Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reducing latency of hardware trusted execution environment

An execution environment and technology at execution time, applied in electrical components, secure communication devices, usage of multiple keys/algorithms, etc., to solve problems such as inability to access memory and no operating system protection

Pending Publication Date: 2022-06-24
INTEL CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Applications running at a lower privilege level are restricted to access memory within the scope defined by the operating system, and cannot access the memory of other applications or the operating system
However, applications are not protected against malicious or compromised operating systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reducing latency of hardware trusted execution environment
  • Reducing latency of hardware trusted execution environment
  • Reducing latency of hardware trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0086] Example 1 is a system that provides a Trusted Execution Environment (TEE), the system comprising: a processor; and a storage device coupled to the processor to store instructions that, when executed by the processor, cause The processor: pre-initializes a pool of TEEs, where the pre-initialization of each TEE in the pool of TEEs includes allocating the memory of the storage device for the TEE; after the pre-initialization of the pool of TEEs, receiving a TEE selects the TEE from a pool of pre-initialized TEEs; and provides access to the selected TEE in response to the request.

[0087] In example 2, the subject matter of example 1 includes wherein the instructions further cause the processor to: prior to providing access to the selected TEE, modify the selected TEE based on information in the request TEE.

[0088] In Example 3, the subject matter of Example 2 includes wherein modifying the selected TEE includes launching the selected TEE.

[0089] In Example 4, the su...

example 10

[0095] Example 10 is a system for providing a TEE, the system comprising: a processor; and a storage device coupled with the processor to store instructions that, when executed by the processor, cause the processor to: pre- initializing a pool of TEEs; creating a template TEE that is stored in the storage device and marked read-only; receiving a request; and in response to the request: copying the template TEE to create a TEE; and providing access to all Access to the created TEE.

[0096] In Example 11, the subject matter of Example 10 includes wherein the template TEE includes initial memory content and layout for a function as a service (FaaS).

[0097] In Example 12, the subject matter of Examples 10-11 includes wherein the processor prevents execution of the template TEE.

example 13

[0098]Example 13 is a method of providing a TEE, the method comprising: pre-initializing, by a processor, a pool of TEEs, the pre-initialization of each TEE in the pool of TEEs including allocating memory of a storage device for the TEE; After pre-initialization of the pool of TEEs, a request is received by the processor; and in response to the request: a TEE is selected by the processor from the pool of pre-initialized TEEs; and a request for the selected TEE is provided by the processor access.

[0099] In Example 15, the subject matter of Example 14 includes, prior to providing access to the selected TEE, modifying the selected TEE based on information in the request.

[0100] In Example 16, the subject matter of Example 15 includes wherein modifying the selected TEE includes launching the selected TEE.

[0101] In Example 17, the subject matter of Examples 15-16 includes wherein modifying the selected TEE includes copying data or code to memory allocated for the TEE.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to reducing latency of a hardware trusted execution environment. Example methods and systems are directed to reducing latency in providing a trusted execution environment (TEE). Initializing the TEE includes a plurality of steps prior to the TEE starting execution. In addition to a workload-dependent initialization, a workload-independent initialization, such as adding memory to a TEE, is to be performed. In a function as a service (FaaS) environment, a substantial portion of the TEE is workload independent so as to be executed before receiving the workload. Certain steps performed during TEE initialization are the same for certain classes of workloads. Thus, a common portion of the TEE initialization sequence may be executed before the TEE is requested. When a TEE is requested for a workload in the category, and it is known that a portion of the TEE is specialized for its particular purpose, a final step of initializing the TEE is performed.

Description

technical field [0001] The subject matter disclosed herein relates generally to hardware trusted execution environments (TEEs). In particular, the present disclosure relates to systems and methods for reducing the latency of hardware TEEs. Background technique [0002] Hardware permission levels may be used by the processor to restrict memory access by applications running on the device. The operating system runs at a higher privilege level and has access to all of the device's memory and defines memory ranges for other applications. Applications running at lower privilege levels are restricted from accessing memory within the scope defined by the operating system, and cannot access the memory of other applications or operating systems. However, applications are not protected against malicious or compromised operating systems. [0003] The TEE is enabled by processor protections, which guarantee that code and data loaded inside the TEE are protected from being accessed by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/50G06F21/60
CPCG06F9/505G06F21/602G06F21/604G06F2209/5011H04L9/0891G06F21/53G06F3/061G06F3/067G06F3/0659G06F2009/45562G06F21/79G06F3/0653G06F3/0673G06F3/0623H04L9/3236G06F12/1408H04L9/0897H04L9/14G06F2212/1052G06F2221/2149
Inventor 安霍·卢卡斯·瓦尔迪克-奥伯瓦格纳拉维·L·萨希塔蒙纳·维吉拉梅什库马尔·伊利卡尔迈克尔·施泰纳托马斯·诺斯德米特里·库瓦斯基苏达·克里希纳库玛克里斯托夫·C·齐穆津斯基文森特·斯卡拉塔弗朗西斯·麦基恩
Owner INTEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products