METHOD AND APPARATUS FOR INTERRUPT HANDLING Russian patent published in 2018 - IPC G06F9/48 

Abstract RU 2666625 C2

FIELD: computing; counting.

SUBSTANCE: group of inventions relates to computer engineering and can be used to handle interrupts in data processing systems. Device comprises a plurality of system registers, comprising a set of interrupt handling registers for controlling handling of an incoming interrupt; processing circuitry configured to execute software of the plurality of execution levels, interrupt controller circuitry configured to route said incoming interrupts to interrupt handling software that is configured to run at one of said plurality of execution levels; and register access control circuitry configured to dynamically control access to at least some of said interrupt handling registers depending on one of said plurality of execution levels to which said incoming interrupt is routed.

EFFECT: technical result is an increase in the flexibility of the interrupt handling software, while at the same time maintaining the security of the data processing device.

18 cl, 8 dwg, 1 tbl

Similar patents RU2666625C2

Title Year Author Number
SYSTEM AND METHOD FOR PROTECTION FROM NON-TRUSTED SYSTEM CONTROL MODE CODE BY MEANS OF REDIRECTION OF SYSTEM MANAGEMENT MODE INTERRUPT AND CREATION OF VIRTUAL MACHINE CONTAINER 2003
  • Satton Ii Dzhejms
  • Graurok Dehvid
  • Ulig Richard
  • Pojsner Dehvid
  • Glu Ehndrju
  • Kholl Klifford
  • Smit Iii Lorens
  • Nejger Gilbert
  • Kozukh Majkl
  • Dzhordzh Robert
  • Berdzhess Brehdli
RU2313126C2
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
NEW PROCESSOR MODE FOR LIMITING FUNCTIONING OF GUEST SOFTWARE, EXECUTED AT VIRTUAL MACHINE, SUPPORTED BY VIRTUAL MACHINE MONITOR 2001
  • Chou Stefen
  • Nehjdzher Gilbert
  • Kota-Robles Ehrik
  • Dzhejasingkh Stalinselvaradzh
  • Ulig Rikhard
  • Kozuch Majkl
  • Kagi Ehlehjn
RU2265880C2
LAUNCHING HYPERVISOR UNDER RUNNING OPERATING SYSTEM 2007
  • Ganguli Shuvabrata
  • Tornton Ehndrju Dzh.
  • Viderkhirn Dzhon F.
  • Rehj Kennet D.
RU2446447C2
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES 2017
  • Lutas Andrei-Vlad
RU2723668C1
SYSTEM AND METHODS FOR USE OF SYNTHESISED COMMANDS IN VIRTUAL MACHINE 2004
  • Traut Ehrik
RU2374675C2
METHOD OF FUNCTIONING COMPUTER DEVICE OPERATING SYSTEM OF SOFTWARE AND HARDWARE COMPLEX 2016
  • Molyakov Andrej Sergeevich
RU2626350C1
AUTHENTICITY DISPLAY FROM HIGHLY RELIABLE MEDIUM TO NON-SECURE MEDIUM 2004
  • Uilmehn Brajan Mark
  • Inglend Pol
  • Rej Kennet D.
  • Kaplan Kejt
  • Kurien Varugis
  • Marr Majkl Dehvid
RU2390836C2
EFFICIENT INTERRUPTION ROUTING FOR MULTITHREADED PROCESSOR 2015
  • Farrell Mark
  • Kheller Lajza
  • Kubala Dzheffri Pol
  • Shmidt Donald Uillyam
  • Grejner Den
  • Sledzhel Timoti
  • Busaba Fadi Yusuf
  • Osisek Damyan
  • Bredberi Dzhonatan Dejvid
  • Lenert Frank
  • Nerts Bernd
  • Dzhakobi Kristian
RU2678513C2
METHOD OF MODIFYING MEMORY ACCESS GRANTS IN SECURE PROCESSOR ENVIRONMENT 2014
  • Lesli-Kherd Rebeka
  • Aleksandrovich Ilja
  • Anati Ittaj
  • Berenzon Aleks
  • Makkin Frensis
  • Rozas Karlos
  • Savagaonkar Udaj
  • Skarlata Vinsent
  • Goldsmit Majkl
  • Dzhonson Sajmon
  • Shanbkhogue Vedvias
  • Smit Uesli
RU2602793C2

RU 2 666 625 C2

Authors

Dzhebson Entoni

Grajzentuejt Richard Roj

Kennedi Majkl Aleksandr

Kolfild Jen Majkl

Dates

2018-09-11Published

2014-05-12Filed