Computer architecture and access control method, data interaction method and secure startup method in computer architecture

A computer and security technology, applied in computing, digital data processing, preventing unauthorized use of memory, etc., can solve problems such as system performance needs to be improved

Pending Publication Date: 2021-08-17
HYGON INFORMATION TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the system performance of computer architectures equipped with secure processors needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer architecture and access control method, data interaction method and secure startup method in computer architecture
  • Computer architecture and access control method, data interaction method and secure startup method in computer architecture
  • Computer architecture and access control method, data interaction method and secure startup method in computer architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0080] Virtualization technology can be applied to various scenarios. In particular, with the development of cloud services, virtualization technology has been more and more widely used in cloud service scenarios; in order to facilitate the understanding of virtualization technology, the following is based on virtualization Taking the cloud service of virtualization technology as an example, the virtualization technology is introduced.

[0081] refer to figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a computer architecture and an access control method, a data interaction method and a safe starting method in the computer architecture. The computer architecture comprises a plurality of processor cores, a bus connected with the processor cores, a main bridge connected with the bus and a memory connected with the main bridge. At least one processor core in the plurality of processor cores is a secure processor core, and an access address generated by the secure processor core is a secure access address; at least one processor core in the plurality of processor cores is a common processor core, an access address generated by the common processor core is a common access address, and the security access address is different from the common access address; the security processor core and the common processor core perform data interaction with the main bridge through the bus; and the main bridge executes data access to the memory based on the safe access address and the common access address transmitted by the bus, and the computer architecture improves the performance of the system.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of software security, and in particular to a computer architecture and its internal access control, data interaction and security startup methods. Background technique [0002] With the development of information technology, especially the development and popularization of cloud computing technology, more and more customers deploy their business systems on the cloud, thus making services related to cloud information security such as electronic signatures, electronic contracts, online payments and The importance of digital certification, etc. is becoming more and more prominent. How to build a credible digital security platform has become the technical focus of people's attention. [0003] As a computer technology applied to the cloud, virtualization technology can virtualize multiple virtual machines (Virtual Machine, VM) through the host to realize efficient utilization of the har...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F13/40G06F13/16G06F12/14G06F12/06
CPCG06F13/404G06F13/1673G06F12/0646G06F12/1408G06F12/1416
Inventor 姜新应志伟
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products