Protecting the security of secure data sent from a central processor for processing by a further processing device
A technology for secure data and data processing, applied in the field of data processing, can solve the problem of high communication overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] figure 1 A processor core 10 and an accelerator 20 are shown schematically. The system is equipped with a monitoring program 12 which is at least partially executed in monitoring mode. Security status flags are writable only in monitor mode and can be written by monitor programs. The supervisor is responsible for managing all changes in either direction between the secure and unsecure domains. From outside the core, monitor mode is always safe and the monitor program is in secure memory. Monitor mode 12 can be considered a safe processing mode because the safe status flags can be changed in this mode, and the monitor program in monitor mode 12 has the ability to set the safe status flags itself, which effectively provides system-wide final security level.
[0055] Monitor mode has the highest level of security access in the system, and is the only mode that has the authority to switch the system in either direction between the unsecured domain and the secure domain....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 