MULTI-KEY CRYPTOGRAPHIC MEMORY PROTECTION
    3.
    发明申请

    公开(公告)号:US20190004973A1

    公开(公告)日:2019-01-03

    申请号:US15635548

    申请日:2017-06-28

    申请人: Intel Corporation

    IPC分类号: G06F12/14 H04L29/06 H04L9/06

    摘要: In one embodiment, an apparatus comprises a processor to execute instruction(s), wherein the instructions comprise a memory access operation associated with a memory location of a memory. The apparatus further comprises a memory encryption controller to: identify the memory access operation; determine that the memory location is associated with a protected domain, wherein the protected domain is associated with a protected memory region of the memory, and wherein the protected domain is identified from a plurality of protected domains associated with a plurality of protected memory regions of the memory; identify an encryption key associated with the protected domain; perform a cryptography operation on data associated with the memory access operation, wherein the cryptography operation is performed based on the encryption key associated with the protected domain; and return a result of the cryptography operation, wherein the result is to be used for the memory access operation.

    Cryptographic Memory Ownership Table For Secure Public Cloud

    公开(公告)号:US20190042764A1

    公开(公告)日:2019-02-07

    申请号:US15808986

    申请日:2017-11-10

    申请人: Intel Corporation

    摘要: In a public cloud environment, each consumer's/guest's workload is encrypted in a cloud service provider's (CSP's) server memory using a consumer-provided key unknown to the CSP's workload management software. An encrypted consumer/guest workload image is loaded into the CSP's server memory at a memory location specified by the CSP's workload management software. Based upon the CSP-designated memory location, the guest workload determines expected hardware physical addresses into which memory mapping structures and other types of consumer data should be loaded. These expected hardware physical addresses are specified by the guest workload in a memory ownership table (MOT), which is used to check that subsequently CSP-designated memory mappings are as expected. Memory ownership table entries also may be encrypted by the consumer-provided key unknown to the CSP.