18147103. Resource Access Control simplified abstract (Advanced Micro Devices, Inc.)

From WikiPatents
Jump to navigation Jump to search

Resource Access Control

Organization Name

Advanced Micro Devices, Inc.

Inventor(s)

Sooraj Puthoor of Austin TX (US)

Nuwan S. Jayasena of Cupertino CA (US)

Resource Access Control - A simplified explanation of the abstract

This abstract first appeared for US patent application 18147103 titled 'Resource Access Control

Simplified Explanation: The abstract describes a method for controlling access to computational resources by checking the execution context of an instruction seeking access to a resource.

  • The process involves checking if the execution context contains a resource indicator for permission.
  • Additionally, an access table is used to determine which processes are allowed or denied access to the resource.

Key Features and Innovation:

  • Access control for computational resources based on execution context and access table.
  • Ensures only authorized processes can access the resource.
  • Enhances security and resource management in computing environments.

Potential Applications: This technology can be applied in:

  • Operating systems for resource allocation.
  • Cloud computing environments for access control.
  • Network security systems for managing resource access.

Problems Solved:

  • Unauthorized access to computational resources.
  • Resource contention among processes.
  • Ensuring compliance with access policies.

Benefits:

  • Improved security and resource utilization.
  • Enhanced control over resource access.
  • Efficient resource management in complex computing environments.

Commercial Applications: Potential commercial applications include:

  • Security software for access control.
  • Cloud computing platforms for resource management.
  • Operating systems with enhanced security features.

Prior Art: Researchers can explore prior art related to access control mechanisms in operating systems, cloud computing, and network security systems.

Frequently Updated Research: Stay updated on research related to access control mechanisms, resource management, and security protocols in computing environments.

Questions about Resource Access Control: 1. How does this technology improve resource utilization in computing environments? 2. What are the key factors to consider when implementing access control mechanisms for computational resources?


Original Abstract Submitted

Resource access control is described. In accordance with the described techniques, a process (e.g., an application process, a system process, etc.) issues an instruction seeking access to a computation resource (e.g., a processor resource, a memory resource, etc.) to perform a computation task. An execution context for the instruction is checked to determine whether the execution context includes a resource indicator indicating permission to access the processor resource. Alternatively or additionally, the instruction is checked against an access table which identifies processes that are permitted and/or not permitted to access the computation resource.