METHOD FOR ENFORCING RESOURCE ACCESS CONTROL IN COMPUTER SYSTEMS
    1.
    发明申请
    METHOD FOR ENFORCING RESOURCE ACCESS CONTROL IN COMPUTER SYSTEMS 有权
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US20120079590A1

    公开(公告)日:2012-03-29

    申请号:US12890040

    申请日:2010-09-24

    IPC分类号: G06F12/14

    摘要: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    摘要翻译: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。

    Method For Enforcing Resource Access Control In Computer Systems
    2.
    发明申请
    Method For Enforcing Resource Access Control In Computer Systems 审中-公开
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US20140298408A1

    公开(公告)日:2014-10-02

    申请号:US14304307

    申请日:2014-06-13

    IPC分类号: H04L29/06

    摘要: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    摘要翻译: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。

    METHOD, APPARATUS, SYSTEM FOR QUALIFYING CPU TRANSACTIONS WITH SECURITY ATTRIBUTES
    3.
    发明申请
    METHOD, APPARATUS, SYSTEM FOR QUALIFYING CPU TRANSACTIONS WITH SECURITY ATTRIBUTES 有权
    方法,装置,用于对具有安全属性的CPU交易进行质量评估的系统

    公开(公告)号:US20140282819A1

    公开(公告)日:2014-09-18

    申请号:US13828676

    申请日:2013-03-14

    IPC分类号: G06F21/62

    CPC分类号: G06F21/74 G06F21/57 G06F21/78

    摘要: Method, apparatus, and system for qualifying CPU transactions with security attributes. Immutable security attributes are generated for transactions initiator by a CPU or processor core that identifying the execution mode of the CPU/core being trusted or untrusted. The transactions may be targeted to an Input/Output (I/O) device or system memory via which a protected asset may be accessed. Policy enforcement logic blocks are implemented at various points in the apparatus or system that allow or deny transactions access to protected assets based on the immutable security attributes generated for the transactions. In one aspect, a multiple-level security scheme is implemented under which a mode register is updated via a first transaction to indicate the CPU/core is operating in a trusted execution mode, and security attributes are generated for a second transaction using execution mode indicia in the mode register to verify the transaction is from a trusted initiator.

    摘要翻译: 用于对具有安全属性的CPU事务进行限定的方法,设备和系统。 由CPU或处理器核心为事务发起者生成不可变的安全属性,用于识别CPU /核心被信任或不可信任的执行模式。 这些事务可以被定向到可被访问受保护资产的输入/输出(I / O)设备或系统存储器。 策略执行逻辑块在设备或系统中的不同点实现,其允许或拒绝事务基于为事务生成的不可变安全属性而访问被保护资产。 在一个方面,实现多级安全方案,在该级别下,通过第一事务来更新模式寄存器以指示CPU /核心以可信执行模式运行,并且使用执行模式标记为第二事务生成安全属性 在模式寄存器中验证事务来自可信发起者。

    Method for enforcing resource access control in computer systems
    4.
    发明授权
    Method for enforcing resource access control in computer systems 有权
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US08789170B2

    公开(公告)日:2014-07-22

    申请号:US12890040

    申请日:2010-09-24

    IPC分类号: G06F12/14

    摘要: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    摘要翻译: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。

    INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC)
    7.
    发明申请
    INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) 有权
    将访问控制功能纳入芯片系统(SoC)

    公开(公告)号:US20140137231A1

    公开(公告)日:2014-05-15

    申请号:US13995659

    申请日:2011-12-21

    IPC分类号: G06F21/76

    CPC分类号: G06F21/76 G06F13/385

    摘要: In one embodiment, the present invention includes a system on a chip (SoC) that has a first agent with an intellectual property (IP) logic, an interface to a fabric including a target interface, a master interface and a sideband interface, and an access control plug-in unit to handle access control policy for the first agent with respect to incoming and outgoing transactions. This access control plug-in unit can be incorporated into the SoC at integration time and without any modification to the IP logic. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,本发明包括具有知识产权(IP)逻辑的第一代理的芯片系统(SoC),包括目标接口,主接口和边带接口的结构的接口,以及 访问控制插件单元来处理关于传入和传出事务的第一代理的访问控制策略。 该访问控制插件单元可以集成在SoC中,并且不对IP逻辑进行任何修改。 描述和要求保护其他实施例。