REDUCING LATENCY OF HARDWARE TRUSTED EXECUTION ENVIRONMENTS

Registre Brevet USPTO
Numéro d'application 17950826
Statut En instance
Date de dépôt 2022-09-22
Date de la première publication 2023-01-19
Date de publication 2023-01-19
Propriétaire Intel Corporation (USA)
Inventeur(s)
  • Vahldiek-Oberwagner, Anjo Lucas
  • Sahita, Ravi L.
  • Vij, Mona
  • Illikkal, Rameshkumar
  • Steiner, Michael
  • Knauth, Thomas
  • Kuvaiskii, Dmitrii
  • Krishnakumar, Sudha
  • Zmudzinski, Krystof C.
  • Scarlata, Vincent
  • Mckeen, Francis

Abrégé

Example methods and systems are directed to reducing latency in providing trusted execution environments (TEEs). Initializing a TEE includes multiple steps before the TEE starts executing. Besides workload-specific initialization, workload-independent initialization is performed, such as adding memory to the TEE. In function-as-a-service (FaaS) environments, a large portion of the TEE is workload-independent, and thus can be performed prior to receiving the workload. Certain steps performed during TEE initialization are identical for certain classes of workloads. Thus, the common parts of the TEE initialization sequence may be performed before the TEE is requested. When a TEE is requested for a workload in the class and the parts to specialize the TEE for its particular purpose are known, the final steps to initialize the TEE are performed.

Classes IPC  ?

  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms