Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data encryption based on immutable pointers
M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
Cryptographic computing using encrypted base addresses and used in multi-tenant environments
2020-01-10 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Cryptographic computing using encrypted base addresses and used in multi-tenant environments
2019-12-20 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
Intel F 64 and IA-32 Architectures Software Developer's Manual, vol. 3D: System
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …
Low memory overhead heap management for memory tagging
DM Durham, RJ MASTI - US Patent 11,768,946, 2023 - Google Patents
(57) ABSTRACT A method comprising responsive to a first instruction requesting a memory
heap operation, identifying a data block of a memory heap; accessing a tag history for the …
heap operation, identifying a data block of a memory heap; accessing a tag history for the …
Cryptographic isolation of memory compartments in a computing environment
Technologies disclosed herein provide cryptographic com puting. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …
comprises executing a first instruction of a first software entity to receive a first input operand …
Binding of cryptographic operations to context or speculative execution restrictions
M LeMay, DM Durham, JW Brandt - US Patent 11,250,165, 2022 - Google Patents
(57) ABSTRACT A processor comprising a first register to store a wrap** key, a second
register to store a pointer to a handle stored in a memory coupled to the processor, the …
register to store a pointer to a handle stored in a memory coupled to the processor, the …
Microprocessor pipeline circuitry to support cryptographic computing
In one embodiment, a processor of a cryptographic comput ing system includes data cache
units storing encrypted data and circuitry coupled to the data cache units. The circuitry …
units storing encrypted data and circuitry coupled to the data cache units. The circuitry …
Implicit integrity for cryptographic computing
In one embodiment, a processor includes a memory hierarchy and a core coupled to the
memory hierarchy. The memory hierarchy stores encrypted data, and the core includes …
memory hierarchy. The memory hierarchy stores encrypted data, and the core includes …
Proof-of-work key wrap** with integrated key fragments
MHM Bursell, NP McCallum, PM Jones… - US Patent …, 2022 - Google Patents
Primary Examiner Kristine L Kincaid Assistant Examiner Alexander R Lapian (74) Attorney,
Agent, or Firm-Lowenstein Sandler LLP (57) ABSTRACT The technology disclosed herein …
Agent, or Firm-Lowenstein Sandler LLP (57) ABSTRACT The technology disclosed herein …