Timebase synchronization
    3.
    发明授权

    公开(公告)号:US10048720B2

    公开(公告)日:2018-08-14

    申请号:US15831732

    申请日:2017-12-05

    Applicant: Apple Inc.

    Abstract: In an embodiment, an integrated circuit such as an SOC (or even a discrete chip system) includes one or more local timebases in various locations. The timebases may be incremented based on a high frequency local clock that may be subject to variation during use due. Periodically, based on a lower frequency clock that is subject to less variation, the local timebases may be synchronized to the correct time, using hardware circuitry. In particular, the correct timebase value for the next synchronization may be transmitted to each local timebase, and the control circuit for the local timebase may be configured to saturate the local timebase at the correct value if the local timebase reaches the correct value before the synchronization occurs. Similarly, if the synchronization occurs and the local timebase has not reached the correct value, the control circuit may be configured to load the correct timebase value.

    Timebase synchronization
    6.
    发明授权

    公开(公告)号:US09864399B2

    公开(公告)日:2018-01-09

    申请号:US14965073

    申请日:2015-12-10

    Applicant: Apple Inc.

    CPC classification number: G06F1/12 G06F1/14

    Abstract: In an embodiment, an integrated circuit such as an SOC (or even a discrete chip system) includes one or more local timebases in various locations. The timebases may be incremented based on a high frequency local clock that may be subject to variation during use due. Periodically, based on a lower frequency clock that is subject to less variation, the local timebases may be synchronized to the correct time, using hardware circuitry. In particular, the correct timebase value for the next synchronization may be transmitted to each local timebase, and the control circuit for the local timebase may be configured to saturate the local timebase at the correct value if the local timebase reaches the correct value before the synchronization occurs. Similarly, if the synchronization occurs and the local timebase has not reached the correct value, the control circuit may be configured to load the correct timebase value.

    Method for calibrating a clock signal generator in a reduced power state
    7.
    发明授权
    Method for calibrating a clock signal generator in a reduced power state 有权
    用于在降低功率状态下校准时钟信号发生器的方法

    公开(公告)号:US09395747B1

    公开(公告)日:2016-07-19

    申请号:US14592146

    申请日:2015-01-08

    Applicant: Apple Inc.

    CPC classification number: G06F1/12

    Abstract: Various embodiments of a clock generator are disclosed. An example system may include a functional unit, and a clock generation unit configured to adjust a frequency of an output clock signal responsive to an assertion of an enable signal from the functional unit. The clock generation unit may also be configured to halt the output clock signal responsive to a de-assertion of the enable signal by the functional unit and to restart the output clock signal responsive to a determination that a first predetermined amount of time has elapsed since the output clock signal was halted. The clock generation unit may be further configured to adjust the frequency of the output clock signal responsive to restarting the output clock signal, and to halt the output clock signal responsive to a determination that the frequency of the output clock signal is within a predetermined frequency range that includes the target frequency.

    Abstract translation: 公开了时钟发生器的各种实施例。 示例性系统可以包括功能单元,以及时钟生成单元,被配置为响应于来自功能单元的使能信号的断言来调整输出时钟信号的频率。 时钟生成单元还可以被配置为响应于功能单元的使能信号的断言而停止输出时钟信号,并且响应于从第一预定时间量过去的确定重新启动输出时钟信号 输出时钟信号停止。 时钟生成单元还可以被配置为响应于重新启动输出时钟信号来调整输出时钟信号的频率,并响应于输出时钟信号的频率在预定频率范围内的确定而停止输出时钟信号 包括目标频率。

    SYSTEMS AND METHODS FOR DETECTING REPLAY ATTACKS ON SECURITY SPACE

    公开(公告)号:US20190260799A1

    公开(公告)日:2019-08-22

    申请号:US16276504

    申请日:2019-02-14

    Applicant: Apple Inc.

    Abstract: A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data corresponding to sensitive information are stored in off-chip memory. The security processor uses an integrity data structure, such as an integrity tree, for the blocks. The intermediate nodes of the integrity tree use nonces which have been generated independent of any value within a corresponding block. By using only the nonces to generate tags in the root at the top layer stored in on-chip memory and the nodes of the intermediate layers stored in off-chip memory, an amount of storage used is reduced for supporting the integrity tree. When the security processor detects events which create access requests for one or more blocks, the security processor uses the integrity tree to verify a replay attack has not occurred and corrupted data.

Patent Agency Ranking