G06F2212/178

Hardware-Based Memory Management For System-On-Chip (SOC) Integrated Circuits
20200183823 · 2020-06-11 ·

Systems and related methods are disclosed to manage memory for an integrated circuit including a processor and logic circuitry to manage the memory. The memory includes segments available for storage of data, and the processor stores data within the memory. Logic circuitry is configured to manage the memory, forms a plurality of sections within the segments, and applies tokens to the plurality of sections. Further, for each storage operation, the logic circuitry searches the tokens to identify blocks of continuous available tokens based upon data length, selects a block from the blocks identified in the search, determines a first token for the selected block, and outputs a memory address to the processor based upon the first token. The processor stores the data at the memory address. For one embodiment, the storage operations are associated with storage of data within packets received from network communications.

HOT PLUG MEMORY DEVICE DATA PROTECTION METHOD
20200142626 · 2020-05-07 ·

A method for hot plug memory device data protection is provided. Removal of a hot plug memory device from a connection interface is determined by a status of an interface plug-in detection signal, wherein the hot plug memory device is electrically coupled to a host through the connection interface. A command for moving data is transmitted to the hot plug memory device by the host. Temporary data is moved from a cache module of the hot plug memory device to a flash memory module of the hot plug memory device by the hot plug memory device in response to the command for moving data.

Token management systems and methods

Token management systems and methods are described. The token management systems and methods are configured to receive a plurality of tokens from a plurality of entities associated with a user and to enable the user to manage the tokens in a secure, convenient, efficient, and time-saving manner. The token management system may be accessed with a user device. In some arrangements, the token management system is structured to receive a registration request from a user, request a plurality of tokens from different entities where the user has associated tokens, and to provide various token management functions to the user. The token management functions allow the user to change, reassociate, activate, and deactivate the tokens, as well as create new tokens.

Tag management system, tag management method, information provision system, and information provision method, as well as devices and tag used therefor
10324972 · 2019-06-18 · ·

An operation terminal (120) requires an input of an authentication code when an authority granting request for corresponding electronic information to a tag (100) is received from a user, and transmits the authentication code to a server together with the authority granting request. The server (140) has an authentication code memory unit (142) that stores the authentication code for each tag, and an authorized user management unit (144) that manages the authorized user for each tag. In the case where an authority granting request and an authentication code are received from the operation terminal (120), the server (140) registers the user of the operation terminal (120) with the authorized user management unit (144) as an authorized user of the tag (100) under the conditions that an authorized user of the tag (100) is not registered with the authorized user management unit (144) and the received authentication code matches the contents of the authentication code memory unit (142).

SEMICONDUCTOR MEMORY HAVING RADIO COMMUNICATION FUNCTION AND WRITE CONTROL METHOD
20190034328 · 2019-01-31 · ·

A radio communication processor receives first received data including first write data, a first address within a first area of a nonvolatile memory, and error detection information or second received data including second write data whose data amount is larger than a data amount of the first write data and a second address within a second area of the nonvolatile memory. If the radio communication processor receives the first received data, then a controller stores the first write data in a volatile buffer. If there is no error in the first write data, then the controller reads out the first write data from the volatile buffer and stores the first write data in the first area. If the radio communication processor receives the second received data, then the controller stores the second write data in the second area without storing the second write data in the volatile buffer.

Energy harvesting cryptosystem

A system and method of low-power cryptography is disclosed involving a computing device with an audio jack that communicates with a token plugged into the audio jack. Data is passed between the computing device and token over audio channels; power for all functions necessary for the token to operate as disclosed is also supplied by the computing device to the token over an audio channel. The token may be used as an identity and authentication security factor, for secure external key exchange, or direct encryption of small payloads.

SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN IN-VEHICLE COMMUNICATION NETWORK
20170093866 · 2017-03-30 ·

A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.

Stack processor using a ferroelectric random access memory (F-RAM) for code space and a portion of the stack memory space having an instruction set optimized to minimize processor stack accesses
09588881 · 2017-03-07 · ·

A stack processor and method implemented using a ferroelectric random access memory (F-RAM) for code and a portion of the stack memory space having an instruction set optimized to minimize processor stack accesses and thus minimize program execution time. This is particularly advantageous in low power applications and those in which the power supply is only available for a finite period of time such as RFID implementations. Disclosed herein is a relatively small but complete set of instructions enabling a multitude of possible applications to be supported with a program execution time that is not too long.

Tag Management System, Tag Management Method, Information Provision System, and Information Provision Method, as well as Devices and Tag Used Therefor
20170006027 · 2017-01-05 ·

An operation terminal (120) requires an input of an authentication code when an authority granting request for corresponding electronic information to a tag (100) is received from a user, and transmits the authentication code to a server together with the authority granting request. The server (140) has an authentication code memory unit (142) that stores the authentication code for each tag, and an authorized user management unit (144) that manages the authorized user for each tag. In the case where an authority granting request and an authentication code are received from the operation terminal (120), the server (140) registers the user of the operation terminal (120) with the authorized user management unit (144) as an authorized user of the tag (100) under the conditions that an authorized user of the tag (100) is not registered with the authorized user management unit (144) and the received authentication code matches the contents of the authentication code memory unit (142).

Token management systems and methods

Systems, methods, and computer-readable storage medium for managing tokens are provided. A method includes: receiving, by a token management system from a user device, a token command from a user associated with a target token; determining, by the token management system, an entity of a plurality of entities associated with the target token, where each of the plurality of entities is associated with a separate entity computing system that stores at least one token of a plurality of tokens, and where each of the plurality of tokens is registered with the token management system and associated with the user, in response to determining the target token is managed by the entity, transmitting, by the token management system, the token command to an entity computing system of the entity; and receiving and storing, by the token management system, an updated token from the entity computing system based on the token command.