Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for expanding memory of information safety equipment

A technology for information security and security equipment, which is applied in the field of expanding the memory of information security equipment, and can solve the problems of small internal memory capacity, performance limitation, and information security destruction.

Active Publication Date: 2011-08-10
BEIJING SENSESHIELD TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing information security devices generally use smart card chips as the hardware platform, the capacity of the internal memory is small, and the performance is greatly limited.
Some applications with large memory requirements, such as multi-process operation, are difficult to implement
However, information security equipment is very different from ordinary electronic equipment. Ordinary electronic equipment generally has no security requirements. Even if the data in the equipment is obtained from the outside, it does not matter. However, information security equipment is designed for data security. If the external memory is used directly, the data may be intercepted or tampered by the attacker, and the security of the information may be destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for expanding memory of information safety equipment
  • Method for expanding memory of information safety equipment
  • Method for expanding memory of information safety equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] The external memory in this embodiment is the memory in the computer host connected to the information security device.

[0077] In this embodiment, the memory in the information security device is divided into memory blocks of the same size. The COS of the dongles maintains a memory map table. The mapping of the starting physical address and starting virtual address of each memory block is recorded in the table.

[0078] The data exchange strategy adopts the LRU (Least Recently Used) algorithm, that is, the algorithm that has not been used for the longest time recently. Transfer the least frequently used memory block to the host side.

[0079] On the host side, the driver of the information security device is responsible for processing the data blocks sent by the information security device. The driver maintains a block table that records the starting virtual address of each memory block that is transferred to the host.

[0080] When a program in the information se...

Embodiment 2

[0091] The external memory in this embodiment is a memory extended outside the main chip of the information security device.

[0092] This embodiment implements multi-process operation by using an off-chip extended memory.

[0093] In this embodiment, the entire memory in the information security device is divided into one memory block, that is, the unit of data exchange is all the data in the memory.

[0094] The strategy of data exchange is that when a process switch occurs, data exchange occurs along with it.

[0095] The off-chip extended memory is controlled by the main chip of the information security device, that is, the processing of the transmitted data by the external memory is also completed by COS.

[0096] When process switching occurs in the information security device, data exchange is required. like Figure 4 ,Proceed as follows:

[0097] 401. The COS of the information security device encrypts the data in the memory, and uses the current process ID as an i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for expanding the memory of an information security device. The information security device uses an external device by data exchange, thus expanding the memory of the information security device. During the process of data exchange, data is transmitted to the external memory in ciphertext, attackers can not get the plaintext even if intercept the data. If the checkcode is checked during data exchange process, the attackers can not temper the data. Therefore, the method ensures the security of information.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for expanding the memory of an information security device. Background technique [0002] External memory, memory other than the main chip of the software protection device. Such as off-chip extended memory, memory in the computer host connected to the software protection device, hard disk, etc. [0003] COS (Card Operating System), card operating system, a small operating system running in information security equipment. [0004] Information security equipment refers to equipment that encrypts and protects software and authenticates identity. [0005] However, the existing information security equipment generally uses a smart card chip as the hardware platform, the capacity of the internal memory is small, and the performance is greatly limited. Some applications with large memory requirements, such as multi-process operation, are difficult to implement. However,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/78
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH