-
公开(公告)号:SG11202105419PA
公开(公告)日:2021-06-29
申请号:SG11202105419P
申请日:2020-03-02
Applicant: IBM
Inventor: BRADBURY JONATHAN , HELLER LISA , BACHER UTZ , BUSABA FADI
Abstract: An computer-implemented method according to examples includes receiving, by a secure interface control of a computing system, a request by a requestor to access a page in a memory of the computing system. The method further includes, responsive to determining that the requestor is a non-secure requestor and responsive to a secure-storage bit being set, prohibiting access to the page without performing an authorization check. The method further includes, responsive to determining that the requestor is a secure requestor, performing the authorization check.
-
公开(公告)号:SG11202105418YA
公开(公告)日:2021-06-29
申请号:SG11202105418Y
申请日:2020-02-26
Applicant: IBM
Inventor: HELLER LISA , BUSABA FADI , BRADBURY JONATHAN , BORNTRAEGER CHRISTIAN , BACHER UTZ , BUENDGEN REINHARD
Abstract: A method is provided. The method is implemented by a communication interface of a secure interface control executing between the secure interface control of a computer and hardware of the computer/In this regard, the communication interface receives an instruction and determines whether the instruction is a millicoded instruction. Further, the communication interface enters a millimode comprising enabling the secure interface control to engage millicode of the hardware through the communication interface based on the instruction being the millicoded instruction. The millicode, then, executes the instruction
-
公开(公告)号:AU2020236629A1
公开(公告)日:2021-06-10
申请号:AU2020236629
申请日:2020-02-17
Applicant: IBM
Inventor: BUENDGEN REINHARD , BORNTRAEGER CHRISTIAN , BRADBURY JONATHAN , BUSABA FADI , HELLER LISA , MIHAJLOVSKI VIKTOR
Abstract: Secure processing within a computing environment is provided by incrementally decrypting a secure operating system image, including receiving, for a page of the secure operating system image, a page address and a tweak value used during encryption of the page. Processing determines that the tweak value has not previously been used during decryption of another page of the secure operating system image, and decrypts memory page content at the page address using an image encryption key and the tweak value to facilitate obtaining a decrypted secure operating system image. Further, integrity of the secure operating system image is verified, and based on verifying integrity of the secure operating system image, execution of the decrypted secure operating system image is started.
-
公开(公告)号:AU2020233906A1
公开(公告)日:2021-06-10
申请号:AU2020233906
申请日:2020-02-27
Applicant: IBM
Inventor: BUENDGEN REINHARD , BRADBURY JONATHAN
Abstract: A method, computer program product, and a system where a secure interface control determines functionality of a secure guest based on metadata. The secure interface control ("SC") obtains metadata linked to an image of a secure guest to be started by an owner and managed by the hypervisor, where the metadata comprises control(s) that indicate whether a secure guest generated with the image is permitted to obtain a response to a particular request. The SC intercepts, from the secure guest generated with the image, during runtime, a request. The SC determines, based on the control(s), if the secure guest is permitted to obtain a response to the request. If permitted, the SC commences fulfillment of the request, within the computing system. If not permitted, the SC ignores the request.
-
公开(公告)号:AU2020230012A1
公开(公告)日:2021-06-03
申请号:AU2020230012
申请日:2020-02-27
Applicant: IBM
Inventor: KURUP GIRISH GOPALA , KLEIN MATTHIAS , SOFIA ANTHONY THOMAS , BRADBURY JONATHAN , MISHRA ASHUTOSH , JACOBI CHRISTIAN , BHATTACHARJEE DEEPANKAR
IPC: H03M7/40
Abstract: An aspect includes a system architecture that includes a processing unit, an accelerator, a main source buffer, a main target buffer, and a memory block. The main source buffer stores a first part of a source symbol received from an external source. The main target buffer stores an output symbol received from the accelerator. The memory block includes an overflow source buffer that stores the first part of the source symbol received from the main source buffer. The accelerator fetches the first part of the source symbol stored in the overflow source buffer and a second part of the source symbol stored in the main source buffer, and converts the first and second parts of the source symbol together into the output symbol. The second part of the source symbol includes a part of the source symbol not included in the first part of the source symbol.
-
公开(公告)号:AU2019376835A1
公开(公告)日:2021-04-22
申请号:AU2019376835
申请日:2019-11-05
Applicant: IBM
Inventor: GIAMEI BRUCE CONRAD , RECKTENWALD MARTIN , SCHMIDT DONALD WILLIAM , SLEGEL TIMOTHY , PURANIK ADITYA NITIN , FARRELL MARK , JACOBI CHRISTIAN , BRADBURY JONATHAN , ZOELLIN CHRISTIAN GERHARD
Abstract: Saving and restoring machine state between multiple executions of an instruction. A determination is made that processing of an operation of an instruction executing on a processor has been interrupted prior to completion. Based on determining that the processing of the operation has been interrupted, current metadata of the processor is extracted. The metadata is stored in a location associated with the instruction and used to re-execute the instruction to resume forward processing of the instruction from where it was interrupted.
-
公开(公告)号:LT3526927T
公开(公告)日:2021-03-25
申请号:LT17780697
申请日:2017-10-02
Applicant: IBM
-
公开(公告)号:CA3132760A1
公开(公告)日:2020-09-17
申请号:CA3132760
申请日:2020-02-27
Applicant: IBM
Inventor: IMBRENDA CLAUDIO , BUSABA FADI , HELLER LISA , BRADBURY JONATHAN
IPC: G06F9/455
Abstract: According to one or more embodiments of the present invention, a computer implemented method includes initiating, by a non-secure entity that is executing on a host server, a secure entity, the non-secure entity prohibited from directly accessing any data of the secure entity. The method further includes injecting, into the secure entity, an interrupt that is generated by the host server. The injecting includes adding, by the non-secure entity, information about the interrupt into a portion of non-secure storage, which is then associated with the secure entity. The injecting further includes injecting, by a secure interface control of the host server, the interrupt into the secure entity.
-
公开(公告)号:CA3132757A1
公开(公告)日:2020-09-17
申请号:CA3132757
申请日:2020-03-06
Applicant: IBM
Inventor: HELLER LISA , BUSABA FADI , BRADBURY JONATHAN
IPC: G06F12/14
Abstract: A method is provided. A secure interface control in communication with an untrusted entity perform the method. In this regard, the secure interface control implements an initialization instruction to set donated storage as secure. The implementing of the initialization instruction is responsive to an instruction call issued from the untrusted entity.
-
公开(公告)号:CA3132753A1
公开(公告)日:2020-09-17
申请号:CA3132753
申请日:2020-02-26
Applicant: IBM
Inventor: HELLER LISA , BUSABA FADI , BRADBURY JONATHAN , BORNTRAEGER CHRISTIAN , BACHER UTZ , BUENDGEN REINHARD
Abstract: A method is provided. The method is implemented by a communication interface of a secure interface control executing between the secure interface control of a computer and hardware of the computer/ In this regard, the communication interface receives an instruction and determines whether the instruction is a millicoded instruction. Further, the communication interface enters a millimode comprising enabling the secure interface control to engage millicode of the hardware through the communication interface based on the instruction being the millicoded instruction. The millicode, then, executes the instruction
-
-
-
-
-
-
-
-
-