Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for technically controlling secure access to embedded system memory

A security access control, embedded system technology, applied in the protection of internal/peripheral computer components, instruments, electrical and digital data processing, etc., can solve problems such as unpredictable program running time, I/O blocking time, etc., to solve memory access problems Security Issues, Ensuring Legal Access, and Effectiveness of Secure Access Mechanisms for Reliable System Memory

Active Publication Date: 2016-07-20
HANGZHOU BYTE INFORMATION TECH CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the MMU memory management unit, although there is hardware access protection, the virtual memory mechanism will lead to uncertain I / O blocking time, making the program running time unpredictable, which is a fatal flaw in real-time embedded systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for technically controlling secure access to embedded system memory
  • Method for technically controlling secure access to embedded system memory
  • Method for technically controlling secure access to embedded system memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make it easy to understand the technical means, creative features, objectives and effects achieved by the present invention, the present invention will be further explained below in conjunction with specific drawings.

[0032] Such as Figure 8 As shown, a technical implementation method for memory security access control of an embedded system includes the following steps:

[0033] 1) System initialization design of memory security access mechanism 1: Introduce the MPU memory protection unit in the embedded system, and assign different levels of regional attributes to the memory area, including background domain, system shared domain, running task domain, sleep task domain and Device I / O domain, its priority is background domain=sleep task domain figure 2 Shown.

[0034] In the present invention, the system uses area as the main concept of system protection. A region is a collection of storage space attributes and also represents a logical storage space with spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for technically controlling secure access to an embedded system memory. The method includes the following steps of initially designing a system of a memory secure access mechanism, wherein an MPU memory protection unit is introduced, domain attributes of different grades are distributed, and an access attribute and a system initiating progress are set; secondly, designing the secure access to the memory for switching of embedded operation system process context, wherein a domain control module is set, the system process context is set, and switching of the system process content is achieved in the domain control module. The illegal access of all address space resources are detected and limited through a processor MPU hardware mechanism, the boundary control and context switching of any task of the embedded real-time multi-task operation system for accessing resources of other tasks is achieved, distributing and designing of cache, writing buffer and MPU attributes of different storage spaces in the system are achieved, and the control over secure access to all background domains in the memory is ensured.

Description

Technical field [0001] The present invention relates to the field of embedded systems, in particular to a technical realization method of embedded system memory safety access control. Background technique [0002] The operating environment of embedded systems varies greatly. System hardware and software must be tailored on a stable, safe, and reliable basis, eliminating redundancy, and striving to achieve higher performance with fewer hardware and software resources. In embedded real-time systems, memory management has different strategies according to different systems. General systems usually implement simple memory management through software mechanisms to achieve access control to the heap and stack, such as cross-border access and memory leaks. Etc., such as figure 1 Shown. [0003] The general embedded system adopts the real memory management strategy, and the access to the memory is direct. Its access to the address does not need to go through the MMU, but is directly sent ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/74
CPCG06F21/52G06F21/74G06F2221/2113G06F2221/2141
Inventor 毛伟信赵疆华
Owner HANGZHOU BYTE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products