-
21.
公开(公告)号:US20200228388A1
公开(公告)日:2020-07-16
申请号:US16832593
申请日:2020-03-27
Applicant: Intel Corporation
Inventor: Steffen Schulz , Patrick Koeberl , Alpa Narendra Trivedi , Scott Weber
Abstract: A multitenancy system that includes a host provider, a programmable device, and multiple tenants is provided. The host provider may publish a multitenancy mode sharing and allocation policy that includes a list of terms to which the programmable device and tenants can adhere. The programmable device may include a secure device manager configured to operate in a multitenancy mode to load a tenant persona into a given partial reconfiguration (PR) sandbox region on the programmable device. The secure device manager may be used to enforce spatial isolation between different PR sandbox regions and temporal isolation between successive tenants in one PR sandbox region.
-
公开(公告)号:US20180316508A1
公开(公告)日:2018-11-01
申请号:US16026657
申请日:2018-07-03
Applicant: Intel Corporation
Inventor: Steffen Schulz , Rafael Misoczki , Manoj R. Sastry , Jesse Walker
CPC classification number: H04L9/3247 , G06F8/65 , H04L9/0891 , H04L9/14 , H04L9/304 , H04L9/3242 , H04L63/06 , H04L63/123 , H04L67/34
Abstract: In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (AKs). After saving the current AKs, the data processing system receives an update package for a new version of the software component. The data processing system extracts a digital signature and two or more new AKs from the update package. The data processing system uses at least one current AK to determine whether the digital signature is valid. In response to a determination that the digital signature is valid, the data processing system uses a software image from the update package to update the software component, and the data processing system saves the new AKs, for subsequent utilization as the current AKs.
-
23.
公开(公告)号:US09521125B2
公开(公告)日:2016-12-13
申请号:US14693174
申请日:2015-04-22
Applicant: Intel Corporation
Inventor: Steffen Schulz
IPC: H04L29/06
CPC classification number: H04L63/0435 , H04L63/0414 , H04L63/061 , H04L63/0876
Abstract: The present application is directed to pseudonymous attestation utilizing a chain of trust. An example prover device may include a chain-of-trust based on keys derived cryptographically from a shared symmetric key and pseudonymous identification data. The chain-of-trust may be used to cryptographically generate a pseudonymous public key and private key. The prover device may provide at least pseudonymous identification data and the pseudonymous public key to a verifier device. The verifier device may access pseudonymous data published by a certifier determine whether the prover device is authentic and includes known-good versions of software (e.g., sourced from the certifier). In this manner, the verifier device may be assured that the prover device is authentic without knowing the actual identity of the prover device. In at least one embodiment, the prover device may also include a trusted execution environment (TEE).
Abstract translation: 本申请旨在利用信任链进行假名认证。 示例证明器设备可以包括基于从共享对称密钥和伪匿名识别数据密码导出的密钥的信任链。 信任链可用于密码地生成假公共密钥和私钥。 证明器装置可以向验证器装置提供至少假名识别数据和假公开密钥。 验证器设备可以访问验证者发布的假名数据,确定证明器设备是否可信,并且包括已知良好版本的软件(例如来自验证者)。 以这种方式,验证器设备可以确保证明器设备是真实的,而不知道证明器设备的实际身份。 在至少一个实施例中,证明器装置还可以包括可信执行环境(TEE)。
-
公开(公告)号:US09509502B2
公开(公告)日:2016-11-29
申请号:US14209129
申请日:2014-03-13
Applicant: Intel Corporation
Inventor: Steffen Schulz
CPC classification number: H04L9/0827 , H04L9/3213 , H04L9/3271 , H04L63/062 , H04L63/0807
Abstract: The present application is directed to symmetric keying and chain of trust. In one embodiment a prover may communicate with a verifier to perform device or data authentication. The verifier may issue a challenge to authenticate the prover, to which the prover may respond with key data and ticket data that may be forwarded to a certifier. If the ticket data is recognized, the certifier may transmit an authorization token to the verifier, which may then set a symmetric attestation key. The prover may utilize the symmetric attestation key to establish a chain of trust for use in responding to challenges to application or data authenticity. The symmetric attestation key may be used to generate a first level key that may be utilized to generate program keys. A challenge response may include at least program key data that may be authenticated by the verifier using the symmetric attestation key.
Abstract translation: 本申请涉及对称密钥和信任链。 在一个实施例中,证明者可以与验证者通信以执行设备或数据认证。 验证者可能会发出验证认证证书的挑战,证明者可以通过密钥数据和可能转发给认证者的票据数据进行响应。 如果票据数据被识别,则验证者可以向验证者发送授权令牌,然后可以设置对称证明密钥。 证明者可以利用对称认证密钥建立一个信任链,用于应对应用或数据真实性的挑战。 对称证明密钥可以用于生成可用于生成程序密钥的第一级密钥。 挑战响应可以至少包括可以由验证者使用对称认证密钥认证的程序密钥数据。
-
公开(公告)号:US12050722B2
公开(公告)日:2024-07-30
申请号:US18461867
申请日:2023-09-06
Applicant: Intel Corporation
Inventor: Steffen Schulz , Alpa Trivedi , Patrick Koeberl
IPC: G06F21/85 , G06F9/30 , G06F9/38 , G06F9/50 , G06F11/07 , G06F11/30 , G06F15/177 , G06F15/78 , G06F30/331 , G06F30/398 , G06N3/04 , H04L9/08 , H04L9/40 , G06F21/30 , G06F21/44 , G06F21/53 , G06F21/57 , G06F21/71 , G06F21/73 , G06F21/74 , G06F21/76 , G06F30/31 , G06F111/04 , G06F119/12 , G06N3/08 , G06N20/00 , H04L9/00
CPC classification number: G06F21/85 , G06F9/30101 , G06F9/3877 , G06F9/505 , G06F11/0709 , G06F11/0751 , G06F11/0754 , G06F11/0793 , G06F11/3058 , G06F15/177 , G06F15/7825 , G06F15/7867 , G06F30/331 , G06F30/398 , G06N3/04 , H04L9/0877 , H04L63/0442 , H04L63/12 , H04L63/20 , G06F11/0772 , G06F11/3051 , G06F21/30 , G06F21/44 , G06F21/53 , G06F21/57 , G06F21/575 , G06F21/71 , G06F21/73 , G06F21/74 , G06F21/76 , G06F30/31 , G06F2111/04 , G06F2119/12 , G06F2221/034 , G06N3/08 , G06N20/00 , H04L9/008 , H04L9/0841
Abstract: An apparatus to facilitate broadcast remote sealing for scalable trusted execution environment provisioning is disclosed. The apparatus includes a cloud service provider (CSP) execution platform comprising hardware circuitry for executing virtualized environments and comprising hardware accelerator devices, wherein the CSP execution platform to: authorize a tenant to deploy workloads of the tenant to CSP execution resources; provide a group status report to the tenant to inform the tenant of an existence and a status of a group of trusted execution platforms, wherein the group comprises at least one of the CSP execution resources; receive an encrypted workload of the tenant, wherein the encrypted workload is encrypted using a group public key of the group; store the encrypted workload at storage of the CSP execution platform; and dispatch the encrypted workload to the at least one of the CSP execution resources of the group.
-
26.
公开(公告)号:US11816253B2
公开(公告)日:2023-11-14
申请号:US17130506
申请日:2020-12-22
Applicant: Intel Corporation
Inventor: Alpa Trivedi , Steffen Schulz , Patrick Koeberl
IPC: G06F21/85 , G06F30/398 , G06N3/04 , H04L9/08 , G06F9/30 , G06F9/50 , G06F15/177 , G06F15/78 , H04L9/40 , G06F11/07 , G06F30/331 , G06F9/38 , G06F11/30 , G06F119/12 , G06F21/76 , G06N3/08 , H04L9/00 , G06F111/04 , G06F30/31 , G06F21/30 , G06F21/53 , G06F21/57 , G06F21/73 , G06F21/74 , G06N20/00 , G06F21/71 , G06F21/44
CPC classification number: G06F21/85 , G06F9/30101 , G06F9/3877 , G06F9/505 , G06F11/0709 , G06F11/0751 , G06F11/0754 , G06F11/0793 , G06F11/3058 , G06F15/177 , G06F15/7825 , G06F15/7867 , G06F30/331 , G06F30/398 , G06N3/04 , H04L9/0877 , H04L63/0442 , H04L63/12 , H04L63/20 , G06F11/0772 , G06F11/3051 , G06F21/30 , G06F21/44 , G06F21/53 , G06F21/57 , G06F21/575 , G06F21/71 , G06F21/73 , G06F21/74 , G06F21/76 , G06F30/31 , G06F2111/04 , G06F2119/12 , G06F2221/034 , G06N3/08 , G06N20/00 , H04L9/008 , H04L9/0841
Abstract: An apparatus to facilitate enabling secure communication via attestation of multi-tenant configuration on accelerator devices is disclosed. The apparatus includes a processor to: verify a base bitstream of an accelerator device, the base bitstream published by a cloud service provider (CSP); verify partial reconfiguration (PR) boundary setups and PR isolation of an accelerator device, the PR boundary setups and PR isolation published by the CSP; generate PR bitstream to fit within at least one PR region of the PR boundary setups of the accelerator device; inspect accelerator device attestation received from a secure device manager (SDM) of the accelerator device; and responsive to successful inspection of the accelerator device attestation, provide the PR bitstream to the CSP for PR reconfiguration of the accelerator device.
-
27.
公开(公告)号:US11763043B2
公开(公告)日:2023-09-19
申请号:US17129243
申请日:2020-12-21
Applicant: Intel Corporation
Inventor: Alpa Trivedi , Steffen Schulz , Patrick Koeberl
IPC: G06F15/177 , G06F9/00 , G06F21/85 , G06F30/398 , G06N3/04 , H04L9/08 , G06F9/30 , G06F9/50 , G06F15/78 , H04L9/40 , G06F11/07 , G06F30/331 , G06F9/38 , G06F11/30 , G06F119/12 , G06F21/76 , G06N3/08 , H04L9/00 , G06F111/04 , G06F30/31 , G06F21/30 , G06F21/53 , G06F21/57 , G06F21/73 , G06F21/74 , G06N20/00 , G06F21/71 , G06F21/44
CPC classification number: G06F21/85 , G06F9/30101 , G06F9/3877 , G06F9/505 , G06F11/0709 , G06F11/0751 , G06F11/0754 , G06F11/0793 , G06F11/3058 , G06F15/177 , G06F15/7825 , G06F15/7867 , G06F30/331 , G06F30/398 , G06N3/04 , H04L9/0877 , H04L63/0442 , H04L63/12 , H04L63/20 , G06F11/0772 , G06F11/3051 , G06F21/30 , G06F21/44 , G06F21/53 , G06F21/57 , G06F21/575 , G06F21/71 , G06F21/73 , G06F21/74 , G06F21/76 , G06F30/31 , G06F2111/04 , G06F2119/12 , G06F2221/034 , G06N3/08 , G06N20/00 , H04L9/008 , H04L9/0841
Abstract: An apparatus to facilitate enabling late-binding of security features via configuration security controller for accelerator devices is disclosed. The apparatus includes a security controller to initialize as part of a secure boot and attestation chain of trust; receive configuration data for portions of the security controller, the portions comprising components of the security controller capable of re-programming; verify and validate the configuration data to as originating from a secure and trusted source; and responsive to successful verification and validation of the configuration data, re-program the portions of the security controller based on the configuration data.
-
公开(公告)号:US11556677B2
公开(公告)日:2023-01-17
申请号:US17132306
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Furkan Turan , Patrick Koeberl , Alpa Trivedi , Steffen Schulz , Scott Weber
IPC: G06F30/398 , G06F21/85 , G06N3/04 , H04L9/08 , G06F9/30 , G06F9/50 , G06F15/177 , G06F15/78 , H04L9/40 , G06F11/07 , G06F30/331 , G06F9/38 , G06F11/30 , G06F119/12 , G06F21/76 , G06N3/08 , H04L9/00 , G06F111/04 , G06F30/31 , G06F21/30 , G06F21/53 , G06F21/57 , G06F21/73 , G06F21/74 , G06N20/00 , G06F21/71 , G06F21/44
Abstract: An apparatus to facilitate scalable runtime validation for on-device design rule checks is disclosed. The apparatus includes a memory to store a contention set, one or more multiplexors, and a validator communicably coupled to the memory. In one implementation, the validator is to: receive design rule information for the one or more multiplexers, the design rule information referencing the contention set; analyze, using the design rule information, a user bitstream against the contention set at a programming time of the apparatus, the user bitstream for programming the one or more multiplexors; and provide an error indication responsive to identifying a match between the user bitstream and the contention set.
-
公开(公告)号:US11537761B2
公开(公告)日:2022-12-27
申请号:US17129254
申请日:2020-12-21
Applicant: Intel Corporation
Inventor: Steffen Schulz , Alpa Trivedi , Patrick Koeberl
IPC: G06F21/85 , G06F9/30 , G06F9/50 , G06F15/177 , G06F15/78 , G06F30/331 , G06F30/398 , G06N3/04 , H04L9/08 , H04L9/40 , G06F11/07 , G06F9/38 , G06F11/30 , G06F119/12 , G06F21/76 , G06N3/08 , H04L9/00 , G06F111/04 , G06F30/31 , G06F21/30 , G06F21/53 , G06F21/57 , G06F21/73 , G06F21/74 , G06N20/00 , G06F21/71 , G06F21/44
Abstract: An apparatus to facilitate transparent network access controls for spatial accelerator device multi-tenancy is disclosed. The apparatus includes a secure device manager (SDM) to: establish a network-on-chip (NoC) communication path in the apparatus, the NoC communication path comprising a plurality of NoC nodes for ingress and egress of communications on the NoC communication path; for each NoC node of the NoC communication path, configure a programmable register of the NoC node to indicate a node group that the NoC node is assigned, the node group corresponding to a persona configured on the apparatus; determine whether a prefix of received data at the NoC node matches the node group indicated by the programmable register of the NoC; and responsive to determining that the prefix does not match the node group, discard the data from the NoC node.
-
公开(公告)号:US20220222202A1
公开(公告)日:2022-07-14
申请号:US17708412
申请日:2022-03-30
Applicant: Intel Corporation
Inventor: Steffen Schulz , Alpa Trivedi , Patrick Koeberl
IPC: G06F15/78 , G06F30/398 , G06N3/04 , H04L9/08 , G06F9/30 , G06F9/50 , G06F15/177 , H04L9/40 , G06F11/07 , G06F30/331 , G06F9/38
Abstract: An apparatus to facilitate broadcast remote sealing for scalable trusted execution environment provisioning is disclosed. The apparatus includes an execution platform for secure execution of a workload of the tenant to: perform an attestation of the execution platform with a cloud service provider (CSP); receive a command from the CSP to create a group of trusted execution platforms; create the group comprising the execution platform; confirm an existence and a status of the group based on the attestation of the execution platform and based on a current group status of the group; report a trusted computing base (TCB) of the first execution platform to other member execution platforms of the group, wherein the other member execution platforms satisfy minimum TCB requirements of the group; and execute an encrypted workload of the tenant using a group private key, wherein the workload of the tenant is encrypted using a group public key.
-
-
-
-
-
-
-
-
-