Unlock instant, AI-driven research and patent intelligence for your innovation.

Control function based on requesting master id and a data address within an integrated system

An integrated system and identifier technology, applied in memory systems, electrical digital data processing, hardware monitoring, etc., can solve problems such as difficult to avoid unauthorized access to storage space compressed data, difficult to control content or access to other sensitive data, etc.

Inactive Publication Date: 2005-07-27
INT BUSINESS MASCH CORP
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While allowing sharing of resources such as memory, this approach makes it difficult to control access to content or other sensitive data within the integrated system
For example, when using a large common memory pool (memory pool) in an integrated design, become difficult to avoid the memory space that is protected such as is provided by a transport demultiplexer (transport demultiplexer) to the decoder of a set-top box Unauthorized access to compressed data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control function based on requesting master id and a data address within an integrated system
  • Control function based on requesting master id and a data address within an integrated system
  • Control function based on requesting master id and a data address within an integrated system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Figure 1 shows a traditional active party 110 with multiple internal functions 1 、110 2 、110 3 ...110 n The integrated equipment is represented by 100 as a whole. Active side 110 1 A processor is shown having a processor core 112 and a memory management unit 114 . Internal Active Party 110 1 、110 2 、110 3 ...110 n Connected in this example to a storage subsystem 120, which includes bus control logic 130 for a shared bus. Those skilled in the art will appreciate that although bus controller 130 is shown as being within the storage subsystem, it may alternatively be located outside of subsystem 120 .

[0028] The bus control unit 130 coordinates and consolidates requests from slaves within the integrated device. For example, a first slave may include an external bus controller 140 connected to an external non-volatile memory 150 such as flash memory having a public memory portion 155 . A second slave, the memory controller 160, is connected to an external volat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access control function (440) for an integrated system (400) is provided which determines data access based on the master id of a requesting master (410) within the system (400) and the address of the data. The access control function (440) can be inserted, for example, into the data transfer path between bus control logic (430) and one or more slaves (420). In addition to determining whether to grant access to the data, the access control function (440) can further qualify the access by selectively implementing encryption and decryption (470) of data, again dependent on the data authorization level for the particular functional master (410) initiating the request for data.

Description

[0001] Cross References to Related Applications [0002] This application contains subject matter related to that of the following applications, each of which is assigned to the assignee of this application and filed on the same date as this application. Each of the following applications is hereby incorporated by reference in its entirety. [0003] - "Control Function with Multiple Security States for Facilitating Secure Operation of an Integrated System", inventor Foster et al., US Patent Application Serial No. 10 / 125,115, filed April 18, 2002. [0004] - "Control Function Implementing Selective Transparent Data Authentication Within an Integrated System", inventor Foster et al., US Patent Application Serial No. 10 / 125,708, filed April 18, 2002. [0005] - "Initializing, Maintaining, Updating and Recovering Secure Operation Within an Integrated System Employing a Data Access Control Function", inventor Foster et al., US Patent Application Serial No. 10 / 125,803, filed April 18...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F12/14G06F13/36G06F21/60
CPCG06F21/6218G06F21/85G06F2221/2143G06F21/78G06F12/1483G06F2221/2129G06F2221/2115G06F2221/2107G06F2221/2141G06F11/30G06F12/14H04L9/32
Inventor E·K·埃文斯E·M·福斯特D·E·富兰克林W·E·霍尔
Owner INT BUSINESS MASCH CORP