Dynamic voltage dithering
    1.
    发明授权
    Dynamic voltage dithering 有权
    动态电压抖动

    公开(公告)号:US08667308B2

    公开(公告)日:2014-03-04

    申请号:US12833765

    申请日:2010-07-09

    CPC classification number: G06F1/189 G06F1/3203 G06F1/3296 Y02D10/172

    Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.

    Abstract translation: 响应于确定高电压信号的剩余量超过电压开关阈值,接收高电压模式的请求并且启动高电压定时器。 响应于该请求,进入高电压模式。 响应于指示,低电压模式被切换。 该请求可以从在数据处理系统上运行的应用程序接收。 如果指示高电压定时器已经到期,则响应于切换到低电压模式,启动低电压定时器。 如果低电压定时器超时,高电压请求仍然有效,则会发生切换回高电压模式,并启动新的高压定时器。

    Dynamic Voltage Dithering
    2.
    发明申请
    Dynamic Voltage Dithering 有权
    动态电压抖动

    公开(公告)号:US20110314305A1

    公开(公告)日:2011-12-22

    申请号:US12833765

    申请日:2010-07-09

    CPC classification number: G06F1/189 G06F1/3203 G06F1/3296 Y02D10/172

    Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.

    Abstract translation: 响应于确定高电压信号的剩余量超过电压开关阈值,接收高电压模式的请求并且启动高电压定时器。 响应于该请求,进入高电压模式。 响应于指示,低电压模式被切换。 该请求可以从在数据处理系统上运行的应用程序接收。 如果指示高电压定时器已经到期,则响应于切换到低电压模式,启动低电压定时器。 如果低电压定时器超时,高电压请求仍然有效,则会发生切换回高电压模式,并启动新的高压定时器。

    SINGLE SECURITY MODEL IN BOOTING A COMPUTING DEVICE
    3.
    发明申请
    SINGLE SECURITY MODEL IN BOOTING A COMPUTING DEVICE 有权
    打击计算机设备的单一安全模型

    公开(公告)号:US20120166781A1

    公开(公告)日:2012-06-28

    申请号:US13411355

    申请日:2012-03-02

    CPC classification number: G06F21/575 H04N7/162 H04N21/4432

    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.

    Abstract translation: 这里描述了用于安全地引导电子设备中的软件组件以建立操作环境的方法和装置。 根据本发明的一个方面,软件组件将按顺序执行,以便建立设备的操作环境。 对于每个软件组件,执行安全代码以使用嵌入在设备的安全ROM(只读存储器)中的一个或多个密钥来验证和验证与每个软件组件相关联的可执行代码图像,以及一个或多个硬件配置设置 装置。 每个软件组件的安全代码包括用于认证和验证与每个软件组件相关联的可执行代码映像的通用功能。 响应于成功地认证和验证可执行代码图像,然后在设备的主存储器中执行可执行代码图像以启动相关联的软件组件。

    Single security model in booting a computing device
    4.
    发明授权
    Single security model in booting a computing device 有权
    启动计算设备时的单一安全模型

    公开(公告)号:US08150039B2

    公开(公告)日:2012-04-03

    申请号:US12103685

    申请日:2008-04-15

    CPC classification number: G06F21/575 H04N7/162 H04N21/4432

    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.

    Abstract translation: 这里描述了用于安全地引导电子设备中的软件组件以建立操作环境的方法和装置。 根据本发明的一个方面,软件组件将按顺序执行,以便建立设备的操作环境。 对于每个软件组件,执行安全代码以使用嵌入在设备的安全ROM(只读存储器)中的一个或多个密钥来验证和验证与每个软件组件相关联的可执行代码图像,以及一个或多个硬件配置设置 装置。 每个软件组件的安全代码包括用于认证和验证与每个软件组件相关联的可执行代码映像的通用功能。 响应于成功地认证和验证可执行代码图像,然后在设备的主存储器中执行可执行代码图像以启动相关联的软件组件。

    Single Security Model In Booting A Computing Device
    5.
    发明申请
    Single Security Model In Booting A Computing Device 有权
    单个安全模型引导计算设备

    公开(公告)号:US20090257595A1

    公开(公告)日:2009-10-15

    申请号:US12103685

    申请日:2008-04-15

    CPC classification number: G06F21/575 H04N7/162 H04N21/4432

    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.

    Abstract translation: 这里描述了用于安全地引导电子设备中的软件组件以建立操作环境的方法和装置。 根据本发明的一个方面,软件组件将按顺序执行,以便建立设备的操作环境。 对于每个软件组件,执行安全代码以使用嵌入在设备的安全ROM(只读存储器)中的一个或多个密钥来验证和验证与每个软件组件相关联的可执行代码图像,以及一个或多个硬件配置设置 装置。 每个软件组件的安全代码包括用于认证和验证与每个软件组件相关联的可执行代码映像的通用功能。 响应于成功地认证和验证可执行代码图像,然后在设备的主存储器中执行可执行代码图像以启动相关联的软件组件。

    Single security model in booting a computing device
    6.
    发明授权
    Single security model in booting a computing device 有权
    启动计算设备时的单一安全模型

    公开(公告)号:US08560820B2

    公开(公告)日:2013-10-15

    申请号:US13411355

    申请日:2012-03-02

    CPC classification number: G06F21/575 H04N7/162 H04N21/4432

    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.

    Abstract translation: 这里描述了用于安全地引导电子设备中的软件组件以建立操作环境的方法和装置。 根据本发明的一个方面,软件组件将按顺序执行,以便建立设备的操作环境。 对于每个软件组件,执行安全代码以使用嵌入在设备的安全ROM(只读存储器)中的一个或多个密钥来验证和验证与每个软件组件相关联的可执行代码图像,以及一个或多个硬件配置设置 装置。 每个软件组件的安全代码包括用于认证和验证与每个软件组件相关联的可执行代码映像的通用功能。 响应于成功地认证和验证可执行代码图像,然后在设备的主存储器中执行可执行代码图像以启动相关联的软件组件。

    DEVICE CONFIGURATION
    7.
    发明申请
    DEVICE CONFIGURATION 审中-公开
    设备配置

    公开(公告)号:US20090295461A1

    公开(公告)日:2009-12-03

    申请号:US12187311

    申请日:2008-08-06

    Abstract: A process and apparatus for configuring one or more integrated circuits within a device in a manufacturing process is described. In an exemplary process, a device is manufactured by assembling a chip onto a board such as a printed circuit substrate and the chip is fused from power routed across the board to the chip. The power source for the fusing can be generated from the internal power supply on the board or received on a test point on the board itself or a connection interface (e.g. a USB interface) coupled to the board. In an exemplary apparatus, a device comprises a chip with a plurality of fuses that are used to configure the device and a board coupled to the chip, with the board capable of routing power from the board to the chip and the power is used to blow one or more of the plurality of fuses.

    Abstract translation: 描述了用于在制造过程中配置设备内的一个或多个集成电路的过程和设备。 在示例性过程中,通过将芯片组装到诸如印刷电路基板的板上而制造器件,并且将芯片从通过板上布线的功率融合到芯片。 熔断器的电源可以从电路板上的内部电源或电路板本身的测试点或耦合到电路板的连接接口(例如USB接口)上产生。 在示例性装置中,装置包括具有多个保险丝的芯片,所述保险丝用于配置所述装置以及耦合到所述芯片的板,所述板能够将所述板的功率从所述芯片路由到所述芯片,并且所述功率用于吹制 多个保险丝中的一个或多个。

    Code Image Personalization For A Computing Device
    8.
    发明申请
    Code Image Personalization For A Computing Device 审中-公开
    计算设备的代码图像个性化

    公开(公告)号:US20090259855A1

    公开(公告)日:2009-10-15

    申请号:US12103696

    申请日:2008-04-15

    CPC classification number: G06F21/575 G06F21/51 G06F2221/0704

    Abstract: A method and apparatus for personalizing a software component to be executed in particular environment are described herein. According to an aspect of the invention, in response to an executable code image representing a software component to be installed in an electronic device, the executable code image is encrypted using an encryption key. The encryption key is then wrapped with a UID that uniquely identifies the electronic device, where the UID is embedded within a secure ROM of the electronic device. The wrapped encryption key and the encrypted executable code image are then encapsulated into a data object to be stored in a storage of the electronic device, such that when the electronic device is subsequently initialized for operation, the executable code image can only be recovered using the UID of the electronic device to retrieve a decryption key in order to decrypt the executable code image.

    Abstract translation: 本文描述了用于个性化要在特定环境中执行的软件组件的方法和装置。 根据本发明的一个方面,响应于表示要安装在电子设备中的软件组件的可执行代码图像,使用加密密钥对可执行代码图像进行加密。 加密密钥然后用唯一标识电子设备的UID包裹,其中UID嵌入在电子设备的安全ROM内。 然后将包裹的加密密钥和加密的可执行代码图像封装到要存储在电子设备的存储器中的数据对象中,使得当电子设备随后被初始化以进行操作时,可以仅使用 用于检索解密密钥以便解密可执行代码图像的电子设备的UID。

    Methods and systems for time keeping in a data processing system
    9.
    发明授权
    Methods and systems for time keeping in a data processing system 有权
    数据处理系统中时间的方法和系统

    公开(公告)号:US08667198B2

    公开(公告)日:2014-03-04

    申请号:US11620705

    申请日:2007-01-07

    Abstract: Data processing systems with interrupts and methods for operating such data processing systems and machine readable media for causing such methods and containing executable program instructions. In one embodiment, an exemplary data processing system includes a processing system, an interrupt controller coupled to the processing system and a timer circuit which is coupled to the interrupt controller. The interrupt controller is configured to provide a first interrupt signal and a second interrupt signal to the processing system. The processing system is configured to maintain a data structure (such as, e.g., a list) of time-related events for a plurality of processes, and the processing system is configured to cause the entry of a value, representing a period of time, into the timer circuit. The timer circuit is configured to cause an assertion of the first interrupt signal in response to an expiration of the time period.

    Abstract translation: 具有中断的数据处理系统和用于操作这种数据处理系统的方法和用于引起这种方法并包含可执行程序指令的机器可读介质。 在一个实施例中,示例性数据处理系统包括处理系统,耦合到处理系统的中断控制器和耦合到中断控制器的定时器电路。 中断控制器被配置为向处理系统提供第一中断信号和第二中断信号。 处理系统被配置为维持多个进程的时间相关事件的数据结构(例如,列表),并且处理系统被配置为使得表示一段时间的值的输入, 进入定时器电路。 定时器电路被配置为响应于该时间段的到期而导致第一中断信号的断言。

    Trusting an unverified code image in a computing device
    10.
    发明授权
    Trusting an unverified code image in a computing device 有权
    信任计算设备中未验证的代码映像

    公开(公告)号:US08291480B2

    公开(公告)日:2012-10-16

    申请号:US11620699

    申请日:2007-01-07

    CPC classification number: G06F21/00 G06F21/575

    Abstract: A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key.

    Abstract translation: 描述了一种用于配置存储在装置的安全存储区域(例如,ROM)中的密钥的方法和装置,包括根据预定条件启用和禁用密钥以执行代码图像之一的设备。 密钥可以唯一标识设备。 可以从满足预定条件的提供商加载代码图像以建立设备的操作环境的至少一个组件。 根据密钥的配置,验证码图像可以是可选的。 未经验证的代码图像的安全执行可能基于禁用该键的配置。

Patent Agency Ranking