JPS5992498A - Memory control circuit - Google Patents

Memory control circuit

Info

Publication number
JPS5992498A
JPS5992498A JP57201903A JP20190382A JPS5992498A JP S5992498 A JPS5992498 A JP S5992498A JP 57201903 A JP57201903 A JP 57201903A JP 20190382 A JP20190382 A JP 20190382A JP S5992498 A JPS5992498 A JP S5992498A
Authority
JP
Japan
Prior art keywords
access
memory
main memory
block
ram1
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP57201903A
Other languages
Japanese (ja)
Inventor
Fusao Otsuka
大塚 房夫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Priority to JP57201903A priority Critical patent/JPS5992498A/en
Publication of JPS5992498A publication Critical patent/JPS5992498A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To protect the resource on a memory in an effective and assured way with a simple circuit constitution by reading out the application propriety display bit corresponding to the relevant address region after a user gives an access to a main memory and then deciding the validity of the memory access under execution. CONSTITUTION:For a user who is going to use a computer, the information showing the propriety of the access to each block is set to an exclusive bit in an RAM1 corresponding to each block in the form of 0 or 1. Then a byte in the RAM1 is selected by address lines A16-A10 and supplied to a multiplexer 2 as soon as an access is given to a main memory 7. Furthermore a data line showing the application propriety of a block containing the memory access address under execution is selected among 8 data lines supplied to the multiplexer 2 through address lines A12-A10. When the access is incapable to the corresponding exclusive bit in the RAM1, the action on of an acknowledge generating circuit 6 is inhibited. Then the generation of a fault is informed to a CPU.

Description

【発明の詳細な説明】 本発明は、メモリ内情報を不当なアクセスから保護する
ための簡単なメモリ管理回路に則する。
DETAILED DESCRIPTION OF THE INVENTION The present invention is based on a simple memory management circuit for protecting in-memory information from unauthorized access.

保護機能をもたな込メモリは、不当アクセスによって、
データの機密が鼎洩した夛、データが破壊されたカする
恐れがあり、システムの信頼性向上の支障となる。
The memory that has a protection function can be damaged by unauthorized access.
There is a risk that the confidentiality of data may be leaked or data may be destroyed, which will hinder the improvement of system reliability.

本発明の目的は簡単容易に実施できるメモリ保護用の管
理回路を提供することにある。
An object of the present invention is to provide a management circuit for memory protection that can be easily implemented.

上記目的を達成するために本発明においては、主メモリ
を多数の等しい大きさの領域に分割し、メモリ管理のた
めに別に設けたRAMの各ビットを、それぞれ前記各等
分割領域に独自専門忙対応させ、各ビットの値をO8に
よって、それぞれの領域の各ユーザに対する使用の可否
を表示するように設定させることとし、ユーザが主メモ
リをアクセスした際、同時に当該アドレス領域に対応す
る前記使用可否表示ビットも読出させ、実行中のメモリ
アクセスの有効性を判定させるようにした。
In order to achieve the above object, the present invention divides the main memory into a large number of equally sized areas, and each bit of a RAM separately provided for memory management is assigned a unique specialized function to each of the equally divided areas. The value of each bit is set by O8 to display the availability of each area for each user, and when a user accesses the main memory, the usage availability corresponding to the address area is displayed at the same time. The display bit is also read to determine the validity of the memory access being executed.

第1図は本発明の一実施例を示し、1は主メモリ管理用
のRAM、2はマルチプレクサ、3はデコーダ、4はレ
シーバ、5は端子、6はアクノリッジ発生回路、7は主
メモリである。主メモリ7は第2図に示すように論理的
に等しい大きさのメモリ領域(以後ブロックとよぶ、第
2図に示した例では1ブロツクは1キロバイトkBであ
る)に分割されておシ、その時コンピュータを利用しよ
うとしているユーザが、それぞれのブロックにアクセス
することの可否を示す情報が、各ブロックに対応するR
A、M1中の独自専用のビットに、0または1として、
セットされてbる。主メモリ7をアクセスする場合、第
1図に示すように、それと同時にアドレス’ff9−A
l6〜A、。によってRAMI内の1バイトが選択され
マルチプレクサ2に入力される。第1図に示すように、
さらにアドレス線A、12〜A、。によりマルチプレク
サ2に入力した8本のデータ憩のうち、実行中のメモリ
アクセスアドレスを含むブロックの使用可否を示す1本
のデータ線が選択され、マルチプレクサ2の端子5に、
使用(アクセス)可否が2値情報として出力され、メモ
リ装置の中のアクノリッジ発生回路6を制御する。RA
 M I中の該当専用ビットにアクセス不可とセットさ
れていた時は、アクノリッジ発生回路乙の動作は禁止さ
れ、CPUに異常が知らされる。第2図中、RAMI内
の第にバイト第jビットは主メモリ7を1キロ(正確に
は210)バイトずつに等分割した主メモリ7のブロッ
クM(1)の使用可否を示す。ここにi = 8に十j
 、 2N−1≧1≧07≧j≧0 なお第1図かられかるように、RAM1に情報を設定す
ることは、O8のデータ参照時、かつRAMIを通常の
メモリとみなして、上位アドレス線A+t # A、8
でデコーダ3を介してRAM1を選択し、レシーバ4の
ゲートを開−たときに限り可能である。この様にすれば
、RAMの各ビットに主メモリ各ブロックの使用可否を
代理表示させることにより、個々のユーザプログラムご
とに使用可能なメモリ領域を適宜変更自在釦制限できる
FIG. 1 shows an embodiment of the present invention, in which 1 is a RAM for main memory management, 2 is a multiplexer, 3 is a decoder, 4 is a receiver, 5 is a terminal, 6 is an acknowledge generation circuit, and 7 is a main memory. . As shown in FIG. 2, the main memory 7 is logically divided into memory areas of equal size (hereinafter referred to as blocks; in the example shown in FIG. 2, one block is 1 kilobyte KB). Information indicating whether the user who is trying to use the computer at that time can access each block is displayed in the R corresponding to each block.
A, set the unique bit in M1 as 0 or 1,
It is set and b. When accessing the main memory 7, as shown in FIG.
l6~A,. 1 byte in RAMI is selected and input to multiplexer 2. As shown in Figure 1,
Furthermore, address lines A, 12-A,. Among the eight data lines input to the multiplexer 2, one data line indicating the availability of the block containing the memory access address being executed is selected, and is sent to the terminal 5 of the multiplexer 2.
The availability of use (access) is output as binary information, which controls the acknowledge generation circuit 6 in the memory device. R.A.
When the corresponding dedicated bit in MI is set to be inaccessible, the operation of the acknowledge generation circuit B is prohibited and the CPU is notified of the abnormality. In FIG. 2, the j-th bit of the first byte in RAMI indicates whether block M(1) of the main memory 7, which is equally divided into 1 kilobyte (210 bytes to be exact) each, can be used. Here i = 8 to 10j
, 2N-1≧1≧07≧j≧0 As shown in FIG. A+t # A, 8
This is possible only when the RAM 1 is selected via the decoder 3 and the gate of the receiver 4 is opened. In this way, by having each bit of the RAM represent the usability of each block of the main memory, it is possible to restrict the usable memory area for each user program with a changeable button as appropriate.

以上説明したように本発明によれば、簡単な回路構成と
操作で、メモリ上の資源を有効、確実に保護し、システ
ムの信頼性向上に効果がある。
As described above, according to the present invention, with a simple circuit configuration and operation, memory resources can be effectively and reliably protected and system reliability can be improved.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の一実施例図、第2図は本発明に係るメ
モリ管理概念説明図である。 1・・・RAM、2・・・マルチプレクサ、3・・・デ
コーダ、4・・・レシーバ、6・・・アクノリッジ発生
回路。 7・・・主メモリ。 才 lc8 オ 2 面 NKB
FIG. 1 is a diagram showing an embodiment of the present invention, and FIG. 2 is a diagram illustrating the concept of memory management according to the present invention. DESCRIPTION OF SYMBOLS 1...RAM, 2...Multiplexer, 3...Decoder, 4...Receiver, 6...Acknowledge generation circuit. 7...Main memory. Sai lc8 Oh 2 side NKB

Claims (1)

【特許請求の範囲】[Claims] ユーザによる不当なアクセスから保護するため、主メモ
リを多数の領域VC等分割し、これら各領域に対応して
設けた独自専用ビットの値を、それぞれの領域の特定ユ
ーザによる使用の可否を制御するようにO8によって設
定させ、ユーザによp主メモリがアドレスされた際、同
時に当該アドレス領域に対応する前記専用ビットを読出
させ、アクセスの可否を制御させるようにしたことを特
徴とするメモリ管理回路。
In order to protect against unauthorized access by users, the main memory is divided into many equal areas (VC), and the values of unique dedicated bits provided for each of these areas are used to control whether or not each area can be used by a specific user. A memory management circuit characterized in that when the p main memory is addressed by a user, the dedicated bit corresponding to the address area is simultaneously read out, and whether access is possible or not is controlled. .
JP57201903A 1982-11-19 1982-11-19 Memory control circuit Pending JPS5992498A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP57201903A JPS5992498A (en) 1982-11-19 1982-11-19 Memory control circuit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP57201903A JPS5992498A (en) 1982-11-19 1982-11-19 Memory control circuit

Publications (1)

Publication Number Publication Date
JPS5992498A true JPS5992498A (en) 1984-05-28

Family

ID=16448729

Family Applications (1)

Application Number Title Priority Date Filing Date
JP57201903A Pending JPS5992498A (en) 1982-11-19 1982-11-19 Memory control circuit

Country Status (1)

Country Link
JP (1) JPS5992498A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0621998B2 (en) * 1983-06-22 1994-03-23 エヌ・シー・アール・インターナショナル・インコーポレイテッド Memory-management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0621998B2 (en) * 1983-06-22 1994-03-23 エヌ・シー・アール・インターナショナル・インコーポレイテッド Memory-management system

Similar Documents

Publication Publication Date Title
KR910020560A (en) Method and apparatus for encrypting address information stream used to protect program code
US4278837A (en) Crypto microprocessor for executing enciphered programs
US4465901A (en) Crypto microprocessor that executes enciphered programs
US5835594A (en) Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage
JPH01296361A (en) Memory card
CN112989397B (en) Data processing method and device for resisting side channel attack
CA1147823A (en) Crypto microprocessor for executing enciphered programs
EP0436365B1 (en) Method and system for securing terminals
CN115208701B (en) Data packet selective encryption method and device
CN104767761A (en) Cloud storage platform access control method and device
CN106845174B (en) Application authority management method and system under security system
CN114662135A (en) Data access method, computer device and readable storage medium
US10482290B1 (en) Virtual polymorphic hardware engine
CN105205409A (en) Method for preventing data leakage during memory multiplexing and computer system
JPS5992498A (en) Memory control circuit
CN116522355A (en) Electric power data boundary protection method, equipment, medium and device
CN112084536B (en) Key storage method and device based on blockchain
JPH0668740B2 (en) Data secret protection device in data processing device
CN111859351A (en) Method, system, server and storage medium for writing information into chip
CN112035379A (en) Method and device for using storage space, storage medium and electronic device
US20040073837A1 (en) Semiconductor device and in-circuit emulator using the same
US5901285A (en) Hierarchical erasure key protection for computer system data
JPS59220841A (en) Secrecy protection system
CN108875403B (en) File management method and device
CN114254272A (en) Method, device, electronic equipment and medium for protecting lsass process