Memory protection method based on RISC-V
A RISC-V and memory technology, applied in the protection of internal/peripheral computer components, instruments, electrical digital data processing, etc., can solve the problems of no memory protection, data privacy and security threats, etc., to ensure data privacy and Security, the effect of preventing memory from being accessed and tampered with by malicious programs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] combined with figure 1 As shown, a RISC-V-based memory protection method includes:
[0026] Step 1. The RISC-V chip device has developed n APP applications, and there is interaction between APP applications;
[0027] Step 2. Divide the memory area of the RISC-V chip into n+1 mutually independent areas. The first n areas correspond to n APP applications, and the n+1th area is a shared memory area, which can be accessed by any APP application. , the shared memory area is used for data interaction between APP applications;
[0028] Step 3, configure the RISC-V privileged instruction set, the memory control register configuration application APP1 has access rights to memory area 1 and memory area n+1 as RWX=111 (R indicates degree authority, W indicates write authority, and X indicates executable authority , 1 means permission, 0 means no permission), the access right to other remaining memory is RWX=000;
[0029] Step 4. Configure the RISC-V privileged instruction set...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

