PATENT FAMILY

Microprocessor Shifter Circuits Utilizing Butterfly and Inverse Butterfly Circuits, and Control Circuits Therefor

Architectural microprocessor shifter designs enabling advanced bit-level permutation and manipulation operations through butterfly-based routing structures.


Overview

This patent family introduces microprocessor shifter architectures that use butterfly and inverse butterfly circuit structures to perform advanced bit-level operations efficiently within the processor data path.

The inventions enable flexible bit permutation, extraction, deposit, rotation, and mixing operations using hardware-efficient routing mechanisms, expanding the computational capabilities of general-purpose processors.


Patents in This Family

US 8,285,766 B2 | Issued: October 9, 2012

Introduces butterfly-based shifter architectures enabling advanced bit permutation within microprocessors.

US 9,134,953 B2 | Issued: September 15, 2015

Extends and refines butterfly and inverse butterfly control mechanisms for broader bit manipulation capabilities.


Core Architectural Coverage

  • Butterfly and inverse butterfly routing structures within processor shifters

  • Hardware-efficient bit permutation and mixing operations

  • Support for extract, deposit, rotate, and shift instructions

  • Integration within existing microprocessor datapaths

  • Architectural expansion of processor-level bit manipulation capabilities


Claim Scope Across the Family

  • Foundational butterfly-based shifter architecture

  • Extended control circuitry for flexible bit-level operations

  • Variations spanning instruction-level implementation

  • Layered protection across multiple issued patents


Potential Applications

  • Cryptographic and encryption-related operations

  • Data compression and encoding systems

  • Multimedia and signal processing workloads

  • High-performance and parallel computing environments


Licensing & Collaboration

This patent family is available for licensing and strategic collaboration.

→ Contact CoreSecure Technologies
→ View All Security Areas