International Business Machines Corporation
Secure operations on encrypted data
Last updated:
Abstract:
Secure operations are performed on encrypted code. A processor in a first operating mode obtains encrypted code. The processor switches from the first operating mode to a second operating mode, and decrypts the encrypted code to obtain decrypted code. The decrypted code is executed, based on the processor being in the second operating mode, to provide a result. The result is encrypted, and the encrypted result is sent to a user, based on the processor switching back to the first operating mode.
Status:
Grant
Type:
Utility
Filling date:
27 Jun 2018
Issue date:
14 Sep 2021