Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A processor that switches between trusted and untrusted modes

A mode switching and processor technology, applied in the computer field, can solve the problems of complex implementation mechanism and many hardware resources, and achieve the effect of simple mechanism and less resource occupation

Active Publication Date: 2020-09-15
C SKY MICROSYST CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The trusted mode and the untrusted mode have independent registers respectively. When the processor switches between the trusted mode and the untrusted mode, the switching process is monitored through a monitoring mode. This mechanism provides software for the system. The underlying hardware protection mechanism outside of protection realizes the indirect switching between trusted mode and untrusted mode, but the implementation mechanism is complicated and takes up more hardware resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A processor that switches between trusted and untrusted modes
  • A processor that switches between trusted and untrusted modes
  • A processor that switches between trusted and untrusted modes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] The present invention provides a processor that switches between a trusted mode and an untrusted mode, such as figure 1 As shown, the processor includes a switching control module 11, a trusted kernel 12, an untrusted kernel 13, and a resource protection module 14, wherein,

[0032] The switching control module 11 is configured to sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a processor switching between a trusted mode and a non-trusted mode. The processor comprises a switching control module, a trusted kernel, a non-trusted kernel and a resource protection module; the trusted kernel is connected with the switching control module, the non-trusted kernel is connected with the switching control module, and the resource protection module is connected with the switching control module, the trusted kernel and the non-trusted kernel. Accordingly, isolation of the trusted mode and the non-trusted mode can be achieved through hardware, and the advantages that the mechanism is simple, and resource utilization is less are achieved.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a processor for switching between a trusted mode and an untrusted mode. Background technique [0002] With the continuous development of informatization, the reliability of the system becomes more and more important, and the traditional software-based reliability protection is getting lower and lower, because hackers can directly attack the operating system by bypassing the software protection and then directly attack the sensitive system. Therefore, in order to make up for the lack of credibility protection at the software level, a trusted architecture is proposed, which aims to provide the system with an underlying hardware protection mechanism other than software. [0003] The specific idea of ​​the trusted architecture design is: add a trusted mode to the operating mode of the processor, and abstract a trusted kernel in the system, and integrate the processor in the trusted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74
CPCG06F21/74
Inventor 李春强童琪杰
Owner C SKY MICROSYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products