-
公开(公告)号:US11128410B1
公开(公告)日:2021-09-21
申请号:US16515556
申请日:2019-07-18
Applicant: Cadence Design Systems, Inc.
Inventor: Chetan Paragaonkar , Gopi Krishnamurthy , Anish Mathew , Raveendra Pai Gopalakrishna , Anujan Varma
IPC: H04L1/18 , G06F13/38 , H04L12/801
Abstract: Embodiments disclosed are directed to methods for scheduling packets. According to example embodiments the method includes receiving, using a first layer in a communication protocol, a first request from a second layer in the communication protocol. The first request indicates to the first layer to output a data stream that includes a first location for the second layer to include a first control packet. The first layer is at a higher level of abstraction than the second layer. The method further includes transmitting, using the first layer, a first response to the second layer. The first response is based on the first request, and the first response identifies the first location in the data stream and a time of occurrence of the first location in the data stream.
-
公开(公告)号:US11722291B1
公开(公告)日:2023-08-08
申请号:US17399953
申请日:2021-08-11
Applicant: CADENCE DESIGN SYSTEMS, INC.
Inventor: Steven Ho , Gopi Krishnamurthy , Anish Mathew
CPC classification number: H04L9/0618 , H04L9/065 , H04L9/0816 , H04L9/0869
Abstract: A method of low-latency and encrypted hardware layer communication includes calculating, by an encryption circuit of a communication bridge controller, a pre-calculated encryption keys corresponding to a block encryptor of the encryption circuit, each block encryptor configured to use a corresponding pre-calculated encryption key to encrypt a corresponding unencrypted data block of a data transmission having one or more unencrypted data blocks, storing the one or more pre-calculated encryption keys in an encryption key memory associated with the communication bridge, for each unecrypted data block, encrypting the unencrypted data block using the corresponding pre-calculated encryption key to generate an encrypted data block and an authentication code block for the unencrypted data block, aggregating one or more encrypted data blocks into an encrypted data transmission, and generating an authenticated code corresponding to the encrypted data transmission based upon each of the authentication code blocks of each of the encrypted data blocks.
-