Method for protecting data of memorizer

A data protection and storage technology, applied in the field of storage data protection, can solve problems such as incomplete storage data protection, and achieve the effect of protection security and wide application

Inactive Publication Date: 2010-07-28
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF0 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the incomplete problem of memory data protection in the above-mentioned SOC chip, the present invention proposes a kind of method of memory data protection, logic circuit is arranged on the SOC c...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting data of memorizer
  • Method for protecting data of memorizer
  • Method for protecting data of memorizer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0030] This embodiment takes the AS500 security chip as an example to illustrate the implementation and application of this patented technology. AS500 is an encryption application SOC chip with built-in FLASH (that is, memory). The upper computer PC inputs the authority check code through the USB port to control the memory protection unit to achieve data protection for the embedded FLASH. The internal ROM program of AS500 is responsible for the software part of the entire data protection mechanism. Through the USB port, the ROM program will transfer the user's authority check code in the PC to the register of the storage protection unit, and open the corresponding area operation authority through the check.

[0031] like figure 1 As shown, in the chip AS500, CPU1 communicates with the memory protection unit 2, FLASH controller 3, embedded FALSH4, SRAM5, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for protecting data of a memorizer, which comprises the following steps of: dividing the memorizer into six regions which are respectively to be a serial number memory region, a configuration parameter region, an arithmetic execute-only region, a procedure region, a protected data region and an open data region; setting different authority check codes to each region except the open data region; and performing write operation after the authority check codes are correctly matched, wherein the data in the memorizer has to firstly pass through a protection unit of the memorizer before the write operation, and the authority check codes controls the protection unit of the memorizer whether to start operation authority to interrelated regions of the memorizer. The method has the benefits effects as follows: a set of rigorous data protection mechanism is built between a processor CPU and the memorizer to lead the data of the memorizer to be absolutely safe, be capable of preventing the date of the on-chip memorizer from being read, and effectively protect corresponding circuits when writing and erasing flash, etc. An upper machine controls the protection unit of the memorizer by inputting the authority check codes through an external communication interface to protect imbedded FLASH data.

Description

technical field [0001] The invention relates to the field of embedded SOC integrated circuit design, in particular to a memory data protection method. Background technique [0002] With the development of embedded technology and the popularity of 32-bit processor CPU core, its computing power is getting higher and higher, and a large number of software and core algorithms need to run in the CPU. Algorithms running on 32-bit CPUs are mostly general-purpose C program programming, which is highly portable. If leaked, it will cause serious consequences. When designing an SOC chip, it is necessary to have a complete set of mechanisms to protect software algorithms and data from being accidentally deleted or leaked. At the same time, it needs to be encrypted without affecting the original functions. This set of technology for memory data protection is referred to as MPU (Memory Protect Unit) technology. [0003] Existing SOC designs are rarely capable of protecting memory data, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 李兆亮贺晓明张飞飞邱柏云钱志恒
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products