Apparatus and method for precluding execution of certain instructions in a secure execution mode microprocessor
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-021/72
G06F-021/70
출원번호
US-0263263
(2008-10-31)
등록번호
US-8910276
(2014-12-09)
발명자
/ 주소
Henry, G. Glenn
Parks, Terry
출원인 / 주소
Via Technologies, Inc.
대리인 / 주소
Huffman, Richard K.
인용정보
피인용 횟수 :
0인용 특허 :
69
초록▼
An apparatus providing for a secure execution environment is presented. The apparatus includes a microprocessor and a secure non-volatile memory. The microprocessor is configured to execute non-secure application programs and a secure application program, where the non-secure application programs ar
An apparatus providing for a secure execution environment is presented. The apparatus includes a microprocessor and a secure non-volatile memory. The microprocessor is configured to execute non-secure application programs and a secure application program, where the non-secure application programs are accessed from a system memory via a system bus, and where the secure application program is executed in a secure execution mode. The microprocessor has secure execution mode logic that is configured to monitor instructions within the secure application program, and that is configured to preclude execution of certain instructions. The secure non-volatile memory is coupled to the microprocessor via a private bus, and is configured to store the secure application program, where transactions over the private bus between the microprocessor and the secure non-volatile memory are isolated from the system bus and corresponding system bus resources within the microprocessor.
대표청구항▼
1. An apparatus providing for a secure execution environment, comprising: a microprocessor, comprising: one or more execution units, configured to execute non-secure application programs and a secure application program, wherein said non-secure application programs are accessed from a system memory
1. An apparatus providing for a secure execution environment, comprising: a microprocessor, comprising: one or more execution units, configured to execute non-secure application programs and a secure application program, wherein said non-secure application programs are accessed from a system memory via a system bus, and wherein said secure application program is executed in a secure execution mode;a cryptographic unit;a processor key register, coupled to said cryptographic unit, configured to store a cryptographic key that is unique to said microprocessor, wherein said cryptographic key is employed to encrypt said secure application program for storage, and wherein said processor key register can only be read by said cryptographic unit; andsecure execution mode logic, configured to monitor instructions within said secure application program, and configured to preclude execution of certain instructions; anda secure non-volatile memory, coupled to said microprocessor via a private bus, configured to store said secure application program, wherein said secure application program is encrypted in said system memory according to an asymmetric cryptographic algorithm, and wherein, upon enablement of said secure execution mode, said microprocessor encrypts said secure application program according to a symmetric key algorithm and transfers said secure application program to said secure non-volatile memory over said private bus;wherein said microprocessor is also configured to automatically transition to a degraded mode where BIOS instructions, stored in a BIOS memory that is coupled to said microprocessor, are exclusively allowed to execute in order to allow for user input and the display of messages. 2. The apparatus as recited in claim 1, wherein said certain instructions comprise one or more opcodes taken from an instruction set architecture corresponding to said microprocessor. 3. The apparatus as recited in claim 1, wherein said secure execution mode logic comprises: an instruction monitor, coupled to a secure code interface logic via a bus, configured to receive a value on said bus that corresponds to a specific instruction within said secure application program. 4. The apparatus as recited in claim 3, wherein said value associates said specific instruction with a particular opcode within an instruction set architecture corresponding to said microprocessor. 5. The apparatus as recited in claim 3, wherein said value associates said specific instruction with a subset of opcodes within an instruction set architecture corresponding to said microprocessor. 6. The apparatus as recited in claim 3, wherein said secure execution mode logic further comprises: an instruction array, coupled to said instruction monitor, configured to identify a subset of all of the instructions within an instruction set architecture corresponding to said microprocessor, said subset comprising those instructions which are allowed to execute in said secure execution mode. 7. The apparatus as recited in claim 6, wherein said instruction array comprises a machine specific register. 8. The apparatus as recited in claim 6, wherein said instruction array comprises one or more fuses which are programmed during fabrication. 9. A microprocessor apparatus, for executing secure code within a secure execution environment, the microprocessor apparatus comprising: a secure non-volatile memory, configured to store a secure application program, wherein said secure application program is encrypted in a system memory according to an asymmetric cryptographic algorithm, and wherein said secure application program is retrieved from said system memory and is encrypted using a cryptographic key, and transferred over a private bus to said secure non-volatile memory; anda microprocessor, coupled to said secure non-volatile memory via said private bus, said microprocessor comprising: one or more execution units, configured to execute non-secure application programs and said secure application program;a cryptographic unit;a processor key register, coupled to said cryptographic unit, configured to store said cryptographic key, wherein said cryptographic key is unique to said microprocessor, and wherein said cryptographic key is employed to encrypt said secure application program for storage into said secure non-volatile memory, and wherein said processor key register can only be read by said cryptographic unit; andsecure execution mode logic, configured to monitor instructions within said secure application program, and configured to preclude execution of certain instructions;wherein said microprocessor is also configured to automatically transition to a degraded mode where BIOS instructions, stored in a BIOS memory that is coupled to said microprocessor, are exclusively allowed to execute in order to allow for user input and the display of messages. 10. The microprocessor apparatus as recited in claim 9, wherein said certain instructions comprise one or more opcodes taken from an instruction set architecture corresponding to said microprocessor. 11. The microprocessor apparatus as recited in claim 9, wherein said secure execution mode logic comprises: an instruction monitor, coupled to a secure code interface logic via a bus, configured to receive a value on said bus that corresponds to a specific instruction within said secure application program. 12. The microprocessor apparatus as recited in claim 11, wherein said value associates said specific instruction with a particular opcode within an instruction set architecture corresponding to said microprocessor. 13. The microprocessor apparatus as recited in claim 11, wherein said value associates said specific instruction with a subset of opcodes within an instruction set architecture corresponding to said microprocessor. 14. The microprocessor apparatus as recited in claim 11, wherein said secure execution mode logic further comprises: an instruction array, coupled to said instruction monitor, configured to identify a subset of all of the instructions within an instruction set architecture corresponding to said microprocessor, said subset comprising those instructions which are allowed to execute in a secure execution mode. 15. The microprocessor apparatus as recited in claim 14, wherein said instruction array comprises a machine specific register. 16. The microprocessor apparatus as recited in claim 14, wherein said instruction array comprises one or more fuses which are programmed during fabrication. 17. A method for executing secure code within a secure execution environment, the method comprising: accessing the secure code in a system memory, wherein the secure code is encrypted according to an asymmetric cryptographic algorithm;via a cryptographic unit disposed within a microprocessor, encrypting the secure code using a cryptographic key, and transferring the secure code over a private bus to a secure non-volatile memory for storage of the secure code, said encrypting comprising: accessing a processor key register, coupled to the cryptographic unit, configured to store a cryptographic key that is unique to the microprocessor, wherein the cryptographic key is programmed into the processor key register during fabrication of the microprocessor, and wherein the processor key register can only be read by the cryptographic unit;accessing the secure code within the secure non-volatile memory via private transactions accomplished over a private bus that is coupled between the secure non-volatile memory and the microprocessor, wherein the private bus is isolated from all system bus resources within the microprocessor and external to the microprocessor, and wherein the private bus is observable and accessible exclusively by secure execution logic within the microprocessor;monitoring within the secure code prior to execution to detect certain instructions which are to be precluded from execution;if one or more of the certain instructions are detected by said monitoring, precluding execution of the secure code; andif none of the certain instructions are detected by said monitoring, employing one or more execution units disposed within the microprocessor to execute the secure code;wherein the microprocessor is also configured to automatically transition to a degraded mode where BIOS instructions, stored in a BIOS memory that is coupled to the microprocessor, are exclusively allowed to execute in order to allow for user input and the display of messages, but the execution of more complicated software such as an operating system is not allowed. 18. The method as recited in claim 17, wherein said certain instructions comprise one or more opcodes taken from an instruction set architecture corresponding to the microprocessor. 19. The method as recited in claim 17, wherein said monitoring comprises: providing, to an instruction monitor, a value on said bus that corresponds to a specific instruction within the secure code. 20. The method as recited in claim 19, wherein said monitoring further comprises: associating the specific instruction with a particular opcode within an instruction set architecture corresponding to the microprocessor. 21. The method as recited in claim 19, wherein said monitoring further comprises: associating the specific instruction with a subset of opcodes within an instruction set architecture corresponding to the microprocessor. 22. The method as recited in claim 19, wherein said monitoring further comprises: via an instruction array, coupled to the instruction monitor, identifying a subset of all of the instructions within an instruction set architecture corresponding to the microprocessor, the subset comprising those instructions which are allowed to execute in a secure execution mode. 23. The method as recited in claim 22, wherein the instruction array comprises a machine specific register. 24. The method as recited in claim 22, wherein the instruction array comprises one or more fuses which are programmed during fabrication.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (69)
Watt,Simon Charles, Apparatus and method for controlling access to a memory unit.
Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
Sibigtroth James M. (Round Rock TX) Rhoades Michael W. (Austin TX) Grimmer ; Jr. George G. (Austin TX) Longwell Susan W. (Austin TX), Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securin.
McDevitt,Hugh W.; Spanel,Carol; Walls,Andrew D., Method, apparatus and program storage device for providing clocks to multiple frequency domains using a single input clock of variable frequency.
Little Wendell L. ; Curry Stephen M. ; Grider Steven N. ; Thrower Mark L. ; Hass Steven N. ; Bolan Michael L. ; Fieseler Ricky D. ; Harrington Bradley M., Microcircuit with memory that is protected by both hardware and software.
Okada, Takayuki, Processor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program.
Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
Hartmann Robert F. (San Jose CA) Chan Yiu-Fai (Saratoga CA) Frankovich Robert J. (Cupertino CA) Ou Jung-Hsing (Sunnyvale CA) So Hock C. (Milpitas CA) Wong Sau-Ching (Hillsborough CA), Programmable macrocell using eprom or eeprom transistors for architecture control in programmable logic circuits.
Guttag Karl M. (Houston TX) Nussrallah Steve (Richardson TX), Security bit for designating the security status of information stored in a nonvolatile memory.
Padgaonkar Ajay J. (9617 S. 43rd Pl. Phoenix AZ 85044) Mitra Sumit K. (8860 S. Drea La. Tempe AZ 85284), Security for digital signal processor program memory.
Burghardt Martin (Oberneuching NY DEX) Berman Eric (Hicksville NY) Padgaonkar Ajay (Sugarland TX) Allen Ray (Mesa AZ), System and method for protecting contents of microcontroller memory by providing scrambled data in response to an unauth.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Watt, Simon Charles; Dornan, Christopher Bentley; Orion, Luc; Chaussade, Nicolas; Belnet, Lionel; Brochier, Stephane Eric Sebastian; Mansell, David Hennah; Symes, Dominic Hugo, Task following between multiple operating systems.
Watt,Simon Charles; Dornan,Christopher Bentley; Orion,Luc; Chaussade,Nicolas; Belnet,Lionel; Brochier,Stephane Eric Sebastien; Mansell,David Hennah; Callan,Jonathan Sean, Vectored interrupt control within a system having a secure domain and a non-secure domain.
Doi Bryan C. (Fremont CA) Thomas Steven D. (Palm Dale CA) Coli Vincent J. (San Jose CA) Giglio Vito D. (Canoga Park CA), Verifiable security circuitry for preventing unauthorized access to programmed read only memory.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.