Data processor

A data processor and register technology, applied in the field of data security, to achieve the effect of simplifying and efficient stack operations

Active Publication Date: 2017-04-26
C SKY MICROSYST CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing data processor security protection mechanism lacks hardware isolation protection for sensitive information. Therefore, it is necessary to provide a data processor-based underlying hardware protection mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processor
  • Data processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] The invention provides a data processor, such as figure 1 As shown, the data processor includes a trusted kernel 1 and an untrusted kernel 2, and the trusted kernel 1 includes a trusted kernel common user stack 12, a trusted kernel superuser stack 11 and a trusted kernel control register 13; Described untrusted kernel 2 comprises untr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processor. The data processor comprises a trusted kernel and a non-trusted kernel. The trusted kernel comprises a trusted kernel normal user stack, a trusted kernel superuser stack and a trusted kernel control register. The non-trusted kernel comprises a non-trusted kernel normal user stack, a non-trusted kernel superuser stack and a non-trusted kernel control register. The trusted kernel and the non-trusted kernel share public resources, and the public resources can be accessed by the trusted kernel and the non-trusted kernel. According to the data processor, an underlying hardware protection mechanism is provided for data security through design of a virtual kernel, and a user mode of a current kernel does not need to be considered in a process of returning to the current kernel through a mechanism for storing current scenes in the current kernel superuser stack in a unified way during kernel switching, so that the stack operation is simplified and efficient.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data processor. Background technique [0002] In the field of mobile Internet and Internet of Things, the system security of data processors is becoming more and more important. Traditional software-based security protection cannot provide sufficient security for the system in many cases. Hackers can attack the operating system and thus Bypassing software protection, attacking or stealing sensitive software and hardware resources. [0003] The traditional data processor security protection mechanism is to distinguish the use rights of registers and the range of instructions that can be executed through super users and ordinary users, rather than hardware isolation protection, because super users and ordinary users control access rights more by operation The system is completed, so this traditional security mechanism is more inclined to protect at the software level. Onc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/74
CPCG06F21/6245G06F21/74G06F21/52G06F21/556
Inventor 江鹏
Owner C SKY MICROSYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products