Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Memory isolation method, isolation check circuit and CPU chip

A technology for checking circuits and memory isolation. It is applied in the field of virtual machine security and can solve problems such as reducing system memory performance, inability to isolate memory access, and inability to completely prevent virtual machine managers from accessing memory.

Pending Publication Date: 2020-10-30
HYGON INFORMATION TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method has the following disadvantages: memory encryption and decryption will reduce the performance of the system accessing memory; it cannot completely prevent the virtual machine manager from accessing the encrypted memory of the virtual machine; memory access cannot be isolated between different applications of the same virtual machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory isolation method, isolation check circuit and CPU chip
  • Memory isolation method, isolation check circuit and CPU chip
  • Memory isolation method, isolation check circuit and CPU chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Exemplary embodiments of the present disclosure will be described below with reference to the accompanying drawings. In the interest of clarity and conciseness, not all features of an actual implementation are described in this specification. It should be understood, however, that many implementation-specific decisions can be made in developing any such actual implementation in order to achieve the developer's specific goals, and that these decisions may vary from implementation to implementation .

[0055] Here, it should be noted that, in order to avoid obscuring the present disclosure due to unnecessary details, only the device structure closely related to the solution according to the present disclosure is shown in the drawings, and the relationship with the present disclosure is omitted. Little other details.

[0056] It is to be understood that the present disclosure is not limited to only the described embodiments as described below with reference to the accomp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a memory isolation method which comprises the following steps: receiving a memory access request which comprises an access address of a memory page requested to be accessed; searching a table entry corresponding to the access address in a memory paging protection information table, wherein the index value of the table entry corresponding to the access address is determinedaccording to the access address; and performing isolation check on the memory access request based on the access address and the table entry, and when the isolation check succeeds, allowing the memory page to be accessed by the access request. The memory isolation method at least has one of the following technical effects: the address space is divided into the memory pages equal in size in a paging mode, the number of the memory pages can meet the requirement for the number of security virtual machines or security applications of the virtual machines, the index value of the lookup table itemis determined according to the access address in the access request, and the lookup rate of the table item can be remarkably increased.

Description

technical field [0001] The present disclosure relates to the technical field of virtual machine security, and in particular, to a memory isolation method, an isolation check circuit and a CPU chip. Background technique [0002] Virtual machine technology refers to the technology of simulating a complete computer system with complete hardware system functions and running in a completely isolated environment in a set of computer equipment. When creating a virtual machine in a computer, part of the memory capacity of the physical machine needs to be used as the memory capacity of the virtual machine, and the security of the virtual machine's memory operation directly determines the security of the virtual machine's operation. Existing virtualization technologies can implement encryption of the physical memory of a virtual machine manager (Hypervisor) and the physical memory of each virtual machine (Virtual Machine) using different keys. The key can only be managed by a special...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455G06F12/02
CPCG06F9/45558G06F12/0292G06F2009/45587
Inventor 姜莹
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products