A method for accessing memory with multiple permissions

A storage and permission technology, applied in the field of data management, can solve the problems of incorrect system status, restricted data modification, misoperation of data modification, etc., and achieves the effect of flexible and simple access form, fast read and write operations, and improved security.

Active Publication Date: 2016-05-11
HISENSE BROADBAND MULTIMEDIA TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the existing technology can read and write data, it has the disadvantages of complex process and inconvenient operation, and it cannot flexibly limit data modification according to the actual situation, and misoperation of data modification occurs, resulting in incorrect system status.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for accessing memory with multiple permissions
  • A method for accessing memory with multiple permissions
  • A method for accessing memory with multiple permissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] The specific process of embodiment one is as follows Figure 5 Shown:

[0054] Step 1. After the product is powered on, the program starts, and the physical storage area is virtualized into three blocks, which are called block A, block B, and block C respectively. Among them, blocks A and B store information about product characteristics, and block C stores product configuration parameter information.

[0055] In the initial state, the default password authority is zero-level password authority, and the information in the storage areas of block A and block B in the memory is read into the buffers BufferA and BufferB of the product respectively. If the user needs to read the storage contents of block A and block B, the contents in the buffer pools BufferA and BufferB can be read to a relevant interface (for example, a display interface).

[0056] The buffer pool BufferC stores default information when the program starts, which can be regarded as "invalid information" a...

Embodiment 2

[0069] The concrete process of embodiment two is as follows Figure 6 Shown:

[0070] Step 1. After the product is powered on, the program starts, and the physical storage area is virtualized into three blocks, which are called block A, block B, and block C respectively. Among them, blocks A and B store information about product characteristics, and block C stores product configuration parameter information.

[0071] In the initial state, the default password authority is zero-level password authority, and the information in the storage areas of block A and block B in the memory is read into the buffers BufferA and BufferB of the product respectively. If the user needs to read the storage contents of block A and block B, the contents in the buffer pools BufferA and BufferB can be read to a relevant interface (for example, a display interface).

[0072] The buffer pool BufferC stores default information when the program starts, which can be regarded as "invalid information" a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access method for kinds of permissions of a memorizer. A physical storage area of the memorizer is virtualized to be a plurality of memory areas used for storing data respectively. The access method includes the steps that a code input when a user has access to the memorizer is received; the received code is verified, the grade of the code is judged, different code grades correspond to different code permissions, and a corresponding code permission is given to the user according to the grade of the code; the user has access to the corresponding storage area according to the obtained corresponding code permission. Kinds of operation can be performed when the user has access to the storage data. The access mode is flexible, simple, and capable of achieving read-write operation of different data storage areas rapidly, improving safety of a product and effectively preventing faulty operation of data read-write.

Description

technical field [0001] The invention relates to the technical field of data management, in particular to a method for accessing a memory with multiple permissions. Background technique [0002] In the existing society, most electronic products, such as digital products such as mobile phones, PDAs, cameras, and tablet computers, or home appliance terminals such as smart TVs and set-top boxes, are equipped with memories to store product characteristic information and product-related information. parameter information etc. The product characteristic information stored in the memory is generally read-only for customers, and the user can only read the above product characteristic information, but has no right to change this information. In addition, product-related parameter information generally cannot be modified in order to ensure the normal use of the product. Therefore, general customers do not have permission to access this information, that is, they cannot read or write i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/78
Inventor 王文希李刚
Owner HISENSE BROADBAND MULTIMEDIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products