Compression engine with configurable search depths and window sizes

    公开(公告)号:US12021550B2

    公开(公告)日:2024-06-25

    申请号:US17119892

    申请日:2020-12-11

    CPC classification number: H03M7/3086 G06F16/2255 H03M7/40

    Abstract: Examples described herein relate to an encoder circuitry to apply one of multiple lossless data compression schemes on input data. In some examples, to compress input data, the encoder circuitry is to utilize a search window size and number of searches based on an applied compression scheme. In some examples, content of a memory is reconfigured to store data corresponding to a search window size of the applied compression scheme. In some examples, an applicable hash function is configured based on the applied compression scheme. In some examples, a number of searches are made for a byte position. In some examples, the encoder circuitry includes a hash table look-up and a bank decoder. In some examples, the hash table look-up is to generate a hash index to identify an address of an entry in the search window. In some examples, the bank decoder is to select a bank based on the hash index.

    Apparatus and method for hardware-based memoization of function calls to reduce instruction execution

    公开(公告)号:US12020033B2

    公开(公告)日:2024-06-25

    申请号:US17133899

    申请日:2020-12-24

    CPC classification number: G06F9/3836 G06F9/223 G06F9/3838

    Abstract: Apparatus and method for memorizing repeat function calls are described herein. An apparatus embodiment includes: uop buffer circuitry to identify a function for memorization based on retiring micro-operations (uops) from a processing pipeline; memorization retirement circuitry to generate a signature of the function which includes input and output data of the function; a memorization data structure to store the signature; and predictor circuitry to detect an instance of the function to be executed by the processing pipeline and to responsively exclude a first subset of uops associated with the instance from execution when a confidence level associated with the function is above a threshold. One or more instructions that are data-dependent on execution of the instance is then provided with the output data of the function from the memorization data structure.

    Compartment isolation for load store forwarding

    公开(公告)号:US12019733B2

    公开(公告)日:2024-06-25

    申请号:US17692464

    申请日:2022-03-11

    Inventor: Michael LeMay

    CPC classification number: G06F21/52 G06F2221/034

    Abstract: A method comprises receiving, in a store buffer, at least a portion of a store instruction, the at least a portion of the store instruction comprising a data operand, receiving, a load instruction for execution; and determining whether the store instruction and the load instruction are in different compartments.

    APPARATUS, SYSTEM, AND METHOD OF SETTING AN IDLE TIMEOUT PERIOD FOR A WIRELESS COMMUNICATION LINK

    公开(公告)号:US20240205828A1

    公开(公告)日:2024-06-20

    申请号:US18083535

    申请日:2022-12-18

    CPC classification number: H04W52/0235 H04W76/20

    Abstract: For example, an apparatus may include circuitry and logic configured to cause a wireless communication device to identify an end-to-end network latency of a data stream communicated between the wireless communication device and an endpoint via a wireless communication link between the wireless communication device and an Access Point (AP); and to set an idle timeout period for the wireless communication link based on the end-to-end network latency of the data stream. For example, the idle timeout period includes a time period after which the wireless communication device is to be allowed to switch the wireless communication link from an active mode to a power save mode when the wireless communication link is idle.

    SECURE KEY MANAGEMENT FOR SERVICE MESH DEPLOYMENTS

    公开(公告)号:US20240205198A1

    公开(公告)日:2024-06-20

    申请号:US18288955

    申请日:2022-03-25

    CPC classification number: H04L63/0428 H04L63/0823

    Abstract: Various methods, systems, and use cases for securely managing, generating, and controlling access to keys in a service mesh are discussed herein. In various examples, key protection operations include service mesh signing key protection and service mesh communication key protection, for a secure transport session between services such as conducted with mutual transport layer security (mTLS). For instance, such key protection operations may be used to establish communications between the service host and another entity within the service mesh, in a secure transport session, based on use of a private key (secured using a confidential computing technology) in a secure enclave or other secure compute environment to sign one or more keys for the secure transport session.

Patent Agency Ranking