APPLICATION EXECUTION ENCLAVE MEMORY PAGE CACHE MANAGEMENT METHOD AND APPARATUS
    11.
    发明申请
    APPLICATION EXECUTION ENCLAVE MEMORY PAGE CACHE MANAGEMENT METHOD AND APPARATUS 有权
    应用程序执行内容存储页缓存管理方法和设备

    公开(公告)号:US20170068455A1

    公开(公告)日:2017-03-09

    申请号:US14849222

    申请日:2015-09-09

    CPC classification number: G06F12/1441 G06F21/10 G06F21/125 G06F21/53

    Abstract: Apparatuses, methods and storage medium associated with application execution enclave cache management, are disclosed herein. In embodiments, an apparatus may include one or more processors with supports for application execution enclaves; cache memory coupled with the one or more processors to be organized into a plurality of cache pages; and an exception handler to be operated by the one or more processors to handle cache page fault exceptions, wherein to handle cache page fault exceptions includes to handle a cache page fault triggered to request additional allocation of one or more cache pages to an execution enclave of an application. Other embodiments may be described and/or claimed.

    Abstract translation: 本文公开了与应用执行包层缓存管理相关联的设备,方法和存储介质。 在实施例中,设备可以包括具有用于应用执行包层的支持的一个或多个处理器; 与所述一个或多个处理器耦合的高速缓冲存储器将被组织成多个高速缓存页面; 以及由所述一个或多个处理器操作以处理高速缓存页错误异常的异常处理程序,其中处理高速缓存页错误异常包括处理触发的高速缓存页错误以请求对一个或多个高速缓存页的附加分配到执行空间 一个应用程序。 可以描述和/或要求保护其他实施例。

    TECHNOLOGIES FOR TRUSTED I/O PROTECTION OF I/O DATA WITH HEADER INFORMATION

    公开(公告)号:US20220405403A1

    公开(公告)日:2022-12-22

    申请号:US17820628

    申请日:2022-08-18

    Abstract: Technologies for trusted I/O include a computing device having a hardware cryptographic agent, a cryptographic engine, and an I/O controller. The hardware cryptographic agent intercepts a message from the I/O controller and identifies boundaries of the message. The message may include multiple DMA transactions, and the start of message is the start of the first DMA transaction. The cryptographic engine encrypts the message and stores the encrypted data in a memory buffer. The cryptographic engine may skip and not encrypt header data starting at the start of message or may read a value from the header to determine the skip length. In some embodiments, the cryptographic agent and the cryptographic engine may be an inline cryptographic engine. In some embodiments, the cryptographic agent may be a channel identifier filter, and the cryptographic engine may be processor-based. Other embodiments are described and claimed.

    Mechanism to prevent software side channels

    公开(公告)号:US10970390B2

    公开(公告)日:2021-04-06

    申请号:US15897406

    申请日:2018-02-15

    Abstract: A processor includes a processing core to identify a code comprising a plurality of instructions to be executed in the architecturally-protected environment, determine that a first physical memory page stored in the architecturally-protected memory matches a first virtual memory page referenced by a first instruction of the plurality of instructions, generate a first address mapping between a first address of the first virtual memory page and a second address of the first physical memory page, store, in the cache memory, the address translation data structure comprising the first address mapping, and execute the code by retrieving the first address mapping in the address translation data structures to be executed in the architecturally-protected environment, determine that a first physical memory page stored in the architecturally-protected memory matches a first virtual memory page referenced by a first instruction of the plurality of instructions, generate a first address mapping between a first address of the first virtual memory page and a second address of the first physical memory page, store, in the cache memory, an address translation data structure comprising the first address mapping, and execute the code by retrieving the first address mapping stored in the address translation data structure.

    Technologies for secure I/O with MIPI camera device

    公开(公告)号:US10331564B2

    公开(公告)日:2019-06-25

    申请号:US15825730

    申请日:2017-11-29

    Abstract: Technologies for secure I/O with MIPI camera devices include a computing device having a camera controller coupled to a camera and a channel identifier filter. The channel identifier filter detects DMA transactions issued by the camera controller and related to the camera. The channel identifier filter determines whether a DMA transaction includes a secure channel identifier or a non-secure channel identifier. If the DMA transaction includes the non-secure channel identifier, the channel identifier filter allows the DMA transaction. If the DMA transaction includes the secure channel identifier, the channel identifier filter determines whether the DMA transaction is targeted to a memory address in a protected memory range associated with the secure channel identifier. If so, the channel identifier filter allows the DMA transaction. If not, the channel identifier filter blocks the DMA transaction. Other embodiments are described and claimed.

    TECHNOLOGIES FOR SECURE I/O WITH MIPI CAMERA DEVICE

    公开(公告)号:US20190042431A1

    公开(公告)日:2019-02-07

    申请号:US15825730

    申请日:2017-11-29

    Abstract: Technologies for secure I/O with MIPI camera devices include a computing device having a camera controller coupled to a camera and a channel identifier filter. The channel identifier filter detects DMA transactions issued by the camera controller and related to the camera. The channel identifier filter determines whether a DMA transaction includes a secure channel identifier or a non-secure channel identifier. If the DMA transaction includes the non-secure channel identifier, the channel identifier filter allows the DMA transaction. If the DMA transaction includes the secure channel identifier, the channel identifier filter determines whether the DMA transaction is targeted to a memory address in a protected memory range associated with the secure channel identifier. If so, the channel identifier filter allows the DMA transaction. If not, the channel identifier filter blocks the DMA transaction. Other embodiments are described and claimed.

    NESTED EXCEPTION HANDLING
    20.
    发明申请

    公开(公告)号:US20180113811A1

    公开(公告)日:2018-04-26

    申请号:US15332841

    申请日:2016-10-24

    Inventor: Bin Xing

    Abstract: An example system that includes a processor and a memory device. The processor may include multiple execution units to execute instructions and a memory device coupled to the processor. The memory device stores the instructions in an unprotected region and a protected region. The processor may determine that a first exception occurred while executing a first set of instructions for an application stored in a secured page of the protected region. The processor may invoke a first subroutine to forward exception context for the first exception to a second subroutine, where the first subroutine is stored in the protected region and the second subroutine is stored in the unprotected region. The processor may invoke, by the second subroutine, a third subroutine to execute a second set of instructions associated with the exception context for the first exception.

Patent Agency Ranking