Secure vault service for software components within an execution environment
    22.
    发明授权
    Secure vault service for software components within an execution environment 有权
    为执行环境中的软件组件提供安全的保管库服务

    公开(公告)号:US09547772B2

    公开(公告)日:2017-01-17

    申请号:US14323076

    申请日:2014-07-03

    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.

    Abstract translation: 这里一般地描述用于执行环境中的软件组件的安全保险库服务的装置,物品,方法和系统的实施例。 一个实施例包括虚拟机监视器,操作系统监视器或其他底层平台功能的能力,以限制存储器区域,以便仅通过特定认证的,授权的和已验证的软件组件进行访问,即使在其他受损的操作系统环境的一部分。 代表被保护的内存区域中提供的经过身份验证/授权/验证的软件组件的锁定和解锁秘密的底层平台只能由经过身份验证/授权/验证的软件组件访问。 可以描述和要求保护其他实施例。

    PROTECTING A MEMORY
    23.
    发明申请
    PROTECTING A MEMORY 有权
    保护记忆

    公开(公告)号:US20160285892A1

    公开(公告)日:2016-09-29

    申请号:US14669226

    申请日:2015-03-27

    CPC classification number: G06F12/1408 G06F21/00 G06F2212/1052

    Abstract: In an embodiment, a processor includes: at least one core to execute instructions; and a memory protection logic to encrypt data to be stored to a memory coupled to the processor, generate a message authentication code (MAC) based on the encrypted data, the MAC to have a first value according to a first key, obtain the encrypted data from the memory and validate the encrypted data using the MAC, where the MAC is to be re-keyed to have a second value according to a second key and without the encrypted data. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,处理器包括:执行指令的至少一个核心; 以及存储器保护逻辑,用于加密要存储到耦合到处理器的存储器的数据的存储器保护逻辑,基于加密数据生成消息认证码(MAC),MAC根据第一密钥具有第一值,获得加密数据 并且使用MAC验证加密数据,其中MAC将被重新键入以具有根据第二密钥的第二值并且没有加密数据。 描述和要求保护其他实施例。

    SECURITY PLUGIN FOR A SYSTEM-ON-A-CHIP PLATFORM
    25.
    发明申请
    SECURITY PLUGIN FOR A SYSTEM-ON-A-CHIP PLATFORM 审中-公开
    系统级芯片平台的安全插件

    公开(公告)号:US20160180114A1

    公开(公告)日:2016-06-23

    申请号:US14577812

    申请日:2014-12-19

    Abstract: Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.

    Abstract translation: 本文描述了片上系统(SoC)安全插件的系统和技术。 可以在来自SoC组件的互连端点处接收组件消息。 互连端点可以通过安全互连将组件消息传递给安全组件。 安全组件可以使用加密引擎来保护组件消息来创建安全消息。 安全消息通过安全互连传递回互连端点,并通过互连端点在互连上传输。

    Secure vault service for software components within an execution environment

    公开(公告)号:US09245141B2

    公开(公告)日:2016-01-26

    申请号:US14557079

    申请日:2014-12-01

    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.

    Technologies for execute only transactional memory

    公开(公告)号:US11416414B2

    公开(公告)日:2022-08-16

    申请号:US16724603

    申请日:2019-12-23

    Abstract: Technologies for execute only transactional memory include a computing device with a processor and a memory. The processor includes an instruction translation lookaside buffer (iTLB) and a data translation lookaside buffer (dTLB). In response to a page miss, the processor determines whether a page physical address is within an execute only transactional (XOT) range of the memory. If within the XOT range, the processor may populate the iTLB with the page physical address and prevent the dTLB from being populated with the page physical address. In response to an asynchronous change of control flow such as an interrupt, the processor determines whether a last iTLB translation is within the XOT range. If within the XOT range, the processor clears or otherwise secures the processor register state. The processor ensures that an XOT range starts execution at an authorized entry point. Other embodiments are described and claimed.

Patent Agency Ranking