发明名称 |
METHODS AND APPARATUS TO PROTECT MEMORY REGIONS DURING LOW-POWER STATES |
摘要 |
A disclosed example method involves configuring a processor to, when transitioning the processor system to a low-power mode, use a key and a random or pseudo-random value to generate a first signature based on a sample of memory regions to be protected during the low-power mode, the memory regions based on a manufacturer required regions table and a third-party required regions table. The disclosed example method also involves configuring a processor to, during a resume process of the processor system from the low-power mode, generate a second signature based on the sample of the memory regions protected during the low-power mode. The disclosed example method also involves configuring a processor to, when the first signature matches the second signature, cause the processor system to resume from the low-power mode, and when the first signature does not match the second signature, generate an error. |
申请公布号 |
US2015178500(A1) |
申请公布日期 |
2015.06.25 |
申请号 |
US201514639854 |
申请日期 |
2015.03.05 |
申请人 |
Intel Corporation |
发明人 |
Pearson Adrian R.;Thornburg Christopher Andrew;Brown Steven J.;Munguia Peter R. |
分类号 |
G06F21/57 |
主分类号 |
G06F21/57 |
代理机构 |
|
代理人 |
|
主权项 |
1. An apparatus to suspend a processor system, comprising:
a first memory to remain powered when a processor system is in a low-power mode, the first memory to store:
a random or pseudo-random value, anda reference to a data structure, the data structure to store (i) a first signature to authenticate information associated with memory regions to be protected, and (ii) memory addresses of the memory regions to be protected during the low-power mode, the memory regions including a first region based on a manufacturer required regions table and a second region based on a third-party required regions table; a processor in communication with the first memory, the processor to:
generate a second signature based on the information regarding the memory regions to be protected during the low-power mode and the random or pseudo-random value, anddetermine whether the data structure is valid based on a comparison of the first signature and the second signature. |
地址 |
Santa Clara CA US |