ATTESTATION OF OPERATIONS BY TOOL CHAINS
    5.
    发明公开

    公开(公告)号:US20230333824A1

    公开(公告)日:2023-10-19

    申请号:US18307257

    申请日:2023-04-26

    CPC classification number: G06F8/40

    Abstract: Attestation of operations by tool chains is described. An example of a storage medium includes instructions for receiving source code for processing of a secure workload of a tenant; selecting at least a first compute node to provide computation for the workload; processing the source code by an attestable tool chain to generate machine code for the first compute node, including performing one or more conversions of the source code by one or more convertors to generate converted code and generating an attestation associated with each code conversion, and receiving machine code for the first compute node and generating an attestation associated with the first compute node; and providing each of the attestations from the first stage and the second stage for verification.

    Secure accelerator device pairing for trusted accelerator-to-accelerator communication

    公开(公告)号:US11575672B2

    公开(公告)日:2023-02-07

    申请号:US16723688

    申请日:2019-12-20

    Abstract: Technologies for secure device configuration and management include a computing device having an I/O device. A trusted agent of the computing device is trusted by a virtual machine monitor of the computing device. The trusted agent executes an attestation algorithm to generate a first secure attestation for the first I/O device and a second secure attestation for the second I/O device, obtains a peer-to-peer communication key, and forwards the peer-to-peer communication key to the first I/O device and a second I/O device to enable secure peer-to-peer communication between the first I/O device and the second I/O device over a communication link secured by the peer-to-peer communication key. Other embodiments are described and claimed.

    ATTESTATION SUPPORT FOR ELASTIC CLOUD COMPUTING ENVIRONMENTS

    公开(公告)号:US20210336994A1

    公开(公告)日:2021-10-28

    申请号:US17133803

    申请日:2020-12-24

    Abstract: Attestation support in cloud computing environments is described. An example of an apparatus includes one or more processors to process data, including data related to hosting of workloads for one or more tenants; an orchestration element to receive a request for support of a workload of a tenant according to a selected membership policy, the orchestration element to select a set of one or more compute nodes to provide computation for the workload; and a security manager to receive the membership policy and to receive attestations from the selected compute nodes and, upon determining that the attestations meet the requirements of the membership policy, to add the one or more compute nodes to a group of compute nodes to provide computation for the workload.

    TECHNOLOGIES FOR HYBRID VIRTUALIZATION AND SECURE ENCLAVE POLICY ENFORCEMENT FOR EDGE ORCHESTRATION

    公开(公告)号:US20190155636A1

    公开(公告)日:2019-05-23

    申请号:US16234731

    申请日:2018-12-28

    Abstract: Technologies for hybrid virtualization and secure enclave include a computing device and an edge orchestrator. The edge orchestrator securely provisions a container-enclave policy to the computing device. A VMM of the computing device constructs a platform services enclave that includes the container-enclave policy. The platform services enclave requests a local attestation report from an application enclave, and the application enclave generates the attestation report using secure enclave support of a compute engine of the computing device. The attestation report is indicative of a virtualization context of the application enclave, and may include a VM flag, a VMM flag, and a source address of the application enclave. The platform services enclave enforces the container-enclave policy based on the virtualization context of the application enclave. The platform services enclave may control access to functions of the computing device based on the virtualization context. Other embodiments are described and claimed.

    TECHNOLOGIES FOR SECURE AUTHENTICATION AND PROGRAMMING OF ACCELERATOR DEVICES

    公开(公告)号:US20190132136A1

    公开(公告)日:2019-05-02

    申请号:US16232143

    申请日:2018-12-26

    Abstract: Technologies for secure authentication and programming of an accelerator device include a computing device having a processor and an accelerator. The processor establishes a trusted execution environment, which receives a unique device identifier from the accelerator, validates a device certificate for the device identifier, authenticates the accelerator in response to validating the accelerator, validates attestation information of the accelerator, and establishes a secure channel with the accelerator. The trusted execution environment may securely program a data key and a bitstream key to the accelerator, and may encrypt a bitstream image and securely program the bitstream image to the accelerator. The accelerator and a tenant may securely exchange data protected by the data key. The trusted execution environment may be a secure enclave, and the accelerator may be a field programmable gate array (FPGA). Other embodiments are described and claimed.

Patent Agency Ranking