Embedded system and safety managing method for internal storage thereof

An embedded system and security management technology, applied in the field of embedded systems, can solve problems such as the lack of memory management unit and the inability of the microprocessor to provide security, and achieve the effect of protecting privacy

Active Publication Date: 2013-09-18
BRITE SEMICON SHANGHAI CORP
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing microprocessors cannot provide such security due to the lack of a memory management unit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded system and safety managing method for internal storage thereof
  • Embedded system and safety managing method for internal storage thereof
  • Embedded system and safety managing method for internal storage thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0021] The detailed description of the present invention directly or indirectly simulates the operation of the technical solution of the present invention mainly through programs, steps, logic blocks, processes or other symbolic descriptions. In the ensuing description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. Rather, the invention may be practiced without these specific details. These descriptions and representations herein are used by those skilled in the art to effectively convey the substance of their work to others skilled in the art. In other words, for the purpose of avoiding obscuring the present invention, well-known methods and procedures have not been described in detail since they have been readily understood.

[0022] Reference herein to "one embodiment" or "an embodiment" refers to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded system and a safety managing method for internal storage thereof. The internal storage comprises a kernel physics space, an applied physics space, an applied virtual space mapped with the applied physics space, and a memory mapper. As for an application not configured in the memory mapper, an kernel program configures a mapping relation parameter in the memory mapper for the application, the mapping relation parameter comprises an application ID, an access authority, and an applied virtual space and an applied physics space assigned to the application; as for an application configured in the memory mapper, the application can visit an applied virtual space and an applied physics space assigned to the application through the kernel program and the memory mapper; and therefore, each application can visit an applied virtual space assigned to the application to prevent data of applications from being visited by an unauthorized person, so as to protect the privacy of each application.

Description

technical field [0001] The invention relates to the field of embedded systems, in particular to an embedded system and a memory safety management method therein. Background technique [0002] Secure microprocessors are used in embedded systems to protect the privacy of user applications and prevent them from being tampered with. Security microprocessors are widely used in security applications, such as electronic banking, commercial transactions, payment TV, smart cards / SIM cards for mobile terminals, etc. [0003] The secure microprocessor is equipped with a resident operating system, which performs basic kernel functions. The secure microprocessor can also execute various certified or non-certified applications from single or multiple vendors. Due to the numerous applications, how to protect the privacy of various applications, such as ID, security key, security content, program and data integrity, etc., is a challenge lying in front of the designers of embedded systems....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/08G06F12/14G06F12/06
Inventor 庄志青黄明
Owner BRITE SEMICON SHANGHAI CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products