Embodiments of the invention relate generally to pattern-recognition processors and, more specifically, in certain embodiments, to connection architectures of such processors.
In the field of computing, pattern recognition tasks are increasingly challenging. Ever larger volumes of data are transmitted between computers, and the number of patterns that users wish to identify is increasing. For example, spam or malware are often detected by searching for patterns in a data stream, e.g., particular phrases or pieces of code. The number of patterns increases with the variety of spam and malware, as new patterns may be implemented to search for new variants. Searching a data stream for each of these patterns can form a computing bottleneck. Often, as the data stream is received, it is searched for each pattern, one at a time. The delay before the system is ready to search the next portion of the data stream increases with the number of patterns. Thus, pattern recognition may slow the receipt of data.
Such patter-recognition processors may include a large number of finite state machines (FSM) that move from state to state as inputs are processed. Internal connections of conventional processors rely on physical wires connected to a flip-fop or other memory element. However, such connections may be incapable of meeting the performance for a pattern-search processor. Further, such connections are generally not configurable or capable of meeting a desired functionality. The distance, speed, and configurability of the connections in a pattern-recognition processor may be challenging to implement in silicon.
Each search criterion may specify one or more target expressions, i.e., patterns. The phrase “target expression” refers to a sequence of data for which the pattern-recognition processor 14 is searching. Examples of target expressions include a sequence of characters that spell a certain word, a sequence of genetic base pairs that specify a gene, a sequence of bits in a picture or video file that form a portion of an image, a sequence of bits in an executable file that form a part of a program, or a sequence of bits in an audio file that form a part of a song or a spoken phrase.
A search criterion may specify more than one target expression. For example, a search criterion may specify all five-letter words beginning with the sequence of letters “cl”, any word beginning with the sequence of letters “cl”, a paragraph that includes the word “cloud” more than three times, etc. The number of possible sets of target expressions is arbitrarily large, e.g., there may be as many target expressions as there are permutations of data that the data stream could present. The search criteria may be expressed in a variety of formats, including as regular expressions, a programming language that concisely specifies sets of target expressions without necessarily listing each target expression.
Each search criterion may be constructed from one or more search terms. Thus, each target expression of a search criterion may include one or more search terms and some target expressions may use common search terms. As used herein, the phrase “search term” refers to a sequence of data that is searched for, during a single search cycle. The sequence of data may include multiple bits of data in a binary format or other formats, e.g., base ten, ASCII, etc. The sequence may encode the data with a single digit or multiple digits, e.g., several binary digits. For example, the pattern-recognition processor 14 may search a text data stream 12 one character at a time, and the search terms may specify a set of single characters, e.g., the letter “a”, either the letters “a” or “e”, or a wildcard search term that specifies a set of all single characters.
Search terms may be smaller or larger than the number of bits that specify a character (or other grapheme—i.e., fundamental unit—of the information expressed by the data stream, e.g., a musical note, a genetic base pair, a base-10 digit, or a sub-pixel). For instance, a search term may be 8 bits and a single character may be 16 bits, in which case two consecutive search terms may specify a single character.
The search criteria 16 may be formatted for the pattern-recognition processor 14 by a compiler 18. Formatting may include deconstructing search terms from the search criteria. For example, if the graphemes expressed by the data stream 12 are larger than the search terms, the compiler may deconstruct the search criterion into multiple search terms to search for a single grapheme. Similarly, if the graphemes expressed by the data stream 12 are smaller than the search terms, the compiler 18 may provide a single search term, with unused bits, for each separate grapheme. The compiler 18 may also format the search criteria 16 to support various regular expressions operators that are not natively supported by the pattern-recognition processor 14.
The pattern-recognition processor 14 may search the data stream 12 by evaluating each new term from the data stream 12. The word “term” here refers to the amount of data that could match a search term. During a search cycle, the pattern-recognition processor 14 may determine whether the currently presented term matches the current search term in the search criterion. If the term matches the search term, the evaluation is “advanced”, i.e., the next term is compared to the next search term in the search criterion. If the term does not match, the next term is compared to the first term in the search criterion, thereby resetting the search.
Each search criterion may be compiled into a different finite state machine (FSM) in the pattern-recognition processor 14. The finite state machines may run in parallel, searching the data stream 12 according to the search criteria 16. The finite state machines may step through each successive search term in a search criterion as the preceding search term is matched by the data stream 12, or if the search term is unmatched, the finite state machines may begin searching for the first search term of the search criterion.
The pattern-recognition processor 14 may evaluate each new term according to several search criteria, and their respective search terms, at about the same time, e.g., during a single device cycle. The parallel finite state machines may each receive the term from the data stream 12 at about the same time, and each of the parallel finite state machines may determine whether the term advances the parallel finite state machine to the next search term in its search criterion. The parallel finite state machines may evaluate terms according to a relatively large number of search criteria, e.g., more than 100, more than 1000, or more than 10,000. Because they operate in parallel, they may apply the search criteria to a data stream 12 having a relatively high bandwidth, e.g., a data stream 12 of greater than or generally equal to 64 MB per second or 128 MB per second, without slowing the data stream. In some embodiments, the search-cycle duration does not scale with the number of search criteria, so the number of search criteria may have little to no effect on the performance of the pattern-recognition processor 14.
When a search criterion is satisfied (i.e., after advancing to the last search term and matching it), the pattern-recognition processor 14 may report the satisfaction of the criterion to a processing unit, such as a central processing unit (CPU) 20. The central processing unit 20 may control the pattern-recognition processor 14 and other portions of the system 10.
The system 10 may be any of a variety of systems or devices that search a stream of data. For example, the system 10 may be a desktop, laptop, handheld or other type of computer that searches the data stream 12. The system 10 may also be a network node, such as a router, a server, or a client (e.g., one of the previously-described types of computers). The system 10 may be some other sort of electronic device, such as a copier, a scanner, a printer, a game console, a television, a set-top video distribution or recording system, a cable box, a personal digital media player, a factory automation system, an automotive computer system, or a medical device. (The terms used to describe these various examples of systems, like many of the other terms used herein, may share some referents and, as such, should not be construed narrowly in virtue of the other items listed.)
The data stream 12 may be one or more of a variety of types of data streams that a user or other entity might wish to search. For example, the data stream 12 may be a stream of data received over a network, such as packets received over the Internet or voice or data received over a cellular network. The data stream 12 may be data received from a sensor in communication with the system 10, such as an imaging sensor, a temperature sensor, an accelerometer, or the like, or combinations thereof. The data stream 12 may be received by the system 10 as a serial data stream, in which the data is received in an order that has meaning, such as in a temporally, lexically, or semantically significant order. Or the data stream 12 may be received in parallel or out of order and, then, converted into a serial data stream, e.g., by reordering packets received over the Internet. In some embodiments, the data stream 12 may present terms serially, but the bits expressing each of the terms may be received in parallel. The data stream 12 may be received from a source external to the system 10, or may be formed by interrogating a memory device and forming the data stream 12 from stored data.
Depending on the type of data in the data stream 12, different types of search criteria may be chosen by a designer. For instance, the search criteria 16 may be a virus definition file. Viruses or other malware may be characterized, and aspects of the malware may be used to form search criteria that indicate whether the data stream 12 is likely delivering malware. The resulting search criteria may be stored on a server, and an operator of a client system may subscribe to a service that downloads the search criteria to the system 10. The search criteria 16 may be periodically updated from the server as different types of malware emerge. The search criteria may also be used to specify undesirable content that might be received over a network, for instance unwanted emails (commonly known as spam) or other content that a user finds objectionable.
The data stream 12 may be searched by a third party with an interest in the data being received by the system 10. For example, the data stream 12 may be searched for text, a sequence of audio, or a sequence of video that occurs in a copyrighted work. The data stream 12 may be searched for utterances that are relevant to a criminal investigation or civil proceeding or are of interest to an employer. In other embodiments, monitoring a data stream for data of interest may be an example of searching.
The search criteria 16 may also include patterns in the data stream 12 for which a translation is available, e.g., in memory addressable by the CPU 20 or the pattern-recognition processor 14. For instance, the search criteria 16 may each specify an English word for which a corresponding Spanish word is stored in memory. In another example, the search criteria 16 may specify encoded versions of the data stream 12, e.g., MP3, MPEG 4, FLAC, Ogg Vorbis, etc., for which a decoded version of the data stream 12 is available, or vice versa.
The pattern-recognition processor 14 may be hardware that is integrated with the CPU 20 into a single component (such as a single device) or may be formed as a separate component. For instance, the pattern-recognition processor 14 may be a separate integrated circuit. The pattern-recognition processor 14 may be referred to as a “co-processor” or a “pattern-recognition co-processor”.
The recognition module 22 may include a row decoder 28 and a plurality of feature cells 30. Each feature cell 30 may specify a search term, and groups of feature cells 30 may form a parallel finite state machine that forms a search criterion. Components of the feature cells 30 may form a search-term array 32, a detection array 34, and an activation-routing matrix 36. The search-term array 32 may include a plurality of input conductors 37, each of which may place each of the feature cells 30 in communication with the row decoder 28.
The row decoder 28 may select particular conductors among the plurality of input conductors 37 based on the content of the data stream 12. For example, the row decoder 28 may be a one byte to 256 row decoder that activates one of 256 rows based on the value of a received byte, which may represent one term. A one-byte term of 0000 0000 may correspond to the top row among the plurality of input conductors 37, and a one-byte term of 1111 1111 may correspond to the bottom row among the plurality of input conductors 37. Thus, different input conductors 37 may be selected, depending on which terms are received from the data stream 12. As different terms are received, the row decoder 28 may deactivate the row corresponding to the previous term and activate the row corresponding to the new term.
The detection array 34 may couple to a detection bus 38 that outputs signals indicative of complete or partial satisfaction of search criteria to the aggregation module 24. The activation-routing matrix 36 may selectively activate and deactivate feature cells 30 based on, for example, the number of search terms in a search criterion that have been matched.
The aggregation module 24 may include a latch matrix 40, an aggregation-routing matrix 42, a threshold-logic matrix 44, a logical-product matrix 46, a logical-sum matrix 48, and an initialization-routing matrix 50.
The latch matrix 40 may implement portions of certain search criteria. Some search criteria, e.g., some regular expressions, count only the first occurrence of a match or group of matches. The latch matrix 40 may include latches that record whether a match has occurred. The latches may be cleared during initialization, and periodically re-initialized during operation, as search criteria are determined to be satisfied or not further satisfiable—i.e., an earlier search term may need to be matched again before the search criterion could be satisfied.
The aggregation-routing matrix 42 may function similar to the activation-routing matrix 36. The aggregation-routing matrix 42 may receive signals indicative of matches on the detection bus 38 and may route the signals to different group-logic lines 53 connecting to the threshold-logic matrix 44. The aggregation-routing matrix 42 may also route outputs of the initialization-routing matrix 50 to the detection array 34 to reset portions of the detection array 34 when a search criterion is determined to be satisfied or not further satisfiable.
The threshold-logic matrix 44 may include a plurality of counters, e.g., 32-bit counters configured to count up or down. The threshold-logic matrix 44 may be loaded with an initial count, and it may count up or down from the count based on matches signaled by the recognition module. For instance, the threshold-logic matrix 44 may count the number of occurrences of a word in some length of text.
The outputs of the threshold-logic matrix 44 may be inputs to the logical-product matrix 46. The logical-product matrix 46 may selectively generate “product” results (e.g., “AND” function in Boolean logic). The logical-product matrix 46 may be implemented as a square matrix, in which the number of output products is equal the number of input lines from the threshold-logic matrix 44, or the logical-product matrix 46 may have a different number of inputs than outputs. The resulting product values may be output to the logical-sum matrix 48.
The logical-sum matrix 48 may selectively generate sums (e.g., “OR” functions in Boolean logic.) The logical-sum matrix 48 may also be a square matrix, or the logical-sum matrix 48 may have a different number of inputs than outputs. Since the inputs are logical products, the outputs of the logical-sum matrix 48 may be logical-Sums-of-Products (e.g., Boolean logic Sum-of-Product (SOP) form). The output of the logical-sum matrix 48 may be received by the initialization-routing matrix 50.
The initialization-routing matrix 50 may reset portions of the detection array 34 and the aggregation module 24 via the aggregation-routing matrix 42. The initialization-routing matrix 50 may also be implemented as a square matrix, or the initialization-routing matrix 50 may have a different number of inputs than outputs. The initialization-routing matrix 50 may respond to signals from the logical-sum matrix 48 and re-initialize other portions of the pattern-recognition processor 14, such as when a search criterion is satisfied or determined to be not further satisfiable.
The aggregation module 24 may include an output buffer 51 that receives the outputs of the threshold-logic matrix 44, the aggregation-routing matrix 42, and the logical-sum matrix 48. The output of the aggregation module 24 may be transmitted from the output buffer 51 to the CPU 20 (
The memory cells 58 may include any of a variety of types of memory cells. For example, the memory cells 58 may be volatile memory, such as dynamic random access memory (DRAM) cells having a transistor and a capacitor. The source and the drain of the transistor may be connected to a plate of the capacitor and the output conductor 56, respectively, and the gate of the transistor may be connected to one of the input conductors 37. In another example of volatile memory, each of the memory cells 58 may include a static random access memory (SRAM) cell. The SRAM cell may have an output that is selectively coupled to the output conductor 56 by an access transistor controlled by one of the input conductors 37. The memory cells 58 may also include nonvolatile memory, such as phase-change memory (e.g., an ovonic device), flash memory, silicon-oxide-nitride-oxide-silicon (SONOS) memory, magneto-resistive memory, or other types of nonvolatile memory. The memory cells 58 may also include flip-flops, e.g., memory cells made out of logic gates.
As illustrated by
To compare a term from the data stream 12 with the search term, the row decoder 28 may select the input conductor 37 coupled to memory cells 58 representing the received term. In
In response, the memory cell 58 controlled by the conductor 60 may output a signal indicative of the data that the memory cell 58 stores, and the signal may be conveyed by the output conductor 56. In this case, because the letter “e” is not one of the terms specified by the search-term cell 54, it does not match the search term, and the search-term cell 54 outputs a 0 value, indicating no match was found.
In
The search-term cells 54 may be configured to search for more than one term at a time. Multiple memory cells 58 may be programmed to store a 1, specifying a search term that matches with more than one term. For instance, the memory cells 58 representing the letters lowercase “a” and uppercase “A” may be programmed to store a 1, and the search-term cell 54 may search for either term. In another example, the search-term cell 54 may be configured to output a match if any character is received. All of the memory cells 58 may be programmed to store a 1, such that the search-term cell 54 may function as a wildcard term in a search criterion.
As illustrated by
The activation-routing matrix 36, in turn, may selectively activate the feature cells 63, 64, and 66 by writing to the memory cells 70 in the detection array 34. The activation-routing matrix 36 may activate feature cells 63, 64, or 66 according to the search criterion and which search term is being searched for next in the data stream 12.
In
As illustrated by
In
Next, the activation-routing matrix 36 may activate the feature cell 66, as illustrated by
In
The end of a search criterion or a portion of a search criterion may be identified by the activation-routing matrix 36 or the detection cell 68. These components 36 or 68 may include memory indicating whether their feature cell 63, 64, or 66 specifies the last search term of a search criterion or a component of a search criterion. For example, a search criterion may specify all sentences in which the word “cattle” occurs twice, and the recognition module may output a signal indicating each occurrence of “cattle” within a sentence to the aggregation module, which may count the occurrences to determine whether the search criterion is satisfied.
Feature cells 63, 64, or 66 may be activated under several conditions. A feature cell 63, 64, or 66 may be “always active”, meaning that it remains active during all or substantially all of a search. An example of an always active feature cell 63, 64, or 66 is the first feature cell of the search criterion, e.g., feature cell 63.
A feature cell 63, 64, or 66 may be “active when requested”, meaning that the feature cell 63, 64, or 66 is active when some condition precedent is matched, e.g., when the preceding search terms in a search criterion are matched. An example is the feature cell 64, which is active when requested by the feature cell 63 in
A feature cell 63, 64, or 66 may be “self activated”, meaning that once it is activated, it activates itself as long as its search term is matched. For example, a self activated feature cell having a search term that is matched by any numerical digit may remain active through the sequence “123456xy” until the letter “x” is reached. Each time the search term of the self activated feature cell is matched, it may activate the next feature cell in the search criterion. Thus, an always active feature cell may be formed from a self activating feature cell and an active when requested feature cell: the self activating feature cell may be programmed with all of its memory cells 58 storing a 1, and it may repeatedly activate the active when requested feature cell after each term. In some embodiments, each feature cell 63, 64, and 66 may include a memory cell in its detection cell 68 or in the activation-routing matrix 36 that specifies whether the feature cell is always active, thereby forming an always active feature cell from a single feature cell.
Search criteria with different numbers of search terms may be formed by allocating more or fewer feature cells to the search criteria. Simple search criteria may consume fewer resources in the form of feature cells than complex search criteria. This is believed to reduce the cost of the pattern-recognition processor 14 (
As illustrated by
In
In
Next, as illustrated by
Embodiments of the pattern recognition processor 14 may include any arrangement of feature cells 30.
As shown in
As shown in
The groups 94, rows 98, and blocks 100 illustrated above describe a hierarchical arrangement of the feature cells. A programmed state machine may include any number of feature cells 30. Thus, each group, row, or block may include multiple programmed state machines. During operation of the pattern-recognition processer 14, such as during the search cycle described above, each state of a programmed state machine (e.g., one or more feature cells) is routed to the next state of the programmed state machine (referred to as “next state routing”), by the Next State signals output from each feature cell 30 and selected by the output drive select 96 of each group 94.
The connections in
The routing of the input and output signals of the feature cells 30 are determined by the connections. The feature cells 30 of the group 94 may be interconnected by local route lines 102 (Local Route 0 and Local Route 1). The outputs of the feature cells 30 of the group 94 are coupled to the local route lines 102 and the output drive select 96 by output connections 104. For example, Feature Cell 0 is coupled to Local Route Line 0 by a first output connection 104A and Feature Cell 1 is coupled to Local Route Line 1 by a second output connection 104B. As depicted in
The output drive select 96 may be programmed to drive any number or type of signals from the received outputs of the feature cells 30. As mentioned above, in one embodiment, the output drive select 96 may be configured to output one of three possible logical outputs: “Next State Out 0”; “Next State Out 1”; or the logical OR of the two Next State Out signals. In other embodiments, the output drive select 96 may be configured to output other logical combinations, such as AND, NOR and/or XOR.
The local route lines 102 may be coupled to the inputs 105 (which may represent one or more input signals) of the feature cells 30, by input connections 106. For example, the Feature Cell 0 may be coupled to Local Route Lines 0 and 1 by input connections 106A and 106B respectively. Similarly, Feature Cell 1 may be coupled to Local Route Line 0 and Local Route Line 1 by input connections 106C and 106D respectively. As depicted in
The outputs from the output drive selects 96 of each group 94 may be coupled to each row route line 108 by output connections 110. In one embodiment, the output connections may be programmable “2nd level” connections. As shown in
Additionally, the row route lines 108 may be coupled to the inputs 105 of each feature cell 30 by input connections 112. In one embodiment, the input connections 112 may be programmable “2nd level” connections. For example, the row route lines 108 may be coupled to the inputs of Feature Cell 0 of Group 0 by input connections 112A and 112B, and the row route lines 108 may be coupled to the inputs of Feature Cell 1 of Group 0 by input connections 112C and 112D. Similarly, as also shown in
Next,
As described above, the bi-directional connections 116 may be programmable. Thus, the bi-directional connections 116 may be programmed to enable one or more of the intra-block route lines 114 to drive a respective row route line 112 or to enable one or more row route lines 112 to drive a respective intra block route line 114. Each bi-directional connection 116 may be individually programmed, enabling configuration of connections between row route lines 112 and intra-block route lines 114 on a line-by-line basis. In other embodiments, the connections may be non-programmable and/or uni-directional connections.
As shown in
Advantageously, the multi-level hierarchical routing matrix described above may provide regularity of the programmability of the device, implementation of redundancy for improvements in production and manufacturing yields, changeability for different applications, and easier visualization and implementation of logic changes.
As mentioned above, the connections may be isolators that are capable of “breaking” a line such that no signals are routed over a line, enabling a redundant section of the pattern-recognition processor 14 to be disabled.
The block 130 may be coupled to the other portions of the pattern-recognition processor 14 by the connections 132 between the top level route lines and the intra-block route lines. In such an embodiment, the connections 132 may be programmable “4th level connections” that may be programmed to any desired functionality. Accordingly, if block 130 provides excess capacity, the connections 132 may be programmed to isolate block 130 from the rest of the route lines. Thus, the connection between the top level route lines 118 and the intra-block routing lines 114 may be “broken” by the programmable connections 132. Block 130 may be referred to as “disabled.” In addition, unused block 130 may be “powered down,” such as by setting an appropriate programming bit, in the block 130.
In contrast, other blocks that are used to provide memory capacity for programmed state machines of the pattern-recognition processor 14 may be accessible through the top level route lines 118 and intra-block route lines 114. For example, as shown in
Further, in other embodiments, the multi-level hierarchical routing matrix described above may vary in levels, connections, etc., based on the pattern-matching functionality implemented in the pattern-recognition processor 14. For example, other embodiments may include a different number of levels in the hierarchy, and/or different number of connections between levels, groups, rows, and/or blocks. Additionally, other embodiments may include different programmable functions usable for the programmable connections, different types of connections and different points in the hierarchy, the ability to programmatically break connection lines into multiple lines, and the ability to add and/or delete different functionality at different levels in the hierarchy.
Next, the connections at a second level of the hierarchy may be programmed (block 146). In one embodiment such programming may include programming the input connections between the row route lines 108 and a group 94, as described above in
Additionally, the connections at a third level of the hierarchical routing matrix may be programmed (block 148). As discussed above in
Next, the connections at a fourth hierarchy level may be programmed (block 150). In the embodiment depicted above in
The present application is a continuation of U.S. application Ser. No. 15/137,877 entitled “Multi-Level Hierarchical Routing Matrices For Pattern-Recognition Processors,” and filed Apr. 25, 2016, now U.S. Pat. No. 10,684,983 which issued on Jun. 16, 2020, which is a continuation of U.S. patent application Ser. No. 12/638,759 entitled “Multi-Level Hierarchical Routing Matrices For Pattern-Recognition Processors,” and filed Dec. 15, 2009, now U.S. Pat. No. 9,323,994 which issued on Apr. 26, 2016, the entirety of which is incorporated by reference herein for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
3849762 | Fujimoto et al. | Nov 1974 | A |
3921136 | Bar-Lev | Nov 1975 | A |
4011547 | Kimmel | Mar 1977 | A |
4014000 | Uno et al. | Mar 1977 | A |
4123695 | Hale et al. | Oct 1978 | A |
4153897 | Yasuda et al. | May 1979 | A |
4204193 | Schroeder | May 1980 | A |
4414685 | Sternberg | Nov 1983 | A |
4748674 | Freeman | May 1988 | A |
5014327 | Potter et al. | May 1991 | A |
5028821 | Kaplinsky | Jul 1991 | A |
5216748 | Quenot et al. | Jun 1993 | A |
5257361 | Doi et al. | Oct 1993 | A |
5287523 | Allison et al. | Feb 1994 | A |
5291482 | McHarg et al. | Mar 1994 | A |
5300830 | Hawes | Apr 1994 | A |
5331227 | Hawes | Jul 1994 | A |
5357512 | Khaira et al. | Oct 1994 | A |
5371878 | Coker | Dec 1994 | A |
5377129 | Molvig et al. | Dec 1994 | A |
5459798 | Bailey et al. | Oct 1995 | A |
5615237 | Chang et al. | Mar 1997 | A |
5659551 | Huott et al. | Aug 1997 | A |
5723984 | Sharpe-Geisier | Mar 1998 | A |
5754878 | Asghar et al. | May 1998 | A |
5790531 | Ellebracht et al. | Aug 1998 | A |
5818254 | Agrawal et al. | Oct 1998 | A |
5881312 | Dulong | Mar 1999 | A |
5896548 | Ofek | Apr 1999 | A |
5956741 | Jones | Sep 1999 | A |
6011407 | New | Jan 2000 | A |
6016361 | Hongu et al. | Jan 2000 | A |
6034963 | Minami et al. | Mar 2000 | A |
6041405 | Green | Mar 2000 | A |
6052766 | Betker et al. | Apr 2000 | A |
6058469 | Baxter | May 2000 | A |
6151644 | Wu | Nov 2000 | A |
6240003 | McElroy | May 2001 | B1 |
6279128 | Arnold et al. | Aug 2001 | B1 |
6317427 | Augusta et al. | Nov 2001 | B1 |
6362868 | Silverbrook | Mar 2002 | B1 |
6384627 | Fross | May 2002 | B1 |
6400996 | Hoffberg et al. | Jun 2002 | B1 |
6577160 | Reddy et al. | Jun 2003 | B2 |
6606699 | Pechanek et al. | Aug 2003 | B2 |
6614703 | Pitts et al. | Sep 2003 | B2 |
6625740 | Datar et al. | Sep 2003 | B1 |
6633443 | Watanabe et al. | Oct 2003 | B1 |
6636483 | Pannell | Oct 2003 | B1 |
6640262 | Uppunda et al. | Oct 2003 | B1 |
6697979 | Vorbach et al. | Feb 2004 | B1 |
6700404 | Feng et al. | Mar 2004 | B1 |
6838904 | Agrawal | Jan 2005 | B1 |
6880087 | Carter | Apr 2005 | B1 |
6906938 | Kaginele | Jun 2005 | B2 |
6944710 | Regev et al. | Sep 2005 | B2 |
6977897 | Nelson et al. | Dec 2005 | B1 |
7010639 | Larson et al. | Mar 2006 | B2 |
7089352 | Regev et al. | Aug 2006 | B2 |
7146643 | Dapp et al. | Dec 2006 | B2 |
7176717 | Sunkavalli et al. | Feb 2007 | B2 |
7276934 | Young | Oct 2007 | B1 |
7305047 | Turner | Dec 2007 | B1 |
7358761 | Sunkavalli et al. | Apr 2008 | B1 |
7366352 | Kravec et al. | Apr 2008 | B2 |
7392229 | Harris et al. | Jun 2008 | B2 |
7428722 | Sunkavalli et al. | Sep 2008 | B2 |
7487131 | Harris et al. | Feb 2009 | B2 |
7487542 | Boulanger et al. | Feb 2009 | B2 |
7499464 | Ayrapetian et al. | Mar 2009 | B2 |
7725510 | Alicherry et al. | May 2010 | B2 |
7774286 | Harris | Aug 2010 | B1 |
7804719 | Chirania et al. | Sep 2010 | B1 |
7890923 | Elaasar | Feb 2011 | B2 |
7899052 | Hao et al. | Mar 2011 | B1 |
7916510 | Starovoitov et al. | Mar 2011 | B1 |
7917684 | Noyes et al. | Mar 2011 | B2 |
7970964 | Noyes | Jun 2011 | B2 |
8015530 | Sinclair et al. | Sep 2011 | B1 |
8020131 | Van Mau et al. | Sep 2011 | B1 |
8065249 | Harris et al. | Nov 2011 | B1 |
8140780 | Noyes | Mar 2012 | B2 |
8146040 | Janneck et al. | Mar 2012 | B1 |
8159900 | Moore et al. | Apr 2012 | B2 |
8209521 | Noyes et al. | Jun 2012 | B2 |
8214672 | Pawlowski | Jul 2012 | B2 |
8239660 | Cervini | Aug 2012 | B2 |
8281395 | Pawlowski | Oct 2012 | B2 |
8294490 | Kaviani | Oct 2012 | B1 |
8402188 | Noyes et al. | Mar 2013 | B2 |
8536896 | Trimberger | Sep 2013 | B1 |
8593175 | Noyes et al. | Nov 2013 | B2 |
8648621 | Noyes et al. | Feb 2014 | B2 |
8680888 | Brown et al. | Mar 2014 | B2 |
8725961 | Noyes | May 2014 | B2 |
8782624 | Brown et al. | Jul 2014 | B2 |
8843523 | Noyes | Sep 2014 | B2 |
8938590 | Noyes et al. | Jan 2015 | B2 |
9058465 | Noyes et al. | Jun 2015 | B2 |
9063532 | Brown | Jun 2015 | B2 |
9075428 | Brown | Jul 2015 | B2 |
9118327 | Noyes et al. | Aug 2015 | B2 |
9164945 | Noyes | Oct 2015 | B2 |
9235798 | Brown et al. | Jan 2016 | B2 |
20010018762 | Lenzie | Aug 2001 | A1 |
20010041012 | Hsieh et al. | Nov 2001 | A1 |
20020186044 | Agrawal et al. | Dec 2002 | A1 |
20030107996 | Black et al. | Jun 2003 | A1 |
20030142698 | Parhl | Jul 2003 | A1 |
20030163615 | Yu | Aug 2003 | A1 |
20030226002 | Boutaud et al. | Dec 2003 | A1 |
20040100980 | Jacobs et al. | May 2004 | A1 |
20040125807 | Liu et al. | Jul 2004 | A1 |
20040151211 | Snider | Aug 2004 | A1 |
20040184662 | Kravec et al. | Sep 2004 | A1 |
20050154916 | Boulanger et al. | Jul 2005 | A1 |
20050251638 | Boutaud et al. | Nov 2005 | A1 |
20060158219 | Sunkavalli et al. | Jul 2006 | A1 |
20060195496 | Vadi et al. | Aug 2006 | A1 |
20060206875 | Ullmann et al. | Sep 2006 | A1 |
20060257043 | Chiu | Nov 2006 | A1 |
20060274001 | Guttag et al. | Dec 2006 | A1 |
20060288070 | Vadi et al. | Dec 2006 | A1 |
20070005869 | Balraj et al. | Jan 2007 | A1 |
20070075878 | Furodet et al. | Apr 2007 | A1 |
20070127482 | Harris et al. | Jun 2007 | A1 |
20070150623 | Kravec et al. | Jun 2007 | A1 |
20070282833 | McMillen | Dec 2007 | A1 |
20070283108 | Isherwood et al. | Dec 2007 | A1 |
20080126690 | Rajan et al. | May 2008 | A1 |
20080129334 | Sunkavalli et al. | Jun 2008 | A1 |
20080133874 | Capek et al. | Jun 2008 | A1 |
20080140661 | Pandya | Jun 2008 | A1 |
20080178031 | Dong-Han | Jul 2008 | A1 |
20080256347 | Eickemeyer et al. | Oct 2008 | A1 |
20080265938 | Ting | Oct 2008 | A1 |
20080320053 | Iijima et al. | Dec 2008 | A1 |
20090198952 | Khmeinitsky et al. | Aug 2009 | A1 |
20090204734 | Strait et al. | Aug 2009 | A1 |
20100100691 | Noyes et al. | Apr 2010 | A1 |
20100100714 | Noyes et al. | Apr 2010 | A1 |
20100115173 | Noyes | May 2010 | A1 |
20100115347 | Noyes | May 2010 | A1 |
20100118425 | Rafaelof | May 2010 | A1 |
20100138432 | Noyes | Jun 2010 | A1 |
20100138575 | Noyes | Jun 2010 | A1 |
20100138634 | Noyes | Jun 2010 | A1 |
20100138635 | Noyes | Jun 2010 | A1 |
20100175130 | Pawlowski | Jun 2010 | A1 |
20100174887 | Pawlowski | Jul 2010 | A1 |
20100174929 | Pawlowski | Jul 2010 | A1 |
20100185647 | Noyes | Jul 2010 | A1 |
20100145182 | Schmidt et al. | Oct 2010 | A1 |
20100325352 | Schuette et al. | Dec 2010 | A1 |
20100332809 | Noyes et al. | Dec 2010 | A1 |
20110004578 | Momma et al. | Jan 2011 | A1 |
20110145182 | Dlugosch | Jun 2011 | A1 |
20110145544 | Noyes et al. | Jun 2011 | A1 |
20110161620 | Kaminski et al. | Jun 2011 | A1 |
20110208900 | Schuette et al. | Aug 2011 | A1 |
20110258360 | Noyes | Oct 2011 | A1 |
20110145271 | Noyes et al. | Dec 2011 | A1 |
20110307233 | Tseng et al. | Dec 2011 | A1 |
20110307433 | Dlugosch | Dec 2011 | A1 |
20110307503 | Dlugosch | Dec 2011 | A1 |
20110320759 | Craddock et al. | Dec 2011 | A1 |
20120192163 | Glendenning et al. | Jun 2012 | A1 |
20120179854 | Noyes | Jul 2012 | A1 |
20120192164 | Xu et al. | Jul 2012 | A1 |
20120192165 | Xu et al. | Jul 2012 | A1 |
20120192166 | Xu et al. | Jul 2012 | A1 |
20130154685 | Noyes | Jun 2013 | A1 |
20130156043 | Brown et al. | Jun 2013 | A1 |
20130159239 | Brown et al. | Jun 2013 | A1 |
20130159670 | Noyes | Jun 2013 | A1 |
20130159671 | Brown et al. | Jun 2013 | A1 |
20130275709 | Gajapathy | Oct 2013 | A1 |
20140025614 | Noyes et al. | Jan 2014 | A1 |
20140025923 | Klein | Jan 2014 | A1 |
20140067736 | Noyes | Mar 2014 | A1 |
20140204956 | Brown et al. | Jul 2014 | A1 |
20140225889 | Kim et al. | Aug 2014 | A1 |
20140279776 | Brown et al. | Sep 2014 | A1 |
20140325494 | Brown et al. | Oct 2014 | A1 |
Number | Date | Country |
---|---|---|
1559072 | Dec 2004 | CN |
0476159 | Mar 1992 | EP |
0943995 | Sep 1999 | EP |
08087462 | Apr 1996 | JP |
10069459 | Mar 1998 | JP |
10111862 | Apr 1998 | JP |
2000231549 | Aug 2000 | JP |
2000347708 | Dec 2000 | JP |
2006018539 | Jan 2006 | JP |
1020080097573 | Nov 2008 | KR |
WO0065425 | Nov 2000 | WO |
WO0138978 | May 2001 | WO |
WO03039001 | May 2003 | WO |
WO2005036750 | Apr 2005 | WO |
WO2011114120 | Sep 2011 | WO |
Entry |
---|
Cheng et al., “Modern FPGA Architecture,” Presentation slides, Dept. of Electrical Engineering, Imperial College London, Jan. 9, 2008. |
Sathe et al., “Comparison of Commercially Available FPGA Architectures,” Proceedings of Southeast Conference '94, 2002. |
Sidhu et al., “String Mathing on Multicontext FPGAs Using Self-Reconfiguration,” Feb. 1999, Proceedings of the 1999 ACM/SIGDA Seventh International Symposium on Field Programmable Gate Arrays, pp. 217-226. |
Sidhu et al., “A Self-Reconfigurable Gate Array Architecture”, Aug. 2000, Proceedings of the Roadmap to Reconfigurable Computing, 10th International Workshop on Field-Programmable Logic and Applications, pp. 106-120. |
Clark et al., “Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns,” 2003, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia, vol. 2778, pp. 956-959. |
Tiwari et al., “Saving Power by Mapping Finite-State Machines into Embedded Memory Blocks in FPGAs,” Department of ECECS, University of Cincinnati, USA, Feb. 16-20, 2004, vol. 2, pp. 916-921. |
Bispo, “Regular Expression Matching for Reconfigurable Packet Inspection,” Field Programmable Technology, 2006. FPT 2006. Dec. 1, 2006, pp. 119-126. |
Moscola et al., “Implementation of Network Application Layer Parser for Multiple TCP/IP Flows in Reconfigurable Devices,” Department of Computer Science and Engineering Washington University, St. Louis, MO, 2006, pp. 1-4. |
Mitra et al., “Compiling PCRE to FPGA for Accelerating SNORT IDS,” Department of Computer Science and Engineering University of California, Riverside, Dec. 3, 2007, pp. 127-135. |
Korenek, “Traffic Scanner-Hardware Accelerated Intrusion Detection System,” http://www.liberouter.org/ 2007, pp. 1-23. |
Lin et al; “Optimization of Pattern Matching Circuits for Regular Expression on FPGA,” Piscataway, NJ, USA, vol. 12, Dec. 1, 2007, pp. 1303-1310. |
Anomynous, “Field-Programmable Gate Array,” Wikipedia, the free encyclopedia, Jun. 9, 2011, pp. 1-11, XP055000431, Retrieved from the Internet. |
PCT/US2010/059310 International Search Report and Written Opinion dated Jun. 28, 2011. |
Chinese Office Action and translation dated Jan. 27, 2014. |
Japanese Office Action and translation dated Apr. 10, 2014. |
European Article 94(3) dated Apr. 17, 2015. |
Beesley, K. R.; Arabic Morphology Using Only Finite-State Operations; Xerox Research Centre Europe; pp. 50-57; 1998. |
Bird, S. et al.; One-Level Phonology: Autosegmental Representations and Rules as Finite Automata; Association for Computational Linguistics; University of Edinburgh; vol. 20; No. 1; pp. 55-90; 1994. |
Bispo, J. et al.; Regular Expression Matching for Reconfigurable Packet Inspection; IEEE International Conference on Field Programmable Technology; 2006. |
Bispo, J. et al.; Synthesis of Regular Expressions Targeting FPGAs: Current Status and Open Issues; IST/INESC-ID, Libson, Portugal; pp. 1-12; 2007. |
Brodie, B. et al.; A scalable Architecture for High-Throughput Regular-Expression Pattern Matching; Exegy Inc.; pp. 1-12; 2006. |
Clark, C.; Design of Efficient FPGA Circuits for Matching Complex Patterns in Network Intrusion Detection Systems (Master of Science Thesis); Georgia Institute of Technology; pp. 1-56; Dec. 2003. |
Clark, C.; A Unified Model of Pattern-Matching Circuits for Field-Programmable Gate Arrays [Doctoral Dissertation]; Georgia Institute of Technology; pp. 1-177; 2006. |
Clark, C. et al.; Scalable Pattern Matching for High Speed Networks; Proceedings of the 12th Annual IEEE symposium on Field-Programmable Custom Computing Machines (FCCM'04);Georgia Institute of Technology; pp. 1-9; 2004. |
Clark, C. et al.; A Unified Model of Pattern-Matching Circuit Architectures; Tech Report GIT-CERCS-05-20;Georgia Institute of Technology; pp. 1-17; 2005. |
Fide, S.; String Processing in Hardware; Scalable Parallel and Distributed Systems Lab; Proceedings of the 12th Annual IEEE symposium on Field-Programmable Custom Computing Machines (FCCM'04); School of Electrical and Computer Engineering; Georgia Institute of Technology; pp. 1-9; 2004. |
Fisk, M. et al.; Applying Fast String Matching to Intrusion Detection; Los Alamos National Laboratory; University of California San Diego; pp. 1-21; 2002. |
Korenek, J.; Traffic Scanner-Hardware Accelerated Intrusion Detection System; http://www.liberouter.org/; 2006. |
Kumar, S. et al.; Curing Regular Expressions matching Algorithms from Insomnia, Amnesia, and Acaluia; Department of Computer Science and Engineering; Washington University in St. Louis; pp. 1-17; Apr. 27, 2007. |
Lipovski, G.; Dynamic Systolic Associative Memory Chip; IEEE; Department of Electrical and Computer Engineering; University of Texas at Austin; pp. 481-492; 1990. |
Lin, C. et al.; Optimization of Pattern Matching Circuits for Regular Expression on FPGA; IEEE Transactions on Very Large Scale Integrations Systems; vol. 15, No. 12, pp. 1-6; Dec. 2007. |
Schultz, K. et al; Fully Parallel Integrated CAM/RAM Using Preclassification to Enable Large Capacities; IEEE Journal on Solid-State Circuits; vol. 31; No. 5; pp. 689-699; May 1996. |
Shafai, F. et al.; Fully Parallel 30-MHz, 2.5-Mb CAM; IEEE Journal of Solid-State Circuits, vol. 33; No. 11; pp. 1690-1696; Nov. 1998. |
Sidhu, R. et al.; Fast Regular Expression Pattern Matching using FPGAs; Department of EE-Systems; University of Southern California; pp. 1-12; 2001. |
Wada, T.; Multiobject Behavior Recognition Event Driven Selective Attention Method; IEEE; pp. 1-16; 2000. |
Yu, F.; High Speed Deep Packet Inspection with Hardware Support; Electrical Engineering and Computer Sciences; University of California at Berkeley; pp. 1-217; Nov. 22, 2006. |
Freescale and Kaspersky® Accelerated Antivirus Solution Platform for OEM Vendors; Freescale Semiconductors Document; pp. 1-16; 2007. |
PCT/US2009/067534 International Search Report and Written Opinion dated Apr. 26, 2010. |
PCT/US2009/061649 International Search Report dated Feb. 15, 2010. |
Taiwan Application No. 098144804 Office Action dated Nov. 4, 2013. |
PCT/US2012/067992 International Search Report dated Mar. 28, 2013. |
PCT/US2012/068011 International Search Report dated Apr. 15, 2013. |
PCT/US2012/067999 International Search Report dated May 14, 2013. |
PCT/US2012/067995 International Search Report dated May 17, 2013. |
PCT/US2012/067988 International Search Report (Partial) dated Jun. 24, 2014. |
PCT/US2013/049744 International Search Report and Written Opinion dated Oct. 22, 2013. |
PCT/US2013/049748 International Search Report and Written Opinion dated Oct. 22, 2013. |
PCT/US2013/049755 International Search Report and Written Opinion dated Oct. 24, 2013. |
PCT/US2013/049753 International Search Report and Written Opinion dated Nov. 7, 2013. |
PCT/US2013/055434 International Search Report and Written Opinion dated Nov. 29, 2013. |
PCT/US2013/055438 International Search Report and Written Opinion dated Nov. 29, 2013. |
PCT/US2013/055436 International Search Report and Written Opinion dated Dec. 9, 2013. |
PCT/US2014/023589 International Search Report and Written Opinion dated Jul. 24, 2014. |
Soewito et al., “Self-Addressable Memory-Based FSM: A scalable Intrusion Detection Engine”, IEEE Network, pp. 14-21; Feb. 2009. |
Hurson A. R.; A VLSI Design for the Parallel Finite State Automation and Its Performance Evaluation as a Hardware Scanner; International Journal of Computer and Information Sciences, vol. 13, No. 6; 1984. |
Carpenter et al., “A Massively Parallel Architecture for a Self-Organizing Neural Pattern Recognition Machine”, Academic Press, Inc.; 1987. |
Cong et al., “Application-Specific Instruction Generation for Configurable Processor Architectures”, Computer Science Department, University of California, ACM; 2004. |
Glette et al., “An Online EHW Pattern Recognition System Applied to Face Image Recognition”, University of Oslo, Norway; 2007. |
Kawai et al., “An Adaptive Pattern Recognition Hardware with On-chip Shift Register-based Partial Reconfiguration”, IEEE; 2008. |
Kutrib et al., “Massively Parallel Pattern Recognition with Link Features”, IFIG Research Report 0003; 2000. |
Marculescu et al., Power Management of Multi-Core Systems: Challenges, Approaches, and Recent Developments Tutorial at ASPLOS, London, UK [online]; Mar. 4, 2012. |
Vitanen et al.; Image Pattern Recognition Using Configurable Logic Cell Array; New Advances in Computer Graphics; pp. 355-368; 1989. |
Yasunaga et al., “Kernel-based Pattern Recognition Hardware: Its Design Methodology Using Evolved Truth Tables”, IEEE, 2000. |
U.S. Appl. No. 60/652,738, filed Feb. 12, 2005, Harris. |
U.S. Appl. No. 61/788,364, filed Mar. 15, 2013, Brown et al. |
Number | Date | Country | |
---|---|---|---|
20200285604 A1 | Sep 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15137877 | Apr 2016 | US |
Child | 16884302 | US | |
Parent | 12638759 | Dec 2009 | US |
Child | 15137877 | US |