Data encryption based on immutable pointers

M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …

Data type based cryptographic computing

DM Durham, KS Grewal, MD LeMay… - US Patent …, 2023 - Google Patents
US11669625B2 - Data type based cryptographic computing - Google Patents US11669625B2
- Data type based cryptographic computing - Google Patents Data type based cryptographic …

Cryptographic isolation of memory compartments in a computing environment

ME Kounavis, S Ghosh, S Deutsch, M LeMay… - US Patent …, 2024 - Google Patents
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …

Fine-grained stack protection using cryptographic computing

DM Durham, KS Grewal, MD LeMay, S Sultana… - US Patent …, 2023 - Google Patents
2021-02-10 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …

Cryptographic computing engine for memory load and store units of a microarchitecture pipeline

DM Durham, M LeMay, ME Kounavis, S Ghosh… - US Patent …, 2023 - Google Patents
Intel F 64 and IA-32 Architectures Software Developer's Manual, vol. 3D: System
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …

Low memory overhead heap management for memory tagging

DM Durham, RJ MASTI - US Patent 11,768,946, 2023 - Google Patents
A method comprising responsive to a first instruction requesting a memory heap operation,
identifying a data block of a memory heap; accessing a tag history for the data block, the tag …

Pointer based data encryption

DM Durham, M LeMay, RJ MASTI - US Patent 11,829,488, 2023 - Google Patents
An example method comprises storing, in a register, an encoded pointer to a memory
location, where first context information is stored in first bits of the encoded pointer and a …

Implicit integrity for cryptographic computing

ME Kounavis, S Ghosh, S Deutsch… - US Patent …, 2023 - Google Patents
In one embodiment, a processor includes a memory hierarchy and a core coupled to the
memory hierarchy. The memory hierarchy stores encrypted data, and the core includes …