Unlock instant, AI-driven research and patent intelligence for your innovation.

Memory data scrambling method

A memory, memory type technology, applied in the computer field, can solve problems such as memory data leakage

Active Publication Date: 2019-10-08
兆讯恒达科技股份有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the storage data of the memory is stolen by an illegal user under an intrusive attack, it will cause a risk of data leakage to the business process of the memory and its host computer itself and even the upper-level application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory data scrambling method
  • Memory data scrambling method
  • Memory data scrambling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0078] Memory There are three main types of memory used to store data:

[0079] The first storage type is specifically volatile memory, including but not limited to random access memory (Random Access Memory, abbreviated as RAM), static random access memory (Static Random Access Memory, abbreviated as SRAM), etc., which is characterized by Data will be lost. Generally, this type of memory is used to process temporary memory data generated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a memory data scrambling method, which is characterized by comprising the following steps of obtaining a memory type and a read-write state word; when the type of the memory is a first storage type, obtaining a first scrambling code, and performing the first data scrambling processing according to the first scrambling code and the read-write state word; when the type of the memory is a second storage type, obtaining a second scrambling code, and performing the second data scrambling processing according to the second scrambling code and the read-writestate word; and when the type of the memory is a third storage type, obtaining a first scrambling code key and an encryption and decryption block length, and performing the third data scrambling processing according to the first scrambling code key, the encryption and decryption block length and the read-write state word. According to the method disclosed by the invention, three different data scrambling methods are respectively used for carrying out scrambling protection on the data in the memory according to the type of the memory, and even if a single chip microcomputer is attacked in an interventional manner, a destroyer cannot obtain an original text of the stored data.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a memory data scrambling method. Background technique [0002] With the wide application of memory, intrusive attack methods and equipment against memory are also developing rapidly. Its main attack object is the stored data in the memory, and the original text of the data in the storage unit can be directly obtained through the intrusive detection attack device. Once the stored data of the memory is stolen by an illegal user under an intrusive attack, it will pose a risk of data leakage to the business process of the memory and its host computer itself and even the upper-level application system. Contents of the invention [0003] The object of the present invention is to provide a memory data scrambling method for the above-mentioned technical defects. According to the method of the present invention, a specific data scrambling protection method can be provided for differe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/16G06F21/60G06F21/78
CPCG06F12/16G06F21/602G06F21/78
Inventor 李立范振伟
Owner 兆讯恒达科技股份有限公司