17942466. TECHNIQUES FOR A TRUSTED EXECUTION ENVIRONMENT AT A COMPUTE SERVER TO USE A REMOTE ACCELERATOR simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

TECHNIQUES FOR A TRUSTED EXECUTION ENVIRONMENT AT A COMPUTE SERVER TO USE A REMOTE ACCELERATOR

Organization Name

Intel Corporation

Inventor(s)

Utkarsh Y. Kakaiya of Folsom CA (US)

TECHNIQUES FOR A TRUSTED EXECUTION ENVIRONMENT AT A COMPUTE SERVER TO USE A REMOTE ACCELERATOR - A simplified explanation of the abstract

This abstract first appeared for US patent application 17942466 titled 'TECHNIQUES FOR A TRUSTED EXECUTION ENVIRONMENT AT A COMPUTE SERVER TO USE A REMOTE ACCELERATOR

Simplified Explanation

The patent application describes techniques for a trusted execution environment (TEE) at a compute server to request a service to be performed by an accelerator located at a service server. The TEE authenticates the remote accelerator to establish secure communication sessions for data decryption, transformation, and re-encryption. Additionally, the TEE authenticates a service TEE at the service server and the accelerator to collaboratively decrypt, transform, and re-encrypt data.

  • Trusted Execution Environment (TEE) at compute server requests service from accelerator at service server
  • TEE authenticates remote accelerator for secure communication sessions
  • Accelerator decrypts data, performs transformation, and re-encrypts transformed data
  • TEE authenticates service TEE at service server and accelerator for collaborative data processing

Potential Applications

This technology could be applied in secure data processing, cloud computing, and remote service requests.

Problems Solved

This technology solves the problem of secure communication and data processing between compute servers, accelerators, and service servers.

Benefits

The benefits of this technology include enhanced data security, efficient data processing, and improved collaboration between different components in a computing environment.

Potential Commercial Applications

  • Secure Data Processing in Cloud Computing
  • Remote Service Requests with Enhanced Security

Unanswered Questions

How does this technology impact data privacy regulations?

This technology ensures secure data processing, but it is important to consider how it aligns with data privacy regulations and compliance requirements.

What are the potential limitations of this technology in real-world implementations?

While the patent application describes the technology in detail, it is essential to understand any limitations or challenges that may arise during the actual implementation of these techniques.


Original Abstract Submitted

Examples include techniques for a trusted execution environment (TEE) at a compute server to request a service to be performed by an accelerator that is located at or with a service server. Examples are described of the TEE at the compute server authenticating the remote accelerator to enable establishment of one or more secure communication sessions for the accelerator to decrypt encrypted data, perform a transformation on the decrypted data and then re-encrypt the transformed data. Examples are also described of the TEE at the compute server authenticating a service TEE at the service server as well as the accelerator to enable the service TEE and the accelerator to collaboratively decrypt encrypted data, perform a transformation on the decrypted data and then re-encrypt the transformed data.