Security Enclave Processor for a System on a Chip
    3.
    发明申请
    Security Enclave Processor for a System on a Chip 有权
    用于芯片系统的安全处理器

    公开(公告)号:US20140089682A1

    公开(公告)日:2014-03-27

    申请号:US13626566

    申请日:2012-09-25

    Applicant: APPLE INC.

    CPC classification number: G06F21/72 G06F21/575

    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.

    Abstract translation: SOC实现安全飞地处理器(SEP)。 SEP可以包括处理器和一个或多个安全外设。 SEP可以与SOC的其余部分隔离(例如SOC中的一个或多个中央处理单元(CPU),或SOC中的应用处理器(AP))。 对SEP的访问可以由硬件严格控制。 例如,描述了CPU / AP仅能访问SEP中的邮箱位置的机制。 CPU / AP可以向邮箱写入消息,SEP可以读取并响应。 在一些实施例中,SEP可以包括以下一个或多个:使用包装密钥的安全密钥管理,引导和/或电源管理的SEP控制以及存储器中的单独的信任区域。

    Security Enclave Processor Boot Control
    4.
    发明申请
    Security Enclave Processor Boot Control 有权
    安全处理器启动控制

    公开(公告)号:US20140089650A1

    公开(公告)日:2014-03-27

    申请号:US13626585

    申请日:2012-09-25

    Applicant: APPLE INC.

    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.

    Abstract translation: SOC实现安全飞地处理器(SEP)。 SEP可以包括处理器和一个或多个安全外设。 SEP可以与SOC的其余部分隔离(例如SOC中的一个或多个中央处理单元(CPU),或SOC中的应用处理器(AP))。 对SEP的访问可以由硬件严格控制。 例如,描述了CPU / AP仅能访问SEP中的邮箱位置的机制。 CPU / AP可以向邮箱写入消息,SEP可以读取并响应。 在一些实施例中,SEP可以包括以下一个或多个:使用包装密钥的安全密钥管理,引导和/或电源管理的SEP控制以及存储器中的单独的信任区域。

    DATA WHITENING FOR WRITING AND READING DATA TO AND FROM A NON-VOLATILE MEMORY
    5.
    发明申请
    DATA WHITENING FOR WRITING AND READING DATA TO AND FROM A NON-VOLATILE MEMORY 有权
    数据白名字写入和读取非易失性存储器中的数据

    公开(公告)号:US20140075208A1

    公开(公告)日:2014-03-13

    申请号:US14082940

    申请日:2013-11-18

    Applicant: Apple Inc.

    Abstract: Systems, apparatuses, and methods are provided for whitening and managing data for storage in non-volatile memories, such as Flash memory. In some embodiments, an electronic device such as media player is provided, which may include a system-on-a-chip (SoC) and a non-volatile memory. The SoC may include SoC control circuitry and a memory interface that acts as an interface between the SoC control circuitry and the non-volatile memory. The SoC can also include an encryption module, such as a block cipher based on the Advanced Encryption Standard (AES). The memory interface can direct the encryption module to whiten all types of data prior to storage in the non-volatile memory, including sensitive data, non-sensitive data, and memory management data. This can, for example, prevent or reduce program-disturb problems or other read/write/erase reliability issues.

    Abstract translation: 提供了用于白化和管理数据以存储在诸如闪存的非易失性存储器中的系统,装置和方法。 在一些实施例中,提供诸如媒体播放器的电子设备,其可以包括片上系统(SoC)和非易失性存储器。 SoC可以包括SoC控制电路和用作SoC控制电路和非易失性存储器之间的接口的存储器接口。 SoC还可以包括加密模块,例如基于高级加密标准(AES)的块密码。 存储器接口可以指示加密模块在存储在非易失性存储器之前对所有类型的数据进行白化,包括敏感数据,非敏感数据和存储器管理数据。 这可以例如防止或减少程序干扰问题或其他读/写/擦除可靠性问题。

    Unified Addressable Memory
    6.
    发明申请

    公开(公告)号:US20220058292A1

    公开(公告)日:2022-02-24

    申请号:US17469591

    申请日:2021-09-08

    Applicant: Apple Inc.

    Abstract: In one embodiment, a system includes a non-volatile memory that may serve as both the main memory system and the backing store (or persistent storage). In some embodiments, the non-volatile memory is divided into a main memory portion and a persistent portion. Data in the main memory operation may be encrypted using one or more first keys, and data in the persistent portion may be encrypted using one or more second keys, in an embodiment. The volatile behavior of main memory may be implemented by discarding the one or more first keys in a power down event or other event that indicates a loss of main memory data, while the one or more second keys may be retained. In one embodiment, the physical address space of the non-volatile memory may be a mapping from a second physical address space that is used within the system.

    Security enclave processor for a system on a chip
    8.
    发明授权
    Security enclave processor for a system on a chip 有权
    用于芯片上系统的安全飞地处理器

    公开(公告)号:US08832465B2

    公开(公告)日:2014-09-09

    申请号:US13626566

    申请日:2012-09-25

    Applicant: Apple Inc.

    CPC classification number: G06F21/72 G06F21/575

    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.

    Abstract translation: SOC实现安全飞地处理器(SEP)。 SEP可以包括处理器和一个或多个安全外设。 SEP可以与SOC的其余部分隔离(例如SOC中的一个或多个中央处理单元(CPU),或SOC中的应用处理器(AP))。 对SEP的访问可以由硬件严格控制。 例如,描述了CPU / AP仅能访问SEP中的邮箱位置的机制。 CPU / AP可以向邮箱写入消息,SEP可以读取并响应。 在一些实施例中,SEP可以包括以下一个或多个:使用包装密钥的安全密钥管理,引导和/或电源管理的SEP控制以及存储器中的单独的信任区域。

    Coordinated panic flow
    9.
    发明授权

    公开(公告)号:US10860412B2

    公开(公告)日:2020-12-08

    申请号:US16147330

    申请日:2018-09-28

    Applicant: Apple Inc.

    Abstract: One embodiment provides for a data processing system comprising multiple independent processors to execute multiple operating system environments of the data processing system, the multiple operating system environments to enable operation of multiple regions of a computing device associated with the data processing system. The multiple operating system environments are interconnected via a transport agnostic communication link. In response to detection of a fatal error in one or more of the multiple operating system environments, the multiple operating system environments coordinate performance of multiple separate error handling operations within the multiple operating system environments to generate a combined error log. The combined error log includes operational states of the multiple operating system environments.

    Embedded Encryption/Secure Memory Management Unit for Peripheral Interface Controller
    10.
    发明申请
    Embedded Encryption/Secure Memory Management Unit for Peripheral Interface Controller 有权
    用于外围接口控制器的嵌入式加密/安全内存管理单元

    公开(公告)号:US20150046702A1

    公开(公告)日:2015-02-12

    申请号:US13963457

    申请日:2013-08-09

    Applicant: Apple Inc.

    Abstract: In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and decrypt data received from the peripheral interface. The encryption may be transparent to the device connected to the peripheral interface that is receiving/supplying the data. In an embodiment, the peripheral interface controller is included in a system on a chip (SOC) that also includes a memory controller configured to couple to a memory. The memory may be mounted on the SOC in a chip-on-chip or package-on-package configuration. The unencrypted data may be stored in the memory for use by other parts of the SOC (e.g. processors, on-chip peripherals, etc.). The keys used for the encryption/decryption of data may remain within the SOC.

    Abstract translation: 在一个实施例中,外围接口控制器可以包括内联密码引擎,其可以对通过外围接口发送的数据进行加密,并解密从外围接口接收的数据。 加密可能对连接到正在接收/提供数据的外设接口的设备是透明的。 在一个实施例中,外围接口控制器包括在芯片上的系统(SOC)中,该系统还包括被配置为耦合到存储器的存储器控​​制器。 存储器可以以片上芯片或封装的封装形式安装在SOC上。 未加密的数据可以存储在存储器中以供SOC的其他部分使用(例如处理器,片上外设等)。 用于加密/解密数据的密钥可能保留在SOC内。

Patent Agency Ranking