Memory Patching with Associative and Directly Mapped Patch Data

    公开(公告)号:US20240248709A1

    公开(公告)日:2024-07-25

    申请号:US18563760

    申请日:2021-05-24

    Applicant: Google LLC

    Abstract: This document describes techniques and apparatuses for memory patching with associative and directly mapped patch data. In some aspects, a processor requests boot code stored at an address of a first region of an address map of a boot ROM. A boot ROM controller can determine, based on the address, that an associative record in a programmable memory includes address information matching the address. The controller returns patch data of the associative record. This patch data includes another address to a second region of the address map. The processor requests other data of the other address, which is directly mapped to other records of the programmable memory that do not include address information related to the address map. Based on an offset between the start address of the second region and the other address from which data is requested, the other data can be fetched from the directly mapped record.

    Secure Element that Leverages External Resources

    公开(公告)号:US20230020841A1

    公开(公告)日:2023-01-19

    申请号:US17757957

    申请日:2020-02-27

    Applicant: Google LLC

    Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.

    Speculative activation for secure element usage

    公开(公告)号:US12232041B2

    公开(公告)日:2025-02-18

    申请号:US17758277

    申请日:2020-03-12

    Applicant: Google LLC

    Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.

    Secure element that leverages external resources

    公开(公告)号:US12229309B2

    公开(公告)日:2025-02-18

    申请号:US17757957

    申请日:2020-02-27

    Applicant: Google LLC

    Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.

    Hardware-Based Save-and-Restore Controller
    5.
    发明公开

    公开(公告)号:US20230315588A1

    公开(公告)日:2023-10-05

    申请号:US18043872

    申请日:2020-09-11

    Applicant: Google LLC

    CPC classification number: G06F11/1469 G06F11/1417 G06F21/604

    Abstract: This document describes systems and techniques for a hardware-based save-and-restore controller in an SoC. The described systems and techniques can automatically save and restore access control configurations (e.g., register states) of IP subsystems during a power-down and a power-up sequence, respectively. The save operation is initiated by a local save-and-restore (L SAR) controller and performed by the IP subsystems writing the configuration values to a central save-and-restore (C-SAR) controller before powering down a power domain. The C-SAR controller saves the configuration information in a memory located in an always-on power domain. The described systems and techniques initiate, via the L SAR controller, a restore operation as part of the power-up sequence. In this way, the described systems and techniques provide scalable save-and-restore services, support a large number of power domains, and allow a variable number of access control configurations to be saved and restored.

    Hardware-based save-and-restore controller

    公开(公告)号:US12287755B2

    公开(公告)日:2025-04-29

    申请号:US18043872

    申请日:2020-09-11

    Applicant: Google LLC

    Abstract: This document describes systems and techniques for a hardware-based save-and-restore controller in an SoC. The described systems and techniques can automatically save and restore access control configurations (e.g., register states) of IP subsystems during a power-down and a power-up sequence, respectively. The save operation is initiated by a local save-and-restore (L SAR) controller and performed by the IP subsystems writing the configuration values to a central save-and-restore (C-SAR) controller before powering down a power domain. The C-SAR controller saves the configuration information in a memory located in an always-on power domain. The described systems and techniques initiate, via the L SAR controller, a restore operation as part of the power-up sequence. In this way, the described systems and techniques provide scalable save-and-restore services, support a large number of power domains, and allow a variable number of access control configurations to be saved and restored.

    Speculative Activation for Secure Element Usage

    公开(公告)号:US20230023587A1

    公开(公告)日:2023-01-26

    申请号:US17758277

    申请日:2020-03-12

    Applicant: Google LLC

    Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.

Patent Agency Ranking