Trusted device
    31.
    发明授权

    公开(公告)号:US11106774B2

    公开(公告)日:2021-08-31

    申请号:US16525698

    申请日:2019-07-30

    Applicant: ARM IP Limited

    Abstract: A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.

    Wrist-worn device clasp
    32.
    发明授权

    公开(公告)号:US11026485B2

    公开(公告)日:2021-06-08

    申请号:US16037806

    申请日:2018-07-17

    Applicant: ARM IP Limited

    Abstract: A wrist-worn device clasp that secures a strap of the wrist-worn device. A first mechanical part of the wrist worn device interlocks with a second mechanical part by motion in a first plane in order to resist motion perpendicular to said first plane. The first mechanical part also inhibits a first securing part and a second securing part being separated by tension along the strap substantially perpendicular to the first plane when the first mechanical part and second mechanical part are engaged with each other. The first securing part and the second securing part inhibit separation of the first mechanical part and the second mechanical part by motion parallel to the first plane when they are engaged with each other by motion perpendicular to the first plane.

    Access control and code scheduling
    33.
    发明授权

    公开(公告)号:US10860354B2

    公开(公告)日:2020-12-08

    申请号:US15304302

    申请日:2015-04-20

    Applicant: ARM IP LIMITED

    Abstract: A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls to hypervisor code which executes in the first privilege mode. These function calls are to perform a secure function requiring the rights of access which are only available in the first privilege mode. Scheduling code which executes in the second privilege mode controls scheduling of both the application code and the hypervisor code. Memory protection circuitry operating with physical addresses serves to control access permissions required to access different regions within the memory address space using configuration data which is written by the hypervisor code. The hypervisor code temporarily grants access to different regions within the physical memory address space to the system in the second privilege mode as needed to support the execution of code scheduled by the scheduling code.

    Reconciling electronic transactions

    公开(公告)号:US10657523B2

    公开(公告)日:2020-05-19

    申请号:US13968733

    申请日:2013-08-16

    Applicant: ARM IP Limited

    Abstract: An apparatus, system and method for establishing a transaction between first and second parties including a first signing step in which a transaction message including a request and a transaction identifier is cryptographically signed by the first party to form a first cryptographically signed message. The first signed message is transmitted from the first party to the second party. The second party then cryptographically signs the first message to form a second cryptographically signed message. The second message is also transmitted from one or more of a plurality of parties having the second message to a trusted third party. The trusted third party is able to verify that the second message was cryptographically signed by the second party and can also verify that the first message in the second message was cryptographically signed by the first party.

    Method and device for updating software executed from non-volatile memory
    36.
    发明授权
    Method and device for updating software executed from non-volatile memory 有权
    用于更新从非易失性存储器执行的软件的方法和装置

    公开(公告)号:US09594551B2

    公开(公告)日:2017-03-14

    申请号:US14735522

    申请日:2015-06-10

    Applicant: ARM IP LIMITED

    Abstract: A data processing device 2 has a processor 4 which executes software directly from non-volatile memory 6, 8. The processor 4 has a runtime component 20 which dynamically maps software element identifiers specified by the software to corresponding software elements in memory 6, 8. Mapping information 22 is used to determine which software elements identifiers correspond to which software elements. This provides a level of indirection which can be used to make software updates more efficient, by updating only parts of the software while leaving old parts of the software as they are. Updated software elements can be stored to memory and the mapping information updated to point to the new elements, while existing mappings may be retained.

    Abstract translation: 数据处理设备2具有直接从非易失性存储器6,8执行软件的处理器4.处理器4具有运行时组件20,其将由软件指定的软件元素标识符动态地映射到存储器6,8中的相应软件元件。 映射信息22用于确定哪些软件元素标识符对应于哪些软件元素。 这提供了一定程度的间接,可以通过只更新软件的一部分,同时保留软件的旧部分,从而使软件更新更加高效。 更新的软件元素可以存储到内存中,映射信息更新为指向新的元素,而现有的映射可能被保留。

    ACCESS CONTROL AND CODE SCHEDULING
    37.
    发明申请
    ACCESS CONTROL AND CODE SCHEDULING 审中-公开
    访问控制和代码调度

    公开(公告)号:US20170039085A1

    公开(公告)日:2017-02-09

    申请号:US15304302

    申请日:2015-04-20

    Applicant: ARM IP LIMITED

    Abstract: A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls to hypervisor code which executes in the first privilege mode. These function calk are to perform a secure function requiring the rights of access which are only available in the first privilege mode. Scheduling code which executes in the second privilege mode controls scheduling of both the application code and the hypervisor code. Memory protection circuitry operating with physical addresses serves to control access permissions required to access different regions within the memory address space using configuration data which is written by the hypervisor code. The hypervisor code temporarily grants access to different regions within the physical memory address space to the system in the second privilege mode as needed to support the execution of code scheduled by the scheduling code.

    Abstract translation: 数据处理系统以包括第一特权模式和第二特权模式的多种模式操作,其中第一特权模式给出在第二权限模式中不可用的访问权限。 应用程序代码以第二特权模式执行,并对在第一特权模式下执行的管理程序代码生成函数调用。 这些功能calk是执行一个安全功能,需要访问的权限,只有在第一个权限模式下可用。 在第二特权模式下执行的调度代码控制应用代码和管理程序代码的调度。 使用物理地址操作的存储器保护电路用于控制使用由管理程序代码写入的配置数据来访问存储器地址空间内的不同区域所需的访问权限。 虚拟机管理程序代码根据需要临时授予访问物理内存地址空间内的不同区域到系统的第二权限模式,以支持由调度代码调度的代码的执行。

    CALIBRATING PROXIMITY DETECTION FOR A WEARABLE PROCESSING DEVICE
    38.
    发明申请
    CALIBRATING PROXIMITY DETECTION FOR A WEARABLE PROCESSING DEVICE 审中-公开
    用于可磨损加工设备的校准临近检测

    公开(公告)号:US20160255068A1

    公开(公告)日:2016-09-01

    申请号:US15034540

    申请日:2014-11-05

    Applicant: ARM IP LIMITED

    Abstract: Proximity of a wearable processing device to a data processing apparatus is detected based on wireless signals received by the data processing apparatus from the wearable processing device. A user input operation is detected which comprises a physical interaction with the data processing apparatus. In response to detecting the user input operation, at least one detection parameter is calibrated for the proximity detection. This provides a convenient technique for calibrating the proximity detection which does not require complicated operations from the user.

    Abstract translation: 基于由数据处理装置从可穿戴处理装置接收的无线信号来检测可穿戴处理装置对数据处理装置的接近程度。 检测到包括与数据处理装置的物理交互的用户输入操作。 响应于检测到用户输入操作,至少一个检测参数被校准用于接近检测。 这提供了用于校准接近检测的方便的技术,其不需要用户的复杂操作。

    METHODS AND RESOURCES FOR CREATING PERMISSIONS
    39.
    发明申请
    METHODS AND RESOURCES FOR CREATING PERMISSIONS 审中-公开
    创造许可证的方法和资源

    公开(公告)号:US20160212137A1

    公开(公告)日:2016-07-21

    申请号:US15001750

    申请日:2016-01-20

    CPC classification number: H04L63/101 H04L63/0823 H04L63/104

    Abstract: A method of creating, at a permissions management resource, access permissions relating to a subject device for at least one data processing device, the method comprising: obtaining, at the permissions management resource, input data; generating, at the permissions management resource, at least one permission relating to accessing the subject device in response to the input data; transmitting, from the permissions management resource to the subject device and/or the at least one processing device, a communication comprising the at least one permission.

    Abstract translation: 在权限管理资源上创建与至少一个数据处理设备的主题设备相关的访问许可的方法,所述方法包括:在所述许可管理资源处获取输入数据; 在所述许可管理资源处产生响应于所述输入数据访问所述主题设备的至少一个许可; 从所述许可管理资源向所述主体设备和/或所述至少一个处理设备发送包括所述至少一个许可的通信。

Patent Agency Ranking