MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC

    公开(公告)号:US20220171887A1

    公开(公告)日:2022-06-02

    申请号:US17108934

    申请日:2020-12-01

    Abstract: Examples of systems and method described herein or generating, in a memory controller and/or memory device, access codes for memory regions of the memory device using authentication logic, and for accessing the memory device using the access codes. For example, a memory controller and/or a coupled memory device may generate access codes that a host computing device may include in a memory access request to access one or more memory regions of the memory device. Data read or written at the memory device may in some examples only be accessed in accordance with the access codes for memory regions of the memory device. Accordingly, the systems and methods described herein may provide security for specific memory regions of a memory device because the access code are updated periodically (e.g., based on obtained reset indication) or in accordance with an updated count value from a counter.

    DATA FLOWS IN A PROCESSOR WITH A DATA FLOW MANAGER

    公开(公告)号:US20220171634A1

    公开(公告)日:2022-06-02

    申请号:US17673712

    申请日:2022-02-16

    Abstract: Methods, apparatuses, and systems for implementing data flows in a processor are described herein. A data flow manager may be configured to generate a configuration packet for a compute operation based on status information regarding multiple processing elements of the processor. Accordingly, multiple processing elements of a processor may concurrently process data flows based on the configuration packet. For example, the multiple processing elements may implement a mapping of processing elements to memory, while also implementing identified paths, through the processor, for the data flows. After executing the compute operation at certain processing elements of the processor, the processing results may be provided. In speech signal processing operations, the processing results may be compared to phonemes to identify such components of human speech in the processing results. Once dynamically identified, the processing elements may continue comparing additional components of human speech to facilitate processing of an audio recording, for example.

    MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF ACCESSING MEMORY AND GENERATING ACCESS CODES USING AN AUTHENTICATED STREAM CIPHER

    公开(公告)号:US20220171545A1

    公开(公告)日:2022-06-02

    申请号:US17108904

    申请日:2020-12-01

    Abstract: Examples of systems and method described herein provide for accessing memory devices and, concurrently, generating access codes using an authenticated stream cipher at a memory controller. For example, a memory controller may use a memory access request to, concurrently, perform translation logic and/or error correction on data associated with the memory access request; while also utilizing the memory address as an initialization vector for an authenticated stream cipher to generate an access code. The error correction may be performed subsequent to address translation for a write operation (or prior to address translation for a read operation) to improve processing speed of memory access requests at a memory controller; while the memory controller also generates the encrypted access code.

    MEMORY INCLUDING EXAMPLES OF CALCULATING HAMMING DISTANCES FOR NEURAL NETWORK AND DATA CENTER APPLICATIONS

    公开(公告)号:US20220076073A1

    公开(公告)日:2022-03-10

    申请号:US17016074

    申请日:2020-09-09

    Abstract: Examples of systems and method described herein provide for the processing of image codes (e.g., a binary embedding) at a memory die. Such images codes may generated by various endpoint computing devices, such as Internet of Things (IoT) computing devices. Such devices can generate a Hamming processing command, having an image code of the image, to compare that representation of the image to other images (e.g., in an image dataset) to identify a match or a set of neural network results. Advantageously, examples described herein may be used in neural networks to facilitate the processing of datasets, so as to increase the rate and amount of processing of such datasets. For example, comparisons of image codes can be performed on a memory die itself, like a memory die of a NAND memory device.

    MEMORY CONTROLLERS INCLUDING EXAMPLES OF CALCULATING HAMMING DISTANCES FOR NEURAL NETWORK AND DATA CENTER APPLICATIONS

    公开(公告)号:US20220075724A1

    公开(公告)日:2022-03-10

    申请号:US17016053

    申请日:2020-09-09

    Abstract: Examples of systems and method described herein provide for the processing of image codes (e.g., a binary embedding) at a memory controller with various memory devices. Such images codes may generated by various endpoint computing devices, such as Internet of Things (IoT) computing devices, Such devices can generate a Hamming processing request, having an image code of the image, to compare that representation of the image to other images (e.g., in an image dataset) to identify a match or a set of neural network results. Advantageously, examples described herein may be used in neural networks to facilitate the processing of datasets, so as to increase the rate and amount of processing of such datasets. For example, comparisons of image codes can be performed “closer” to the memory devices, e.g., at the memory controller coupled to memory devices.

Patent Agency Ranking