System, device and method of authority inspection for memory access operation

A technology for operating authority and checking devices, which is applied to computer security devices, instruments, digital data authentication, etc., can solve problems such as the inability to check memory access operation authority, and is conducive to popularization and application, reducing complexity, and reducing memory access the delayed effect of

Active Publication Date: 2007-11-28
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] However, at present, there is no technology explicitly used to check the permission of the memory access operation under the segment pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, device and method of authority inspection for memory access operation
  • System, device and method of authority inspection for memory access operation
  • System, device and method of authority inspection for memory access operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0069] The core content of the present invention is: by translating memory access instructions into microcode sequences, and distinguishing the type of memory access instructions, whether the segment selector of special memory access instructions, the type of segment descriptor, the privilege level of the segment are legal and Check whether the address of the ordinary memory access instruction is out of bounds, and realize the authority check for the memory access operation.

[0070] When translating the above-mentioned memory access instruction into a microcode sequence, because the segment start address, segment boundary and segment attributes contained in the ordinary memory access instruction segment descriptor are sto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority limit check system, device and method for accessing and saving operation under the sectionalized protection mechanism in the complicate instruction set computer sectionalized protection mechanism technique field. The method comprises the following steps: A, judging accessing and saving instruction type of receiving self accessing and saving instruction launching device by the accessing and saving operation authority limit check device, proceeding the procedure B if the accessing and saving instruction is the special accessing and saving instruction, proceeding the procedure C if not; B, checking if the field selector type, the segment descriptor word type and the field franchise of the special accessing and saving instruction is legal by the accessing and saving operation authority limit check device, ending the check if all are legal, proceeding the procedure D if any one isn' t legal; D, transferring the exceptional signal to the exceptional dealing device by the accessing and saving operation limit check device. The invention achieves the authority limit check for accessing and saving operation.

Description

technical field [0001] The invention relates to the technical field of segment protection mechanism of complex instruction set computer, in particular to a system, device and method for checking the authority of memory access operation under the segment protection mechanism. Background technique [0002] A computer based on a complex instruction set (Complex Instruction Set Computer, CISC) refers to a computer based on a microprogram with a complex instruction system, and generally can have multiple memory access processing modes. For example, the X86-based processor 80386 has three memory access processing modes: real address mode, protected virtual address mode, and virtual 8086 mode. Among them, the protected virtual address mode is the most commonly used memory access processing mode of 80386. This mode introduces the concept of virtual memory. The virtual memory capacity is as high as 64TB, and the physical memory capacity accessible by the CPU is 4GB. [0003] In prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/44
Inventor 刘磊袁楠范东睿
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products