×

Computing infrastructure

  • US 8,706,914 B2
  • Filed: 11/13/2008
  • Issued: 04/22/2014
  • Est. Priority Date: 04/23/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A dynamically reconfigurable computing infrastructure comprising:

  • at least three facilities at respective different geographical locations, each of said facilities being expendable so long as at least two others of said facilities survive, each facility having at least one grouping of computing nodes, the computing nodes further comprising;

    (a) a memory;

    (b) at least one processor;

    (c) a first component configured to perform secure communications, computing, and data storage, retrieval, and processing functions;

    (d) a second component configured to recognize and differentiate between computing nodes by their cryptographic identities and actual behaviors and determine whether at least one of an object, a subject, and an interaction is authorized or unauthorized;

    (e) a third component configured to establish and maintain roles and trust relationships between computing nodes based on their locations, cryptographic identities, and actual behaviors, and to collaborate with other computing nodes to establish teams of nodes, at least one said team having members that are geographically distributed;

    (f) a fourth component configured to use error-correcting codes to achieve Byzantine agreement and distributed decision-making;

    (g) a fifth component configured to mutually associate nodes contained within the teams of nodes, wherein each such team of nodes is accountable for a portion of the aggregate responsibilities of the computing infrastructure; and

    (h) a sixth component configured to timely publish selected aggregated resource information to the teams of nodes;

    wherein the memory and at least one processor are configured with one or more integral hardware devices that collectively further comprise;

    a seventh component configured to originate, intercept, monitor, translate, terminate, or respond to (“

    intermediate”

    ) bus transactions for any system buses, memory buses, or I/O buses said component shares with said at least one processor, and at least one of;

    an eighth component configured to present a dynamically reconfigurable boot environment to any processor or peripheral for which said eighth component may intermediate bus transactions;

    a ninth component configured to present dynamically reconfigurable peripheral devices, further comprising any subset of emulated, locally attached, or remotely accessible devices, to any processor or peripheral for which said ninth component may intermediate bus transactions;

    a tenth component configured to complement conventional IOMMU capabilities by presenting, to any processor or peripheral for which said tenth component may intermediate bus transactions, dedicated per-process registers and FIFO hardware devices that enable user-space input/output without system call overhead, within reconfigurable security constraints, said registers and FIFO devices further comprising system clocks, timers, hardware accelerators, and dedicated “

    phantom”

    peripheral devices emulated, projected, or otherwise presented by said component;

    an eleventh component configured to perform or accelerate, on behalf of any processor or peripheral for which said eleventh component may intermediate bus transactions, predefined or programmable adjunct memory-processing or I/O processing tasks (“

    adjunct processing tasks”

    ) with or without processor intervention, said adjunct processing tasks further comprising at least one of data storage, retrieval, search, initialization, randomization, erasure, modification, transcoding, transfer, compression, decompression, encryption, decryption, and error-correction encoding/decoding, which may further comprise forward error-correction encoding/decoding;

    a twelfth component configured to present, to any processor or peripheral for which said twelfth component may intermediate bus transactions, a dynamically reconfigurable persistent or non-persistent memory space, further comprising any subset, aggregation, or arrangement of emulated, locally attached, or remotely accessible memory or data storage devices;

    a thirteenth component configured to present, to any processor or peripheral for which said thirteenth component may intermediate bus transactions, the aforesaid dynamically reconfigurable persistent or non-persistent memory space wherein the subset, aggregation, or arrangement of emulated, locally attached, or remotely accessible memory or data storage devices further comprises scatter/gather communications functions, which further comprise aforesaid adjunct processing tasks that transfer FEC-encoded data to slower or more remote hierarchical memory levels or transfer FEC-decoded data to faster or more local hierarchical memory levels;

    a fourteenth component configured to present, to any processor or peripheral for which said fourteenth component may intermediate bus transactions, an associative memory access mechanism further comprising persistent or non-persistent storage, retrieval, search, and modification of associative key pairs, wherein said storage and retrieval functions further comprise the aforesaid adjunct processing tasks;

    a fifteenth component configured to establish and maintain, on behalf of any processor or peripheral for which said fifteenth component may intermediate bus transactions, complementary states in memory as a protection mechanism, wherein memory locations are invisibly toggled to and from their complementary values such that the state of each memory bit so protected has a duty cycle of approximately 50%;

    a sixteenth component configured to implement intrusion-resistant trusted timely computing base (“

    TTCB”

    ) control channels to TTCB peers and TTCB distributed security kernel services which can only fail by crashing, said services further comprising secure, synchronous, and timely execution, duration measurement, timing failure detection, absolute timestamping, local and distributed authentication, random number generation, block agreement (further comprising Byzantine agreement with error-correcting codes), and cryptographic identity (further comprising a plurality of long-term asymmetric key pairs and associated conventional cryptographic services); and

    a seventeenth component configured to interface with point-of-load (POL) power supplies and other external circuits so that it may thus directly monitor and control a processor'"'"'s electrical environment including at least one of power on/off, power redundancy, voltage and current levels, external clocks, and clock multipliers.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×