Computing system providing normal security and high security services
    1.
    发明授权
    Computing system providing normal security and high security services 有权
    计算系统提供正常的安全和高安全性的服务

    公开(公告)号:US08407783B2

    公开(公告)日:2013-03-26

    申请号:US12817387

    申请日:2010-06-17

    CPC classification number: G06F21/62 G06F21/74 G06F2221/2113

    Abstract: A computing system and method providing normal security services and high security services are disclosed. The computing system includes hardware resources, a processor core and an access right checker. The hardware resources are grouped into resource security levels. The processor, switching between a normal security and a high security state, assigns a user access right to a request. In comparison with the normal security state, user access right assigned in the high security state further allows the request to use the hardware resources of a higher resource security level. According to the assigned user access right and the resource security levels of required hardware resources of the request, the access right checker determines whether the request has the authority to use the hardware resources, and thereby, the access right checker executes the request or responds the issued request with an exception.

    Abstract translation: 公开了提供普通安全服务和高安全性服务的计算系统和方法。 计算系统包括硬件资源,处理器核心和访问权检查器。 硬件资源分为资源安全级别。 处理器在正常安全和高安全状态之间切换,为用户分配请求的访问权限。 与正常安全状态相比,在高安全性状态下分配的用户访问权限进一步允许请求使用较高资源安全级别的硬件资源。 根据分配的用户访问权限和请求的所需硬件资源的资源安全级别,访问权检查器确定请求是否具有使用硬件资源的权限,从而访问权检查器执行请求或响应 发出请求有异常。

    Computing System Providing Normal Security and High Security Services
    2.
    发明申请
    Computing System Providing Normal Security and High Security Services 有权
    提供正常安全和高安全性服务的计算系统

    公开(公告)号:US20110314538A1

    公开(公告)日:2011-12-22

    申请号:US12817387

    申请日:2010-06-17

    CPC classification number: G06F21/62 G06F21/74 G06F2221/2113

    Abstract: A computing system and method providing normal security services and high security services are disclosed. The computing system includes hardware resources, a processor core and an access right checker. The hardware resources are grouped into resource security levels. The processor, switching between a normal security and a high security state, assigns a user access right to a request. In comparison with the normal security state, user access right assigned in the high security state further allows the request to use the hardware resources of a higher resource security level. According to the assigned user access right and the resource security levels of required hardware resources of the request, the access right checker determines whether the request has the authority to use the hardware resources, and thereby, the access right checker executes the request or responds the issued request with an exception.

    Abstract translation: 公开了提供普通安全服务和高安全性服务的计算系统和方法。 计算系统包括硬件资源,处理器核心和访问权检查器。 硬件资源分为资源安全级别。 处理器在正常安全和高安全状态之间切换,为用户分配请求的访问权限。 与正常安全状态相比,在高安全性状态下分配的用户访问权限进一步允许请求使用较高资源安全级别的硬件资源。 根据分配的用户访问权限和请求的所需硬件资源的资源安全级别,访问权检查器确定请求是否具有使用硬件资源的权限,从而访问权检查器执行请求或响应 发出请求有异常。

Patent Agency Ranking