18090605. SECURE MEMORY-MAPPED INPUT/OUTPUT simplified abstract (ATI Technologies ULC)

From WikiPatents
Jump to navigation Jump to search

SECURE MEMORY-MAPPED INPUT/OUTPUT

Organization Name

ATI Technologies ULC

Inventor(s)

Philip Ng of Toronto (CA)

Nippon Raval of Markham (CA)

Jeremy W. Powell of Austin TX (US)

Donald Matthews, Jr. of Ft. Collins CO (US)

David Kaplan of Austin TX (US)

SECURE MEMORY-MAPPED INPUT/OUTPUT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18090605 titled 'SECURE MEMORY-MAPPED INPUT/OUTPUT

The abstract of the patent application describes a processor that manages memory-mapped input/output (MMIO) accesses securely through an input/output memory management unit (IOMMU). The processor ensures that MMIO requests issued by a processor core for a specific executing virtual machine (VM) are targeted to MMIO addresses assigned to the VM by a security module, preventing unauthorized access to confidential information.

  • The processor manages MMIO accesses securely through an IOMMU.
  • MMIO requests are targeted to specific VMs based on assigned MMIO addresses.
  • Security module, such as a security co-processor, assigns MMIO addresses to VMs.
  • Prevents malicious entities from accessing confidential VM information through MMIO requests.

Potential Applications: - Data centers - Cloud computing environments - Virtualization technologies

Problems Solved: - Unauthorized access to confidential VM information through MMIO requests - Ensuring secure MMIO access in virtualized environments

Benefits: - Enhanced security for VMs - Prevention of data breaches through MMIO accesses - Improved data protection in virtualized systems

Commercial Applications: Title: Secure MMIO Management Processor for Virtualized Environments This technology can be used in data centers, cloud computing environments, and virtualization platforms to ensure secure MMIO access and protect confidential information.

Questions about Secure MMIO Management Processor for Virtualized Environments: 1. How does the processor prevent unauthorized access to VM information through MMIO requests? The processor ensures that MMIO requests are targeted to specific VMs based on assigned MMIO addresses, preventing malicious entities from accessing confidential information.

2. What are the potential applications of this technology beyond data centers and cloud computing environments? This technology can also be applied in edge computing, IoT devices, and embedded systems to enhance security and protect sensitive data.


Original Abstract Submitted

A processor manages memory-mapped input/output (MMIO) accesses, in secure fashion, at an input/output memory management unit (IOMMU). The processor is configured to ensure that, for a given MMIO request issued by a processor core and associated with a particular executing VM, the request is targeted to a MMIO address that has been assigned to the VM by a security module (e.g., a security co-processor). The processor thus prevents a malicious entity from accessing confidential information of a VM via MMIO requests.