18391375. INTEGRITY PROTECTED COMMAND BUFFER EXECUTION simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

INTEGRITY PROTECTED COMMAND BUFFER EXECUTION

Organization Name

Intel Corporation

Inventor(s)

Pradeep M. Pappachan of Tualatin OR (US)

Reshma Lal of Portland OR (US)

INTEGRITY PROTECTED COMMAND BUFFER EXECUTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18391375 titled 'INTEGRITY PROTECTED COMMAND BUFFER EXECUTION

Simplified Explanation

Embodiments are directed to providing integrity-protected command buffer execution. An embodiment of an apparatus includes a computer-readable memory comprising one or more command buffers and a processing device communicatively coupled to the computer-readable memory to read, from a command buffer of the computer-readable memory, a first command received from a host device, the first command executable by one or more processing elements on the processing device, the first command comprising an instruction and associated parameter data, compute a first authentication tag using a cryptographic key associated with the host device, the instruction and at least a portion of the parameter data, and authenticate the first command by comparing the first authentication tag with a second authentication tag computed by the host device and associated with the command.

  • Command buffer execution with integrity protection
  • Computer-readable memory with command buffers
  • Processing device reads commands from the memory
  • First command received from a host device
  • Authentication tag computed using cryptographic key
  • Authentication of command by comparing authentication tags

Potential Applications

This technology could be applied in secure communication systems, data processing systems, and embedded systems where the integrity of commands is crucial.

Problems Solved

This technology solves the problem of unauthorized command execution, ensuring that only authenticated commands are processed by the system.

Benefits

The benefits of this technology include enhanced security, protection against malicious commands, and reliable execution of authorized commands.

Potential Commercial Applications

One potential commercial application of this technology is in the development of secure IoT devices, where ensuring the integrity of commands is essential for the proper functioning of the devices.

Possible Prior Art

One possible prior art for this technology could be systems that use cryptographic keys for command authentication in secure communication protocols.

Unanswered Questions

How does this technology impact processing speed and efficiency?

This article does not provide information on the potential impact of this technology on processing speed and efficiency.

What are the potential limitations or vulnerabilities of this technology?

The article does not address any potential limitations or vulnerabilities that may be associated with this technology.


Original Abstract Submitted

Embodiments are directed to providing integrity-protected command buffer execution. An embodiment of an apparatus includes a computer-readable memory comprising one or more command buffers and a processing device communicatively coupled to the computer-readable memory to read, from a command buffer of the computer-readable memory, a first command received from a host device, the first command executable by one or more processing elements on the processing device, the first command comprising an instruction and associated parameter data, compute a first authentication tag using a cryptographic key associated with the host device, the instruction and at least a portion of the parameter data, and authenticate the first command by comparing the first authentication tag with a second authentication tag computed by the host device and associated with the command.