18087776. Apparatus and Method for Flexible Processor Security and Authenticated Code Execution simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

Apparatus and Method for Flexible Processor Security and Authenticated Code Execution

Organization Name

Intel Corporation

Inventor(s)

Alexander Eydelberg of Daly City CA (US)

Salessawi Ferede Yitbarek of Hillsboro OR (US)

David B. Sheffield of Portland OR (US)

Xiang Zou of Portland OR (US)

Apparatus and Method for Flexible Processor Security and Authenticated Code Execution - A simplified explanation of the abstract

This abstract first appeared for US patent application 18087776 titled 'Apparatus and Method for Flexible Processor Security and Authenticated Code Execution

The abstract describes an apparatus and method for improved processor security and authenticated code execution. One embodiment of the processor includes a secure memory to store an authenticated code module (ACM) and security hardware logic to select a mode of operation for processing the ACM based on the microarchitecture of the processor.

  • Secure memory to store an authenticated code module (ACM)
  • Security hardware logic to select a mode of operation for processing the ACM
  • Validation of the ACM and parsing of a header to determine an entry point for processing
  • Operation in accordance with the microarchitecture of the processor

Potential Applications: - Enhanced security for processors - Secure execution of authenticated code modules - Protection against unauthorized code execution

Problems Solved: - Vulnerabilities in processor security - Unauthorized code execution - Ensuring the authenticity of code modules

Benefits: - Improved processor security - Enhanced protection against cyber threats - Secure execution of code modules

Commercial Applications: Title: Enhanced Processor Security Technology for Secure Code Execution This technology can be applied in industries such as: - Cybersecurity - Software development - Information technology

Questions about Processor Security Technology: 1. How does the technology ensure the authenticity of code modules? The technology uses security hardware logic to validate and parse the header of the authenticated code module, ensuring its authenticity. 2. What are the potential implications of this technology in the cybersecurity industry? This technology can significantly enhance security measures in the cybersecurity industry by providing a secure environment for code execution.


Original Abstract Submitted

An apparatus and method for improved processor security and authenticated code execution. For example, one embodiment of a processor comprises: a secure memory to store an authenticated code module (ACM); and security hardware logic to select a mode of operation for processing the ACM based on a microarchitecture of the processor, the security hardware logic to validate the ACM and parse a header of the ACM to determine an entry point for processing the ACM in accordance with the microarchitecture.