Method for expanding memory of information safety equipment
A technology for information security and security equipment, which is applied in the field of expanding the memory of information security equipment, and can solve the problems of small internal memory capacity, performance limitation, and information security destruction.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] The external memory in this embodiment is the memory in the computer host connected to the information security device.
[0077] In this embodiment, the memory in the information security device is divided into memory blocks of the same size. The COS of the dongles maintains a memory map table. The mapping of the starting physical address and starting virtual address of each memory block is recorded in the table.
[0078] The data exchange strategy adopts the LRU (Least Recently Used) algorithm, that is, the algorithm that has not been used for the longest time recently. Transfer the least frequently used memory block to the host side.
[0079] On the host side, the driver of the information security device is responsible for processing the data blocks sent by the information security device. The driver maintains a block table that records the starting virtual address of each memory block that is transferred to the host.
[0080] When a program in the information se...
Embodiment 2
[0091] The external memory in this embodiment is a memory extended outside the main chip of the information security device.
[0092] This embodiment implements multi-process operation by using an off-chip extended memory.
[0093] In this embodiment, the entire memory in the information security device is divided into one memory block, that is, the unit of data exchange is all the data in the memory.
[0094] The strategy of data exchange is that when a process switch occurs, data exchange occurs along with it.
[0095] The off-chip extended memory is controlled by the main chip of the information security device, that is, the processing of the transmitted data by the external memory is also completed by COS.
[0096] When process switching occurs in the information security device, data exchange is required. like Figure 4 ,Proceed as follows:
[0097] 401. The COS of the information security device encrypts the data in the memory, and uses the current process ID as an i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 