MIGRATION OF TRUSTED SECURITY ATTRIBUTES TO A SECURITY ENGINE CO-PROCESSOR

    公开(公告)号:US20200151364A1

    公开(公告)日:2020-05-14

    申请号:US16680315

    申请日:2019-11-11

    申请人: Intel Corporation

    IPC分类号: G06F21/70

    摘要: A system-on-chip (SoC) includes a host CPU on a CPU fabric, the host CPU including multiple processor cores, each associated with multiple security attributes. The SoC includes a secure asset on a network-on-chip and a security co-processor. The security co-processor includes circuitry to detect requests from the processor cores targeting the secure asset and security function processing requests, to determine, based on associated security attributes, whether the core or function is authorized to access the secure asset, to allow the request to be issued, if the core or function is so authorized, and to prevent its issuance, if not. The determination may be dependent on a signal from the CPU fabric indicating whether the host CPU can modify its security attributes or they are locked down. The security co-processor may have the highest security level and may be the only master on the SoC that can access the secure asset.

    RUNTIME PROCESSOR OPTIMIZATION
    15.
    发明申请

    公开(公告)号:US20180246762A1

    公开(公告)日:2018-08-30

    申请号:US15444390

    申请日:2017-02-28

    申请人: Intel Corporation

    IPC分类号: G06F9/50

    CPC分类号: G06F9/5083

    摘要: In one embodiment, a processor comprises a processor optimization unit. The processor optimization unit is to collect runtime information associated with a computing device, wherein the runtime information comprises information indicating a performance of the computing device during program execution. The processor optimization unit is further to receive runtime optimization information for the computing device, wherein the runtime optimization information comprises information associated with one or more runtime optimizations for the computing device, and wherein the runtime optimization information is determined based on an analysis of the collected runtime information. The processor optimization unit is further to perform the one or more runtime optimizations for the computing device based on the runtime optimization information.

    DEVICE-TO-DEVICE COMMUNICATION FOR RESOURCE SHARING
    17.
    发明申请
    DEVICE-TO-DEVICE COMMUNICATION FOR RESOURCE SHARING 审中-公开
    用于资源共享的设备到设备通信

    公开(公告)号:US20160105375A1

    公开(公告)日:2016-04-14

    申请号:US14828301

    申请日:2015-08-17

    申请人: INTEL CORPORATION

    IPC分类号: H04L12/911 H04L29/06

    摘要: Embodiments of techniques and systems associated with device-to-device (D2D) resource sharing are described. In some embodiments, a D2D communication channel between a first device and a second device is established and a sharing request is received at the first device, from the second device, including a credential identifying the second device. Data representative of a first resource locally available to the first device, but not locally available to the second device, is provided to the second device by the first device. Use of the first resource may be controlled in accordance with an instruction transmitted to the first device from the second device. Other embodiments may be described and/or claimed.

    摘要翻译: 描述了与设备到设备(D2D)资源共享相关联的技术和系统的实施例。 在一些实施例中,建立第一设备和第二设备之间的D2D通信信道,并且从第二设备在第一设备处接收共享请求,包括识别第二设备的凭证。 通过第一设备向第二设备提供代表第一设备本地可用的但不能本地可用于第二设备的第一资源的数据。 可以根据从第二设备发送到第一设备的指令来控制第一资源的使用。 可以描述和/或要求保护其他实施例。

    Device-to-device communication for resource sharing
    18.
    发明授权
    Device-to-device communication for resource sharing 有权
    设备到设备的通信,用于资源共享

    公开(公告)号:US09112884B2

    公开(公告)日:2015-08-18

    申请号:US13997636

    申请日:2013-03-13

    申请人: INTEL CORPORATION

    IPC分类号: G06F15/16 H04L29/08 H04W4/12

    摘要: Embodiments of techniques and systems associated with device-to-device (D2D) resource sharing are described. In some embodiments, a D2D communication channel between a first device and a second device is established and a sharing request is received at the first device, from the second device, including a credential identifying the second device. Data representative of a first resource locally available to the first device, but not locally available to the second device, is provided to the second device by the first device. Use of the first resource may be controlled in accordance with an instruction transmitted to the first device from the second device. Other embodiments may be described and/or claimed.

    摘要翻译: 描述了与设备到设备(D2D)资源共享相关联的技术和系统的实施例。 在一些实施例中,建立第一设备和第二设备之间的D2D通信信道,并且从第二设备在第一设备处接收共享请求,包括识别第二设备的凭证。 通过第一设备向第二设备提供代表第一设备本地可用的但不能本地可用于第二设备的第一资源的数据。 可以根据从第二设备发送到第一设备的指令来控制第一资源的使用。 可以描述和/或要求保护其他实施例。

    Migration of trusted security attributes to a security engine co-processor

    公开(公告)号:US10534935B2

    公开(公告)日:2020-01-14

    申请号:US15200935

    申请日:2016-07-01

    申请人: Intel Corporation

    IPC分类号: G06F21/70

    摘要: A system-on-chip (SoC) includes a host CPU on a CPU fabric, the host CPU including multiple processor cores, each associated with multiple security attributes. The SoC includes a secure asset on a network-on-chip and a security co-processor. The security co-processor includes circuitry to detect requests from the processor cores targeting the secure asset and security function processing requests, to determine, based on associated security attributes, whether the core or function is authorized to access the secure asset, to allow the request to be issued, if the core or function is so authorized, and to prevent its issuance, if not. The determination may be dependent on a signal from the CPU fabric indicating whether the host CPU can modify its security attributes or they are locked down. The security co-processor may have the highest security level and may be the only master on the SoC that can access the secure asset.