Data encryption based on immutable pointers
M LeMay, DM Durham - US Patent 11,620,391, 2023 - Google Patents
2023-05-26 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
CORRECTIVE ASSIGNMENT TO CORRECT THE THE APPLICATION NUMBER …
Cryptographic computing using encrypted base addresses and used in multi-tenant environments
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …
encoded pointers in multi-tenant environments. An example method comprises executing …
Binding of cryptographic operations to context or speculative execution restrictions
M LeMay, DM Durham, JW Brandt - US Patent 11,250,165, 2022 - Google Patents
(57) ABSTRACT A processor comprising a first register to store a wrap** key, a second
register to store a pointer to a handle stored in a memory coupled to the processor, the …
register to store a pointer to a handle stored in a memory coupled to the processor, the …
Cryptographic isolation of memory compartments in a computing environment
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …
comprises executing a first instruction of a first software entity to receive a first input operand …
Cryptographic computing using encrypted base addresses and used in multi-tenant environments
Technologies disclosed herein provide cryptographic computing with cryptographically
encoded pointers in multi-tenant environments. An example method comprises executing …
encoded pointers in multi-tenant environments. An example method comprises executing …
Data type based cryptographic computing
DM Durham, KS Grewal, MD LeMay… - US Patent …, 2023 - Google Patents
US11669625B2 - Data type based cryptographic computing - Google Patents US11669625B2
- Data type based cryptographic computing - Google Patents Data type based cryptographic …
- Data type based cryptographic computing - Google Patents Data type based cryptographic …
Cryptographic isolation of memory compartments in a computing environment
Technologies disclosed herein provide cryptographic computing. An example method
comprises executing a first instruction of a first software entity to receive a first input operand …
comprises executing a first instruction of a first software entity to receive a first input operand …
Fine-grained stack protection using cryptographic computing
2021-02-10 Assigned to INTEL CORPORATION reassignment INTEL CORPORATION
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
Intel F 64 and IA-32 Architectures Software Developer's Manual, vol. 3D: System
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …
Programming Guide, Part 4, Sep. 2016, 224 pages, retrieved from https://www. intel …
Management of keys for use in cryptographic computing
A method comprising executing, by a core of a processor, a first instruction requesting
access to a parameter associated with data for storage in a main memory coupled to the …
access to a parameter associated with data for storage in a main memory coupled to the …