LOADING AND VIRTUALIZING CRYPTOGRAPHIC KEYS
    3.
    发明申请
    LOADING AND VIRTUALIZING CRYPTOGRAPHIC KEYS 审中-公开
    装载和虚拟化拼图

    公开(公告)号:WO2017030625A3

    公开(公告)日:2017-04-13

    申请号:PCT/US2016035195

    申请日:2016-06-01

    Applicant: INTEL CORP

    CPC classification number: H04L9/0894

    Abstract: Embodiments of an invention for loading and virtualizing cryptographic keys are disclosed. In one embodiment, a processor includes a local key storage location, a backup key storage location, and execution hardware. Neither the local key storage location nor the backup key storage location is readable by software. The execution hardware is to perform a first operation and a second operation. The first operation includes loading a cryptographic key into the local key storage location. The second operation includes copying the cryptographic key from the local key storage location to the backup key storage location.

    Abstract translation: 公开了用于加载和虚拟化密码密钥的发明的实施例。 在一个实施例中,处理器包括本地密钥存储位置,备份密钥存储位置和执行硬件。 本地密钥存储位置和备份密钥存储位置都不被软件读取。 执行硬件是执行第一操作和第二操作。 第一操作包括将加密密钥加载到本地密钥存储位置。 第二操作包括将加密密钥从本地密钥存储位置复制到备份密钥存储位置。

    LOADING AND VIRTUALIZING CRYPTOGRAPHIC KEYS
    4.
    发明申请
    LOADING AND VIRTUALIZING CRYPTOGRAPHIC KEYS 审中-公开
    加载和虚拟化密码键

    公开(公告)号:WO2017030625A9

    公开(公告)日:2017-03-16

    申请号:PCT/US2016035195

    申请日:2016-06-01

    Applicant: INTEL CORP

    CPC classification number: H04L9/0894

    Abstract: Embodiments of an invention for loading and virtualizing cryptographic keys are disclosed. In one embodiment, a processor includes a local key storage location, a backup key storage location, and execution hardware. Neither the local key storage location nor the backup key storage location is readable by software. The execution hardware is to perform a first operation and a second operation. The first operation includes loading a cryptographic key into the local key storage location. The second operation includes copying the cryptographic key from the local key storage location to the backup key storage location.

    Abstract translation: 公开了用于加载和虚拟化密钥的发明的实施例。 在一个实施例中,处理器包括本地密钥存储位置,备份密钥存储位置和执行硬件。 软件不能读取本地密钥存储位置和备份密钥存储位置。 执行硬件将执行第一操作和第二操作。 第一个操作包括将加密密钥加载到本地密钥存储位置。 第二操作包括将密码密钥从本地密钥存储位置复制到备份密钥存储位置。

    ATTACK PROTECTION FOR VALID GADGET CONTROL TRANSFERS

    公开(公告)号:EP3210149A4

    公开(公告)日:2018-05-23

    申请号:EP15853035

    申请日:2015-08-27

    Applicant: INTEL CORP

    CPC classification number: G06F21/52

    Abstract: In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a second bound value for the stack; a checker logic to determine, prior to an exit point at a conclusion of a function to be executed on the processor, whether a value of a stack pointer is within a range between the first bound value and the second bound value; and a logic to prevent a return to a caller of the function if the stack pointer value is not within the range. Other embodiments are described and claimed.

    SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED STACK PIVOTING
    9.
    发明公开
    SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED STACK PIVOTING 有权
    圣彼得堡维多利亚州VERHHENZEN VERHINDERUNG VON UNERLAUBTEM STAPELSCHWENKEN

    公开(公告)号:EP3005127A4

    公开(公告)日:2017-01-25

    申请号:EP14808307

    申请日:2014-05-30

    Applicant: INTEL CORP

    Abstract: An example processing system may comprise: a lower stack bound register configured to store a first memory address, the first memory address identifying a lower bound of a memory addressable via a stack segment; an upper stack bound register configured to store a second memory address, the second memory address identifying an upper bound of the memory addressable via the stack segment; and a stack bounds checking logic configured to detect unauthorized stack pivoting, by comparing a memory address being accessed via the stack segment with at least one of the first memory address and the second memory address.

    Abstract translation: 示例性处理系统可以包括:下层堆栈绑定寄存器,被配置为存储第一存储器地址,第一存储器地址标识经由堆栈段可寻址的存储器的下限; 上堆栈绑定寄存器,被配置为存储第二存储器地址,所述第二存储器地址通过所述堆栈段识别所述存储器可寻址的上限; 以及堆栈边界检查逻辑,其被配置为通过将经由所述堆栈段访问的存储器地址与所述第一存储器地址和所述第二存储器地址中的至少一个进行比较来检测未授权堆栈的转动。

Patent Agency Ranking