Data encryption based on immutable pointers

M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …

Cryptographic computing using encrypted base addresses and used in multi-tenant environments

DM Durham, M LeMay, RJ MASTI, G Neiger… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …

Binding of cryptographic operations to context or speculative execution restrictions

M LeMay, DM Durham, JW Brandt - US Patent 11,250,165, 2022 - Google Patents
(57) ABSTRACT A processor comprising a first register to store a wrap** key, a second
register to store a pointer to a handle stored in a memory coupled to the processor, the …

Cryptographic isolation of memory compartments in a computing environment

ME Kounavis, S Ghosh, S Deutsch, M LeMay… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …

Cryptographic computing using encrypted base addresses and used in multi-tenant environments

DM Durham, M LeMay, RJ MASTI, G Neiger… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …

Cryptographic computing including enhanced cryptographic addresses

MD LeMay, DM Durham… - US Patent …, 2024 - Google Patents
An apparatus comprising a processor unit comprising circuitry to generate, for a first network
host, a request for an object of a second network host, wherein the request comprises an …

Data type based cryptographic computing

DM Durham, KS Grewal, MD LeMay… - US Patent …, 2023 - Google Patents
US11669625B2 - Data type based cryptographic computing - Google Patents US11669625B2
- Data type based cryptographic computing - Google Patents Data type based cryptographic …

Protecting against invalid memory references

RH Boivie, T Chen, A Buyuktosunoglu… - US Patent …, 2024 - Google Patents
Techniques facilitating hardware-based memory-error mitigation for heap-objects. In one
example, a system can comprise a process that executes computer executable components …

Optimize bound information accesses in buffer protection

T Chen, RH Boivie, A Buyuktosunoglu - US Patent 11,983,532, 2024 - Google Patents
A method, system and apparatus for providing bound information accesses in buffer
protection, including providing one-to-one map** between a general-purpose register and …

Dedicated bound information register file for protecting against out-of-bounds memory references

T Chen, A Buyuktosunoglu, RH Boivie - US Patent 11,966,331, 2024 - Google Patents
A method, system and apparatus for protecting against out-of-bounds references, including
storing an address of a buffer in a general register and storing bounds information (BI) for …