Trusted operation system and method with remote authentication and information independence of heterogeneous processor through open connector

A processor and encrypted processor technology, applied in the field of secure and trusted computing architecture

Pending Publication Date: 2022-06-07
FIDUCIAEDGE TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such proposals usually require a dedicated Network On Chip (NoC) hardware design, for example, a Network On Chip firewall

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted operation system and method with remote authentication and information independence of heterogeneous processor through open connector
  • Trusted operation system and method with remote authentication and information independence of heterogeneous processor through open connector
  • Trusted operation system and method with remote authentication and information independence of heterogeneous processor through open connector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following embodiments are described in detail with the accompanying drawings, but the provided embodiments are not intended to limit the scope of the present disclosure. In order to facilitate understanding, the same or similar elements in the following description will be described with the same reference numerals. Next, the embodiments of the present disclosure will be described in more detail, and the embodiments will be described in conjunction with the accompanying drawings. The same reference numbers are used in the drawings and description to refer to the same or like parts. With the advent of the Internet of Things (IoT), a large amount of data is collected by various sensors and analyzed by computing nodes embedded in the environment. In the emerging paradigm of edge computing, heterogeneous computing systems, such as edge computing nodes equipped with CPU, GPU, NPU, and VPU (collectively referred to as XPU), are often used to perform real-time data analys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for securing a heterogeneous processing unit (e.g., an image processing unit; a GPU (Graphics Processing Unit), a neural network processing unit (Neural Processing Unit; nPU (Network Processing Unit) and a visual processing unit (Video Processing Unit; ) and a central processing unit (Central Processing Unit, VPU, etc. Programs, parsing modules and processing data executed by a standard open-type connector (such as Ethernet, universal serial bus and sequence peripheral interface), such as a CPU (central processing unit), are ensured in authenticity, confidentiality and integrity.

Description

technical field [0001] The present disclosure pertains to a method for performing trusted computing with remote authentication and information independence over an open connector on heterogeneous processors. Specifically about a secure and trusted computing architecture and methods. This disclosure is related to ensuring that heterogeneous processing units (eg: Graphic Processing Units (GPUs), Neural Processing Units (NPUs), and Video Processing Units (VPUs), etc...) It is connected with the Central Processing Unit (CPU) through standard open connectors (such as: Ethernet, Universal Serial Bus (USB) and Serial Peripheral Interface Bus (SPI), etc...) Executed programs, parsing modules and processed data have authenticity, confidentiality and integrity. Background technique [0002] The idea of ​​creating domains with specific access rights in order to protect heterogeneous processors has been proposed in some studies. However, such proposals generally require hardware desi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74G06F21/57G06F21/85
CPCG06F21/57G06F21/74G06F21/53G06F21/602G06F21/6236G06F2221/2149H04L9/3247
Inventor 邵家健黄敬群黄经尧
Owner FIDUCIAEDGE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products