Data encryption based on immutable pointers
M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
Cryptographic computing using encrypted base addresses and used in multi-tenant environments
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …
encoded pointers in multi-tenant environments. An example method comprises executing …
Binding of cryptographic operations to context or speculative execution restrictions
M LeMay, DM Durham, JW Brandt - US Patent 11,250,165, 2022 - Google Patents
(57) ABSTRACT A processor comprising a first register to store a wrap** key, a second
register to store a pointer to a handle stored in a memory coupled to the processor, the …
register to store a pointer to a handle stored in a memory coupled to the processor, the …
Cryptographic isolation of memory compartments in a computing environment
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …
comprises executing a first instruction of a first software entity to receive a first input operand …
Cryptographic computing using encrypted base addresses and used in multi-tenant environments
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …
encoded pointers in multi-tenant environments. An example method comprises executing …
Cryptographic computing including enhanced cryptographic addresses
MD LeMay, DM Durham… - US Patent …, 2024 - Google Patents
An apparatus comprising a processor unit comprising circuitry to generate, for a first network
host, a request for an object of a second network host, wherein the request comprises an …
host, a request for an object of a second network host, wherein the request comprises an …
Data type based cryptographic computing
DM Durham, KS Grewal, MD LeMay… - US Patent …, 2023 - Google Patents
US11669625B2 - Data type based cryptographic computing - Google Patents US11669625B2
- Data type based cryptographic computing - Google Patents Data type based cryptographic …
- Data type based cryptographic computing - Google Patents Data type based cryptographic …
Protecting against invalid memory references
Techniques facilitating hardware-based memory-error mitigation for heap-objects. In one
example, a system can comprise a process that executes computer executable components …
example, a system can comprise a process that executes computer executable components …
Optimize bound information accesses in buffer protection
A method, system and apparatus for providing bound information accesses in buffer
protection, including providing one-to-one map** between a general-purpose register and …
protection, including providing one-to-one map** between a general-purpose register and …
Dedicated bound information register file for protecting against out-of-bounds memory references
A method, system and apparatus for protecting against out-of-bounds references, including
storing an address of a buffer in a general register and storing bounds information (BI) for …
storing an address of a buffer in a general register and storing bounds information (BI) for …