A runtime access control device and method
A production method and technology of safety devices, applied in the information field, can solve problems such as safety without systematic consideration
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
specific Embodiment approach S1
[0278] The feature of the embodiment S1 is: under the RISC-V system, the memory area boundary information is composed of memory address values, the first type of instruction execution and interrupt / abnormal generation are respectively transferred to different transfer areas, and the security is recorded through a dedicated storage facility. For the information required by the device and the state data required by the guarantee device, the preferred storage facility in this embodiment is: a special register.
Embodiment approach
[0280] S-A-A1. Set up a special register group for recording the information required to ensure the effectiveness of the safety device, which is used to record various memory area boundary information, interrupt site information, specific address information required across regions, and safety device opening / closing identification information
[0281] The processor needs to dynamically obtain some data during operation to ensure the normal operation of the safety device, so some registers are added for use by the processor. In the simplified instruction set RSIC-V, there are 4096 preset control status registers for use, and we select some of them as additional control status registers. In order to be compatible with RSIC, in addition to satisfying the coding rules and usage specifications of its registers, an attribute is added to the registers, that is, the correlation with the security device. The correlation refers to: if the register is related to the security device, the ...
specific Embodiment approach S2
[0426] The feature of the embodiment S2 is: under the RISC-V system, the memory area boundary information is composed of memory address values, and the first type of instruction execution and interrupt / abnormal generation are respectively transferred to the same transfer area, preferably, transferred to the common code location, and record the information required by the security device and the state data required by the security device through a dedicated storage facility. The preferred storage facility in this embodiment is: a dedicated register. The two can be transferred to the same address or different addresses in the common transit area, and this production method is preferably transferred to the common address.
[0427] Implementation of the safety device:
[0428] S-B-A1. Set up a special register group for recording the information required to ensure the effectiveness of the safety device, which is used to record various memory area boundary information, interrupt si...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com