Implementation method for memory data encryption protection

A data encryption and implementation method technology, applied in the direction of digital data protection, electronic digital data processing, internal/peripheral computer component protection, etc., can solve the problems of low encryption performance, etc., to solve data theft, ensure encryption, area The effect of low power consumption

Active Publication Date: 2018-04-13
CHIPSEA TECH SHENZHEN CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The random seed is generated by an algorithm, there is still the possibility of cracking, and the encryption performance is not very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for memory data encryption protection
  • Implementation method for memory data encryption protection
  • Implementation method for memory data encryption protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] figure 1 , figure 2 Shown is the implementation method of the memory data encryption protection realized by the present invention, as shown in the figure. The memory first needs to open up a user configuration area and configure random seeds.

[0025] S101. Realize the random sequence module, using the shift register sequence (m sequence), for example, select the m sequence primitive polynomial x^24+x^7+x^2+x+1.

[0026] S102. Design a random seed for the user configuration area. Set the random seed to 32 bits, and the encryption effect is higher. At the same time, the random seed need...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method for memory data encryption protection. According to the method, a memory needs to open up a user configuration region, configure random seeds and set arandom sequence module first; then original data is processed through the random sequence module, so that the saving address of the original data in the memory is changed into a random address; and the original data is processed through the random sequence module, so that the original data is changed into random data. Through the method, the purpose of high encryption protection of the memory data is achieved, the security of user data is improved, the reliability of a chip is improved, and meanwhile the scheme is easy and convenient to implement and small in area power consumption.

Description

technical field [0001] The invention belongs to the technical field of data storage, and in particular relates to a chip data storage method. Background technique [0002] In chip applications, chip memory data generally integrates customer applications or stores user data. These data may involve issues such as privacy and security, especially in industries such as finance, communications, and social security. Therefore, the security of memory data Sex must be guaranteed. Data security must be ensured not only in normal application environments, but also in the event of malicious attacks, so that crackers cannot obtain user privacy data and customer applications, resulting in the risk of information leakage. [0003] Patent application 200910081928.6 discloses a system and method for ensuring safe reading of data stored in a memory, including a memory and a main chip, wherein the main chip is used to generate a random number seed, which is decoded and sent to the memory; T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/60
CPCG06F21/602G06F21/78
Inventor 彭永林
Owner CHIPSEA TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products