SoC PLATFORM & IP CORES The Palmchip Corporation is a world-wide leader

We are the leader in the development and licensing of Design Platforms, a System-on-Chip (SoC), software, and hardware applications

SECURE SOC PLATFORMS The 8051 and 80251 is still a very popular controller which is being embedded in an application-specific system on chip (SoC) designs in today’s market.

This can be seen from its usage in Wireless Sensor Networks, Home Appliance Networks(HAN), Zigbee, RFID, and removable storage market areas. The migration toward cloud computing has increased the demand for smart-grid networks, which enable remote green energy management,where at-home appliances could be controlled from smart phones or a PC to save energy. The Palm8051 has been designed keeping in mind this particular market.

Features
  • Single clock cycle instruction execution
  • 256 bytes of on-chip data RAM
  • Up to 256Kbytes of program memory
  • Dual data pointers
  • Standard 2 16-bit timers/counters
  • 6 Source/5 Vector interrupt structure with two priority levels.
  • No multiplexed I/O ports
  • 32 General purpose I/O Ports
  • Full duplex serial port
  • Wait state support for slow external peripherals
  • Fully synchronous design
CoreFrame In 1997 Palmchip invented the CoreFrame® System on Chip Architecture which pioneered the system on a single-chip design for the consumer market, thus enabling high-performance and low-cost consumer devices.

Today CoreFrame is powering over 4 Billion devices which includes WiFi chips, Bluetooth chips, storage SSD controller chips for PCs and embedded devices, cell phones chips, IoT chips and network security chips.

Palmchip has enabled mass storage, disk drive, SSD, Bluetooth communications, WiFi communications, setup boxes, home gateways, internet cameras, and smartcard devices.

Static application security testing(SAST) SAST is an application security technology that finds security problems in the code of applications by looking at the application source code statically as opposed to running the application. SAST technology typically involves finding specific patterns in the code that suggest suspicious code, without running the applications.

Some of the vendors use regular expressions, and others build a logic graph representing the code architecture and its relations.Regardless of the approach, the limitation of seeing the code statically is very important, because complex applications with multiple layers will behave differently in runtime depending on the conditions and input data.