18391375. INTEGRITY PROTECTED COMMAND BUFFER EXECUTION simplified abstract (Intel Corporation)
Contents
- 1 INTEGRITY PROTECTED COMMAND BUFFER EXECUTION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 INTEGRITY PROTECTED COMMAND BUFFER EXECUTION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
INTEGRITY PROTECTED COMMAND BUFFER EXECUTION
Organization Name
Inventor(s)
Pradeep M. Pappachan of Tualatin OR (US)
Reshma Lal of Portland OR (US)
INTEGRITY PROTECTED COMMAND BUFFER EXECUTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18391375 titled 'INTEGRITY PROTECTED COMMAND BUFFER EXECUTION
Simplified Explanation
Embodiments are directed to providing integrity-protected command buffer execution. An embodiment of an apparatus includes a computer-readable memory comprising one or more command buffers and a processing device communicatively coupled to the computer-readable memory to read, from a command buffer of the computer-readable memory, a first command received from a host device, the first command executable by one or more processing elements on the processing device, the first command comprising an instruction and associated parameter data, compute a first authentication tag using a cryptographic key associated with the host device, the instruction and at least a portion of the parameter data, and authenticate the first command by comparing the first authentication tag with a second authentication tag computed by the host device and associated with the command.
- Command buffer execution with integrity protection
- Computer-readable memory with command buffers
- Processing device reads commands from the memory
- First command received from a host device
- Authentication tag computed using cryptographic key
- Authentication of command by comparing authentication tags
Potential Applications
This technology could be applied in secure communication systems, data processing systems, and embedded systems where the integrity of commands is crucial.
Problems Solved
This technology solves the problem of unauthorized command execution, ensuring that only authenticated commands are processed by the system.
Benefits
The benefits of this technology include enhanced security, protection against malicious commands, and reliable execution of authorized commands.
Potential Commercial Applications
One potential commercial application of this technology is in the development of secure IoT devices, where ensuring the integrity of commands is essential for the proper functioning of the devices.
Possible Prior Art
One possible prior art for this technology could be systems that use cryptographic keys for command authentication in secure communication protocols.
Unanswered Questions
How does this technology impact processing speed and efficiency?
This article does not provide information on the potential impact of this technology on processing speed and efficiency.
What are the potential limitations or vulnerabilities of this technology?
The article does not address any potential limitations or vulnerabilities that may be associated with this technology.
Original Abstract Submitted
Embodiments are directed to providing integrity-protected command buffer execution. An embodiment of an apparatus includes a computer-readable memory comprising one or more command buffers and a processing device communicatively coupled to the computer-readable memory to read, from a command buffer of the computer-readable memory, a first command received from a host device, the first command executable by one or more processing elements on the processing device, the first command comprising an instruction and associated parameter data, compute a first authentication tag using a cryptographic key associated with the host device, the instruction and at least a portion of the parameter data, and authenticate the first command by comparing the first authentication tag with a second authentication tag computed by the host device and associated with the command.