17457446. OPERATING A SECURE CODE SEGMENT ON A PROCESSOR CORE OF A PROCESSING UNIT simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

OPERATING A SECURE CODE SEGMENT ON A PROCESSOR CORE OF A PROCESSING UNIT

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Cedric Lichtenau of Stuttgart (DE)

Jakob Christopher Lang of Walddorfhaslach (DE)

Eberhard Pasch of Tuebingen (DE)

Christian Borntraeger of Stuttgart (DE)

OPERATING A SECURE CODE SEGMENT ON A PROCESSOR CORE OF A PROCESSING UNIT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17457446 titled 'OPERATING A SECURE CODE SEGMENT ON A PROCESSOR CORE OF A PROCESSING UNIT

Simplified Explanation

The abstract describes a computer-implemented method for secure execution of code on a processor core. Here are the key points:

  • The method allows for exclusive secure execution of a specific code segment on a processor core.
  • The processor core is set to exclusive secure execution mode for the secure code segment.
  • The secure code segment is executed on the processor core without interruptions.
  • After execution, the architected state and non-architected state of the processor core are wiped.
  • The processor core is then set back to the first execution mode for other program code.

Potential Applications:

  • Secure execution of sensitive code segments in applications like encryption, authentication, or secure communication protocols.
  • Protection of intellectual property by ensuring secure execution of proprietary algorithms or code.
  • Secure execution of code in virtualized environments to prevent unauthorized access or tampering.

Problems Solved:

  • Ensures exclusive and uninterrupted execution of sensitive code segments, reducing the risk of unauthorized access or tampering.
  • Provides a secure environment for executing code, protecting against potential attacks or exploits.
  • Allows for the protection of intellectual property by preventing unauthorized access to proprietary code.

Benefits:

  • Enhanced security by isolating and protecting sensitive code segments.
  • Reduced risk of unauthorized access or tampering of code.
  • Increased trust in the execution environment, particularly in virtualized or shared computing environments.
  • Protection of intellectual property and proprietary algorithms.


Original Abstract Submitted

A computer-implemented method, a computer system and a computer program product operate a secure code segment on a processor core of a processing unit, wherein the processing unit is configured with at least one processor core. The method comprises requesting exclusive secure execution of a secure code segment of the program code on the at least one processor core. The method also comprises setting the at least one processor core to exclusive secure execution for the secure code segment. The method further comprises executing the secure code segment on the at least one processor core uninterruptably. In addition, the method comprises wiping an architected state and a non-architected state of a physical processor core from the at least one processor core. Lastly, the method comprises setting the at least one processor core to the first execution mode for program code on the at least one processor core.