Data encryption based on immutable pointers

M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …

Cryptographic computing using encrypted base addresses and used in multi-tenant environments

DM Durham, M LeMay, RJ MASTI, G Neiger… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …

Binding of cryptographic operations to context or speculative execution restrictions

M LeMay, DM Durham, JW Brandt - US Patent 11,250,165, 2022 - Google Patents
(57) ABSTRACT A processor comprising a first register to store a wrap** key, a second
register to store a pointer to a handle stored in a memory coupled to the processor, the …

Cryptographic isolation of memory compartments in a computing environment

ME Kounavis, S Ghosh, S Deutsch, M LeMay… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …

Cryptographic computing using encrypted base addresses and used in multi-tenant environments

DM Durham, M LeMay, RJ MASTI, G Neiger… - US Patent …, 2022 - Google Patents
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …

Data type based cryptographic computing

DM Durham, KS Grewal, MD LeMay… - US Patent …, 2023 - Google Patents
US11669625B2 - Data type based cryptographic computing - Google Patents US11669625B2
- Data type based cryptographic computing - Google Patents Data type based cryptographic …

Cryptographic isolation of memory compartments in a computing environment

ME Kounavis, S Ghosh, S Deutsch, M LeMay… - US Patent …, 2024 - Google Patents
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …

Fine-grained stack protection using cryptographic computing

DM Durham, KS Grewal, MD LeMay, S Sultana… - US Patent …, 2023 - Google Patents
2021-02-10 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …

Cryptographic computing engine for memory load and store units of a microarchitecture pipeline

DM Durham, M LeMay, ME Kounavis, S Ghosh… - US Patent …, 2023 - Google Patents
Intel F 64 and IA-32 Architectures Software Developer's Manual, vol. 3D: System
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …

Management of keys for use in cryptographic computing

ME Kounavis, S Ghosh, S Deutsch… - US Patent …, 2022 - Google Patents
A method comprising executing, by a core of a processor, a first instruction requesting
access to a parameter associated with data for storage in a main memory coupled to the …