18090605. SECURE MEMORY-MAPPED INPUT/OUTPUT simplified abstract (ATI Technologies ULC)
Contents
SECURE MEMORY-MAPPED INPUT/OUTPUT
Organization Name
Inventor(s)
Jeremy W. Powell of Austin TX (US)
Donald Matthews, Jr. of Ft. Collins CO (US)
David Kaplan of Austin TX (US)
SECURE MEMORY-MAPPED INPUT/OUTPUT - A simplified explanation of the abstract
This abstract first appeared for US patent application 18090605 titled 'SECURE MEMORY-MAPPED INPUT/OUTPUT
The abstract of the patent application describes a processor that manages memory-mapped input/output (MMIO) accesses securely through an input/output memory management unit (IOMMU). The processor ensures that MMIO requests issued by a processor core for a specific executing virtual machine (VM) are targeted to MMIO addresses assigned to the VM by a security module, preventing unauthorized access to confidential information.
- The processor manages MMIO accesses securely through an IOMMU.
- MMIO requests are targeted to specific VMs based on assigned MMIO addresses.
- Security module, such as a security co-processor, assigns MMIO addresses to VMs.
- Prevents malicious entities from accessing confidential VM information through MMIO requests.
Potential Applications: - Data centers - Cloud computing environments - Virtualization technologies
Problems Solved: - Unauthorized access to confidential VM information through MMIO requests - Ensuring secure MMIO access in virtualized environments
Benefits: - Enhanced security for VMs - Prevention of data breaches through MMIO accesses - Improved data protection in virtualized systems
Commercial Applications: Title: Secure MMIO Management Processor for Virtualized Environments This technology can be used in data centers, cloud computing environments, and virtualization platforms to ensure secure MMIO access and protect confidential information.
Questions about Secure MMIO Management Processor for Virtualized Environments: 1. How does the processor prevent unauthorized access to VM information through MMIO requests? The processor ensures that MMIO requests are targeted to specific VMs based on assigned MMIO addresses, preventing malicious entities from accessing confidential information.
2. What are the potential applications of this technology beyond data centers and cloud computing environments? This technology can also be applied in edge computing, IoT devices, and embedded systems to enhance security and protect sensitive data.
Original Abstract Submitted
A processor manages memory-mapped input/output (MMIO) accesses, in secure fashion, at an input/output memory management unit (IOMMU). The processor is configured to ensure that, for a given MMIO request issued by a processor core and associated with a particular executing VM, the request is targeted to a MMIO address that has been assigned to the VM by a security module (e.g., a security co-processor). The processor thus prevents a malicious entity from accessing confidential information of a VM via MMIO requests.