Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Nonvolatile memory safety protection method

A non-volatile memory and security protection technology, which is applied in the field of security protection of non-volatile memory, can solve the problem of low security of non-volatile memory, and achieve the effect of improving security

Inactive Publication Date: 2016-12-14
苏州国芯科技股份有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This approach has the following disadvantages: cooperative users can easily read the binary code data of other users. Obviously, the codes of each manufacturer do not want to be stolen by other manufacturers. It can be seen that the security of non-volatile memory is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Nonvolatile memory safety protection method
  • Nonvolatile memory safety protection method
  • Nonvolatile memory safety protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The core of the present invention is to provide a safety protection method for a non-volatile memory, so as to improve the safety of the non-volatile memory.

[0025] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] Please refer to figure 1 , figure 1 It is a flow chart of a non-volatile memory security protection method provided by the present invention, the method comprising:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a nonvolatile memory safety protection method comprising the following steps: allowing a MPU module on a chip to receive a user read-write operation request on a nonvolatile memory when the chip is powered up, and carrying out identity identification of the read-write operation request; allowing the MPU module to intercept the read-write operation request if the read-write operation request is not a read-write operation request on local area codes by the local area authorized user, and interrupting the read-write operation request. The novel method can improve nonvolatile memory safety.

Description

technical field [0001] The invention relates to the field of storage technology, in particular to a method for safety protection of non-volatile memory. Background technique [0002] With the rapid development of information attack technology, new challenges have been raised for the protection of information security. At present, we often face the solution of multi-manufacturer cooperation to design chips. In this case, the codes used by various manufacturers are finally placed on the same non-volatile storage medium, that is, the non-volatile memory. The user's code is distributed in the non-volatile memory according to the negotiated address, and the users in each area manage their own code and complete the corresponding design update or download work. All user codes run on the same chip to realize the corresponding functions, and one of the users adjusts the specific functions of other users according to the needs to complete the final application. [0003] The usual m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/79
CPCG06F21/79
Inventor 郑茳肖佐楠匡启和王廷平张新斌
Owner 苏州国芯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products