Unlock instant, AI-driven research and patent intelligence for your innovation.

Adaptive Access Control to Hardware Blocks

An adaptable, hardware-based technology, applied in program control design, internal/peripheral computer component protection, instruments, etc., can solve problems such as hardware loss supporting dynamic resource allocation, cumbersome configuration of access control mechanisms, etc.

Inactive Publication Date: 2020-01-07
QUALCOMM INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In general, configuring access control mechanisms can be cumbersome and may require a centralized supervisor or administrator to manage resources and agreements between supervisors and users to allocate and publish resources
Some distributed systems avoid this complexity by supporting only static resource allocation, and thus deprive the hardware of the ability to support dynamic resource allocation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive Access Control to Hardware Blocks
  • Adaptive Access Control to Hardware Blocks
  • Adaptive Access Control to Hardware Blocks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Techniques for providing secure access to memory in hardware blocks are discussed. For example, a master-side entity (eg, CPU, DSP) may initiate an access (eg, a read or write operation) to memory stored in slave-side hardware. Examples of slave-side hardware include random access memory (RAM), read only memory (ROM), or other hardware (HW) registers. The master-side access control is control of memory access performed by the master, and the slave-side access control is control of access performed on the slave side. The System Memory Management Unit (SMMU) can be used for master-side access control solutions (for example, SMMU architecture), and a Memory Protection Unit (MPU) can be used for slave-side access control solutions (e.g., MPU area).

[0023] In a slave-side access control solution, the identity of the calling entity can be known based on the calling party information bits contained in the access call. For example, a call initiated by a master-side enti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

System and method for providing adaptive access to a hardware block on a computer system. In one embodiment, a method includes receiving a first access request and a second access request with an access controller, wherein the second access request is received sequentially after the first access request, and the first access request includes a first master identification and the second access request includes a second master identification, determining if the second master identification is equal to the first master identification, providing access to the second access request if the second master identification is equal to the first master identification, wherein the first master identification is associated with one or more hardware block interface values, invalidating the one or more hardware block interface values associated with the first master identification if the second master identification is not equal to the first master identification, and associating the one or more hardware block interface values with the second master identification and a corresponding privilege.

Description

Background technique [0001] Distributed computing systems are becoming more popular as the demand for processing power increases. Various forms of distributed computing systems exist, eg, where portions of the processing power of multiple computers are allocated for common tasks. A distributed computing system may include different physical processors, portions of different physical processors, multiple operating systems residing on multiple processors, multiple operating systems residing on a single processor, any of these A combination of two or more, or another configuration. Some distributed computing systems may contain multiple processing units, high-level operating systems, and processes that are disparate (ie, unrelated) and do not form a trust cluster. In systems with security features, access control can be an essential capability. Hardware (HW) resources with access control can implement access control using a locking mechanism to allow an entity to access the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F13/40G06F21/82
CPCG06F13/4068G06F21/82G06F13/40G06F9/45558G06F9/5077G06F2009/45579
Inventor 罗恩·凯达尔奥斯曼·科云朱迈克尔·巴腾堡
Owner QUALCOMM INC