http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CA-1252572-A
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_05060720d78cc9178696073231d89834 |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2009-45583 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2009-45566 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F12-1491 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-45558 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-46 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-455 |
filingDate | 1986-01-03-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate | 1989-04-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_0566aa481d3c8511d0db521cd63e1058 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_f60f1a1a665f7965f74843f2bdf20e12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_d8c0c2c1377dae347ec39c48f0ddcb8e |
publicationDate | 1989-04-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | CA-1252572-A |
titleOfInvention | Computer with virtual machine mode and multiple protection rings |
abstract | Abstract of the Disclosure A computer system including a processor and memory, the processor having a virtual mode of operation in which it uses a virtual machine monitor which allows it to service a plurality of users contemporaneously in a multiplexed manner, and a non-virtual, or real, mode of operation. The computer system has a set of at least three operation mode protection rings representing a hierarchy of access privilege levels in both the real and virtual modes, with the number of privilege levels in both the real and virtual modes being the same. The privilege levels govern the accessibility of memory locations to programs and the executability of certain privileged instructions, which cause control to be transferred to the virtual machine monitor when the processor is in a virtual mode. The two most privileged levels in the virtual mode are both treated as corresponding to the second most privileged level in the real mode, whereby if the processor is in the most privileged virtual operating mode, access to memory locations is permitted only if the location is accessible to the second most privileged mode. When an instruction is retrieved, the processor first performs a probe operation to determine whether it can access any required memory locations in response to its current privilege level, and then determines whether it is in a privilege level which allows it to process the instruction. |
priorityDate | 1985-01-04-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 25.