Intel corporation (20240111879). PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS simplified abstract

From WikiPatents
Jump to navigation Jump to search

PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS

Organization Name

intel corporation

Inventor(s)

Ned Smith of Beaverton OR (US)

Kshitij A. Doshi of Tempe AZ (US)

Francesc Guim Bernat of Barcelona (ES)

Kapil Sood of Washougal WA (US)

Tarun Viswanathan of El Dorado Hills CA (US)

PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111879 titled 'PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONS

Simplified Explanation

The abstract of this patent application describes an interface that selectively provides access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region. The access to the memory region can be specified for various operations such as create, read, update, delete, write, or notify, and different access rights can be associated with different sub-portions of the memory region.

  • The innovation described in the patent application involves an interface that controls access to a memory region based on validation of a certificate received with the work request and the identification of the entity associated with a process requiring access to the memory region.
  • Access to the memory region can be restricted to specific operations such as create, read, update, delete, write, or notify, and different access rights can be assigned to different parts of the memory region.

Potential Applications

The technology described in this patent application could be applied in secure data storage systems, cloud computing environments, and IoT devices where controlled access to memory regions is essential.

Problems Solved

This technology addresses the issue of unauthorized access to sensitive data stored in memory regions by providing a mechanism to selectively grant access based on validation and identification criteria.

Benefits

The benefits of this technology include enhanced security for memory regions, improved data protection, and better control over access rights for different operations within the memory region.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of secure data storage solutions for businesses that handle sensitive information and require strict access control mechanisms.

Possible Prior Art

One possible prior art for this technology could be existing memory access control systems that use cryptographic keys for authentication and authorization purposes.

Unanswered Questions

How does this technology impact system performance?

The patent application does not provide information on the potential impact of this technology on system performance. It would be important to understand if there are any latency issues or processing overhead associated with the selective access control mechanism.

Are there any compatibility issues with existing memory controllers?

The patent application does not address whether this technology is compatible with all types of memory controllers or if there are any specific requirements for integration. Understanding potential compatibility issues with existing systems would be crucial for implementation.


Original Abstract Submitted

examples herein relate to an interface selectively providing access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region. in some examples, providing selective access to a physical address conversion is based on one or more of: validation of a certificate received with the work request and an identifier of the entity being associated with a process with access to the memory region. access to the memory region can be specified to be one or more of: create, read, update, delete, write, or notify. a memory region can be a page or sub-page sized region. different access rights can be associated with different sub-portions of the memory region, wherein the access rights comprise one or more of: create, read, update, delete, write, or notify.