Data encryption based on immutable pointers
M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
Data type based cryptographic computing
DM Durham, KS Grewal, MD LeMay… - US Patent …, 2023 - Google Patents
US11669625B2 - Data type based cryptographic computing - Google Patents US11669625B2
- Data type based cryptographic computing - Google Patents Data type based cryptographic …
- Data type based cryptographic computing - Google Patents Data type based cryptographic …
Cryptographic isolation of memory compartments in a computing environment
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …
comprises executing a first instruction of a first software entity to receive a first input operand …
Fine-grained stack protection using cryptographic computing
2021-02-10 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
Intel F 64 and IA-32 Architectures Software Developer's Manual, vol. 3D: System
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …
Low memory overhead heap management for memory tagging
DM Durham, RJ MASTI - US Patent 11,768,946, 2023 - Google Patents
A method comprising responsive to a first instruction requesting a memory heap operation,
identifying a data block of a memory heap; accessing a tag history for the data block, the tag …
identifying a data block of a memory heap; accessing a tag history for the data block, the tag …
Pointer based data encryption
An example method comprises storing, in a register, an encoded pointer to a memory
location, where first context information is stored in first bits of the encoded pointer and a …
location, where first context information is stored in first bits of the encoded pointer and a …
Implicit integrity for cryptographic computing
In one embodiment, a processor includes a memory hierarchy and a core coupled to the
memory hierarchy. The memory hierarchy stores encrypted data, and the core includes …
memory hierarchy. The memory hierarchy stores encrypted data, and the core includes …