18370137. PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS

Organization Name

Intel Corporation

Inventor(s)

Ned Smith of Beaverton OR (US)

Kshitij A. Doshi of Tempe AZ (US)

Francesc Guim Bernat of Barcelona (ES)

Kapil Sood of Washougal WA (US)

Tarun Viswanathan of El Dorado Hills CA (US)

PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18370137 titled 'PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS

Simplified Explanation

The patent application describes an interface that selectively provides access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and a cryptographic key for use by a memory controller to access the memory region. Access to the memory region can be specified for actions such as create, read, update, delete, write, or notify, and different access rights can be associated with different sub-portions of the memory region.

  • Validation of a certificate received with the work request and an identifier of the entity are used to associate access to the memory region with a specific process.
  • Access rights can include create, read, update, delete, write, or notify for different sub-portions of the memory region.

Potential Applications

This technology could be applied in secure data storage systems, cloud computing environments, and network security solutions.

Problems Solved

This technology helps prevent unauthorized access to sensitive data stored in memory regions and ensures that only authorized processes can interact with specific portions of the memory.

Benefits

The selective access control mechanism enhances data security, improves system performance by efficiently managing memory access, and provides flexibility in defining access rights for different entities.

Potential Commercial Applications

1. Secure data storage solutions for businesses handling sensitive information. 2. Cloud computing platforms requiring strict access control measures. 3. Network security products for monitoring and managing memory access.

Possible Prior Art

One possible prior art could be memory access control mechanisms used in operating systems or database management systems to restrict access to specific memory locations based on user permissions.

Unanswered Questions

How does this technology impact system performance?

The article mentions that the technology can improve system performance, but it does not provide specific details on how this is achieved. Further information on the performance benefits would be helpful.

What are the potential challenges in implementing this technology?

While the benefits of the technology are highlighted, the article does not address any potential challenges or limitations that may arise during the implementation process. Understanding these challenges would provide a more comprehensive view of the technology's practical implications.


Original Abstract Submitted

Examples herein relate to an interface selectively providing access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region. In some examples, providing selective access to a physical address conversion is based on one or more of: validation of a certificate received with the work request and an identifier of the entity being associated with a process with access to the memory region. Access to the memory region can be specified to be one or more of: create, read, update, delete, write, or notify. A memory region can be a page or sub-page sized region. Different access rights can be associated with different sub-portions of the memory region, wherein the access rights comprise one or more of: create, read, update, delete, write, or notify.