Data storage method for non-volatile storage space in chip and trusted chip

A non-volatile storage and data technology, applied in digital data processing, data processing input/output process, and key distribution, can solve the problems of poor accuracy of original data and achieve the effect of ensuring correctness

Active Publication Date: 2018-05-25
ALIBABA GRP HLDG LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] Embodiments of the present invention provide a data storage method of a non-volatile storage space in a chip and a trusted chip to at least solve the problem of reading original data from the non-volatile space of a trusted security chip in the prior art. Technical issues with poor accuracy of raw data received

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage method for non-volatile storage space in chip and trusted chip
  • Data storage method for non-volatile storage space in chip and trusted chip
  • Data storage method for non-volatile storage space in chip and trusted chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] According to an embodiment of the present invention, a method embodiment of a method for storing data in a non-volatile storage space in a chip is also provided.

[0047] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 2 It shows a hardware structure block diagram of a computer terminal (or mobile device) for realizing the data storage method of the non-volatile storage space in the chip. Such as figure 2 As shown, the computer terminal 10 (or mobile device 10) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 may include but not limited to a microprocessor MCU or a processing device such as a programmable logic device FPGA), a memory 104 for storing data, and a transmission module 4 for communication functions. In addition, it can also include: a display, an input / output interface (I / O inter...

Embodiment 2

[0099] According to an embodiment of the present invention, an embodiment of a method for acquiring data stored in a chip is also provided.

[0100] This application provides Figure 7 Shown is the method of fetching data stored in the chip. Figure 7 is a flowchart of a method for acquiring data stored in a chip according to Embodiment 2 of the present invention. Including the following steps:

[0101] Step S702, receiving an access request for accessing the non-volatile storage space of the chip;

[0102] Step S704, responding to the access request, obtaining the verification information and the length of data to be requested;

[0103] Step S706, in the case that the verification information is passed, it is judged whether the length of the data to be requested is within the storage address range of the owner data preset in the non-volatile storage space;

[0104] Step S708, if the length of the requested data is within the storage address range of the owner data, the co...

Embodiment 3

[0124] According to an embodiment of the present invention, an embodiment of a trusted chip is also provided.

[0125] This application provides Figure 8 A schematic diagram of the structure of the trusted chip shown. Figure 8 is a schematic structural diagram of a trusted chip according to Embodiment 3 of the present invention, and the trusted chip includes: a memory 801 . in,

[0126] The memory 801 includes a non-volatile storage space, wherein the attributes of the non-volatile storage space at least include: parameters used to characterize the storage of owner data in the non-volatile storage space, and the storage address range of the owner data; Wherein, the storage address range of the owner data is used to represent the maximum data length allowed to request data from the chip.

[0127] In the technical solution defined by the above-mentioned memory 801, the storage mode of the above-mentioned non-volatile storage space can adopt big-endian mode and little-endian...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data storage method for a non-volatile storage space in a chip and a trusted chip. The method comprises the step that the non-volatile storage space is created in the chip, wherein properties of the non-volatile storage space at least include parameters used for representing owner data stored in the non-volatile storage space and a storage address range of the owner data,and the storage address range of the owner data is used for representing maximum data length allowing requesting of data from the chip. Through the method, the technical problem that in the prior art, when original data is read from the non-volatile space of the trusted secure chip, the read original data is poor in accuracy is solved.

Description

technical field [0001] The invention relates to the field of data storage, in particular to a method for storing data in a non-volatile storage space in a chip and a trusted chip. Background technique [0002] Users can create a non-volatile space in the trusted security chip, and can assign the attributes shown in Table 1 to the non-volatile space: [0003] Table 1 [0004] [0005] figure 1 It shows a schematic diagram of interaction of a user acquiring non-volatile space data according to the prior art, as shown in figure 1 As shown, it specifically includes the following steps: [0006] (1) The owner C initiates a request for accessing the non-volatile space to the trusted chip T; [0007] (2) The trusted chip T responds to the request of the owner C, asking it to feedback the password, the number of the non-volatile space and the length of the data; [0008] (3) The owner C returns the password, the number of the non-volatile space to be accessed, and the length...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06
CPCG06F3/061G06F3/0638G06F3/0679G06F3/06G06F21/79H04L9/08
Inventor 付颖芳
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products