Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting permission of volatile memory bank

A volatile storage and permission technology, applied in internal/peripheral computer component protection, instruments, electrical digital data processing, etc., can solve data security threats and other issues

Inactive Publication Date: 2017-01-18
苏州国芯科技股份有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the DMA controller and the MPU are two independent modules, which are not related to each other, which leads to the data in the volatile storage bank requested by the user being easily changed or illegally read by other users, making the data Security is greatly threatened
It is precisely because of the lack of a protection mechanism for volatile memory banks that if you want to protect volatile memory banks, you can only set the corresponding permissions during the chip production process, which leads to the user's DMA operation authority for volatile memory banks is fixed and cannot be changed for user needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting permission of volatile memory bank
  • Method and system for protecting permission of volatile memory bank
  • Method and system for protecting permission of volatile memory bank

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 It is a flowchart of a method for protecting volatile storage rights provided by the present invention. Such as figure 1 As shown, the methods for protecting volatile memory permissions include:

[0032] Step S10: In the case of obtaining the permission requesting user to set the corresponding permission protection mechanism for the volatile memory, when receiving the operation request of the operation requesting user, the MPU parses the operation type contained in the operation request and the corresponding operation type Volatile storage.

[0033] Among them, the operation type included in the operation request is a DMA operation, which specifically includes: DMA read operation and DMA write operation, DMA read operation or DMA write operation.

[0034] Step S11: The MPU judges whether the operation requesting user has the authority to operate the volatile memory bank according to the authority protection mechanism.

[0035] If the user is requested to have the auth...

Embodiment 2

[0040] On the basis of the above embodiment 1, figure 2 It is a flow chart of another method for protecting volatile storage rights provided by the present invention. Such as figure 2 As shown, the method for protecting the rights of the volatile memory also includes:

[0041] If the user does not have the authority to operate the volatile memory bank according to the operation request of the authority protection mechanism, step S20 is entered.

[0042] Step S20: The MPU sends an authorization prohibition signal to the DMA controller, and sends an MPU abnormal interrupt request to the CPU.

[0043] Step S21: The CPU receives the MPU abnormal interrupt request, and processes the abnormal interrupt.

[0044] This embodiment provides another method and system for protecting the authority of volatile memory banks. When the authority requesting user sets a corresponding authority protection mechanism for the volatile memory bank, when the operation request of the operation requesting use...

Embodiment 3

[0047] On the basis of the first embodiment, the operation types specifically include: DMA read operation and DMA write operation, DMA read operation or DMA write operation.

[0048] When the operation type is DMA read operation and DMA write operation, the operation request includes the start address, destination address and the length of the moved data. The flow chart of the method for protecting volatile memory permissions is as follows image 3 Shown

[0049] When the operation type is DMA read operation, the operation request includes the start address and the length of the moved data. The flow chart of the method for protecting the volatile memory bank permissions is as follows Figure 4 Shown

[0050] When the operation type is DMA write operation, the operation request includes the destination address and the length of the moved data. The flow chart of the method for protecting volatile memory permissions is as follows Figure 5 Shown.

[0051] image 3 When the operation type ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting permission of a volatile memory bank. The method comprises the following steps: when receiving an operation request of an operation request user, an MPU analyzes the operation type in the operation request and the volatile memory bank corresponding to the operation type, and judges whether the operation request user has a permission to operate the volatile memory bank according to a permission protection mechanism; if so, the MPU transmits an authorization signal to a DMA controller; the DMA controller receives the authorization signal, and configures parameters corresponding to the operation type according to the operation request. Therefore, the DMA controller executes the corresponding operation only after the authorization of the MPU is successful, so that the data in the volatile memory bank are prevented from being illegally changed or read by other users, and the security is enhanced. As the protection mechanism for the volatile memory bank is added, the user can change the operation permission of the DMA on the volatile memory bank, and the operation flexibility is improved. In addition, the invention further discloses a system for protecting permission of the volatile memory bank, and the effects are as mentioned above.

Description

Technical field [0001] The invention relates to the embedded field, in particular to a method and system for protecting the authority of a volatile storage body. Background technique [0002] With the continuous advancement of technology, the research and application of embedded systems have been further deepened, and they have been developing in the direction of networking, intelligence, standardization, integration, and security. Memory is a memory device used to store information in modern information technology, and its type determines the operation and performance of the embedded system. According to storage characteristics, memory can be divided into volatile memory and non-volatile memory. Direct memory access (DMA controller), as a unique module for transferring data within the system, plays an important role in the ever-changing embedded field. At the same time, as an emerging application direction of embedded systems-information security, the protection of user data h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/79G06F13/28
CPCG06F21/79G06F13/28
Inventor 肖佐楠郑茳匡启和王廷平王文博王忠海
Owner 苏州国芯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products