Unlock instant, AI-driven research and patent intelligence for your innovation.

Non-volatile memory data encryption system

A non-volatile, data encryption technology, applied in the field of data security, can solve problems such as no longer applicable, and achieve the effect of improving data security and avoiding data leakage

Active Publication Date: 2020-06-05
SHANGHAI EASTSOFT MICROELECTRONICS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if other developers allow program development on the same microprocessor, the method of encrypting all program data on the chip is no longer applicable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-volatile memory data encryption system
  • Non-volatile memory data encryption system
  • Non-volatile memory data encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In the prior art, in order to protect the core intellectual property rights of the data on the chip, all the data on the chip is usually encrypted. However, if other developers are allowed to develop programs on the same chip, the method of encrypting all data on the chip is no longer applicable.

[0024] In the embodiment of the present invention, an encryption area is set in advance in the storage area corresponding to the non-volatile memory, and the encrypted first read operation instruction and first data are stored in the encryption area. When the read operation instruction read by the processor is not the first read operation instruction, the execution of the read operation on the first data is refused. In other words, when there is a need to read the first data, only the first read operation instruction is allowed to read the first data, and other read operation instructions cannot read the first data. Therefore, non-volatile Security of data in encrypted areas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data encryption system of a nonvolatile memory comprises a processor and the nonvolatile memory, wherein an encryption area is preset in a storage area corresponding to the nonvolatile memory, an encrypted first read operation instruction and first data are stored in the encryption area, and the first read operation instruction is a read operation instruction of the first data; the processor is in coupled connection with the nonvolatile memory and is applicable to reading the read operation instruction; when the read operation instruction which is read is the first read operation instruction, the first read operation instruction will be executed, and the first data will be read; and when the read operation instruction which is read is not the first read operation instruction, execution of a reading operation of the first data will be rejected. The scheme can guarantee data safety in a chip and openness of program development of the processor at the same time.

Description

technical field [0001] The invention relates to the field of data security, in particular to a non-volatile memory data encryption system. Background technique [0002] With the continuous development of the Internet of Things (IoT) industry, smart hardware has begun to rise, which makes the design of embedded systems more complicated. When developers develop a certain product, if they design from scratch, the development cycle will be too long, and they will lose their market competitiveness when competitors quickly launch new products. Usually, developers use chip manufacturers or other third-party function libraries, communication protocol stacks, or specific core algorithm libraries to speed up product development. [0003] Compared with hardware, software programs are easier to crack through reverse engineering. For example, directly reading binary code and copying it to another chip can realize simple copy board. Therefore, chip manufacturers or other third parties n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/79G06F21/62
CPCG06F21/6209G06F21/79G06F2221/2107
Inventor 钟雄光赵启山李星曾加
Owner SHANGHAI EASTSOFT MICROELECTRONICS