-
公开(公告)号:US20190354681A1
公开(公告)日:2019-11-21
申请号:US15982582
申请日:2018-05-17
Applicant: Arm IP Limited
Inventor: Niklas Lennart HAUSER , Brendan James MORAN , Milosch MERIAC
Abstract: Broadly speaking, the present techniques provide methods, apparatus and systems for monitoring operation of a device. More particularly, the present techniques provide methods for monitoring operation of a device based on a device firmware update that is associated with at least one power profile.
-
公开(公告)号:US20190073481A1
公开(公告)日:2019-03-07
申请号:US16113241
申请日:2018-08-27
Applicant: Arm IP Limited
Inventor: Alessandro ANGELINO , Milosch MERIAC , Brendan James MORAN
Abstract: An apparatus and methods are provided to defending device against attacks. When it is determined that a device is under attack, a determination is made as to whether a layout of objects within said at least one resource at said device is protecting said device against said attack. The determination is then transferred to a remote server together with a layout of the resource at the device. When it is determined that the layout of objects within the at least one resource at the device is not protecting the device against the attack, then the layout of the at least one resource is changed. Either the remote server or the device may determine whether to change the layout in response to the attack.
-
公开(公告)号:US20190012463A1
公开(公告)日:2019-01-10
申请号:US15748788
申请日:2016-08-01
Applicant: ARM IP LIMITED
Inventor: Geraint LUFF , Thomas GROCUTT , Milosch MERIAC , Jonathan AUSTIN
Abstract: A machine-implemented method for controlling a configuration data item in a storage-equipped device having at least two security domains, comprising receiving, by one of the security domains, a configuration data item; storing the configuration data item; providing a security indication for the configuration data item; and when an event indicates untrustworthiness of the data item, invalidating a configuration effect of the stored configuration data item. Further provided is a machine-implemented method for controlling a storage-equipped device as a node in a network of devices, comprising receiving information that a data source or type of a configuration data item is untrusted; analysing metadata for the data source and the configuration data item; populating a knowledge base with analysed metadata; and responsive to the analysed metadata, transmitting security information to the network of devices. A corresponding device and computer program product are also described.
-
公开(公告)号:US20190007216A1
公开(公告)日:2019-01-03
申请号:US16025142
申请日:2018-07-02
Applicant: Arm IP Limited
Inventor: Milosch MERIAC
Abstract: Apparatus and methods are described to provision a compute node in a plurality of compute nodes to a requestor, comprising receiving an anonymised access token from a provider of the compute nodes, requesting identities of a subset of compute nodes in the plurality of compute nodes, selecting at least one compute node in the subset of compute notes, providing the anonymised access token to a secure enclave of the selected at least one compute node, providing an anonymised identity of the requestor to the secure enclave and validating use of the anonymised identity with the access token.
-
公开(公告)号:US20180225188A1
公开(公告)日:2018-08-09
申请号:US15749108
申请日:2016-07-29
Applicant: Arm IP Limited
Inventor: Milosch MERIAC , Thomas Christopher GROCUTT , Jonathan Michael AUSTIN , Geraint David LUFF
CPC classification number: G06F11/3476 , G06F11/0751 , G06F11/3013 , G06F11/3037 , G06F11/3082 , G06F11/3452 , G06F21/50 , G06F21/563 , G06F2201/88
Abstract: A first processing component samples and lossily accumulates statistical activity data by generating at least one data bucket by segmenting a memory window in a memory and providing a map of the segmented memory window; sampling to detect activity in the data bucket and surjectively populating the map with statistical activity data; and responsive to a trigger, passing at least part of a population of the map to a second processing component. The second processing component receives and stores the at least part of the population of the surjective map, compares it with at least one previously stored map population; and on detecting anomalous patterning, performs an “anomaly detected” action.
-
公开(公告)号:US20180136984A1
公开(公告)日:2018-05-17
申请号:US15572692
申请日:2016-04-21
Applicant: ARM IP LIMITED , ARM LIMITED
Inventor: Christopher Mark PAOLA , Milosch MERIAC , Remy POTTIER
CPC classification number: G06F9/5088 , G06F11/34 , G06F11/3409 , G06F11/3442 , H04L67/10 , H04L67/1008 , H04L67/327
Abstract: A system provided at nodes within a network of nodes enabling the nodes to migrate activities to other nodes within its communication range to provide load balancing across the network. The other nodes having power and processing capabilities and capacity enabling them to undertake the migrated activities.
-
公开(公告)号:US20170373855A1
公开(公告)日:2017-12-28
申请号:US15532671
申请日:2015-11-30
Applicant: ARM IP Limited
Inventor: Andrew John PRITCHARD , Geraint LUFF , Milosch MERIAC
Abstract: There is provided a method of scanning for a remote device, the method comprising: generating, at a data processing device, a search input; transforming, at the data processing device, the search input to provide a transformed output, wherein the transformed output is representative of the search input; transmitting, a communication comprising the transformed output from the data processing device to the remote device; receiving, at the data processing a device, a communication from the remote device based on the transformed output.
-
公开(公告)号:US20170329658A1
公开(公告)日:2017-11-16
申请号:US15525620
申请日:2015-10-28
Applicant: ARM IP Limited
Inventor: Milosch MERIAC , Geraint David LUFF , Christopher Mark PAOLA
CPC classification number: G06F9/546 , G06F9/5027 , G06F2209/548
Abstract: Methods of communication between a remote resource and a data processing device, the system include storing in a transaction queue a message posted from the remote resource; sending a request to create a guest transaction queue, the guest transaction queue being accessible by both the data processing device and the remote resource; creating the guest transaction queue; reading, by the data processing device, the message from the remote resource; responding, from the data processing device to the remote resource by posting a message to the guest transaction queue; reading, by the remote resource, the message from the data processing device.
-
29.
公开(公告)号:US20170201496A1
公开(公告)日:2017-07-13
申请号:US15315686
申请日:2015-05-13
Applicant: ARM IP LIMITED
Inventor: Geraint David LUFF , Milosch MERIAC
CPC classification number: H04L9/3247 , G06F12/0813 , G06F17/3056 , G06F17/30887 , G06F19/00 , G06F21/6209 , G06F21/6245 , G06F2212/154 , G06F2212/60 , G06F2212/62 , G06F2221/2107 , G06F2221/2119 , G16H10/65 , G16H80/00 , H04L9/14 , H04L9/30 , H04L9/3263 , H04L63/0428 , H04L63/067 , H04L63/08 , H04L63/101 , H04L63/166 , H04L63/168 , H04L67/02 , H04L67/2842
Abstract: A method of accessing a remote resource (4) from a data processing device (2) includes obtaining a first URL corresponding to the remote resource (4), obtaining secret data corresponding to the first URL, using the secret data to generate an obscured URL at the data processing device (2), and accessing the remote resource using the obscured URL. This allows the user of the device (2) to see a first URL which is intelligible and provides useful information about the device, without sharing that information with the network. The obscured URL identifies the actual location of the remote resource and can be an unintelligible stream of digits or letters.
-
公开(公告)号:US20170126685A1
公开(公告)日:2017-05-04
申请号:US15317805
申请日:2015-05-29
Applicant: ARM IP LIMITED
Inventor: Robert George TAYLOR , Milosch MERIAC , Andrew John PRITCHARD , Hannes TSCHOFENIG , Christopher Mark PAOLA
IPC: H04L29/06
Abstract: Access to a resource controlled by a resource server (6, 8) is provided using a validity token issued by a validation server (4). When a resource request from a user (12) is received at the resource server (6, 8), then the resource server (6, 8) determines if the resource request satisfies a policy. If the resource request satisfies the policy, then access to the resource may be permitted without confirming the validity of the validation token with the validation server (4). Conversely, if the resource request does not satisfy the policy, then validation of the validation token with the validation server (4) is performed before the access requested is permitted.
-
-
-
-
-
-
-
-
-