Nonvolatile memory protecting system and method

A memory protection and non-volatile technology, applied in the direction of static memory, digital memory information, information storage, etc., can solve the problem of insufficient flexibility of memory encryption

Active Publication Date: 2010-12-01
HANGZHOU SILAN MICROELECTRONICS
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The traditional non-volatile memory encryption methods mainly include the following three types: (1) software encryption is performed on the data of the memory through a compiler, and the memory encryption realized by this method is easy to be cracked by analyzing signals and communication protocols; (2) through A hardware encryption module is set in the memory, and the encryption module is implemented by a fixed specific encryption algorithm. The memory encryption realized by this method is not flexible enough, and the same encryption method is used for different memory codes; (3) the key is solidified by masking Inside a ROM memory, if the memory encryption implemented by this method needs to be modified, it must be modified at the chip level. Compared with the second method, the cost of changing the method to modify the encryption key is much smaller, and only the mask can be modified, thereby Change the key, but for mass products, hardware modification cannot use different keys for each product, and key modification requires a certain amount of time and cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Nonvolatile memory protecting system and method
  • Nonvolatile memory protecting system and method
  • Nonvolatile memory protecting system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The content of the present invention will be further described below in conjunction with the accompanying drawings.

[0093] A non-volatile memory protection system for memory programming / verification devices such as figure 1 As shown, it includes: programming / checking unit (01), control unit (02) and memory (07):

[0094] The control unit (02) includes a memory control module (05), a key / protection code register group (04), a memory address selection module (06) and a protection module (03), wherein:

[0095] The memory control module (05) is connected to the programming / verification unit (01) through the control input port 1 of the control unit (02) and the first input control signal line (W15c), and receives the memory programming sent by the programming / verification unit (01). Or memory check instruction;

[0096] The memory control module (05) is connected to the programming / checking unit (01) through the address input port one of the control unit (02) and the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides nonvolatile memory protecting system and method. The method comprises the following steps of: calling a protecting code from a memory by a control unit; and limiting an unauthorized user to program or verify data/program of a protecting area. Meanwhile, the data input into the memory is encrypted data; the nonvolatile memory protecting system realizes that different memories have different keys, is not limited to one encrypting method and can provide different key protections for different addresses; if the key needs to be modified, the operation is carried out just by programming without replacing hardware; in the invention, an address encrypting key is used for encrypting the memory address, and the data of the unauthorized user for accessing the memory address is scrambling data; and a data/program decrypting key is used for decrypting the data/program of the memory, thereby preventing the unauthorized user from illegally obtaining the data and resolving.

Description

technical field [0001] The invention relates to a protection system and protection method for data / program programming, data / program verification, address encryption and data / program decryption of non-volatile memory. Background technique [0002] The traditional non-volatile memory encryption methods mainly include the following three types: (1) software encryption is performed on the data of the memory through a compiler, and the memory encryption realized by this method is easy to be cracked by analyzing signals and communication protocols; (2) through A hardware encryption module is set in the memory, and the encryption module is implemented by a fixed specific encryption algorithm. The memory encryption realized by this method is not flexible enough, and the same encryption method is used for different memory codes; (3) the key is solidified by masking Inside a ROM memory, if the memory encryption implemented by this method needs to be modified, it must be modified at t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G11C7/24G11C29/00G06F12/14G11C11/34
Inventor 徐国柱
Owner HANGZHOU SILAN MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products