CN101677018B - Secrecy system of memory and secrecy method for reading in memory burn mode - Google Patents

Secrecy system of memory and secrecy method for reading in memory burn mode Download PDF

Info

Publication number
CN101677018B
CN101677018B CN2008101496422A CN200810149642A CN101677018B CN 101677018 B CN101677018 B CN 101677018B CN 2008101496422 A CN2008101496422 A CN 2008101496422A CN 200810149642 A CN200810149642 A CN 200810149642A CN 101677018 B CN101677018 B CN 101677018B
Authority
CN
China
Prior art keywords
data
signal
protected
memory
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101496422A
Other languages
Chinese (zh)
Other versions
CN101677018A (en
Inventor
许文琪
周汉宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Holtek Semiconductor Inc
Original Assignee
Holtek Semiconductor Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Holtek Semiconductor Inc filed Critical Holtek Semiconductor Inc
Priority to CN2008101496422A priority Critical patent/CN101677018B/en
Publication of CN101677018A publication Critical patent/CN101677018A/en
Application granted granted Critical
Publication of CN101677018B publication Critical patent/CN101677018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a secrecy system of a memory and a secrecy method for reading in a memory burn mode. The secrecy system comprises a burner, an erasing programmable non-volatile memory, a data read-write control circuit, a microcontroller and a memory data secrecy circuit, wherein the burner outputs burning input/output signals, the erasing programmable non-volatile memory is used for storing the driving program of a microcontroller, the data read-write control circuit receives the burning input/output signals of the burner to burn the erasing programmable non-volatile memory, the microcontroller reads the driving program of the erasing programmable non-volatile memory for controlling electronic product operation, and the memory data secrecy circuit is arranged between the data read-write control circuit and the erasing programmable non-volatile memory. When the program data of the non-volatile memory in the microcontroller is broken and read by people having ulterior motives, the system ensures that the program is not easy to read, reaching the confidentiality and the uniqueness of the program data. If the data program contains blank instruction protection data, the program is read by the data secrecy method.

Description

The time slot scrambling that reads under the secrecy system of storer and the memory burn pattern
Technical field
The present invention relates to a kind of non-volatility memorizer (NVM; Non Volatile Memory) time slot scrambling of data; In particular to a kind of on the NOP data time slot scrambling of non-volatility memorizer (NVM, the Non Volatile Memory) data of supplementary protection information.
Background technology
Traditional method is as shown in Figure 1, and its job description is following:
1.IC get into the burning pattern, non-volatility memorizer write.
2. can the data of writing non-volatility memorizer be read and verify after writing completion.
3. data verification is accomplished, and leaves the burning pattern.
4.IC get into the burning pattern again, setting (option) parameter of particular address in the inspection non-volatility memorizer, whether decision is protected and is read the non-volatility memorizer data, and lets IC get in the burning pattern.
5. according to the value (option) of setup parameter, judge whether the user can protect the data that read on the non-volatility memorizer under the burning pattern.
If 6. protected mode, then forbidden data output, just whole data output 0 or 1.
7., then export the routine data in the non-volatility memorizer if not be protected mode.
Its traditional burning flow process is as shown in Figure 1.And under the burning pattern, need judge whether to allow the data of non-volatility memorizer to be read.In the 4th above-mentioned process; Setup parameter (option) is the particular address that writes on non-volatility memorizer; Because of in data not before the burning; This moment, the option initial value of protected data was 0, and according to the value of option, the burning pattern that got into this moment can read the data on the non-volatility memorizer; After data burning advances non-volatility memorizer,,,, just can't the data on the non-volatility memorizer be read if the option data of the protected data that reads are 1 because need read the value of option again if when leaving the burning pattern and returning the burning pattern.But because can not sense data in the burning pattern; Unique whereby people can learn that just the option data of protected data are 1; And then,, just can learn and crack success this moment until read output data to the cracking of the taking a whirl at property of option data of non-volatility memorizer.
Fig. 2 is traditional programming system, and job description is following:
1. cd-rom recorder 201 is seen I/O burning signal 202 off and is write read control circuit 203 to data, to get into the burning pattern.
2. through I/O burning signal 202, data write read control circuit 203 and see off to write data-signal 205, address signal 204, activation control signal 208 and write and read control signal 207 and write data for the formula programmable non-volatile property storer (EPNVM) 209 of erasing.
3. through I/O burning signal 202, data write read control circuit 203 and see address signal 204, activation control signal 208 off and write and read control signal 207 and carry out reading of data work for the formula programmable non-volatile property storer 209 of erasing.
4. when carrying out reading of data work, the formula of erasing programmable non-volatile property storer 209 is seen readout data signal 206 to data off according to address signal 204 and is write read control circuit 203, through I/O burning signal 202 output datas.
5. if during protected mode, then data write read control circuit 203 and can forbid output data, directly export 0 or 1 as output data, through I/O burning signal 202 output datas.
6. during microcontroller (MCU) 212 normal operations; Microcontroller 212 relies on INADD signal 211 to be input in the formula programmable non-volatile property storer 209 of erasing; Read stored routine data in the formula programmable non-volatile property storer 209 of erasing, the routine data of required execution when supplying with microcontroller 212 work through written-out program data-signal 210.
And because after the startup of traditional protected data pattern, the data that read are 0 or 1, unique people are learnt start the protected data pattern; And then crack to the protected data pattern; The de-preservation data pattern is exported routine data smoothly, and successful snooper data.
Summary of the invention
The technical matters that the present invention solved is to provide a kind of non-volatility memorizer (NVM; NonVolatile Memory) time slot scrambling of data and system; They are supplementary protection information on the NOP data; And then to realize improving the unique people that exists in the known technology be 1 by the option data of protected data, and then to the purpose of the problem that cracks of the taking a whirl at property of option data of non-volatility memorizer.
Preferable, this secrecy system comprises at least:
One cd-rom recorder is exported the input of a burning/go out signal;
The one formula programmable non-volatile property storer of erasing is in order to store the driver of microcontroller;
One data write read control circuit, the input of the burning of reception cd-rom recorder/go out signal, and the formula programmable non-volatile property storer of erasing is carried out burning work;
One microcontroller reads the driver of the formula programmable non-volatile property memory storage of erasing, in order to carry out the s operation control work of electronic product; And
One memory data secure circuit is arranged at data and writes read control circuit and erase between the formula programmable non-volatile property storer, and this memory data secure circuit comprises: a random number produces circuit, exports a random logarithmic data signal by a readout data signal; One first signal selecting circuit, by a control fetch protection signal select should unrest logarithmic data signal or this readout data signal as general protected data signal output; One inspection NOP instruction holding circuit checks whether this general protected data signal output has the NOP instruction and export NOP protection control signal; And one secondary signal select circuit, by this NOP protection control signal select should unrest logarithmic data signal or this general protected data signal export as a NOP protected data signal.
Wherein, during as if the startup protected data, this formula programmable non-volatile property storer of erasing is seen readout data signal off to this memory data secure circuit according to address signal; Adopt random number (random number) data mode; Produce the protected data signal, then input to these data and write read control circuit, again the data-signal of output protection; If when not starting protected data, this memory data secure circuit judges whether readout data signal contains the NOP protected data.
The present invention also provides under a kind of memory burn pattern and reads time slot scrambling, and it is with random number protected data, and it includes: microcontroller gets in the burning pattern; Selection writes, reads or leave the burning pattern to the ROM (read-only memory) in the microcontroller; If write work, then ROM (read-only memory) is carried out the program that writes; Write after hours, select to leave the burning pattern or continue to carry out the burning pattern; If read work, then whether check is protected mode earlier; If will start protected mode need address setting to protected data option when writing ROM (read-only memory), and when get into the burning pattern next time, start protected data mechanism; If the fetch protection pattern then adopts the data encryption method fetch program; If do not start the fetch protection pattern, then can carry out the general normal fetch program earlier; During reading of data, whether the data discrimination program contains promising NOP protected data; If data program contains the NOP protected data, then adopt the data encryption method fetch program; If do not contain the NOP protected data, then carry out the general normal fetch program; And write or read finish after, all can get into again and read or write pattern, up to leaving the burning pattern.
Describe the present invention below in conjunction with accompanying drawing and specific embodiment, but not as to qualification of the present invention.
Description of drawings
Fig. 1 is the burning process flow diagram of prior art;
Fig. 2 is the programming system synoptic diagram of prior art;
Fig. 3 is used for the process flow diagram that random number of the present invention is selected protected data;
Fig. 4 is the programming system synoptic diagram that is used for protected data of the present invention;
Fig. 5 is the structural representation that is used for memory data secure circuit of the present invention; And
Fig. 6 A and Fig. 6 B are the routine data that is used to explain that memory data of the present invention is maintained secrecy.
Wherein, Reference numeral
201 cd-rom recorders
202 I/O burning signals
203 data write read control circuit
204 address signals
205 data-signals
206 data-signals
207 write and read control signal
208 activation control signals
The 209 formula programmable non-volatile property storeies of erasing
210 written-out program data-signals
211 INADD signals
212 microcontrollers
401 cd-rom recorders
402 I/O burning signals
403 data write read control circuit
404 address signals
405 data-signals
406 data-signals
407 write and read control signal
408 activation control signals
The 409 formula programmable non-volatile property storeies of erasing
410 written-out program data-signals
411 INADD signals
412 microcontrollers
413 fetch protection mode signals
414 memory data secure circuits
415 NOP data-signals
501 random numbers produce circuit
502 random logarithmic data signals
503 signal selecting circuits
504 general protected data signals
505 inspection NOP instruction holding circuits
506 NOP protect control signal
507 signal selecting circuits
Embodiment
Fig. 3 is the process flow diagram that random number of the present invention is selected protected data.
Wherein, the routine data that the compositional language (AssemblyLanguage) that the data person of being to use of non-volatility memorizer writes is produced through compiler (Compiler), and compiler is when the conversion compositional language; Can insert dummy instruction (NOP in untapped storage address traditionally; No Operation) data are not because NOP has any effect for microcontroller, as if supplementary protection information on the NOP data; Also can not influence microcontroller execution work originally; Therefore we design a kind of anti-mechanism that cracks of protecting, and not only can conform to original burning mode, can increase the confidential nature of data again.The workflow of whole burned mechanism is explained as follows:
1. microcontroller gets in the burning pattern.
2. select the ROM (read-only memory) in the microcontroller is write, reads or leave the burning pattern.
3. if write work, then ROM (read-only memory) is carried out the program that writes.
4. write after hours, can select to leave the burning pattern or continue to carry out the burning pattern.
5. if read work, then whether check is protected mode earlier.
6. need when writing ROM (read-only memory) address setting if will start protected mode, and when get into the burning pattern next time, start protected data mechanism protected data option.
7. if the fetch protection pattern then adopts the data encryption method fetch program.
8., then can carry out the general normal fetch program earlier if do not start the fetch protection pattern.
9. during reading of data, whether the data discrimination program contains promising NOP protected data.
10. if data program contains the NOP protected data, then adopt the data encryption method fetch program.
11., then carry out the general normal fetch program if do not contain the NOP protected data.
12. write or read finish after, all can get into again and read or write pattern, up to leaving the burning pattern.
When getting into the burning pattern, but user's write-in program data, and read and confirm the correct of data; And in order to prevent that the write-in program data are stolen, then the user can start traditional data protection mechanism or user and adds at routine data and contain the NOP protected data, can protected data when making get into the burning pattern next time; And because unique people is 0 or 1 situation according to the data that read out, the option data that can learn the traditional protection data are 1, and then cracking the taking a whirl at property of option data of non-volatility memorizer; The data of being exported when therefore we change protection with the mode output data of random number, are obscured unique people's the mode that cracks; Even and if the traditional protection data are cracked successfully; Remove the traditional data protection mechanism, then carry out general fetch program during output data, can check in advance whether output data contains the NOP protected data; If the user adds at routine data and contains the NOP protected data; Then the same mode output data with random number of data of output owing to the NOP protected data is added in the routine data, and is written in the storer with the mode of routine data; Unrenewable other modes of unique people are cracked, with the defence program data that hit pay dirk.
Wherein, preferable, this non-volatility memorizer is a kind of by choosing among flash memory, EPROM, the EEPROM.
Fig. 4 is the programming system synoptic diagram that can realize data protection of the present invention.
Because after traditional protected data pattern started, the data that read were 0 or 1, unique people are learnt start the protected data pattern; And then crack to the protected data pattern, the de-preservation data pattern is exported routine data smoothly; And successful snooper data, in view of this, we crack according to such situation in order to obscure unique people; Invention proposes the new burning circuit structure that can realize data protection, and as shown in Figure 4, job description is following:
1. cd-rom recorder 401 is seen I/O burning signal 402 off and is write read control circuit 403 to data, to get into the burning pattern.
2. through I/O burning signal 402, data write read control circuit 403 and see off to write data-signal 405, address signal 404, activation control signal 408 and write and read control signal 407 and write data for the formula programmable non-volatile property storer 409 of erasing.
3. because the burning pattern is writing under the work, and we do not go bail for to data and protect, address signal 404 wherein inputs to the formula programmable non-volatile property storer 409 of erasing and writes data.
When the burning pattern when reading work; Through I/O burning signal 402, data write read control circuit 403 and see activation control signal 408 off and read control signal 407 and carry out reading of data work for the formula programmable non-volatile property storer 409 of erasing with writing.
5. when data write read control circuit 403 and read the routine data in the formula programmable non-volatile property storer 409 of erasing; For the defence program data are not stolen by other people; Can see fetch protection mode signal 413 off and give memory data secure circuit 414, start the mechanism of defence program data.
6. during as if the startup protected data; The formula of erasing programmable non-volatile property storer 409 is seen readout data signal 406 to memory data secure circuit 414 off according to address signal 404; Adopt random logarithmic data mode; Produce protected data signal 415, then input to data and write read control circuit 403, pass through the data-signal of I/O burning signal 402 output protections again.
7. if when not starting protected data, memory data secure circuit 414 will judge whether readout data signal 406 contains the NOP protected data
8. if routine data contains the NOP protected data, then adopt random logarithmic data mode, produce protected data signal 415, input to data and write read control circuit 403, again through the unprotected data-signal of I/O burning signal 402 outputs.
9. if no NOP protected data then directly inputs to data as protected data signal 415 with readout data signal 406 and writes read control circuit 403, again through the unprotected data-signal of I/O burning signal 402 outputs.
10. during microcontroller 412 normal operations; Microcontroller 412 relies on INADD signal 411 to be input in the formula programmable non-volatile property storer 409 of erasing; Read stored routine data in the formula programmable non-volatile property storer 409 of erasing, the routine data of required execution when supplying with microcontroller 412 runnings through written-out program data-signal 410.
The structure of memory data secure circuit 414 wherein, as shown in Figure 5.Job description is following:
1. after memory data secure circuit 414 receives readout data signal 406, produce circuit 501 through random number earlier and produce random logarithmic data signal 502.
2. selecting circuit 503 to select general protected data signal 504 by control fetch protection signal 413 control signals is random logarithmic data signal 502 or former data-signal 406.
3. if control fetch protection signal 413 is under the protected mode, then the general protected data signal 504 of signal selecting circuit 503 selections is random logarithmic data signal 502.
4. if control fetch protection signal 413 is under the general modfel, then the general protected data signal 504 of signal selecting circuit 503 selections is former data-signal 406, just untreated readout data signal 406.
5. follow general protected data signal 504 through inspection NOP instruction holding circuit 505, whether inspection written-out program data include the NOP protected data, and produce NOP protection control signal 506.
6. selecting circuit 507 to select NOP protected data signal 415 by NOP protection control signal 506 control signals is general protected data signal 504 or random logarithmic data signal 502.
7. if NOP protects control signal 506 for checking out no NOP protected data in the routine data, then the general protected data signal 504 of signal selecting circuit 507 selections is a NOP protected data signal 415.
8. if NOP protection control signal 506 includes the NOP protected data for checking out routine data, then the random logarithmic data signal 502 of signal selecting circuit 507 selections is a NOP protected data signal 415.
Wherein signal selecting circuit can be a MUX.
Readout data signal 406 just can be realized traditional data protection mechanism and NOP instruction protected data mechanism through after above memory data secure circuit 414 structures; Because the fixedly output data (0 or 1) that the traditional data protection mechanism produces is cracked and the de-preservation data pattern by unique people easily, and routine data is exported smoothly; And successful snooper data; Therefore we change the fixedly output that traditional protection mechanism is produced, and change employing and export with random number mode, obscure unique people and crack according to such situation; But if traditional protection mechanism is cracked success by unique people; Then carrying out general fetch program during output data, the NOP instruction protected data mechanism that we propose can check in advance whether output data contains the NOP protected data, because the NOP protected data has been added in the routine data; And the mode with routine data is written in the storer; Unrenewable other modes of unique people are cracked, crack the increase of mode degree of difficulty and time, make the memory data time slot scrambling success of NOP instruction protected data mechanism.
For instance: write batch processing do not protect contain NOP instruction protection routine data to the formula programmable non-volatile property storer 409 of erasing; (Programmed Data Sheets is as shown in table 1 to include address bit and routine data position; If do not start the mechanism of traditional protection routine data; Then can successfully read the routine data (Programmed Data Sheets is as shown in table 2) of correct order according to original address signal 404 and readout data signal 406; If start the mechanism of traditional protection routine data, then produce protected data signals 415, and input to data and write read control circuit 403 by memory data secure circuit 414; Through the data-signal (Programmed Data Sheets of this moment is as shown in table 3) of I/O burning signal 402 output protections, output data is that random number produces the random logarithmic data that circuit 501 is produced again.
If user's routine data adding originally contains the routine data of NOP instruction protection to the formula programmable non-volatile property storer 409 of erasing; Include address bit and routine data position (Programmed Data Sheets is as shown in table 4), can with table 1 relatively learn the data of General N OP originally (data bit: 0000) will change to again the NOP data that contain protection information (data bit: 0001), if do not start the mechanism of traditional protection routine data; The NOP data that then whether contain protection information by the instruction of the inspection NOP in the memory data secure circuit 414 holding circuit 505 inspection output datas; If be not checked through, then can (because at this moment, not start the mechanism of traditional protection routine data with general protected data signal 504 outputs; So general protected data signal 504 is former data-signal 406; Just unprotected data), contain NOP protection information up to being checked through output data, then ensuing routine data will be all with random logarithmic data signal 502 outputs (Programmed Data Sheets is as shown in table 5); Just can learn principle of work by table 5; When also not reading data in the address and containing NOP protection information (address: before 0012), can read raw data, in case (address: 0013) when reading data and containing NOP protection information; Then will read random number protected data, up to end.
If start the mechanism of traditional protection routine data; Then produce protected data signals 415, and input to data and write read control circuit 403, again the data-signal (Programmed Data Sheets of this moment is as shown in table 6) through I/O burning signal 402 output protections by memory data secure circuit 414; Output data by random number produce circuit 501 the random logarithmic data of generations; Because if start the mechanism of traditional protection routine data,, also will read random number protected data even if when reading data and containing NOP protection information; Up to end, so the data-signal table 6 of output protection will be the same with table 3.
By above specific embodiment, can learn when we change the employing of traditional protection mechanism and export with random number mode, obscure unique people and crack; Even and if traditional protection mechanism is cracked success by unique people; Then, can check in advance whether output data contains the NOP protected data, because the NOP protected data has been added in the routine data carrying out general fetch program during output data; And the mode with routine data is written in the storer; Unrenewable other modes of unique people are cracked, crack the increase of mode degree of difficulty and time, make the memory data time slot scrambling success of NOP instruction protected data mechanism.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.

Claims (10)

1. the secrecy system of a storer is characterized in that, it includes:
One cd-rom recorder is exported the input of a burning/go out signal;
The one formula programmable non-volatile property storer of erasing is in order to store the driver of microcontroller;
One data write read control circuit, the input of the burning of reception cd-rom recorder/go out signal, and the formula programmable non-volatile property storer of erasing is carried out burning work;
One microcontroller reads the driver of the formula programmable non-volatile property memory storage of erasing, in order to carry out the s operation control work of electronic product; And
One memory data secure circuit is arranged at data and writes read control circuit and erase between the formula programmable non-volatile property storer, and wherein, this memory data secure circuit further comprises:
One random number produces circuit, exports a random logarithmic data signal by a readout data signal;
One first signal selecting circuit, by a control fetch protection signal select should unrest logarithmic data signal or this readout data signal as general protected data signal output;
One inspection NOP instruction holding circuit checks whether this general protected data signal output has the NOP instruction and export NOP protection control signal; And
One secondary signal is selected circuit, by this NOP protection control signal select should unrest logarithmic data signal or this general protected data signal export as a NOP protected data signal.
2. the secrecy system of storer according to claim 1 is characterized in that, if routine data contains the NOP protected data; Then adopt random logarithmic data mode; Produce the protected data signal, input to these data and write read control circuit, export this protected data signal again.
3. the secrecy system of storer according to claim 1; It is characterized in that; If routine data does not contain the NOP protected data, then readout data signal is directly inputed to these data as the protected data signal and write read control circuit, export unprotected data-signal again.
4. the secrecy system of storer according to claim 1 is characterized in that, this is erased and also has a written-out program data-signal and INADD signal between formula programmable non-volatile property storer and the microcontroller.
5. the secrecy system of storer according to claim 1; It is characterized in that these data write read control circuit and erase also to be had one and write data-signal, and write and read a control signal and an activation control signal between the formula programmable non-volatile property storer.
6. the secrecy system of storer according to claim 1 is characterized in that, this formula programmable non-volatile property storer of erasing is a kind of by choosing among flash memory, EPROM, the EEPROM.
7. the secrecy system of storer according to claim 1; It is characterized in that during as if the startup protected data, this formula programmable non-volatile property storer of erasing is seen readout data signal off to this memory data secure circuit according to address signal; Adopt random logarithmic data mode; Produce the protected data signal, then input to these data and write read control circuit, again the data-signal of output protection.
8. the secrecy system of storer according to claim 7 is characterized in that, this first signal selecting circuit is a MUX.
9. the secrecy system of storer according to claim 7 is characterized in that, it is a MUX that this secondary signal is selected circuit.
10. the time slot scrambling that reads under the memory burn pattern, it is characterized in that with random number protected data it includes:
(a) microcontroller gets in the burning pattern;
(b) select the ROM (read-only memory) in the microcontroller is write, reads or leave the burning pattern;
(c) if write work, then ROM (read-only memory) is carried out the program that writes;
(d) write after hours, select to leave the burning pattern or continue to carry out the burning pattern;
(e) if read work, then whether check is protected mode earlier;
(f), and when get into the burning pattern next time, start protected data mechanism if will start protected mode need address setting to protected data option when writing ROM (read-only memory);
(g) if the fetch protection pattern then adopts the data encryption method fetch program;
(h) if do not start the fetch protection pattern, then can carry out the general normal fetch program earlier;
(i) during reading of data, whether the data discrimination program contains promising NOP protected data;
(j) if data program contains the NOP protected data, then adopt the data encryption method fetch program;
(k) if do not contain the NOP protected data, then carry out the general normal fetch program; And
(l) write or read finish after, all can get into again and read or write pattern, up to leaving the burning pattern.
CN2008101496422A 2008-09-16 2008-09-16 Secrecy system of memory and secrecy method for reading in memory burn mode Active CN101677018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101496422A CN101677018B (en) 2008-09-16 2008-09-16 Secrecy system of memory and secrecy method for reading in memory burn mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101496422A CN101677018B (en) 2008-09-16 2008-09-16 Secrecy system of memory and secrecy method for reading in memory burn mode

Publications (2)

Publication Number Publication Date
CN101677018A CN101677018A (en) 2010-03-24
CN101677018B true CN101677018B (en) 2012-05-23

Family

ID=42029539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101496422A Active CN101677018B (en) 2008-09-16 2008-09-16 Secrecy system of memory and secrecy method for reading in memory burn mode

Country Status (1)

Country Link
CN (1) CN101677018B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320855A (en) * 2014-07-30 2016-02-10 义隆电子股份有限公司 Microprocessor and data security method thereof

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779555A (en) * 2011-05-13 2012-11-14 英特格灵芯片(天津)有限公司 Method and device for calibrating analog integrated circuit
US20140089561A1 (en) * 2012-09-26 2014-03-27 Kiran Pangal Techniques Associated with Protecting System Critical Data Written to Non-Volatile Memory
CN112182586B (en) * 2020-09-29 2024-02-13 中电海康无锡科技有限公司 MCU read-write protection test method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5146499A (en) * 1989-10-27 1992-09-08 U.S. Philips Corporation Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification
CN1343932A (en) * 2000-09-19 2002-04-10 Agc科技股份有限公司 Method and appts. for preventing illegal copying digit, data
CN101000582A (en) * 2006-12-30 2007-07-18 北京中星微电子有限公司 Enciphering method and device for data of memory and its deciphering device and method
CN101231620A (en) * 2007-01-26 2008-07-30 盛群半导体股份有限公司 Safety privacy architecture and method of non-volatile memory

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5146499A (en) * 1989-10-27 1992-09-08 U.S. Philips Corporation Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification
CN1343932A (en) * 2000-09-19 2002-04-10 Agc科技股份有限公司 Method and appts. for preventing illegal copying digit, data
CN101000582A (en) * 2006-12-30 2007-07-18 北京中星微电子有限公司 Enciphering method and device for data of memory and its deciphering device and method
CN101231620A (en) * 2007-01-26 2008-07-30 盛群半导体股份有限公司 Safety privacy architecture and method of non-volatile memory

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320855A (en) * 2014-07-30 2016-02-10 义隆电子股份有限公司 Microprocessor and data security method thereof

Also Published As

Publication number Publication date
CN101677018A (en) 2010-03-24

Similar Documents

Publication Publication Date Title
CN103578550B (en) The method for generating the storage system of random number and generating random number
CN100492542C (en) Non-volatile storage device with page buffer for validating pre-erasure
KR102442216B1 (en) Memory device and operating method thereof
EP2709034B1 (en) Systems and methods for code protection in non-volatile memory systems
US7929354B2 (en) Verified purge for flash storage device
CN101677018B (en) Secrecy system of memory and secrecy method for reading in memory burn mode
JP2005108273A (en) Nonvolatile semiconductor memory device
TWI534809B (en) A non-volatile memory device for which control information may be set from an external source
KR102180299B1 (en) Semiconductor apparatus
JP3891863B2 (en) Semiconductor device and driving method of semiconductor device
KR101005164B1 (en) Non volatile memory and method of programing thereof
CN101556561B (en) Stochastic number change address and data memory confidentiality method
CN107291377A (en) Data storage device and data maintenance method thereof
KR100674454B1 (en) Nonvolatile memory
JP2010193013A (en) Encryption key protection method and semiconductor memory device
CN106155567A (en) Storage arrangement and operational approach thereof
JP2004287541A (en) Nonvolatile memory access control system
JP5332845B2 (en) IC chip and data protection method, etc.
TWI352900B (en)
CN108511019A (en) Nonvolatile memory and access method thereof
US20110289293A1 (en) Semiconductor device
US20070088905A1 (en) System and method for purging a flash storage device
JP6308074B2 (en) Microcomputer
KR101038471B1 (en) Method of operating a non volatile memory device
JP2611851B2 (en) ROM read inhibit circuit

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant