METHOD OF SECUREOS FUNCTIONING ON MULTIPROCESSOR SYSTEMS IN MOBILE DEVICES Russian patent published in 2018 - IPC G06F21/74 G06F9/46 

Abstract RU 2641226 C1

FIELD: information technology.

SUBSTANCE: method comprises the steps of: after activating the thread in a secure operating system (SecureOS), assigning in SecureOS this thread to the Core Processing Unit (CPU), which purpose includes the step of changing the CPU mask. The CPU mask is a data structure supported in SecureOS to inform the unprotected operating system (RichOS) of the current needs of SecureOS in the CPU cores; CPU mask is transferred via SecureOS in RichOS for requesting RichOS to provide SecureOS control on the CPU core; on the basis of the CPU mask, the core of the CPU is enabled via RichOS, if the CPU core is disabled; and CPU core is switched via the RichOS to the protected mode, providing SecureOS control on the CPU core. Mobile device contains CPU, which has many CPU cores, each of which functions either in protected or in unprotected mode, and installed on the mobile device RichOS and SecureOS support multithreading and communicate with each-other through a predefined interface.

EFFECT: improved performance of a protected operating system.

30 cl, 5 dwg

Similar patents RU2641226C1

Title Year Author Number
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS 2006
  • Khant Galen K.
  • Larus Dzhejms R.
  • Fandrich Manuehl A.
  • Khodson Orion
  • Levi Stiven P.
  • Stensgor B'Jarne
  • Tarditi Dehvid R.
  • Spear Majkl
  • Karbin Majkl
  • Abadi Martin
  • Ajken Mark
  • Barkhehm Pol
  • Uobber Tehd
  • Zill Brajan
  • Khoblittsel Kris
  • Merfi Nik
RU2443012C2
POWER-SAVING STREAM SCHEDULING AND DYNAMIC USE OF PROCESSORS 2009
  • Marshall Allen
  • Dehn Imin'
  • Dzhadzh Nikolas S.
  • Kishan Arun U.
  • Ritts Ehndrju Dzh.
RU2503987C2
SYSTEM AND METHOD OF VIRTUALISING GRAPHIC SUBSYSTEMS 2005
  • Blit Dehvid R.
RU2406128C2
ENTROPY CODER FOR IMAGE COMPRESSION 2011
  • Abdo Nadim J.
RU2575679C2
AUTHENTICITY DISPLAY FROM HIGHLY RELIABLE MEDIUM TO NON-SECURE MEDIUM 2004
  • Uilmehn Brajan Mark
  • Inglend Pol
  • Rej Kennet D.
  • Kaplan Kejt
  • Kurien Varugis
  • Marr Majkl Dehvid
RU2390836C2
PROMOTION OF INTERACTION FOR SYSTEM SERVICE REQUEST FOR HARDWARE-PROTECTED APPLICATIONS 2012
  • Baumann Endryu A.
  • Khant Galen K.
  • Pejnado Markus
RU2621001C2
PROGRAM-HARDWARE PLATFORM AND METHOD OF ITS REALISATION FOR WIRELESS COMMUNICATION FACILITIES 2016
  • Andreechkin Aleksandr Evgenevich
  • Arkhipkin Vladimir Yakovlevich
  • Zavalin Yurij Viktorovich
  • Likhachev Aleksandr Mikhajlovich
  • Prisyazhnyuk Andrej Sergeevich
  • Prisyazhnyuk Sergej Prokofevich
  • Krukovskaya Irina Yaroslavovna
  • Krukovskij Yaroslav Valentinovich
  • Shpak Vasilij Viktorovich
RU2626550C1
PROVISION FOR PROTECTED INPUT INTO SYSTEM WITH HIGHLY RELIABLE PROGRAM EXECUTION ENVIRONMENT 2004
  • Chu Kristin M.
  • Jamamoto Khirofumi
  • Avrakhehm Idan
  • Paff Dzhon E.
  • Roberts Pol K.
RU2365988C2
MAINTENANCE OF SECURE INPUT AND OUTPUT FOR ENTRUSTED AGENT IN SYSTEM WITH HIGHLY RELIABLE ENVIRONMENT OF PROGRAMS EXECUTION 2004
  • Uillmehn Brajan M.
  • Chu Kristin M.
  • Rej Kennet D.
  • Roberts Pol K.
RU2365045C2
PRESENTING OPERATING SYSTEM CONTEXT IN TRUSTED PLATFORM MODULE 2015
  • Tom Stefan
  • Ajgner Ronald
  • Pai Navin
RU2702276C2

RU 2 641 226 C1

Authors

Matveev Alexander Nikolaevich

Podieiapolskii Vladimir Vasilievich

Dates

2018-01-16Published

2017-02-13Filed