Detecting undesired energy consumption in electronic devices

    公开(公告)号:US10324516B2

    公开(公告)日:2019-06-18

    申请号:US15292333

    申请日:2016-10-13

    Applicant: ARM IP Limited

    Abstract: A method for detecting and responding to a configuration setting capable of causing undesired energy consumption in a configurable electronic device comprises measuring a power state of at least one connection point of the configurable electronic device to establish a measured power state value; comparing the measured power state value with a stored power state value for the connection point; and responsive to a discrepancy between the measured power state value and the stored power state value for the connection point where the discrepancy is capable of causing undesired energy consumption, emitting a condition signal.

    Proximity authentication protocol
    42.
    发明授权

    公开(公告)号:US10154411B2

    公开(公告)日:2018-12-11

    申请号:US15447729

    申请日:2017-03-02

    Applicant: ARM IP Limited

    Abstract: A machine implemented method of authenticating a communication channel between a first device and a second device by providing proof of proximity between both devices, the method comprising: generating, at the first device, an acoustic authentication signal to be received at the second device via a solid body acoustic coupling established between the first device and the second device thereby providing proof of proximity between both devices and so authenticating the communication channel between the first device and the second device.

    Method and device for updating software executed from non-volatile memory
    44.
    发明授权
    Method and device for updating software executed from non-volatile memory 有权
    用于更新从非易失性存储器执行的软件的方法和装置

    公开(公告)号:US09594551B2

    公开(公告)日:2017-03-14

    申请号:US14735522

    申请日:2015-06-10

    Applicant: ARM IP LIMITED

    Abstract: A data processing device 2 has a processor 4 which executes software directly from non-volatile memory 6, 8. The processor 4 has a runtime component 20 which dynamically maps software element identifiers specified by the software to corresponding software elements in memory 6, 8. Mapping information 22 is used to determine which software elements identifiers correspond to which software elements. This provides a level of indirection which can be used to make software updates more efficient, by updating only parts of the software while leaving old parts of the software as they are. Updated software elements can be stored to memory and the mapping information updated to point to the new elements, while existing mappings may be retained.

    Abstract translation: 数据处理设备2具有直接从非易失性存储器6,8执行软件的处理器4.处理器4具有运行时组件20,其将由软件指定的软件元素标识符动态地映射到存储器6,8中的相应软件元件。 映射信息22用于确定哪些软件元素标识符对应于哪些软件元素。 这提供了一定程度的间接,可以通过只更新软件的一部分,同时保留软件的旧部分,从而使软件更新更加高效。 更新的软件元素可以存储到内存中,映射信息更新为指向新的元素,而现有的映射可能被保留。

    ACCESS CONTROL AND CODE SCHEDULING
    45.
    发明申请
    ACCESS CONTROL AND CODE SCHEDULING 审中-公开
    访问控制和代码调度

    公开(公告)号:US20170039085A1

    公开(公告)日:2017-02-09

    申请号:US15304302

    申请日:2015-04-20

    Applicant: ARM IP LIMITED

    Abstract: A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls to hypervisor code which executes in the first privilege mode. These function calk are to perform a secure function requiring the rights of access which are only available in the first privilege mode. Scheduling code which executes in the second privilege mode controls scheduling of both the application code and the hypervisor code. Memory protection circuitry operating with physical addresses serves to control access permissions required to access different regions within the memory address space using configuration data which is written by the hypervisor code. The hypervisor code temporarily grants access to different regions within the physical memory address space to the system in the second privilege mode as needed to support the execution of code scheduled by the scheduling code.

    Abstract translation: 数据处理系统以包括第一特权模式和第二特权模式的多种模式操作,其中第一特权模式给出在第二权限模式中不可用的访问权限。 应用程序代码以第二特权模式执行,并对在第一特权模式下执行的管理程序代码生成函数调用。 这些功能calk是执行一个安全功能,需要访问的权限,只有在第一个权限模式下可用。 在第二特权模式下执行的调度代码控制应用代码和管理程序代码的调度。 使用物理地址操作的存储器保护电路用于控制使用由管理程序代码写入的配置数据来访问存储器地址空间内的不同区域所需的访问权限。 虚拟机管理程序代码根据需要临时授予访问物理内存地址空间内的不同区域到系统的第二权限模式,以支持由调度代码调度的代码的执行。

    METHODS AND RESOURCES FOR CREATING PERMISSIONS
    46.
    发明申请
    METHODS AND RESOURCES FOR CREATING PERMISSIONS 审中-公开
    创造许可证的方法和资源

    公开(公告)号:US20160212137A1

    公开(公告)日:2016-07-21

    申请号:US15001750

    申请日:2016-01-20

    CPC classification number: H04L63/101 H04L63/0823 H04L63/104

    Abstract: A method of creating, at a permissions management resource, access permissions relating to a subject device for at least one data processing device, the method comprising: obtaining, at the permissions management resource, input data; generating, at the permissions management resource, at least one permission relating to accessing the subject device in response to the input data; transmitting, from the permissions management resource to the subject device and/or the at least one processing device, a communication comprising the at least one permission.

    Abstract translation: 在权限管理资源上创建与至少一个数据处理设备的主题设备相关的访问许可的方法,所述方法包括:在所述许可管理资源处获取输入数据; 在所述许可管理资源处产生响应于所述输入数据访问所述主题设备的至少一个许可; 从所述许可管理资源向所述主体设备和/或所述至少一个处理设备发送包括所述至少一个许可的通信。

    Data stream assembly control
    49.
    发明授权

    公开(公告)号:US11061581B2

    公开(公告)日:2021-07-13

    申请号:US15771250

    申请日:2015-12-23

    Applicant: ARM IP LIMITED

    Abstract: Technology for operating a data-source device for assembling a data stream compliant with a data stream constraint. The technology comprises acquiring a plurality of data items by accessing data in a memory and/or transforming data. Prior to completion of the accessing data in a memory, an accessor is selected based on an estimate of access constraint. Prior to completion of the transforming data, a transformer is selected based on an estimate of transformation constraint, wherein the transportation constraint comprises any data acquisition constraint. The access and transformation constraints are dependent upon system state it the data-source system. The data items are positioned in the data stream, and, responsive to achieving compliance with the data stream constraint, the data strewn is communicated.

    Communication mechanism for data processing devices

    公开(公告)号:US11050733B2

    公开(公告)日:2021-06-29

    申请号:US16519383

    申请日:2019-07-23

    Applicant: ARM IP Limited

    Abstract: A method for controlling communications between a data processing device in a first network and a target service in a second network via a gateway apparatus, the method comprising: transmitting a request to communicate with the target service from the data processing device to the gateway apparatus; transmitting device credentials from the data processing device to the gateway apparatus, wherein the credentials comprise information relating to the target service; verifying at the gateway apparatus an authentication status of the data processing device based on the device credentials; establishing a communication path between the data processing device and the target service if the authentication status is verified.

Patent Agency Ranking