International Business Machines Corporation
Secure operations on encrypted data

Last updated:

Abstract:

Secure operations are performed on encrypted code. A processor in a first operating mode obtains encrypted code. The processor switches from the first operating mode to a second operating mode, and decrypts the encrypted code to obtain decrypted code. The decrypted code is executed, based on the processor being in the second operating mode, to provide a result. The result is encrypted, and the encrypted result is sent to a user, based on the processor switching back to the first operating mode.

Status:
Grant
Type:

Utility

Filling date:

27 Jun 2018

Issue date:

14 Sep 2021