-
公开(公告)号:EP3975028A1
公开(公告)日:2022-03-30
申请号:EP21191771.1
申请日:2021-08-17
申请人: INTEL Corporation
发明人: DOSHI, Kshitij Arun , MOSUR, Lokpraveen , QURESHI, Uzair , SMITH, Ned M. , DOYLE, Stephen , FLEMING, Patrick , KEATING, Brian
摘要: Methods, systems, and use cases for one-touch inline cryptographic data security are discussed, including an edge computing device with a network communications circuitry (NCC), an enhanced DMA engine coupled to a memory device and including a cryptographic engine, and processing circuitry configured to perform a secure exchange with a second edge computing device to negotiate a shared symmetric encryption key, based on a request for data. An inline encryption command for communication to the enhanced DMA engine is generated. The inline encryption command includes a first address associated with a storage location storing the data, a second address associated with a memory location in the memory device, and the shared symmetric encryption key. The data is retrieved from the storage location using the first address, the data is encrypted using the shared symmetric encryption key, and the encrypted data is stored in the memory location using the second address.
-
2.
公开(公告)号:EP4158475A1
公开(公告)日:2023-04-05
申请号:EP21812591.2
申请日:2021-03-26
申请人: Intel Corporation
-
公开(公告)号:EP4147427A1
公开(公告)日:2023-03-15
申请号:EP20934614.7
申请日:2020-12-26
申请人: INTEL Corporation
发明人: KUTCH, Patrick G. , CHILIKIN, Andrey , MCDONNELL, Niall D. , KEATING, Brian A. , LAKKAKULA, Naveen , GANGA, Ilango S. , KRISHNA IYER, Venkidesh , FLEMING, Patrick , MOSUR, Lokpraveen
IPC分类号: H04L12/935 , H04L12/879 , H04L12/861 , H04L12/867 , H04L12/937 , H04L12/851 , H04L29/08 , G06F9/50 , H04L29/06
-
公开(公告)号:EP3971682A1
公开(公告)日:2022-03-23
申请号:EP21191762.0
申请日:2021-08-17
申请人: INTEL Corporation
发明人: DOSHI, Kshitij Arun , GUIM BERNAT, Francesc , MOSUR, Lokpraveen , QURESHI, Uzair , SMITH, Ned M.
摘要: Various aspects of methods, systems, and use cases include coordinating actions at an edge device based on power production in a distributed edge computing environment. Systems and methods may be used to an edge device based on power production. A method may include predicting power harvesting of an edge device over a period of time. The method may determine an optimized timeframe among various timeframes for performing a task based on the predicted power harvesting. The method may include outputting or an indication for use by an implementing edge device.
-
公开(公告)号:EP3547196B1
公开(公告)日:2020-08-05
申请号:EP19160045.1
申请日:2019-02-28
申请人: INTEL Corporation
-
公开(公告)号:EP3547196A1
公开(公告)日:2019-10-02
申请号:EP19160045.1
申请日:2019-02-28
申请人: INTEL Corporation
发明人: SOOD, Kapil , LAKKAKULA, Naveen , TADEPALLI, Hari K. , MOSUR, Lokpraveen , GADIYAR, Rajesh , FLEMING, Patrick
摘要: A security accelerator device stores a first credential that is uniquely associated with the individual security accelerator device and represents a root of trust to a trusted entity. The device establishes a cryptographic trust relationship with a client entity that is based on the root of trust, the cryptographic trust relationship being represented by a second credential. The device receives and stores a secret credential of the client entity, which is received via communication secured by the second credential. Further, the device executes a cryptographic computation using the secret client credential on behalf of the client entity to produce a computation result.
-
-
-
-
-