MULTI-KEY CRYPTOGRAPHIC MEMORY PROTECTION
    41.
    发明申请

    公开(公告)号:US20190004973A1

    公开(公告)日:2019-01-03

    申请号:US15635548

    申请日:2017-06-28

    Abstract: In one embodiment, an apparatus comprises a processor to execute instruction(s), wherein the instructions comprise a memory access operation associated with a memory location of a memory. The apparatus further comprises a memory encryption controller to: identify the memory access operation; determine that the memory location is associated with a protected domain, wherein the protected domain is associated with a protected memory region of the memory, and wherein the protected domain is identified from a plurality of protected domains associated with a plurality of protected memory regions of the memory; identify an encryption key associated with the protected domain; perform a cryptography operation on data associated with the memory access operation, wherein the cryptography operation is performed based on the encryption key associated with the protected domain; and return a result of the cryptography operation, wherein the result is to be used for the memory access operation.

    Method for enforcing resource access control in computer systems
    47.
    发明授权
    Method for enforcing resource access control in computer systems 有权
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US09112867B2

    公开(公告)日:2015-08-18

    申请号:US14304307

    申请日:2014-06-13

    CPC classification number: H04L63/10 G06F12/1458 G06F21/6218 G06F21/78

    Abstract: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    Abstract translation: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。

    Launching A Secure Kernel In A Multiprocessor System
    48.
    发明申请
    Launching A Secure Kernel In A Multiprocessor System 审中-公开
    在多处理器系统中启动安全内核

    公开(公告)号:US20150059007A1

    公开(公告)日:2015-02-26

    申请号:US14505770

    申请日:2014-10-03

    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.

    Abstract translation: 在本发明的一个实施例中,一种方法包括验证系统的主处理器; 如果主处理器被验证,则使用主处理器验证可信代理; 以及如果所述信任代理被验证,则在所述系统的多个处理器上启动所述可信代理。 在执行这样的可信代理之后,在某些实施例中可以启动安全内核。 该系统可以是例如具有任意点到点互连的部分或完全连接的拓扑的多处理器服务器系统。

    Reconfiguring a secure system
    50.
    发明授权
    Reconfiguring a secure system 有权
    重新配置安全系统

    公开(公告)号:US08683191B2

    公开(公告)日:2014-03-25

    申请号:US13664930

    申请日:2012-10-31

    CPC classification number: G06F21/57

    Abstract: Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The configuration storage location is to store information to configure the apparatus. The lock is to prevent writes to the configuration storage location. The lock override logic is to allow instructions executed from sub-operating mode code to override the lock.

    Abstract translation: 公开了用于重新配置安全系统的装置,方法和系统。 在一个实施例中,装置包括配置存储位置,锁定和锁定超驰逻辑。 配置存储位置是存储信息以配置设备。 该锁是为了防止写入配置存储位置。 锁定覆盖逻辑是允许从子操作模式代码执行的指令覆盖锁定。

Patent Agency Ranking