Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

36 results about "512-bit" patented technology

In computer architecture, 512-bit integers, memory addresses, or other data units are those that are 512 bits wide. Also, 512-bit CPU and ALU architectures are those that are based on registers, address buses, or data buses of that size.

Length-configurable vector maximum/minimum network supporting reconfigurable fixed floating points

ActiveCN102520903AFast executionSimplify programming complexityComparison of digital valuesFloating pointEuclidean vector
The invention discloses a length-configurable vector maximum/minimum network supporting reconfigurable fixed floating points, which comprises a parallel floating point data preprocessing unit, a Mask register, a reconfigurable comparator network and a result selecting unit. The parallel floating point data preprocessing unit is used for analyzing formats of received 512 bit vector data, respectively processing the data according to different data formats, outputting floating point data obtained after processing to the reconfigurable comparator network and outputting various zone bits obtained after processing to the result selecting unit. The Mask register is used for controlling data involved in maximum/minimum. The reconfigurable comparator network is used for inputting the floating point data received from the parallel floating point data preprocessing unit and values received from the Mask register, sequentially comparing the vector data and outputting obtained maximum/minimum results to the result selecting unit. The result selecting unit is used for receiving output of the reconfigurable comparator network and obtaining the final vector maximum/minimum results according to output of the various zone bits received from the parallel floating point data preprocessing unit.
Owner:BEIJING SMART LOGIC TECH CO LTD

Semiconductor memory device

InactiveUS20100110747A1Enhances random accessHigh-speed writingDigital storageMemory bankHemt circuits
The semiconductor memory device proposed in the present invention comprises memory cells disposed in the row direction and the column direction, a plurality of first lines by which supply voltages are supplied in order to select memory cells disposed in the row direction among the plurality of cells, a plurality of second lines by which supply voltages are supplied in order to select memory cells disposed in the column direction among the plurality of cells, the data lines which input and output the data to the selected memory cells, the first power voltage supply circuit which supplies the predetermined supply voltages to the first lines corresponding with the externally input row address synchronizing with an act command, and the second power voltage supply circuit which supplies the predetermined supply voltages to the second lines corresponding with the externally input column address synchronizing with an act command. It also comprises m pieces of memory banks (m is a natural number larger than 2) which write or read the data into or from the memory cells which are selected one after another in the row or column directions, data input circuits in which multiple bits of serial data which is larger than 512 bits to be written in the m pieces of memory banks, data output circuits which reads the data from the m pieces of memory banks and output in a form of multiple bits of serial data which is larger than 512 bits, and data conversion circuits which convert the serial data input in the data input circuits to parallel data so that it can be written in each memory bank or to convert each parallel data read from each memory bank to serial data so that such data are supplied to the data output circuits.
Owner:RAMBUS INC

Ultrahigh-throughput MD5 brute-force cracking device implemented based on FPGA

The invention discloses an ultrahigh-throughput MD5 brute-force cracking device implemented based on a FPGA (Field Programmable Gate Array) in the technical field of digital information processing. The ultrahigh-throughput MD5 brute-force cracking device comprises an input interface module, a raw data generation module, a MD5 computation module and an output module implemented in the FPGA, and a keyboard input device and a display interface device connected to the FPGA; the input interface module is connected with the keyboard input device and transmits a target MD5 value and control computation information input by a user, the raw data generation module is connected with the input interface module and the MD5 computation module and transmits 512-bit raw data block information to the MD5 computation module under the control of a clock signal, the MD5 computation module is connected with the input interface module, the raw data generation module and the output interface module and transmits computation result to the output interface module, and the output interface module is connected with the display interface device and transmits the computed target MD5 value and the computation result. In the ultrahigh-throughput MD5 brute-force cracking device implemented based on the FPGA, information is stored in a FIFO (First in First out) memory so as to cooperate with the computation of the whole pipeline architecture, and computation efficiency is improved.
Owner:SHANGHAI JIAO TONG UNIV

Selective satellite image compression encryption method based on Chacha20 and CCSDS

The invention provides a selective satellite image compression encryption method based on Chacha20 and CCSDS. Aiming the characteristics of a satellite image, the method comprises the steps: firstly carrying out the three-stage two-dimensional discrete wavelet transformation through employing a 9/7 integral wavelet in a CCSDS image compression algorithm, and obtaining a DC coefficient and an AC coefficient after transformation; secondly generating a ChaCha20 initial byte stream through the head information in a coding item and a 512-bit initial secret key and ChaCha20 Hash; thirdly carrying out the summation and modular operation of a chaos initial secret key and a plaintext image normalization value through the byte stream generated by PWLCM (Piecewise Linear Chaotic Map) and the ChaCha20 initial byte stream, and generating a ChaCha20 byte stream; fourthly carrying out the XOR encryption of the ChaCha20 byte stream and the DC coefficient and AC coefficient (the father and son coefficients in each block) and all AC coefficient symbol bites; finally enabling the encrypted DC and AC coefficients to be coded and compressed, and completing the compression and encryption of the satellite image. The generation of the ChaCha20 byte stream is related with the to-be-encrypted satellite image and a compression coding parameter, thereby improving the encryption adaptability.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

BMC-based random number generation method and system

The invention provides a BMC-based random number generation method and system. The method comprises: S1, generating system current time value data by using a real-time clock module; S2, transmitting the current time value data to an SM3 algorithm module, supplementing 0 at a high position of the time value data through the SM3 algorithm module, and enabling the time value data to reach 512 bits; and S3, carrying out operation on 512-bit clock data per second to generate a 256-bit hash value, and taking the hash value as a random number. According to the method and the system, a random number generation function is realized through a software mode. The system current time value data generated per second by the real-time clock module is transmitted to the SM3 algorithm module. The SM3 algorithm module generates a 32-byte hash value per second as a random number, so that generation of random number is realized, and requirement of using random number by BMC is effectively met. According tothe technical scheme, the generated random number is high in stability, hardware resources of a server mainboard is not occupied, and the system is free of additional cost and is high in operability,and the design flexibility is improved.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Amplitude phase precision adjustable attenuation phase shift architecture

ActiveCN114665908ARealize tuning optimizationImproved amplitude and phase accuracyTransmissionHigh level techniquesNumerical controlSystem requirements
The invention, which belongs to the technical field of chip circuit design, discloses an amplitude-phase precision adjustable attenuation phase shift architecture comprising an active numerical control attenuator, an active numerical control phase shifter, and a table look-up code value register. According to the invention, under the background that an external system requires 6-bit attenuation and 6-bit phase shift, the direct attenuation bit number and the phase shift bit number are respectively increased to 9 bits, so that further improvement of the amplitude-phase precision becomes possible; in addition, based on the architecture, under the condition that the system complexity and the write-in data time of the power-on table look-up code value register are allowed, the 9-bit direct control bit can still be further increased; along with the increase of direct control bits, corresponding attenuation and phase shift phases are respectively increased to 512 bits from original 64 bits, and each attenuation state and each phase shift state can be selected from a plurality of states under the condition that external 6-bit control bits are not changed. Different code values can be written into a table look-up code value register to realize on-chip adjustment and optimization of an amplitude-phase multifunctional chip according to index requirements of different attenuation phase shift precisions of a system.
Owner:CHINA ELECTRONIC TECH GRP CORP NO 38 RES INST

Rapid table refreshing method based on hardware DMA

PendingCN114679381ASolve the shortcoming of long power-on initialization timeQuick refreshTransmissionEnergy efficient computingDatasheetDirect memory access
The invention relates to the related technical field of network exchange, in particular to a rapid table refreshing method based on hardware DMA (direct memory access), which comprises the following steps: firstly, constructing a descriptor space and a data space in a memory, filling descriptor table items in the descriptor space, filling data table items in the data space in a message manner, and storing information of the data table items in the descriptor table items; then informing the DMA of the index address of the descriptor table item, initiating a read operation by the DAM through the index address to obtain the descriptor table item, and extracting a corresponding data table item message according to information in the descriptor table item; and finally, analyzing the data table item message to obtain configuration information, recombining the configuration information, and writing the recombined configuration information into a corresponding table item RAM (Random Access Memory) through a configuration interface to complete table item configuration. According to the method and the device, the burden of a CPU (Central Processing Unit) can be reduced, table entries with any bit width of 64-512 bits can be flexibly configured through setting, and the table refreshing time is greatly saved due to the adoption of a pure hardware mode.
Owner:芯河半导体科技(无锡)有限公司

Ethernet half-duplex retransmission method and system

The invention discloses an Ethernet half-duplex retransmission method and system, and belongs to the technical field of communication. The method comprises the steps of: S1, recording the number of collision times when collision occurs in a half-duplex communication network; S2, judging the parity of the impact times, namely if the impact times meet a first preset condition, setting avoidance time as first preset time and setting the range of the first preset time to be 512-1024 bit time, and if the number of impact times meets a second preset condition, setting the avoidance time to be second preset time and setting the range of the second preset time to be 96-512 bit time; and S3, resending communication data according to the avoidance time. The Ethernet half-duplex retransmission method has the beneficial effects that when collision occurs, through parity judgment of collision times and configuration of the avoidance time, the situation that a bus is continuously occupied by a certain end due to poor quality of a random mechanism of the certain end is avoided, the number of collision times is reduced, continuous data transmission on a communication line can be basically maintained, and the utilization rate of the line is improved.
Owner:SUZHOU MOTORCOMM ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products