A method, device and chip for protecting stored data
A technology for storing data and protecting devices, applied in the field of communication, can solve the problems of high chip cost and limited application scope, and achieve the effect of protecting storage content, wide application scope and reducing hardware cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] see figure 1 , figure 1 It is a schematic flowchart of a method for protecting stored data provided in Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes:
[0051] Step 101, detecting whether the preset protection condition for protecting the memory is satisfied;
[0052] Step 102, if the preset protection condition is met, close the connection interface connected to the storage.
[0053] The memory refers to flash memory (Flash Memory), which is a long-life non-volatile memory that can still save data when power is off. Therefore, flash memory is usually used to save the main application program and some important data. Certainly, the memory may also be other types of memory, for example, Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (Static Random Access Memory, SRAM) and so on.
[0054] The preset protection condition includes: the preset password storage area has a protection function enabled, and...
Embodiment 2
[0062] see figure 2 , figure 2 It is a schematic flowchart of a method for protecting stored data provided in Embodiment 2 of the present invention. figure 2 with the above figure 1 The main difference is that the method also includes:
[0063] Step 103, detecting whether an instruction including a user password is received;
[0064] Step 104, if an instruction containing the user password is detected, then judge whether the user password matches the verification password;
[0065] Step 105, if the user password matches the verification password, open the connection interface connected to the storage.
[0066] Based on the first embodiment above, when the connection interface is disabled, the connection interface can be opened with a correct user password. Wherein, it may be detected whether a command including a user password is input through the serial port, or whether an instruction including a user password is input through other interfaces. When the instruction i...
Embodiment 3
[0071] On the basis of the second embodiment above, in order to further improve the security of the stored content and prevent the stored content from being read or modified, the connection interface connected to the storage needs to be opened only after the correct verification password is input several times in succession. Therefore, if image 3 As shown, the storage data protection method provided by the embodiment of the present invention includes:
[0072] Step 201. Detect whether a preset protection condition for protecting a memory is met.
[0073] Step 202, if the preset protection condition is met, close the connection interface connected to the storage.
[0074] Step 203, detecting whether an instruction including a user password is received.
[0075] Step 204, if an instruction containing the user password is detected, determine whether the user password matches the verification password.
[0076] For the above steps 201 to 204, reference may be made to the descr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


