Address validation using signatures

    公开(公告)号:US10027666B2

    公开(公告)日:2018-07-17

    申请号:US15661632

    申请日:2017-07-27

    申请人: Google LLC

    摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signed addresses. One of the methods includes receiving, by a component from a device, a plurality of first requests, each first request for a physical address and including a virtual address, determining, by the component, a first physical address using the virtual address, generating a first signature for the first physical address, and providing, to the device, a response that includes the first signature, receiving, from the device, a plurality of second requests, each second request for access to a second physical address and including a second signature, determining, by the component for each of the plurality of second requests, whether the second physical address is valid using the second signature, and for each second request for which the second physical address is determined to be valid, servicing the corresponding second request.

    Secondary data structures for storage class memory (scm) enables main-memory databases

    公开(公告)号:US10019382B2

    公开(公告)日:2018-07-10

    申请号:US14887578

    申请日:2015-10-20

    申请人: SAP SE

    IPC分类号: G06F12/14 H04L29/06 G06F17/30

    摘要: Disclosed herein are system, method, and computer program product embodiments for accessing and managing storage class memory (SCM) enabled main-memory database structures. An embodiment operates by traversing a first node to find a location of a second node corresponding to a search key, calculating a hash value for the search key, comparing the calculated hash value with at least one fingerprint value stored in the second node, wherein the fingerprint value is determined by hashing a stored key, accessing at least one key-value pair having a matching hash value, and returning a value associated with the matching key-value pair, wherein at least one of the traversing, calculating, comparing, accessing, and returning are performed by one or more computers.

    TECHNIQUES FOR MULTI-DOMAIN MEMORY ENCRYPTION

    公开(公告)号:US20180191716A1

    公开(公告)日:2018-07-05

    申请号:US15396157

    申请日:2016-12-30

    申请人: INTEL CORPORATION

    IPC分类号: H04L29/06 G06F12/14

    摘要: Various embodiments are generally directed to techniques for multi-domain memory encryption, such as with a plurality of cryptographically isolated domains, for instance. Some embodiments are particularly directed to a multi-domain encryption system that provides one or more of memory encryption, integrity, and replay protection services to a plurality of cryptographic domains. In one embodiment, for example, an apparatus may comprise a memory and logic for an encryption engine, at least a portion of the logic implemented in circuitry coupled to the memory. In various embodiments, the logic may receive a memory operation request associated with a data line of a set of data lines stored in a protected memory separate from the memory.

    Securing data using per tenant encryption keys

    公开(公告)号:US10013364B1

    公开(公告)日:2018-07-03

    申请号:US14751315

    申请日:2015-06-26

    摘要: One embodiment is directed to a technique which secures data on a set of storage drives of a data storage system. The technique involves encrypting data from a first tenant using a first tenant key to form first tenant encrypted data and storing the first tenant encrypted data on the set of storage drives. The technique further involves encrypting data from a second tenant using a second tenant key to form second tenant encrypted data and storing the second tenant encrypted data on the set of storage drives, the first tenant being different from the second tenant, and the first tenant key and the second tenant key being per tenant keys which are different from each other. The technique further involves destroying the first tenant key to prevent the first tenant encrypted data stored on the set of storage drives from being decrypted while maintaining the second tenant key to enable decryption of the second tenant encrypted data stored on the set of storage drives.

    SECURE MEMORY
    79.
    发明申请
    SECURE MEMORY 审中-公开

    公开(公告)号:US20180181499A1

    公开(公告)日:2018-06-28

    申请号:US15391229

    申请日:2016-12-27

    申请人: Intel Corporation

    摘要: Various examples are directed to systems and methods for securing a data storage device. A storage controller may receive a read request directed to the data storage device. The read request may comprise address data indicating a first address of a first storage location at the data storage device. The storage controller may request from the data storage device a first encrypted data unit stored at the first memory element and a first encrypted set of parity bits, such as Error Correction Code (ECC) bits, associated with the first storage location. An encryption system may decrypt the first encrypted set of parity bits to generate a first set of parity bits based at least in part on an a first location parity key for the first address.