Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and chip for protecting stored data

A technology for storing data and protecting devices, applied in the field of communication, can solve the problems of high chip cost and limited application scope, and achieve the effect of protecting storage content, wide application scope and reducing hardware cost

Active Publication Date: 2021-02-09
GREE ELECTRIC APPLIANCES INC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a protection method, device and chip for storing data, so as to solve the problem of high chip cost and limited application range in the prior art when protecting Flash content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and chip for protecting stored data
  • A method, device and chip for protecting stored data
  • A method, device and chip for protecting stored data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see figure 1 , figure 1 It is a schematic flowchart of a method for protecting stored data provided in Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes:

[0051] Step 101, detecting whether the preset protection condition for protecting the memory is satisfied;

[0052] Step 102, if the preset protection condition is met, close the connection interface connected to the storage.

[0053] The memory refers to flash memory (Flash Memory), which is a long-life non-volatile memory that can still save data when power is off. Therefore, flash memory is usually used to save the main application program and some important data. Certainly, the memory may also be other types of memory, for example, Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (Static Random Access Memory, SRAM) and so on.

[0054] The preset protection condition includes: the preset password storage area has a protection function enabled, and...

Embodiment 2

[0062] see figure 2 , figure 2 It is a schematic flowchart of a method for protecting stored data provided in Embodiment 2 of the present invention. figure 2 with the above figure 1 The main difference is that the method also includes:

[0063] Step 103, detecting whether an instruction including a user password is received;

[0064] Step 104, if an instruction containing the user password is detected, then judge whether the user password matches the verification password;

[0065] Step 105, if the user password matches the verification password, open the connection interface connected to the storage.

[0066] Based on the first embodiment above, when the connection interface is disabled, the connection interface can be opened with a correct user password. Wherein, it may be detected whether a command including a user password is input through the serial port, or whether an instruction including a user password is input through other interfaces. When the instruction i...

Embodiment 3

[0071] On the basis of the second embodiment above, in order to further improve the security of the stored content and prevent the stored content from being read or modified, the connection interface connected to the storage needs to be opened only after the correct verification password is input several times in succession. Therefore, if image 3 As shown, the storage data protection method provided by the embodiment of the present invention includes:

[0072] Step 201. Detect whether a preset protection condition for protecting a memory is met.

[0073] Step 202, if the preset protection condition is met, close the connection interface connected to the storage.

[0074] Step 203, detecting whether an instruction including a user password is received.

[0075] Step 204, if an instruction containing the user password is detected, determine whether the user password matches the verification password.

[0076] For the above steps 201 to 204, reference may be made to the descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communications, in particular to a method, device and chip for protecting stored data. The method includes: detecting whether a preset protection condition for protecting the memory is met; if the preset protection condition is met, closing a connection interface connected to the memory. This implementation mode controls the connection interface connected to the memory by means of software, so as to achieve the purpose of protecting the storage content, and does not need to add additional design, reduces the hardware cost, and has a wide range of applications.

Description

【Technical field】 [0001] The invention relates to the technical field of communications, in particular to a method, device and chip for protecting stored data. 【Background technique】 [0002] Flash memory (Flash) is a memory whose data will not be lost after power failure. In the field of electronic products and industrial applications, it is often used to save some important data. The data stored in Flash generally faces risks such as intentional tampering and "copy board". Therefore, it is of great significance to protect data in Flash. [0003] At present, the protection technologies for Flash content include encryption and signature. The signature ensures that the program data will not be modified, and the encryption ensures that the plaintext cannot be read. However, both encryption and signature require special algorithms, which require high CPU performance and are difficult to develop, and are not suitable for general electronic and industrial products. In addition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/79G06F21/85G06F21/31
CPCG06F21/31G06F21/79G06F21/85
Inventor 吴建文昌明涛
Owner GREE ELECTRIC APPLIANCES INC