Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for accessing shared memory

A shared memory, visitor technology, applied in specific access rights, inter-program communication, instruments, etc., can solve data security and data consistency issues, access efficiency bottlenecks and other issues, to ensure security and consistency, ensure The effect of accessing efficiency and avoiding efficiency loss

Inactive Publication Date: 2016-07-13
SHENZHEN SUNGREAT COMM CO LTD
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The present invention has several major defects in the shared memory access and its access protection measures, namely: no restriction on the authority of the visitor, which may easily lead to various data security and data consistency problems; the use of traditional lock protection mechanisms may easily cause access efficiency bottlenecks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing shared memory
  • Method for accessing shared memory
  • Method for accessing shared memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Embodiment 1, the present embodiment is a kind of method that shared memory is accessed, and in this method, by initializing program, establishes an authority registry for each visitor in shared memory in advance, records the access authority of shared memory, as: Define read / write permissions.

[0030] Shared memory operation (retrieval / storage, etc.) interface, such as: define the read interface / write interface.

[0031] The authority registration list of each accessor specifies the access authority of each process in the list.

[0032] Visitor permission checking and access control. Control the access behavior of visitors according to the permissions granted by the permission registration list. Visitors can only perform authorized access operations and call corresponding operation interfaces; when visitors perform unauthorized operations or call unauthorized access interfaces, corresponding errors will be returned.

[0033] There are many ways to implement the acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for accessing a shared memory. The method comprises the following steps of: calling an access interface by a visitor; checking an authority registry by an authority checking program to check an interface authority for the visitor; if checking is passed, calling the interface and returning results and ending; if the checking is not passed, returning errors and ending. The patent of the invention ensures the safety and consistency of a shared memory data access by setting the visitor authority.

Description

technical field [0001] The invention relates to the field of shared memory processing, in particular to a method for accessing shared memory. Background technique [0002] Shared memory refers to a large-capacity memory that can be accessed by different central processing units (CPUs) in a multi-processor computer system. Shared memory is a communication method between multiple processes under Unix. This method is usually used for multi-process communication of a program. In fact, multiple programs can also pass information through shared memory. Since the shared memory can be accessed concurrently by multiple CPUs or multiple processes, but there is no permission control for the visitor, this will cause the visitor to have all the access rights, so that the access behavior of the visitor cannot be controlled, which is not conducive to the shared memory. The data in is protected. For example, data consistency issues arise. [0003] The traditional way to solve this kind o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/46G06F9/54
CPCG06F9/468G06F9/544
Inventor 盛江涛李景林
Owner SHENZHEN SUNGREAT COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products