Method and device for accessing shared memory, processor and computer system
A shared memory and security processor technology, applied in the field of accessing shared memory, can solve the problem of low memory usage efficiency, achieve the effect of improving usage efficiency and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
[0032] Introduce the related concepts involved in the embodiment of this application:
[0033] The security processor is a hardware security processor chip embedded in the processor SoC, which can provide security functions independent of the general-purpose processor.
[0034] Secure virtualization, using secure processors as trusted bases, provides an environment for securely running tenant programs on untrusted hosts.
[0035] Secure memory is isolated by hardware, usually provided by the processor SoC. Secure memory is used to protect some core memory data from access and modification by untrusted code.
[0036] Computer programs usually run based on virtual addresses, while hardware access uses physical addresses, so a hardware mechanism is required to complete address translation. Therefore...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


