Unlock instant, AI-driven research and patent intelligence for your innovation.

Memory protection method

A memory and memory space technology, applied in the field of memory management, can solve problems such as imperfect memory protection mechanisms, and achieve the effect of improving system stability

Active Publication Date: 2014-06-25
HISENSE BROADBAND MULTIMEDIA TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the existing memory protection mechanism is not perfect, the present invention provides a memory protection method, which can effectively monitor and check the memory, and greatly improve the stability and reliability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory protection method
  • Memory protection method
  • Memory protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Embodiment one, see figure 1 As shown, the memory protection method of this embodiment includes the following steps:

[0031] S1. Every time memory is allocated, another space with identification information is created and allocated to users together;

[0032] S2. When the user releases the memory, it is judged whether the identification information contains the information of releasing the memory space, and if so, then end;

[0033] S3. If the identification information does not contain the information about releasing the memory space, it is judged whether the information in the identification information is consistent with the identification information stored when the memory is allocated, and if they are consistent, then end; otherwise, record an error message.

[0034] As a specific example, in this example, see figure 2 As shown, the space opened up in step S1 to store the identification information is:

[0035] Add header and tail identification information at...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a memory protection method, which includes the steps: (1) when memory is allocated every time, additionally opening up a space with stored identification information and allocating the space to a user; (2) when the user releases the memory, judging whether the identification information includes information released by a memory space or not, and completing release of the memory if the identification information includes the information released by the memory space; and (3) if the identification information does not include the information released by the memory space, judging whether information in the identification information is consistent with the identification information stored when the memory is allocated or not, completing release of the memory if the information in the identification information is consistent with the identification information stored when the memory is allocated, and recording error information if the information in the identification information is inconsistent with the identification information stored when the memory is allocated. The method has the advantages that by the aid of the space with the stored identification information additionally opened up and allocated to the user in allocation of the memory, when the user releases the memory, correctness of the identification information is judged, and further whether the memory is overlapped or not can be judged, records are made, the memory can be effectively monitored and checked, and systematic stability and reliability can be maximally enhanced.

Description

technical field [0001] The invention relates to a memory protection method and belongs to the technical field of memory management. Background technique [0002] The memory management mechanism of the existing OS (operating system) allows users to use and manipulate memory flexibly and dynamically. This mechanism brings convenience to users but also brings great security risks. With the rapid development of technology, the scale of software is getting larger and larger, and the complexity of software is also greatly increased, which will greatly increase the randomness of memory usage and the possibility of memory corruption. Some memory management mechanisms The legality of the memory address cannot be recognized, which will bring great security risks when the user dynamically applies for and releases the memory, resulting in an extremely unstable system, and in severe cases, the system can be paralyzed and the device cannot work normally. [0003] Although some existing s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/02
Inventor 周印伟
Owner HISENSE BROADBAND MULTIMEDIA TECH