System and method for virtual hardware memory protection
A memory protection, hardware logic technology used in memory systems, internal/peripheral computer component protection, preventing unauthorized use of memory, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The following discussion is directed to various embodiments of the invention. Although one or more of these embodiments may be preferred, the disclosed embodiments should not be interpreted, or otherwise used, as limiting the scope of the disclosure, including the claims. Furthermore, those skilled in the art will appreciate that the following description has broad application, and that any embodiment discussed is intended to illustrate that embodiment only, and is not intended to imply that the scope of the present disclosure, including the claims, is limited to that embodiment.
[0022] Secure and non-secure functions can be implemented, for example, on a system-on-chip (SOC) with one or more processor cores and memory, which can be shared between processor cores. Theoretically, the highest level of security is achieved when a single SOC performs each of the various functions of the electronic device. In this way, the operation of a particular function is not impaire...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 