TECHNOLOGIES FOR LOW-LATENCY CRYPTOGRAPHY FOR PROCESSOR-ACCELERATOR COMMUNICATION

    公开(公告)号:US20220027288A1

    公开(公告)日:2022-01-27

    申请号:US17496147

    申请日:2021-10-07

    Abstract: Technologies for secure data transfer include a computing device having a processor, an accelerator, and a security engine, such as a direct memory access (DMA) engine or a memory-mapped I/O (MMIO) engine. The computing device initializes the security engine with an initialization vector and a secret key. During initialization, the security engine pre-fills block cipher pipelines and pre-computes hash subkeys. After initialization, the processor initiates a data transfer, such as a DMA transaction or an MMIO request, between the processor and the accelerator. The security engine performs an authenticated cryptographic operation for the data transfer operation. The authenticated cryptographic operation may be AES-GCM authenticated encryption or authenticated decryption. The security engine may perform encryption or decryption using multiple block cipher pipelines. The security engine may calculate an authentication tag using multiple Galois field multipliers. Other embodiments are described and claimed.

    PROVIDING TRUSTED DEVICES FINE GRAINED ACCESS INTO PRIVATE MEMORY OF TRUSTED EXECUTION ENVIRONMENT

    公开(公告)号:US20240061697A1

    公开(公告)日:2024-02-22

    申请号:US17820950

    申请日:2022-08-19

    Abstract: An apparatus comprises a hardware processor to create an input/output control data structure (IOCS) for a trusted execution environment (TEE), allocate an input/output (I/O) address range comprising a host physical address (HPA) and a plurality of input/output (IO) pages to the input/output control structure, create an entry in the input/output control structure (IOCS) for a set of input/output (IO) pages and a device identifier for a remote device, set a pending bit to a first value which indicates that the remote device is authorized to access the input/output (I/O) address range, and grant the remote device access to the set of input/output pages in the input/output control structure upon verification of an input/output (IO) address range for the remote device.

    TRANSPARENT EXECUTION OF SECRET CONTENT
    4.
    发明申请

    公开(公告)号:US20180004982A1

    公开(公告)日:2018-01-04

    申请号:US15709342

    申请日:2017-09-19

    CPC classification number: G06F21/84 G06F21/123 G06F2221/2125

    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.

    TECHNOLOGIES FOR HARDENING DATA ENCRYPTION WITH SECURE ENCLAVES
    6.
    发明申请
    TECHNOLOGIES FOR HARDENING DATA ENCRYPTION WITH SECURE ENCLAVES 有权
    用于硬化数据加密的技术,具有安全的包装

    公开(公告)号:US20160283747A1

    公开(公告)日:2016-09-29

    申请号:US14667916

    申请日:2015-03-25

    Abstract: Technologies for hardening encryption operations are disclosed. In some embodiments, the technologies harden encryption operations typically performed by kernel mode programs with a secure enclave that may run in user mode and/or in a pre-boot context. In some embodiments, the technologies leverage a shared buffer and a proxy to enable the use of a secure enclave hosted in user mode to perform encryption operations. In additional embodiments, the technologies utilize one or more pre-boot applications to enable the use of a secure enclave in a pre-boot phase, e.g., so as to enable the use of a secure enclave to decrypt data that may be needed to boot a computing device.

    Abstract translation: 公开了加密操作的技术。 在一些实施例中,技术硬化通常由内核模式程序执行的加密操作,其中安全飞地可以以用户模式和/或在引导前的上下文中运行。 在一些实施例中,技术利用共享缓冲器和代理来使得能够使用以用户模式托管的安全飞地来执行加密操作。 在另外的实施例中,这些技术利用一个或多个预引导应用来在预引导阶段使用安全飞行器,例如,以便能够使用安全飞地来解密可能需要引导的数据 计算设备。

    TRANSPARENT EXECUTION OF SECRET CONTENT
    7.
    发明申请
    TRANSPARENT EXECUTION OF SECRET CONTENT 有权
    秘密内容的透明执行

    公开(公告)号:US20160147982A1

    公开(公告)日:2016-05-26

    申请号:US14550959

    申请日:2014-11-22

    CPC classification number: G06F21/84 G06F21/123 G06F2221/2125

    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.

    Abstract translation: 本申请旨在透明地执行秘密内容。 设备可能能够下载可以包括至少一个秘密部分的内容,其中内容的任何秘密部分可以被引导到设备操作系统组件,应用,用户等不可访问的设备中的安全工作场所。该设备 然后可以以允许内容的秘密部分执行而不需要直接访问的方式呈现内容。 例如,设备可以下载内容,并且设备中的引导器模块可以将下载的内容的任何秘密部分引导到安全的工作空间。 在执行内容期间,秘密部分所需的任何输入可以被提供给安全工作空间,然后可以在内容呈现期间使用秘密部分的任何结果输出。

Patent Agency Ranking