Method for protecting data integrity of memory

A data integrity and memory technology, applied in digital data protection, internal/peripheral computer component protection, memory address/allocation/relocation, etc., can solve the problem of occupying system computing resources, spending a lot of time on integrity verification, and other issues to achieve the effect of reducing storage space consumption, small negative impact, and reducing system performance degradation

Inactive Publication Date: 2015-03-25
DALIAN UNIV OF TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using an integrity protection tree for integrity protection requires a lot of storage space to store the internal nodes of the tree, and it takes a lot of time to verify the integrity of the data blocks fetched from the memory, which will take up a lot of system computing resource

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting data integrity of memory
  • Method for protecting data integrity of memory
  • Method for protecting data integrity of memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings. The specific implementation process is as follows, combined with figure 1 , 2 and 3:

[0029] When the CPU reads a block of data from memory:

[0030] ①The system reads the data block in ciphertext form from the memory;

[0031] ②If the counter of this data block is in the on-chip counter cache, go to ④;

[0032] ③If the counter of this data block is not in the on-chip counter cache, calculate the position of the counter in the memory, and read the counter from the memory;

[0033] ④ Apply the counter mode encryption method to decrypt the data block;

[0034] ⑤The program ends.

[0035] When the CPU writes a block of data back to memory:

[0036] ①The system allocates the latest counter for the data block that needs to be written back;

[0037] ② Apply the counter mode encryption method to encrypt the data block;

[0038] ③ Calculate the storage location of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting data integrity of a memory. The method comprises the steps of first, generating a new counter to be allocated to a data block when a system needs to write the data block back to the memory; encrypting the data block through a counter mode encryption method; inputting addresses of the obtained cryptograph data block and the data block to an MAC function with a secrete key, wherein the MAC function will generate an output; determining a storage position of the counter in the memory according to the output of the MAC function. Compared with a traditional memory data integrity protection scheme, the same or superior memory data integrity protection can be provided with low storage space consumption and small occupation of computing resources.

Description

technical field [0001] The invention belongs to the technical field of computer data storage protection, and relates to a method for protecting the integrity of memory data. Background technique [0002] With the continuous development of technology, more and more data is stored in memory, especially some confidential information. Attackers can launch a variety of active attacks on the memory, destroy the integrity of the data stored in the memory, and make the system run with wrong results. Therefore, the integrity of these data needs to be protected. At present, a common solution for protecting the integrity of memory data is to build an integrity protection tree to verify the integrity of the data fetched from the memory. However, using an integrity protection tree for integrity protection requires a lot of storage space to store the internal nodes of the tree, and it takes a lot of time to verify the integrity of the data blocks fetched from the memory, which will take...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/78G06F12/06
CPCG06F21/64G06F21/79
Inventor 姚念民徐文霞谭国真战福瑞陈炳才
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products