SYSTEM POWER MANAGEMENT USING COMMUNICATION BUS PROTOCOLS
    21.
    发明申请
    SYSTEM POWER MANAGEMENT USING COMMUNICATION BUS PROTOCOLS 有权
    使用通信总线协议的系统电源管理

    公开(公告)号:US20150089259A1

    公开(公告)日:2015-03-26

    申请号:US14032335

    申请日:2013-09-20

    Applicant: Apple Inc.

    Abstract: Embodiments of an apparatus and method are disclosed that may allow for managing power of a computing system. The apparatus may include a clock generation circuit, a bus interface unit, and a control circuit. The clock generation circuit may be configured to generate multiple clock signals. Each clock signal may provide a timing reference to different functional blocks within a device coupled to the communication bus. The bus interface unit may be configured to receive messages from the device via the communication bus. The messages may include a latency value and a request to activate a low power mode. The control circuit may be configured to deactivate one or more of the multiple clock signals dependent upon the latency value and multiple threshold values.

    Abstract translation: 公开了可以允许管理计算系统的功率的装置和方法的实施例。 该装置可以包括时钟发生电路,总线接口单元和控制电路。 时钟发生电路可以被配置为产生多个时钟信号。 每个时钟信号可以提供与耦合到通信总线的设备内的不同功能块的定时参考。 总线接口单元可以被配置为经由通信总线从设备接收消息。 消息可以包括延迟值和激活低功率模式的请求。 控制电路可以被配置为取决于等待时间值和多个阈值的多个时钟信号中的一个或多个。

    AUTHENTICATION AND CONTROL OF ENCRYPTION KEYS

    公开(公告)号:US20200342091A1

    公开(公告)日:2020-10-29

    申请号:US16927934

    申请日:2020-07-13

    Applicant: Apple Inc.

    Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.

    SOFTWARE FAULT MONITORING
    25.
    发明申请

    公开(公告)号:US20200081785A1

    公开(公告)日:2020-03-12

    申请号:US16129726

    申请日:2018-09-12

    Applicant: Apple Inc.

    Abstract: A method for verifying program flow during execution of a software program in a computer system is disclosed. Program code of the software program includes multiple program instructions and checkpoint data structures, where a given checkpoint data structure is associated with a given program instruction and is linked to at least one other checkpoint data structure. A fault monitor circuit may receive a particular checkpoint data structure and compare the particular checkpoint data structure to a previously received checkpoint data structure that is associated with another program instruction. Based on results of the comparison, the software fault monitor circuit may signal a program flow error.

    Secure public key acceleration
    26.
    发明授权

    公开(公告)号:US10521596B1

    公开(公告)日:2019-12-31

    申请号:US16138670

    申请日:2018-09-21

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

    Systems and methods for detecting replay attacks on security space

    公开(公告)号:US10243990B1

    公开(公告)日:2019-03-26

    申请号:US15275044

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data corresponding to sensitive information are stored in off-chip memory. The security processor uses an integrity data structure, such as an integrity tree, for the blocks. The intermediate nodes of the integrity tree use nonces which have been generated independent of any value within a corresponding block. By using only the nonces to generate tags in the root at the top layer stored in on-chip memory and the nodes of the intermediate layers stored in off-chip memory, an amount of storage used is reduced for supporting the integrity tree. When the security processor detects events which create access requests for one or more blocks, the security processor uses the integrity tree to verify a replay attack has not occurred and corrupted data.

    Secure public key acceleration
    29.
    发明授权

    公开(公告)号:US10114956B1

    公开(公告)日:2018-10-30

    申请号:US15860314

    申请日:2018-01-02

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

    Secure public key acceleration
    30.
    发明授权
    Secure public key acceleration 有权
    安全公钥加速

    公开(公告)号:US09547778B1

    公开(公告)日:2017-01-17

    申请号:US14498820

    申请日:2014-09-26

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

    Abstract translation: 在一个实施例中,提供一种系统,其中私钥是以硬件管理的,并且对于软件是不可见的。 该系统可以为公开密钥生成,数字签名生成,加密/解密以及大量随机素数生成提供硬件支持,而不会向软件揭示私有密钥。 因此,私钥比基于软件的版本更安全。 在一个实施例中,可以访问专用密钥的私有密钥和硬件可以集成到与集成电路(例如芯片上的系统(SOC))相同的半导体衬底上。 私钥在集成电路之外可能不可用,因此,恶意的第三方在尝试获取私钥时面临着很大障碍。

Patent Agency Ranking