Hardware based mandatory access control
    1.
    发明专利
    Hardware based mandatory access control 有权
    基于硬件的强制访问控制

    公开(公告)号:JP2010092465A

    公开(公告)日:2010-04-22

    申请号:JP2009200006

    申请日:2009-08-31

    CPC classification number: G06F12/1483 G06F21/629 G06F21/71

    Abstract: PROBLEM TO BE SOLVED: To provide a method and mechanisms for hardware-based mandatory access control. SOLUTION: Hardware mechanisms are provided for performing hardware-based access control of instructions to data. These hardware mechanisms associate an instruction access policy label with an instruction to be processed by a processor and associate an operand access policy label with the data to be processed by the processor. The instruction access policy label is passed along with the instruction via one or more hardware functional units of the processor. The operand access policy label is passed along with the data via the one or more hardware functional units of the processor. One or more hardware implemented policy engines associated with the one or more hardware functional units of the processor are utilized, to control access by instruction to the data, based on the instruction access policy label and the operand access policy label. COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种基于硬件的强制访问控制的方法和机制。 解决方案:提供硬件机制,用于执行对数据指令的基于硬件的访问控制。 这些硬件机制将指令访问策略标签与要由处理器处理的指令相关联,并将操作数访问策略标签与要由处理器处理的数据相关联。 指令访问策略标签通过处理器的一个或多个硬件功能单元与指令一起传递。 操作数访问策略标签通过处理器的一个或多个硬件功能单元与数据一起传递。 利用与处理器的一个或多个硬件功能单元相关联的一个或多个硬件实现的策略引擎,以基于指令访问策略标签和操作数访问策略标签来控制对数据的指令的访问。 版权所有(C)2010,JPO&INPIT

    2.
    发明专利
    未知

    公开(公告)号:FR2800480B1

    公开(公告)日:2006-04-07

    申请号:FR0012360

    申请日:2000-09-28

    Abstract: Access to files by accessing programs, where files comprise other files, programs and data is controlled. An initial access class is assigned to each file and to each accessing program. An access class comprises an integrity access class and a secrecy access class. An integrity access class comprises rules governing modification of data contained in files and a security access class comprises rules governing disclosure of data contained in files. An integrity access class comprises a set of rules for allowing the performance of a read function, and another set of rules for allowing the performance of write/execute function. An execute function comprises transferring and chaining, where chaining comprises starting another process running at potentially different secrecy and integrity access classes. A secrecy access class comprises a set of rules for allowing the performance of a write function, and another set of rules for allowing the performance of read/execute function. The respective access classes of the target file, target program, and accessing program are compared. If the comparison results meet the security requirements, the function is performed.

Patent Agency Ranking