Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting binary data in non-volatile memory and apparatus therefor

A binary data, non-volatile technology, applied in the direction of electrical digital data processing, internal/peripheral computer component protection, climate sustainability, etc., can solve problems such as illegal outflow, inability to use correct programs, easy leakage of cryptographic data, etc. , to achieve the effect of increasing the level of protection

Inactive Publication Date: 2015-09-16
ABOV SEMICON
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The non-volatile memory such as the above-mentioned flash memory stores the inherent program of the manufacturing company, and uses it for the purpose of specific control, and uses a password to prevent the illegal outflow of this program, so that the correct one cannot be used without knowing the password. program
[0006] The existing non-volatile memory read prevention circuit is to combine the data of the password part with a specific program and the data of the non-volatile memory unit part (XNOR, exclusive NOR) to prevent others from illegally Use the program content of the non-volatile memory, but if the number of unprogrammed units in the non-volatile memory unit is more than the number of units in the password part, the unprogrammed unit data of the memory unit and the data in the password part are passed through exclusive OR The value of the NOT gate combination becomes the same as the data in the encryption part, so it is easy to leak the data in the encryption part to others, and there is a problem of illegal outflow of the program stored in the non-volatile memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting binary data in non-volatile memory and apparatus therefor
  • Method for protecting binary data in non-volatile memory and apparatus therefor
  • Method for protecting binary data in non-volatile memory and apparatus therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to achieve the above-mentioned purpose, the binary data protection method of non-volatile memory according to an embodiment of the present invention includes: a step of receiving program code; analyzing the received program code, and detecting the components that constitute the program code a step of a binary pattern of binary data; a step of generating intrinsic pattern information corresponding to the binary pattern based on the detected binary pattern; encrypting the program code using the generated intrinsic pattern information the step of; and the step of storing the encrypted program code in memory.

[0032] In the encrypting step, at least one of the manufacturing inherent information of the memory and the chip inherent information of the memory may also be considered to encrypt the program code, or user information and time or date information may also be considered At least one of the program codes is encrypted.

[0033] Moreover, the method according t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a method for protecting binary data in a non-volatile memory and an apparatus therefor. The method for protecting binary data in a non-volatile memory, according to one embodiment of the present invention, comprises: a step of receiving a program code; a step of detecting a binary pattern of binary data constituting the program code by analyzing the received program code; a step of generating unique pattern information corresponding to the binary pattern on the basis of the detected binary pattern; a step of encrypting the program code using the generated unique pattern information; and a step of storing the encrypted program code in a memory. The step of encrypting encrypts the program code by further considering the production-specific information of the memory and / or chip-specific information of the memory, or encrypts the program by further considering at least one of user information or time or date information, so that the program code can be adaptively encrypted and stored in each non-volatile memory, thereby improving the level of protection for the binary data in the non-volatile memory.

Description

technical field [0001] The present invention relates to the protection of the binary data of the non-volatile memory (non-volatile memory). More specifically, the present invention relates to the program code to be stored in the non-volatile memory. The binary data protection method and device of the non-volatile memory can improve the binary data protection level of the non-volatile memory by encrypting the inherent information related to the memory, and even information such as user information and time / date information. Background technique [0002] Flash memory is non-volatile, which means that flash memory keeps the information of the chip (chip) and stores information in the semiconductor in a way that does not require electricity. The flash memory stores information on an array of transistors called "cells" that each store more than 1 bit. The memory cell is based on a FAMOS (Floating-Gate Avalanche-Injection Metal Oxide Semi-conductor) transistor, and the FAMOS tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/71G11C29/00
CPCG06F21/78G11C7/24G06F12/1408G06F2212/1052G06F2212/214G06F2212/402Y02D10/00G06F21/71G11C29/00
Inventor 朴大振李光熙
Owner ABOV SEMICON