Unlock instant, AI-driven research and patent intelligence for your innovation.

Protecting the security of secure data sent from a central processor for processing by a further processing device

A technology for secure data and data processing, applied in the field of data processing, can solve the problem of high communication overhead

Active Publication Date: 2009-07-08
ARM LTD
View PDF12 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, where both secure and insecure data are processed under the control of a secure operating system and an insecure operating system, the communication overhead associated with managing the security state of the data transferred between the processor and the accelerator can be very high of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting the security of secure data sent from a central processor for processing by a further processing device
  • Protecting the security of secure data sent from a central processor for processing by a further processing device
  • Protecting the security of secure data sent from a central processor for processing by a further processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] figure 1 A processor core 10 and an accelerator 20 are shown schematically. The system is equipped with a monitoring program 12 which is at least partially executed in monitoring mode. Security status flags are writable only in monitor mode and can be written by monitor programs. The supervisor is responsible for managing all changes in either direction between the secure and unsecure domains. From outside the core, monitor mode is always safe and the monitor program is in secure memory. Monitor mode 12 can be considered a safe processing mode because the safe status flags can be changed in this mode, and the monitor program in monitor mode 12 has the ability to set the safe status flags itself, which effectively provides system-wide final security level.

[0055] Monitor mode has the highest level of security access in the system, and is the only mode that has the authority to switch the system in either direction between the unsecured domain and the secure domain....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to protect security of secure data transmitted from the central processing unit that to be processed. The data processing apparatus comprising: a data processor for processing data in a secure and a non-secure mode, said data processor processing data in said secure mode having access to secure data that is not accessible to said data processor in said non-secure mode, and processing data in said secure mode being performed under control of a secure operating system and processing data in said non-secure mode being performed under control of a non-secure operating system; and a further processing device for performing a task in response to a request from said data processor, said task comprising processing data at least some of which is secure data; wherein said further processing device is responsive to receipt of a signal to suspend said task to initiate: processing of said secure data using a secure key; and storage of said processed secure data to a non-secure data store; and is responsive to receipt of a signal to resume said task to initiate: retrieval of said processed secure data from said non-secure data store; and restoring of said processed secure data using said secure key; wherein said secure key is securely stored such that it is not accessible to other processes operating in said non-secure mode.

Description

technical field [0001] The field of the invention relates to data processing, and more particularly to processing secure and non-secure data using additional processing means to perform tasks under the control of a first data processor. Background technique [0002] It is known to enhance performance using accelerators or coprocessors in conjunction with a main processor, which perform tasks requested by the main processor. While it is clear that performance can be enhanced by providing additional processing power, a possible drawback of such systems is the overhead associated with the communication between the processor and the accelerator. For example, where both secure and insecure data are processed under the control of a secure operating system and an insecure operating system, the communication overhead associated with managing the security state of the data transferred between the processor and the accelerator can be very high of. In such cases, it may be advantageo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F12/14
CPCG06F2221/2107G06F2221/2105G06F21/53G06F21/74G06F12/14G06F12/1408
Inventor N·C·帕弗D·克尔肖
Owner ARM LTD