Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information safety equipment and its file memory and access method

An information security and access method technology, applied in the field of information security equipment for file storage and access, can solve problems such as wrong writing, difficulty in writing source code, and destruction of secret data, so as to prevent malicious damage or misoperation and simplify writing Difficulty, the effect of reducing memory space

Inactive Publication Date: 2008-06-11
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, referring to Figure 2, since the execution of the code content in code file 1 and code file 2 requires the data content in data file 3, it may cause that when the code content in code file 1 is executed, write in data file 3 some secret data, and when the code content in code file 2 is executed, these secret data may be read from data file 3 (the reading at this time may be due to the fact that the code written as code content in code file 2 has some erroneous, or code written for the purpose of malicious attacks), at the same time, it is possible to destroy these secret data when reading
[0013] 2. It is difficult to write the source code as the code content in the code file, and it takes a lot of memory to execute the code file
[0027] The above-mentioned code as the code content is relatively complicated, and the corresponding data content must be read out before the corresponding application logic can be realized, so it needs to use up to 346 bytes of memory
[0028] 3. It is necessary to set and store a large amount of related information, which is not convenient for mass production of information security equipment
Due to the need to set and save a large number of directory location relationships while saving code files and data files, it has caused some inconvenience to the mass production of information security equipment
[0029] It can be seen that the file storage method in the existing information security equipment may reduce the security of the information security equipment due to access conflicts to data files, and it is necessary to set and store a large amount of associated information, and make the code content in the code file It is difficult to write code, and it takes a lot of memory to execute the code content in the code file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety equipment and its file memory and access method
  • Information safety equipment and its file memory and access method
  • Information safety equipment and its file memory and access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0059] The present invention provides a module file, which includes: a module file identifier (used to indicate that the file is a module file provided by the present invention), file header information, multiple segments, and header information of each segment. As shown in FIG. 3 , the present invention stores code files and data files corresponding to the same application logic in code segments and data segments in the same module file, that is, different module files correspond to different application logics.

[0060] Among them, the code segment and the data segment can be collectively referred to as the segment of the module file, and the header information of each segment includes various variables corresponding to the addressing information; the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a document store and access method in information security equipments. Code contents and data contents corresponding to the same application logic are respectively stored in a code segment and a data segment with the same module document and the code contents can only be used to access to the data contents in the data segment in the module document, therefore the code contents in each module document can not access to the data contents in other module documents to avoid that the code contents in other module documents read secret data in the module or damage the data contents in the module documents and improve the security of information security equipments. In addition, the invention does not need to set fussy addressing information in the code contents and read the data contents in a memory at first, thereby simplifying the compiling difficulty of the code contents and reducing the memory space occupied by executing code documents. The invention also discloses information security equipments which realize document store and access.

Description

technical field [0001] The invention relates to a file storage technology of an embedded device, in particular to a file storage and access method in an information security device, and an information security device for realizing file storage and access. Background technique [0002] In order to achieve software copyright protection, network security protection, or identity authentication, information security devices usually need to store some code content or data content, wherein the executable code content read or modify (write operation) the corresponding data content can realize various application of logic. [0003] For example, if the logical application corresponding to the code content and data content is to realize software copyright protection, the code content may be a hardware-side code transplanted from the software code, while the data content contains some manufacturer’s key information or software verify message. If the logical application corresponding t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 孙吉平韩勇
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products