An in-process data isolation and protection method and system
A data isolation and in-process technology, applied in the computer field, can solve problems such as unrealistic third-party code and inability to completely solve address protection, and achieve the effect of reducing software instruction overhead, improving protection, and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] In order to make the purpose, technical solution and advantages of the present invention clearer, the in-process data isolation and protection based on the program counter and memory access address of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0048] The invention proposes a memory isolation method in the same application program based on the association between the PC value of the application program and the address of the data to be accessed.
[0049] The realization of the present invention depends on the program PC, and PC (program counter) refers to the program counter, which is used to store the address of the unit where the next instruction is located. When executing an instruction, it is first necessary to fetch the instruction...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


