The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 23, 2025

Filed:

Oct. 24, 2022
Applicant:

Texas Instruments Incorporated, Dallas, TX (US);

Inventors:

Timothy D. Anderson, University Park, TX (US);

Joseph R. M. Zbiciak, San Jose, CA (US);

Matthew D. Pierson, Murphy, TX (US);

Kai Chirca, Dallas, TX (US);

Assignee:
Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/78 (2013.01); G06F 12/0815 (2016.01); G06F 12/0817 (2016.01); G06F 12/0831 (2016.01); G06F 12/0842 (2016.01); G06F 12/1081 (2016.01); G06F 12/14 (2006.01); G06F 13/16 (2006.01); G06F 13/28 (2006.01); G06F 13/30 (2006.01); G06F 13/40 (2006.01); G06F 13/42 (2006.01); G06F 21/79 (2013.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
G06F 21/78 (2013.01); G06F 12/0815 (2013.01); G06F 12/0828 (2013.01); G06F 12/0831 (2013.01); G06F 12/0835 (2013.01); G06F 12/0842 (2013.01); G06F 12/1081 (2013.01); G06F 12/1458 (2013.01); G06F 12/1491 (2013.01); G06F 13/1605 (2013.01); G06F 13/1626 (2013.01); G06F 13/1663 (2013.01); G06F 13/287 (2013.01); G06F 13/30 (2013.01); G06F 13/4022 (2013.01); G06F 13/42 (2013.01); G06F 21/79 (2013.01); H04L 63/0263 (2013.01); G06F 2212/1032 (2013.01); G06F 2212/283 (2013.01); G06F 2212/62 (2013.01); G06F 2212/621 (2013.01); Y02D 10/00 (2018.01);
Abstract

Disclosed embodiments relate to a security firewall having a security hierarchy including: secure master (SM); secure guest (SG); and non-secure (NS). There is one secure master and n secure guests. The firewall includes one secure region for secure master and one secure region for secure guests. The SM region only allows access from the secure master and the SG region allows accesses from any secure transaction. Finally, the non-secure region can be implemented two ways. In a first option, non-secure regions may be accessed only upon non-secure transactions. In a second option, non-secure regions may be accessed any processing core. In this second option, the access is downgraded to a non-secure access if the security identity is secure master or secure guest. If the two security levels are not needed the secure master can unlock the SM region to allow any secure guest access to the SM region.


Find Patent Forward Citations

Loading…