SECURE STORAGE ISOLATION
    86.
    发明专利

    公开(公告)号:SG11202105419PA

    公开(公告)日:2021-06-29

    申请号:SG11202105419P

    申请日:2020-03-02

    Applicant: IBM

    Abstract: An computer-implemented method according to examples includes receiving, by a secure interface control of a computing system, a request by a requestor to access a page in a memory of the computing system. The method further includes, responsive to determining that the requestor is a non-secure requestor and responsive to a secure-storage bit being set, prohibiting access to the page without performing an authorization check. The method further includes, responsive to determining that the requestor is a secure requestor, performing the authorization check.

    COMMUNICATION INTERFACE OF A SECURE INTERFACE CONTROL

    公开(公告)号:SG11202105418YA

    公开(公告)日:2021-06-29

    申请号:SG11202105418Y

    申请日:2020-02-26

    Applicant: IBM

    Abstract: A method is provided. The method is implemented by a communication interface of a secure interface control executing between the secure interface control of a computer and hardware of the computer/In this regard, the communication interface receives an instruction and determines whether the instruction is a millicoded instruction. Further, the communication interface enters a millimode comprising enabling the secure interface control to engage millicode of the hardware through the communication interface based on the instruction being the millicoded instruction. The millicode, then, executes the instruction

    Incremental decryption and integrity verification of a secure operating system image

    公开(公告)号:AU2020236629A1

    公开(公告)日:2021-06-10

    申请号:AU2020236629

    申请日:2020-02-17

    Applicant: IBM

    Abstract: Secure processing within a computing environment is provided by incrementally decrypting a secure operating system image, including receiving, for a page of the secure operating system image, a page address and a tweak value used during encryption of the page. Processing determines that the tweak value has not previously been used during decryption of another page of the secure operating system image, and decrypts memory page content at the page address using an image encryption key and the tweak value to facilitate obtaining a decrypted secure operating system image. Further, integrity of the secure operating system image is verified, and based on verifying integrity of the secure operating system image, execution of the decrypted secure operating system image is started.

    INJECT INTERRUPTS AND EXCEPTIONS INTO SECURE VIRTUAL MACHINE

    公开(公告)号:CA3132760A1

    公开(公告)日:2020-09-17

    申请号:CA3132760

    申请日:2020-02-27

    Applicant: IBM

    Abstract: According to one or more embodiments of the present invention, a computer implemented method includes initiating, by a non-secure entity that is executing on a host server, a secure entity, the non-secure entity prohibited from directly accessing any data of the secure entity. The method further includes injecting, into the secure entity, an interrupt that is generated by the host server. The injecting includes adding, by the non-secure entity, information about the interrupt into a portion of non-secure storage, which is then associated with the secure entity. The injecting further includes injecting, by a secure interface control of the host server, the interrupt into the secure entity.

    SECURE INTERFACE CONTROL SECURE STORAGE HARDWARE TAGGING

    公开(公告)号:CA3132757A1

    公开(公告)日:2020-09-17

    申请号:CA3132757

    申请日:2020-03-06

    Applicant: IBM

    Abstract: A method is provided. A secure interface control in communication with an untrusted entity perform the method. In this regard, the secure interface control implements an initialization instruction to set donated storage as secure. The implementing of the initialization instruction is responsive to an instruction call issued from the untrusted entity.

Patent Agency Ranking