Security Manager Features
A security management and security technology, applied in program control design, electronic digital data processing, instruments, etc., can solve problems such as software dependencies and large system bottlenecks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In the following detailed description, reference is made to the accompanying drawings, which form a part hereof, and in which are shown by way of illustrations specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or other changes may be made without departing from the scope of the present disclosure. Accordingly, the following detailed description is not to be taken in a limiting sense, and the scope of the present disclosure is defined by the appended claims.
[0020] figure 1 is an example schematic diagram of hardware and software enabled security hypervisor functionality 100 in accordance with one embodiment of the present disclosure. The present disclosure provides a distributed memory access protection system controlled by new processor security privilege levels. Security hypervisor function 100 includes CPU 102, local program memory 104, local data memory 106, processor bus 10...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


