Data encryption based on immutable pointers

M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …

Cryptographic computing using encrypted base addresses and used in multi-tenant environments

DM Durham, M LeMay, RJ MASTI, G Neiger… - US Patent …, 2022 - Google Patents
2020-01-10 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …

Cryptographic computing using encrypted base addresses and used in multi-tenant environments

DM Durham, M LeMay, RJ MASTI, G Neiger… - US Patent …, 2022 - Google Patents
2019-12-20 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …

Cryptographic computing engine for memory load and store units of a microarchitecture pipeline

DM Durham, M LeMay, ME Kounavis, S Ghosh… - US Patent …, 2023 - Google Patents
Intel F 64 and IA-32 Architectures Software Developer's Manual, vol. 3D: System
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …

Low memory overhead heap management for memory tagging

DM Durham, RJ MASTI - US Patent 11,768,946, 2023 - Google Patents
(57) ABSTRACT A method comprising responsive to a first instruction requesting a memory
heap operation, identifying a data block of a memory heap; accessing a tag history for the …

Cryptographic isolation of memory compartments in a computing environment

ME Kounavis, S Ghosh, S Deutsch, M LeMay… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic com puting. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …

Binding of cryptographic operations to context or speculative execution restrictions

M LeMay, DM Durham, JW Brandt - US Patent 11,250,165, 2022 - Google Patents
(57) ABSTRACT A processor comprising a first register to store a wrap** key, a second
register to store a pointer to a handle stored in a memory coupled to the processor, the …

Microprocessor pipeline circuitry to support cryptographic computing

ME Kounavis, S Ghosh, S Deutsch, M LeMay… - US Patent …, 2022 - Google Patents
In one embodiment, a processor of a cryptographic comput ing system includes data cache
units storing encrypted data and circuitry coupled to the data cache units. The circuitry …

Implicit integrity for cryptographic computing

ME Kounavis, S Ghosh, S Deutsch… - US Patent …, 2023 - Google Patents
In one embodiment, a processor includes a memory hierarchy and a core coupled to the
memory hierarchy. The memory hierarchy stores encrypted data, and the core includes …

Proof-of-work key wrap** with integrated key fragments

MHM Bursell, NP McCallum, PM Jones… - US Patent …, 2022 - Google Patents
Primary Examiner Kristine L Kincaid Assistant Examiner Alexander R Lapian (74) Attorney,
Agent, or Firm-Lowenstein Sandler LLP (57) ABSTRACT The technology disclosed herein …