Memory integrity protection method based on write counter
An integrity protection and counter technology, applied in the direction of digital data protection, etc., can solve the problems of large time delay, long tree mechanism verification path, etc., and achieve the effect of low verification cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The present invention will be further described below in conjunction with the accompanying drawings.
[0029] The invention relates to the field of memory integrity verification, in particular to a memory integrity protection method based on a write counter. At present, tree structures such as MerkleTree, PAT, and TEC-Tree are mainly used in memory integrity to protect memory. When updating data, it needs to recurse from the leaf node to the root node, and the delay is very large. The present invention adopts different integrity verification mechanisms for the data on the memory. A data block has a write counter, which is used to record the number of times the processor writes to the address memory block. When writing data, the memory block address, write counter and data content are connected, and then the MAC function is calculated to obtain the corresponding authentication label for completeness. Integrity verification; some data blocks do not have write counters, a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com