18370137. PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS simplified abstract (Intel Corporation)
Contents
- 1 PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does this technology impact system performance?
- 1.11 What are the potential challenges in implementing this technology?
- 1.12 Original Abstract Submitted
PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS
Organization Name
Inventor(s)
Ned Smith of Beaverton OR (US)
Kshitij A. Doshi of Tempe AZ (US)
Francesc Guim Bernat of Barcelona (ES)
Kapil Sood of Washougal WA (US)
Tarun Viswanathan of El Dorado Hills CA (US)
PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18370137 titled 'PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS
Simplified Explanation
The patent application describes an interface that selectively provides access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and a cryptographic key for use by a memory controller to access the memory region. Access to the memory region can be specified for actions such as create, read, update, delete, write, or notify, and different access rights can be associated with different sub-portions of the memory region.
- Validation of a certificate received with the work request and an identifier of the entity are used to associate access to the memory region with a specific process.
- Access rights can include create, read, update, delete, write, or notify for different sub-portions of the memory region.
Potential Applications
This technology could be applied in secure data storage systems, cloud computing environments, and network security solutions.
Problems Solved
This technology helps prevent unauthorized access to sensitive data stored in memory regions and ensures that only authorized processes can interact with specific portions of the memory.
Benefits
The selective access control mechanism enhances data security, improves system performance by efficiently managing memory access, and provides flexibility in defining access rights for different entities.
Potential Commercial Applications
1. Secure data storage solutions for businesses handling sensitive information. 2. Cloud computing platforms requiring strict access control measures. 3. Network security products for monitoring and managing memory access.
Possible Prior Art
One possible prior art could be memory access control mechanisms used in operating systems or database management systems to restrict access to specific memory locations based on user permissions.
Unanswered Questions
How does this technology impact system performance?
The article mentions that the technology can improve system performance, but it does not provide specific details on how this is achieved. Further information on the performance benefits would be helpful.
What are the potential challenges in implementing this technology?
While the benefits of the technology are highlighted, the article does not address any potential challenges or limitations that may arise during the implementation process. Understanding these challenges would provide a more comprehensive view of the technology's practical implications.
Original Abstract Submitted
Examples herein relate to an interface selectively providing access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region. In some examples, providing selective access to a physical address conversion is based on one or more of: validation of a certificate received with the work request and an identifier of the entity being associated with a process with access to the memory region. Access to the memory region can be specified to be one or more of: create, read, update, delete, write, or notify. A memory region can be a page or sub-page sized region. Different access rights can be associated with different sub-portions of the memory region, wherein the access rights comprise one or more of: create, read, update, delete, write, or notify.