Memory device, terminal apparatus and data repair system

A technology for storage devices and terminal equipment, applied in the field of repair systems, can solve problems such as hindering the expansion of new services, hindering IT (information technology development, user inconvenience, etc.)

Inactive Publication Date: 2004-05-19
PANASONIC CORP
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if any damage that may occur in the processing of card-type device information cannot be guaranteed to be repaired at low cost (including time cost) and reliably, then this not only hinders the processing of these type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory device, terminal apparatus and data repair system
  • Memory device, terminal apparatus and data repair system
  • Memory device, terminal apparatus and data repair system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0037] As shown in FIG. 1, the data restoration system according to the first embodiment of the present application includes a server 10 that manages data to be downloaded, a transmission path that protects sending / receiving with the server 10, and a terminal 20 that receives data to be downloaded. , and a storage device 30 inserted into the terminal 20 and storing downloaded data.

[0038] The data to be downloaded are immutable data such as program data, music data, and map data, etc., which do not allow the user to change the data. The server 10 separates the data of these items into several blocks, generates verification information (for example, hash value, check sum, CRC (cyclic redundancy check), signature, etc.) for the data in each block, and then retains and manages the authenticity data and inspection information. Then, upon receiving the data request from the terminal 20, the server 10 allows the download of the authentic data and verification information of the r...

no. 2 example

[0102] The second embodiment gives a description of a data restoration system that stores encrypted authentic data into a storage device.

[0103] In this memory device, as shown in FIG. 13, the memory controller 32 further includes an encryption coprocessor 331 that decrypts encrypted data. Its configuration is the same as that of the first embodiment (FIG. 2) except as described above.

[0104] Data processing of this memory device 30 is shown in FIG. 14 . In addition to a write section 327, a check section 328, a read section 329, and an internal nonvolatile memory 324, the memory controller 32 includes a decryption section 332 that decrypts encrypted data. The function of the decryption part 332 is realized by the encryption coprocessor 331 .

[0105] After encrypting the file data, the server 10 in this system separates the encrypted data into several blocks, and generates verification information (for example, hash value, checksum, CRC, signature, etc.) for the data in...

no. 3 example

[0122] The third embodiment gives a description of a data restoration system equipped with countermeasures against falsification of verification information.

[0123] In this system, a server allows a terminal to download data separated into blocks and verification information with a signature attached, and when storing the verification information, the storage device verifies the signature.

[0124] Data processing of this memory device 30 is shown in FIG. 16 . In addition to the write section 327 and the internal nonvolatile memory 324, the memory controller 32 includes a signature verification section 333 that verifies the signature of the verification information. The function of this signature verification section 333 is realized by the CPU 323 by executing processing governed by programs.

[0125] The server 10 in this system retains and manages data separated into several blocks and their verification information, and, upon receiving a data request from the terminal 20...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system includes server 10 that manages data and check information for checking damage to the data, terminal apparatus 20 that acquires the data and the check information from server 10, and memory device 30 that stores the data acquired by terminal apparatus 20 into non-tamper-resistant memory area 31 and the check information acquired by terminal apparatus 20 into tamper-resistant memory area 32. Memory device 30 detects data in which data damage has occurred using the check information. Terminal apparatus 20 acquires the detected data from server 10, and memory device 30 repairs the data damage using the data acquired by terminal apparatus 20. This improves the storage efficiency of memory device 30, and furthermore, reduces the data communication time taken for acquiring normal data for repair from server 10.

Description

technical field [0001] The present invention relates to a restoration system for repairing a damaged portion of downloaded data, a storage device and a terminal device constituting the system, and more particularly, an object of the present invention is to enable effective restoration of data stored in a storage device. Background technique [0002] Traditionally, it has been widely accepted to download data such as programs governing the processing of the terminal device from a server to the terminal device via a network. In some cases, the data stored in the storage medium of the terminal device is damaged due to various reasons, including abnormal transmission during downloading, device hardware failure, data loss caused by viruses, data destruction caused by external attacks, etc. [0003] These types of corruption can be detected by checking for a match between check information, such as a checksum sent with the data by the server, and a checksu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/00G06F11/10G06F12/14G06F12/16G06F21/64G06F21/78
CPCG06F21/78G06F21/64G06F11/1004G06F12/14G06F12/16
Inventor 中西良明佐佐木理高木佳彦
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products