Protection of keys and sensitive data from attack within microprocessor architecture
A processor core that includes a token generator circuit is to execute a first instruction in response to initialization of a software program that requests access to protected data output by a cryptographic operation. To execute the first instruction, the processor core is to: retrieve a key that i...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
05.12.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A processor core that includes a token generator circuit is to execute a first instruction in response to initialization of a software program that requests access to protected data output by a cryptographic operation. To execute the first instruction, the processor core is to: retrieve a key that is to be used by the cryptographic operation; trigger the token generator circuit to generate an authorization token; cryptographically encode the key and the authorization token within a key handle; store the key handle in memory; and embed the authorization token within a cryptographic instruction that is to perform the cryptographic operation. The cryptographic instruction may be associated with a first logical compartment of the software program that is authorized access to the protected data. |
---|---|
Bibliography: | Application Number: US202016998913 |