-
公开(公告)号:US11703933B2
公开(公告)日:2023-07-18
申请号:US16747202
申请日:2020-01-20
Applicant: Intel Corporation
Inventor: Liang Ma , Weigang Li , Madhusudana Raghupatruni , Hongjun Ni , Xuekun Hu , Changzheng Wei , Chris MacNamara , John J. Browne
CPC classification number: G06F1/324 , G06F9/544 , G06F21/53 , G06F21/606 , G06F2221/032
Abstract: Examples described herein provide for a first core to map a measurement of packet processing activity and operating parameters so that a second core can access the measurement of packet processing activity and potentially modify an operating parameter of the first core. The second core can modify operating parameters of the first core based on the measurement of packet processing activity. The first and second cores can be provisioned on start-up with a common key. The first and second cores can use the common key to encrypt or decrypt measurement of packet processing activity and operating parameters that are shared between the first and second cores. Accordingly, operating parameters of the first core can be modified by a different core while providing for secure modification of operating parameters.
-
2.
公开(公告)号:US11943340B2
公开(公告)日:2024-03-26
申请号:US17437342
申请日:2019-04-19
Applicant: Intel Corporation
Inventor: Bo Cui , Cunming Liang , Jr-Shian Tsai , Ping Yu , Xiaobing Qian , Xuekun Hu , Lin Luo , Shravan Nagraj , Xiaowen Zhang , Mesut A. Ergin , Tsung-Yuan C. Tai , Andrew J. Herdrich
CPC classification number: H04L9/0825 , H04L9/0631 , H04L9/085 , H04L63/0236
Abstract: In some examples, for process-to-process communication, such as in function linking, a virtual channel can be provisioned to provide virtual machine to virtual machine communications. In response to a transmit request from a source virtual machine, the virtual channel can cause a data copy from a source buffer associated with the source virtual machine without decryption or encryption. The virtual channel provisions a key identifier for the copied data. The destination virtual machine can receive an indication data is available and can cause the data to be decrypted using a key accessed using the key identifier and source address of the copied data. In addition, the data can be encrypted using a second, different key for storage in a destination buffer associated with the destination virtual machine. In some examples, the key identifier and source address is managed by the virtual channel and is not visible to virtual machine or hypervisor.
-