CONTINUOUS HASH VERIFICATION
    14.
    发明申请

    公开(公告)号:US20200059478A1

    公开(公告)日:2020-02-20

    申请号:US16609879

    申请日:2018-05-01

    Applicant: ARM IP LIMITED

    Inventor: Milosch MERIAC

    Abstract: There is described a method and data processing apparatus for verifying part or all of a downloading file, the file comprising a sequence of bytes, one or more bytes defining a block, the file having a final hash state calculated by a hash algorithm over the blocks in ascending order from first to last, each block having a starting hash state calculated by the hash algorithm, said method comprising: receiving the final hash state; receiving one or more blocks orderable in descending order starting from the last block; receiving, for each received block, the starting hash state for that block; calculating, for each received block, an ending hash state by running the hash algorithm from the starting hash state of the received block; confirming the starting hash state for each received block when the ending hash state is the same as the final hash state or a confirmed starting hash state; and flagging an error when an ending hash state does not match the final hash state or a confirmed starting hash state.

    DATA STREAM ASSEMBLY CONTROL
    15.
    发明申请

    公开(公告)号:US20180314438A1

    公开(公告)日:2018-11-01

    申请号:US15771250

    申请日:2015-12-23

    Applicant: ARM IP LIMITED

    CPC classification number: H03M7/30

    Abstract: Technology for operating a data-source device for assembling a data stream compliant with a data stream constraint. The technology comprises acquiring a plurality of data items by accessing data in a memory and/or transforming data. Prior to completion of the accessing data in a memory, an accessor is selected based on an estimate of access constraint. Prior to completion of the transforming data, a transformer is selected based on an estimate of transformation constraint, wherein the transportation constraint comprises any data acquisition constraint. The access and transformation constraints are dependent upon system state it the data-source system. The data items are positioned in the data stream, and, responsive to achieving compliance with the data stream constraint, the data strewn is communicated.

    METHOD FOR MITIGATING A DoS ATTACK ON A DEVICE

    公开(公告)号:US20170237770A1

    公开(公告)日:2017-08-17

    申请号:US15433288

    申请日:2017-02-15

    Applicant: ARM IP Limited

    Inventor: Milosch MERIAC

    CPC classification number: H04L63/1458 H04L63/0876 H04L63/10 H04L67/12

    Abstract: There is described a method for mitigating a power-denial of service attack on a first device by a second device, the method comprising: transmitting, from the first device to the second device, a first communication comprising a first task to be solved by the second device; receiving, at the first device from the second device, a second communication comprising one of a proposed solution to the first task and at least one trust credential; verifying, at the first device, the second communication; responsive to an unsuccessful verification of the second communication, transmitting, from the first device to the second device a third communication comprising a second task to be solved by the second device.

Patent Agency Ranking