CUSTOMERS KEY PROTECTION FOR CLOUD NATIVE DEPLOYMENTS

    公开(公告)号:US20240243913A1

    公开(公告)日:2024-07-18

    申请号:US18560368

    申请日:2021-11-23

    CPC classification number: H04L9/3066 H04L9/302

    Abstract: Methods and apparatus for customers key protection for cloud native deployments. Compute resources for a compute platform comprising platform hardware including one or more processors are allocated to one or more customers that use the compute resources to execute applications and/or services used to perform customer workloads. The compute platform includes a per-part device key that is used to generate hardware protected key used by the applications and services. Mechanisms are provided to ensure hardware protected keys can only be accessed by associated customers and/or customer applications and services, while preventing other customers and/or applications and services from accessing the hardware protected keys. The hardware protected keys include keys employing various forms of RSA and ECC Wrapped Private Keys (WPKs) including RSA WPKs, RSA Chinese Remainder Theorem CRT WPK and ECC WPKs.

    PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS

    公开(公告)号:US20200242258A1

    公开(公告)日:2020-07-30

    申请号:US16845885

    申请日:2020-04-10

    Abstract: Examples herein relate to an interface selectively providing access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region. In some examples, providing selective access to a physical address conversion is based on one or more of: validation of a certificate received with the work request and an identifier of the entity being associated with a process with access to the memory region. Access to the memory region can be specified to be one or more of: create, read, update, delete, write, or notify. A memory region can be a page or sub-page sized region. Different access rights can be associated with different sub-portions of the memory region, wherein the access rights comprise one or more of: create, read, update, delete, write, or notify.

    SECURE VIRTUAL MACHINE MIGRATION USING ENCRYPTED MEMORY TECHNOLOGIES

    公开(公告)号:US20210019172A1

    公开(公告)日:2021-01-21

    申请号:US17042114

    申请日:2018-06-28

    Abstract: A cryptographic data item utilized to derive a first cryptographic key employed by a first memory controller for implementing a first cryptographically protected execution environment for storing memory pages associated with a virtual machine may be received from a first host system via a first secure communication channel. The cryptographic data item may be transmitted to a second host system via a second secure communication channel for implementing a second cryptographically protected environment on the second host system. The first host system may be caused to migrate the memory pages of the virtual machine via an unsecured communication channel to the second host system for storing in the second cryptographically protected execution environment.

    PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS

    公开(公告)号:US20240111879A1

    公开(公告)日:2024-04-04

    申请号:US18370137

    申请日:2023-09-19

    CPC classification number: G06F21/602 G06F15/17331 H04L9/3268

    Abstract: Examples herein relate to an interface selectively providing access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region. In some examples, providing selective access to a physical address conversion is based on one or more of: validation of a certificate received with the work request and an identifier of the entity being associated with a process with access to the memory region. Access to the memory region can be specified to be one or more of: create, read, update, delete, write, or notify. A memory region can be a page or sub-page sized region. Different access rights can be associated with different sub-portions of the memory region, wherein the access rights comprise one or more of: create, read, update, delete, write, or notify.

    RELIABLE TRANSPORT PROTOCOL TRANSLATION TECHNOLOGIES

    公开(公告)号:US20220279057A1

    公开(公告)日:2022-09-01

    申请号:US17746611

    申请日:2022-05-17

    Abstract: Examples described herein relate to a network interface device. In some examples, the network interface device is to receive a request to transmit data, based on a first reliable transport protocol, and cause the data to be transmitted in at least one packet, based on a second reliable transport protocol, to a destination device and receive at least one packet, from a sender device, based on the second reliable transport protocol and indicate receipt of the at least one packet, based on the first reliable transport protocol, wherein the first reliable transport protocol is different than the second reliable transport protocol.

Patent Agency Ranking