G06F2212/178

Data reporting method and system

A data reporting method includes generating a data uploading token by a main network node, determining, from a plurality of data-uploading network nodes waiting for data uploading, a plurality of qualified network nodes having a data uploading qualification, allowing the qualified network nodes to compete for the data uploading token, and coordinating a data uploading operation with a winning network node of the qualified network nodes that obtained the data uploading token.

SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN IN-VEHICLE COMMUNICATION NETWORK

A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.

ENERGY HARVESTING CRYPTOSYSTEM

A system and method of low-power cryptography is disclosed involving a computing device with an audio jack that communicates with a token plugged into the audio jack. Data is passed between the computing device and token over audio channels; power for all functions necessary for the token to operate as disclosed is also supplied by the computing device to the token over an audio channel. The token may be used as an identity and authentication security factor, for secure external key exchange, or direct encryption of small payloads.

System and method for controlling access to an in-vehicle communication network

A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.

Hot plug memory device data protection method
11226757 · 2022-01-18 · ·

A method for hot plug memory device data protection is provided. Removal of a hot plug memory device from a connection interface is determined by a status of an interface plug-in detection signal, wherein the hot plug memory device is electrically coupled to a host through the connection interface. A command for moving data is transmitted to the hot plug memory device by the host. Temporary data is moved from a cache module of the hot plug memory device to a flash memory module of the hot plug memory device by the hot plug memory device in response to the command for moving data.

System and method for controlling access to an in-vehicle communication network

A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.

Token management systems and methods

A method of managing tokens is provided. The method includes receiving, by a token management system from a user device, a request from a user to register a token with the token management system. The token is associated with the user and is stored by an entity computing system associated with a first entity of a plurality of entities. Each of the plurality of entities is associated with an entity computing system that stores at least one token of a plurality of tokens that are each registered with the token management system and each associated with the user. The method further includes modifying, by the token management system, the token stored by the entity computing system associated with the first entity based on a token command from the user. The modification includes associating the token with a different entity of the plurality of entities relative to the first entity.

Hardware-based memory management for system-on-chip (SoC) integrated circuits that identify blocks of continuous available tokens needed to store data

Systems and related methods are disclosed to manage memory for an integrated circuit including a processor and logic circuitry to manage the memory. The memory includes segments available for storage of data, and the processor stores data within the memory. Logic circuitry is configured to manage the memory, forms a plurality of sections within the segments, and applies tokens to the plurality of sections. Further, for each storage operation, the logic circuitry searches the tokens to identify blocks of continuous available tokens based upon data length, selects a block from the blocks identified in the search, determines a first token for the selected block, and outputs a memory address to the processor based upon the first token. The processor stores the data at the memory address. For one embodiment, the storage operations are associated with storage of data within packets received from network communications.

Semiconductor memory having radio communication function and write control method
10740225 · 2020-08-11 · ·

A radio communication processor receives first received data including first write data, a first address within a first area of a nonvolatile memory, and error detection information or second received data including second write data whose data amount is larger than a data amount of the first write data and a second address within a second area of the nonvolatile memory. If the radio communication processor receives the first received data, then a controller stores the first write data in a volatile buffer. If there is no error in the first write data, then the controller reads out the first write data from the volatile buffer and stores the first write data in the first area. If the radio communication processor receives the second received data, then the controller stores the second write data in the second area without storing the second write data in the volatile buffer.

DATA REPORTING METHOD AND SYSTEM
20200220769 · 2020-07-09 ·

A data reporting method includes generating a data uploading token by a main network node, determining, from a plurality of data-uploading network nodes waiting for data uploading, a plurality of qualified network nodes having a data uploading qualification, allowing the qualified network nodes to compete for the data uploading token, and coordinating a data uploading operation with a winning network node of the qualified network nodes that obtained the data uploading token.