Safe storage method and system based on Nand Flash flash-memory
A technology of data security storage and flash memory, applied in the protection of internal/peripheral computer components, etc., can solve the security threats of flash memory devices and other issues, and achieve the effect of increasing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Such as figure 1 As shown, the present embodiment provides a safe storage method based on Nand Flash flash memory, including:
[0038] Two-level address mapping is maintained in the flash memory translation layer: the first-level address mapping maintains the mapping table from the logical address of the file system to the logical address of the user data area; the second-level address mapping maintains the mapping table from the logical address of the user data area to the physical address in the flash memory. During initialization, a user data area logical address is determined in the firmware and reserved as the user data area logical address for confidential data.
[0039] 1) Initialization steps:
[0040] In the initialization phase, when the flash memory-based storage device is connected to a terminal device such as a PC host, the flash memory device initializes the trigger that controls the movement of confidential data and starts the trigger. There are two typ...
Embodiment 2
[0069] Such as Figure 5 As shown, the present embodiment provides a system for implementing the above-mentioned safe storage scheme for flash data, including a safe storage device for flash data (i.e. flash memory itself), an initialization device, a device for moving confidential data, a device for disguising safe blocks, and a device for reading confidential data . Among them, the flash memory data security storage device is respectively connected to the initialization device, the confidential data moving device, the security block data camouflage device, and the user reading confidential data device through the USB bus, and the flash memory data security storage device is connected to the terminal through the USB interface.
[0070] The flash memory data security storage device is used in the initialization stage, and triggers are set at the flash conversion layer; when the flash memory device is working, the trigger is started, and the FTL monitors the read, write and oth...
Embodiment 3
[0083] In this embodiment, at the beginning, there is no need to determine a logical address of the user data area in the firmware. However, the system needs to record the relevant information of the storage location of the confidential data (the actual record is the logical address of the user data area, to be exact, the result of the mathematical operation between the logical address of the user data area and the user password). In the redundant space of the system data reserved area (such as the page mapping table, etc.), the location where the confidential data is stored (the logical address of the user data area) is recorded. After the confidential data is moved, the first-level address mapping table is not updated to ensure that the confidential data cannot be directly read through the logical interface of the file system to increase data security, but it is necessary to update the location information of the confidential data in the system data retention area (that is, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 