Data processing system and method, storage medium and processor
A data processing system and data processing technology, applied in the field of data security, which can solve problems such as unproven solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] According to the embodiment of the present application, an embodiment of a data processing system is also provided, wherein, based on the unclonability of the security chip, the system uses the key in the security chip to protect the data in the storage device, but the external interface does not No change, it is still the external interface used by the original storage device, thus ensuring that the storage device has anti-cloning capability without making hardware changes to the product.
[0039]Specifically, the structural diagram of the data processing system provided by this application is as follows figure 1 shown. Depend on figure 1 It can be known that the data processing system provided in this application includes: a controller 101 and a security chip 103 .
[0040] Wherein, the controller 101 is configured to obtain data to be processed and send the data to be processed to the security chip, wherein the data to be processed includes at least one of the foll...
Embodiment 2
[0091] According to the embodiment of the present application, an embodiment of a data processing method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0092] Under the operating environment described in the above-mentioned embodiment 1, the application provides the following Figure 7 The data processing method shown. Figure 7 is a flowchart of the data processing method according to the present application, wherein, figure 1 The controller in the present embodiment can execute the data processing method provided by Figure 7 It can be seen that the data processing method includes the following steps:
[0093] In step S702, the first processor receives ...
Embodiment 3
[0110] Under the operating environment described in the above-mentioned embodiment 1, the present application also provides the following Figure 8 The data processing method shown. Figure 8 is a flowchart of the data processing method according to the present application, wherein, figure 1 The security chip in can execute the data processing method provided by this embodiment, by Figure 8 It can be seen that the data processing method includes the following steps:
[0111] Step S802, the second processor receives the data to be processed sent by the first processor.
[0112] It should be noted that the security chip is connected with the serial peripheral device interface SPI or general input and output interface GPIO of the controller.
[0113] In addition, it should be noted that the above-mentioned data to be processed may be data that the controller needs to read from a storage device or a cache, or may be data that the controller needs to store in a storage device o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


