Method and system for memory protection and security using credentials
A storage, storage access technology, applied in storage systems, preventing unauthorized use of memory, computer security devices, etc., can solve problems such as endangering the stability and integrity of the PC system 10, damage, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] System overview:
[0045] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
[0046] Reference is now made to Figure 3, which is a schematic block diagram of a credential-based computer system 40 in accordance with an embodiment of the present invention. System 40 may utilize cryptographically signed capability tokens, hereinafter referred to as credentials, to secure access to memory 50, as will be described in detail below.
[0047] In system 40, a user (not shown) in communication with memory 50 may request direct memory access (DMA) to memory 50 from one or more IO devices 14[1]-14[i]. In p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com