Abstract:
A method and computer processor system with anti-tamper capability and thermal packaging structure for implementing enhanced heat removal from processor circuitry, such as, a high-performance cell processor complex, and a design structure on which the subject circuit resides are provided. The computer system includes predefined processor circuits including anti-tamper logic. A volume container substantially contains the predefined processor circuits including the anti-tamper logic. A heat spreader is provided with the predefined processor circuits within the volume container. An external heatsink structure is attached to an outside cover above the volume container. The heatsink structure includes a heatsink base and a plurality of parallel fins extending outwardly from the heatsink base. A heat pipe extending through a folded mesh is attached to the heat spreader within the volume container and is attached to the external heatsink base providing an effective heat removal path for the processor circuits.
Abstract:
A data processing system, which is particularly useful for carrying out modular multiplication, especially for cryptographic purposes, comprises a plurality of independent, serially connected processing elements which are provided with data in a cyclical fashion via a control mechanism that is capable of transferring data from a set of registers to earlier ones in the series of the serially connected processing elements, at the end of a predetermined number of cycles.
Abstract:
In a communications channel coupled to multiple duplicated subsystems, a method, interposer and program product are provided for verifying integrity of subsystem responses. Within the communications channel, a first checksum is calculated with receipt of a first response from a first subsystem responsive to a common request, and a second checksum is calculated for a second response of a second subsystem received responsive to the common request. The first checksum and the second checksum are compared, and if matching, only one of the first response and the second response is forwarded from the communications channel as the response to the common request, with the other of the first response and the second response being discarded by the communications channel.