Systems and methods for securing firmware of a memory
A memory and memory module technology, applied in the field of firmware security, method and system, can solve the problems of difficulty, multi-cost, and impossibility of verification code confidentiality work
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] FIG. 1 is a functional block diagram of an embedded system and a host computer connected together through a standard interface. The host 10 can be a personal computer. The standard interface 11 can be an IDE bus or any kind of SPI interface. The embedded system 13 includes a microprocessor 12 and a storage module 14 . The storage module 14 includes a download module 18 , an embedded memory 16 , a memory check module 20 , and an erase module 22 . The embedded memory 16 can be a serial (serial) or parallel (parallel) flash memory (flash memory), which is used to store the firmware on which the microprocessor 12 operates. The embedded memory 16 can be placed in a multi-chip module (MCM) or in a system-on-chip (SOC) design. The download module 18 and the memory check module 20 work together as a guard to determine whether the memory data in the embedded memory 16 can be disclosed to the host 10 . When receiving an erase-trigger signal, the erase module 22 can erase the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 