Unlock instant, AI-driven research and patent intelligence for your innovation.

An in-process data isolation and protection method and system

A data isolation and in-process technology, applied in the computer field, can solve problems such as unrealistic third-party code and inability to completely solve address protection, and achieve the effect of reducing software instruction overhead, improving protection, and improving security.

Active Publication Date: 2019-06-04
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And this is unrealistic for a large number of third-party codes from different sources, so it cannot completely solve the address protection problem in the process space proposed above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An in-process data isolation and protection method and system
  • An in-process data isolation and protection method and system
  • An in-process data isolation and protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present invention clearer, the in-process data isolation and protection based on the program counter and memory access address of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] The invention proposes a memory isolation method in the same application program based on the association between the PC value of the application program and the address of the data to be accessed.

[0049] The realization of the present invention depends on the program PC, and PC (program counter) refers to the program counter, which is used to store the address of the unit where the next instruction is located. When executing an instruction, it is first necessary to fetch the instruction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an in-process data isolation and protection method. The method comprises the steps that an application program is divided into a main function area and a library function area; a processor sets a PC range register, a data limit register and a library function return address register; when the processor executes a memory access instruction of a library function, whether a memory access address of the memory access instruction is in the range of the data limit register or not is judged; when in the range, the memory access instruction is continuously executed, otherwise,an illegal state is reported, and exception handling is carried out; when the processor executes a skip return instruction from the library function area to the main function area, if the destinationaddress of the skip return instruction is equal to the expected return address, the skip return instruction is continuously executed; otherwise, an illegal state is reported and abnormity processingis carrying out. According to the invention, the instruction overhead of security check software during running can be greatly reduced, and the security and execution efficiency of the application program are effectively improved.

Description

technical field [0001] The invention belongs to the field of computers, and relates to the direction of computer system structure, and in particular relates to a memory safety structure system realized by cooperation of software and hardware. Background technique [0002] Most of the data protection of traditional computer systems is based on the virtual memory mechanism. The mapping relationship (page table) between the virtual address and the process number is used for access rights management. But this kind of management is limited to address protection between processes, and cannot provide data isolation and protection functions within the same process. As the complexity of computer applications continues to increase, it is inevitable that the applications will call various third-party codes. However, it is difficult to guarantee the security and reliability of the third-party code, which poses a challenge to the data protection inside the process. [0003] How to pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/45
Inventor 朱晓静陈明宇洪宗会
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI