Method and apparatus for determining access permission
First Claim
1. Access permission circuitry, comprising:
- first access protection circuitry which stores first access permission information corresponding to a first bus master;
second access protection circuitry which stores second access permission information corresponding to a second bus master;
access modification circuitry, coupled to the first and second access protection circuitry; and
an access allowed indicator provided by the access modification circuitry, wherein in response to a first access by the first bus master, the access modification circuitry receives first state information and receives the first access permission information, wherein based upon the first state information, the access modification circuitry selectively modifies the first access permission information to produce first modified access permission information, wherein the first modified access permission information is used to determine whether the access allowed indicator will allow the first access;
wherein in response to a second access by the second bus master, the access modification circuitry receives second state information and receives the second access permission information, wherein based upon the second state information, the access modification circuitry selectively modifies the second access permission information to produce second modified access permission information, and wherein the second modified access permission information is used to determine whether the access allowed indicator will allow the second access.
15 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for determining access protection (96) includes receiving a plurality of access requests (84) corresponding to a plurality of masters (12, 14), determining access permissions (86), providing state information (60), determining access permissions (86) based on the access request (84), and selectively modifying the access permissions based on the state information (90). The state information (60) may relate to debug operation, operation from unsecure or unverified memories, memory programming, direct memory access operation, boot operation, software security verification, security levels, security monitor operation, operating mode, fault monitor, external bus interface, etc (88).
107 Citations
20 Claims
-
1. Access permission circuitry, comprising:
-
first access protection circuitry which stores first access permission information corresponding to a first bus master;
second access protection circuitry which stores second access permission information corresponding to a second bus master;
access modification circuitry, coupled to the first and second access protection circuitry; and
an access allowed indicator provided by the access modification circuitry, wherein in response to a first access by the first bus master, the access modification circuitry receives first state information and receives the first access permission information, wherein based upon the first state information, the access modification circuitry selectively modifies the first access permission information to produce first modified access permission information, wherein the first modified access permission information is used to determine whether the access allowed indicator will allow the first access;
wherein in response to a second access by the second bus master, the access modification circuitry receives second state information and receives the second access permission information, wherein based upon the second state information, the access modification circuitry selectively modifies the second access permission information to produce second modified access permission information, and wherein the second modified access permission information is used to determine whether the access allowed indicator will allow the second access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for determining access protection, comprising:
-
receiving a first access request corresponding to a first master;
determining first access permissions corresponding to the first master;
receiving first state information;
selectively modifying the first access permissions based on the first state information;
receiving a second access request from a second master;
determining second access permissions corresponding to the second master;
receiving second state information; and
selectively modifying the second access permissions based on the second state information, wherein the first state information is provided from a different source than the second state information. - View Dependent Claims (15)
-
-
16. A method for determining access protection, comprising:
-
receiving a first access request corresponding to a first master;
providing first state information;
determining first access permissions based on said first access request;
selectively modifying said first access permissions based on said first state information;
receiving a second access request corresponding to a second master;
providing second state information;
determining second access permissions based on said second access request;
selectively modifying said second access permissions based on said second state information. - View Dependent Claims (17, 18, 19, 20)
-
Specification