Srinivas Devadas - Lexington MA, US Hari Balakrishnan - Winchester MA, US Daniel Rosenband - Cambridge MA, US
Assignee:
Broadcom Corporation - Irvine CA
International Classification:
G06F 15/16 G06F 15/173 G06F 17/00
US Classification:
707101, 709230, 709223
Abstract:
A method and apparatus for selecting a queue for service across a shared link. The method includes determining a priority for each queue () within a plurality of ingresses (), wherein the priority is instantaneous for a given timeslot for data transfer, selecting a queue having a first priority for each group of queues within each ingress () having packets destined for a particular egress (), selecting a queue having a second priority for each subset of queues having first priorities and having packets destined for the particular egress (), and selecting the queue having the second priority for service across the shared link in the given timeslot.
Srinivas Devadas - Lexington MA, US Thomas Ziola - Merlo Park CA, US
Assignee:
Verayo, Inc. - Palo Alto CA
International Classification:
G08B 1/08
US Classification:
3405391, 340 101, 3405721, 713100
Abstract:
A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
Srinivas Devadas - Lexington MA, US Blaise Gassend - Cambridge MA, US
Assignee:
Massachusetts Institute of Technology - Cambridge MA
International Classification:
G06F 11/00
US Classification:
714752, 714807, 714811
Abstract:
A device-specific value is reliably generated in a device. In a first component of the device, a first digital value is generated that is substantially dependent fabrication variation among like device. Redundancy information is computed based on the first digital value. A subsequent digital value is later generated in the first component of the device. The first digital value is then determined in a second component of the device from the subsequent digital value and the redundancy information.
Srinivas Devadas - Lexington MA, US Thomas J. Ziola - Menlo Park CA, US
Assignee:
Verayo, Inc. - Palo Alto CA
International Classification:
G06F 12/14
US Classification:
713194, 713191, 717168
Abstract:
A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data.
Method And Apparatus For Bandwidth Guarantee And Overload Protection In A Network Switch
Hari Balakrishnan - Winchester MA, US Srinivas Devadas - Lexington MA, US Arvind Mithal - Arlington MA, US
Assignee:
Broadcom Corporation - Irvine CA
International Classification:
H04L 12/56
US Classification:
370416, 3702301, 370414
Abstract:
A method for selecting a queue for service across a shared link. The method includes classifying each queue from a group of queues within a plurality of ingresses into one tier of a number āNā of tiers. The number āNā is greater than or equal to 2. Information about allocated bandwidth is used to classify at least some of the queues into the tiers. Each tier is assigned a different priority. The method also includes matching queues to available egresses by matching queues classified within tiers with higher priorities before matching queues classified within tiers with lower priorities.
Integrated Circuit That Uses A Dynamic Characteristic Of The Circuit
An integrated circuit has a first component that has a dynamic characteristic that varies among like integrated circuits, for example, among integrated circuits fabricated using the same lithography mask. Operating the first component produces an output that is dependent on the dynamic characteristic of the first component. A digital value associated with the integrated circuit is generated using the output of the first component, and then the generated digital value is used in operation of the integrated circuit.
Data Protection And Cryptographic Functions Using A Device-Specific Value
Srinivas Devadas - Lexington MA, US Blaise Gassend - Cambridge MA, US
Assignee:
Massachusetts Institute of Technology - Cambridge MA
International Classification:
G08B 29/00 G06F 21/02 H01L 23/58
US Classification:
713168, 380232, 726 34, 257E23179
Abstract:
A digital value is generated in an integrated circuit such that the generated value substantially depends on circuit parameters that vary among like devices. The generated digital value is then used, for example, to access protected information in the device or to perform a cryptographic function in the integrated circuit.
Srinivas Devadas - Lexington MA, US Thomas Ziola - Merlo Park CA, US
Assignee:
Verayo, Inc. - Palo Alto CA
International Classification:
G08B 1/08
US Classification:
3405391, 340500, 340501
Abstract:
A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.