System, method, and computer program product for prohibiting unauthorized access to protected memory regions
First Claim
1. A method for prohibiting unauthorized access to a protected region of memory, said method comprising the steps of:
- specifying a protected region of a memory;
specifying a trusted region of said memory that is external to said protected region;
specifying a test portion of said protected region and a protected portion of said protected region;
storing a test routine in said test portion;
intercepting, by said test routine, a call that is attempting to access said protected portion;
determining an origination location of said call; and
in response to a determination that said origination location is within said trusted region, permitting said call to access said protected portion.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are disclosed for prohibiting unauthorized access to a protected region of memory. A protected region of memory and a trusted region of memory are both specified. A call to access a location within the protected region of memory is received. An origination location of the call is then determined. In response to a determination that the origination location is within the trusted region, the call is permitted to access the protected region of memory. In response to a determination that the origination location is outside of the trusted region, the call is prohibited from accessing the protected region of memory.
-
Citations
36 Claims
-
1. A method for prohibiting unauthorized access to a protected region of memory, said method comprising the steps of:
-
specifying a protected region of a memory; specifying a trusted region of said memory that is external to said protected region; specifying a test portion of said protected region and a protected portion of said protected region; storing a test routine in said test portion; intercepting, by said test routine, a call that is attempting to access said protected portion; determining an origination location of said call; and in response to a determination that said origination location is within said trusted region, permitting said call to access said protected portion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A data processing system for prohibiting unauthorized access to a protected region of memory, comprising:
-
a protected region of a memory that includes a protected portion and a test portion; a trusted region of the memory that is external to said protected region; a test routine stored in said test portion; said test routine intercepting a call that is attempting to access said protected portion; said system including a CPU executing code for determining an origination location of said call; and in response to a determination that said origination location is within said trusted region, said CPU executing code for permitting said call to access said protected portion. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product. which is stored in a computer readable medium, in a data processing system for prohibiting unauthorized access to a protected region of memory, comprising:
-
instruction means for specifying a protected region of a memory; instruction means for specifying a trusted region of said memory that is external to said protected region; instruction means for specifying a test portion of said protected region and a protected portion of said protected region; instruction means for storing a test routine in said test portion; instruction means for intercepting, by said test routine, a call that is attempting to access said protected portion; instruction means for determining an origination location of said call; and in response to a determination that said origination location is within said trusted region, instruction means for permitting said call to access said protected portion. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification