Unlock instant, AI-driven research and patent intelligence for your innovation.

A memory access control method, device, memory controller and computer system

A technology of memory access control and memory, applied in program control devices, preventing unauthorized use of memory, software simulation/interpretation/simulation, etc., can solve problems affecting virtual machine memory security, memory security threats, etc., to avoid Any access, the effect of improving security

Active Publication Date: 2022-07-08
HYGON INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Generally, the memory can be accessed by the privileged program (such as the operating system) of the physical host without restriction. If there is a vulnerability in the privileged program, malicious memory access will undoubtedly occur, which poses a threat to the security of the memory. For example, in virtualization Under the current technology, malicious memory access will affect the security of virtual machine memory; therefore, how to control memory access to improve memory security has become an urgent problem to be solved by those skilled in the art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A memory access control method, device, memory controller and computer system
  • A memory access control method, device, memory controller and computer system
  • A memory access control method, device, memory controller and computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0060] As an optional example, figure 1 A schematic diagram of the system architecture of the physical host is shown, such as figure 1 As shown, the physical host includes: a CPU (Central Processing Unit, central processing unit) core 1, a memory controller 2, and a memory 3, and the CPU core 1 can interact with the memory controller 2 through a first bus;

[0061] Among them, the CPU core 1 is the operation and control core of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a memory access control method, device, memory controller, and computer system; wherein the method includes: receiving an access request to memory; if a target memory segment corresponding to the access request is configured with an access authority, judging Whether the access request matches the access authority of the target memory segment, wherein at least one memory segment in the memory is configured with access authority; if the access request matches the access authority of the memory segment, the target memory segment is allowed to be accessed Execute the access request. The embodiment of the present invention can perform access control on the memory to improve the security of the memory; in a virtualization scenario, the embodiment of the present invention can configure the access authority to the memory segment of the virtual machine, and perform access control.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of memory access, and in particular, to a memory access control method, device, memory controller, and computer system. Background technique [0002] Memory is one of the important components in the physical host, it is the bridge to communicate with the CPU core. All programs in the physical host run in memory, so the performance of the memory has a great impact on the physical host. [0003] Generally, the memory can be accessed by the privileged program (such as the operating system) of the physical host without restrictions. If there is a vulnerability in the privileged program, malicious memory access will undoubtedly occur, posing a threat to the security of the memory. For example, in virtualization Under the technology, malicious memory access will affect the security of the memory of the virtual machine; therefore, how to control the memory access to improve the security of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455G06F12/14
Inventor 买宇飞应志伟杜朝晖
Owner HYGON INFORMATION TECH CO LTD