WO2013095411A1 - INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) - Google Patents
INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) Download PDFInfo
- Publication number
- WO2013095411A1 WO2013095411A1 PCT/US2011/066355 US2011066355W WO2013095411A1 WO 2013095411 A1 WO2013095411 A1 WO 2013095411A1 US 2011066355 W US2011066355 W US 2011066355W WO 2013095411 A1 WO2013095411 A1 WO 2013095411A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- policy
- agent
- interface
- transaction
- access control
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/14—Handling requests for interconnection or transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/382—Information transfer, e.g. on bus using universal interface adapter
- G06F13/385—Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/76—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
Definitions
- SoCs system-on- chips
- Logic blocks often referred to as an intellectual property (IP) block, developed for SoCs are built such that they can be reused in multiple products.
- IP intellectual property
- Access control requirements for protecting assets within the IP block are determined when that IP block is integrated into a particular SoC. For example, the access control requirements vary depending on whether the SoC is incorporated into a smartphone or a netbook platform.
- IP logic block dictates that the block be able to evaluate security attributes in an incoming transaction and enforce the specified access control policy to permit or deny access to assets within the IP block.
- access control policy may be implemented as a wrapper external to the IP block.
- incorporating such a wrapper can be non-trivial.
- FIG. 1 is a block diagram of a basic interconnect architecture in accordance with an embodiment of the present invention.
- FIG. 2 is a block diagram of further details of an interconnect architecture in accordance with an embodiment of the present invention.
- FIG. 3 is a high level block diagram of a SoC in accordance with an embodiment of the present invention.
- FIG. 4 is a block diagram of a system in accordance with another embodiment of the present invention.
- FIG. 5 is a block diagram of an access control architecture in accordance with an embodiment of the present invention.
- FIG. 6 is a block diagram of further details of an access control plug-in module in accordance with an embodiment of the present invention.
- FIG. 7 is a more detailed block diagram of a portion of a SoC in accordance with an embodiment of the present invention.
- FIG. 8 is a block diagram of another SoC in accordance with an embodiment the present invention.
- Embodiments provide a mechanism to allow access control requirements for an IP block to be configured during SoC integration time by providing access control functionality independently of the IP block. In this way, a SoC designer can incorporate any manner of IP block into the SoC and provide access control policies without the need to re-design the IP block. More specifically, embodiments define an access control (AC) plug-in to provide access control for an IP block.
- the AC plug-in acts as a gatekeeper to protect against unauthorized accesses by SoC agents to assets within the IP block.
- An additional feature of the plug-in is the ability to configure the granularity of the assets within the IP block.
- the plug-in can include a security attributes generator, a policy enforcer, a completion logic, and an asset grouping logic.
- the security attributes generator may be logic of the plug-in responsible for generating hardware security attributes that identify the SoC agent. In some embodiments, these attributes accompany all transactions generated by an agent within the SoC.
- security attributes are assigned to initiator agents and used to determine the access rights (e.g., read, write, no access, etc.) of such agent.
- These Security Attributes of the Initiator or SAI represent immutable properties of the initiator used by a recipient for making access decisions. Unlike source IDs, SAIs are not transformed at bridges; they persist until the point of policy enforcement.
- Each initiator agent can be assigned a set of security attributes that define the access rights of each initiator as enforced by the SAI security scheme via associated policy registers. Information effecting the set of security attributes applicable to an agent is forwarded with each access message initiated by the agent.
- the policy registers store security attributes data for securely controlling access to
- the transaction is allowed to proceed. Conversely, if an initiator agent does not have the proper security attributes (as identified via its SAI information forwarded with its access message), the transaction is denied, and in some embodiments a corresponding message can be returned to the initiator agent.
- the immutable properties of the initiator agent include a role, device mode and system mode.
- An initiator may have any combination of these properties.
- a role is assigned to a group of subjects/initiators with similar privileges.
- the device mode is dynamic and captures the current internal mode of a device.
- the mode could be a secure or normal mode.
- the system mode is dynamic and indicates the mode driven, e.g., by a processor core.
- the system mode may be a secure mode such as system management mode (SMM).
- SMM system management mode
- a context attribute for indicating the current thread can be defined and may accompany the SAI.
- SAI is thus an encoding that is generated by SoC hardware via a function whose input parameters include role, device and system mode.
- the interpretation of an SAI is specific to each SoC, and can be defined by the SoC architect.
- bit 6 set to 1 could indicate an access by a processor core. If bit 6 is set to 0, then bits 5-0 could be used for encoding device accesses. For example, 1000001 b represents core access and 0010000b represents a device access.
- this is merely exemplary, as the number of bits and format of the SAI encoding may be configured by the architect.
- the policy enforcer may be configured to evaluate security attributes in an incoming transaction and its requested action (e.g., read or write) and based on the specified permissions allow or deny access to the asset within the IP block.
- the policy enforcer may include read, write and control policy registers. The read and write policy registers contain permissions for read and write
- the SAI accompanying the transaction serves as an index to the appropriate policy register.
- 32-bit read and write policy registers may be present in which a logic one value indicates access is allowed and a logic 0 value indicates access is denied for the corresponding identifier.
- the SAI width is n-bits. The value of n may change from one generation to another and/or differ between products.
- the encoding space is 2 n"1 , where one of the n bits is used to differentiate core vs. device encodings.
- control policy register identifies the privileged agent that can configure the read and write policy registers.
- the control policy register is a self- referential register; the SAI specified in the control policy register is allowed to modify the read and write policy register policies as well as overwrite the contents of the control policy register.
- access to the policy registers is locked to all other agents.
- the entity specified by the SAI in the control policy register may extend the set of agents that can configure the policy registers beyond the initial value loaded at power-on/reset, or the trusted entity may write Os into the control policy register, thus locking it until the next system reset/power-on. This provides flexibility for the SoC architect to implement locking down the policy registers until the next reset or allow the policy to be updated by a trusted entity during runtime.
- the completion logic may be used to generate a successful or unsuccessful response based on operation of the policy enforcer. Additionally, it may insert the security attributes of the target IP block so that an initiator agent can verify the source of a response to a transaction.
- the AC plug-in can treat all transactions the same and define a single policy register for all assets. For simple IPs this may be sufficient asset protection.
- the plug-in can treat transactions differently based on the register access type. For example, the plug-in can have a different policy register for Peripheral Component Interconnect (PCI) configuration register read/write operations, input/output (I/O) mapped register read/write and so forth. Such different policy registers can be accommodated using asset grouping logic.
- PCI Peripheral Component Interconnect
- FIG. 1 shown is a block diagram of a basic interconnect architecture in accordance with an embodiment of the present invention.
- system 10 may be a portion of a system-on-chip or any other
- IP agents 30 and 40 which can be independent IP blocks to provide various components
- IP agents are thus IP blocks or logical devices having an interface that is compliant with an integrated on-chip system fabric (IOSF) specification.
- IOSF integrated on-chip system fabric
- This specification can be issued by a semiconductor manufacturer to provide a standardized on-die interconnect protocol for attaching IP blocks within a chip.
- fabric 20 also interfaces to a bridge 50.
- bridge 50 may act as an interface to other system components, e.g., on the same chip or on one or more different chips.
- each of the elements shown in FIG. 1 namely the fabric, the IP agents, and the bridge may include one or more interfaces to handle communication of various signals.
- These interfaces may be defined according to the IOSF specification, which defines signals for communication on these interfaces, protocols used for information exchange between agents, arbitration and flow control mechanisms used to initiate and manage information exchange, supported address decoding and translation capabilities, messaging for in-band or out-of-band communication, power management, test, validation and debug support.
- the IOSF specification includes 3 independent interfaces that can be provided for each agent, namely a primary interface, a sideband message interface and a testability and debug interface (design for test (DFT), design for debug (DFD) interface).
- a primary interface namely a primary interface, a sideband message interface and a testability and debug interface (design for test (DFT), design for debug (DFD) interface).
- DFT design for test
- DFD design for debug
- an agent can support 0-N primary interfaces, 0-N sideband message interfaces, and optional DFx interfaces. However, according to the specification, an agent must support at least one of these 3 interfaces.
- Fabric 20 may be a hardware element that moves data between different agents. Note that the topology of fabric 20 will be product specific. As examples, a fabric can be implemented as a bus, a hierarchical bus, a cascaded hub or so forth. Referring now to FIG. 2, shown is a block diagram of further details of an
- the IOSF specification defines three distinct fabrics, namely a primary interface fabric 1 12, a DFx fabric 1 14, and a sideband fabric 1 16.
- Primary interface fabric 1 12 is used for all in-band communication between agents and memory, e.g., between a host processor such as a central processing unit (CPU) or other processor and an agent.
- Primary interface fabric 1 12 may further enable communication of peer transactions between agents and supported fabrics. All transaction types including memory, input output (10), configuration, and in-band messaging can be delivered via primary interface fabric 1 12.
- the primary interface fabric may act as a high performance interface for data transferred between peers and/or communications with upstream components.
- primary interface fabric 1 12 implements a split transaction protocol to achieve maximum concurrency. That is, this protocol provides for a request phase, a grant phase, and a command and data phase.
- Primary interface fabric 1 12 supports three basic request types: posted, non-posted, and completions, in various embodiments.
- a posted transaction is a transaction which when sent by a source is considered complete by the source and the source does not receive a completion or other confirmation message regarding the transaction.
- One such example of a posted transaction may be a write transaction.
- a non-posted transaction is not considered completed by the source until a return message is received, namely a completion.
- One example of a non-posted transaction is a read transaction in which the source agent requests a read of data. Accordingly, the completion message provides the requested data.
- primary interface fabric 1 12 supports the concept of distinct channels to provide a mechanism for independent data flows throughout the system.
- primary interface fabric 1 12 may itself include a master interface that initiates transactions and a target interface that receives transactions.
- the primary master interface can further be sub-divided into a request interface, a command interface, and a data interface.
- the request interface can be used to provide control for movement of a transaction's command and data.
- primary interface fabric 1 12 may support PCI ordering rules and enumeration.
- sideband interface fabric 1 16 may be a standard mechanism for communicating all out-of-band information. In this way, special-purpose wires designed for a given implementation can be avoided, enhancing the ability of IP reuse across a wide variety of chips. Thus in contrast to an IP block that uses dedicated wires to handle out-of-band communications such as status, interrupt, power management, fuse distribution, configuration shadowing, test modes and so forth, a sideband interface fabric 1 16 according to the IOSF specification
- sideband interface fabric 1 16 may be used to communicate non-performance critical information, rather than for performance critical data transfers, which typically may be communicated via primary interface fabric 1 12.
- IP agents 130, 140, and 150 may each include a corresponding primary interface, a sideband interface and a DFx interface.
- each agent need not include every one of these interfaces, and a given IP agent may include only a single interface, in some embodiments.
- SoC 200 may include various components, all of which can be integrated on a single semiconductor die to provide for various processing capabilities at high speeds and low power, consuming a comparatively small amount of real estate.
- SoC 200 includes a plurality of cores 205 0 - 205 n .
- cores 205 can be relatively simple in-order cores or more complex out-of-order cores.
- coherent interconnect 215 may be in accordance with the Quick Path Interconnect (QPI)TM specification available from Intel Corporation, Santa Clara, California.
- QPI Quick Path Interconnect
- coherent interconnect 215 may communicate via a bridge 220 to a fabric 250, which may be an IOSF fabric.
- Coherent interconnect 215 may further communicate via an integrated memory controller 215 to an off-chip memory (not shown for ease of illustration the embodiment of FIG. 3), and further through bridge 230 to fabric 250.
- various components can couple to fabric 250 including a content processing module (CPM) 240 which can be used for performing various operations such as security processing, cryptographic functions and so forth.
- CPM content processing module
- a display processor 245 can be part of a media processing pipeline that renders video for an associated display.
- fabric 250 may further couple to an IP agent 255. Although only a single agent is shown for ease of illustration the FIG. 3 embodiment, understand that multiple such agents are possible in different embodiments.
- fabric 250 may further communicate with a PCIeTM controller 260 and a universal serial bus (USB) controller 265, both of which can communicate with various devices according to these protocols.
- a bridge 270 shown in the embodiment of FIG. 3 is a bridge 270, which can be used to communicate with additional components of other protocols, such as an open core protocol (OCP) or an ARM advanced microcontroller bus architecture (AMBA) protocol.
- OCP open core protocol
- AMBA ARM advanced microcontroller bus architecture
- embodiments can further be implemented in a system in which multiple chips communicate with each other via a non-IOSF interface.
- FIG. 4 shown is a block diagram of a system in accordance with another embodiment of the present invention.
- the system may include a SoC 200', which may include many components similar to those discussed above with regard to FIG. 3, and an additional off-die interface 275.
- SoC 200' can communicate with another chip 280 which may include various functionality to enable communication between these two chips, as well as to various off-chip devices such as different peripherals according to one or more different specifications.
- a second chip 280 is shown to include an off-die interface 282 to enable communication with SoC 200', and which in turn
- fabric 290 communicates with a fabric 290, which may be an IOSF fabric according to an embodiment of the present invention.
- fabric 290 may further be coupled to various controllers in communication with off-chip devices, including a PCIeTM controller 292, a USB controller 294, and a bridge 296.
- FIG. 5 shown is a block diagram of an access control architecture in accordance with an embodiment of the present invention.
- a portion of an SoC 300 includes an interface between a fabric and an IP logic block.
- fabric 305 (which can be an IOSF fabric) includes a target interface 310, a master interface 315, and a sideband router 320.
- IP agent 350 which can be any type of logic block including a fixed function unit, general-purpose processor core or so forth, includes an IP core 395, which may be the main processing circuitry of the IP agent.
- agent 350 further includes a primary master interface 360, a primary target interface 380 and a sideband interface 390.
- Each of these interfaces can include access control circuitry in accordance with an embodiment of the present invention. Additional access control circuitry can be provided via an AC plug-in 370.
- a completion logic 362 can be provided to enable insertion of completion response messages for incoming non-posted messages that are denied.
- a policy enforcer 382 may be present within the primary target interface 380 to determine whether to allow transactions to proceed to IP core 395.
- a similar policy enforcer 392 may be present with regard to sideband interface 390.
- primary target interface 380 can further include completion logic 384. Completion logic 384 may be used to extract message attributes used to form a completion message for denied non-posted messages. Completion logic 362 can be used to insert the completion into the primary interface.
- AC plug-in 370 which as seen in the embodiment of FIG. 5 includes a security attributes generator 365, a policy enforcer 371 and an asset grouping logic 375.
- AC plug-in 370 inserts SAIs for all outgoing messages including response messages and may limit the scope of possible SAI values the IP block can send out.
- policy enforcer 370 includes policy registers, one or more control policy registers, and range registers (generally 372). Range registers 372 allow an IP block to define specific sets of registers (a "range" of
- an output multiplexer 378 can be provided to enable communications to sideband interface 390 and primary target interface 380, respectively, depending on the type of communication.
- incoming security information which can include, in one embodiment, the SAI, command information and address information, can be provided through input multiplexer 376 to policy enforcer 370 to determine whether access is to be permitted.
- both multiplexers and accordingly the access control mechanisms can be controlled depending upon the operative transaction.
- the multiplexers can be used to accommodate both communication channels: primary and sideband (SB). That is, messages can target IP core 395 on both interfaces concurrently.
- the SB signal can be used to determine which channel is to be provided with priority, and thus is to be processed first, since assets may be shared across both channels and may only service one message at a time. Although shown with this particular implementation in the embodiment of FIG. 5, understand the scope of the present invention is not limited in this regard.
- An SoC architect can configure an AC plug-in unit for unique IP-specific requirements, by defining parameters such as the number of assets to be protected within the IP logic block, address ranges for the assets as well as the policy registers, policy values associated for each asset, policy value to include debug agents' attributes for audit operations and so forth.
- plug-in module 430 may logically and physically reside within a given IP agent, namely between an interface of the IP agent to a fabric (although this interface is not shown for ease of illustration in the embodiment of FIG. 6) and one or more assets, which can correspond to IP cores, logic blocks or other circuitry of the agent.
- a representative asset is shown as IP asset 460. Accordingly,
- communications can occur between IP agent 420 and fabric 410 via plug-in module 430.
- plug-in module 430 can include IP interface circuitry 440, which generally may provide for an interface between the IP agent and a given fabric.
- module 430 can include a functional unit 450 which can generally perform the security functionality of the access control module.
- IP interface circuitry 440 can include a prioritizing logic 442, an interface logic 444, and a message decoding logic 446, which may be a message decoding logic for a sideband interface, although the scope of the present invention is not limited in this regard.
- IP interface circuitry 440 may be primarily responsible for interfacing with an interface of the IP block (e.g., primary and sideband interfaces to the IP block).
- the circuitry handles the sideband endpoint message protocol, decodes incoming transactions, and passes pertinent information on to the functional unit.
- the circuitry can further handle sending completion messages with data over the sideband endpoint for policy audits.
- IP interface circuitry 440 can be in communication with a functional unit 450 which may perform various access control operations.
- this unit can include a policy enforcer 452, an asset grouping logic 454, a security attributes generator 456, and a completion logic 458.
- Functional unit 450 may encapsulate all these plug-in components discussed above.
- functional unit 450 may gate all read/write operations made to IP assets 460 based on attributes for the transaction (e.g., address, SAI, read/write) and policy register contents for the asset.
- Functional unit 450 may also be configured to perform sophisticated access control mechanisms such as dynamic policy configuration to enable on-the-fly revision of policy values linked to an asset, and a policy audit feature for any debug-related applications, in which an entire array of policy values can be read from the corresponding IP block.
- embodiments provide a plug-in to enable interfacing to unmodified IP blocks when designed into a given SoC. As such, no design changes are needed to an IP block such as a shared static random access memory (SRAM) that hard codes a number of regions when incorporated into a specific SoC having certain security requirements.
- SRAM static random access memory
- FIG. 7 shown is a more detailed block diagram of a portion of a SoC in accordance with an embodiment of the present invention.
- the portion of SoC 700 shown may correspond to non-core portions coupled below a memory controller hub or other interface logic that can in turn interface to multiple processor cores, as well as to system memory.
- an off-die interface 710 (which in one embodiment can be a direct media interface (DMI)) may couple to a hub 715, e.g., an input/output hub that in turn provides communication between various peripheral devices.
- a hub 715 e.g., an input/output hub that in turn provides communication between various peripheral devices.
- DMI direct media interface
- engines such as a manageability engine and a virtualization engine can also be directly coupled to hub 715.
- an lOSF controller 720 may couple between hub 715 and bus 730, which may be an lOSF bus that thus incorporates elements of the fabric as well as routers.
- first lOSF bus 730 may have coupled to it various controllers to provide for control of off- chip devices. Specifically, seen is a PCI controller 722, a SATA controller 724, and a USB controller 726.
- a second lOSF bus 750 may couple to a system management bus 752 and to a real time clock 754.
- first lOSF bus 730 may couple to an lOSF bridge 735 for both primary and sideband information that in turn provides interconnection to a third bus 740, e.g., of a different protocol, to which various controllers and components may be attached.
- a third bus 740 e.g., of a different protocol
- components include a flash controller 741 to provide an interface to a non-volatile memory, a legacy device 742, which may implement various legacy functions, e.g., of a PCI specification and further may include an interrupt controller and timer.
- a flash controller 741 to provide an interface to a non-volatile memory
- a legacy device 742 which may implement various legacy functions, e.g., of a PCI specification and further may include an interrupt controller and timer.
- interfaces for audio 743, USB 744, gigabyte Ethernet (GbE) 745, serial peripheral interface (SPI) 746 and PCI 747 may all be provided. Although shown with this particular implementation in the embodiment of FIG. 7, understand the scope of the present invention is not limited in this regard.
- SoC 800 may be configured for use, e.g., in server systems.
- SoC may include a platform controller hub (PCH) 840, which may generally include components such as seen in the embodiment of FIG. 7.
- PCH platform controller hub
- Bus 730 may include various agents coupled to it, including a PCIe controller 722, SATA controller 724, and a USB controller 726.
- PCIe controller 722 SATA controller 724
- USB controller 726 a USB controller 726
- IOSF controller 720 communication may occur via an additional bus 718, which may communicate with upstream devices, such as cores or other processing units (not shown for ease of illustration in the embodiment of FIG. 8).
- an additional IOSF bus 820 may be provided, which in turn can communicate with an IOSF controller 822 and an upstream switch port 824 (e.g., an X16 port) that may be coupled to an upstream bus 825. Also coupled to bus 820 may be multiple downstream switch ports 826 and 828.
- a switch port 830 may couple between bus 820 and another IOSF bus 850, which in turn may be coupled to a storage controller unit (SCU) 855, which may be a multi-function device for coupling with various storage devices.
- SCU storage controller unit
- Embodiments may be implemented in code and may be stored on a storage medium having stored thereon instructions which can be used to program a system to perform the instructions.
- the storage medium may include, but is not limited to, any type of non-transitory storage including floppy disks, optical disks, solid state drives (SSDs), compact disk read-only memories (CD-ROMs), compact disk rewritables (CD-RWs), and magneto-optical disks, semiconductor devices such as read-only memories (ROMs), random access memories (RAMs) such as dynamic random access memories (DRAMs), static random access memories (SRAMs), erasable programmable read-only memories (EPROMs), flash memories, electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, or any other type of media suitable for storing electronic instructions.
- ROMs read-only memories
- RAMs random access memories
- DRAMs dynamic random access memories
- SRAMs static random access memories
- EPROMs erasable
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1410920.1A GB2511975B (en) | 2011-12-21 | 2011-12-21 | Incorporating access control functionality into a system on a chip (SoC) |
US13/995,659 US9805221B2 (en) | 2011-12-21 | 2011-12-21 | Incorporating access control functionality into a system on a chip (SoC) |
PCT/US2011/066355 WO2013095411A1 (en) | 2011-12-21 | 2011-12-21 | INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) |
TW101148334A TWI479356B (en) | 2011-12-21 | 2012-12-19 | Incorporating access control functionality into a system on a chip (soc) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2011/066355 WO2013095411A1 (en) | 2011-12-21 | 2011-12-21 | INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013095411A1 true WO2013095411A1 (en) | 2013-06-27 |
Family
ID=48669069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2011/066355 WO2013095411A1 (en) | 2011-12-21 | 2011-12-21 | INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) |
Country Status (4)
Country | Link |
---|---|
US (1) | US9805221B2 (en) |
GB (1) | GB2511975B (en) |
TW (1) | TWI479356B (en) |
WO (1) | WO2013095411A1 (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9927486B2 (en) | 2012-07-09 | 2018-03-27 | Ultrasoc Technologies Ltd. | Debug architecture |
GB2500074B (en) * | 2012-07-09 | 2014-08-20 | Ultrasoc Technologies Ltd | Debug architecture |
WO2014041395A1 (en) | 2012-09-12 | 2014-03-20 | Freescale Semiconductor, Inc. | System-on-chip device, method of peripheral access and integrated circuit |
US9904802B2 (en) | 2012-11-23 | 2018-02-27 | Nxp Usa, Inc. | System on chip |
WO2015008112A1 (en) * | 2013-07-18 | 2015-01-22 | Freescale Semiconductor, Inc. | System on chip and method therefor |
US9690719B2 (en) | 2014-09-11 | 2017-06-27 | Nxp Usa, Inc. | Mechanism for managing access to at least one shared integrated peripheral of a processing unit and a method of operating thereof |
US10726162B2 (en) * | 2014-12-19 | 2020-07-28 | Intel Corporation | Security plugin for a system-on-a-chip platform |
US10303453B2 (en) * | 2015-05-08 | 2019-05-28 | Desktop 365, LLC | Method and system for managing the end to end lifecycle of the virtualization environment for an appliance |
EP3373183B1 (en) * | 2017-03-09 | 2020-10-28 | STMicroelectronics Srl | System with soc connections among ip and multiple gpios, and corresponding method |
IT201700057307A1 (en) * | 2017-05-26 | 2018-11-26 | St Microelectronics Srl | IP-GPIO SYSTEM, EQUIPMENT AND CORRESPONDING PROCEDURE |
US11100023B2 (en) * | 2017-09-28 | 2021-08-24 | Intel Corporation | System, apparatus and method for tunneling validated security information |
US11281595B2 (en) * | 2018-05-28 | 2022-03-22 | Intel Corporation | Integration of disparate system architectures using configurable isolated memory regions and trust domain conversion bridge |
GB2591978B (en) * | 2019-10-07 | 2023-06-21 | Siemens Ind Software Inc | Message Monitoring |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050256992A1 (en) * | 2004-05-03 | 2005-11-17 | Stmicroelectronics S.A. | System on a chip with arbitration unit and storage key incorporating it |
US20090080651A1 (en) * | 2007-09-26 | 2009-03-26 | Mips Technologies, Inc. | Semiconductor with hardware locked intellectual property and related methods |
US20100005213A1 (en) * | 2008-07-02 | 2010-01-07 | International Business Machines Corporation | Access Table Lookup for Bus Bridge |
US20100057400A1 (en) * | 2008-09-04 | 2010-03-04 | Sonics, Inc. | Method and system to monitor, debug, and analyze performance of an electronic design |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7484081B1 (en) * | 2000-10-10 | 2009-01-27 | Altera Corporation | Method and apparatus for protecting designs in SRAM-based programmable logic devices |
US7392546B2 (en) * | 2001-06-11 | 2008-06-24 | Bea Systems, Inc. | System and method for server security and entitlement processing |
GB0114317D0 (en) * | 2001-06-13 | 2001-08-01 | Kean Thomas A | Method of protecting intellectual property cores on field programmable gate array |
US7266786B2 (en) * | 2002-11-05 | 2007-09-04 | Sonics, Inc. | Method and apparatus for configurable address mapping and protection architecture and hardware for on-chip systems |
US8504992B2 (en) * | 2003-10-31 | 2013-08-06 | Sonics, Inc. | Method and apparatus for establishing a quality of service model |
TW200601775A (en) * | 2004-06-30 | 2006-01-01 | Network Security Technology | System-on-chip containing silicon security intellectual property device and related application system and method containing system-on-chip |
US7987373B2 (en) * | 2004-09-30 | 2011-07-26 | Synopsys, Inc. | Apparatus and method for licensing programmable hardware sub-designs using a host-identifier |
US7437698B2 (en) * | 2005-11-30 | 2008-10-14 | Freescale Semiconductor, Inc. | Method and program product for protecting information in EDA tool design views |
US8656191B2 (en) * | 2005-12-23 | 2014-02-18 | Nagravision S.A. | Secure system-on-chip |
US20080263324A1 (en) * | 2006-08-10 | 2008-10-23 | Sehat Sutardja | Dynamic core switching |
PT103744A (en) * | 2007-05-16 | 2008-11-17 | Coreworks S A | ARCHITECTURE OF ACCESS TO THE NETWORK CORE. |
US8149711B2 (en) * | 2007-07-25 | 2012-04-03 | Silicon Image, Inc. | Data stream control for network devices |
US7861027B2 (en) * | 2008-05-30 | 2010-12-28 | Intel Corporation | Providing a peripheral component interconnect (PCI)-compatible transaction level protocol for a system on a chip (SoC) |
EP2350910B1 (en) * | 2008-11-24 | 2018-07-25 | Certicom Corp. | System and method for hardware based security |
US7873068B2 (en) * | 2009-03-31 | 2011-01-18 | Intel Corporation | Flexibly integrating endpoint logic into varied platforms |
US8977863B1 (en) * | 2010-08-30 | 2015-03-10 | Cadence Design Systems, Inc. | Methods, systems, and articles of manufacture for dynamic protection of intellectual property in electronic circuit designs |
US8789170B2 (en) * | 2010-09-24 | 2014-07-22 | Intel Corporation | Method for enforcing resource access control in computer systems |
US9015270B2 (en) * | 2010-10-08 | 2015-04-21 | Time Warner Cable Enterprises Llc | Apparatus and methods for enforcing content protection rules during data transfer between devices |
US9405700B2 (en) * | 2010-11-04 | 2016-08-02 | Sonics, Inc. | Methods and apparatus for virtualization in an integrated circuit |
US8775700B2 (en) | 2011-09-29 | 2014-07-08 | Intel Corporation | Issuing requests to a fabric |
US8874976B2 (en) | 2011-09-29 | 2014-10-28 | Intel Corporation | Providing error handling support to legacy devices |
US8805926B2 (en) | 2011-09-29 | 2014-08-12 | Intel Corporation | Common idle state, active state and credit management for an interface |
US8713234B2 (en) | 2011-09-29 | 2014-04-29 | Intel Corporation | Supporting multiple channels of a single interface |
US8713240B2 (en) | 2011-09-29 | 2014-04-29 | Intel Corporation | Providing multiple decode options for a system-on-chip (SoC) fabric |
US8929373B2 (en) * | 2011-09-29 | 2015-01-06 | Intel Corporation | Sending packets with expanded headers |
US8711875B2 (en) | 2011-09-29 | 2014-04-29 | Intel Corporation | Aggregating completion messages in a sideband interface |
US9053251B2 (en) | 2011-11-29 | 2015-06-09 | Intel Corporation | Providing a sideband message interface for system on a chip (SoC) |
-
2011
- 2011-12-21 WO PCT/US2011/066355 patent/WO2013095411A1/en active Application Filing
- 2011-12-21 GB GB1410920.1A patent/GB2511975B/en active Active
- 2011-12-21 US US13/995,659 patent/US9805221B2/en active Active
-
2012
- 2012-12-19 TW TW101148334A patent/TWI479356B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050256992A1 (en) * | 2004-05-03 | 2005-11-17 | Stmicroelectronics S.A. | System on a chip with arbitration unit and storage key incorporating it |
US20090080651A1 (en) * | 2007-09-26 | 2009-03-26 | Mips Technologies, Inc. | Semiconductor with hardware locked intellectual property and related methods |
US20100005213A1 (en) * | 2008-07-02 | 2010-01-07 | International Business Machines Corporation | Access Table Lookup for Bus Bridge |
US20100057400A1 (en) * | 2008-09-04 | 2010-03-04 | Sonics, Inc. | Method and system to monitor, debug, and analyze performance of an electronic design |
Also Published As
Publication number | Publication date |
---|---|
GB201410920D0 (en) | 2014-08-06 |
US20140137231A1 (en) | 2014-05-15 |
TWI479356B (en) | 2015-04-01 |
US9805221B2 (en) | 2017-10-31 |
TW201346624A (en) | 2013-11-16 |
GB2511975A (en) | 2014-09-17 |
GB2511975B (en) | 2021-02-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9805221B2 (en) | Incorporating access control functionality into a system on a chip (SoC) | |
JP6372941B2 (en) | System and method for semaphore-based protection of shared system resources | |
US9753875B2 (en) | Systems and an apparatus with a sideband interface interconnecting agents with at least one router | |
US6922740B2 (en) | Apparatus and method of memory access control for bus masters | |
US10164880B2 (en) | Sending packets with expanded headers | |
US9448870B2 (en) | Providing error handling support to legacy devices | |
US8775700B2 (en) | Issuing requests to a fabric | |
US9489329B2 (en) | Supporting multiple channels of a single interface | |
KR101582058B1 (en) | Providing adaptive bandwidth allocation for a fixed priority arbiter | |
JP5153887B2 (en) | Method and apparatus for transfer of secure operating mode access privileges from a processor to a peripheral device | |
US9122815B2 (en) | Common idle state, active state and credit management for an interface | |
US8316414B2 (en) | Reconfiguring a secure system | |
JP2016516228A (en) | Access method and circuit device under control of slave unit in system on chip | |
CN112602082A (en) | Security aware bus system | |
US20080077749A1 (en) | Access control of memory space in microprocessor systems | |
CN115203095A (en) | PCIe device and operating method thereof | |
US9104472B2 (en) | Write transaction interpretation for interrupt assertion | |
US10437523B2 (en) | Secure receive packet processing for network function virtualization applications | |
EP3782066B1 (en) | Nop sled defense | |
CN115549938A (en) | Host firewall interface for controller | |
US20190042473A1 (en) | Technologies for enabling slow speed controllers to use hw crypto engine for i/o protection | |
US11836026B1 (en) | System-on-chip with DVFM protection circuit | |
US8028069B2 (en) | Structure for securing leased resources on a computer | |
CN116610615A (en) | Processing system, related integrated circuit, apparatus and method | |
CN116561762A (en) | Trusted computing dual architecture, processor chip and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11877799 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13995659 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 1410920 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20111221 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1410920.1 Country of ref document: GB |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11877799 Country of ref document: EP Kind code of ref document: A1 |