METHOD AND DEVICE FOR UPDATING SOFTWARE EXECUTED FROM NON-VOLATILE MEMORY
    21.
    发明申请
    METHOD AND DEVICE FOR UPDATING SOFTWARE EXECUTED FROM NON-VOLATILE MEMORY 有权
    用于更新从非易失性存储器执行的软件的方法和设备

    公开(公告)号:US20150355900A1

    公开(公告)日:2015-12-10

    申请号:US14735522

    申请日:2015-06-10

    Applicant: ARM IP LIMITED

    Abstract: A data processing device 2 has a processor 4 which executes software directly from non-volatile memory 6, 8. The processor 4 has a runtime component 20 which dynamically maps software element identifiers specified by the software to corresponding software elements in memory 6, 8. Mapping information 22 is used to determine which software elements identifiers correspond to which software elements. This provides a level of indirection which can be used to make software updates more efficient, by updating only parts of the software while leaving old parts of the software as they are. Updated software elements can be stored to memory and the mapping information updated to point to the new elements, while existing mappings may be retained.

    Abstract translation: 数据处理设备2具有直接从非易失性存储器6,8执行软件的处理器4.处理器4具有运行时组件20,其将由软件指定的软件元素标识符动态映射到存储器6,8中的相应软件元素。 映射信息22用于确定哪些软件元素标识符对应于哪些软件元素。 这提供了一定程度的间接,可以通过只更新软件的一部分,同时保留软件的旧部分,从而使软件更新更加高效。 更新的软件元素可以存储到内存中,映射信息更新为指向新的元素,而现有的映射可能被保留。

    METHODS AND APPARATUS FOR DEFENDING AGAINST MEMORY-RELATED ATTACKS ON DEVICES

    公开(公告)号:US20190073481A1

    公开(公告)日:2019-03-07

    申请号:US16113241

    申请日:2018-08-27

    Applicant: Arm IP Limited

    Abstract: An apparatus and methods are provided to defending device against attacks. When it is determined that a device is under attack, a determination is made as to whether a layout of objects within said at least one resource at said device is protecting said device against said attack. The determination is then transferred to a remote server together with a layout of the resource at the device. When it is determined that the layout of objects within the at least one resource at the device is not protecting the device against the attack, then the layout of the at least one resource is changed. Either the remote server or the device may determine whether to change the layout in response to the attack.

    SECURE CONFIGURATION DATA STORAGE
    24.
    发明申请

    公开(公告)号:US20190012463A1

    公开(公告)日:2019-01-10

    申请号:US15748788

    申请日:2016-08-01

    Applicant: ARM IP LIMITED

    Abstract: A machine-implemented method for controlling a configuration data item in a storage-equipped device having at least two security domains, comprising receiving, by one of the security domains, a configuration data item; storing the configuration data item; providing a security indication for the configuration data item; and when an event indicates untrustworthiness of the data item, invalidating a configuration effect of the stored configuration data item. Further provided is a machine-implemented method for controlling a storage-equipped device as a node in a network of devices, comprising receiving information that a data source or type of a configuration data item is untrusted; analysing metadata for the data source and the configuration data item; populating a knowledge base with analysed metadata; and responsive to the analysed metadata, transmitting security information to the network of devices. A corresponding device and computer program product are also described.

    SECURE SERVER AND COMPUTE NODES
    25.
    发明申请

    公开(公告)号:US20190007216A1

    公开(公告)日:2019-01-03

    申请号:US16025142

    申请日:2018-07-02

    Applicant: Arm IP Limited

    Inventor: Milosch MERIAC

    Abstract: Apparatus and methods are described to provision a compute node in a plurality of compute nodes to a requestor, comprising receiving an anonymised access token from a provider of the compute nodes, requesting identities of a subset of compute nodes in the plurality of compute nodes, selecting at least one compute node in the subset of compute notes, providing the anonymised access token to a secure enclave of the selected at least one compute node, providing an anonymised identity of the requestor to the secure enclave and validating use of the anonymised identity with the access token.

    METHOD AND DEVICE FOR SCANNING FOR DATA PROCESSING DEVICES

    公开(公告)号:US20170373855A1

    公开(公告)日:2017-12-28

    申请号:US15532671

    申请日:2015-11-30

    Applicant: ARM IP Limited

    Abstract: There is provided a method of scanning for a remote device, the method comprising: generating, at a data processing device, a search input; transforming, at the data processing device, the search input to provide a transformed output, wherein the transformed output is representative of the search input; transmitting, a communication comprising the transformed output from the data processing device to the remote device; receiving, at the data processing a device, a communication from the remote device based on the transformed output.

    METHODS OF COMMUNICATION BETWEEN A REMOTE RESOURCE AND A DATA PROCESSING DEVICE

    公开(公告)号:US20170329658A1

    公开(公告)日:2017-11-16

    申请号:US15525620

    申请日:2015-10-28

    Applicant: ARM IP Limited

    CPC classification number: G06F9/546 G06F9/5027 G06F2209/548

    Abstract: Methods of communication between a remote resource and a data processing device, the system include storing in a transaction queue a message posted from the remote resource; sending a request to create a guest transaction queue, the guest transaction queue being accessible by both the data processing device and the remote resource; creating the guest transaction queue; reading, by the data processing device, the message from the remote resource; responding, from the data processing device to the remote resource by posting a message to the guest transaction queue; reading, by the remote resource, the message from the data processing device.

    RESOURCE ACCESS CONTROL USING A VALIDATION TOKEN

    公开(公告)号:US20170126685A1

    公开(公告)日:2017-05-04

    申请号:US15317805

    申请日:2015-05-29

    Applicant: ARM IP LIMITED

    Abstract: Access to a resource controlled by a resource server (6, 8) is provided using a validity token issued by a validation server (4). When a resource request from a user (12) is received at the resource server (6, 8), then the resource server (6, 8) determines if the resource request satisfies a policy. If the resource request satisfies the policy, then access to the resource may be permitted without confirming the validity of the validation token with the validation server (4). Conversely, if the resource request does not satisfy the policy, then validation of the validation token with the validation server (4) is performed before the access requested is permitted.

Patent Agency Ranking