Unlock instant, AI-driven research and patent intelligence for your innovation.

Memory isolation device, memory isolation method and related equipment

A memory isolation and memory technology, applied in the computer field, can solve problems such as high security risks, and achieve the effect of memory isolation and security.

Pending Publication Date: 2021-05-21
HISILICON (SHANGHAI) TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the address mapping table used in the current memory isolation method, the protection of the address mapping table is based on a software mechanism. It is possible to modify the address mapping table to achieve corresponding access and crack the memory isolation. There is still a high security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory isolation device, memory isolation method and related equipment
  • Memory isolation device, memory isolation method and related equipment
  • Memory isolation device, memory isolation method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The embodiment of the present application provides a memory isolation device, a memory isolation method, and related equipment. By adding a memory scrambling unit, the memory scrambling unit and the trusted processor are independent of each other. The process identifier to scramble the data. To ensure the security of the written data. Hardware-level memory security isolation can be achieved. Since each application program corresponds to one or more processes, and each process corresponds to a unique process identifier, memory isolation between processes is realized.

[0050] Embodiments of the present application are described below in conjunction with the accompanying drawings. Those of ordinary skill in the art know that, with the development of technology and the emergence of new scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.

[0051] The terms "first", "second" and the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a memory isolation device, a memory isolation method and related equipment. The device comprises a memory scrambling unit and a memory controller; the memory scrambling unit is used for receiving a first process identifier, a first physical address and first data; the memory scrambling unit is also used for deriving a secret key based on the first process identifier and the first physical address to generate a first secret key; the memory scrambling unit is also used for scrambling the first data by using the first secret key to generate second data; and the memory controller is used for writing the second data into a storage area corresponding to the first physical address. In the embodiment of the invention, the data is scrambled according to the process identifier corresponding to each application through the independent memory scrambling unit. Hardware-level memory security isolation can be realized. The data security is improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a memory isolation device, a memory isolation method and related equipment. Background technique [0002] In the computer field, ensuring information security is very important. As the computer system environment becomes more and more complex and applications become more and more abundant, how to ensure the data security of users and each application program has become a research hotspot in the industry, and memory isolation is one of the key measures for security protection. [0003] At present, the commonly used memory isolation method is as follows: the virtual address space of each application (application) is isolated by creating a two-level address mapping table. If the address mapping relationship (address mapping table) is not known, the corresponding address mapping table cannot be obtained. Physical address, it is impossible to achieve the corresponding...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45583G06F2009/45587G06F9/455
Inventor 骆华敏
Owner HISILICON (SHANGHAI) TECH CO LTD