SECURE ERROR CORRECTING CODE (ECC) TRUST EXECUTION ENVIRONMENT (TEE) CONFIGURATION METADATA ENCODING

    公开(公告)号:US20240311234A1

    公开(公告)日:2024-09-19

    申请号:US18676811

    申请日:2024-05-29

    申请人: Intel Corporation

    IPC分类号: G06F11/10 H04L9/08

    CPC分类号: G06F11/1044 H04L9/0816

    摘要: The technology disclosed herein includes a memory to store a plurality of pages, a page of the plurality of pages configured as one of a trusted execution environment (TEE) configuration and a non-TEE configuration, and a memory controller to attempt to access the page using a memory address and the TEE configuration and generate a first error correcting code (ECC); and when data for the first ECC is at least one of correct and correctable by ECC for the attempt to access the page using the TEE configuration, attempt to access the page using the memory address and the non-TEE configuration and generate a second ECC, and when data the second ECC is at least one of correct and correctable by ECC for the attempt to access the page using the non-TEE configuration, store the memory address as an unknown cacheline address.

    Replay protection for memory based on key refresh

    公开(公告)号:US11019098B2

    公开(公告)日:2021-05-25

    申请号:US16023941

    申请日:2018-06-29

    申请人: Intel Corporation

    摘要: The present disclosure is directed to systems and methods for providing protection against replay attacks on memory, by refreshing or updating encryption keys. The disclosed replay protected computing system may employ encryption refresh of memory so that unauthorized copies of data are usable for a limited amount of time (e.g., 500 milliseconds or less). The replay protected computing system initially encrypts protected data prior to storage in memory. After a predetermined time or after a number of memory accesses have occurred, the replay protected computing system decrypts the data with the existing key and re-encrypts data with a new key. Unauthorized copies of data (such as those made by an adversary system/program) are not refreshed with subsequent new keys. When an adversary program attempts to use the unauthorized copies of data, the unauthorized copies of data are decrypted with the incorrect keys, which renders the decrypted data unintelligible.

    Technology For Managing Memory Tags
    5.
    发明申请

    公开(公告)号:US20190196977A1

    公开(公告)日:2019-06-27

    申请号:US16288844

    申请日:2019-02-28

    申请人: Intel Corporation

    摘要: A data processing system includes support for sub-page granular memory tags. The data processing system comprises at least one core, a memory controller responsive to the core, random access memory (RAM) responsive to the memory controller, and a memory protection module in the memory controller. The memory protection module enables the memory controller to use a memory tag value supplied as part of a memory address to protect data stored at a location that is based on a location value supplied as another part of the memory address. The data processing system also comprises an operating system (OS) which, when executed in the data processing system, manages swapping a page of data out of the RAM to non-volatile storage (NVS) by using a memory tag map (MTM) to apply memory tags to respective subpages within the page being swapped out. Other embodiments are described and claimed.

    Method and apparatus for secure network enclaves

    公开(公告)号:US10079813B2

    公开(公告)日:2018-09-18

    申请号:US15085114

    申请日:2016-03-30

    申请人: Intel Corporation

    IPC分类号: H04L9/32 H04L29/06 H04L9/08

    摘要: Methods and apparatus are disclosed to provide for security within a network enclave. In one embodiment authentication logic initiates authentication with a central network authority. Packet processing logic receives a key and an identifier from the central network authority. Security protocol logic then establishes a client-server security association through a communication that includes a client identifier and an encrypted portion and/or an authorization signature, wherein a client authorization key allocated by the central network authority can be reproduced by a server, other than said central network authority, from the client identifier and a derivation key provided to the server by the central network authority to decrypt the encrypted portion and/or to validate the communication using the authorization signature. The server may also provide the client with new session keys and/or new client session identifiers using server-generated derivation keys if desired, protecting these with the client authorization key.

    Algebraic and deterministic memory authentication and correction with coupled cacheline metadata

    公开(公告)号:US11995006B2

    公开(公告)日:2024-05-28

    申请号:US17559258

    申请日:2021-12-22

    申请人: Intel Corporation

    摘要: A method comprises generating, for a cacheline, a first tag and a second tag, the first tag and the second tag generated as a function of user data stored and metadata in the cacheline stored in a first memory device, and a multiplication parameter derived from a secret key, storing the user data, the metadata, the first tag and the second tag in the first cacheline of the first memory device; generating, for the cacheline, a third tag and a fourth tag, the third tag and the fourth tag generated as a function of the user data stored and metadata in the cacheline stored in a second memory device, and the multiplication parameter; storing the user data, the metadata, the third tag and the fourth tag in the corresponding cache line of the second memory device; receiving, from a requesting device, a read operation directed to the cacheline; and using the first tag, the second tag, the third tag, and the fourth tag to determine whether a read error occurred during the read operation.

    SECURITY-ORIENTED COMPRESSION
    9.
    发明申请

    公开(公告)号:US20190045030A1

    公开(公告)日:2019-02-07

    申请号:US15839194

    申请日:2017-12-12

    申请人: Intel Corporation

    IPC分类号: H04L29/06 H04L29/12 H04W12/06

    摘要: A method of data nibble-histogram compression can include determining a first amount of space freed by compressing the input data using a first compression technique, determining a second amount of space freed by compressing the input data using a second, different compression technique, compressing the input data using the compression technique of the first and second compression techniques determined to free up more space to create compressed input data, and inserting into the compressed input data, security data including one of a message authentication control (MAC) and an inventory control tag (ICT).

    REPLAY PROTECTION FOR MEMORY BASED ON KEY REFRESH

    公开(公告)号:US20190044973A1

    公开(公告)日:2019-02-07

    申请号:US16023941

    申请日:2018-06-29

    申请人: Intel Corporation

    IPC分类号: H04L29/06 H04L9/08 H04L9/14

    摘要: The present disclosure is directed to systems and methods for providing protection against replay attacks on memory, by refreshing or updating encryption keys. The disclosed replay protected computing system may employ encryption refresh of memory so that unauthorized copies of data are usable for a limited amount of time (e.g., 500 milliseconds or less). The replay protected computing system initially encrypts protected data prior to storage in memory. After a predetermined time or after a number of memory accesses have occurred, the replay protected computing system decrypts the data with the existing key and re-encrypts data with a new key. Unauthorized copies of data (such as those made by an adversary system/program) are not refreshed with subsequent new keys. When an adversary program attempts to use the unauthorized copies of data, the unauthorized copies of data are decrypted with the incorrect keys, which renders the decrypted data unintelligible.