HYBRID MEMORY ARCHITECTURE
    53.
    发明申请
    HYBRID MEMORY ARCHITECTURE 审中-公开
    混合存储器架构

    公开(公告)号:US20160224252A1

    公开(公告)日:2016-08-04

    申请号:US14609904

    申请日:2015-01-30

    CPC classification number: G06F12/0802 G06F12/0895 G06F2212/225

    Abstract: Hybrid memory architecture technologies are described. In accordance with embodiments disclosed herein, there is provided a processing device having a core and a memory controller communicably coupled to the core to receive a request to fetch data. The memory controller is communicably coupled to a hybrid memory architecture including a near memory, wherein the near memory is divided into a flat memory region and a cache memory region.

    Abstract translation: 描述了混合存储器架构技术。 根据本文公开的实施例,提供了一种处理设备,其具有核心和可通信地耦合到核心的存储器控​​制器,以接收获取数据的请求。 存储器控制器可通信地耦合到包括近存储器的混合存储器架构,其中近端存储器被划分为平坦存储器区域和高速缓冲存储器区域。

    Fast memory ECC error correction
    55.
    发明授权

    公开(公告)号:US12242342B2

    公开(公告)日:2025-03-04

    申请号:US17550859

    申请日:2021-12-14

    Abstract: A memory controller having an error checking and correction (ECC) circuitry can detect an error in data being read from memory and correct that error with a retry flow without needing to send another read to the memory for the data. The read data is stored in a read data buffer (RDB) at the memory controller when the read data is received from memory. The memory controller has an error detection path from the RDB to the host and an error correction path. Read data that has no errors can be sent directly to the host. Instead of flushing the RDB in response to the error detection, the memory controller executes a retry flow, where the RDB provides the read data to the error correction path for error correction.

    Key rotating trees with split counters for efficient hardware replay protection

    公开(公告)号:US11088846B2

    公开(公告)日:2021-08-10

    申请号:US16368810

    申请日:2019-03-28

    Abstract: In one example a computer implemented method comprises encrypting data to be stored in a protected region of a memory using a message authentication code (MAC) having a first value determined using a first key during a first period of time, generating a replay integrity tree structure comprising security metadata for the data stored in the protected region of the memory using the first value of the MAC, and at the end of the first period of time, re-keying the MAC to have a second value determined using a second key at the end of the first period of time, decrypting the data stored in the protected region using the first value for the MAC, re-encrypting the data stored in the protected region using the second value for the MAC, and updating the replay integrity tree using the second value for the MAC. Other examples may be described.

Patent Agency Ranking