IP Limited
Inventor: Geraint David Luff , Milosch Meriac
CPC classification number: H04L9/3247 , G06F12/0813 , G06F17/3056 , G06F17/30887 , G06F19/00 , G06F21/6209 , G06F21/6245 , G06F2212/154 , G06F2212/60 , G06F2212/62 , G06F2221/2107 , G06F2221/2119 , G16H10/65 , G16H80/00 , H04L9/14 , H04L9/30 , H04L9/3263 , H04L63/0428 , H04L63/067 , H04L63/08 , H04L63/101 , H04L63/166 , H04L63/168 , H04L67/02 , H04L67/2842
Abstract: A method of accessing a remote resource (4) from a data processing device (2) includes obtaining a first URL corresponding to the remote resource (4), obtaining secret data corresponding to the first URL, using the secret data to generate an obscured URL at the data processing device (2), and accessing the remote resource using the obscured URL. This allows the user of the device (2) to see a first URL which is intelligible and provides useful information about the device, without sharing that information with the network. The obscured URL identifies the actual location of the remote resource and can be an unintelligible stream of digits or letters.
-
公开(公告)号:US20170108913A1
公开(公告)日:2017-04-20
申请号:US15292333
申请日:2016-10-13
Applicant: ARM IP Limited
Inventor: Brendan James Moran , James Crosby , Milosch Meriac
CPC classification number: G06F1/3234 , G06F1/3206 , G06F9/44505 , Y02D10/43
Abstract: A method for detecting and responding to a configuration setting capable of causing undesired energy consumption in a configurable electronic device comprises measuring a power state of at least one connection point of the configurable electronic device to establish a measured power state value; comparing the measured power state value with a stored power state value for the connection point; and responsive to a discrepancy between the measured power state value and the stored power state value for the connection point where the discrepancy is capable of causing undesired energy consumption, emitting a condition signal.
-
-
-
-
-
-
-
-
-