US 12,413,394 B2
Key management system
Abbas Morshed, Los Altos, CA (US); Ygal Arbel, Morgan Hill, CA (US); Balakrishna Jayadev, Mountain View, CA (US); and Eun Mi Kim, San Jose, CA (US)
Assigned to XILINX, INC., San Jose, CA (US)
Filed by XILINX, INC., San Jose, CA (US)
Filed on Feb. 23, 2023, as Appl. No. 18/113,588.
Prior Publication US 2024/0291635 A1, Aug. 29, 2024
Int. Cl. H04L 29/06 (2006.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01)
CPC H04L 9/0825 (2013.01) [G06F 21/602 (2013.01); H04L 9/0894 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method of accessing encrypted data, comprising:
incrementing a count associated with a first key based on memory access requests directed to a memory region, wherein the memory region is encrypted based on the first key;
initiating a key rolling operation to encrypt the memory region based on a second key when the count meets a first threshold;
tracking an address range of the memory region that has been encrypted based on the second key, during the key rolling operation;
receiving a first memory access request directed to the memory region during the key rolling operation;
determining that an address of the first memory access request is outside of the address range;
processing the first memory access request based on the first key; and
performing an operation when the count meets a second threshold, wherein the operation comprises one or more of:
increasing a rate at which the key rolling operation is performed;
decreasing a rate at which memory access requests to the memory region are processed;
increasing a bandwidth allocated to the key rolling operation; and
decreasing a bandwidth allocated to memory access requests directed to the memory region.