LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE

A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and ext...

Full description

Saved in:
Bibliographic Details
Main Authors HABUSHA, Adi, SAIDI, Ali Ghassan
Format Patent
LanguageEnglish
French
German
Published 04.09.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and extract a key identifier from the request. The enforcer device may determine whether to allow the request to access the physical address via the interconnect based on the key identifier and a list of allowed keys stored on the enforcer device. If the enforcer device determines to not allow the request to access, the enforcer device may modify the physical address and/or the key identifier of the request.
Bibliography:Application Number: EP20220847181