US 11,941,457 B2
Disaggregated computing for distributed confidential computing environment
Reshma Lal, Portland, OR (US); Pradeep Pappachan, Tualatin, OR (US); Luis Kida, Beaverton, OR (US); Soham Jayesh Desai, Hillsboro, OR (US); Sujoy Sen, Beaverton, OR (US); Selvakumar Panneer, Portland, OR (US); and Robert Sharp, Austin, TX (US)
Assigned to INTEL CORPORATION, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Nov. 12, 2021, as Appl. No. 17/525,143.
Application 17/525,143 is a continuation of application No. 17/133,066, filed on Dec. 23, 2020.
Claims priority of provisional application 63/083,565, filed on Sep. 25, 2020.
Prior Publication US 2022/0100579 A1, Mar. 31, 2022
Int. Cl. G06F 9/50 (2006.01); G06F 9/38 (2018.01); G06T 1/20 (2006.01); G06T 1/60 (2006.01)
CPC G06F 9/5083 (2013.01) [G06F 9/3814 (2013.01); G06F 9/5027 (2013.01); G06T 1/20 (2013.01); G06T 1/60 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An apparatus comprising:
a source remote direct memory access (RDMA) network interface controller (RNIC);
a queue to store a data entry corresponding to an RDMA request between the source RNIC and a sink RNIC of a remote device;
a data buffer to store data for an RDMA transfer corresponding to the RDMA request, the RDMA transfer between the source RNIC and the sink RNIC; and
a trusted execution environment (TEE) to provide protection of the queue and the data buffer used for an RDMA transaction comprising the RDMA transfer, wherein the TEE comprises an authentication tag controller to:
initialize a first authentication tag calculated using a first key known between a source consumer generating the RDMA request and the source RNIC;
associate the first authentication tag with the data entry in the queue to provide the protection as integrity verification for the data entry during the RDMA transaction;
initialize a second authentication tag calculated using a second key known between the source consumer and a sink consumer of the remote device, the sink consumer receiving the RDMA request; and
associate the second authentication tag with the data buffer to provide the protection as integrity verification for the data buffer during the RDMA transaction.