-
公开(公告)号:US20240248709A1
公开(公告)日:2024-07-25
申请号:US18563760
申请日:2021-05-24
Applicant: Google LLC
Inventor: Vinoth Kumar Deivasigamani
IPC: G06F8/65 , G06F9/4401 , G06F21/57
CPC classification number: G06F8/66 , G06F9/4403 , G06F21/572 , G06F21/575 , G06F2221/033
Abstract: This document describes techniques and apparatuses for memory patching with associative and directly mapped patch data. In some aspects, a processor requests boot code stored at an address of a first region of an address map of a boot ROM. A boot ROM controller can determine, based on the address, that an associative record in a programmable memory includes address information matching the address. The controller returns patch data of the associative record. This patch data includes another address to a second region of the address map. The processor requests other data of the other address, which is directly mapped to other records of the programmable memory that do not include address information related to the address map. Based on an offset between the start address of the second region and the other address from which data is requested, the other data can be fetched from the directly mapped record.
-
公开(公告)号:US20230020841A1
公开(公告)日:2023-01-19
申请号:US17757957
申请日:2020-02-27
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani
Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.
-
公开(公告)号:US12232041B2
公开(公告)日:2025-02-18
申请号:US17758277
申请日:2020-03-12
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani , Benjamin K. Dodge
IPC: H04W52/02 , G01S5/02 , G06F1/3287 , G06F21/35 , G06F21/77 , G06K7/10 , H04B5/72 , H04L9/40 , H04W4/80 , H04W12/06 , H04W12/08 , H04W12/63 , H04W12/65
Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.
-
公开(公告)号:US12229309B2
公开(公告)日:2025-02-18
申请号:US17757957
申请日:2020-02-27
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani
Abstract: This document describes a secure element that leverages the resources of a computer system to perform specialized functions using sensitive information. The secure element securely stores sensitive information on flash memory of the computer system. In response to a request requiring use of sensitive information, the secure element loads a security application and sensitive information from the computer system. By leveraging external resources, the secure element may flexibly accommodate increasing resource requirements of the computer system and be used in a wide range of computer systems.
-
公开(公告)号:US20230315588A1
公开(公告)日:2023-10-05
申请号:US18043872
申请日:2020-09-11
Applicant: Google LLC
Inventor: Vinoth Kumar Deivasigamani
CPC classification number: G06F11/1469 , G06F11/1417 , G06F21/604
Abstract: This document describes systems and techniques for a hardware-based save-and-restore controller in an SoC. The described systems and techniques can automatically save and restore access control configurations (e.g., register states) of IP subsystems during a power-down and a power-up sequence, respectively. The save operation is initiated by a local save-and-restore (L SAR) controller and performed by the IP subsystems writing the configuration values to a central save-and-restore (C-SAR) controller before powering down a power domain. The C-SAR controller saves the configuration information in a memory located in an always-on power domain. The described systems and techniques initiate, via the L SAR controller, a restore operation as part of the power-up sequence. In this way, the described systems and techniques provide scalable save-and-restore services, support a large number of power domains, and allow a variable number of access control configurations to be saved and restored.
-
公开(公告)号:US12287755B2
公开(公告)日:2025-04-29
申请号:US18043872
申请日:2020-09-11
Applicant: Google LLC
Inventor: Vinoth Kumar Deivasigamani
IPC: G06F15/177 , G06F1/14 , G06F11/14
Abstract: This document describes systems and techniques for a hardware-based save-and-restore controller in an SoC. The described systems and techniques can automatically save and restore access control configurations (e.g., register states) of IP subsystems during a power-down and a power-up sequence, respectively. The save operation is initiated by a local save-and-restore (L SAR) controller and performed by the IP subsystems writing the configuration values to a central save-and-restore (C-SAR) controller before powering down a power domain. The C-SAR controller saves the configuration information in a memory located in an always-on power domain. The described systems and techniques initiate, via the L SAR controller, a restore operation as part of the power-up sequence. In this way, the described systems and techniques provide scalable save-and-restore services, support a large number of power domains, and allow a variable number of access control configurations to be saved and restored.
-
公开(公告)号:US20230023587A1
公开(公告)日:2023-01-26
申请号:US17758277
申请日:2020-03-12
Applicant: Google LLC
Inventor: Olivier Jean Benoit , Prasad Modali , Vinoth Kumar Deivasigamani , Benjamin K. Dodge
Abstract: If a secure element accesses a resource that is separate from the secure element, conducting a secure transaction can be inefficient in terms of power or time. Power usage is inefficient if the resource is never permitted to sleep, and transaction time is inefficient if the resource is permitted to sleep, and the user experiences a delay. To enable dual efficiency, a resource entity is permitted to be powered down. The resource entity is then powered up speculatively by an activation controller. The activation controller predicts an upcoming secure transaction based on sensor output, such as a position fix or a detected electromagnetic field. Based on monitored sensor output, the activation controller issues an activation signal to power up the secure element or the resource entity prior to initiation of the upcoming secure transaction. Thus, power can be conserved without introducing a transaction-processing latency.
-
-
-
-
-
-