Secure writing of data
A data processor and file technology, which is applied in the direction of data error detection and response error generation, to achieve the effect of ensuring integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] see figure 1 , shows an EEPROM or Flash EPROM electronically erasable non-volatile memory M, which is controlled by a controller (not shown), which may be a programmed microprocessor.
[0015] In practice, the memory M and the microprocessor forming the memory controller are realized on the same electronic component, which is also called a semiconductor chip.
[0016] Typically, the memory M is used to store information structured as a logical entity controlled by said memory controller. In practice, the memory M is divided into, for example, one byte elements for reading information, and into pages for deleting said information, wherein said write operations can also be performed on a page-by-page basis .
[0017] By suitable programming, the memory controller is adapted to organize, ie synchronize, said logical entities of one or more data types into pages. Such synchronization is described, for example, in application EP 0 767 742 .
[0018] By way of example, a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 