CN101677018B - Secrecy system of memory and secrecy method for reading in memory burn mode - Google Patents
Secrecy system of memory and secrecy method for reading in memory burn mode Download PDFInfo
- Publication number
- CN101677018B CN101677018B CN2008101496422A CN200810149642A CN101677018B CN 101677018 B CN101677018 B CN 101677018B CN 2008101496422 A CN2008101496422 A CN 2008101496422A CN 200810149642 A CN200810149642 A CN 200810149642A CN 101677018 B CN101677018 B CN 101677018B
- Authority
- CN
- China
- Prior art keywords
- data
- signal
- protected
- memory
- read
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 15
- 230000004224 protection Effects 0.000 claims abstract description 58
- 238000007689 inspection Methods 0.000 claims description 8
- 230000004913 activation Effects 0.000 claims description 7
- 206010038743 Restlessness Diseases 0.000 claims description 4
- 230000005055 memory storage Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 6
- 241001269238 Data Species 0.000 description 3
- 238000004321 preservation Methods 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000009183 running Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
Images
Abstract
The invention discloses a secrecy system of a memory and a secrecy method for reading in a memory burn mode. The secrecy system comprises a burner, an erasing programmable non-volatile memory, a data read-write control circuit, a microcontroller and a memory data secrecy circuit, wherein the burner outputs burning input/output signals, the erasing programmable non-volatile memory is used for storing the driving program of a microcontroller, the data read-write control circuit receives the burning input/output signals of the burner to burn the erasing programmable non-volatile memory, the microcontroller reads the driving program of the erasing programmable non-volatile memory for controlling electronic product operation, and the memory data secrecy circuit is arranged between the data read-write control circuit and the erasing programmable non-volatile memory. When the program data of the non-volatile memory in the microcontroller is broken and read by people having ulterior motives, the system ensures that the program is not easy to read, reaching the confidentiality and the uniqueness of the program data. If the data program contains blank instruction protection data, the program is read by the data secrecy method.
Description
Technical field
The present invention relates to a kind of non-volatility memorizer (NVM; Non Volatile Memory) time slot scrambling of data; In particular to a kind of on the NOP data time slot scrambling of non-volatility memorizer (NVM, the Non Volatile Memory) data of supplementary protection information.
Background technology
Traditional method is as shown in Figure 1, and its job description is following:
1.IC get into the burning pattern, non-volatility memorizer write.
2. can the data of writing non-volatility memorizer be read and verify after writing completion.
3. data verification is accomplished, and leaves the burning pattern.
4.IC get into the burning pattern again, setting (option) parameter of particular address in the inspection non-volatility memorizer, whether decision is protected and is read the non-volatility memorizer data, and lets IC get in the burning pattern.
5. according to the value (option) of setup parameter, judge whether the user can protect the data that read on the non-volatility memorizer under the burning pattern.
If 6. protected mode, then forbidden data output, just whole data output 0 or 1.
7., then export the routine data in the non-volatility memorizer if not be protected mode.
Its traditional burning flow process is as shown in Figure 1.And under the burning pattern, need judge whether to allow the data of non-volatility memorizer to be read.In the 4th above-mentioned process; Setup parameter (option) is the particular address that writes on non-volatility memorizer; Because of in data not before the burning; This moment, the option initial value of protected data was 0, and according to the value of option, the burning pattern that got into this moment can read the data on the non-volatility memorizer; After data burning advances non-volatility memorizer,,,, just can't the data on the non-volatility memorizer be read if the option data of the protected data that reads are 1 because need read the value of option again if when leaving the burning pattern and returning the burning pattern.But because can not sense data in the burning pattern; Unique whereby people can learn that just the option data of protected data are 1; And then,, just can learn and crack success this moment until read output data to the cracking of the taking a whirl at property of option data of non-volatility memorizer.
Fig. 2 is traditional programming system, and job description is following:
1. cd-rom recorder 201 is seen I/O burning signal 202 off and is write read control circuit 203 to data, to get into the burning pattern.
2. through I/O burning signal 202, data write read control circuit 203 and see off to write data-signal 205, address signal 204, activation control signal 208 and write and read control signal 207 and write data for the formula programmable non-volatile property storer (EPNVM) 209 of erasing.
3. through I/O burning signal 202, data write read control circuit 203 and see address signal 204, activation control signal 208 off and write and read control signal 207 and carry out reading of data work for the formula programmable non-volatile property storer 209 of erasing.
4. when carrying out reading of data work, the formula of erasing programmable non-volatile property storer 209 is seen readout data signal 206 to data off according to address signal 204 and is write read control circuit 203, through I/O burning signal 202 output datas.
5. if during protected mode, then data write read control circuit 203 and can forbid output data, directly export 0 or 1 as output data, through I/O burning signal 202 output datas.
6. during microcontroller (MCU) 212 normal operations; Microcontroller 212 relies on INADD signal 211 to be input in the formula programmable non-volatile property storer 209 of erasing; Read stored routine data in the formula programmable non-volatile property storer 209 of erasing, the routine data of required execution when supplying with microcontroller 212 work through written-out program data-signal 210.
And because after the startup of traditional protected data pattern, the data that read are 0 or 1, unique people are learnt start the protected data pattern; And then crack to the protected data pattern; The de-preservation data pattern is exported routine data smoothly, and successful snooper data.
Summary of the invention
The technical matters that the present invention solved is to provide a kind of non-volatility memorizer (NVM; NonVolatile Memory) time slot scrambling of data and system; They are supplementary protection information on the NOP data; And then to realize improving the unique people that exists in the known technology be 1 by the option data of protected data, and then to the purpose of the problem that cracks of the taking a whirl at property of option data of non-volatility memorizer.
Preferable, this secrecy system comprises at least:
One cd-rom recorder is exported the input of a burning/go out signal;
The one formula programmable non-volatile property storer of erasing is in order to store the driver of microcontroller;
One data write read control circuit, the input of the burning of reception cd-rom recorder/go out signal, and the formula programmable non-volatile property storer of erasing is carried out burning work;
One microcontroller reads the driver of the formula programmable non-volatile property memory storage of erasing, in order to carry out the s operation control work of electronic product; And
One memory data secure circuit is arranged at data and writes read control circuit and erase between the formula programmable non-volatile property storer, and this memory data secure circuit comprises: a random number produces circuit, exports a random logarithmic data signal by a readout data signal; One first signal selecting circuit, by a control fetch protection signal select should unrest logarithmic data signal or this readout data signal as general protected data signal output; One inspection NOP instruction holding circuit checks whether this general protected data signal output has the NOP instruction and export NOP protection control signal; And one secondary signal select circuit, by this NOP protection control signal select should unrest logarithmic data signal or this general protected data signal export as a NOP protected data signal.
Wherein, during as if the startup protected data, this formula programmable non-volatile property storer of erasing is seen readout data signal off to this memory data secure circuit according to address signal; Adopt random number (random number) data mode; Produce the protected data signal, then input to these data and write read control circuit, again the data-signal of output protection; If when not starting protected data, this memory data secure circuit judges whether readout data signal contains the NOP protected data.
The present invention also provides under a kind of memory burn pattern and reads time slot scrambling, and it is with random number protected data, and it includes: microcontroller gets in the burning pattern; Selection writes, reads or leave the burning pattern to the ROM (read-only memory) in the microcontroller; If write work, then ROM (read-only memory) is carried out the program that writes; Write after hours, select to leave the burning pattern or continue to carry out the burning pattern; If read work, then whether check is protected mode earlier; If will start protected mode need address setting to protected data option when writing ROM (read-only memory), and when get into the burning pattern next time, start protected data mechanism; If the fetch protection pattern then adopts the data encryption method fetch program; If do not start the fetch protection pattern, then can carry out the general normal fetch program earlier; During reading of data, whether the data discrimination program contains promising NOP protected data; If data program contains the NOP protected data, then adopt the data encryption method fetch program; If do not contain the NOP protected data, then carry out the general normal fetch program; And write or read finish after, all can get into again and read or write pattern, up to leaving the burning pattern.
Describe the present invention below in conjunction with accompanying drawing and specific embodiment, but not as to qualification of the present invention.
Description of drawings
Fig. 1 is the burning process flow diagram of prior art;
Fig. 2 is the programming system synoptic diagram of prior art;
Fig. 3 is used for the process flow diagram that random number of the present invention is selected protected data;
Fig. 4 is the programming system synoptic diagram that is used for protected data of the present invention;
Fig. 5 is the structural representation that is used for memory data secure circuit of the present invention; And
Fig. 6 A and Fig. 6 B are the routine data that is used to explain that memory data of the present invention is maintained secrecy.
Wherein, Reference numeral
201 cd-rom recorders
202 I/O burning signals
203 data write read control circuit
204 address signals
205 data-signals
206 data-signals
207 write and read control signal
208 activation control signals
The 209 formula programmable non-volatile property storeies of erasing
210 written-out program data-signals
211 INADD signals
212 microcontrollers
401 cd-rom recorders
402 I/O burning signals
403 data write read control circuit
404 address signals
405 data-signals
406 data-signals
407 write and read control signal
408 activation control signals
The 409 formula programmable non-volatile property storeies of erasing
410 written-out program data-signals
411 INADD signals
412 microcontrollers
413 fetch protection mode signals
414 memory data secure circuits
415 NOP data-signals
501 random numbers produce circuit
502 random logarithmic data signals
503 signal selecting circuits
504 general protected data signals
505 inspection NOP instruction holding circuits
506 NOP protect control signal
507 signal selecting circuits
Embodiment
Fig. 3 is the process flow diagram that random number of the present invention is selected protected data.
Wherein, the routine data that the compositional language (AssemblyLanguage) that the data person of being to use of non-volatility memorizer writes is produced through compiler (Compiler), and compiler is when the conversion compositional language; Can insert dummy instruction (NOP in untapped storage address traditionally; No Operation) data are not because NOP has any effect for microcontroller, as if supplementary protection information on the NOP data; Also can not influence microcontroller execution work originally; Therefore we design a kind of anti-mechanism that cracks of protecting, and not only can conform to original burning mode, can increase the confidential nature of data again.The workflow of whole burned mechanism is explained as follows:
1. microcontroller gets in the burning pattern.
2. select the ROM (read-only memory) in the microcontroller is write, reads or leave the burning pattern.
3. if write work, then ROM (read-only memory) is carried out the program that writes.
4. write after hours, can select to leave the burning pattern or continue to carry out the burning pattern.
5. if read work, then whether check is protected mode earlier.
6. need when writing ROM (read-only memory) address setting if will start protected mode, and when get into the burning pattern next time, start protected data mechanism protected data option.
7. if the fetch protection pattern then adopts the data encryption method fetch program.
8., then can carry out the general normal fetch program earlier if do not start the fetch protection pattern.
9. during reading of data, whether the data discrimination program contains promising NOP protected data.
10. if data program contains the NOP protected data, then adopt the data encryption method fetch program.
11., then carry out the general normal fetch program if do not contain the NOP protected data.
12. write or read finish after, all can get into again and read or write pattern, up to leaving the burning pattern.
When getting into the burning pattern, but user's write-in program data, and read and confirm the correct of data; And in order to prevent that the write-in program data are stolen, then the user can start traditional data protection mechanism or user and adds at routine data and contain the NOP protected data, can protected data when making get into the burning pattern next time; And because unique people is 0 or 1 situation according to the data that read out, the option data that can learn the traditional protection data are 1, and then cracking the taking a whirl at property of option data of non-volatility memorizer; The data of being exported when therefore we change protection with the mode output data of random number, are obscured unique people's the mode that cracks; Even and if the traditional protection data are cracked successfully; Remove the traditional data protection mechanism, then carry out general fetch program during output data, can check in advance whether output data contains the NOP protected data; If the user adds at routine data and contains the NOP protected data; Then the same mode output data with random number of data of output owing to the NOP protected data is added in the routine data, and is written in the storer with the mode of routine data; Unrenewable other modes of unique people are cracked, with the defence program data that hit pay dirk.
Wherein, preferable, this non-volatility memorizer is a kind of by choosing among flash memory, EPROM, the EEPROM.
Fig. 4 is the programming system synoptic diagram that can realize data protection of the present invention.
Because after traditional protected data pattern started, the data that read were 0 or 1, unique people are learnt start the protected data pattern; And then crack to the protected data pattern, the de-preservation data pattern is exported routine data smoothly; And successful snooper data, in view of this, we crack according to such situation in order to obscure unique people; Invention proposes the new burning circuit structure that can realize data protection, and as shown in Figure 4, job description is following:
1. cd-rom recorder 401 is seen I/O burning signal 402 off and is write read control circuit 403 to data, to get into the burning pattern.
2. through I/O burning signal 402, data write read control circuit 403 and see off to write data-signal 405, address signal 404, activation control signal 408 and write and read control signal 407 and write data for the formula programmable non-volatile property storer 409 of erasing.
3. because the burning pattern is writing under the work, and we do not go bail for to data and protect, address signal 404 wherein inputs to the formula programmable non-volatile property storer 409 of erasing and writes data.
When the burning pattern when reading work; Through I/O burning signal 402, data write read control circuit 403 and see activation control signal 408 off and read control signal 407 and carry out reading of data work for the formula programmable non-volatile property storer 409 of erasing with writing.
5. when data write read control circuit 403 and read the routine data in the formula programmable non-volatile property storer 409 of erasing; For the defence program data are not stolen by other people; Can see fetch protection mode signal 413 off and give memory data secure circuit 414, start the mechanism of defence program data.
6. during as if the startup protected data; The formula of erasing programmable non-volatile property storer 409 is seen readout data signal 406 to memory data secure circuit 414 off according to address signal 404; Adopt random logarithmic data mode; Produce protected data signal 415, then input to data and write read control circuit 403, pass through the data-signal of I/O burning signal 402 output protections again.
7. if when not starting protected data, memory data secure circuit 414 will judge whether readout data signal 406 contains the NOP protected data
8. if routine data contains the NOP protected data, then adopt random logarithmic data mode, produce protected data signal 415, input to data and write read control circuit 403, again through the unprotected data-signal of I/O burning signal 402 outputs.
9. if no NOP protected data then directly inputs to data as protected data signal 415 with readout data signal 406 and writes read control circuit 403, again through the unprotected data-signal of I/O burning signal 402 outputs.
10. during microcontroller 412 normal operations; Microcontroller 412 relies on INADD signal 411 to be input in the formula programmable non-volatile property storer 409 of erasing; Read stored routine data in the formula programmable non-volatile property storer 409 of erasing, the routine data of required execution when supplying with microcontroller 412 runnings through written-out program data-signal 410.
The structure of memory data secure circuit 414 wherein, as shown in Figure 5.Job description is following:
1. after memory data secure circuit 414 receives readout data signal 406, produce circuit 501 through random number earlier and produce random logarithmic data signal 502.
2. selecting circuit 503 to select general protected data signal 504 by control fetch protection signal 413 control signals is random logarithmic data signal 502 or former data-signal 406.
3. if control fetch protection signal 413 is under the protected mode, then the general protected data signal 504 of signal selecting circuit 503 selections is random logarithmic data signal 502.
4. if control fetch protection signal 413 is under the general modfel, then the general protected data signal 504 of signal selecting circuit 503 selections is former data-signal 406, just untreated readout data signal 406.
5. follow general protected data signal 504 through inspection NOP instruction holding circuit 505, whether inspection written-out program data include the NOP protected data, and produce NOP protection control signal 506.
6. selecting circuit 507 to select NOP protected data signal 415 by NOP protection control signal 506 control signals is general protected data signal 504 or random logarithmic data signal 502.
7. if NOP protects control signal 506 for checking out no NOP protected data in the routine data, then the general protected data signal 504 of signal selecting circuit 507 selections is a NOP protected data signal 415.
8. if NOP protection control signal 506 includes the NOP protected data for checking out routine data, then the random logarithmic data signal 502 of signal selecting circuit 507 selections is a NOP protected data signal 415.
Wherein signal selecting circuit can be a MUX.
Readout data signal 406 just can be realized traditional data protection mechanism and NOP instruction protected data mechanism through after above memory data secure circuit 414 structures; Because the fixedly output data (0 or 1) that the traditional data protection mechanism produces is cracked and the de-preservation data pattern by unique people easily, and routine data is exported smoothly; And successful snooper data; Therefore we change the fixedly output that traditional protection mechanism is produced, and change employing and export with random number mode, obscure unique people and crack according to such situation; But if traditional protection mechanism is cracked success by unique people; Then carrying out general fetch program during output data, the NOP instruction protected data mechanism that we propose can check in advance whether output data contains the NOP protected data, because the NOP protected data has been added in the routine data; And the mode with routine data is written in the storer; Unrenewable other modes of unique people are cracked, crack the increase of mode degree of difficulty and time, make the memory data time slot scrambling success of NOP instruction protected data mechanism.
For instance: write batch processing do not protect contain NOP instruction protection routine data to the formula programmable non-volatile property storer 409 of erasing; (Programmed Data Sheets is as shown in table 1 to include address bit and routine data position; If do not start the mechanism of traditional protection routine data; Then can successfully read the routine data (Programmed Data Sheets is as shown in table 2) of correct order according to original address signal 404 and readout data signal 406; If start the mechanism of traditional protection routine data, then produce protected data signals 415, and input to data and write read control circuit 403 by memory data secure circuit 414; Through the data-signal (Programmed Data Sheets of this moment is as shown in table 3) of I/O burning signal 402 output protections, output data is that random number produces the random logarithmic data that circuit 501 is produced again.
If user's routine data adding originally contains the routine data of NOP instruction protection to the formula programmable non-volatile property storer 409 of erasing; Include address bit and routine data position (Programmed Data Sheets is as shown in table 4), can with table 1 relatively learn the data of General N OP originally (data bit: 0000) will change to again the NOP data that contain protection information (data bit: 0001), if do not start the mechanism of traditional protection routine data; The NOP data that then whether contain protection information by the instruction of the inspection NOP in the memory data secure circuit 414 holding circuit 505 inspection output datas; If be not checked through, then can (because at this moment, not start the mechanism of traditional protection routine data with general protected data signal 504 outputs; So general protected data signal 504 is former data-signal 406; Just unprotected data), contain NOP protection information up to being checked through output data, then ensuing routine data will be all with random logarithmic data signal 502 outputs (Programmed Data Sheets is as shown in table 5); Just can learn principle of work by table 5; When also not reading data in the address and containing NOP protection information (address: before 0012), can read raw data, in case (address: 0013) when reading data and containing NOP protection information; Then will read random number protected data, up to end.
If start the mechanism of traditional protection routine data; Then produce protected data signals 415, and input to data and write read control circuit 403, again the data-signal (Programmed Data Sheets of this moment is as shown in table 6) through I/O burning signal 402 output protections by memory data secure circuit 414; Output data by random number produce circuit 501 the random logarithmic data of generations; Because if start the mechanism of traditional protection routine data,, also will read random number protected data even if when reading data and containing NOP protection information; Up to end, so the data-signal table 6 of output protection will be the same with table 3.
By above specific embodiment, can learn when we change the employing of traditional protection mechanism and export with random number mode, obscure unique people and crack; Even and if traditional protection mechanism is cracked success by unique people; Then, can check in advance whether output data contains the NOP protected data, because the NOP protected data has been added in the routine data carrying out general fetch program during output data; And the mode with routine data is written in the storer; Unrenewable other modes of unique people are cracked, crack the increase of mode degree of difficulty and time, make the memory data time slot scrambling success of NOP instruction protected data mechanism.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.
Claims (10)
1. the secrecy system of a storer is characterized in that, it includes:
One cd-rom recorder is exported the input of a burning/go out signal;
The one formula programmable non-volatile property storer of erasing is in order to store the driver of microcontroller;
One data write read control circuit, the input of the burning of reception cd-rom recorder/go out signal, and the formula programmable non-volatile property storer of erasing is carried out burning work;
One microcontroller reads the driver of the formula programmable non-volatile property memory storage of erasing, in order to carry out the s operation control work of electronic product; And
One memory data secure circuit is arranged at data and writes read control circuit and erase between the formula programmable non-volatile property storer, and wherein, this memory data secure circuit further comprises:
One random number produces circuit, exports a random logarithmic data signal by a readout data signal;
One first signal selecting circuit, by a control fetch protection signal select should unrest logarithmic data signal or this readout data signal as general protected data signal output;
One inspection NOP instruction holding circuit checks whether this general protected data signal output has the NOP instruction and export NOP protection control signal; And
One secondary signal is selected circuit, by this NOP protection control signal select should unrest logarithmic data signal or this general protected data signal export as a NOP protected data signal.
2. the secrecy system of storer according to claim 1 is characterized in that, if routine data contains the NOP protected data; Then adopt random logarithmic data mode; Produce the protected data signal, input to these data and write read control circuit, export this protected data signal again.
3. the secrecy system of storer according to claim 1; It is characterized in that; If routine data does not contain the NOP protected data, then readout data signal is directly inputed to these data as the protected data signal and write read control circuit, export unprotected data-signal again.
4. the secrecy system of storer according to claim 1 is characterized in that, this is erased and also has a written-out program data-signal and INADD signal between formula programmable non-volatile property storer and the microcontroller.
5. the secrecy system of storer according to claim 1; It is characterized in that these data write read control circuit and erase also to be had one and write data-signal, and write and read a control signal and an activation control signal between the formula programmable non-volatile property storer.
6. the secrecy system of storer according to claim 1 is characterized in that, this formula programmable non-volatile property storer of erasing is a kind of by choosing among flash memory, EPROM, the EEPROM.
7. the secrecy system of storer according to claim 1; It is characterized in that during as if the startup protected data, this formula programmable non-volatile property storer of erasing is seen readout data signal off to this memory data secure circuit according to address signal; Adopt random logarithmic data mode; Produce the protected data signal, then input to these data and write read control circuit, again the data-signal of output protection.
8. the secrecy system of storer according to claim 7 is characterized in that, this first signal selecting circuit is a MUX.
9. the secrecy system of storer according to claim 7 is characterized in that, it is a MUX that this secondary signal is selected circuit.
10. the time slot scrambling that reads under the memory burn pattern, it is characterized in that with random number protected data it includes:
(a) microcontroller gets in the burning pattern;
(b) select the ROM (read-only memory) in the microcontroller is write, reads or leave the burning pattern;
(c) if write work, then ROM (read-only memory) is carried out the program that writes;
(d) write after hours, select to leave the burning pattern or continue to carry out the burning pattern;
(e) if read work, then whether check is protected mode earlier;
(f), and when get into the burning pattern next time, start protected data mechanism if will start protected mode need address setting to protected data option when writing ROM (read-only memory);
(g) if the fetch protection pattern then adopts the data encryption method fetch program;
(h) if do not start the fetch protection pattern, then can carry out the general normal fetch program earlier;
(i) during reading of data, whether the data discrimination program contains promising NOP protected data;
(j) if data program contains the NOP protected data, then adopt the data encryption method fetch program;
(k) if do not contain the NOP protected data, then carry out the general normal fetch program; And
(l) write or read finish after, all can get into again and read or write pattern, up to leaving the burning pattern.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101496422A CN101677018B (en) | 2008-09-16 | 2008-09-16 | Secrecy system of memory and secrecy method for reading in memory burn mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101496422A CN101677018B (en) | 2008-09-16 | 2008-09-16 | Secrecy system of memory and secrecy method for reading in memory burn mode |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101677018A CN101677018A (en) | 2010-03-24 |
CN101677018B true CN101677018B (en) | 2012-05-23 |
Family
ID=42029539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008101496422A Active CN101677018B (en) | 2008-09-16 | 2008-09-16 | Secrecy system of memory and secrecy method for reading in memory burn mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101677018B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320855A (en) * | 2014-07-30 | 2016-02-10 | 义隆电子股份有限公司 | Microprocessor and data security method thereof |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102779555A (en) * | 2011-05-13 | 2012-11-14 | 英特格灵芯片(天津)有限公司 | Method and device for calibrating analog integrated circuit |
US20140089561A1 (en) * | 2012-09-26 | 2014-03-27 | Kiran Pangal | Techniques Associated with Protecting System Critical Data Written to Non-Volatile Memory |
CN112182586B (en) * | 2020-09-29 | 2024-02-13 | 中电海康无锡科技有限公司 | MCU read-write protection test method, device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146499A (en) * | 1989-10-27 | 1992-09-08 | U.S. Philips Corporation | Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification |
CN1343932A (en) * | 2000-09-19 | 2002-04-10 | Agc科技股份有限公司 | Method and appts. for preventing illegal copying digit, data |
CN101000582A (en) * | 2006-12-30 | 2007-07-18 | 北京中星微电子有限公司 | Enciphering method and device for data of memory and its deciphering device and method |
CN101231620A (en) * | 2007-01-26 | 2008-07-30 | 盛群半导体股份有限公司 | Safety privacy architecture and method of non-volatile memory |
-
2008
- 2008-09-16 CN CN2008101496422A patent/CN101677018B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146499A (en) * | 1989-10-27 | 1992-09-08 | U.S. Philips Corporation | Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification |
CN1343932A (en) * | 2000-09-19 | 2002-04-10 | Agc科技股份有限公司 | Method and appts. for preventing illegal copying digit, data |
CN101000582A (en) * | 2006-12-30 | 2007-07-18 | 北京中星微电子有限公司 | Enciphering method and device for data of memory and its deciphering device and method |
CN101231620A (en) * | 2007-01-26 | 2008-07-30 | 盛群半导体股份有限公司 | Safety privacy architecture and method of non-volatile memory |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320855A (en) * | 2014-07-30 | 2016-02-10 | 义隆电子股份有限公司 | Microprocessor and data security method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN101677018A (en) | 2010-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103578550B (en) | The method for generating the storage system of random number and generating random number | |
CN100492542C (en) | Non-volatile storage device with page buffer for validating pre-erasure | |
KR102442216B1 (en) | Memory device and operating method thereof | |
EP2709034B1 (en) | Systems and methods for code protection in non-volatile memory systems | |
US7929354B2 (en) | Verified purge for flash storage device | |
CN101677018B (en) | Secrecy system of memory and secrecy method for reading in memory burn mode | |
JP2005108273A (en) | Nonvolatile semiconductor memory device | |
TWI534809B (en) | A non-volatile memory device for which control information may be set from an external source | |
KR102180299B1 (en) | Semiconductor apparatus | |
JP3891863B2 (en) | Semiconductor device and driving method of semiconductor device | |
KR101005164B1 (en) | Non volatile memory and method of programing thereof | |
CN101556561B (en) | Stochastic number change address and data memory confidentiality method | |
CN107291377A (en) | Data storage device and data maintenance method thereof | |
KR100674454B1 (en) | Nonvolatile memory | |
JP2010193013A (en) | Encryption key protection method and semiconductor memory device | |
CN106155567A (en) | Storage arrangement and operational approach thereof | |
JP2004287541A (en) | Nonvolatile memory access control system | |
JP5332845B2 (en) | IC chip and data protection method, etc. | |
TWI352900B (en) | ||
CN108511019A (en) | Nonvolatile memory and access method thereof | |
US20110289293A1 (en) | Semiconductor device | |
US20070088905A1 (en) | System and method for purging a flash storage device | |
JP6308074B2 (en) | Microcomputer | |
KR101038471B1 (en) | Method of operating a non volatile memory device | |
JP2611851B2 (en) | ROM read inhibit circuit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |