System and method for inhibiting unauthorized access to protected memory region
An unauthorized, storage area technology, applied in the field of computer systems, can solve problems affecting system stability, changing management programs, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] A preferred embodiment of the invention, together with its advantages, will be better understood by referring to the drawings, wherein like numerals are used to indicate like or corresponding parts.
[0018] The present invention is a system, method and computer program product for inhibiting unauthorized access to protected storage areas. Given are two areas of memory, the protected area and the trusted area. Calls from the trusted zone into the protected zone will be allowed and executed. Unreliable calls, ie calls from a zone outside the trusted zone to enter the protected zone, will not be executed. These calls will return without allowing access to the protected area.
[0019] To determine the starting address of a call to enter a protected region, the current value of a link register is determined. If the current value of the link register falls within the trust zone, the call is executed and allowed to access the protected zone. However, if the current value ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com