Adaptive routing for pooled and tiered data architectures

    公开(公告)号:US12130754B2

    公开(公告)日:2024-10-29

    申请号:US16995481

    申请日:2020-08-17

    申请人: Intel Corporation

    摘要: Examples described herein relate to a network device apparatus that includes a packet processing circuitry configured to determine if target data associated with a memory access request is stored in a different device than that identified in the memory access request and based on the target data associated with the memory access request identified as stored in a different device than that identified in the memory access request, cause transmission of the memory access request to the different device. In some examples, the memory access request comprises an identifier of a requester of the memory access request and the identifier comprises a Process Address Space identifier (PASID) and wherein the configuration that a redirection operation is permitted to be performed for a memory access request is based at least on the identifier. In some examples, the packet processing circuitry is to: based on configuration of a redirection operation not to be performed for the memory access request, cause transmission of the memory access request to a device identified in the memory access request.

    Processing system, related integrated circuit, device and method

    公开(公告)号:US12117942B2

    公开(公告)日:2024-10-15

    申请号:US18109675

    申请日:2023-02-14

    IPC分类号: G06F12/14

    CPC分类号: G06F12/1441 G06F12/1458

    摘要: A processing system includes a communication system and a processing core configured to generate write requests. A circuit has associated a slave interface circuit configured to manage an address sub-range and selectively forward write requests addressed to a given address. Configuration data specifies whether the given address is protected/unprotected and locked/unlocked. In response to a received write request, address and data are extracted and a determination based on the configuration data is made as to whether the extracted address is protected/unprotected, and locked/unlocked. When the extracted address is unprotected or unlocked, the slave interface forwards the write request. When the extracted address is protected and locked, the slave interface generates an unlock signal in response to a comparison of the extracted address with the extracted data, with the unlock signal being asserted when the extracted data satisfy a predetermined rule with respect to the extracted address.

    Access to data stored in quarantined memory media

    公开(公告)号:US12019564B2

    公开(公告)日:2024-06-25

    申请号:US18098831

    申请日:2023-01-19

    IPC分类号: G06F12/14 G06F21/31 G06F21/79

    摘要: Methods and apparatuses related to access to data stored in quarantined memory media are described. Memory systems can include multiple types of memory media (e.g., volatile and/or non-volatile) and data (e.g., information included in) stored in the memory media often are subject to risks of the data being undesirably exposed to the public. For example, requests to write data in the memory media can often be made and accepted without a user's awareness, which can lead to the undesirable exposure of the data. According to embodiments of the present disclosure, a particular portion and/or location in the memory media can provide a data protection scheme such that data stored in the particular location can be refrained from being transferred out of the computing system.

    COMPUTING SYSTEM AND TRUSTED COMPUTING METHOD

    公开(公告)号:US20240143848A1

    公开(公告)日:2024-05-02

    申请号:US18189373

    申请日:2023-03-24

    IPC分类号: G06F21/74 G06F12/14 G06F21/60

    摘要: A computing system with trusted computing is shown. The processor includes a normal core, and a trusted core for trusted computing. The system memory provides a normal memory, and an isolated memory for trusted computing. The chipset for the communication among the processor, the system memory, and peripherals includes a monitor and records memory protection configuration information. According to the memory protection configuration information, the monitor permits security peripherals to access the isolated memory, and prohibits normal peripherals from accessing the isolated memory.

    SYSTEM AND METHOD FOR SECURING INDIRECT MEMORY ACCESSES

    公开(公告)号:US20240078191A1

    公开(公告)日:2024-03-07

    申请号:US18049683

    申请日:2022-10-26

    申请人: NXP B.V.

    IPC分类号: G06F12/14

    摘要: An integrated circuit (IC), including a functional circuit and a security system, is disclosed. The functional circuit generates a request packet for an indirect memory access of a memory. The security system validates the functional circuit based on a security attribute and a functional identifier of the functional circuit. Based on the request packet and the validation of the functional circuit, the security system identifies an instruction sequence associated with the indirect memory access. Further, the security system determines a type of the indirect memory access based on the instruction sequence, and validates the type of the indirect memory access based on the security attribute and the request packet. Based on the validation of the type of the indirect memory access, the instruction sequence is executed, thereby facilitating the indirect memory access for the functional circuit.

    Mitigating Row Hammer Attacks Through Memory Address Encryption

    公开(公告)号:US20240070090A1

    公开(公告)日:2024-02-29

    申请号:US18453108

    申请日:2023-08-21

    申请人: Apple Inc.

    发明人: Jeff Gonion

    IPC分类号: G06F12/14

    CPC分类号: G06F12/1408 G06F12/1441

    摘要: In an embodiment, a system employs encryption on memory addresses generated by a source circuit that generates memory transactions (e.g., a processor such as a central processing unit (CPU), a graphics processing unit (GPU), various embedded processors or microcontrollers; or a peripheral device. The encrypted memory address corresponds to the row that is activated for the memory transaction, instead of the memory address generated by the source circuit.