CA1199124A - System for controlling key storage unit - Google Patents

System for controlling key storage unit

Info

Publication number
CA1199124A
CA1199124A CA000422397A CA422397A CA1199124A CA 1199124 A CA1199124 A CA 1199124A CA 000422397 A CA000422397 A CA 000422397A CA 422397 A CA422397 A CA 422397A CA 1199124 A CA1199124 A CA 1199124A
Authority
CA
Canada
Prior art keywords
key
unit
storage unit
key storage
queue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000422397A
Other languages
French (fr)
Inventor
Takashi Chiba
Satoru Koga
Minji Senda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP57031201A external-priority patent/JPS58150195A/en
Priority claimed from JP57031326A external-priority patent/JPS58150196A/en
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Application granted granted Critical
Publication of CA1199124A publication Critical patent/CA1199124A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1466Key-lock mechanism

Abstract

SYSTEM FOR CONTROLLING KEY STORAGE UNIT ABSTRACT OF THE DISCLOSURE In a system for controlling a key storage unit in a data processing apparatus, a data processing apparatus comprising a main storage unit, a key storage unit for storing a main storage protection key corresponding to each unit block of the main storage unit, at least one processing unit, a main storage control unit, and a key storage control unit. The access request for the key storage unit is registered in the key queue of the key--storage control unit. The same access request for the key storage unit is prevented from being repeated many times.

Description

SYSTE~l FOR CONTROLLING KEY STORAGE UNIT

BACKGROUND OF THE I~IVENTION
Field of the Invention The present invention relates to a system for con-trolling a key storage unit for storing main storage protection keys, reference bits, and change bits corre-sponding to unit blocks of a main storage unit.
Descrip.ion of the Prior Art In the digital processing system, a key storage unit may be used for protecting the computer program or other content ir. a main storage unit. In such a key storage unit, a main storage protection key, a reference bit, and a change bit corresponding to each unit block of the main storage unit are stored. When a central processing unit is golng to access an address in a unit block of the main storage l'; unit r the main storage protection key stored in the key storage unit is compared with a key presented by the central processing unit. If these two keys coincide, the central processing unit can access the address in the unit block.
If these two keys do not coincide, however, the central processing unit cannot access the address in the unit block.
In the above key storage unit, when the data stored in one block of the main stora~e unit is read (fetched) by the central processing u~it, the reference bit corresponding to that bloclc of the main storage unit must be set to the
2~j logic "1". ~hen the data stored in the block of the main storage unit is written (stored) by the central processing unit, both the reference bit and the change bit corresponding to l:he block of the main storage unit must be set to the logic "1". Generally, keys on the main storage unit are
3() provided for every unit block of ~K bytes or 4K bytes, and every time the data in the main storage unit are fetched or stored, the reference bit and the change bit in the key corresponding to the block includin~ the fetched or stored data must be renewed as described above.
Data access to the main storage uni-t is usually executed by the interlieve control. However, use of interlieve control for data access to the key storage unit makes the control process complicated, increases the amoun-t of the hardware, and increases the cost. Thus, the key storage unit must be constructed by a memory device of higher access time than the main storage unit. For example, if the main storage unit is constructed by a metal oxide semiconductor (MOS) random access memory (RA~1) device, the key storage unit is constructed by a dynamic RP~1 device. However, the greater the capacity of the main storage unit, the more difficult the construction of the key storage unit and the higher the cost.
SUL~MARY OF THE INV~.NTION
The object of the present invention is to provide a system for controlling key for main storage in which an access request for the key storage unit having the same content with any request already registered in the key queue is stopped from being registered in the key queue.
Therefore, the acc~oss frequency to the key storage unit is decreased so that the key storage can be constructed by a memory device having the same access time as the main storage unit.
Another object of the present invention is to provide a system for controlling key storage unit in which a reset referenee command ean be executed at a high speed.
In aecordance with the present inven-tion, there is provided a system for eontrolling a key storage unit :in a data proeessing apparatus. The data processing apparatus eomprises a main storage unit; a key storage unit for storing a main storage proteetion keyl a reference bit, and a change bit eorresponding to each unit block of the main storage unit; at least one processing unit, the processing unit producing an access request for the main storage unit; a main storage control unit for processing the access request for the main storage unit; and a key storage control unit for controlllng the aecess to the key storage unit.
The main storage control unit also produces an access ~9~

request for the key storage unit to change the reference bit and the change bit in the key storage unit corresponding to -the accessed unit block of the main storage and supplying the access request for the key storage unit to the key storage control unit every time the main storage control unit accesses the main storage unit in response to the access request for the main storage unit supplied from the processing unit.
The key storage control unit comprises a key queue for holding a plurality of access requests for the key storage unit supplied from the main storage control unit temporarlly.
The key storage control unit registers each of the access requests for the key storage unlt supplied from the main storage control unit into the key queue in order. The key storage control unit, independent of the above-mentioned registering process, reads out and processes each o~ the access requests for the key storage unit registered in the key queue in order.
The key storage control unit also comprises means for comparing the content o~ the access request for the key storage unit supplied from the main storage control unit with the content of each access request for the key storage registered in the key queue and comprises means for inhlbit-ing the access request for the ke~ storage unit supplied from the main storage control unit from being registered doub~y in the key queue when the content of the access requeCt for the key storage unit supplied from the main storage control unit is equal the content of one of the access requests for the key storage unit registered in the queue.
BRIEF DESCRIPTION OF THE DRAWI~GS
Figure 1 is a block diagram of a data processing unit to which a system for controlling a key storage unit accord-ing to the present invention is applied;
Fig. 2 is a block diagram of one embodiment o~ the key storage control unit of Fig. 1 according to the present invention;

Figs. 3~, 3B, 3C, 3D, and 3E are detailed circuit diagrams of various portions of the control circuit in the key storage control unit of Fig. 2;
Figs. 4(A), 4(B), and 4(C) are formats of the contents of the main storage unit, the key storage unit, and the key queue; and Fig. 5 is an operation diagram Eor the reset reference bit command.
DESCRIPT~ON OF THE PREFERRED EMBODIMENTS
A system for controlling key storage ùnit according to the present invention will now be described in detail with reference to the accompanying drawings and preferred embodi-ments.
A data processing apparatus to which a system for lS controlling a key storage unit according to the present invention is applied is illustrated in Fig. 1.
In Fig. 1, 1 indicates a main storage unit, 2 indicates a key storage unit, 3 indicates a main storage controI unit,
4 indicates a key storage control unit, 5 indicates a group of central processing units (CPU), and 6 indicates a group of channel processing units (CHP). ~he key storage unit 2 stores a memory protection key, a reference bit, and a change bit corresponding to unit blocks of the main storage unit 1.
The main storage control unit 3 controls the access to the main storage unit 1, and the key storage control unit 4 controls the access to the key storage unit 2. Every time the main storage control unit 3 accesses the main storage unit 1, the main storage control unit 3 outputs a key-storage access request to the key storage control unit 4. When a unit in the CPU group 5 or the CHP group 6 is going to access the key storage unit 2, it also outputs a key-storage access request to the key storage control unit 4. When one of the CPU group 5 or the CHP group 6 is going to access a unit block of the main storage unit for the first time, the CPU
or CHP outputs an insert storage key (ISK~ command to the key storaye control unit 4, reads the content of the entry of the key storage unit 2 corresponding to the unit block of the main storage unit 1, and checks whether the CPU or -the CHP itself is qualified to access the present unit block.
The construction of the key storage control Ullit ~ is illustrated in Fig. ~. In Fig. 2, 7 indicates an in-queue counter, 8 indicates a key queue, 9 indicates a key register, 10 indicates a group of comparator circuits, 11 indicates a key storage access register, 12 indicates a selector circuit, 13 indicates an out-queue counter, 14 indicates a comparator circuit, and 15 indicates a control circuit.
The key queue 8 comprises n-stage unit memories 8-1 through 8-n. ~ach unit memory 8-1 through 8-n has a unit block address, a reference bit (R bit), a chan~e bit ~C bit~, a validity bit (V bit), and a key-storage access request bit (RQ bit). The group of comparator circuits 10 comprises n comparator circuits 10-1 through 10-n corresponding to the unit memories 8-1 through 8-n of the key queue 8, respective-ly. The in-queue counter 7 is used for designating the unit memory of the key queue 8 into which data should be inputO
When the data of the address, the R bit, and the C bit in the key register 9 is registered in the key queue 8, the in-queue counter 7 is counted up by +1 and designates the next unit memory of the key queue.
The key register 9 is used for setting the key-storage access request supplied from a request source, for example, 2'i a unit of CPU ~roup 5 or CHP group 6, or the main storage control unit 3, and has an operation code (OPC) portion 9-1, an address portion 9-2, and a key data portion 9-3. The operation code (OPC) in the key--storage access request is one of the codes designating a data fetch command, a data store command, or key commands. The address in the key--storage access request designates a unit block address.
The key data is the data to be written in the key storage unit at the execution of a key command.
Like the key register 9, the key-storage access register 11 has an operation code (OPC) portion 11-1, an address portion 11-2~ and a key data portion 11-3. The output terminals from each portion of the key register 9 are connected to the input terminals of each corresponding portion of the key storage access register 11. The output terminals oE the OPC portion 9-1 are also connected to the input terminals of the comparator circuit group 10. The output terminals of the address por-tion 9-2 are also con-nected to the address data input terminals of the key queue 8 and to the input terminals of the comparator circuit group 10. The address bit read-out terminals of each unit memory 8-1 through 8-n of the key queue 8 are connec-ted to the input terminals of each correspondlng comparator circuit 10~1 through 10-n and to the corresponding input terminals of t:he selector circuit 12. The R bit and C bit read-out terminals o~ each unit memory 8-1 through 8-n o~ the key queue 8 are connected to the input terminals of each corre-sponding comparator circuit 10-1 through 10-n and to the corresponding input terminals of the key data portion 10-3 of the key-storage access register îl. The V bit and RQ bit read-out terminals of each unit memory 8-1 through 8-n of the key queue 8 are connected to th input terminals of each 2~ corresponding comparator circuit 10-1 through 10-n.
The output terminals of the comparator circuits 10-1 through 10-n are connected to the input terminals of the control circuit 15 which e~ecutes a control operation in accordance with the result of the comparison in the compa-rator circuits 8-1 through 8-n. The output terminals of the out-queue counter 13 are connected to the select input terminals of the selector circuit 12 and to the input terminals of the OPC portion 11-1 of the key-storage access register 11. The out-queue coun-ter 13 is used for desig-nating one unit memory 8-1 through 8-n of the key queue 8 to be set into the key-storage access register 11. Every time the content of the unit memory 8-1 through 8-n is set into the key-storage access register 11, the corresponding RQ bit in the key queue 8 is reset to the logic "D" and the out-queue counter 13 is counted up by ~1. The output terminals of the selector circuit 12 are connected to the input terminals of the address portion 11-2 oE the key--storage access register 11. The outpu-ts of the key-storage access register 11 are supplied to the key storage unit 2.
The contents of the in-queue coun-ter 7 and the out-queue counter 13 are supplied to the comparator circuit la.. The
5 comparator circuit 14 compares the contents of these two counters 7 and 13. When these two contents become equal along with the up-count of the in-queue counter 7, the comparator circuit 14 judges that the key queue 8 is full, and produces a "full" signal (Q-FULL~. When these two contents ~ecome equal along with the up-count of the out--queue counter 13, the comparator circuit 1~ judges that all the unit memories 8-1 through 8-n of the key queue 8 are empty and produces an "empty" signal (Q E~IP). These "full"
and "empty" signals are supplied to the control circuit 15.
The control circuit 15 is connected to each portion of the key storage control unit ~ and executes the necessary control operations.
The operations for controlling the key storage unit 2 executed by the key storage control unit 4 shown in Fig. 2 will now be described.
The operation code, address, and key data of the key-storage access req~lest supplied from the main storage control unit 3 or a processing uni.t of CPU group 5 or CHP
group 6 are set in the key register 9. The key-storage ~5 access request is processed in accordance with the content of th~ operati.on coder that is, a data fetch command, data store command, or key command.
In the case of a data fetch command, the entry data of the unit memories 8-1 through 8-n are read out. Among these entry data, those with the V bit of logic "1" are compared with the content of the key register 9 in the comparator circuits 10-1 through 10-n.
If the address data of any one of the unit memories 8-1 through 8-n with the V bit of logic lll" are equal to the content of the address portion 9-2 of the key register 9, the key control operation is completed~ making it possible for the key register 9 to receive the next key storage access request.
If none of the address data of the unit memories 8-1 through 8-n with the V bit of logic l'l" are equal to the content of the address portion 9-2 of the key register 9 and if the key queue 8 is not full up, the content of the address portion 9-2 of the key register 9 is written into the unit memory of the key queue 8 designated by the in-queue counter 7, the R and C bits of this unit memory are set to "l, 0", and the V bit and the RQ bit of this unit memory are set to the logic "l". Then the in-queue counter 7 is counted up by +l, and it becomes possible for the key register 9 to receive the next key storage access request.
If none of the address data of the unit memories with the V bit of logic "l" are equal to the content of the address portion 9-2 and if the key queue 8 is full up, the process of writing the content of the address portion 9-2 into the unit memory of the key queue is stopped until a unit memory of the key queue becomes empty. In this case, the key storage control unit 4 falls into the "busy" con-dition, and it is not possible for the key register 9 toreceive the next key-storage access request.
In the case of the data store command, the entry data of the unit ~emories 8-l through 8-n of the key queue 8 are read outO Among these entry data, those with the V bit of logic "l" are c~mpared with the content of the key register 9 .in the comparator circuits lO-l through lO-n.
If the address data of any one of the unit memories with the V bit of logic "1" is equal to the content of the address portion 9-2 and the R and C bits of this unit memory are "1, 0" and if the key ~ueue 8 is not full up, the V ~it and the RQ bit of this unit memory are reset to "0", the content of the address portion 9-2 is written into the unit memory of the key queue 8 designated by the in-queue counter 7, and the R and C bits of this unit memory are set to "1, l".
Then, the in-queue counter 7 is counted up by ~1. After the above process, it becomes possible for the key register 9 to receive the next key-storage access request.

If the R and C bits of the unit memory with address data equal to the content of the address portion 9-2 are "1, 0" and if the key queue 8 is full, the execution of the above-mentiored process stops until a unit memory of the key queue 9 becomes empty. In this case, the key storage control unit 4 falls into the "busy" condition, and it is not possible for the key register 9 to receive the next key storage access request. If the R and C bits of the unit memory with the address data equal to the content of the address portion 9-2 are "1, 1", the key control operation is completed, making it possible for the key register 9 to receive the next key-storage access request.
If none of the address data of the unit memories 8-1 through 8 n are equal to the content of the address portion 9-2 and if the key queue 8 is not full, the content of the address portion 9-2 is written into the unit memory desig-nated by the in-queue counter 7 t the R and C bits of this unit memory are set to "1, 1", and the V and RQ bits of this unit memory are set to the logic "1". Then, it becomes possible for the key register 9 to receive the next key--storage access request.
If none of the address data of the unit memories 8-1 through 8-n are equal to the content of the address portion 9-2 and if the key queue 8 is full, the above-mentioned process stops until a unit memory of the key queue 8 becomes empty. In this case, the key storage control unit 4 falls into the "busy" condition, and i~ is impossible for the key register 9 to receive the ne~t key-storage access request.
The key commands inc~ude a set storage key (SSK~ command for setting the content of the first operand to the main storage key of the block designated by the second operand, an insert main storage key ~ISK) command for inserting the main storage key of the block designated by the second operand into the first operand, a reset reference bit (RRB) command for resetting the reference bit in the main storage key of the block designated by the second operand, and so on.

When one of these key commands is received b~ the key register 9, the entry data of the unit memories 8-1 throuyh 8-n of the key queue 8 are read out, and these entry data are compared with the content of the address portion 9-2 of the key register 9~ If the content of the address portion 9-2 is equal -to one OL these entry data and if the V bit and the RQ bit of the entry data are both logic "1", the key ~ueue is defined as being in a coincidence condition. The execution of the key command stops until the coincidence condition is released. In this condition, it is not possible for the key register 9 to receive the next key-storage access re~uest. If the key queue 8 is not in the coincidence con-dition, the content of the key register 9 is se-t into the key-storage access registe~ llo and the operation for the key storage unit 2 is started. Then, it becomes possible for the key register 9 to receive the ne~t key-s-torage access request.
Separate from the above-mentioned operations, when the key queue 8 is not empty and the key command is not operated, the entry data of the unit memory of the key queue 8 desig-nated by the out-queue counter 13 are read out, and the content of the entry data is set into the key-storage access register 11. If the V bit and the RQ bit of the entry data are both the logic "1", the operation for con-trolling the change of the R and C bits in the key storage unit 2 is started. ~fter the entry data in the key queue 8 is read out and the content of the entry data is set into the key--storage access register 11, the RQ bit of the corresponding unit memory in the key queue 8 i!i reset to the logic "0" and the out-queue counter 13 is counted up by +1.
The construction o~ the control circuit of the key--storage control unit 4 for carrying out the above-mentioned operations is illustrated in Figs. 3A, 3B, 3C, 3D, and 3~.
In these figures, 21 through 41 indicate AND gate circuits, 42 through 46 indicate NOT gate circuits, 47 through 53 indicate OR gate circuits, 54 through 57 indicate flip-flop circuits, and 58 through 60 indicate decoder circuits. The R bit (reference bit) of the unit memory 8-1 in the key queue 8 is denoted by Rl , its C bi-t (chanye bit) is denoted by Cl , its V bit ~validity bit) is denoted by Vl , and its RQ bit (key-storage access request bit) is denoted by RQl.
Generally, the R bit, C bit, V bit, and RQ bit of the unit memory 8-i of the key queue ~ are denoted respectively by Ri ~ Ci ~ Vi ~ and RQi. The unit memory 8-i will be denoted by the entry i hereafter.
Figure 3A illustrates a portion of the control circuit 15 for producing "busy" signals (KR-BUSY and KSAR-BUSY) for the key register 9 and the key-storage access register 11.
When a key-storage access request is supplied from the main storage control unit 4 or a unit of the CPU group 5 or the CHP group 6, it is supplied to the flip-flop circuit 5~
through the A~D gate circuit 21, the flip-flop 54 is set if it has been in the reset condition, and a key ~egister busy signal (KR-BUSY) of logic "1" is output. The operation code of the key-storage access request is set into the operation code portion 9-1 of the key register 9, and the content of the operation code portion 9-1 is decoded by the decoder circuit 58 to decide whether the key-storage access request is any one among the ~ata fetch command, the data store command, and the key command. The key register busy signal (KR-BUSY) is reset by the output signal o~ the OR gate circuit ~7 which is supplied to the flip-flop circuit 54 through the ~ND ~ate circuit 22. The reset condition for the key register busy signal is that any one of the following five conditions is fulfilled~ as shown in Fig. 3A.
1. The key storage access request is a data fetch command (DATA-FETCH), and the content of the address portion 9-2 is equal to one entry with V bit of logic "1" (the "equal" signal with the entry of V = 1 (V = l-EQU) is logic "1'l).
2. The key storage access request is a data fe~ch command ~DATA-FETCH), and the queue register signal (Q~REG) defined later is logic "1".
3. The key storage access request is a data store -1~9~
~ 12 -command ~DATA-STORE), the "equal" signal with tne entry of V = 1 (V = l. EQU) is logic "1", and the R and C bits of the entry with the same address data are "1, 1" (that is RC = "1, 1").
4. The key-storage access request is a data store command (DATA-STORE), the "equal" signal with the entry of V = 1 (V = l-EQU) is logic "1", and the queue register signal ~Q-REG) is logic "1".
5. The key-storage access request is a key command (KEY-COM), the content of the address portion 9-2 is not equal to the address data of any entry with V = RQ = 1 (V = RQ = l-VNEQ), and the key storage access register busy signal (KSAR~BUSY) is logic "0".
These five condition are represented by the outputs of the AND gate circuits 23, 2~, 25, 26, and 27, respecti~ely.
The outputs of these five AND gate circuits are supplied to the OR gate circuit 47.
The inverted output of the A~D gate circuit 27 and the inverted signal of the queue empty signal (Q-EMP) are supplied to the AND gate circuit 28. The non-inverted output of the AND gate circuit 27 and the output of the A~D
gate circuit 28 are supp~ied to the OR gate circuit 48.
The output of the AND g~te circuit 28 is the queue read signal (Q RE~D). The output of the OR gate circuit 48 is supplied to the set input of the flip-flop circuit 55. The key storage access signal (KS-~CC) is supplied to the reset input of the 1ip~flop circuit 55. The output of the flip--flop circuit 55 is the key storage access register busy signal (KSAR-BUSY).
The construction of a portion of the control circuit 15 for judging whether the content of the key register 9 is equal to the entry data of the key queue 8 or not is il].us-trated in Fig. 3B. The address data of the entry 1 through n of the key queue 8 are compared with the con-tent of the address portion 9-2 of the key register 9 in the comparator circuits 10-1 through 10-n. The output of the comparator circuit 10-i and the V bit of the entry i of the key queue 8 are supplled to the AND gate circuit 29-i. The output: of the comparator circuit 10-i and the V and RQ bits of the entry i of the key queue 8 are supplied to the AND gate circuit 30~ he outputs (EQUl through EQUn) of the AND
gate circuits 29-1 through 29-n are supplied to the OR gate circuit 49. The non-inverted output of the OR gate circuit ~9 becomes logic "1" when the content of the address portion 9-2 is equal to the address data of one ~ntry with V bu-t of logic "1", and this output is denoted by the "equal" signal with entry of V = 1 (V = l-EQU). The inverted signal of the OR gate circuit 49 is denoted by the "unequal" signal with entry of V = 1 (~ = l UNEQ). The non-inverted output of the OR gate circuit 50 becomes logic "1" when the content of the address portion 9-~ is equal to the address data of one entry with V bit of logic "1" and with RQ bit of logic "1", and this output is denoted by the "equal" signal with the entry of V = RQ = 1 ~V = RQ = l EQU). The inverted output of the OR gate circuit 50 is denoted by the "unequal" signal with the entry of V = RQ = 1 ~V = RQ = l-UNEQ).
The R bit and C bit of entry i are supplied to the AND
gate circuit 31-i, and the R bit and the inverted signal of the C bit of entry i are supplied to the AND gate circuit 32-i. The output of the AND gate circuit 29-1 (that is, the "equal" signal i) and the output of the AND gate circuit 31-i are supplied to the AND gate circuit 33-i. The "equal"
signal i (EQUi) and the ou-tput oE the AND gate circuit 31-i is supplied to the AND gate circuit 34-i. The outputs of the AND gate circuits 33-1 through 33-n are supplied to the OR gate circuit 51. The output of the OR gate circuit 51 becomes logic "1" when the R and C bits of the entry with the same address are "1,1", and it is denoted by RC="l,l".
The outputs of the AND gate circuits 33-1 through 33-n are supplied to the OR gate circuit 52. The output of the OR
gate circuit 52 becomes logic "1" when the R and C bit oE
the entry with the same address are ll1,0", and it is deno-ted by RC = "1,0".
Figure 3C illustrates a construction of a circuit for producing the queue register signal. The output of the AND
gate circui~ 35 beco~es logic "1." when the followiny three conditions are fulfilled: that the key storage access request is a data fetch command, that the "unequal" siynal wit;~ the entry of V = 1 (V = l UNEQ) is logic "1", and that the queue full signal (Q~FULL) is logic "0". The ou~put of the AND gate circuit 36 becomes logic "1" when the following three conditions are fulfilled: that the key ~torage access request is a data store command, that the "unequal" signal with the entry of V = 1 (V = l - UNEQ) is logic "1", and that the quene full signal (Q-FULL) is logic "0". The output of the A~D gate circuit 37 becomes logic "1" when the follo~ing four conditions are fulfilled: that the key storage access request is a data store command, that the "equal" signal with the entry of V = 1 (V = l-EQU~ is logic "1", that the RC = "1,0" signal is logic "1", and that the queue full signal (Q.FULL) is logic "0". The outputs of the ~N~ gate circuits 35, 36, and 37 are supplied to the ~æ gate circuit 53. The output of the OR gate circuit 53 is the queue register signal (Q REG).
Figure 3D illustrates the construction of circuits for producing the set signals for the V and RQ bits and the reset signals for the RQ bits of the entries 1 through n.
The content of the in~queue counter 7 is the key queue writing address and is supplied to the decoder circuit 59.
The output of the decoder circuit 59 corresponcLing to entry i and the queue register signal are supplied to the AND gate circuit 38-i. The output of the AND gate circuit 38-i is the set signal for Vi and RQi (Vi-RQi-S~T~. When the content of the in-queue counter 7 designates entry i, the i-th output of the decoder circuit 59 is logic "1". When the queue register signal (Q-REG) becomes logic "1" in this case, the set signal for Vi and RQi ~Vi-RQi-SET) becomes logic "1", the Vi and RQi bits of entry i are set to logic "1", and the content of the in-queue counter 7 is counted up by +1 and becomes i+l. The content of the out-queue cou~lter 13 is the key queue reading address and is supplied to the decocLer ~39~

circuit ~0. The ith output of the decoder circuit 60 and the queue read signal (Q-READ~ are supplied to the AND gate circuit 39-i. The output of the AND gate circuit 39-i is the rese~ signal for the RQi bit of the entry i (RQi.RES).
When the con~ent of the out-queue counter 12 is i, the ith output of the decoder circuit 60 is logic "l". When the queue read signal (Q. READ) becomes logic "l" in this case, the reset signal for RQi bit becomes logic "l", the RQ bit of the entry i is reset to logic "0", and the content of the out-queue counter 13 is counted up by ~l and becomes i~l.
Figure 3E illustrates the construction of the circuit for producing the reset signals of the V bits of the entry l through n. The output of the AND gate circuit 41 becomes logic "l" when the following four conditions are fulfilled:
that the key storage access request is the data store command, tht the "equal" signal with the entry of V = l (V = l-EQU) is logic "l", that the RC -~ "1,0" signal is logic "l", and that the queue full signal (Q FULL) is logic "0". The output of the AND gate circuit 41 and the output of the AND gate circuit 29-i ("equal" signal i) are supplied to the AND gate circuit 40-i. The output of the AND gate circuit 4'J-i is the reset signal for the Vi bit (Vi.RES). The flip-flop circuits 56-l through 56-n are used for storing the V bits of the entries l through n. The set signal for the Vi and RQi bits (Vi- RQi~SET) is supplied to the flip-flop circuit 5~-.i, and the reset signal for the Vi (Vi-RES) bit is supplied to ~he reset input of the flip-flop circuit 56-i. The flip-flop circuits 57-l through 57-n are used for storing the RQ bits of the entries l through n.
Thè set signal for the Vi and RQi bits (Vi RQi-SET) is supplied to the set input of the flip-flop circuit 57-i~
and the reset signal for the RQi ~it (RQi-RES) is supplied to the reset input of the flip-flop circuit 57-i.
In the above-mentioned embodime~t, the key-storage access request from the main storage control unit 3 or the like is once set into the key register 9 and compared with the con-tent of the key queue 8. If a key storage access ~ ~ 3 ~ ~ ~d ~

request with the same content as the newly received one has been already registered into the key queue, registering of the received key storage access re~uest is not executed. If the key storage access request with the same content is not registered in the key queue 8 and if the key stora~e access request is produced by the main storage fetch or store command, the key-storaye access request is registered into the key queue 8. The registered keystorage access requests are read out in order, set into the key storage access register ll, and sent to the key storage unit 2O
Figure 4A illustrates one word of the key storage unit 2 and the key storage address. Figure ~B illustrates one byte (word) of the main storage unit l and the main storage address. One word of the key storage unit 2 includes a main storage key, a reference bit, and a change bit. The key storage address corresponds to one unit block of the main storage unit 1. In the above-mentioned embodiment, the R
bit and the C bit in the key storage unit 2 are respectively changed to logic "1" and "0" in the case of data fetch and are changed to logic "l" and "l" in the case of data store.
However, the C bit is preferably kept unchanged in the case of data fetch. In order to change only one of the R and C
bits, mask bits for R and C bits (~ ancl CM bits) may be used. Figure 4C illustrates the data format of one el~try of the key queue 8 with an R~l and C~l bits.
In the above-mentioned embodiment, when a key command is received by the key register 9, the key address of the key command is compared with the address of the key-storage access request registered in the key queue 8. If the key storage access request has the same address as the key command, the execution of the key command stops until this key-storage access request is executed. Among the key commands, however, the reset reference bit command (RRB
command) is usually repeatedly executed to reset all the R
bits in the key storage uni-t 4. Thus, it is desirable to execute the RRB command without waiting for the execution of the registered key--storage access request with the same ~.L~

address, from the viewpoint of speeding up the processing.
In another embodiment of the present invention, there is provided a system for controlling the main storage key in which the RRB com~and is executed without waiting for the execution of the key-storage access requen~ with -the same address registered in the key queue ~. In this system, the construction of the key storage control unit 4 is the same as shown in Fig. ~, except that each entry of the key queue 8 has the mask bits ~l and CM. The processing for the data fetch and the data store in this system is the same as described above.
When the insert storage key command (IS~ cor~mand) is set in the key register 9, the content of the address portion 9-2 is compared with the address data of the entries 1 through n. If the content of the address portion 9-2 is equal to the address data of one entry with V=RQ=l, the execution of the ISX command stops until the execution of the access request registered in the corresponding entry is finished. If the content of the address portion 9-2 is not equal to the address data of any entry with V=RQ=l, the content of the key register 9 is set into the key-storage access register ll, and the ISK command is executed.
When the set storage key cornmand (SSX command) is set into the key register 9, the content of the address portion 9-2 is compared with the address data oE the entries l through n of the key queue 8. If the conten-t of the address portion 9-2 is equal to the address data of one entry with V=RQ=l, the execution of the SSK command stops until the execution of the access request registered in the correspond-ing entry. If the content of the address portion 9-2 is equal to the address data of one entry with V=l and RQ-0, the V bit and the RQ bits of the corresponding entry are reset to logic "0", the content of the key register 9 is set into the key storaye access register ll, and the SSK command is executed. If the content of the address portion 9-2 is not equal to the address data of any entry with V=l, the content of the key register 9 is set lnto the key storage access register 11, and the SSK command is executed.
When the RRS command is se-t into the key register 9, the content of the address portion 9-2 is compared with the address data of the entries l through n. If the conten-t of the address portion 9-2 is equal to the address data of one entry with V=RQ=l and the ~1, R, CM, and C bits of this entry are "1111", then the V and RQ bits of this entry are reset to "0", the content of the key register 9 is set into the key storage access register ll, and the ~l, R, C~l, and C
bits in the key storage access register ll are set to "lOll".
Then, the RRB command is executed, and the R and C bit of the corresponding address in the key storage unit 2 are set to "01". If the content of the address portion 9-2 is equal to the address data of one entry with V=R=l and the RM, Rf CM, and C bits of this entry are "llO0", then the V and RQ
bits of this entry are changed to lll'l the content of the key register 9 is set into the key storage access register ll, and the ~1, R, C~l, and C bits of this entry are set to '11000". Then, the RRB command is executed, and the R bit of the corresponding address in the key storage unit 2 is reset to "0". In this case, the C bit of the corresponding address in the key storage unit 2 is not changed.
If the content of the address portion 9-2 is equal to the address data of any entry with V=l and RQ=0, then the V
and RQ bits of this entry are reset to "0, 0", the content of the key register 9 is set into the key-storage access register 11, and the RM; R~ C~1, and C bits of the key register ll are set to "lO00". Then, the RRB command is executed as described above. If the content of ~he address portion 9-2 is not e~ual to the address data of any entry with V=l, the content of the key register 9 is set into the key storage access register ll, the R~l, R, CM, and C bits of ~he key storage access register ll are set to "lO00", then the RRB command is executed.
The above-mentioned operation of the RRB command is illustrated in Fig. 5.
As described above, in accordance with this embodiment of the present invention, the processin~ of -the RRB command can be speeded up.

Claims (5)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A system for controlling a key storage unit in a data processing apparatus; said data processing apparatus comprising a main storage unit; a key storage unit for storing a main storage protection key, a reference bit, and a change bit corresponding to each unit block of said main storage unit; at least one processing unit, said processing unit producing an access request for said main storage unit;
a main storage control unit for processing said access request for said main storage unit; and a key storage control unit for controlling the access to said key storage unit;
said main storage control unit also producing an access request for said key storage unit to change said reference bit and said change bit in said key storage unit corresponding to the accessed unit block of said main storage and supplying said access request for said key storage unit to said key storage control unit every time said main storage control unit accesses said main storage unit in response to said access request for said main storage unit supplied from said processing unit;
said key storage control unit comprising a key queue for holding a plurality of said access requests for said key storage unit supplied from said main storage control unit temporarily, said key storage control unit registering each of said access requests for said key storage unit supplied from said main storage control unit into said key queue in order, and said key storage control unit, independent of the above-mentioned registering process, reading out and processing each of said access requests for said key storage unit registered in said key queue in order;
said key storage control unit also comprising means for comparing the content of said access request for said key storage unit supplied from said main storage control unit with the content of each access request for said key storage unit registered in said key queue, and means for inhibiting said access request for said key storage unit supplied from said main storage control unit from being registered doubly in said key queue when the content of said access request for said key storage unit supplied from said main storage control unit is equal to the content of one of said access requests for said key storage unit registered in said queue.
2. A system for controlling a key storage unit as defined in claim 1; wherein said key queue has n unit memories, each of said unit memories including address data, a reference bit, and a change bit.
3. A system for controlling a key storage unit as defined in claim 2; wherein said key storage control unit comprises means for decoding said access request for said key storage unit supplied from said main storage control unit or said processing unit, and said decoding means judges whether said access request is a main storage data fetch command, a main storage data store command, or a key command.
4. A system for controlling a key storage unit as defined in claim 3; wherein as key commands, an insert storage key command for reading said main storage protection key in said key storage unit, a set storage key command for setting said main storage protection key in said key storage unit, and a reset reference bit command for resetting said reference bit in said key storage unit are processed.
5. A system for controlling a key storage unit as defined in claim 4; wherein when said reset reference bit command is supplied to said key storage control unit, the address portion of said reset reference command is compared with the address data of said access request registered in said key queue, and if said address portion is equal to said address data of one of said registered access requests, the reference bit of the corresponding address of said key storage unit is reset and the change bit of the same address is changed as requested in said registered access request immediately.
CA000422397A 1982-02-27 1983-02-25 System for controlling key storage unit Expired CA1199124A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP57031201A JPS58150195A (en) 1982-02-27 1982-02-27 System for controlling main storage key
JP57031326A JPS58150196A (en) 1982-02-27 1982-02-27 System for updating and controlling main storage key
JP57-031326 1982-02-27
JP57-031201 1982-02-27

Publications (1)

Publication Number Publication Date
CA1199124A true CA1199124A (en) 1986-01-07

Family

ID=26369651

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000422397A Expired CA1199124A (en) 1982-02-27 1983-02-25 System for controlling key storage unit

Country Status (7)

Country Link
US (1) US4589064A (en)
EP (1) EP0087956B1 (en)
AU (1) AU542447B2 (en)
BR (1) BR8300977A (en)
CA (1) CA1199124A (en)
DE (1) DE3381123D1 (en)
ES (1) ES520118A0 (en)

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4965825A (en) 1981-11-03 1990-10-23 The Personalized Mass Media Corporation Signal processing apparatus and methods
US7831204B1 (en) 1981-11-03 2010-11-09 Personalized Media Communications, Llc Signal processing apparatus and methods
USRE47642E1 (en) 1981-11-03 2019-10-08 Personalized Media Communications LLC Signal processing apparatus and methods
US4761731A (en) * 1985-08-14 1988-08-02 Control Data Corporation Look-ahead instruction fetch control for a cache memory
JPS6244854A (en) * 1985-08-23 1987-02-26 Canon Inc Memory protecting circuit
GB8619989D0 (en) * 1986-08-16 1986-09-24 Modray Ltd Controlling length of time
JPS6376034A (en) * 1986-09-19 1988-04-06 Hitachi Ltd Multiple address space control system
US4977594A (en) * 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4891753A (en) * 1986-11-26 1990-01-02 Intel Corporation Register scorboarding on a microprocessor chip
US5276892A (en) * 1987-02-24 1994-01-04 Digital Equipment Corporation Destination control logic for arithmetic and logic unit for digital data processor
DE3901457A1 (en) * 1989-01-19 1990-08-02 Strahlen Umweltforsch Gmbh METHOD FOR ADDRESS AREA MONITORING IN REAL-TIME DATA PROCESSING DEVICES
US5335334A (en) * 1990-08-31 1994-08-02 Hitachi, Ltd. Data processing apparatus having a real memory region with a corresponding fixed memory protection key value and method for allocating memories therefor
US5163096A (en) * 1991-06-06 1992-11-10 International Business Machines Corporation Storage protection utilizing public storage key control
JP2788836B2 (en) * 1992-05-15 1998-08-20 インターナショナル・ビジネス・マシーンズ・コーポレイション Digital computer system
US5636365A (en) * 1993-10-05 1997-06-03 Nec Corporation Hierarchical buffer memories for selectively controlling data coherence including coherence control request means
US5590309A (en) * 1994-04-01 1996-12-31 International Business Machines Corporation Storage protection cache and backing storage having system control element data cache pipeline and storage protection bits in a stack array with a stack directory for the stack array
US7165174B1 (en) 1995-02-13 2007-01-16 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US7133845B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
CA2683230C (en) 1995-02-13 2013-08-27 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US7124302B2 (en) 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7069451B1 (en) 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7133846B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US7143290B1 (en) 1995-02-13 2006-11-28 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
JP3786993B2 (en) * 1995-12-14 2006-06-21 株式会社日立製作所 Data storage unit and data storage device using the unit
US20010011253A1 (en) * 1998-08-04 2001-08-02 Christopher D. Coley Automated system for management of licensed software
US20060265337A1 (en) * 1996-02-26 2006-11-23 Graphon Corporation Automated system for management of licensed digital assets
US5787309A (en) * 1996-05-23 1998-07-28 International Business Machines Corporation Apparatus for protecting storage blocks from being accessed by unwanted I/O programs using I/O program keys and I/O storage keys having M number of bits
US5809546A (en) * 1996-05-23 1998-09-15 International Business Machines Corporation Method for managing I/O buffers in shared storage by structuring buffer table having entries including storage keys for controlling accesses to the buffers
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US7062500B1 (en) 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US6112181A (en) * 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7092914B1 (en) * 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7233948B1 (en) 1998-03-16 2007-06-19 Intertrust Technologies Corp. Methods and apparatus for persistent control and protection of content
US7430670B1 (en) 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
US6807620B1 (en) * 2000-02-11 2004-10-19 Sony Computer Entertainment Inc. Game system with graphics processor
US6826662B2 (en) 2001-03-22 2004-11-30 Sony Computer Entertainment Inc. System and method for data synchronization for a computer architecture for broadband networks
US6809734B2 (en) 2001-03-22 2004-10-26 Sony Computer Entertainment Inc. Resource dedication system and method for a computer architecture for broadband networks
US6526491B2 (en) 2001-03-22 2003-02-25 Sony Corporation Entertainment Inc. Memory protection system and method for computer architecture for broadband networks
US7516334B2 (en) * 2001-03-22 2009-04-07 Sony Computer Entertainment Inc. Power management for processing modules
US7233998B2 (en) 2001-03-22 2007-06-19 Sony Computer Entertainment Inc. Computer architecture and software cells for broadband networks
US7231500B2 (en) * 2001-03-22 2007-06-12 Sony Computer Entertainment Inc. External data interface in a computer architecture for broadband networks
US7093104B2 (en) * 2001-03-22 2006-08-15 Sony Computer Entertainment Inc. Processing modules for computer architecture for broadband networks
US7024519B2 (en) * 2002-05-06 2006-04-04 Sony Computer Entertainment Inc. Methods and apparatus for controlling hierarchical cache memory
JP2004303092A (en) * 2003-03-31 2004-10-28 Fujitsu Ltd Memory device, memory access restriction system and memory access method
US8224639B2 (en) 2004-03-29 2012-07-17 Sony Computer Entertainment Inc. Methods and apparatus for achieving thermal management using processing task scheduling
JP4818793B2 (en) 2006-04-20 2011-11-16 ルネサスエレクトロニクス株式会社 Microcomputer and memory access control method

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3761883A (en) * 1972-01-20 1973-09-25 Ibm Storage protect key array for a multiprocessing system
US4037215A (en) * 1976-04-30 1977-07-19 International Business Machines Corporation Key controlled address relocation translation system
US4136386A (en) * 1977-10-06 1979-01-23 International Business Machines Corporation Backing store access coordination in a multi-processor system
US4225922A (en) * 1978-12-11 1980-09-30 Honeywell Information Systems Inc. Command queue apparatus included within a cache unit for facilitating command sequencing
EP0019358B1 (en) * 1979-05-09 1984-07-11 International Computers Limited Hierarchical data storage system
US4293910A (en) * 1979-07-02 1981-10-06 International Business Machines Corporation Reconfigurable key-in-storage means for protecting interleaved main storage
US4392200A (en) * 1980-01-28 1983-07-05 Digital Equipment Corporation Cached multiprocessor system with pipeline timing
JPS5832427B2 (en) * 1980-02-14 1983-07-13 株式会社日立製作所 multiplex information processing system
US4399506A (en) * 1980-10-06 1983-08-16 International Business Machines Corporation Store-in-cache processor means for clearing main storage
US4471163A (en) * 1981-10-05 1984-09-11 Donald Thomas C Software protection system
US4439830A (en) * 1981-11-09 1984-03-27 Control Data Corporation Computer system key and lock protection mechanism

Also Published As

Publication number Publication date
DE3381123D1 (en) 1990-02-22
US4589064A (en) 1986-05-13
EP0087956B1 (en) 1990-01-17
ES8403641A1 (en) 1984-03-16
EP0087956A3 (en) 1985-11-06
ES520118A0 (en) 1984-03-16
BR8300977A (en) 1983-11-16
AU1180083A (en) 1983-09-01
AU542447B2 (en) 1985-02-21
EP0087956A2 (en) 1983-09-07

Similar Documents

Publication Publication Date Title
CA1199124A (en) System for controlling key storage unit
CA1181180A (en) Computer system key and lock protection mechanism
US4937736A (en) Memory controller for protected memory with automatic access granting capability
US5025370A (en) Circuit for preventing lock-out of high priority requests to a system controller
US4434464A (en) Memory protection system for effecting alteration of protection information without intervention of control program
EP0106600B1 (en) Circuit for checking storage protection
CA1159154A (en) Sequential chip select decode apparatus and method
US3742458A (en) Memory protection system providing fixed, conditional and free memory portions corresponding to ranges of memory address numbers
GB1586847A (en) Data processing apparatus
EP0260433B1 (en) Multi-address space control method
JPS58208849A (en) Preventor for unauthorized reading of program word
GB1142465A (en) Improvements in or relating to data processing systems
CA1237200A (en) Access verification arrangement for digital data processing system which has demand-paged memory
US4658356A (en) Control system for updating a change bit
US5559989A (en) Device for protecting memory areas of an electronic microprocessor
CA1279407C (en) Buffer storage control system
US5218688A (en) Data processing system with memory-access priority control
US5101374A (en) Secure, fast storage and retrieval without interactive checking
JPS58150196A (en) System for updating and controlling main storage key
JPH0612333A (en) Storage protection system of information processor
JPH0154735B2 (en)
JPH05225117A (en) Exclusive control circuit for main storage device
US5555560A (en) Request cancel system for cancelling a second access request having the same address as a first access request
US4937779A (en) Information retrieving apparatus capable of rearranging information stored in memory
SU868744A1 (en) Multiplexor channel

Legal Events

Date Code Title Description
MKEX Expiry
MKEX Expiry

Effective date: 20030225