HARDWARE IDENTITY IMPERSONATION FOR TARGET ACCESS CONTROL

    公开(公告)号:US20240106824A1

    公开(公告)日:2024-03-28

    申请号:US17934774

    申请日:2022-09-23

    CPC classification number: H04L63/0876 H04L63/101 H04L63/1483

    Abstract: Systems and techniques are provided for identity impersonation in access control systems. For example, a process for identity impersonation in access control systems can include: receiving, at a hardware identity impersonator from a first access domain, a request to make a target region accessible to a second access domain; updating a second access domain identity data structure to include an entry corresponding to the first access domain, the entry comprising an address of the target region and a first access domain identifier; receiving, at the hardware identity impersonator from the second access domain, an access request to access the target region, wherein the access request comprises an address and a second access domain identifier of the second access domain; and transmitting, at the hardware identity impersonator based on the access request, the address and the first access domain identifier to a memory management unit (MMU) of an access control system.

    COHERENT KEY MANAGEMENT ACROSS MULTIPLE CHIPLETS

    公开(公告)号:US20250097019A1

    公开(公告)日:2025-03-20

    申请号:US18468666

    申请日:2023-09-15

    Abstract: Systems and techniques are provided for establishing a connection. For instance, a process may include receiving, at a first chiplet root of trust (C-ROT) of a first chiplet of a plurality of chiplets, a request for a cryptographic key; generating, by the first C-ROT, the cryptographic key; wrapping, by the first C-ROT, the cryptographic key using a wrapping key to generate a wrapped cryptographic key; outputting, by the first C-ROT, the wrapped cryptographic key; receiving the wrapped cryptographic key at a second C-ROT of a second chiplet of the plurality of chiplets; unwrapping, by the second C-ROT, the wrapped cryptographic key using the wrapping key; and performing, by the second C-ROT, an operation based on the cryptographic key.

    MULTISTAGE DEVICE BOOT WITH INDEPENDENT STAGE KEYS

    公开(公告)号:US20250053659A1

    公开(公告)日:2025-02-13

    申请号:US18447888

    申请日:2023-08-10

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for booting a device with independent stage keys. In one illustrative example, a computing device can generate a first stage key for a first stage of a current boot operation of the device based on a private key associated with the device. The computing device can authenticate a first firmware of the first stage using a first authentication tag and the first stage key, wherein the first authentication tag is generated during a previous boot operation. computing device can execute the first firmware based on authenticating the first firmware.

    ACCESS CONTROL SYSTEM AND METHOD FOR ISOLATING MUTUALLY DISTRUSTING SECURITY DOMAINS

    公开(公告)号:US20210397714A1

    公开(公告)日:2021-12-23

    申请号:US16903982

    申请日:2020-06-17

    Abstract: Resource access control in a system-on-chip (“SoC”) may employ an agent executing on a processor of the SoC and a trust management engine of the SoC. The agent, such as, for example, a high-level operating system or a hypervisor, may be configured to allocate a resource comprising a memory region to an access domain and to load a software image associated with the access domain into the memory region. The trust management engine may be configured to lock the resource against access by any entity other than the access domain, to authenticate the software image associated with the access domain, and to initiate booting of the access domain in response to a successful authentication of the software image associated with the access domain.

    MECHANISMS TO ENFORCE SECURITY WITH PARTIAL ACCESS CONTROL HARDWARE OFFLINE

    公开(公告)号:US20190012271A1

    公开(公告)日:2019-01-10

    申请号:US15641765

    申请日:2017-07-05

    Abstract: One feature pertains to an apparatus that includes a memory circuit, a system memory-management unit (SMMU), and a processing circuit. The memory circuit stores an executable program associated with a client. The SMMU enforces memory access control policies for the memory circuit, and includes a plurality of micro-translation lookaside buffers (micro-TLBs), macro-TLB, and a page walker circuit. The plurality of micro-TLBs include a first micro-TLB that enforces memory access control policies for the client. The processing circuit loads memory address translations associated with the executable program into the first micro-TLB, and initiates isolation mode for the first micro-TLB causing communications between the first micro-TLB and the macro-TLB and between the first micro-TLB and the page walker circuit to be severed. The first micro-TLB continues to enforce memory access control policies for the client while in isolation mode.

Patent Agency Ranking