Intel corporation (20240202314). DEVICE, METHOD, AND SYSTEM TO DETERMINE AN ACCESS TO A TRUSTED EXECUTION ENVIRONMENT simplified abstract

From WikiPatents
Jump to navigation Jump to search

DEVICE, METHOD, AND SYSTEM TO DETERMINE AN ACCESS TO A TRUSTED EXECUTION ENVIRONMENT

Organization Name

intel corporation

Inventor(s)

Mona Vij of Hillsboro OR (US)

Dmitrii Kuvaiskii of Taufkirchen (DE)

Bin Xing of Hillsboro OR (US)

Krystof Zmudzinski of Forest Grove OR (US)

Scott Constable of Portland OR (US)

DEVICE, METHOD, AND SYSTEM TO DETERMINE AN ACCESS TO A TRUSTED EXECUTION ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240202314 titled 'DEVICE, METHOD, AND SYSTEM TO DETERMINE AN ACCESS TO A TRUSTED EXECUTION ENVIRONMENT

The patent application discusses techniques and mechanisms for a processor core to execute an instruction for a hardware thread to access a trusted execution environment (TEE). This includes conditions for TEE access based on the status of sibling hardware threads.

  • Determining if active sibling hardware threads are approved for TEE access
  • Conditional TEE access based on sibling hardware thread status
  • System software notification for exiting the TEE and waking up sibling hardware threads

Potential Applications: - Secure computing environments - Multi-threaded processor systems - Trusted execution environments in IoT devices

Problems Solved: - Ensuring secure access to TEE for hardware threads - Managing concurrency and access control in multi-threaded systems

Benefits: - Enhanced security for TEE access - Efficient utilization of hardware resources - Improved system performance and reliability

Commercial Applications: Title: Secure Multi-Threaded Processor Systems for IoT Devices This technology can be applied in IoT devices, data centers, and cloud computing environments to ensure secure and efficient execution of instructions across multiple hardware threads.

Prior Art: Prior research in multi-threaded processor systems, hardware security, and trusted execution environments can provide insights into similar technologies and approaches.

Frequently Updated Research: Ongoing research in hardware security, concurrency control, and trusted computing can provide updates on advancements in secure multi-threaded processor systems.

Questions about Secure Multi-Threaded Processor Systems for IoT Devices:

1. How does this technology improve security in IoT devices? This technology enhances security by providing controlled access to a trusted execution environment for hardware threads, ensuring secure execution of sensitive instructions.

2. What are the implications of efficient utilization of hardware resources in multi-threaded systems? Efficient utilization of hardware resources leads to improved system performance, reduced latency, and optimized resource allocation in multi-threaded processor systems.


Original Abstract Submitted

techniques and mechanisms for a processor core to execute an instruction for a hardware (hw) thread to have access to a trusted execution environment (tee). in an embodiment, execution of the instruction includes determining whether any sibling hw thread, which is currently active, is also currently approved to access the tee. tee access by the hw thread is conditioned upon a requirement that any sibling hw thread is either currently inactive, is currently in the same tee, or is currently approved to enter the tee. in another embodiment, execution of another instruction, for the hw thread to exit the tee, includes or otherwise results in system software being conditionally notified of an opportunity to wake up one or more sibling hw threads.