Using an access key to protect and point to regions in windows for infiniband
First Claim
Patent Images
1. A method for controlling access to computer memory, comprising:
- receiving a work request from a user, wherein the work request comprises an index portion and a protection portion;
locating an element in an address translation and protection table by means of the index portion of the work request;
comparing the protection portion of the work request with a protection key in the table element; and
granting access to memory only if the protection portion and protection key match.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and program for controlling access to computer memory are provided. The present invention comprises receiving a work request from a user, wherein the work request comprises an index portion and a protection portion. The index portion of the work request is used to locate an element in an address translation and protection table. The protection portion of the work request is then compared with a protection key in the table element, and access to memory is granted only if the protection portion and protection key match.
-
Citations
18 Claims
-
1. A method for controlling access to computer memory, comprising:
-
receiving a work request from a user, wherein the work request comprises an index portion and a protection portion;
locating an element in an address translation and protection table by means of the index portion of the work request;
comparing the protection portion of the work request with a protection key in the table element; and
granting access to memory only if the protection portion and protection key match. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for use in a data processing system, for controlling access to computer memory, the computer program product comprising:
-
instructions for receiving a work request from a user, wherein the work request comprises an index portion and a protection portion;
instructions for locating an element in an address translation and protection table by means of the index portion of the work request;
instructions for comparing the protection portion of the work request with a protection key in the table element; and
instructions for granting access to memory only if the protection portion and protection key match. - View Dependent Claims (8, 9, 10, 11, 12, 14, 15, 16, 17, 18)
-
-
13. A system for controlling access to computer memory, comprising:
-
a receiver to receive a work request from a user, wherein the work request comprises an index portion and a protection portion;
a locator to locate an element in an address translation and protection table by means of the index portion of the work request;
a comparator to compare the protection portion of the work request with a protection key in the table element; and
a security component to grant access to memory only if the protection portion and protection key match.
-
Specification