Qualcomm incorporated (20240095375). Mechanism To Secure An Execution Environment In Processor Cores simplified abstract

From WikiPatents
Jump to navigation Jump to search

Mechanism To Secure An Execution Environment In Processor Cores

Organization Name

qualcomm incorporated

Inventor(s)

Sachin Kumar of Bangalore (IN)

Mechanism To Secure An Execution Environment In Processor Cores - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095375 titled 'Mechanism To Secure An Execution Environment In Processor Cores

Simplified Explanation

The patent application describes methods and devices for creating a secure execution environment in computing devices by generating binary executable files with hashed instructions and implementing a secure execution environment by comparing generated hashes with stored hashes.

  • Methods and devices for creating a secure execution environment in computing devices
  • Generating binary executable files with hashed instructions
  • Implementing a secure execution environment by comparing generated hashes with stored hashes

Potential Applications

This technology could be applied in industries where secure execution of code is crucial, such as finance, healthcare, and government sectors.

Problems Solved

This technology addresses the issue of ensuring the secure execution of code in computing devices, preventing unauthorized access or tampering with sensitive information.

Benefits

The technology provides a higher level of security for computing devices, protecting against malicious attacks and unauthorized modifications to code.

Potential Commercial Applications

"Secure Execution Environment Technology for Enhanced Data Protection" could be used in industries that require strict data security measures, such as banking, healthcare, and government agencies.

Possible Prior Art

One possible prior art could be the use of digital signatures to verify the authenticity and integrity of executable files in computing devices.

What are the potential limitations of this technology in real-world applications?

The technology may introduce additional overhead in terms of computational resources and processing time, which could impact the performance of computing devices.

How does this technology compare to existing methods for ensuring code security in computing devices?

This technology offers a more robust and dynamic approach to securing code execution by actively monitoring and verifying instructions in real-time, compared to static methods such as digital signatures or encryption.


Original Abstract Submitted

various embodiments include methods and devices for a secure execution environment in computing devices. embodiments may include generating a binary executable file for execution in the secure execution environment by generating hashes of instructions of a function, inserting a start hash instruction and a stop hash instruction in object code of the function, and generating a binary executable having the function including the start hash instruction and the stop hash instruction. embodiments may include implementing the secure execution environment by generating hashes of instructions of a function in parallel with executing the function, comparing the generated hashes of the instructions of the function to stored hashes of instructions of the function, and issuing an exception indicating to a processor that execution of the function is not secure for any difference between the generated hashes of the instructions of the function and the stored hashes of the instructions of the function.