TRANSPARENT NETWORK ACCESS CONTROL FOR SPATIAL ACCELERATOR DEVICE MULTI-TENANCY

    公开(公告)号:US20210109889A1

    公开(公告)日:2021-04-15

    申请号:US17129254

    申请日:2020-12-21

    Abstract: An apparatus to facilitate transparent network access controls for spatial accelerator device multi-tenancy is disclosed. The apparatus includes a secure device manager (SDM) to: establish a network-on-chip (NoC) communication path in the apparatus, the NoC communication path comprising a plurality of NoC nodes for ingress and egress of communications on the NoC communication path; for each NoC node of the NoC communication path, configure a programmable register of the NoC node to indicate a node group that the NoC node is assigned, the node group corresponding to a persona configured on the apparatus; determine whether a prefix of received data at the NoC node matches the node group indicated by the programmable register of the NoC; and responsive to determining that the prefix does not match the node group, discard the data from the NoC node.

    Hash-based signature balancing
    12.
    发明授权

    公开(公告)号:US10313130B2

    公开(公告)日:2019-06-04

    申请号:US15277462

    申请日:2016-09-27

    Abstract: One embodiment provides a signer device. The signer device includes hash signature control logic and signer signature logic. The hash signature control logic is to retrieve a first nonce, to concatenate the first nonce and a message to be transmitted and to determine whether a first message representative satisfies a target threshold. The signer signature logic is to generate a first transmitted signature based, at least in part, on the first message representative, if the first message representative satisfies the target threshold. The hash signature control logic is to retrieve a second nonce, concatenate the second nonce and the message to be transmitted and to determine whether a second message representative satisfies the target threshold, if the first message representative does not satisfy the target threshold.

    Methods and apparatus to provide for efficient and secure software updates

    公开(公告)号:US10033534B2

    公开(公告)日:2018-07-24

    申请号:US14955255

    申请日:2015-12-01

    Abstract: In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (AKs). After saving the current AKs, the data processing system receives an update package for a new version of the software component. The data processing system extracts a digital signature and two or more new AKs from the update package. The data processing system uses at least one current AK to determine whether the digital signature is valid. In response to a determination that the digital signature is valid, the data processing system uses a software image from the update package to update the software component, and the data processing system saves the new AKs, for subsequent utilization as the current AKs. Other embodiments are described and claimed.

    DYNAMIC CONFIGURATION AND PERIPHERAL ACCESS IN A PROCESSOR

    公开(公告)号:US20180157603A1

    公开(公告)日:2018-06-07

    申请号:US15651886

    申请日:2017-07-17

    Abstract: In various implementations, a system includes a memory, a processor, and an execution-aware memory protection unit (EA-MPU). The EA-MPU is configured to regulate memory access by the processor based at least on the identity of a subject executable that requests access, and on the address to which access is requested, and on permissions information that identifies which subject executables are to be granted access to each of several memory regions. In various implementations, the permissions information itself is stored among the several memory regions. Various configurations of the permissions information can be used to provide shared memory regions for communication among two or more stand-alone trusted software modules, to protect access to devices accessible through memory-mapped I/O (MMIO), to implement a flexible watchdog timer, to provide security for software updates, to provide dynamic root of trust measurement services, and/or to support an operating system.

    Dynamic Configuration and Peripheral Access in a Processor
    15.
    发明申请
    Dynamic Configuration and Peripheral Access in a Processor 有权
    处理器中的动态配置和外设访问

    公开(公告)号:US20160283402A1

    公开(公告)日:2016-09-29

    申请号:US14666087

    申请日:2015-03-23

    Abstract: In various implementations, a system includes a memory, a processor, and an execution-aware memory protection unit (EA-MPU). The EA-MPU is configured to regulate memory access by the processor based at least on the identity of a subject executable that requests access, and on the address to which access is requested, and on permissions information that identifies which subject executables are to be granted access to each of several memory regions. In various implementations, the permissions information itself is stored among the several memory regions. Various configurations of the permissions information can be used to provide shared memory regions for communication among two or more stand-alone trusted software modules, to protect access to devices accessible through memory-mapped I/O (MMIO), to implement a flexible watchdog timer, to provide security for software updates, to provide dynamic root of trust measurement services, and/or to support an operating system.

    Abstract translation: 在各种实现中,系统包括存储器,处理器和执行感知存储器保护单元(EA-MPU)。 EA-MPU被配置为基于至少基于请求访问的主体可执行文件的身份以及请求访问的地址以及用于识别要授予哪个主体可执行文件的许可信息来调节处理器的存储器访问 访问几个内存区域中的每一个。 在各种实现中,权限信息本身存储在几个存储区域中。 可以使用许可信息的各种配置来提供用于在两个或更多个独立的可信软件模块之间进行通信的共享存储器区域,以保护对通过存储器映射I / O(MMIO)可访问的设备的访问,以实现灵活的看门狗定时器 为软件更新提供安全性,提供信任度量服务的动态根,和/或支持操作系统。

    Symmetric keying and chain of trust
    16.
    发明授权
    Symmetric keying and chain of trust 有权
    对称键控和信任链

    公开(公告)号:US09348997B2

    公开(公告)日:2016-05-24

    申请号:US14543097

    申请日:2014-11-17

    CPC classification number: H04L9/0827 G06F21/51 G06F21/53 G06F2221/033

    Abstract: The present disclosure is directed to sealing data using chain of trust key derivation. In at least one embodiment, a chain of trust may be used to derive sealing keys for sealing data on a device. The device may comprise, for example, at least a memory and processor. The processor may be to at least load code modules from the memory. Following the loading of a code module, the processor may further be to measure the code module, determine a sealing key corresponding to the code module, wherein the sealing key is determined based at least on a prior sealing key corresponding to a previously loaded code module and the measurement of the code module, and seal data corresponding to the loaded code module using the sealing key. Since the sealing keys are state dependent, a method for authorized migration of sealed data during software upgrades is also disclosed.

    Abstract translation: 本披露旨在使用信任密钥导出链密封数据。 在至少一个实施例中,可以使用信任链来导出用于密封设备上的数据的密封密钥。 该设备可以包括例如至少一个存储器和处理器。 处理器可能至少要从存储器加载代码模块。 在加载代码模块之后,处理器还可以测量代码模块,确定对应于代码模块的密封密钥,其中密封密钥至少基于与先前加载的代码模块对应的先前密封密钥来确定 以及代码模块的测量,以及使用密封密封对应于加载的代码模块的数据。 由于密封密钥是取决于状态的,所以还公开了在软件升级过程中授权的密封数据迁移的方法。

Patent Agency Ranking