CN109901911A - A kind of information setting method, control method, device and relevant device - Google Patents

A kind of information setting method, control method, device and relevant device Download PDF

Info

Publication number
CN109901911A
CN109901911A CN201910060502.6A CN201910060502A CN109901911A CN 109901911 A CN109901911 A CN 109901911A CN 201910060502 A CN201910060502 A CN 201910060502A CN 109901911 A CN109901911 A CN 109901911A
Authority
CN
China
Prior art keywords
virtual machine
information
secure
security code
control block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910060502.6A
Other languages
Chinese (zh)
Other versions
CN109901911B (en
Inventor
杜朝晖
应志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haiguang Information Technology Co Ltd
Original Assignee
Haiguang Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haiguang Information Technology Co Ltd filed Critical Haiguang Information Technology Co Ltd
Publication of CN109901911A publication Critical patent/CN109901911A/en
Application granted granted Critical
Publication of CN109901911B publication Critical patent/CN109901911B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the present invention provides a kind of information setting method, control method, device and relevant device, the information setting method includes: to define security code control information structure for secure virtual machine, and the security code control information structure description has the whole original state of the secure virtual machine;Wherein, the virtual machine control block of the secure virtual machine remains with address field, the initial address of the security code control information structure for saving the secure virtual machine.The embodiment of the present invention can guarantee the integrality of secure virtual machine original state by defining security code control information structure for secure virtual machine.

Description

A kind of information setting method, control method, device and relevant device
Technical field
The present embodiments relate to virtual machine technique fields, and in particular to a kind of information setting method, control method, device And relevant device.
Background technique
By virtualization technology (Virtualization), host can virtually dissolve more virtual machine (Virtual Machine, VM), to maximumlly utilize the hardware resource of host;The every virtual machine virtually dissolved can be assigned memory (space) can be described as virutal machine memory for the memory of virtual machine distribution, and virutal machine memory is mainly used for task consumption and supports empty Quasi-ization.
In virtualization technology, virtual machine control block is the information for describing the corresponding virtual processor state of virtual machine Structure lacks however, virtual machine control block can only individually describe the state of a virtual processor to virtual machine integrality Description, not can guarantee the integrality of virtual machine original state.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of information setting method, control method, device and relevant device, with Guarantee the integrality of virtual machine original state.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:
A kind of information setting method, comprising:
Security code control information structure is defined for secure virtual machine, the security code control information structure description is State the whole original state of secure virtual machine;
Wherein, the virtual machine control block of the secure virtual machine remains with address field, for saving the secure virtual The initial address of the security code control information structure of machine.
The embodiment of the present invention also provides a kind of control method, comprising:
When that need to modify to the target information of the virtual machine control block of secure virtual machine, it is retrieved as the secure virtual The security code control information structure that machine defines;Wherein, the security code control information structure description has the secure virtual The whole original state of machine, and definition have the modification attribute of the information in the virtual machine control block of the secure virtual machine, institute Stating modification attribute includes that can modify and can not modify;The virtual machine control block of the secure virtual machine and security code control Message structure is stored in secure memory;
According to the security code control information structure, the modification attribute of the target information is determined;
If the modification attribute of the target information is that can modify, allow to modify the target information;
If the modification attribute of the target information is that can not modify, refusal modifies the target information.
The embodiment of the present invention also provides a kind of information setting device, comprising:
Definition module, for defining security code control information structure, the security code control letter for secure virtual machine Breath structure description has the whole original state of the secure virtual machine;
Wherein, the virtual machine control block of the secure virtual machine remains with address field, for saving the secure virtual The initial address of the security code control information structure of machine.
The embodiment of the present invention also provides a kind of control device, comprising:
Security code control information structure obtains module, for need to be to the target of the virtual machine control block of secure virtual machine When information is modified, it is retrieved as the security code control information structure that the secure virtual machine defines;Wherein, the safe generation Code control information structure description has the whole original state of the secure virtual machine, and definition has the void of the secure virtual machine The modification attribute of information in quasi- machine control block, the modification attribute include that can modify and can not modify;The secure virtual machine Virtual machine control block and the security code control information structure be stored in secure memory;
Attribute determination module is modified, for determining the target information according to the security code control information structure Modify attribute;
Allow modified module, if the modification attribute for the target information is that can modify, allows to modify the target letter Breath;
Refuse modified module, if the modification attribute for the target information is that can not modify, refusal modifies the target Information.
The embodiment of the present invention also provides a kind of core cpu, including control device described above.
The embodiment of the present invention also provides a kind of chip, including safe processor and core cpu described above.
The embodiment of the present invention also provides a kind of electronic equipment, including chip described above.
In the embodiment of the present invention, safe processor or host virtual machine can define security code control information to secure virtual machine Structure;The security code control information structure can describe, the whole original state of secure virtual machine, to preferably guarantee The integrality of secure virtual machine original state.
On the other hand, in control method provided in an embodiment of the present invention, security code control can be defined for secure virtual machine Message structure, the whole original state of secure virtual machine is described by security code control information structure, and defines secure virtual machine Virtual machine control block information modification attribute, wherein the security code control information structure and virtual machine of secure virtual machine Control block is stored in secure memory;To need the target information to the virtual machine control block of secure virtual machine to repair When changing, the embodiment of the present invention can obtain the modification category of the target information defined in the security code control information structure Property, and then when the modification attribute, which is, to be modified, it is believed that target information is revisable information in the virtual machine control block, To allow to modify the target information, when the modification attribute, which is, to be modified, it is believed that target information is the virtual machine Not revisable information in control block, to refuse to modify the target information, to realize the virtual machine control to secure virtual machine The modification control of information, prevents the information of the virtual machine control block of secure virtual machine to be maliciously tampered, promotes virtual machine in clamp dog The safety of data.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the system architecture schematic diagram of virtualized environment;
Fig. 2 is the another system configuration diagram of virtualized environment;
Fig. 3 is the micro-architecture schematic diagram of safety virtualization technology;
Fig. 4 is the schematic diagram that physical memory includes secure memory and common memory;
Fig. 5 is the flow chart of control method provided in an embodiment of the present invention;
Fig. 6 is the method flow diagram for determining virtual processor belonging to virtual machine control block;
Fig. 7 is the schematic diagram for determining virtual processor belonging to virtual machine control block;
Fig. 8 is the configuration diagram provided in an embodiment of the present invention with SMCR;
Fig. 9 is the block diagram of control device provided in an embodiment of the present invention;
Figure 10 is another block diagram of control device provided in an embodiment of the present invention;
Figure 11 is another block diagram of control device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As a kind of optional example, Fig. 1 shows the system architecture schematic diagram of virtualized environment, as shown in Figure 1, virtualization The system architecture of environment may include: CPU (Central Processing Unit, central processing unit) core 1, Memory control Device 2, memory 3;
Wherein, core cpu can configure virtual machine manager 11 by software form, and virtually be dissolved by virtualization technology More virtual machines 12, which can carry out memory management by virtual machine manager 11, such as by virtual machine manager 11 Manage the virutal machine memory of virtual machine 12;
Memory Controller Hub 2 is control memory 3, and makes the hardware of the swapping data of memory 3 and core cpu, memory 3 Partly or entirely it can be used as virutal machine memory, for virtual machine storage allocation space;In typical computer system, memory Controller 2 is responsible for processing memory access request, and for memory access request, it is interior whether the detectable caching of Memory Controller Hub 2 records The corresponding address of access request is deposited, if so, reading the corresponding data in the address from caching, otherwise, the page table for traversing memory is looked into It looks for the address and reads the corresponding data in the address.
System architecture shown in FIG. 1, which can be, realizes that traditional virtual technology is not to void based on traditional virtual technology Quasi- machine memory carries out safeguard protection, therefore the safety of virtual-machine data has threat in virutal machine memory, virtual in order to be promoted The safety of virtual-machine data in machine memory, the safety virtualization technology for being different from traditional virtual technology are come into being;
Safety virtualization technology is the virtualization technology that safeguard protection can be carried out to virutal machine memory, such as can be to virtual machine Memory encrypt etc. the virtualization technology of safeguard protection, certainly, safety virtualization technology can also for example to virutal machine memory into The virtualization technology of the protections such as row isolation;
It, can be to some or all virtual machines by safety virtualization technology in a kind of exemplary safety virtualization technology Virutal machine memory is encrypted, and different virtual machine memory is encrypted by different keys, and virtual machine manager can not also visit It asks key, to prevent physical host, virtual machine manager to the access of virtual-machine data in virutal machine memory and distort, is promoted The safety of virtual-machine data;
As a kind of optional example, it is based on safety virtualization technology, Fig. 2 shows the another system frameworks of virtualized environment Schematic diagram, referring to figs. 1 and 2, system shown in Figure 2 framework can also include: safe place compared to system shown in Figure 1 framework Manage device 4;
Safe processor 4 is the processor of the security related operations of the responsible processing and virtual machine that are specially arranged, for example, peace Full processor 4 can carry out the operation such as encryption and decryption to virutal machine memory;In embodiments of the present invention, virtual machine manager 11 is configurable The api interface communicated with safe processor 4 realizes the data interaction of virtual machine manager 11 and safe processor 4;
In embodiments of the present invention, Memory Controller Hub 2 can configure crypto engine 21, and crypto engine 21 can store key;
The key that safe processor 4 can be stored by crypto engine 21 is that some or all virutal machine memories are encrypted, And different virtual machine memory is encrypted by different keys;Optionally, for preferably pre- anti-replay-attack, virtual machine Different encryption parameters can be used in different physical address in memory;It should be noted that Replay Attack (Replay Attacks) Also known as replay attack, replay attack refer to that attacker sends the packet that a destination host had received, to reach fraud system Purpose mainly destroys the correctness of certification under authentication scene.
Exemplary, Fig. 3 shows the micro-architecture schematic diagram of safety virtualization technology, as shown in figure 3, safe processor is The processor of processing virutal machine memory encryption and decryption and starting virtual machine, safe place in SoC (System on Chip, system on chip) Reason device 4 can be interacted with core cpu 1 by api interface, safe processor 4 and Memory Controller Hub (memory controller) 2 By bus interaction, and run program (formula);
The component being related to inside SoC has core cpu 1, safe processor 4 and Memory Controller Hub 2;SOC exterior design There is memory 3 (such as dynamic random access memory DRAM etc.);Optionally, the data outside SOC can be encrypted ciphertext, For in plain text inside SOC;
Multiple VEK (Virtualization Encrypted Key, virtual machine encryption key) are respectively used to difference in Fig. 3 Virtual machine so that each different virtual machine (or host) can have a key independent, guarantee different virtual machine and Host can not all read the correct data of other virtual machines or host.
Optionally, in Fig. 2 and system shown in Figure 3 framework, core cpu, Memory Controller Hub, safe processor can be integrated in On SOC (System on Chip, system on chip);Obviously, SOC is only a kind of optional form of Computer Architecture, this hair Bright embodiment can also support the Computer Architecture of other forms, for example, the computer architecture that processor and south bridge are coupled Structure sets up the Computer Architecture etc. of south bridge and north bridge separately, at this point, core cpu, Memory Controller Hub, memory and safe handling Device can be disposed accordingly, herein not reinflated explanation.
Safety virtualization technology by different virtual machines use different keys so that different virtual machine or host it Between all cannot correctly interpret mutual internal storage data, reached the protection requirement of internal storage data confidentiality, but host is also It is to have permission the internal storage data of modification virtual machine without being found, lacks the protection of internal storage data integrality;
Based on this, memory 3 may include secure memory (space) and common memory (space) in the embodiment of the present invention, generally , secure memory it is highly-safe in common memory, for example, secure memory can use safety protecting mechanism;
Exemplary, Fig. 4 shows the schematic diagram that physical memory may include secure memory and common memory, can as one kind Choosing realizes that the embodiment of the present invention can (part that several region of memory can be memory be empty by several region of memory in memory Between, it is also possible to whole spaces of memory), it is labeled as secure memory;For example, passing through the interior of physical register record security memory The address range in region is deposited, is realized through hardware tab secure memory, and protected (in safety using safety protecting mechanism Usable encryption is deposited, the mechanism such as isolation are protected);Non-security memory in memory can be described as common memory, common memory one As do not protected using safety protecting mechanism;The safety of secure memory can be higher than common memory;
As a kind of optional example, the size of secure memory can be greater than common memory, and certainly, the embodiment of the present invention can also prop up The size for holding secure memory is smaller than common memory;It should be noted that secure memory is the portion of memory in example shown in Fig. 4 Divide region of memory, the embodiment of the present invention can also support that secure memory is the full memory region of memory;
Optionally, it can be described as secure virtual machine using the virtual machine of safety protecting mechanism, such as using the virtual of secure memory Machine can be described as secure virtual machine, and the virtual machine that safety protecting mechanism is not used can be described as General Virtual Machine, such as use common memory Virtual machine can be described as General Virtual Machine, in general, the safety of secure virtual machine can be higher than General Virtual Machine.
Optionally, it is realized if being transferred by virtual machine manager the management to virutal machine memory by safe processor, though The safety of virutal machine memory can be so promoted, but safe processor will (performance of safe processor be general as performance bottleneck It is weaker than general processor);When therefore to carry out memory management to virtual machine, compromise between security and performance, the embodiment of the present invention can A special virtual machine is designed to manage the memory that other virtual machines use, which can be described as host virtual machine, Other virtual machines in addition to host virtual machine can be described as from virtual machine.Optionally, the code of host virtual machine can by software form into Row is previously set, and safe processor is responsible for configuring host virtual machine, and during configuring host virtual machine, authorizes for host virtual machine To the memory management permission from virtual machine, work to be realized by host virtual machine from the memory management of virtual machine.
It, can for the access of the secure memory of secure virtual machine after isolating exclusive secure memory to secure virtual machine Realization is executed by Memory Controller Hub, (configuration of access authority can by the secure memory configuration access permission for secure virtual machine Realized by safe processor or host virtual machine) so that access request (access of the secure memory for secure virtual machine Request can be issued by host or virtual machine) only when meeting the access authority of secure memory of configuration, just allow to execute access Request.
In safety virtualization technology, virtual machine control block can describe the state of the corresponding virtual processor of virtual machine, but Virtual machine control block can only individually describe the state (such as original state) of a virtual processor, lack to virtual machine integrality Description;Meanwhile the data of each memory pages of virtual machine are only protected in initialization of virtual machine, but to data itself Address information is not protected, so that malicious virtual machine manager can arbitrarily can exchange virtual machine when virtual machine starts The distribution of primary data in memory;
Based on this, the present inventor proposes to improve safety virtualization technology: the embodiment of the present invention is virtual in addition to using Machine control block individually describes outside the state of single virtual processor, and safe processor or host virtual machine can also give secure virtual Machine defines security code control information structure (SCCS);The security code control information structure of secure virtual machine is pacified for describing The whole original state of full virtual machine, including but not limited to: the distribution situation in the virtual address space of secure virtual machine, safety The Address d istribution of all data of virtual machine original state, the virtual processor number and each virtual processing that secure virtual machine uses The information such as the original state of device;The embodiment of the present invention can preferably ensure that secure virtual by security code control information structure The integrality of machine original state.
It should be noted that the virtual machine control block of meaning of the embodiment of the present invention and it is not specific to a certain virtualization technology, and It is to be adaptable to all possible virtualization technology;In different virtualization technologies, the call of virtual machine control block may be simultaneously Disunity, such as be also likely to be virtual machine control structure.
As a kind of optional realization of the embodiment of the present invention, the embodiment of the present invention, which is removed, controls information knot using security code Structure describes the whole original state of secure virtual machine, can also define secure virtual machine by security code control information structure The modification attribute (modification attribute, which can be divided into, can modify and can not modify) of information in virtual machine control block, to pacify in host modifications When information in the virtual machine control block of full virtual machine, the modification category that the information is defined in security code control information can detect Property, so that host can just modify to the information of virtual machine control block when the modification attribute of the information is that can modify, with Prevent the information in host malicious modification virtual machine control block.
Optionally, Fig. 5 shows a kind of optional process of control method provided in an embodiment of the present invention, and this method can be by Core cpu is executed by microcommand form, or is executed by safe processor, and referring to Fig. 5, which may include:
Step S10, it obtains and application, the information modification application is modified to the information of the virtual machine control block of secure virtual machine It include: the target information of the virtual machine control block of the secure virtual machine of application modification.
Optionally, host (such as virtual machine manager) can apply for modifying the letter in the virtual machine control block of secure virtual machine Breath.
The embodiment of the present invention can be optional when that need to modify to the target information of the virtual machine control block of secure virtual machine Execute step S10.
Step S11, the security code control information structure that the secure virtual machine defines, the security code control are retrieved as Message structure description processed has the whole original state of the secure virtual machine, and definition has the virtual machine of the secure virtual machine The modification attribute of information in control block.
Optionally, the embodiment of the present invention can define security code control information structure, secure virtual machine for secure virtual machine Virtual machine control block and security code control information structure can be stored in the secure memory of secure virtual machine;To pass through Security code control information structure can define the whole original state of secure virtual machine and the virtual machine control of secure virtual machine The modification attribute of information in block;The modification attribute may include: that can modify and can not modify.
Optionally, the virtual machine control block of secure virtual machine can have multiple field informations, and the embodiment of the present invention can pacify The modification attribute of each field information of the virtual machine control block of secure virtual machine is defined in full code control information structure.
Step S12, according to the security code control information structure, the modification attribute of the target information is determined.
After obtaining the security code control information structure, the embodiment of the present invention can be from security code control information structure The middle modification attribute for obtaining the target information.
If the modification attribute of step S13, the described target information is that can modify, allow to modify the target information.
If the modification attribute of step S14, the described target information is that can not modify, refusal modifies the target information.
In control method provided in an embodiment of the present invention, security code control information structure can be defined for secure virtual machine, The whole original state of secure virtual machine is described by security code control information structure, and defines the virtual machine control of secure virtual machine The modification attribute of the information of clamp dog, wherein the security code control information structure and virtual machine control block of secure virtual machine store In secure memory;To, when needing the target information to the virtual machine control block of secure virtual machine to modify, the present invention Embodiment can obtain the modification attribute of the target information defined in the security code control information structure, and then described Modification attribute is when can modify, it is believed that target information is revisable information in the virtual machine control block, to allow to modify The target information, when the modification attribute, which is, to be modified, it is believed that target information is can not in the virtual machine control block The information of modification, to refuse to modify the target information, to realize to information in the virtual machine control block of secure virtual machine Modification control, prevents the information of the virtual machine control block of secure virtual machine to be maliciously tampered, promotes the safety of virtual-machine data.
Optionally, the process that the target information of the above-mentioned virtual machine control block to secure virtual machine is modified can be by CPU Core or safe processor execute;For example, core cpu can execute above-mentioned process by special instruction, for another example host can pass through peace Full processor modifies to the information in virtual machine control block, and safe processor can be controlled by query safe code at this time Message structure determines whether to modify to the information in virtual machine control block.
Optionally, the virtual machine control block of secure virtual machine may include: control zone (Control Area) information and shape State conservation zone (State Save Area) information;Control zone information may include the more of the virtual machine control block of secure virtual machine A control information, status save area information may include multiple status informations of the virtual machine control block of secure virtual machine;
The embodiment of the present invention can be each control of control zone information in the security code control information structure of secure virtual machine Information definition modification attribute processed is each status information definition modification attribute of status save area information, to realize definition safety The modification attribute of the information of the virtual machine control block of virtual machine.
Optionally, modification attribute can be the mark information of setting, and mark information can be indicated using bit value, and such as first The mark information of the bit value of value can indicate revisable modification attribute, and the mark information of the bit value of second value can indicate Not revisable modification attribute, the first value and second value can be with logics on the contrary, if the first value can be 1, and second value can be 0.
In a kind of optional setting, the status information in the settable status save area information of the embodiment of the present invention can not be repaired Change, such as the modification attribute of the status information in status save area information can be indicated with 0 bit value;And control zone is believed Control information in breath may be configured as to modify or can not modify, and can define according to actual needs and modify category in the information of control zone Property the control information that is indicated with 1 bit value, and the control information that modification attribute is indicated with 0 bit value.
As a kind of optional realization of disclosure of the embodiment of the present invention, optionally, the security code control of secure virtual machine Message structure processed can be defined by safe processor or host virtual machine by software, and be stored in the safety of secure virtual machine Memory;Preferably, each virtual machine control block of secure virtual machine can retain an address field (being located in secure memory), The address field can be used for saving the initial address of security code control information structure, to realize the void by secure virtual machine Quasi- machine control block is directed toward, the security code control information structure of secure virtual machine;
Optionally, virtual machine control block is generally corresponding to the physical page in memory, can be divided into multiple fields, than If each field can be several bytes, it is also possible to a bit;The void of secure virtual machine can be used in the embodiment of the present invention Reserve (deposit) field being not used by quasi- machine control block is as the address field, such as can appoint from Reserve field Meaning selects the successive byte of 8 alignment as the address field, controls information knot to save the security code of secure virtual machine The initial address of structure.
Further, the address field (initial address) in the virtual machine control block of same secure virtual machine can be initialized to Identical value (such as being initialized by safe processor or host virtual machine);The embodiment of the present invention controls information using security code Structure describes the whole original state of secure virtual machine, can provide the virtual machine environment of a safety, prevents from controlling virtual The hacker of machine management code steals the content of secure virtual machine;It is being not provided with security code control information structure Unify legislation peace In the case where the whole original state of full virtual machine, for the different virtual processors of same secure virtual machine, hardware is difficult to know Whether these other different virtual processors are originated from same secure virtual machine, at this point, if attacker creates a virtual place Manage device, the resource of another virtual processor is then accessed by this virtual processor, due to hardware can not identify this two Whether a virtual processor belongs to same secure virtual machine, can not just judge whether this access is illegal, so that this can not be prevented Kind unauthorized access;
And the embodiment of the present invention passes through setting security code control information structure, so that it may so that the void of different secure virtual machines Quasi- processor has different security code control information structures, so as to the virtual place for being not belonging to same secure virtual machine Unauthorized access between reason device is refused, and the Information Security of secure virtual machine is protected.
As a kind of optional realization, hardware (such as core cpu) can pass through the SCCS of detection different virtual machine control block direction It is whether identical, to determine and verify the different virtual processors whether different virtual machine control block belongs to same secure virtual machine, That is when the SCCS of different virtual machine control block direction is identical, the embodiment of the present invention thinks that different virtual machine control block belongs to same peace The different virtual processors of full virtual machine, a virtual machine control block of secure virtual machine can correspond to a void of secure virtual machine Quasi- processor;
Optionally, Fig. 6 shows the method flow of virtual processor belonging to determining virtual machine control block, side shown in Fig. 6 Method can be executed by core cpu by microcommand form, and referring to Fig. 6, this method process may include:
Step S20, at least two virtual machine control blocks are determined.
At least two virtual machine control block may belong to identical secure virtual machine, it is also possible to belong to different safety Virtual machine.
Step S21, the identical virtual machine control block of SCCS being directed toward is determined.
The initial address of the pointed SCCS of address field instruction may be present in virtual machine control block, and the embodiment of the present invention can lead to The address field for crossing virtual machine control block determines the SCCS that virtual machine control block is directed toward, if the address field of virtual machine control block Identical, then the SCCS that virtual machine control block is directed toward is identical, to can determine that the identical virtual machine control block of the SCCS of direction.
Step S22, the identical virtual machine control block of the SCCS of direction is determined as belonging to a secure virtual machine, and be directed toward The identical virtual machine control block of SCCS belong to belonging to secure virtual machine a virtual processor.
It is exemplary, as shown in fig. 7, being directed toward SCCS1, the ground of virtual machine control block 2 with the address field of virtual machine control block 1 Location field is directed toward SCCS1, and the address field of virtual machine control block 3 is directed toward SCCS2;It then can determine that virtual machine control block 1 and void Quasi- machine control block 2 is directed toward identical SCCS, and virtual machine control block 1 and virtual machine control block 2 belong to same secure virtual machine not Same virtual processor, for example, virtual machine control block 1 belongs to the virtual processor 11 of secure virtual machine 1, virtual machine control block 2 Belong to the virtual processor 12 of secure virtual machine 1;And due to virtual machine control block 3 be directed toward SCCS and virtual machine control block 1 and Virtual machine control block 2 is different, therefore virtual machine control block 3 and virtual machine control block 1 and virtual machine control block 2 belong to different peaces Full virtual machine, such as virtual machine control block 3 belong to the virtual processor 21 of secure virtual machine 2.
Optionally, for being not belonging to the virtual processor of same secure virtual machine, the embodiment of the present invention, which is rejected by, to be not belonging to Access between the virtual processor of same secure virtual machine, to further protect the data safety of secure virtual machine;And permit Permitted to belong to the access between the virtual processor of same secure virtual machine.
The embodiment of the present invention can limit the virtual machine control block of secure virtual machine and SCCS is in secure memory, so that empty Quasi- machine manager can not modify various control information and status information about secure virtual machine in virtual controlling block;As one kind Substitution realizes that the embodiment of the present invention can also support the partial information in virtual machine control block can be by host modifications, for example, in SCCS In can define allow by the information of the virtual machine control block of host modifications.
Optionally, the following table 1 shows the explanation of SCCS exemplary each field and field description, can refer to.
Table 1
Optionally, further, the embodiment of the present invention can further isolate safety in the secure memory of secure virtual machine It controls region of memory (Secure Memory Control Region, SMCR), it is empty to store safety by security control region of memory The virtual machine control block of quasi- machine, so that SMCR either virtual machine or host (such as virtual machine manager) can not access, and SMCR is accessed by safe processor or host virtual machine;
Optionally, common memory and secure memory are included in interior bag deposit, and is isolated in exclusive safety for secure virtual machine In the case where depositing, Fig. 8 shows the signal of the framework with SMCR, as shown in figure 8, the virtual machine control block of secure virtual machine is not It is safeguarded by the virtual manager of host, but the secure memory in secure virtual machine has further isolated SMCR, is deposited by SMCR The virtual machine control block of secure virtual machine is stored up, and realizes the virtual machine of management secure virtual machine by safe processor or host virtual machine Control block and page table;
Meanwhile the page table of secure virtual machine is stored in the secure memory of secure virtual machine, and the void by storing in SMCR The control register of quasi- machine control block, is directed toward the page table of secure virtual machine, the physics of secure memory can be managed by secure page table The mapping of address realizes the virtual machine physical address of secure virtual machine to the mapping of host (host) physical address.
In embodiments of the present invention, the page table of secure virtual machine can be protected that (exemplary, page table can be with by secure memory It is mapping page table of the virtual machine physical address to host-physical address), i.e., secure memory should at least store the page of secure virtual machine Table can also store the data of secure virtual machine certainly;The embodiment of the present invention can be described as security page by the page table that secure memory is protected Table.
It should be noted that the page table of meaning of the embodiment of the present invention can be such as virtual machine physical address to host-physical address Mapping page table, and be not specific to a certain virtualization technology, but be adaptable to all possible virtualization technology;In a kind of possibility Virtualization technology in, the page table of meaning of the embodiment of the present invention can be nested page table, correspondingly, by secure memory protect page Table is properly termed as the nested page table of safety;
Memory is usually to carry out memory management as unit of memory pages, and using multi-level page-table;It is saved in final stage page table Mapping of the virtual address to physical address, referred to as page table entry;In other page tables in addition to final stage page table, higher level's page table is in store Virtual address is to the mapping of junior's page table, referred to as page directory.
As it can be seen that in embodiments of the present invention, the virtual machine control block of secure virtual machine is located in security control region of memory, The initial address of the page table of secure virtual machine is located in secure memory;And for General Virtual Machine, the void of General Virtual Machine Quasi- machine control block is not located in secure memory (so not also being located in SMCR), and the initial address of the page table of General Virtual Machine It is not located in secure memory.
As a kind of optional realization, on the basis of the address range in secure memory region is indicated by physical register, this The address range of the settable specific physical register instruction security control region of memory with special sign position of inventive embodiments, For example, the address range of security control region of memory can be indicated by the specific physical register of a pair of special sign position, wherein The initial address of the specific physical register instruction security control region of memory of one special sign position, another special sign position The size of specific physical register instruction security control region of memory.
As can be seen that the embodiment of the present invention can use in the safety of safety protecting mechanism protection for secure virtual machine distribution It deposits, i.e., secure memory may include multiple secure memory regions;In the safety of at least one of the multiple secure memory region Security control region of memory can be isolated by depositing region, for storing the virtual machine control block of secure virtual machine, the multiple safety Non-security control region of memory in region of memory can be used at least storing the page table and security code control letter of secure virtual machine Structure is ceased, and the virtual machine control block of the secure virtual machine of security control region of memory storage may point to, non-security control memory The page table of the secure virtual machine of region storage.
As optional realization, secure memory region can be indicated address range by physical register, and indicate security control The specific physical register of the address range of region of memory has special sign position.
Address field (initial address) in the virtual machine control block of same secure virtual machine is initialized to identical When value (such as being initialized by safe processor or host virtual machine), due in embodiments of the present invention, the void of secure virtual machine Quasi- machine control block is stored in SMCR, in addition to safe processor (or host virtual machine), is able to access that without any equipment SMCR, therefore by the management code of setting safe processor or host virtual machine in secure virtual machine life cycle not modified address The data of field then can guarantee that the address field in the virtual machine control block of same secure virtual machine is initialized to identical value Afterwards, in the life cycle of entire secure virtual machine without any change, from regardless of same secure virtual machine virtual machine How control block adjusts change, the security code control information that may make the virtual machine control block of same secure virtual machine to be directed toward Structure is identical.
Described above is multiple example schemes provided in an embodiment of the present invention, each optional side of each example scheme introduction Formula can be combined with each other in the absence of conflict, cross reference, thus extend a variety of possible example schemes, these It is considered disclosure of the embodiment of the present invention, disclosed embodiment scheme.
Information provided in an embodiment of the present invention setting device is introduced below, device is arranged in information described below, Safe processor or host virtual machine be may be considered to realize and defining security code control information structure, the function of required setting fills It sets.The content of information setting device described below, can correspond to each other reference with above description.
Device is arranged in information provided in an embodiment of the present invention
Definition module (not shown), for defining security code control information structure, the safe generation for secure virtual machine Code control information structure description has the whole original state of the secure virtual machine;
Wherein, the virtual machine control block of the secure virtual machine remains with address field, for saving the secure virtual The initial address of the security code control information structure of machine.
Optionally, the identical virtual machine control block of security code control information structure of direction belongs to a secure virtual Machine, and the identical virtual machine control block of security code control information structure being directed toward belongs to a void of affiliated secure virtual machine Quasi- processor.
Optionally, the security code control information structure there is also defined in the virtual machine control block of the secure virtual machine Information modification attribute, the modification attribute includes that can modify and can not modify.
Control device provided in an embodiment of the present invention is introduced below, control device described below may be considered The core cpu control method that embodiment provides to realize the present invention, the functional device of required setting.Control device described below Content, reference can be corresponded to each other with above description.
Fig. 9 is the block diagram of control device provided in an embodiment of the present invention, and referring to Fig. 9, which may include:
Security code control information structure obtains module 100, for need to be to the virtual machine control block of secure virtual machine When target information is modified, it is retrieved as the security code control information structure that the secure virtual machine defines;Wherein, the peace Full code control information structure description has the whole original state of the secure virtual machine, and definition has the secure virtual machine Virtual machine control block in information modification attribute, the modification attribute includes that can modify and can not modify;The safety is empty The virtual machine control block and the security code control information structure of quasi- machine are stored in secure memory;
Attribute determination module 110 is modified, for determining the target information according to the security code control information structure Modification attribute;
Allow modified module 120, if the modification attribute for the target information is that can modify, allows to modify the target Information;
Refuse modified module 130, if the modification attribute for the target information is that can not modify, refusal modifies the mesh Mark information.
Optionally, the security code control information structure can define each of the virtual machine control block of secure virtual machine The modification attribute of field information.
Optionally, the virtual machine control block may include: control zone information and status save area information;The control zone Information includes multiple control information of the virtual machine control block, and the status save area information includes the virtual machine control block Multiple status informations;
To which the security code control information structure can define each control information definition of the promising control zone information Modification attribute, and, for the modification attribute that defines of each status information of the status save area information.
Optionally, the modification attribute of the control information of the control zone information may include that can modify and can not modify;Institute The modification attribute for stating status save area information can be that can not modify.
Optionally, revisable modification attribute can be indicated by the mark information of the first value, not revisable modification attribute It can be indicated by the mark information of second value, first value and second value logic are opposite.
Optionally, the mark information can be indicated by bit value.
Optionally, Figure 10 shows another block diagram of control device provided in an embodiment of the present invention, in conjunction with Fig. 9 and Figure 10 institute Show, which can also include:
Detection module 140, the security code control information structure for detecting at least two virtual machine control blocks direction are It is no identical;Wherein, the virtual machine control block of the secure virtual machine remains with address field, and the address field is for saving peace The initial address of the security code control information structure of full virtual machine;Address in the virtual machine control block of same secure virtual machine Field initialization is identical value, so that the security code control that the different virtual machine control block of same secure virtual machine is directed toward Message structure is identical;
Determining module 150, if the security code control information structure being directed toward at least two virtual machine control block It is identical, determine that the corresponding virtual processor of at least two virtual machine control block belongs to same secure virtual machine.
Optionally, Figure 11 shows another block diagram of control device provided in an embodiment of the present invention, in conjunction with Figure 10 and Figure 11 Shown, which can also include:
Allow access modules 160, if the security code at least two virtual machine control block to be directed toward controls information Structure is identical, allows the access between the corresponding virtual processor of at least two virtual machine control block;
Denied access module 170, if the security code at least two virtual machine control block to be directed toward controls information Structure is different, refuses the access between the corresponding virtual processor of at least two virtual machine control block.
Optionally, the embodiment of the present invention also provides a kind of core cpu, including control device described above.
Optionally, the embodiment of the present invention also provides a kind of chip, the chip can such as SoC chip, which may include Safe processor and core cpu described above.
Optionally, the embodiment of the present invention also provides a kind of electronic equipment, which may include core described above Piece.The electronic equipment can be terminal device, be also possible to server apparatus.
Although the embodiment of the present invention discloses as above, present invention is not limited to this.Anyone skilled in the art, not It is detached from the spirit and scope of the present invention, can make various changes or modifications, therefore protection scope of the present invention should be with right It is required that subject to limited range.

Claims (17)

1. a kind of information setting method characterized by comprising
Security code control information structure is defined for secure virtual machine, the security code control information structure description has the peace The whole original state of full virtual machine;
Wherein, the virtual machine control block of the secure virtual machine remains with address field, for saving the secure virtual machine The initial address of security code control information structure.
2. information setting method according to claim 1, which is characterized in that the security code control information structure phase of direction Same virtual machine control block belongs to a secure virtual machine, and the identical virtual machine of security code control information structure being directed toward Control block belongs to a virtual processor of affiliated secure virtual machine.
3. information setting method according to claim 1, which is characterized in that the security code control information structure is also fixed Justice has the modification attribute of the information in the virtual machine control block of the secure virtual machine, and the modification attribute is including that can modify and not It can modify.
4. a kind of control method, which is characterized in that based on defined in the described in any item information setting methods of claim 1-3 Security code control information structure, the control method include:
When that need to modify to the target information of the virtual machine control block of secure virtual machine, it is fixed to be retrieved as the secure virtual machine The security code control information structure of justice;Wherein, the security code control information structure description has the secure virtual machine Whole original state, and definition have the modification attribute of the information in the virtual machine control block of the secure virtual machine, described to repair Changing attribute includes that can modify and can not modify;The virtual machine control block of the secure virtual machine and the security code control information Structure is stored in secure memory;
According to the security code control information structure, the modification attribute of the target information is determined;
If the modification attribute of the target information is that can modify, allow to modify the target information;
If the modification attribute of the target information is that can not modify, refusal modifies the target information.
5. control method according to claim 4, which is characterized in that the security code control information structure definition is The modification attribute for stating the information in the virtual machine control block of secure virtual machine includes:
The security code control information structure defines the modification of each field information of the virtual machine control block of secure virtual machine Attribute.
6. control method according to claim 5, which is characterized in that the virtual machine control block includes: control zone information With status save area information;The control zone information includes multiple control information of the virtual machine control block, and the state is protected Deposit multiple status informations that area's information includes the virtual machine control block;
Definition has repairing for each field information of the virtual machine control block of secure virtual machine in the security code control information structure Changing attribute includes:
The security code control information structure defines the modification attribute that each control information of the promising control zone information defines, And the modification attribute that defines of each status information for the status save area information.
7. control method according to claim 6, which is characterized in that the modification category of the control information of the control zone information Property include that can modify and can not modify;The modification attribute of the status information of the status save area information is that can not modify.
8. control method according to claim 4, which is characterized in that revisable modification attribute is believed by the label of the first value Breath indicates that not revisable modification attribute indicates that first value and second value logic are opposite by the mark information of second value.
9. control method according to claim 8, which is characterized in that the mark information is indicated by bit value.
10. control method according to claim 4, which is characterized in that further include:
Whether the security code control information structure for detecting at least two virtual machine control blocks direction is identical;Wherein, the safety The virtual machine control block of virtual machine remains with address field, and the address field is used to save the security code control of secure virtual machine The initial address of message structure processed;Address field in the virtual machine control block of same secure virtual machine is initialized as identical Value, so that the security code control information structure that the different virtual machine control block of same secure virtual machine is directed toward is identical;
If the security code control information structure that at least two virtual machine control block is directed toward is identical, described at least two are determined The corresponding virtual processor of virtual machine control block belongs to same secure virtual machine.
11. control method according to claim 10, which is characterized in that further include:
If the security code control information structure that at least two virtual machine control block is directed toward is identical, allow described at least two Access between the corresponding virtual processor of virtual machine control block;
If the security code control information structure that at least two virtual machine control block is directed toward is different, refusal described at least two Access between the corresponding virtual processor of virtual machine control block.
12. the control method according to claim 4 or 10, which is characterized in that the secure memory also further isolates Security control region of memory, to store the virtual machine control block of the secure virtual machine;The non-security control of the secure memory Region of memory at least store the secure virtual machine page table and the security code control information structure;The secure virtual machine Virtual machine control block, be directed toward the page table of the secure virtual machine.
13. device is arranged in a kind of information characterized by comprising
Definition module, for defining security code control information structure for secure virtual machine, the security code controls information knot Structure describes the whole original state for having the secure virtual machine;
Wherein, the virtual machine control block of the secure virtual machine remains with address field, for saving the secure virtual machine The initial address of security code control information structure.
14. a kind of control device characterized by comprising
Security code control information structure obtains module, for need to be to the target information of the virtual machine control block of secure virtual machine When modifying, it is retrieved as the security code control information structure that the secure virtual machine defines;Wherein, the security code control Message structure description processed has the whole original state of the secure virtual machine, and definition has the virtual machine of the secure virtual machine The modification attribute of information in control block, the modification attribute include that can modify and can not modify;The void of the secure virtual machine Quasi- machine control block and the security code control information structure are stored in secure memory;
Attribute determination module is modified, for determining the modification of the target information according to the security code control information structure Attribute;
Allow modified module, if the modification attribute for the target information is that can modify, allows to modify the target information;
Refuse modified module, if the modification attribute for the target information is that can not modify, refusal modifies the target information.
15. a kind of core cpu, which is characterized in that including the control device described in claim 14.
16. a kind of chip, which is characterized in that including core cpu described in safe processor and claim 15.
17. a kind of electronic equipment, which is characterized in that including the chip described in claim 16.
CN201910060502.6A 2018-11-22 2019-01-22 Information setting method, control method, device and related equipment Active CN109901911B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2018114018390 2018-11-22
CN201811401839 2018-11-22

Publications (2)

Publication Number Publication Date
CN109901911A true CN109901911A (en) 2019-06-18
CN109901911B CN109901911B (en) 2023-07-07

Family

ID=66861836

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201910060494.5A Active CN109858265B (en) 2018-11-22 2019-01-22 Encryption method, device and related equipment
CN201910059800.3A Active CN109828827B (en) 2018-11-22 2019-01-22 Detection method, detection device and related equipment
CN201910060502.6A Active CN109901911B (en) 2018-11-22 2019-01-22 Information setting method, control method, device and related equipment

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201910060494.5A Active CN109858265B (en) 2018-11-22 2019-01-22 Encryption method, device and related equipment
CN201910059800.3A Active CN109828827B (en) 2018-11-22 2019-01-22 Detection method, detection device and related equipment

Country Status (1)

Country Link
CN (3) CN109858265B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348204B (en) * 2019-06-17 2023-05-16 海光信息技术股份有限公司 Code protection system, authentication method, authentication device, chip and electronic equipment
CN110380854A (en) * 2019-08-12 2019-10-25 南京芯驰半导体科技有限公司 For root key generation, partition method and the root key module of multiple systems
CN111045605B (en) * 2019-12-12 2023-10-20 海光信息技术股份有限公司 Technical scheme for improving system security by utilizing processor cache and security processor
CN111143900B (en) * 2019-12-24 2023-09-26 海光信息技术(苏州)有限公司 Data processing and access control method, system, device, equipment and storage medium
US11604671B2 (en) 2020-03-19 2023-03-14 Red Hat, Inc. Secure virtual machine and peripheral device communication
CN111984374B (en) * 2020-08-20 2021-07-23 海光信息技术股份有限公司 Method for managing secure memory, system, apparatus and storage medium therefor
CN111949376B (en) * 2020-08-24 2021-12-17 海光信息技术股份有限公司 Virtual machine system and method for virtual machine system
CN111949995B (en) * 2020-08-25 2021-07-16 海光信息技术股份有限公司 Host CPU architecture system and method for safely managing hardware resources
CN112363797B (en) * 2020-10-19 2022-04-05 海光信息技术股份有限公司 Virtual machine safe operation method, electronic equipment and storage medium
CN112363800B (en) * 2020-11-10 2023-03-07 海光信息技术股份有限公司 Network card memory access method, security processor, network card and electronic equipment
CN112363801B (en) * 2020-11-10 2022-10-21 海光信息技术股份有限公司 Virtual machine migration method, processing method, system, device, chip and medium
CN112433817B (en) * 2020-11-27 2022-11-25 海光信息技术股份有限公司 Information configuration method, direct storage access method and related device
CN112748984B (en) * 2020-12-28 2022-12-06 海光信息技术股份有限公司 Virtual machine data processing method, virtual machine data control method, processor, chip, device and medium
CN112540833B (en) * 2020-12-28 2022-11-11 海光信息技术股份有限公司 Process running method and device, processor, storage medium and electronic equipment
CN113342735B (en) * 2021-06-28 2024-04-16 海光信息技术股份有限公司 Processor chip and electronic equipment
CN113485785B (en) * 2021-06-28 2023-10-27 海光信息技术股份有限公司 Virtual trusted platform module realization method, secure processor and storage medium
CN114564724A (en) * 2021-12-30 2022-05-31 海光信息技术股份有限公司 Method and device for protecting memory integrity of virtual machine, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150143533A1 (en) * 2013-11-21 2015-05-21 Nxp B.V. Method of generating a structure and corresponding structure
CN106293873A (en) * 2016-07-29 2017-01-04 北京北信源软件股份有限公司 One accurately obtains the method for critical data position in virtual machine control block (VMCS)
CN106970823A (en) * 2017-02-24 2017-07-21 上海交通大学 Efficient secure virtual machine guard method and system based on nested virtualization
CN107341115A (en) * 2017-06-30 2017-11-10 联想(北京)有限公司 Virutal machine memory access method, system and electronic equipment
CN107368354A (en) * 2017-08-03 2017-11-21 致象尔微电子科技(上海)有限公司 A kind of secure virtual machine partition method
CN107562515A (en) * 2017-08-04 2018-01-09 致象尔微电子科技(上海)有限公司 A kind of method of the managing internal memory in virtualization technology

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050204357A1 (en) * 2004-03-15 2005-09-15 Ajay Garg Mechanism to protect extensible firmware interface runtime services utilizing virtualization technology
EP1811387A4 (en) * 2004-08-25 2016-04-13 Nec Corp Information communication device, and program execution environment control method
CN101719825A (en) * 2009-04-30 2010-06-02 中兴通讯股份有限公司 Method and system for realizing safe bifurcation call session in IP multimedia subsystem
CN102752301A (en) * 2012-07-04 2012-10-24 深圳市京华科讯科技有限公司 Data transmission system and data transmission method applied to virtualized environment
JP6324127B2 (en) * 2014-03-14 2018-05-16 三菱電機株式会社 Information processing apparatus, information processing method, and program
FR3020160B1 (en) * 2014-04-16 2017-08-11 Commissariat Energie Atomique SYSTEM FOR EXECUTING A CODE WITH BLIND HYPERVISION MECHANISM
US9454497B2 (en) * 2014-08-15 2016-09-27 Intel Corporation Technologies for secure inter-virtual-machine shared memory communication
CN104572488B (en) * 2015-02-13 2017-11-17 西安酷派软件科技有限公司 EMS memory management process, memory management device and terminal
CN106295267B (en) * 2015-06-09 2019-04-19 阿里巴巴集团控股有限公司 It is a kind of access electronic equipment physical memory in private data method and apparatus
CN106445628A (en) * 2015-08-11 2017-02-22 华为技术有限公司 Virtualization method, apparatus and system
CN105718794B (en) * 2016-01-27 2018-06-05 华为技术有限公司 The method and system of safeguard protection are carried out to virtual machine based on VTPM
CN107038128B (en) * 2016-02-03 2020-07-28 华为技术有限公司 Virtualization of execution environment, and access method and device of virtual execution environment
US10536274B2 (en) * 2016-03-31 2020-01-14 Intel Corporation Cryptographic protection for trusted operating systems
US10303899B2 (en) * 2016-08-11 2019-05-28 Intel Corporation Secure public cloud with protected guest-verified host control
CN107450962B (en) * 2017-07-03 2020-04-24 北京东土科技股份有限公司 Exception handling method, device and system in virtualized operation environment
CN108599930B (en) * 2018-04-02 2021-05-14 湖南国科微电子股份有限公司 Firmware encryption and decryption system and method
CN108804203B (en) * 2018-06-15 2019-06-21 四川大学 VTPM private information guard method based on label

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150143533A1 (en) * 2013-11-21 2015-05-21 Nxp B.V. Method of generating a structure and corresponding structure
CN106293873A (en) * 2016-07-29 2017-01-04 北京北信源软件股份有限公司 One accurately obtains the method for critical data position in virtual machine control block (VMCS)
CN106970823A (en) * 2017-02-24 2017-07-21 上海交通大学 Efficient secure virtual machine guard method and system based on nested virtualization
CN107341115A (en) * 2017-06-30 2017-11-10 联想(北京)有限公司 Virutal machine memory access method, system and electronic equipment
CN107368354A (en) * 2017-08-03 2017-11-21 致象尔微电子科技(上海)有限公司 A kind of secure virtual machine partition method
CN107562515A (en) * 2017-08-04 2018-01-09 致象尔微电子科技(上海)有限公司 A kind of method of the managing internal memory in virtualization technology

Also Published As

Publication number Publication date
CN109828827B (en) 2023-10-27
CN109858265A (en) 2019-06-07
CN109901911B (en) 2023-07-07
CN109828827A (en) 2019-05-31
CN109858265B (en) 2022-01-28

Similar Documents

Publication Publication Date Title
CN109901911A (en) A kind of information setting method, control method, device and relevant device
CN109800050B (en) Memory management method, device, related equipment and system of virtual machine
CN109766164B (en) Access control method, memory management method and related device
US9898624B2 (en) Multi-core processor based key protection method and system
CN103026347B (en) Virutal machine memory in multicore architecture divides
CN109766165A (en) A kind of memory access control method, device, Memory Controller Hub and computer system
CN108055133B (en) Key security signature method based on block chain technology
US8464069B2 (en) Secure data access methods and apparatus
US20040093505A1 (en) Open generic tamper resistant CPU and application system thereof
CN110348204B (en) Code protection system, authentication method, authentication device, chip and electronic equipment
CN107092495A (en) Platform firmware armouring technology
US20080263256A1 (en) Logic Device with Write Protected Memory Management Unit Registers
CN109739613B (en) Maintenance method and access control method of nested page table and related device
US10360370B2 (en) Authenticated access to manageability hardware components
CN103136124B (en) A kind of intelligent card hardware firewall system and its implementation
CN106716435B (en) Interface between a device and a secure processing environment
CN112639789A (en) Integrity tree for memory integrity checking
US11748493B2 (en) Secure asset management system
CN103309819B (en) Embedded system and internal memory method for managing security therein
CN107563226A (en) A kind of Memory Controller, processor module and key updating method
CN116126463A (en) Memory access method, configuration method, computer system and related devices
CN115994389A (en) Hardware memory encryption system based on RISC-V architecture and application thereof
JP6079151B2 (en) System setting information updating apparatus, system setting information updating system, system setting information updating method, and system setting information updating program
US20240080193A1 (en) Counter integrity tree
You et al. KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 300384 industrial incubation-3-8, North 2-204, No. 18, Haitai West Road, Tianjin Huayuan Industrial Zone, Binhai New Area, Tianjin

Applicant after: Haiguang Information Technology Co.,Ltd.

Address before: 300384 industrial incubation-3-8, North 2-204, No. 18, Haitai West Road, Tianjin Huayuan Industrial Zone, Binhai New Area, Tianjin

Applicant before: HAIGUANG INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant