Supercharge Your Innovation With Domain-Expert AI Agents!

Flashmemory safety system and method thereof

A security system, technology of flash memory, applied in the field of security systems, can solve problems such as inability to execute security systems, difficulties, etc.

Active Publication Date: 2009-04-08
PHISON ELECTRONICS +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, in actual application, the existing technology cannot implement the security system through addressing, and must refer to the addressable memory space with a large amount of memory space
On the other hand, it is also difficult to implement in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flashmemory safety system and method thereof
  • Flashmemory safety system and method thereof
  • Flashmemory safety system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The embodiments described in this paragraph are to illustrate the present invention, but not to limit the present invention. The invention is not limited to particular materials, processing steps or dimensions. The invention is defined by the appended claims.

[0056] see Figure 4 , which is a schematic diagram disclosing a security system applied to a flash memory according to a preferred embodiment of the present invention. As shown in the figure, the module structure of the security system of the flash memory 40 includes a memory space 41, which is provided with an identification program 411; Space 41, is used for judging whether this specific signal 412 accords with the predetermined restriction signal 441 that is stored in external processor 44; When the limit signal 441 is predetermined and a negative decision is made, the identification program 411 in the memory space 41 is prohibited from being used.

[0057] In practical applications, the logic component 4...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention reveals a flash memory used in the security system and method.The method includes the steps a) to provide a pre-established limit signal to the main system; b) definition of specific signal stored in the flash memory, used in the instructions memory capacity. Also has the flash identification procedures; c) When the main system memory and the connection than the specific signal with the signal pre-established limit, and d) When the signal is not in conformity with the specific target signal restrictions, prohibiting calls stored in the memory of the identification procedures, and the other remaining memory space can be set to use. Thus, the invention can provide value for the specific space definition of the main system, and simplify the definition of processes, which reached system security.

Description

technical field [0001] The invention relates to a security system applied to memory, especially to a security system applied to flash memory and its application method. Background technique [0002] Recently, in-memory systems have been widely utilized. For the average user, a typical memory system can accept various stored data files to execute various programs and allow the user to extract and use the resources. The use of such memory systems is generally described as "unlimited". However, for a limited-use system, it may contain confidential information, and the user may need to call the data according to regulations such as usage time limit. In addition, currently available memory systems are mostly connected to a microprocessor core, and the microprocessor core can control and use any or all areas in the memory by generating appropriate addresses. The processor needs to obtain the application approval of the memory to simultaneously execute instructions from the addr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/79
Inventor 陈禹任S·科泰卡
Owner PHISON ELECTRONICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More