LOAD BALANCING FOR A SYSTEM OF CRYPTOGRAPHIC PROCESSORS
First Claim
Patent Images
1. A method for controlling cryptographic operations in a plurality of cryptographic processors, said method comprising the steps of:
- providing a plurality of instruction streams from a memory;
supplying said instruction streams to said processors initially based on location within said memory; and
retrieving subsequent instruction streams by said processors from dynamically partitioned locations in said memory assigned.
1 Assignment
0 Petitions
Accused Products
Abstract
In an array of groups of cryptographic processors, the processors in each group operate together but are securely connected through an external shared memory. The processors in each group include cryptographic engines capable of operating in a pipelined fashion. Instructions in the form of request blocks are supplied to the array in a balanced fashion to assure that the processors are occupied processing instructions.
47 Citations
9 Claims
-
1. A method for controlling cryptographic operations in a plurality of cryptographic processors, said method comprising the steps of:
-
providing a plurality of instruction streams from a memory; supplying said instruction streams to said processors initially based on location within said memory; and retrieving subsequent instruction streams by said processors from dynamically partitioned locations in said memory assigned.
-
-
2. A method for controlling cryptographic operations comprising the step of supplying a balanced set of instruction streams from memory to a plurality of distinct cryptographic processors operating securely and in a coordinated fashion.
- 3. A method for controlling cryptographic operations comprising the step of supplying a balanced set of instruction streams from memory to an array of groups of cryptographic processors with the processors in each group operating securely and in a coordinated fashion.
-
6. A system for carrying out cryptographic operations, said system comprising:
-
an array of groups of processors, with each of said groups including a plurality of cryptographic processors operating together and in a secure fashion; and a source of instructions matched to the capacities of the cryptographic processors to which they are directed. - View Dependent Claims (7, 8, 9)
-
Specification