Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for memory protection and security using credentials

A storage, storage access technology, applied in storage systems, preventing unauthorized use of memory, computer security devices, etc., can solve problems such as endangering the stability and integrity of the PC system 10, damage, etc.

Active Publication Date: 2007-07-25
IBM CORP
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Any misconfiguration of an IO device or any malicious reconfiguration of an IO device 14 may compromise PC System 10 Stability and Integrity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for memory protection and security using credentials
  • Method and system for memory protection and security using credentials
  • Method and system for memory protection and security using credentials

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] System overview:

[0045] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.

[0046] Reference is now made to Figure 3, which is a schematic block diagram of a credential-based computer system 40 in accordance with an embodiment of the present invention. System 40 may utilize cryptographically signed capability tokens, hereinafter referred to as credentials, to secure access to memory 50, as will be described in detail below.

[0047] In system 40, a user (not shown) in communication with memory 50 may request direct memory access (DMA) to memory 50 from one or more IO devices 14[1]-14[i]. In p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory.

Description

technical field [0001] The present invention relates generally to the field of computer and processor architectures. In particular, the present invention relates to methods and systems for memory protection and security using credentials. Background technique [0002] The architecture of the latest personal computer (PC) system from desktop to server can be conceptually and schematically described by FIG. 1 , now refer to FIG. 1 . [0003] PC system 10 generally includes memory 20, which may be embedded within one or more processing units 12, or may be separate therefrom. Processing unit 12 is typically coupled to IO devices 14[1]-14[i] via one or more IO buses 16, such as Peripheral Component Interconnect (PCI) buses. Some or all of the IO devices may be coupled to an IO bridge 17 , which may be coupled to the IO bus 16 . Optionally, to make the connection between processing unit 12 and IO devices 14[1]-14[i] faster, PC system 10 may also include a or multiple component...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/02G06F13/28
CPCG06F12/1433G06F12/1441G06F12/1466
Inventor J·萨特兰L·沙莱夫T·恩格贝尔森S·本-耶胡达M·温迪内I·希莫尼Z·马舒尔斯基T·B·史密斯三世M·巴克斯J·L·卡梅尼施
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products