CN103246852A - Enciphered data access method and device - Google Patents

Enciphered data access method and device Download PDF

Info

Publication number
CN103246852A
CN103246852A CN2013101651170A CN201310165117A CN103246852A CN 103246852 A CN103246852 A CN 103246852A CN 2013101651170 A CN2013101651170 A CN 2013101651170A CN 201310165117 A CN201310165117 A CN 201310165117A CN 103246852 A CN103246852 A CN 103246852A
Authority
CN
China
Prior art keywords
data
enciphered data
enciphered
decryption
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101651170A
Other languages
Chinese (zh)
Inventor
张恭继
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Allwinner Technology Co Ltd
Original Assignee
Allwinner Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Allwinner Technology Co Ltd filed Critical Allwinner Technology Co Ltd
Priority to CN2013101651170A priority Critical patent/CN103246852A/en
Publication of CN103246852A publication Critical patent/CN103246852A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides enciphered data access method and device. The method includes: storing enciphered data in a nonvolatile memory, reading the enciphered data to a dynamic random access memory, mapping storage space in the dynamic random access memory expect for a nonvolatile memory storage area to a central processing unit by a memory management unit, and allowing the central processing unit to decrypt the enciphered data in the dynamic random access memory through an decryption unit and read the decrypted data. The device comprises the nonvolatile memory, a system chip, the dynamic random access memory, and the decryption unit, wherein the system chip is provided with the central processing unit and the memory management unit, the dynamic random access memory is provided with the enciphered data storage area, the storage space in the dynamic random access memory except for the enciphered data storage area is mapped to the central processing unit, and the decryption unit decrypts the data stored in the enciphered data storage area and reads the data to a central controller. The enciphered data access method and device have the advantages that safety security is ensured, and production cost of access equipment is reduced.

Description

The access method of enciphered data and device
Technical field
The present invention relates to the data processing field of electronic equipment, particularly, is a kind of access method of enciphered data of electronic equipment and the access device of enciphered data.
Background technology
Existing electronic equipment as mass-used system level chips (SoC, System on Chip) such as computer, mobile phone, E-book reader, music players, is called System on Chip/SoC among the application.Usually, other storeies of the System on Chip/SoC of electronic equipment and electronic equipment are integrated on the circuit board as nonvolatile memory, volatile memory etc., and System on Chip/SoC can carry out read and write access to nonvolatile memory, volatile memory etc.
Usually, the data of the system program of electronic equipment are stored in the nonvolatile memory, and when electronic equipment moved, the central processing unit of System on Chip/SoC was stored in data in the nonvolatile memory with visit.Yet some third party's programs that operate on the electronic equipment may be visited the system data that is stored in nonvolatile memory, and system data is distorted, and influence the security of electronic equipment operation.In addition, some third party's programs also may be visited and be copied the system data that is stored in the nonvolatile memory, cause system data to be replicated easily, and influence is to the protection of digital publishing rights.
Therefore, in the existing electronic equipment, some data need be carried out strict protection usually, reads or distort this partial data to avoid any third party's program, is affected with the operational safety performance that prevents electronic equipment.
Referring to Fig. 1, existing electronic equipment is provided with System on Chip/SoC 20, nonvolatile memory 10 and dynamic RAM 12, nonvolatile memory 10 can be flash memory (flash) etc., it is provided with enciphered data memory block 11, be used for storage through ciphered data, these ciphered data are encrypted through two-stage usually.Dynamic RAM (DRAM) 12 be as volatile memory, the data of interim storage system chip 20 required read-writes behind the electronic equipment electrifying startup.
System on Chip/SoC 20 has central processing unit (CPU) 21, memory management unit (MMU) 22,23 and two deciphering modules 25 of static RAM (SRAM), 26.Behind System on Chip/SoC 20 electrifying startups, the storage space of dynamic RAM 12 maps to central processing unit 21 by memory management unit 22, central processing unit 21 is about to amount of physical memory and converts logical memory space to, so the address read and write of central processing unit 21 is the address of logical memory space.
Because a part of ciphered data of system data is stored in the enciphered data memory block 11 of nonvolatile memory 10, when electronic equipment powers on, its system starts, deciphering module 25 will read the enciphered data that is stored in the enciphered data memory block 11, and enciphered data carried out a level decryption, one-level data decryption after obtaining to decipher is stored in the one-level data decryption in the static RAM 23.When central processing unit 21 needs the reading encrypted data, will be decrypted by 26 pairs of data that are stored in the static RAM 23 of deciphering module, and read data after the deciphering.
Because static RAM 23 is not mapped to central processing unit 21 by memory management unit 22; therefore any third party's program all can not access static random access memory 23; can guarantee that like this one-level enciphered data that is stored in the static RAM 23 can not read and distort by third party's program; and the enciphered data memory block 11 interior enciphered datas that are stored in nonvolatile memory 10 more can not visited, distort by third party's program, realize the protection to enciphered data.
But, this method need arrange static RAM 23 with the one-level data decryption of storage through a level decryption in System on Chip/SoC 20, because the production cost height of static RAM 23, and memory capacity is often limited, cause the one-level data decryption stored few, also increase the production cost of System on Chip/SoC, caused the production cost of electronic equipment high.
The method of security operating mode of then using existing other electronic equipment realizes the protection to enciphered data; this method need arrange security operating mode; when central processing unit need be visited enciphered data, central processing unit will switch under the security operating mode and work.But this method realizes that difficulty is big, and to the hardware requirement height of electronic equipment, can cause the production cost of electronic equipment higher equally.
Summary of the invention
Fundamental purpose of the present invention provides a kind of simple enciphered data access method of effectively enciphered data being protected and realized.
Another object of the present invention provides a kind of production cost enciphered data access device low and that effectively enciphered data is protected.
In order to realize above-mentioned fundamental purpose, enciphered data access method provided by the invention comprises enciphered data is stored in the nonvolatile memory, and, when the system of electronic equipment starts, the enciphered data that is stored in nonvolatile memory is read in the dynamic RAM, memory management unit maps to central processing unit with the storage space except the enciphered data storage area in the dynamic RAM, central processing unit is decrypted by the enciphered data that decryption unit will be stored in the dynamic RAM, and reads the data after the deciphering.
By such scheme as seen; the enciphered data that is stored in nonvolatile memory will be read in the dynamic RAM; and the enciphered data storage area of dynamic RAM can not be mapped to central processing unit; therefore the enciphered data that is stored in dynamic RAM can not visited by third party's program; also just avoid enciphered data to be replicated or to distort, effectively enciphered data is protected.
And, said method need not arrange static RAM at System on Chip/SoC, but ciphered data is stored in the dynamic RAM, because the memory capacity of dynamic RAM is big and production cost is low, can reduce the production cost of System on Chip/SoC, and then reduce the production cost of electronic equipment.
A preferred scheme is, the step that the enciphered data that is stored in nonvolatile memory is read into dynamic RAM is: first deciphering module of using decryption unit is decrypted the enciphered data that is stored in nonvolatile memory, obtains the one-level data decryption and the one-level data decryption is stored in the dynamic RAM.
This shows; when the enciphered data of nonvolatile memory is read in dynamic RAM; need carry out a level decryption to enciphered data; like this; even the enciphered data in third party's program reading non-volatile storage; also can't utilize these ciphered data, more effectively protect enciphered data.
Further scheme is that central processing unit is to the step that the one-level data decryption is decrypted: second deciphering module that should decryption unit is decrypted the one-level data decryption.
Like this, decryption unit uses two different deciphering modules respectively enciphered data and one-level data decryption to be decrypted, and more effectively protects enciphered data.
Further scheme is, first deciphering module and second deciphering module are the Advanced Encryption Standard module, and uses first decruption key, second decruption key relevant with the electronic equipment identification code that data are decrypted respectively.
As seen, two deciphering modules are decryption hardware, avoid using software program that data are decrypted, and then avoid third party's program to obtain institute's decrypted data by decryption software, guarantee the security of data.In addition, two deciphering modules all use the key relevant with the electronic device identification sign indicating number to be decrypted, preventing effectively that the third party is installed to nonvolatile memory on other electronic equipments of the deciphering module that has cracked cracks operation, obtains the enciphered data of nonvolatile memory by reverse engineering.
For realizing another above-mentioned purpose, enciphered data access device provided by the invention comprises nonvolatile memory, store enciphered data, and be provided with System on Chip/SoC, it has central processing unit and memory management unit, also be provided with dynamic RAM, it has the enciphered data storage area, storage space in the dynamic RAM except the enciphered data storage area is mapped to central processing unit by memory management unit, this device also is provided with decryption unit, is used for will being stored in the data deciphering of enciphered data storage area and reading to central controller.
By such scheme as seen, the enciphered data storage area of dynamic RAM can stored encrypted data, and can not be mapped to central processing unit, and like this, third party's program can not be visited enciphered data by central processing unit, guarantees the security of enciphered data.And the enciphered data access device need not arrange static RAM at System on Chip/SoC, can reduce the production cost of System on Chip/SoC greatly, and then reduces the production cost of electronic equipment.
Description of drawings
Fig. 1 is the structured flowchart of existing enciphered data access device.
Fig. 2 is the structured flowchart of enciphered data access device embodiment of the present invention.
Fig. 3 is the process flow diagram of enciphered data access method embodiment of the present invention.
The invention will be further described below in conjunction with drawings and Examples.
Embodiment
Enciphered data access device of the present invention is applied in such as in the electronic equipments such as computer, mobile phone, electronic reader, music player, mainly is that the enciphered data in the system data of electronic equipment is protected.The enciphered data access method is to use above-mentioned enciphered data access device to the access method of enciphered data.
Referring to Fig. 2, enciphered data access device of the present invention has System on Chip/SoC 40 and is arranged on System on Chip/SoC 40 nonvolatile memory 30, dynamic RAM 35 outward, nonvolatile memory 30 is flash memory etc., it is provided with enciphered data memory block 31, store through the secondary ciphered data, namely be stored in the enciphered data of enciphered data memory block 31 through twice encryption.
Dynamic RAM 35 comprises enciphered data storage area 36 and general data storage area 37, enciphered data storage area 36 is used for storage through ciphered data, general data storage area 37 then is used for providing in System on Chip/SoC 40 courses of work space of temporary storaging data, and general data storage area 37 is storage spaces except enciphered data storage area 36 in the dynamic RAM 35.
System on Chip/SoC 40 has central processing unit 41, memory management unit (MMU) 42 and deciphering module 45,46, and deciphering module 45,46 constitutes the decryption unit of present embodiment.After electronic equipment powers on, after being system's startup of electronic equipment, dynamic RAM 35 also starts work, memory management unit 42 maps to central processing unit 41 with the storage space of general data storage area 37, and central processing unit 41 converts logical memory space to the amount of physical memory that is about to general data storage area 37.But memory management unit 42 can not map to the storage space of enciphered data storage area 36 central processing unit 41, so central processing unit 41 directly can't read the data that are stored in the enciphered data storage area 36.
Deciphering module 45 is the hardware decryption module, for example be Advanced Encryption Standard (AES, Advanced Encryption Standard) module, it stores first key relevant with the electronic device identification sign indicating number, be decrypted for the enciphered data that will be stored in nonvolatile memory 30, obtain the one-level data decryption, and the one-level data decryption is stored in the enciphered data storage area 36 of dynamic RAM 35.Therefore, what enciphered data storage area 36 was stored is through the one-level decrypted data, and is not through the secondary ciphered data.
Deciphering module 46 also is the hardware decryption module, also can use the Advanced Encryption Standard module, and store second decruption key relevant with the electronic device identification sign indicating number, be decrypted for the one-level data decryption that will be stored in dynamic RAM 35, and the data after will deciphering, namely clear data reads in the central processing unit 41.
Because each electronic equipment all has unique identification code; and first decruption key and second decruption key all are keys relevant with the electronic device identification sign indicating number; preferably; first decruption key and second decruption key all include the identification code of electronic equipment; perhaps include the identification code of electronic equipment through the data of certain computing acquisition; as process and exclusive disjunction, addition operation or process cryptographic calculation; make first decruption key and second decruption key have uniqueness like this; also increase the difficulty that enciphered data is cracked, more effectively enciphered data is protected.
In addition, deciphering module 45 writes data, deciphering module 46 to dynamic RAM 35, and to read data from dynamic RAM 35 all be to adopt direct memory access (DMA, Direct Memory Access) mode realizes, avoid the participation of central processing unit 41, thereby avoid third party's program to obtain data in the enciphered data storage area 36 that is stored in dynamic RAM 35 by central processing unit 41.
Deciphering module 45,46 is the hardware decryption module; deciphering to enciphered data, one-level data decryption all is to realize by decryption hardware like this; rather than by software program realization deciphering; the software program of avoiding operating on the central processing unit 41 obtains enciphered data, one-level data decryption in decrypting process, more effectively protect enciphered data.
The flow process of enciphered data access method is described below in conjunction with Fig. 3.At first, the production development phase at electronic equipment, the clear data that needs protection is encrypted processing, i.e. execution in step S1, and data encrypted is stored in the nonvolatile memory 30.
When the clear data that needs protection is encrypted; clear data is carried out two-stage to be encrypted; wherein carry out clear data to be carried out piecemeal when the first order is encrypted, use key that each piece clear data is encrypted respectively, in order to when data are deciphered, also can carry out the deciphering of piecemeal to data.For example, clear data is divided into the polylith data block, respectively the polylith data block is carried out one-level and encrypt, then all data blocks after encrypting are carried out secondary and encrypt, and the secondary data encrypted is stored in the enciphered data memory block 31 of nonvolatile memory 30.
When the system of electronic equipment starts, the enciphered data that is stored in nonvolatile memory 30 is read into dynamic RAM 35, be execution in step S2, at this moment, the decrypted module 45 of enciphered data in the enciphered data memory block 31 is carried out a level decryption, deciphering module 45 uses first decruption key relevant with EIC equipment identification code that enciphered data is decrypted, acquisition one-level data decryption, and the one-level data decryption after will deciphering writes in the dynamic RAM 35 in the mode of direct memory access.The zone that stores the one-level data decryption in the dynamic RAM 35 is enciphered data storage area 36, and other zones are general data storage area 37.
Then, central controller 41 maps to central processing unit 41 by memory management unit 42 with the storage space except enciphered data storage area 36 in the dynamic RAM 35, i.e. execution in step S3.Then, central processing unit 41 execution in step S4, switch to logical memory space from amount of physical memory, therefore, 41 logical memory space that can visit of central processing unit do not comprise the storage space of enciphered data storage area 36, just can not carry out read-write operation to the storage space of enciphered data storage area 36 yet.During central processing unit 41 operation third party programs, third party's program can not be by central processing unit 41 visit enciphered data storage areas 36, thereby guarantee that the data of storing in the enciphered data storage area 36 can or not distort by third party's program copy, ensure the security of enciphered data.
At last, when central processing unit 41 needs to use ciphered data corresponding plaintext data, start deciphering module 46, deciphering module 46 uses second key relevant with the electronic device identification sign indicating number that the one-level data decryption that is stored in the enciphered data storage area 36 in the dynamic RAM 35 is decrypted, obtain clear data, and clear data is sent to central processing unit 41.Preferably, when deciphering module 46 reads the one-level data decryption, carry out in the mode of direct memory access, guarantee that central processing unit 41 can not participate in the read operation to the one-level enciphered data.
Because clear data is encrypted through secondary and is stored in the nonvolatile memory 30; and through being used by central processing unit 41 behind two level decryptions; in the process of enciphered data deciphering; central processing unit 41 does not participate in; and can not visit the storage area of stored encrypted data, one-level data decryption; guarantee that any third party's program can not guarantee the security of data by these data that need protection of central processing unit 41 visit.
In addition, because clear data is block encryption, therefore the one-level data decryption also is the piecemeal deciphering, like this, when central processing unit 41 needed to use a certain blocks of data piece, deciphering module 46 only was decrypted the data of this data block, can all data blocks be decrypted simultaneously, avoiding deciphering is to consume a large amount of time, also avoids sending all clear datas to central processing unit 41, guarantees the security of data.
Because the enciphered data access device need not arrange the higher static RAM of cost in System on Chip/SoC, only use the data of a part of storage space storage encryption of the lower dynamic RAM of production cost 35, when guaranteeing data security, reduce the production cost of System on Chip/SoC, thereby reduce the production cost of electronic equipment.
Certainly, the above embodiments only are preferred implementation of the present invention, during practical application, more change can also be arranged, and for example, other storeies such as use EEPROM substitute flash memory as nonvolatile memory; Perhaps, the decruption key that deciphering module uses is uncorrelated with the identification code of electronic equipment etc., and such change also can realize purpose of the present invention.
It is emphasized that at last to the invention is not restricted to above-mentioned embodiment, also should be included in the protection domain of claim of the present invention as the change of encrypt and decrypt algorithm, the variations such as change of type of memory.

Claims (10)

1. the access method of enciphered data comprises
Enciphered data is stored in the nonvolatile memory;
It is characterized in that:
When the system of electronic equipment starts, the enciphered data that is stored in described nonvolatile memory is read in the dynamic RAM;
Memory management unit maps to central processing unit with the storage space except the enciphered data storage area in the described dynamic RAM;
Described central processing unit is decrypted by the enciphered data that decryption unit will be stored in the described dynamic RAM, and reads the data after the deciphering.
2. the access method of enciphered data according to claim 1 is characterized in that:
The step that the enciphered data that is stored in described nonvolatile memory is read into described dynamic RAM is: first deciphering module of using described decryption unit is decrypted the enciphered data that is stored in described nonvolatile memory, obtains the one-level data decryption and described one-level data decryption is stored in the described dynamic RAM.
3. the access method of enciphered data according to claim 2 is characterized in that:
Described first deciphering module is the Advanced Encryption Standard module, and it uses first decruption key relevant with the electronic equipment identification code that enciphered data is decrypted.
4. according to the access method of claim 2 or 3 described enciphered datas, it is characterized in that:
Described central processing unit to the step that described one-level data decryption is decrypted is: second deciphering module that should described decryption unit is decrypted described one-level data decryption.
5. the access method of enciphered data according to claim 4 is characterized in that:
Described second deciphering module is the Advanced Encryption Standard module, and it uses second decruption key relevant with the electronic equipment identification code that described one-level data decryption is decrypted.
6. the access device of enciphered data comprises
Nonvolatile memory stores enciphered data;
System on Chip/SoC has central processing unit and memory management unit;
It is characterized in that:
Dynamic RAM, it has the enciphered data storage area, and the storage space in the described dynamic RAM except described enciphered data storage area is mapped to described central processing unit by described memory management unit;
Decryption unit is used for will being stored in the data deciphering of described enciphered data storage area and reading to described central controller.
7. the access device of enciphered data according to claim 6 is characterized in that:
Described decryption unit has first deciphering module, is used for the enciphered data that is stored in described nonvolatile memory is decrypted, and obtains the one-level data decryption and described one-level data decryption is stored in the described dynamic RAM.
8. the access device of enciphered data according to claim 7 is characterized in that:
Described first deciphering module is the Advanced Encryption Standard module, and it stores first decruption key relevant with the electronic equipment identification code.
9. according to the access device of claim 7 or 8 described enciphered datas, it is characterized in that:
Described decryption unit also is provided with second deciphering module, be used for described one-level data decryption is decrypted, and the data read after will deciphering is to described central controller.
10. the access device of enciphered data according to claim 9 is characterized in that:
Described second deciphering module is the Advanced Encryption Standard module, and it stores second decruption key relevant with the electronic equipment identification code.
CN2013101651170A 2013-05-07 2013-05-07 Enciphered data access method and device Pending CN103246852A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101651170A CN103246852A (en) 2013-05-07 2013-05-07 Enciphered data access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101651170A CN103246852A (en) 2013-05-07 2013-05-07 Enciphered data access method and device

Publications (1)

Publication Number Publication Date
CN103246852A true CN103246852A (en) 2013-08-14

Family

ID=48926366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101651170A Pending CN103246852A (en) 2013-05-07 2013-05-07 Enciphered data access method and device

Country Status (1)

Country Link
CN (1) CN103246852A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104635586A (en) * 2015-01-16 2015-05-20 成都鼎智汇科技有限公司 Data transmission module for remotely monitoring building energy consumption
CN105653966A (en) * 2016-03-03 2016-06-08 山东超越数控电子有限公司 Independent and credible cloud data storage method
CN107665311A (en) * 2016-07-28 2018-02-06 中国电信股份有限公司 Authentication Client, encryption data access method and system
CN110267260A (en) * 2019-06-17 2019-09-20 Oppo广东移动通信有限公司 Brush machine method, apparatus, terminal and computer readable storage medium
CN110309083A (en) * 2019-06-28 2019-10-08 兆讯恒达微电子技术(北京)有限公司 A kind of memory data method for scrambling
CN112148791A (en) * 2020-09-15 2020-12-29 张立旭 Distributed data dynamic adjustment storage method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1265494A (en) * 2000-04-24 2000-09-06 后健慈 Enciphered and deciphered memory and its access controlling method
US20040177269A1 (en) * 2002-11-18 2004-09-09 Arm Limited Apparatus and method for managing access to a memory
CN101004720A (en) * 2007-01-24 2007-07-25 赵铁军 Individualized intelligent learning machine for taking an exam based on encryption techniques
CN102567689A (en) * 2011-12-05 2012-07-11 清华大学 Phase-change storage unit based non-volatile internal storage data confidentiality protecting method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1265494A (en) * 2000-04-24 2000-09-06 后健慈 Enciphered and deciphered memory and its access controlling method
US20040177269A1 (en) * 2002-11-18 2004-09-09 Arm Limited Apparatus and method for managing access to a memory
CN101004720A (en) * 2007-01-24 2007-07-25 赵铁军 Individualized intelligent learning machine for taking an exam based on encryption techniques
CN102567689A (en) * 2011-12-05 2012-07-11 清华大学 Phase-change storage unit based non-volatile internal storage data confidentiality protecting method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104635586A (en) * 2015-01-16 2015-05-20 成都鼎智汇科技有限公司 Data transmission module for remotely monitoring building energy consumption
CN105653966A (en) * 2016-03-03 2016-06-08 山东超越数控电子有限公司 Independent and credible cloud data storage method
CN107665311A (en) * 2016-07-28 2018-02-06 中国电信股份有限公司 Authentication Client, encryption data access method and system
CN110267260A (en) * 2019-06-17 2019-09-20 Oppo广东移动通信有限公司 Brush machine method, apparatus, terminal and computer readable storage medium
CN110309083A (en) * 2019-06-28 2019-10-08 兆讯恒达微电子技术(北京)有限公司 A kind of memory data method for scrambling
CN112148791A (en) * 2020-09-15 2020-12-29 张立旭 Distributed data dynamic adjustment storage method and system
CN112148791B (en) * 2020-09-15 2024-05-24 张立旭 Distributed data dynamic adjustment storage method and system

Similar Documents

Publication Publication Date Title
US9483664B2 (en) Address dependent data encryption
US9397834B2 (en) Scrambling an address and encrypting write data for storing in a storage device
KR100445406B1 (en) Apparatus for encrypting the data and method therefor
JP7225220B2 (en) Storage data encryption/decryption device and method
US9094190B2 (en) Method of managing key for secure storage of data and apparatus therefor
EP3355232B1 (en) Input/output data encryption
US20190384938A1 (en) Storage apparatus and method for address scrambling
US9081724B2 (en) Method and device for protecting memory content using first and second addressable storage regions and first and second encryption keys
US20150089245A1 (en) Data storage in persistent memory
CN102117387A (en) Secure key access device and applications thereof
US10671546B2 (en) Cryptographic-based initialization of memory content
CN101268650A (en) Methods and apparatus for the secure handling of data in a microcontroller
CN103246852A (en) Enciphered data access method and device
US20150242332A1 (en) Self-encrypting flash drive
JP2005018725A5 (en)
EP2990953B1 (en) Periodic memory refresh in a secure computing system
CN105095945A (en) SD card capable of securely storing data
US9531535B2 (en) Secure memories using unique identification elements
US20130198528A1 (en) Modifying a Length of an Element to Form an Encryption Key
US11734415B2 (en) Device and method for managing an encrypted software application
CN114969794A (en) SoC system and data encryption method
CN102737185A (en) Digital copyright protection method
KR20150145870A (en) Semiconductor device for protecting data per channel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130814

RJ01 Rejection of invention patent application after publication