-
1.
公开(公告)号:NL2029297A
公开(公告)日:2022-06-17
申请号:NL2029297
申请日:2021-09-30
Applicant: INTEL CORP
Inventor: RAJESH POORNACHANDRAN , DAVID ZAGE , DAVID PUFFER , RONALD SILVAS , ALEX NAYSHTUT , NED M SMITH , ARAVINDH ANANTARAMAN , JULIEN CARRENO , TOMER LEVY , VIDHYA KRISHNAN , ANKUR SHAH , OMER BEN-SHALOM , ADITYA NAVALE , XIAOYU RUAN , DAVID COWPERTHWAITE , SCOTT JANUS , SIDDHARTHA CHHABRA , VEDVYAS SHANBOGUE
Abstract: Systems, apparatuses and methods may provide for encryption based technology. Data may be encrypted locally with a graphics processor with encryption engines. The graphics processor components may be verified with a root-of-trust and based on collection 5 of claims. The graphics processor may further be able to modify encrypted data from a non- pageable format to a pageable format. The graphics processor may further process data associated with a virtual machine based on a key that is known by the virtual machine and the graphics processor. 10
-
公开(公告)号:IL256658A
公开(公告)日:2021-04-29
申请号:IL25665817
申请日:2017-12-28
Applicant: INTEL CORP , OLEG POGORELIK , GLEN ANDERSON , ALEX NAYSHTUT , CARL MARSHALL
Inventor: OLEG POGORELIK , GLEN ANDERSON , ALEX NAYSHTUT , CARL MARSHALL
Abstract: Private delivery drones and methods are disclosed. An example drone includes a first communication interface to receive a first input from a sender representing a delivery area for a payload, a second communication interface to receive a second input from a recipient representing a visual marker of the recipient, the visual marker unknown to the sender, a drone controller to, when the drone reaches the delivery area, visually identify a location in the delivery area to deliver the payload based on the visual marker, and a carrier to deliver the payload to the location.
-
3.
公开(公告)号:NL2029297B1
公开(公告)日:2022-09-16
申请号:NL2029297
申请日:2021-09-30
Applicant: INTEL CORP
Inventor: RAJESH POORNACHANDRAN , DAVID ZAGE , VEDVYAS SHANBHOGUE , DAVID PUFFER , RONALD SILVAS , ALEX NAYSHTUT , NED M SMITH , ARAVINDH ANANTARAMAN , JULIEN CARRENO , TOMER LEVY , VIDHYA KRISHNAN , ANKUR SHAH , OMER BEN-SHALOM , ADITYA NAVALE , XIAOYU RUAN , DAVID COWPERTHWAITE , SCOTT JANUS , SIDDHARTHA CHHABRA
Abstract: Systems, apparatuses and methods may provide for encryption based technology. Data may be encrypted locally with a graphics processor with encryption engines. The graphics processor components may be verified with a root-of-trust and based on collection 5 of claims. The graphics processor may further be able to modify encrypted data from a non- pageable format to a pageable format. The graphics processor may further process data associated with a virtual machine based on a key that is known by the virtual machine and the graphics processor. 10
-
4.
公开(公告)号:NL2029296B1
公开(公告)日:2022-09-16
申请号:NL2029296
申请日:2021-09-30
Applicant: INTEL CORP
Inventor: ALEX NAYSHTUT , GAURAV KUMAR , OMER BEN-SHALOM , NED M SMITH , RESHMA LAL , PRADEEP PAPPACHAN , RAJESH POORNACHANDRAN , PRASHANT DEWAN
IPC: H04L9/32
Abstract: Methods, apparatuses and system provide for technology that interleaves a plurality of verification commands with a plurality of copy commands in a command buffer, wherein each copy command includes a message authentication code (MAC) derived from a master 5 session key, wherein one or more of the plurality of verification commands corresponds to a copy command in the plurality of copy commands, and wherein a verification command at an end of the command buffer corresponds to contents of the command buffer. The technology may also add a MAC generation command to the command buffer, wherein the MAC generation command references an address of a compute result. 10
-
5.
公开(公告)号:NL2029296A
公开(公告)日:2022-06-17
申请号:NL2029296
申请日:2021-09-30
Applicant: INTEL CORP
Inventor: ALEX NAYSHTUT , GAURAV KUMAR , OMER BEN-SHALOM , NED M SMITH , RESHMA LAL , PRADEEP PAPPACHAN , RAJESH POORNACHANDRAN , PRASHANT DEWAN
IPC: H04L9/32
Abstract: Methods, apparatuses and system provide for technology that interleaves a plurality of verification commands with a plurality of copy commands in a command buffer, wherein each copy command includes a message authentication code (MAC) derived from a master 5 session key, wherein one or more of the plurality of verification commands corresponds to a copy command in the plurality of copy commands, and wherein a verification command at an end of the command buffer corresponds to contents of the command buffer. The technology may also add a MAC generation command to the command buffer, wherein the MAC generation command references an address of a compute result. 10
-
公开(公告)号:IL256658D0
公开(公告)日:2018-02-28
申请号:IL25665817
申请日:2017-12-28
Applicant: INTEL CORP , OLEG POGORELIK , GLEN ANDERSON , ALEX NAYSHTUT , CARL MARSHALL
Inventor: OLEG POGORELIK , GLEN ANDERSON , ALEX NAYSHTUT , CARL MARSHALL
IPC: B64C20060101
Abstract: Private delivery drones and methods are disclosed. An example drone includes a first communication interface to receive a first input from a sender representing a delivery area for a payload, a second communication interface to receive a second input from a recipient representing a visual marker of the recipient, the visual marker unknown to the sender, a drone controller to, when the drone reaches the delivery area, visually identify a location in the delivery area to deliver the payload based on the visual marker, and a carrier to deliver the payload to the location.
-
-
-
-
-