Memory protection method and device

A memory and protected technology, which is applied in the field of computer security, can solve problems such as the lack of security mechanisms for secure processors, and achieve the effect of reducing audit workload and preventing tampering

Pending Publication Date: 2019-05-14
ANTAIOS (BEIJING) INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, an object of the present invention is to propose a memory protection method to solve the problem of lack of security mechanism inside the existing security processor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory protection method and device
  • Memory protection method and device
  • Memory protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not intended to automatically limit the application if in fact more than one invention is disclosed The scope is any individual invention or inventive concept.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a memory protection method which is used for a microprocessor and comprises the following steps: judging whether uplink data extracted from a memory is from a protected memory area or not; if the uplink data comes from the protected memory area, giving a write forbidding mark to the uplink data; wherein the write forbidding mark is used for indicating that the uplink data isforbidden to be modified; and writing the uplink data carrying the write forbidding mark into a cache Cache. According to the embodiment of the invention, the key memory address can be prevented frombeing tampered through auditing and marking forbidding; And on the other hand, by auditing the uplink data during memory reading, the auditing workload during memory writing can be directly reduced.

Description

technical field [0001] The invention belongs to the field of computer security, in particular to a memory protection method and device. Background technique [0002] With the widespread popularization of computers and smart terminals in recent years, as well as the rapid development of Internet technology, the issue of device security has become increasingly prominent. As the processor is the key core of computing equipment, the security of the processor will seriously affect the security of the entire computing equipment. [0003] Currently, security technologies for processors mainly include hardware virtualization technology and TrustZone technology. For example, CPU manufacturers such as Intel and AMD use hardware virtualization technology to realize CPU security; hardware virtualization technology is a security mechanism based on instruction scheduling authority management and control, such as a virtual machine monitor (VMM, Virtual Machine Monitor, also Known as Hype...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/78
Inventor 汪家祥吴亚坤展少华刘振娟
Owner ANTAIOS (BEIJING) INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products