TWI788240B - Electronic device and data transmission method thereof - Google Patents

Electronic device and data transmission method thereof Download PDF

Info

Publication number
TWI788240B
TWI788240B TW111109102A TW111109102A TWI788240B TW I788240 B TWI788240 B TW I788240B TW 111109102 A TW111109102 A TW 111109102A TW 111109102 A TW111109102 A TW 111109102A TW I788240 B TWI788240 B TW I788240B
Authority
TW
Taiwan
Prior art keywords
data
redundant
storage device
insertion type
controller
Prior art date
Application number
TW111109102A
Other languages
Chinese (zh)
Other versions
TW202336616A (en
Inventor
何文喬
Original Assignee
華邦電子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 華邦電子股份有限公司 filed Critical 華邦電子股份有限公司
Priority to TW111109102A priority Critical patent/TWI788240B/en
Application granted granted Critical
Publication of TWI788240B publication Critical patent/TWI788240B/en
Publication of TW202336616A publication Critical patent/TW202336616A/en

Links

Images

Landscapes

  • Communication Control (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

This invention relates to an electronic device and a data transmission method thereof. The data transmission method includes: setting dummy data having a plurality of dummy bits; inserting the dummy bits of the dummy data into a transmission data according to an insertion type to generate an encryption data; and transmitting the encryption data to a memory device.

Description

電子裝置及其資料傳輸方法Electronic device and data transmission method thereof

本發明是有關於一種電子裝置及其資料傳輸方法,且特別是有關於一種可確保資料安全性的電子裝置的資料傳輸方法。 The present invention relates to an electronic device and a data transmission method thereof, and in particular to a data transmission method of an electronic device capable of ensuring data security.

為了確保資料不會被竊取,控制器與儲存裝置間的資料傳輸動作中,常設置有加密的機制。在習知技術中,控制器可使傳輸資料與作為金鑰的資訊進行複雜的加密運算,並獲得加密資料。這樣的加密方法需要使接收端利用作為金鑰的資訊來對加密資料進行反運算來還原傳輸資料。 In order to ensure that the data will not be stolen, an encryption mechanism is often set in the data transmission between the controller and the storage device. In the conventional technology, the controller can perform complex encryption operation on the transmission data and the information as the key to obtain the encrypted data. Such an encryption method needs to enable the receiving end to use the information as a key to perform reverse operations on the encrypted data to restore the transmitted data.

此外,習知技術還可利用數位簽章的認證方式,來使接收端確認所接收的傳輸資料是否為正確的未經變造的資料。然而,這樣的方式無法針對被傳送的傳輸資料進行加密,無法防止傳輸資料被竊取。且數位簽章的認證動作也需要一定複雜程度的演算法來進行,因此提高硬體的複雜度且增加所需功率的消耗。 In addition, the conventional technology can also use the digital signature authentication method to make the receiving end confirm whether the received transmission data is correct and unaltered data. However, such a method cannot encrypt the transmitted transmission data, and cannot prevent the transmission data from being stolen. Moreover, the authentication action of the digital signature also requires a certain degree of complexity of the algorithm to perform, thus increasing the complexity of the hardware and increasing the required power consumption.

基於上述,如何設計出可確保傳輸資料的安全性,又可不需要過度複雜的演算法及硬體電路的加密機制,成為本領域設 計者的重要課題。 Based on the above, how to design an encryption mechanism that can ensure the security of transmitted data without requiring overly complicated algorithms and hardware circuits has become a design challenge in this field. An important topic for planners.

本發明提供一種電子裝置以及資料傳輸方法,可減低加密運算的複雜度,並可確保資料傳輸的安全性。 The invention provides an electronic device and a data transmission method, which can reduce the complexity of encryption operations and ensure the security of data transmission.

本發明的資料傳輸方法包括:設定具有多個冗餘位元的冗餘資料;根據插入型態以在傳輸資料中插入冗餘資料的冗餘位元,並產生加密資料;以及,傳送加密資料至儲存裝置。 The data transmission method of the present invention includes: setting redundant data with a plurality of redundant bits; inserting redundant bits of the redundant data into the transmission data according to the insertion type, and generating encrypted data; and, transmitting the encrypted data to the storage device.

本發明的電子裝置包括儲存裝置以及控制器。控制器耦接電子裝置。控制器用以設定具有多個冗餘位元的冗餘資料;根據插入型態以在傳輸資料中插入冗餘資料的冗餘位元,並產生加密資料;以及,傳送加密資料至儲存裝置。 The electronic device of the present invention includes a storage device and a controller. The controller is coupled to the electronic device. The controller is used for setting redundant data with a plurality of redundant bits; inserting redundant bits of redundant data into the transmission data according to the insertion type, and generating encrypted data; and sending the encrypted data to the storage device.

基於上述,本發明的電子裝置的控制器,透過將冗餘資料的多個冗餘位元,根據插入型態以插入傳輸資料來產生加密資料。可有效降低加密資料的產生的複雜度,且可確保傳輸資料在傳輸的過程中被竊取,有效確保傳輸資料的安全性。 Based on the above, the controller of the electronic device of the present invention generates encrypted data by inserting multiple redundant bits of the redundant data into the transmission data according to the insertion type. It can effectively reduce the complexity of generating encrypted data, and can ensure that the transmission data is stolen during transmission, effectively ensuring the security of the transmission data.

100、400:電子裝置 100, 400: electronic devices

110、410:控制器 110, 410: controller

120、420:儲存裝置 120, 420: storage device

121、4211:查找資訊 121, 4211: Find information

421、500:查找表 421, 500: lookup table

CDD1~CDDM:待查冗餘資料 CDD1~CDDM: Redundant data to be checked

CI1~CIM:待查插入型態資訊 CI1~CIM: Insert type information to be checked

DD:冗餘資料 DD: redundant data

DD[0]~DD[N]:冗餘位元 DD[0]~DD[N]: redundant bits

MD、201、202、203、204:加密資料 MD, 201, 202, 203, 204: encrypted data

S610~S630:資料傳輸步驟 S610~S630: Data transmission steps

TD:傳輸資料 TD: Transfer Data

TD[0]~TD[N]:位元 TD[0]~TD[N]: bits

圖1及圖4繪示本發明不同實施例的電子裝置的示意圖。 1 and 4 are schematic diagrams of electronic devices according to different embodiments of the present invention.

圖2A至圖2D繪示本發明實施例的多個加密資料的產生方式的示意圖。 FIG. 2A to FIG. 2D are schematic diagrams illustrating a generation method of a plurality of encrypted data according to an embodiment of the present invention.

圖3繪示本發明實施例的電子裝置的加密資料的產生方式的一實施方式的示意圖。 FIG. 3 is a schematic diagram of an implementation manner of generating encrypted data of an electronic device according to an embodiment of the present invention.

圖5繪示本發明實施例的查找資訊的示意圖。 FIG. 5 is a schematic diagram of searching information according to an embodiment of the present invention.

圖6繪示本發明實施例的資料傳輸動作的流程圖。 FIG. 6 is a flow chart of the data transmission operation of the embodiment of the present invention.

請參照圖1,圖1繪示本發明一實施例的電子裝置的示意圖。電子裝置100包括控制器110以及儲存裝置120。控制器110耦接至儲存裝置120。控制器110與儲存裝置120間,進行傳輸資料的接收以及發送動作。在當控制器110要將傳輸資料傳送至儲存裝置120時,控制器110可預先設定一冗餘資料。冗餘資料具有多個冗餘位元。並且,控制器110可根據一插入型態以在傳輸資料中插入冗餘資料的多個冗餘位元,並藉以產生加密資料MD。並且,控制器110可將加密資料MD傳送至儲存裝置120中。 Please refer to FIG. 1 , which is a schematic diagram of an electronic device according to an embodiment of the present invention. The electronic device 100 includes a controller 110 and a storage device 120 . The controller 110 is coupled to the storage device 120 . The controller 110 and the storage device 120 perform operations of receiving and sending transmission data. When the controller 110 is going to transmit the transmission data to the storage device 120, the controller 110 can preset a redundant data. Redundant data has multiple redundant bits. Moreover, the controller 110 can insert multiple redundant bits of the redundant data into the transmission data according to an insertion type, so as to generate the encrypted data MD. Moreover, the controller 110 can transmit the encrypted data MD to the storage device 120 .

在另一方面,儲存裝置120在接收到加密資料MD後,可基於一查找資訊121以根據插入型態來獲得冗餘資料。在此,控制器110產生加密資料MD所應用的插入型態可對應一插入型態資訊,這個插入型態資訊可以預先被設定在儲存裝置120中。此外,儲存裝置120中也可預存查找資訊121。因此,儲存裝置120在接收到加密資料MD後,可根據插入型態資訊來對查找資訊121進行查找動作,進以獲得控制器110所使用的插入型態以及加密資料MD中的冗餘資料。接著,儲存裝置120則可根據插入型 態由加密資料MD來移除冗餘資料中的多個冗餘位元,並還原出傳輸資料。如此一來,儲存裝置120可進行傳輸資料的儲存動作。 On the other hand, after receiving the encrypted data MD, the storage device 120 can obtain redundant data according to the insertion type based on a search information 121 . Here, the insertion type used by the controller 110 to generate the encrypted data MD may correspond to an insertion type information, and the insertion type information may be preset in the storage device 120 . In addition, the search information 121 may also be pre-stored in the storage device 120 . Therefore, after receiving the encrypted data MD, the storage device 120 can search the search information 121 according to the insertion type information to obtain the insertion type used by the controller 110 and the redundant data in the encrypted data MD. Then, the storage device 120 can be based on the plug-in type In this state, the encrypted data MD removes multiple redundant bits in the redundant data, and restores the transmitted data. In this way, the storage device 120 can perform the storage operation of the transmission data.

在本實施例中,儲存裝置120可以為可程式化的非揮發性記憶體,例如快閃記憶體、電阻式記憶體、磁阻式記憶體、相變化記憶體或鐵電記憶體等。儲存裝置120或也可以為揮發性記憶體,例如動態隨機存取記憶體或靜態隨機存取記憶體。另外,儲存裝置120可利用儲存傳輸資料的記憶體來儲存查找資訊121。或者,查找資訊121也可以儲存在與儲存傳輸資料不相同的記憶體中,沒有固定的限制。 In this embodiment, the storage device 120 may be a programmable non-volatile memory, such as flash memory, resistive memory, magnetoresistive memory, phase change memory, or ferroelectric memory. The storage device 120 may also be a volatile memory, such as a dynamic random access memory or a static random access memory. In addition, the storage device 120 can store the search information 121 by using a memory storing transmission data. Alternatively, the search information 121 can also be stored in a memory that is different from the storage of the transmission data, and there is no fixed limit.

附帶一提的,本實施例中的查找資訊121是可以動態調整的。控制器110可以針對所應用的插入型態與對應的插入的冗餘資料進行調整。在調整後,控制器110可針對儲存裝置120中的查找資訊121進行更新。上述的查找資訊121的更新動作可以週期性的被執行,以提升加密資料的安全度。 Incidentally, the search information 121 in this embodiment can be dynamically adjusted. The controller 110 can adjust for the applied insertion type and the corresponding inserted redundant data. After the adjustment, the controller 110 can update the search information 121 in the storage device 120 . The above-mentioned update operation of the search information 121 may be performed periodically to enhance the security of encrypted data.

本發明的控制器110可以為具運算能力的處理器。或者,控制器110可以是透過硬體描述語言(Hardware Description Language,HDL)或是其他任意本領域具通常知識者所熟知的數位電路的設計方式來進行設計,並透過現場可程式邏輯門陣列(Field Programmable Gate Array,FPGA)、複雜可程式邏輯裝置(Complex Programmable Logic Device,CPLD)或是特殊應用積體電路(Application-specific Integrated Circuit,ASIC)的方式來實現的硬體電路。 The controller 110 of the present invention may be a processor with computing capability. Alternatively, the controller 110 can be designed through a hardware description language (Hardware Description Language, HDL) or any other digital circuit design method known to those skilled in the art, and through a field programmable logic gate array ( Field Programmable Gate Array, FPGA), Complex Programmable Logic Device (Complex Programmable Logic Device, CPLD), or a hardware circuit implemented in the form of an Application-specific Integrated Circuit (ASIC).

關於插入型態的種類,請參照圖2A至圖2D繪示的本發明實施例的多個加密資料的產生方式的示意圖。在圖2A中,加密資料201是利用針對傳輸資料TD,將冗餘資料DD進行前置式插入所產生的。其中,冗餘資料DD的多個位元被插入至傳輸資料TD的前端(例如最小有效位元那一端)的位置上。其中,冗餘資料DD的冗餘位元的數量可以多於、等於或少於傳輸資料TD的位元數,沒有一定的限制。 Regarding the types of insertion types, please refer to the schematic diagrams of the generation methods of multiple encrypted data in the embodiment of the present invention shown in FIG. 2A to FIG. 2D . In FIG. 2A , encrypted data 201 is generated by pre-inserting redundant data DD for transmission data TD. Wherein, a plurality of bits of the redundant data DD are inserted into the front end (for example, the end of the least significant bit) of the transmission data TD. Wherein, the number of redundant bits of the redundant data DD may be greater than, equal to or less than the number of bits of the transmission data TD, and there is no certain limit.

在圖2B中,加密資料202是利用針對傳輸資料TD,將冗餘資料DD進行後置式插入所產生的。其中,冗餘資料DD的多個位元被插入至傳輸資料TD的後端(例如最大有效位元那一端)的位置上。同樣的,冗餘資料DD的冗餘位元的數量可以多於、等於或少於傳輸資料TD的位元數,沒有一定的限制。 In FIG. 2B , encrypted data 202 is generated by post-inserting redundant data DD for transmission data TD. Wherein, a plurality of bits of the redundant data DD are inserted into the position of the rear end (for example, the end of the most significant bit) of the transmission data TD. Likewise, the number of redundant bits of the redundant data DD may be greater than, equal to or less than the number of bits of the transmission data TD, without any limitation.

在圖2C中,加密資料203是利用針對傳輸資料TD,將冗餘資料DD的多個冗餘位元DD[0]~DD[N]進行交錯式插入所產生的。在本實施例中,傳輸資料TD具有多個位元TD[0]~TD[N]。冗餘資料DD的第一個位元,冗餘位元DD[0]被插入至傳輸資料TD的位元TD[0]與TD[1]間。冗餘資料DD後續的多個冗餘位元DD[1]~DD[N]則可分別被依序插入至相鄰的傳輸資料TD二位元間。如此一來,可以有效降低加密資料203與傳輸資料TD間的相似度。 In FIG. 2C , the encrypted data 203 is generated by interleaving a plurality of redundant bits DD[0]˜DD[N] of the redundant data DD for the transmission data TD. In this embodiment, the transmission data TD has a plurality of bits TD[0]˜TD[N]. The first bit of the redundancy data DD, the redundancy bit DD[0] is inserted between the bits TD[0] and TD[1] of the transmission data TD. A plurality of redundant bits DD[ 1 ]˜DD[N] following the redundant data DD can be sequentially inserted between two adjacent bits of the transmission data TD respectively. In this way, the similarity between the encrypted data 203 and the transmission data TD can be effectively reduced.

在圖2D中,加密資料204同樣是利用針對傳輸資料TD,將冗餘資料DD的多個冗餘位元DD[0]~DD[N]進行交錯式插入所 產生的。在本實施例中,冗餘資料DD的第一個位元(冗餘位元DD[0])被插入至傳輸資料TD的位元TD[0]前,冗餘資料DD後續的多個冗餘位元DD[1]~DD[N]則可被分別依序插入至相鄰的傳輸資料TD二位元間。同樣的,這樣的插入動作,也可以有效降低加密資料204與傳輸資料TD間的相似度。 In FIG. 2D, the encrypted data 204 is also interleaved by inserting multiple redundant bits DD[0]~DD[N] of the redundant data DD for the transmission data TD. produced. In this embodiment, the first bit (redundant bit DD[0]) of the redundant data DD is inserted before the bit TD[0] of the transmission data TD, and the subsequent multiple redundant bits of the redundant data DD The remaining bits DD[1]~DD[N] can be sequentially inserted between two adjacent bits of the transmission data TD. Similarly, such an insertion action can also effectively reduce the similarity between the encrypted data 204 and the transmission data TD.

在此請注意,在圖2C、圖2D實施例中,傳輸資料TD的相鄰二位元間僅插入一冗餘位元。在本發明其他實施例中,傳輸資料TD的相鄰二位元間,也可插入一個以上的冗餘位元,沒有一定的限制。並且,傳輸資料TD中的任二相鄰二位元間所插入的冗餘位元數量可以相同,或也可以不相同,並沒有一定的限制。 Please note here that in the embodiments shown in FIG. 2C and FIG. 2D , only one redundant bit is inserted between adjacent two bits of the transmission data TD. In other embodiments of the present invention, more than one redundant bit can also be inserted between adjacent two bits of the transmission data TD, without any limitation. Moreover, the number of redundant bits inserted between any two adjacent bits in the transmission data TD may be the same or different, and there is no certain limitation.

更值得一提的,本發明實施例的前置式插入、後置式插入以及交錯式插入可以單獨或組合式被應用在加密資料的產生動作中。例如,控制器可以使冗餘資料的第一部分冗餘位元前置式的插入至傳輸資料中;使冗餘資料的第二部分冗餘位元後置式的插入至傳輸資料中;並且,使冗餘資料的第三部分冗餘位元交錯式的插入至傳輸資料中。如此,可大幅提升加密資料的複雜度。 It is worth mentioning that the pre-insertion, post-insertion and staggered interleaving in the embodiment of the present invention can be applied individually or in combination in generating encrypted data. For example, the controller may pre-insert the redundant bits of the first part of the redundant data into the transmission data; make the second part of the redundant bits of the redundant data post-insert into the transmitted data; and, make The third redundant bit of the redundant data is interleaved into the transmission data. In this way, the complexity of encrypted data can be greatly increased.

以下可參照圖3,圖3繪示本發明實施例的電子裝置的加密資料的產生方式的一實施方式的示意圖。在圖3的實施方式中,傳輸資料例如具有八個位元TD[0]~TD[7]。位元TD[0]~TD[7]的邏輯值例如分別為1、0、1、0、1、0、1、0。冗餘資料同樣具有八個冗餘位元DD[0]~DD[7],冗餘位元DD[0]~DD[7]的邏輯值例如分別為1、1、1、0、0、0、0、1。在此,控制器可根據交錯式插 入的插入型態,使冗餘資料的冗餘位元DD[0]~DD[7]分別交錯式插入至傳輸資料的八個位元TD[0]~TD[7]中,並使所產生的加密資料MD具有16個位元,其中的邏輯值分別為1、1、0、1、1、1、0、0、1、0、0、0、1、0、0、1。 Referring to FIG. 3 , FIG. 3 is a schematic diagram illustrating an implementation manner of an encrypted data generation method of an electronic device according to an embodiment of the present invention. In the embodiment of FIG. 3 , the transmission data has, for example, eight bits TD[0]˜TD[7]. Logical values of the bits TD[0]˜TD[7] are, for example, 1, 0, 1, 0, 1, 0, 1, 0, respectively. The redundant data also has eight redundant bits DD[0]~DD[7]. The logical values of the redundant bits DD[0]~DD[7] are, for example, 1, 1, 1, 0, 0, 0, 0, 1. Here, the controller can The inserted insertion type makes the redundant bits DD[0]~DD[7] of the redundant data interleavedly inserted into the eight bits TD[0]~TD[7] of the transmission data respectively, and makes all The generated encrypted data MD has 16 bits, the logical values of which are 1, 1, 0, 1, 1, 1, 0, 0, 1, 0, 0, 0, 1, 0, 0, 1 respectively.

關於本實施方式中,傳輸資料的位元TD[0]~TD[7]的邏輯值以及冗餘位元DD[0]~DD[7]都只是說明用範例。傳輸資料的位元TD[0]~TD[7]的邏輯值以及冗餘位元DD[0]~DD[7]都可以是任意值,沒有一定的限制。 In this embodiment, the logical values of the bits TD[0]-TD[7] of the transmission data and the redundant bits DD[0]-DD[7] are just examples for illustration. The logical values of the bits TD[0]~TD[7] of the transmission data and the redundant bits DD[0]~DD[7] can be arbitrary values without certain restrictions.

由上述的說明可以得知,透過冗餘資料對傳輸資料進行的插入動作,傳輸資料與被傳輸的加密資料MD間可具有相當程度的差異度。因此,可以確保傳輸資料在傳輸過程中,不會輕易被外界所竊取,確保傳輸資料的安全度。 From the above description, it can be seen that through the insertion of redundant data into the transmission data, there may be a considerable degree of difference between the transmission data and the transmitted encrypted data MD. Therefore, it can be ensured that the transmission data will not be easily stolen by the outside during the transmission process, ensuring the security of the transmission data.

請參照圖4,圖4繪示本發明另一實施例的電子裝置的示意圖。電子裝置400包括控制器410以及儲存裝置420。本實施例的傳輸資料的加密以及傳輸方式與圖1的實施例的相同,在此不多贅述。與圖1實施例不相同的,儲存裝置420中設置查找表421。查找表421用以儲存查找資訊4211。在此,查找表421可以是任意形式的記憶體。查找表421中的查找資訊4211,可以由控制器410來進行寫入。控制器410並可在需要時,針對查找表421中的查找資訊4211進行動態調整。可有效提升傳輸資料的安全性。 Please refer to FIG. 4 , which is a schematic diagram of an electronic device according to another embodiment of the present invention. The electronic device 400 includes a controller 410 and a storage device 420 . The encryption and transmission method of the transmission data in this embodiment are the same as those in the embodiment in FIG. 1 , and will not be repeated here. Different from the embodiment in FIG. 1 , a lookup table 421 is set in the storage device 420 . The lookup table 421 is used for storing lookup information 4211 . Here, the lookup table 421 can be any form of memory. The lookup information 4211 in the lookup table 421 can be written by the controller 410 . The controller 410 can dynamically adjust the lookup information 4211 in the lookup table 421 when necessary. It can effectively improve the security of transmitted data.

以下請參照圖5,圖5繪示本發明實施例的查找資訊的示意圖。查找資訊500包括多個待查插入型態資訊CI1~CIM以及分 別對應的多個待查冗餘資料CDD1~CDDM。待查插入型態資訊CI1~CIM的每一者可具有一個或多個位元的數位值。待查冗餘資料CDD1~CDDM的每一者則可為具有多個位元的數位值。當查找動作被執行時,可使所接收的插入型態資訊來與多個待查插入型態資訊CI1~CIM進行比對,並查找出與輸入的插入型態資訊相同的待查插入型態資訊(例如為待查插入型態資訊CI1)。接著,儲存裝置可輸出待查插入型態資訊CI1對應的待查冗餘資料CDD1,並據以執行傳輸資料的回復動作。 Please refer to FIG. 5 below. FIG. 5 is a schematic diagram of searching information according to an embodiment of the present invention. Search information 500 includes multiple insertion type information CI1~CIM and Corresponding multiple redundant data to be checked CDD1~CDDM. Each of the to-be-checked insertion type information CI1˜CIM may have a digital value of one or more bits. Each of the redundant data to be checked CDD1˜CDDM can be a digital value with multiple bits. When the search action is executed, the received insertion type information can be compared with multiple insertion type information CI1~CIM to be checked, and the insertion type to be checked that is the same as the input insertion type information can be found. Information (for example, the insertion type information CI1 to be checked). Then, the storage device can output the redundant data CDD1 corresponding to the insertion type information CI1 to be checked, and perform the recovery operation of the transmission data accordingly.

以下請參照圖6,圖6繪示本發明實施例的資料傳輸動作的流程圖。其中,步驟S610中,控制器可設定具有多個冗餘位元的冗餘資料。並且,在步驟S620中,控制器可根據插入型態以在傳輸資料中插入冗餘資料的冗餘位元,並產生加密資料。以及,在步驟S630中,控制器可傳送加密資料至儲存裝置。 Please refer to FIG. 6 below. FIG. 6 shows a flow chart of the data transmission operation of the embodiment of the present invention. Wherein, in step S610, the controller may set redundant data having a plurality of redundant bits. Moreover, in step S620, the controller may insert redundant bits of redundant data into the transmission data according to the insertion type, and generate encrypted data. And, in step S630, the controller may transmit the encrypted data to the storage device.

關於上述步驟S610~S630的實施細節,在前述的多個實施例以及實施方式已有詳細的說明,以下恕不多贅述。 The implementation details of the above steps S610-S630 have been described in detail in the above-mentioned multiple embodiments and implementation manners, and will not be described in detail below.

此外,本發明實施例中,儲存裝置可基於查找資訊以根據控制器所應用的插入型態來獲得冗餘資料。儲存裝置並可根據插入型態由加密資料來移除冗餘位元並還原傳輸資料。關於儲存裝置還原傳輸資料的動作細節,在前述的多個實施例以及實施方式也有詳細的說明,以下恕不多贅述。 In addition, in the embodiment of the present invention, the storage device can obtain redundant data according to the insertion type applied by the controller based on the lookup information. The storage device can also remove redundant bits and restore transmission data from encrypted data according to the insertion type. The operation details of restoring the transmission data by the storage device are also described in detail in the aforementioned multiple embodiments and implementations, and will not be described in detail below.

綜上所述,本發明的電子裝置中,使控制器根據插入型態來對傳輸資料插入冗餘資料,以產生加密資料。並傳輸加密資 料至儲存裝置。這樣一來,加密資料可以避免為外界所竊取,有效保持傳輸資料的安全性。並且,本發明電子裝置所採用的資料插入動作,並不需要複雜的演算法,可有效降低硬體的複雜度以及功率消耗。在另一方面,本發明實施例中的儲存裝置根據插入型態來查找出加密資料中被插入的冗餘資料及插入的位置。如此一來,儲存裝置並可針對加密資料進行冗餘位元的移除,並回復傳輸資料。在不需要應用複雜的演算法的前提下,有效獲得正確的傳輸資料。 To sum up, in the electronic device of the present invention, the controller is configured to insert redundant data into the transmission data according to the insertion type, so as to generate encrypted data. and transmit encrypted data to storage device. In this way, the encrypted data can be prevented from being stolen by the outside world, effectively maintaining the security of the transmitted data. Moreover, the data insertion action adopted by the electronic device of the present invention does not require complex algorithms, which can effectively reduce hardware complexity and power consumption. On the other hand, the storage device in the embodiment of the present invention finds out the inserted redundant data and the inserted position in the encrypted data according to the insertion type. In this way, the storage device can also remove redundant bits for encrypted data and restore the transmission data. Effectively obtain correct transmission data without applying complex algorithms.

100:電子裝置 100: Electronic device

110:控制器 110: Controller

120:儲存裝置 120: storage device

121:查找資訊 121: Find information

MD:加密資料 MD: encrypted data

Claims (10)

一種資料傳輸方法,包括:提供一控制器以設定具有多個冗餘位元的一冗餘資料;提供該控制器以根據一插入型態以在一傳輸資料中插入該冗餘資料的該些冗餘位元,並產生一加密資料;以及使該控制器傳送該加密資料至一儲存裝置。 A data transmission method, comprising: providing a controller to set a redundant data having a plurality of redundant bits; providing the controller to insert the redundant data into a transmission data according to an insertion type redundant bits, and generate an encrypted data; and make the controller send the encrypted data to a storage device. 如請求項1所述的資料傳輸方法,更包括:使該儲存裝置基於一查找資訊以根據該插入型態來獲得該冗餘資料;以及使該儲存裝置根據該插入型態由該加密資料來移除該些冗餘位元並還原該傳輸資料。 The data transmission method as described in Claim 1, further comprising: making the storage device obtain the redundant data according to the insertion type based on a search information; and making the storage device obtain the encrypted data according to the insertion type The redundant bits are removed and the transmitted data is restored. 如請求項1所述的資料傳輸方法,其中該插入型態包括前置式插入、後置式插入以及交錯式插入。 The data transmission method according to claim 1, wherein the insertion types include pre-insertion, post-insertion and staggered insertion. 如請求項1所述的資料傳輸方法,更包括:提供一插入型態資訊至該儲存裝置;以及使該儲存裝置根據該插入型態資訊來獲得該插入型態。 The data transmission method as described in Claim 1 further includes: providing insertion type information to the storage device; and enabling the storage device to obtain the insertion type according to the insertion type information. 如請求項1所述的資料傳輸方法,更包括:在該儲存設置一查找表以儲存該查找資訊,其中該查找資訊包括多個待查插入型態資訊以及分別對應的多個待查冗餘資料。 The data transmission method as described in claim item 1, further comprising: setting a lookup table in the storage to store the lookup information, wherein the lookup information includes a plurality of insertion type information to be checked and a plurality of redundant pieces to be checked respectively material. 一種電子裝置,包括:一儲存裝置;以及一控制器,耦接該電子裝置,該控制器用以: 設定具有多個冗餘位元的一冗餘資料;根據一插入型態以在一傳輸資料中插入該冗餘資料的該些冗餘位元,並產生一加密資料;以及傳送該加密資料至該儲存裝置。 An electronic device includes: a storage device; and a controller coupled to the electronic device, the controller is used for: setting a redundant data with a plurality of redundant bits; inserting the redundant bits of the redundant data in a transmission data according to an insertion type, and generating an encrypted data; and transmitting the encrypted data to the storage device. 如請求項6所述的電子裝置,其中該儲存裝置基於一查找資訊以根據該插入型態來獲得該冗餘資料,該儲存裝置並根據該插入型態由該加密資料來移除該些冗餘位元並還原該傳輸資料。 The electronic device as claimed in item 6, wherein the storage device obtains the redundant data according to the insertion type based on a lookup information, and the storage device removes the redundant data from the encrypted data according to the insertion type and restore the transfer data. 如請求項6所述的電子裝置,其中該插入型態包括前置式插入、後置式插入以及交錯式插入。 The electronic device as claimed in claim 6, wherein the insertion type includes front insertion, rear insertion and staggered insertion. 如請求項6所述的電子裝置,其中該控制器更提供一插入型態資訊至該儲存裝置,該儲存裝置根據該插入型態資訊來獲得該插入型態。 The electronic device as claimed in claim 6, wherein the controller further provides insertion type information to the storage device, and the storage device obtains the insertion type according to the insertion type information. 如請求項6所述的電子裝置,更包括:一查找表,設置在該儲存裝置中,其中該查找資訊包括多個待查插入型態資訊以及分別對應的多個待查冗餘資料。 The electronic device as described in claim 6 further includes: a lookup table set in the storage device, wherein the lookup information includes a plurality of insertion type information to be checked and a plurality of redundant data to be checked respectively.
TW111109102A 2022-03-11 2022-03-11 Electronic device and data transmission method thereof TWI788240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111109102A TWI788240B (en) 2022-03-11 2022-03-11 Electronic device and data transmission method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111109102A TWI788240B (en) 2022-03-11 2022-03-11 Electronic device and data transmission method thereof

Publications (2)

Publication Number Publication Date
TWI788240B true TWI788240B (en) 2022-12-21
TW202336616A TW202336616A (en) 2023-09-16

Family

ID=85795274

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111109102A TWI788240B (en) 2022-03-11 2022-03-11 Electronic device and data transmission method thereof

Country Status (1)

Country Link
TW (1) TWI788240B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI249666B (en) * 2003-08-28 2006-02-21 Sunplus Technology Co Ltd Device using parity check bit to carry out data encryption protection and method thereof
CN100543761C (en) * 2005-02-10 2009-09-23 松下电器产业株式会社 Program conversion apparatus and program executing apparatus
CN104091100A (en) * 2014-07-15 2014-10-08 电子科技大学 Software protection method based on intermediate result compiling
CN105637520A (en) * 2013-10-14 2016-06-01 飞索科技有限公司 Method and apparatus for generating index for encrypted field in database
WO2020098327A1 (en) * 2018-11-12 2020-05-22 中国银联股份有限公司 Watermark embedding method for data text

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI249666B (en) * 2003-08-28 2006-02-21 Sunplus Technology Co Ltd Device using parity check bit to carry out data encryption protection and method thereof
CN100543761C (en) * 2005-02-10 2009-09-23 松下电器产业株式会社 Program conversion apparatus and program executing apparatus
CN105637520A (en) * 2013-10-14 2016-06-01 飞索科技有限公司 Method and apparatus for generating index for encrypted field in database
CN104091100A (en) * 2014-07-15 2014-10-08 电子科技大学 Software protection method based on intermediate result compiling
WO2020098327A1 (en) * 2018-11-12 2020-05-22 中国银联股份有限公司 Watermark embedding method for data text

Also Published As

Publication number Publication date
TW202336616A (en) 2023-09-16

Similar Documents

Publication Publication Date Title
US6078665A (en) Electronic encryption device and method
JP2019097158A (en) Forgery prevention communication system
US11070383B2 (en) Random code generator
US20220311628A1 (en) Secure communication between server device and clients utilizing strong physical unclonable functions
US20070266067A1 (en) Pseudo Random Number Generator
WO1998010562A9 (en) Electronic encryption device and method
US7813507B2 (en) Method and system for creating random cryptographic keys in hardware
EP3577642A1 (en) Methods and devices for protecting data
EP3499788A1 (en) Dynamic masking
EP3272060B1 (en) Datastream block encryption
WO2019043921A1 (en) Encryption device, decryption device, encryption method, decryption method, encryption program, and decryption program
TWI788240B (en) Electronic device and data transmission method thereof
US20200226270A1 (en) System and method for multilayer data protection for memory devices
Wu et al. Differential-linear attacks against the stream cipher Phelix
US20150058639A1 (en) Encryption processing device and storage device
US11050575B2 (en) Entanglement and recall system using physically unclonable function technology
KR20160039011A (en) Physically unclonable function circuit using S-box of AES algorithm
US20240039901A1 (en) Electronic device and data transmission method thereof
US20050031121A1 (en) Encryption method and apparatus
US20220407679A1 (en) Information security protection system and information security protection method
EP3832945A1 (en) System and method for protecting memory encryption against template attacks
CN116842533A (en) Electronic device and data transmission method thereof
CN104537319A (en) Device and method for scrambling and descrambling buses and integrated circuit chip
CN110943837B (en) User password encryption method based on improved MD5 encryption algorithm
Bernardini et al. Helper-less physically unclonable functions and chip authentication