US Patent Application 17716823. CONFIDENTIAL COMPUTE ARCHITECTURE INTEGRATED WITH DIRECT SWAP CACHING simplified abstract

From WikiPatents
Jump to navigation Jump to search

CONFIDENTIAL COMPUTE ARCHITECTURE INTEGRATED WITH DIRECT SWAP CACHING

Organization Name

Microsoft Technology Licensing, LLC


Inventor(s)

Ishwar Agarwal of Redmond WA (US)


Bryan David Kelly of Carnation WA (US)


Vishal Soni of Redmond WA (US)


CONFIDENTIAL COMPUTE ARCHITECTURE INTEGRATED WITH DIRECT SWAP CACHING - A simplified explanation of the abstract

  • This abstract for appeared for US patent application number 17716823 Titled 'CONFIDENTIAL COMPUTE ARCHITECTURE INTEGRATED WITH DIRECT SWAP CACHING'

Simplified Explanation

This abstract describes a confidential compute architecture that incorporates direct swap caching. It explains a method for managing near memory and far memory in a system. When it is determined that the far memory contains an encrypted version of a specific block of data, the system retrieves and decrypts that block of data using a specific key assigned to a virtual machine. The decrypted version of the data is then provided to the requester. Additionally, the method involves swapping out another block of data from the near memory to the far memory if there is an address conflict with the first block of data. This second block of data is encrypted using a different key assigned to a different virtual machine.


Original Abstract Submitted

Systems and methods for a confidential compute architecture integrated with direct swap caching are described. An example method for managing a near memory and a far memory includes, in response to determining that the far memory contains an encrypted version of a first block of data, retrieving from the far memory the encrypted version of the first block of data, decrypting the first block of data using a first key for exclusive use by a first virtual machine associated with the system, and providing a decrypted version of the first block of data to the requestor. The method further includes swapping out a second block of data having an address conflict with the first block of data from the near memory to the far memory, where the second block of data is encrypted using a second key for exclusive use by a second virtual machine associated with the system.