Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for physical address-based security to determine target security

A technology of physical address and security configuration, applied in secure communication devices, electrical digital data processing, digital data processing components, etc., can solve problems such as system damage and loss of valuable data and software programs

Inactive Publication Date: 2005-02-09
GLOBALFOUNDRIES INC
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, unauthorized access to the driver that controls a device in the computer system, such as a modem device, can cause unauthorized operation of the modem, resulting in system damage
Furthermore, unauthorized access to system memory can result in loss of valuable data and software programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for physical address-based security to determine target security
  • Method and apparatus for physical address-based security to determine target security
  • Method and apparatus for physical address-based security to determine target security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Hereinafter, examples of implementation of the present invention will be described. In the interest of clarity, not all features of a practical implementation of the invention are described in this specification. It should of course be appreciated that in developing any such actual embodiment, many implementation-related determinations must be made in order to achieve the inventor's specific goals, such as compliance with system-related and Business-Related Restrictions. In addition, it should be understood that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of one with ordinary knowledge in the art having reference to the present disclosure.

[0024] Such as figure 1 As shown in , embodiments of the present invention provide memory access using a secure access system. Embodiments of the present invention provide a system of memory access tables to provide security during memory accesses initiated by one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and an apparatus for performing a virtual memory access. A software object is executed. A security level for the software object is established. A secondary table is established. A memory access request based upon the executing of the software object is received. At least one security level that corresponds to a segment in the secondary table is determined. A match between an execution security level and a security level associated with a segment being accessed is verified in response to an execution of the software object. A virtual memory address based upon the secondary table in response to a match between the execution security level and the security level associated with the segment being accessed is determined. A physical memory location corresponding to the virtual memory address is located. A portion of a memory based upon locating the physical memory location is accessed.

Description

technical field [0001] The present invention generally relates to computer system operations, and more particularly to a method and apparatus for performing security configuration based on physical addresses to provide a secure memory access. Background technique [0002] Computers or computer systems are an important element in many of today's industrial and home applications. There are many systems, such as manufacturing systems, power systems, product distribution systems, file systems, etc., that are powered by computer systems using processors. These processors perform various tests and execute multiple software programs that interact with each other. Input / output devices often allow the processing operations of the processor and software programs. A standard level of security is desired during processor operation so that certain software structures (eg, software objects, subroutines, stand-alone programs, etc.) can be controlled to give priority over other software s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00G06F11/28G06F12/00G06F12/14H04L9/00
CPCG06F12/1491G06F2221/2113G06F12/14
Inventor B·C·巴尼斯G·S·斯特劳金R·W·施密特
Owner GLOBALFOUNDRIES INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More