Abstract:
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. The configuration may support additional configuration fields that may be added to existing access control rules of the device. A processor of the device may request creation of a new shared memory resource, using a subregion of an existing memory resource, where the additional fields may indicate a parent memory resource for the new memory resource. The additional fields may also include a value which may indicate a processor which has write permission for a respective memory region of the shared memory, where other processors of the device may be prevented from writing to the memory region. The additional fields may further indicate a chain of delegation, or a history, of which processors have been assigned the exclusive write permission for the respective memory region.
Abstract:
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. For example, additional configuration fields may be added to existing access control rules of the device, where these additional fields may be configured by a processor sending information to a receiving processor, via a shared memory resource or region of the device. The additional fields may include a read-only value which may specify a processor which has exclusive write permission for a memory region of the share memory. This value may indicate the sending processor of the memory region, and the value may be set by access control hardware when the additional field is changed. Other processors of the device may be prevented from writing to the memory region.
Abstract:
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. The configuration may support additional configuration fields that may be added to existing access control rules of the device. A processor of the device may request creation of a new shared memory resource, using a subregion of an existing memory resource, where the additional fields may indicate a parent memory resource for the new memory resource. The additional fields may also include a value which may indicate a processor which has write permission for a respective memory region of the shared memory, where other processors of the device may be prevented from writing to the memory region. The additional fields may further indicate a chain of delegation, or a history, of which processors have been assigned the exclusive write permission for the respective memory region.
Abstract:
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. For example, additional configuration fields may be added to existing access control rules of the device, where these additional fields may be configured by a processor sending information to a receiving processor, via a shared memory resource or region of the device. The additional fields may include a read-only value which may specify a processor which has exclusive write permission for a memory region of the share memory. This value may indicate the sending processor of the memory region, and the value may be set by access control hardware when the additional field is changed. Other processors of the device may be prevented from writing to the memory region.
Abstract:
Techniques for managing resources on computing device are provided. An example processor according to these techniques includes a resource management module (RMM) configured to be executed by the processor as an only privileged application on the processor such that the RMM has exclusive control over the allocation of memory resources utilized by the other applications executed by the processor and assignment of access permissions to the memory resources. The RMM is configured to manage the memory resources used by other applications executed by the processor, to group applications into logical compartments, and to enforce separation between the compartments such that resources associated with one compartment are inaccessible to another compartment. The processor may include a memory protection unit (MPU) configured to provide memory protection for memory utilized by the processor, and the RMM can be configured to dynamically configure the MPU regions to enforce separation between compartments.
Abstract:
One feature pertains to a computing device that includes an input interface, a communication interface, and a processing circuit that is adapted to receive a request from an application to authorize an action and generate a dynamic access code associated with the action. The processing circuit also transmits a message to a secondary display device that includes information data associated with the action and the dynamic access code for display on a display of the secondary display device. The processing circuit authorizes the action received from the application if the dynamic access code is entered into the input interface. Multiple, unique dynamic codes may also be associated with different actions the application may make requests for, which are also transmitted to the secondary display device for display.
Abstract:
One feature pertains to a computing device that includes an input interface, a communication interface, and a processing circuit that is adapted to receive a request from an application to authorize an action and generate a dynamic access code associated with the action. The processing circuit also transmits a message to a secondary display device that includes information data associated with the action and the dynamic access code for display on a display of the secondary display device. The processing circuit authorizes the action received from the application if the dynamic access code is entered into the input interface. Multiple, unique dynamic codes may also be associated with different actions the application may make requests for, which are also transmitted to the secondary display device for display.
Abstract:
Techniques for operating a computer system for a vehicle are provided. An example method according to these techniques includes observing usage of at least one component of the computer system by an application to generate an application usage log for the application, deriving behavior vectors from the application usage log, determining whether the application is a distracting application by comparing the behavior vectors to one or more application safety rules, and limiting execution of the application responsive to determining that the application is a distracting application and based on status information associated with the vehicle.