-
公开(公告)号:US11003584B2
公开(公告)日:2021-05-11
申请号:US16288844
申请日:2019-02-28
Applicant: Intel Corporation
Inventor: Kai Cong , Karanvir Grewal , Siddhartha Chhabra , Sergej Deutsch , David Michael Durham
Abstract: A data processing system includes support for sub-page granular memory tags. The data processing system comprises at least one core, a memory controller responsive to the core, random access memory (RAM) responsive to the memory controller, and a memory protection module in the memory controller. The memory protection module enables the memory controller to use a memory tag value supplied as part of a memory address to protect data stored at a location that is based on a location value supplied as another part of the memory address. The data processing system also comprises an operating system (OS) which, when executed in the data processing system, manages swapping a page of data out of the RAM to non-volatile storage (NVS) by using a memory tag map (MTM) to apply memory tags to respective subpages within the page being swapped out. Other embodiments are described and claimed.
-
公开(公告)号:US20160117498A1
公开(公告)日:2016-04-28
申请号:US14523886
申请日:2014-10-25
Applicant: Intel Corporation
Inventor: Paritosh Saxena , Adrian M.M.T. Dunbar , Michael S. Hughes , John Teddy , David Michael Durham , Balaji Vembu , Prashant Dewan , Debra Cablao , Nicholas D. Triantafillou , Craig D. Schmugar , Jason M. Surprise
CPC classification number: G06F21/552 , G06F1/28 , G06F9/45558 , G06F9/5027 , G06F12/14 , G06F12/145 , G06F12/1491 , G06F21/445 , G06F21/554 , G06F21/558 , G06F21/56 , G06F21/566 , G06F21/57 , G06F21/71 , G06F21/74 , G06F2009/45587 , G06F2209/509 , G06F2212/1052 , G06F2221/034 , G06F2221/2149 , G06T1/20 , G09G5/363
Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.
-
公开(公告)号:US20190196977A1
公开(公告)日:2019-06-27
申请号:US16288844
申请日:2019-02-28
Applicant: Intel Corporation
Inventor: Kai Cong , Karanvir Grewal , Siddhartha Chhabra , Sergej Deutsch , David Michael Durham
CPC classification number: G06F12/10 , G06F3/0604 , G06F3/065 , G06F3/0673 , G06F11/1076 , G06F21/602 , G06F2212/657
Abstract: A data processing system includes support for sub-page granular memory tags. The data processing system comprises at least one core, a memory controller responsive to the core, random access memory (RAM) responsive to the memory controller, and a memory protection module in the memory controller. The memory protection module enables the memory controller to use a memory tag value supplied as part of a memory address to protect data stored at a location that is based on a location value supplied as another part of the memory address. The data processing system also comprises an operating system (OS) which, when executed in the data processing system, manages swapping a page of data out of the RAM to non-volatile storage (NVS) by using a memory tag map (MTM) to apply memory tags to respective subpages within the page being swapped out. Other embodiments are described and claimed.
-
公开(公告)号:US20160117497A1
公开(公告)日:2016-04-28
申请号:US14523884
申请日:2014-10-25
Applicant: Intel Corporation
Inventor: Paritosh Saxena , Adrian M.M.T. Dunbar , Michael S. Hughes , John Teddy , David Michael Durham , Balaji Vembu , Prashant Dewan , Debra Cablao , Nicholas D. Triantafillou , Craig D. Schmugar , Jason M. Surprise
CPC classification number: G06F21/566 , G06F21/52 , G06F21/74
Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.
-
公开(公告)号:US20150341371A1
公开(公告)日:2015-11-26
申请号:US14818654
申请日:2015-08-05
Applicant: INTEL CORPORATION
IPC: H04L29/06
CPC classification number: H04L63/14 , G06F21/10 , G06F21/57 , H04L63/029 , H04L63/0428 , H04L63/0478
Abstract: Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent, provide a command from the agent to the storage device via the secure tunnel, access first data at the storage device in response to the command, and identify a modification to data stored on the storage device by comparing the first data to second data, wherein the comparison is done using the storage device.
Abstract translation: 公开了提供安全存储的系统和方法。 示例性方法包括在存储设备和代理之间建立安全通道,经由安全隧道从代理向存储设备提供命令,响应于命令访问存储设备处的第一数据,并且识别对数据的修改 通过将第一数据与第二数据进行比较来存储在存储装置上,其中使用存储装置进行比较。
-
公开(公告)号:US10091213B2
公开(公告)日:2018-10-02
申请号:US14818654
申请日:2015-08-05
Applicant: INTEL CORPORATION
Abstract: Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent, provide a command from the agent to the storage device via the secure tunnel, access first data at the storage device in response to the command, and identify a modification to data stored on the storage device by comparing the first data to second data, wherein the comparison is done using the storage device.
-
-
-
-
-