DATA ACCESSIBILITY CONTROL
First Claim
Patent Images
1. A method of controlling the accessibility of data to a computer processor configured to context switch between a user context and a secure context, the method comprising:
- obtaining an identifier;
determining dependent on the identifier, in the secure context, whether to make data accessible in the user context; and
,in the event that it is determined to make data accessible, providing access to the data in the user context.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method and apparatus for controlling the accessibility of data on a data storage 9 comprises obtaining an identifier, and determining dependent on the identifier, in a secure context 5 of a computer processor 1, whether to make data accessible in a user context 3. In the event that data is to be made accessible, access is provided to the data in the user context 3.
23 Citations
52 Claims
-
1. A method of controlling the accessibility of data to a computer processor configured to context switch between a user context and a secure context, the method comprising:
-
obtaining an identifier; determining dependent on the identifier, in the secure context, whether to make data accessible in the user context; and
,in the event that it is determined to make data accessible, providing access to the data in the user context. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 52)
-
-
5. A method of controlling the accessibility of data recorded by a computer configured to context switch between a user context and a secure context, the method comprising:
-
receiving data in the user context; obtaining an identifier; determining dependent on the identifier, in the secure context, whether data is to be recorded to a data storage according to a first map or a second map.
-
-
12. A method of controlling the accessibility of data to a computer processor, the method comprising:
-
obtaining an identifier; passing the identifier to a security controller operating in the computer processor; the security controller determining dependent on the identifier, whether to make data accessible; and dependent on the determination of the identifier, the security controller controlling the accessibility of data on a data storage coupled to the processor by controlling a map of the data storage. - View Dependent Claims (51)
-
-
19-50. -50. (canceled)
Specification