LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE
A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and ext...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English French German |
Published |
04.09.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and extract a key identifier from the request. The enforcer device may determine whether to allow the request to access the physical address via the interconnect based on the key identifier and a list of allowed keys stored on the enforcer device. If the enforcer device determines to not allow the request to access, the enforcer device may modify the physical address and/or the key identifier of the request. |
---|---|
Bibliography: | Application Number: EP20220847181 |