18090605. SECURE MEMORY-MAPPED INPUT/OUTPUT simplified abstract (Advanced Micro Devices, Inc.)

From WikiPatents
Jump to navigation Jump to search

SECURE MEMORY-MAPPED INPUT/OUTPUT

Organization Name

Advanced Micro Devices, Inc.

Inventor(s)

Philip Ng of Toronto (CA)

Nippon Raval of Markham (CA)

Jeremy W. Powell of Austin TX (US)

Donald Matthews, Jr. of Ft. Collins CO (US)

David Kaplan of Austin TX (US)

SECURE MEMORY-MAPPED INPUT/OUTPUT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18090605 titled 'SECURE MEMORY-MAPPED INPUT/OUTPUT

The abstract of the patent application describes a processor that manages memory-mapped input/output (MMIO) accesses securely through an input/output memory management unit (IOMMU). The processor ensures that MMIO requests issued by a processor core for a specific executing virtual machine (VM) are targeted to MMIO addresses assigned to the VM by a security module, preventing unauthorized access to confidential VM information.

  • The processor manages MMIO accesses securely through an IOMMU.
  • MMIO requests are targeted to specific VMs based on assigned MMIO addresses.
  • Security module (e.g., security co-processor) assigns MMIO addresses to VMs.
  • Prevents malicious entities from accessing confidential VM information via MMIO requests.

Potential Applications: - Data centers - Cloud computing - Virtualization technologies

Problems Solved: - Unauthorized access to VM information via MMIO requests - Ensuring secure MMIO accesses in a multi-tenant environment

Benefits: - Enhanced security for VMs - Protection of confidential information - Prevention of data breaches

Commercial Applications: Title: Secure MMIO Management Processor for Virtualized Environments This technology can be used in data centers, cloud computing platforms, and virtualization technologies to ensure secure MMIO accesses and protect confidential information in multi-tenant environments.

Questions about Secure MMIO Management Processor for Virtualized Environments: 1. How does the processor prevent unauthorized access to VM information via MMIO requests? The processor ensures that MMIO requests are targeted to specific VMs based on assigned MMIO addresses by a security module, preventing malicious entities from accessing confidential VM information.

2. What are the potential applications of this technology beyond data centers and cloud computing? This technology can also be applied in edge computing, IoT devices, and embedded systems to enhance security and protect sensitive information.


Original Abstract Submitted

A processor manages memory-mapped input/output (MMIO) accesses, in secure fashion, at an input/output memory management unit (IOMMU). The processor is configured to ensure that, for a given MMIO request issued by a processor core and associated with a particular executing VM, the request is targeted to a MMIO address that has been assigned to the VM by a security module (e.g., a security co-processor). The processor thus prevents a malicious entity from accessing confidential information of a VM via MMIO requests.