Data processing method and system, access control method and system, device, equipment and storage medium

A data processing and data storage area technology, applied in the computer field, can solve problems such as memory data being tampered with

Pending Publication Date: 2020-05-12
HYGON INFORMATION TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor found through research that although there are various data securi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and system, access control method and system, device, equipment and storage medium
  • Data processing method and system, access control method and system, device, equipment and storage medium
  • Data processing method and system, access control method and system, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] As mentioned above, in order to prevent malicious programs from obtaining the plaintext information in the memory, the relevant hardware architecture and software architecture can be designed on the SOC according to the actual data security protection scheme to realize the security protection of the data in the memory. For example, the storage security encryption (Secure Memory Encryption, SME) technology may be used to implement encryption control on the memory, and encrypt the data in the storage, thereby protecting the plaintext information in the storage.

[0085] However, the inventor found through research that although there are various data security protection schemes, the data in the memory still has a security risk of being tampered with. For example, although the memory adopts SME technology, the security status attribute of the memory data may be tampered with, so that the data in the memory still has the risk of leakage.

[0086]In view of the above problem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method and system, an access control method and system, a device, equipment and a storage medium, and the method comprises the steps: dividing a storage region of a safety page table in a storage, and forbidding the replacement of safety page table information in the storage region of the safety page table from the storage region of the safety page table;in response to a storage area protection request, determining a security data storage region to which the storage area protection request points and a security mode adopted by the security data storage region; and based on the page table structure of the security data storage region, and updating corresponding security page table information in the security page table storage region, and settingcorresponding security mode state information in the security page table based on the security mode, the page table structure of the security page table storage area being suitable for indicating a mapping relationship between the virtual address and the physical address of the security data storage region. By adopting the scheme, the security of the data in the memory can be improved.

Description

technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular to a data processing and access control method, system, device, device, and storage medium. Background technique [0002] At present, in order to prevent malicious programs from obtaining the plaintext information in the memory, the relevant hardware architecture and software architecture can be designed on the SOC (System on Chip, System on Chip) according to the actual data security protection scheme, so as to realize the protection of the data in the memory. security protection. [0003] However, the inventor found through research that although there are various data security protection schemes, the data in the memory still has a security risk of being tampered with. Contents of the invention [0004] In view of this, the embodiments of this specification provide a data processing and access control method, system, device, device, and storage medi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78G06F12/14
CPCG06F21/78G06F12/1458
Inventor 姜莹王海洋
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products