BRANCH LOOK-AHEAD INSTRUCTION DISASSEMBLING, ASSEMBLING, AND DELIVERING SYSTEM APPARATUS AND METHOD FOR MICROPROCESSOR SYSTEM
    1.
    发明申请
    BRANCH LOOK-AHEAD INSTRUCTION DISASSEMBLING, ASSEMBLING, AND DELIVERING SYSTEM APPARATUS AND METHOD FOR MICROPROCESSOR SYSTEM 审中-公开
    分支机构前瞻性指导拆解,组装和交付系统设备和微处理器系统的方法

    公开(公告)号:WO2016160630A1

    公开(公告)日:2016-10-06

    申请号:PCT/US2016/024384

    申请日:2016-03-26

    Applicant: JUNG, Yong-Kyu

    Inventor: JUNG, Yong-Kyu

    Abstract: A method and system of the branch look-ahead (BLA) instruction disassembling, assembling, and delivering are designed for improving speed of branch prediction and instruction fetch of microprocessor systems by reducing the amount of clock cycles required to deliver branch instructions to a branch predictor located inside the microprocessors. The invention is also designed for reducing run-length of the instructions found between branch instructions by disassembling the instructions in a basic block as a BLA instruction and a single or plurality of nonBLA instructions from the software/assembly program.

    Abstract translation: 分支预读(BLA)指令拆卸,组合和传送的方法和系统设计用于通过减少将分支指令传送到分支预测器所需的时钟周期量来提高微处理器系统的分支预测和指令获取速度 位于微处理器内。 本发明还被设计用于通过将基本块中的指令作为BLA指令和来自软件/汇编程序的单个或多个非BLA指令进行拆分来减少在分支指令之间发现的指令的行程长度。

    A HYBRID SECURITY-ENABLED LOOKAHEAD MICROPROCESSOR BASED METHOD AND APPARATUS FOR SECURING COMPUTER SYSTEMS AND DATA

    公开(公告)号:WO2021011138A1

    公开(公告)日:2021-01-21

    申请号:PCT/US2020/037659

    申请日:2020-06-14

    Applicant: JUNG, Yong-Kyu

    Inventor: JUNG, Yong-Kyu

    Abstract: A hybrid security-enabled lookahead (SEL) microprocessor is invented for preventing unauthorized persons or computer systems from unauthorized usages of computer systems. The invention protects data generated by the hybrid SEL microprocessor-based computer systems from cyber-attacks without security software. The invention provides real-time protection and continuous detection regardless of unknown or known threats for any type of computer systems. The invention forbids Artificial Intelligence (AI) machines from utilizing malicious data created by attackers. Therefore, the AI machines are not evolved according to intentions of unauthorized devices or persons. The invention dynamically transforms an executable program into a security-enabled compatible program.

    A SECURITY-ENABLED MICROPROCESSOR FOR A SECURITY-ENABLED COMPUTING SYSTEM

    公开(公告)号:WO2020107025A3

    公开(公告)日:2020-05-28

    申请号:PCT/US2019/062877

    申请日:2019-11-23

    Applicant: JUNG, Yong-Kyu

    Inventor: JUNG, Yong-Kyu

    Abstract: A security-enabled microprocessor is invented for preventing unauthorized persons from malicious usages of computing systems. Instead of preventing unauthorized persons from accessing computing systems, the invention permits only authorized persons to manipulate secured information generated and modified by the invented microprocessors in the computing systems. The invented microprocessor decodes instructions in an executable program according to a customized instruction set dynamically reconfigured before executing the decoded instructions. Therefore, a computing system equipped with the invented security-enabled microprocessor is capable of protecting the secured information from unauthorized persons although the unauthorized persons are able to access the computing system.

    A SECURITY-ENABLED MICROPROCESSOR FOR A SECURITY-ENABLED COMPUTING SYSTEM

    公开(公告)号:WO2020107025A2

    公开(公告)日:2020-05-28

    申请号:PCT/US2019/062877

    申请日:2019-11-23

    Applicant: JUNG, Yong-Kyu

    Inventor: JUNG, Yong-Kyu

    Abstract: A security-enabled microprocessor is invented for preventing unauthorized persons from malicious usages of computing systems. Instead of preventing unauthorized persons from accessing computing systems, the invention permits only authorized persons to manipulate secured information generated and modified by the invented microprocessors in the computing systems. The invented microprocessor decodes instructions in an executable program according to a customized instruction set dynamically reconfigured before executing the decoded instructions. Therefore, a computing system equipped with the invented security-enabled microprocessor is capable of protecting the secured information from unauthorized persons although the unauthorized persons are able to access the computing system.

Patent Agency Ranking