A Method for Integrity Verification of Memory Data
A technology for integrity verification and memory data, which is applied in the field of memory integrity verification, can solve the problems of large delay in hash calculation and long verification path, etc., and achieve the goal of increasing access delay, improving utilization rate, and increasing delay Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The present invention will be further described below in conjunction with accompanying drawing:
[0033] The invention relates to the field of memory integrity verification, and relates to a method for verifying the integrity of memory data. At present, tree structures such as Merkle Tree, PAT, and TEC-Tree are mainly used in memory integrity to protect memory. When performing verification, it is necessary to recurse from the leaf node to the root node, and the delay is very large. The predecessors proposed CHTree, which only needs to verify the nodes in the hash cache, but because the intermediate nodes of a certain layer are fixedly stored in the cache, the cache content remains unchanged. The common feature of these types of trees is that the check path lengths of the data blocks are the same regardless of the access frequency of the data blocks. According to the locality principle of the program, some data access frequency is high and some data access frequency is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


