Method for allocating memory
    11.
    发明授权

    公开(公告)号:US10606498B2

    公开(公告)日:2020-03-31

    申请号:US16070688

    申请日:2016-12-23

    Applicant: Arm IP Limited

    Abstract: A method for managing a discontinuous call stack is disclosed to more efficiently use the memory of devices without a memory management unit. The method comprising: storing a stack location indicator indicating a top of said discontinuous call stack in a data store; using said stack location indicator to identify a current memory block of said discontinuous call stack from said plurality of memory blocks, said current memory block storing said top of said discontinuous call stack and a previous location indicator indicating a location of a previous memory block of said discontinuous call stack; determining an amount of memory available in said current memory block; determining an amount of memory required for a stack frame; determining an amount of memory required for an interrupt allowance; allocating said stack frame and said interrupt allowance at least one memory block from said plurality of memory blocks in response to said determinations; storing said stack frame in said allocated memory block; and updating said stack location indicator in said data store.

    AUTHORIZED OPERATIONS IN ELECTRONIC SYSTEMS
    12.
    发明申请

    公开(公告)号:US20190036705A1

    公开(公告)日:2019-01-31

    申请号:US16025403

    申请日:2018-07-02

    Applicant: ARM IP Limited

    Abstract: A method of authorizing an operation on a remote device with a cryptographic signature verification component, the remote device being operable in a communications network having human-readable messages with message signatures, comprising receiving at an arbitrator an authorization request to perform an operation requiring authorization on the remote device; retrieving from the request an operation identifier and plaintext data; sending a human-readable request with the identifier and the plaintext data to an authorizer; receiving a reply from an authorizer, the reply message comprising at least the plaintext data and a verifiable cryptographic signature identifying the authorizer derived from the request; and on receiving the reply, sending a request to perform the operation to the remote device with an authorization derived from at least the cryptographic signature, the cryptographic signature being suitable for verification by the cryptographic signature verification component on the remote device.

    Methods for Delivering an Authenticatable Management Activity to Remote Devices

    公开(公告)号:US20210266308A1

    公开(公告)日:2021-08-26

    申请号:US17255087

    申请日:2019-05-24

    Applicant: Arm IP Limited

    Abstract: Methods for delivering an authenticatable management activity to a group of remote devices in a networked computing environment is described herein. An authenticatable management activity may be any activity which requires internal state changes to be made at a remote device, such as software or firmware updates, system configuration operations, access control list update operations, file transfer operations, changes to user data etc., and which requires an operators approval of the activity before being performed. In addition to an operators approval of the activity, the management activity is required to be signed by an operator, such that the operator authorising the management activity is authenticated.

    Methods and apparatus for defending against memory-related attacks on devices

    公开(公告)号:US10956577B2

    公开(公告)日:2021-03-23

    申请号:US16113241

    申请日:2018-08-27

    Applicant: Arm IP Limited

    Abstract: An apparatus and methods are provided to defending device against attacks. When it is determined that a device is under attack, a determination is made as to whether a layout of objects within said at least one resource at said device is protecting said device against said attack. The determination is then transferred to a remote server together with a layout of the resource at the device. When it is determined that the layout of objects within the at least one resource at the device is not protecting the device against the attack, then the layout of the at least one resource is changed. Either the remote server or the device may determine whether to change the layout in response to the attack.

    SOFTWARE UPDATE MECHANISM
    15.
    发明申请

    公开(公告)号:US20200379747A1

    公开(公告)日:2020-12-03

    申请号:US16884847

    申请日:2020-05-27

    Abstract: Provided is a technology including an apparatus and a machine-implemented method for updating software on a device, the method performed at the device comprising: receiving a software update manifest comprising an authenticated resource request identifier and an authenticated definition identifying one or more characteristics of the device; generating a software update request comprising a value for each of the one or more identified characteristics of the device; transmitting, to a location corresponding to the resource request identifier, the built software update request; receiving a resource enabling access to or including a software update appropriate for the one or more values of the one or more identified characteristics; and updating the software of the device in accordance with the software update.

    DETECTING UNDESIRED ENERGY CONSUMPTION IN ELECTRONIC DEVICES

    公开(公告)号:US20170108913A1

    公开(公告)日:2017-04-20

    申请号:US15292333

    申请日:2016-10-13

    Applicant: ARM IP Limited

    CPC classification number: G06F1/3234 G06F1/3206 G06F9/44505 Y02D10/43

    Abstract: A method for detecting and responding to a configuration setting capable of causing undesired energy consumption in a configurable electronic device comprises measuring a power state of at least one connection point of the configurable electronic device to establish a measured power state value; comparing the measured power state value with a stored power state value for the connection point; and responsive to a discrepancy between the measured power state value and the stored power state value for the connection point where the discrepancy is capable of causing undesired energy consumption, emitting a condition signal.

    Methods for verifying data integrity

    公开(公告)号:US11146400B2

    公开(公告)日:2021-10-12

    申请号:US16820233

    申请日:2020-03-16

    Abstract: A method for verifying the integrity of data in a message by a data processing device, the message comprising a plurality of packets, the method comprising: receiving, at the device from a first resource, a manifest associated with the message, the manifest comprising a plurality of group check values for the plurality of packets; receiving, at the device, from the first or a different resource, the message; generating a first progression of rolling hashes for the plurality of packets; deriving group check values from the first progression of rolling hashes for groups of the plurality of packets along one or more paths; verifying the integrity of the data in the message based on or in response to a determination that the derived group check values correspond to the plurality of group check values in the manifest.

    SYSTEMS AND METHODS FOR NAVIGATION
    18.
    发明申请

    公开(公告)号:US20210190504A1

    公开(公告)日:2021-06-24

    申请号:US16638681

    申请日:2018-08-14

    Applicant: ARM IP Limited

    Abstract: A method of generating route instructions for a user, the method comprising: receiving, at a control system, device attribute data for a plurality of node devices in a facility; storing, in a data set, the device attribute data, wherein the data set further comprises operation data relating to the operating state of respective node devices; receiving, at the control system, user attribute data for a user; generating, at the control system, route instructions specifying a source location, a destination location and one or more waypoints therebetween based on or in response to the data set and the user attribute data; transmitting, from the control system to the user, the route instructions.

    CONTENT MODIFICATION CONTROL
    19.
    发明申请

    公开(公告)号:US20210132859A1

    公开(公告)日:2021-05-06

    申请号:US16670013

    申请日:2019-10-31

    Applicant: Arm IP Limited

    Abstract: A machine-implemented method for transactional modification of content in solid state storage, comprising receiving a delta data structure comprising at least one delta targeting at least one data block; copying a first data block targeted by the at least one delta from the first data block's home location into a non-volatile store; first modifying a first flag of a plurality of flags stored in the delta data structure following copying of the first data block; reading the first data block into memory; modifying the first data block in memory according to the delta to produce a ready-to-write data block; erasing a target location to create an empty block; writing the ready-to-write data block to the target location; and recording in the delta data structure that the first data block has been modified.

    METHODS FOR VERIFYING DATA INTEGRITY
    20.
    发明申请

    公开(公告)号:US20200288322A1

    公开(公告)日:2020-09-10

    申请号:US16820233

    申请日:2020-03-16

    Abstract: A method for verifying the integrity of data in a message by a data processing device, the message comprising a plurality of packets, the method comprising: receiving, at the device from a first resource, a manifest associated with the message, the manifest comprising a plurality of group check values for the plurality of packets; receiving, at the device, from the first or a different resource, the message; generating a first progression of rolling hashes for the plurality of packets; deriving group check values from the first progression of rolling hashes for groups of the plurality of packets along one or more paths; verifying the integrity of the data in the message based on or in response to a determination that the derived group check values correspond to the plurality of group check values in the manifest.

Patent Agency Ranking