CN105653980A - Virtual memory data protection method and system - Google Patents
Virtual memory data protection method and system Download PDFInfo
- Publication number
- CN105653980A CN105653980A CN201511025006.5A CN201511025006A CN105653980A CN 105653980 A CN105653980 A CN 105653980A CN 201511025006 A CN201511025006 A CN 201511025006A CN 105653980 A CN105653980 A CN 105653980A
- Authority
- CN
- China
- Prior art keywords
- function
- virtual memory
- write
- legal
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Abstract
The invention provides a virtual memory data protection method and system. The method comprises the steps of setting an attribute of a virtual memory disk to be a read-only attribute; presetting a legal function and calling the legal function by a legal writing operation of the virtual memory disk; calling a writing function; and intercepting the writing function and modifying an address of the writing function to be an address of the legal function. According to the method and system, a memory data protection wall is established through modifying the attribute of the disk by utilizing a protection principle of the read-write attribute of the virtual memory disk of an operation system, so that the virtual memory data is protected from the source and any illegal writing operation is prohibited; and meanwhile, the data of the virtual memory disk is legally modified or written in a manner of providing a legal access entry, thereby ensuring the implementation of the legal operation and realizing legal modification and writing.
Description
Technical field
The present invention relates to disk storage field, specifically be protection method and the system thereof of a kind of virtual memory data.
Background technology
Virtual memory disk refers to use a part for computer internal memory to simulate a hard disk, utilizes HOOKAPI technology data in disk to be operated. An application program to be called an api function, then application program needs the address knowing function; Described HOOKAPI technology refers to the api function address to be called is replaced the address for another function MyCreateFileW, so when program calls CreateFileW, will call MyCreateFileW.
When not to virtual memory data protection; virtual memory data in magnetic disk can be modified when not being allowed to or write by program; wherein just comprise unpredictable mistake (such as Array Bound etc.); this problem that will directly cause stored data to be illegally modified so that virtual memory disk cannot ensure the security of data.
Existing internal memory magnetic disc major part realizes based on system bottom, and the protection practice of its stored data is identified memory attribute, is can read can write or can perform by marking this block internal memory address by different marks. And the stored data based on applied layer is protected, the present practice is verified by stored data, and the concrete practice is after interior counterfoil writes data, is calculated by stored data by some algorithms, and the result calculated is saved; Reading according to time, in order to guarantee the exactness of data, it is necessary to again the data of protection internal memory are calculated, then the result of the result and the preservation that calculate is contrasted, if consistent explanation data are correct, it does not have be modified.
Application number is a kind of method that application discloses data backup, server and the hot backup system of 201210108928.2, by in the process that the virtual memory region of the process address space is backed up, whether the zone bit according to virtual memory region judges in the physical memory page that virtual memory region is corresponding containing the dirty page of internal memory, then corresponding internal memory page is traveled through when it is present, preserve the content of the dirty page of internal physical.
Virtual memory disk after may there is data tampering can only be carried out detection backup by above-mentioned patent application, and its stored data protected effect is not good, cannot protect root.
Summary of the invention
Technical problem to be solved by this invention is: protection method and the system thereof providing a kind of virtual memory data, it is possible to effectively prevent stored data from illegally being distorted, and can legal write again simultaneously.
In order to solve the problems of the technologies described above, the technical solution used in the present invention is:
A protection method for virtual memory data, comprises
The attribute arranging virtual memory disk is read-only;
Presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Call write function;
Interception said write function, the address of amendment said write function is the address of described legal function.
Another technical scheme provided by the invention is:
A securing system for virtual memory data, comprises
Module is set, is read-only for setting the attribute of virtual memory disk;
Presetting module, for presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Calling module, for calling write function;
Blocking module, for tackling said write function, the address of amendment said write function is the address of described legal function.
The useful effect of the present invention is: being different from prior art based on the virtual memory data protection of applied layer needs by the calculating of stored data being verified, and checking process is complicated, belongs to and verifies afterwards, the deficiency of protected effect difference. The present invention provides a kind of protection method of virtual memory data, by being read-only by the setup of attribute of virtual memory disk, stops illegal molecule with this and data in disk are performed any retouching operation, protected by virtual memory disk root; Preset legal function, it is provided that the entrance of legal write data simultaneously, it is possible to legal call write function time use interception technology, the address of amendment write function is the address of legal function, to realize the data write operation to virtual memory disk. The present invention sets up the protective wall of stored data by revising the attribute of disk, virtual memory data is protected, forbid any illegal write operation root; Also can not affect the write operation of legal ground, it is achieved taking into account of the two simultaneously.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the protection method of virtual memory data of the present invention;
Fig. 2 is the schematic flow sheet of the protection method of the embodiment of the present invention one virtual memory data;
Fig. 3 is the structural representation of the securing system of virtual memory data of the present invention;
Fig. 4 be the embodiment of the present invention two virtual memory data securing system in the structural representation of blocking module;
Fig. 5 is the protection method of virtual memory data of the present invention and the schematic diagram of system thereof;
Fig. 6 is the schematic diagram of legal write function in the protection method of virtual memory data of the present invention and system thereof.
Label illustrates:
1, module is set; 2, presetting module; 3, calling module; 4, blocking module;
41, the first amendment unit; 42, unit is operated; 43, the 2nd amendment unit.
Embodiment
By the technology contents of the present invention being described in detail, is realized object and effect, below in conjunction with enforcement mode and coordinate accompanying drawing to be explained.
The design of most critical of the present invention is: the attribute arranging virtual memory disk is read-only, forbids illegal write operation; Preset legal function, realize legal write operation by interception technology.
Please refer to Fig. 1, Fig. 2 and Fig. 3 and Fig. 4, the present invention provides a kind of protection method of virtual memory data, comprises
The attribute arranging virtual memory disk is read-only;
Presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Call write function;
Interception said write function, the address of amendment said write function is the address of described legal function.
Further, after described " interception said write function, the address of amendment said write function is described legal function address ", comprise further:
The attribute of amendment virtual memory disk is read-write;
According to said write function, described virtual memory disk is performed write operation;
The attribute of amendment virtual memory disk is read-only.
Seen from the above description, by tackling the replacement of technology measure for fulfill address, it is achieved to the legal write of virtual memory disk.
Further, described " call write function; Interception said write function, the address of amendment said write function is the address of described legal function " it is specially:
Write function is called by virtual memory disk module is legal;
Virtual memory disk interception said write function, the address of amendment said write function is the address of described legal function, simultaneously according to said write function, obtain the write data that write operation is corresponding, forming interception function, described interception function correspondence comprises amendment virtual memory Disk Properties and the operation of write corresponding data.
Seen from the above description, perform the legal write operation to virtual memory data by virtual memory disk module, it is possible to guarantee to operate the legal of identity, also can improve function simultaneously and call and the efficiency of the legal write of data.
Further, by the attribute of virtual memory disk described in VirtualProtectEx function setup.
Further, by HOOKAPI technical intercept said write function, the address of amendment said write function is the address of described legal function.
Referring to Fig. 3 and Fig. 4, another technical scheme provided by the invention is:
A securing system for virtual memory data, comprises
Module 1 is set, is read-only for setting the attribute of virtual memory disk;
Presetting module 2, for presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Calling module 3, for calling write function;
Blocking module 4, for tackling said write function, the address of amendment said write function is the address of described legal function.
From foregoing description it will be seen that the useful effect of the present invention is: the attribute arranging virtual memory disk by arranging module 1, forbid any illegal write operation; Legal function is configured, for legal write operation provides legal entrance by presetting module 2; The write operation based on legal entrance is realized by calling module 3 and blocking module. Realize being protected by stored data root by the securing system of virtual memory data, legal write operation can not be impacted simultaneously.
Further, described blocking module 4 comprises:
First amendment unit 41 is read-write for revising the attribute of virtual memory disk;
Operation unit 42, for according to said write function, performing write operation to described virtual memory disk;
2nd amendment unit 43 is read-only for revising the attribute of virtual memory disk.
Further, also comprising virtual memory disk module, described virtual memory disk module comprises described calling module 3 and described blocking module 4;
Described calling module, specifically for calling write function by virtual memory disk module is legal;
Described blocking module, said write function is tackled specifically for virtual memory disk, the address of amendment said write function is the address of described legal function, simultaneously according to said write function, obtain the write data that write operation is corresponding, forming interception function, described interception function correspondence comprises amendment virtual memory Disk Properties and the operation of write corresponding data.
Further, described module 1 is set, specifically for the attribute by virtual memory disk described in VirtualProtectEx function setup.
Further, described blocking module 4, specifically for by HOOKAPI technical intercept said write function, the address of amendment said write function is described legal function address.
Embodiment one
Please refer to Fig. 1-4, it is provided that a kind of protection method of virtual memory data, realize calling of write function based on applied layer. Specifically can comprise:
In the virtual memory of windows system process, in virtual memory, apply for that a slice virtual memory space is as virtual memory disk by VirtualAlloc or VirtualAlocEx function, it is used for preserving virtual memory data. After obtaining the address of virtual memory disk, it may also be useful to the protection setup of attribute of this sheet virtual memory space is become read-only attribute by VirtualProtectEx function; Namely utilizing the protection attribute of virtual memory space itself to be protected by virtual memory disk, when the attribute of virtual memory disk is read-only attribute, any write operation of program all can cause access violation; This feature is possible to prevent illegal molecule to after the execution write operation of virtual memory disk, produces unpredictable (such as Array Bound etc.) mistake, thus causes virtual memory data to be modified the access violation of initiation, and initiating system process forces to terminate.
Aforesaid operations can forbid any write operation of illegal molecule; and can normally carry out to guarantee to have the legal write operation of legal identity; the present embodiment realizes by arranging the entrance (legal function address) that calls of legal function, has and virtual memory disk can be performed the operation such as amendment protection attribute by entrance that only this legal identity just can be known. Concrete, realize legal write operation in the following manner:
Presetting legal function, described legal function is called in the legal write operation of described virtual memory disk, and the address of this legal function only has legal identity to obtain; Described legal function contains the operation of amendment virtual memory disk protect attribute;
Virtual memory disk is performed legal write operation by virtual memory disk module by legal identity; Optionally, write function by the WriteFile in calling system API to perform; Then described WriteFile write function is tackled by virtual memory disk module, is the address of described legal function by the address of WriteFile write function described in interception technology modification, it is preferable that tackled by HOOKAPI technology. Described interception technology concrete utilization in the present embodiment comprises: described WriteFile is write function address and replaces to default legal function address, obtain the data that described WriteFile writes function and performs write operation correspondence and need write simultaneously, form interception function; Containing the operation performing amendment virtual memory Disk Properties and performing write corresponding data in described interception function, the described WriteFile after being blocked writes function as shown in Figure 4;
Call the WriteFile after aforesaid operations when program and write function, address automatic hopping foundation being modified is to interception function, first the protection attribute modification of virtual memory disk is read-write attribute, i.e. PAGE_EXECUTE_READWRITE by the operation pointed to according to interception function; According to the data writing the described needs write that function gets from WriteFile, the virtual memory data in virtual memory disk are write or retouching operation; After write operation is finished, by calling VirtualProtectEx function, by being arranged to before, read-write virtual memory disk reverts to read-only attribute to described interception function, i.e. PAGE_READONLY, closes the sole legal entrance of write operation, prevents stored data by accidental modification.
Embodiment two
Please refer to Fig. 5 and Fig. 6, the present embodiment is on the basis of embodiment one, it is provided that the securing system of a kind of virtual memory data, comprising:
Module 1 is set, is read-only for setting the attribute of virtual memory disk; Optional by VirtualProtectEx function setup;
Presetting module 2, for presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Calling module 3, for calling write function;
Blocking module 4, for tackling said write function, the address of amendment said write function is the address of described legal function; Optional employing HOOKAPI technical intercept or other interception technology realize; Described blocking module 4 specifically comprises the first amendment unit 41, is read-write for revising the attribute of virtual memory disk; Operation unit 42, for according to said write function, performing write operation to described virtual memory disk; 2nd amendment unit 43 is read-only for revising the attribute of virtual memory disk.
Optionally, also comprising virtual memory disk module, described virtual memory disk module comprises described calling module 3 and described blocking module 4;
Described calling module 3, specifically for calling write function by virtual memory disk module is legal;
Described blocking module 4, said write function is tackled specifically for virtual memory disk, the address of amendment said write function is the address of described legal function, simultaneously according to said write function, obtain the write data that write operation is corresponding, forming interception function, described interception function correspondence comprises amendment virtual memory Disk Properties and the operation of write corresponding data.
In sum, the protection method of a kind of virtual memory data provided by the invention and system thereof, it is possible to forbid any illegal write operation to virtual memory disk, prevents program from causing virtual memory data to be destroyed because of unpredictable mistake; The write operation entrance of reserved legal identity simultaneously, it is ensured that the carrying out of legal modifications virtual memory data; Further, tackle technology by HOOKAPI and realize legal write, simple to operate, and security height. The present invention, based on the protection principle of virtual memory disk read-write attribute, sets up the protective wall of stored data, virtual memory data is protected root, forbids any illegal write operation; Also can not affect the write operation of legal ground, it is achieved taking into account of the two simultaneously.
The foregoing is only embodiments of the invention; not thereby the patent scope of the present invention is limited; every equivalents utilizing specification sheets of the present invention and accompanying drawing content to do, or directly or indirectly it is used in relevant technical field, all it is included in the scope of patent protection of the present invention with reason.
Claims (10)
1. the protection method of virtual memory data, it is characterised in that, comprise
The attribute arranging virtual memory disk is read-only;
Presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Call write function;
Interception said write function, the address of amendment said write function is the address of described legal function.
2. the protection method of a kind of virtual memory data as claimed in claim 1, it is characterised in that, after described " interception said write function, the address of amendment said write function is the address of described legal function ", comprise further:
The attribute of amendment virtual memory disk is read-write;
According to said write function, described virtual memory disk is performed write operation;
The attribute of amendment virtual memory disk is read-only.
3. the protection method of a kind of virtual memory data as claimed in claim 1, it is characterised in that, described " call write function; Interception said write function, the address of amendment said write function is the address of described legal function " it is specially:
Write function is called by virtual memory disk module is legal;
Virtual memory disk interception said write function, the address of amendment said write function is the address of described legal function, simultaneously according to said write function, obtain the write data that write operation is corresponding, forming interception function, described interception function correspondence comprises amendment virtual memory Disk Properties and the operation of write corresponding data.
4. the protection method of a kind of virtual memory data as claimed in claim 1, it is characterised in that, by the attribute of virtual memory disk described in VirtualProtectEx function setup.
5. the protection method of a kind of virtual memory data as claimed in claim 1, it is characterised in that, by HOOKAPI technical intercept said write function, the address of amendment said write function is the address of described legal function.
6. the securing system of virtual memory data, it is characterised in that, comprise
Module is set, is read-only for setting the attribute of virtual memory disk;
Presetting module, for presetting legal function, described legal function is called in the legal write operation of described virtual memory disk;
Calling module, for calling write function;
Blocking module, for tackling said write function, the address of amendment said write function is the address of described legal function.
7. the securing system of a kind of virtual memory data as claimed in claim 6, it is characterised in that, described blocking module comprises:
First amendment unit is read-write for revising the attribute of virtual memory disk;
Operation unit, for according to said write function, performing write operation to described virtual memory disk;
2nd amendment unit is read-only for revising the attribute of virtual memory disk.
8. the securing system of a kind of virtual memory data as claimed in claim 6, it is characterised in that, also comprise virtual memory disk module, described virtual memory disk module comprises described calling module and described blocking module;
Described calling module, specifically for calling write function by virtual memory disk module is legal;
Described blocking module, said write function is tackled specifically for virtual memory disk, the address of amendment said write function is the address of described legal function, simultaneously according to said write function, obtain the write data that write operation is corresponding, forming interception function, described interception function correspondence comprises amendment virtual memory Disk Properties and the operation of write corresponding data.
9. the securing system of a kind of virtual memory data as claimed in claim 6, it is characterised in that, described module is set, specifically for the attribute by virtual memory disk described in VirtualProtectEx function setup.
10. the securing system of a kind of virtual memory data as claimed in claim 6, it is characterised in that, described blocking module, specifically for by HOOKAPI technical intercept said write function, the address of amendment said write function is the address of described legal function.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511025006.5A CN105653980B (en) | 2015-12-30 | 2015-12-30 | A kind of guard method and its system of virtual memory data |
PCT/CN2016/092339 WO2017113781A1 (en) | 2015-12-30 | 2016-07-29 | Virtual memory data protection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511025006.5A CN105653980B (en) | 2015-12-30 | 2015-12-30 | A kind of guard method and its system of virtual memory data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105653980A true CN105653980A (en) | 2016-06-08 |
CN105653980B CN105653980B (en) | 2019-06-11 |
Family
ID=56490786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511025006.5A Active CN105653980B (en) | 2015-12-30 | 2015-12-30 | A kind of guard method and its system of virtual memory data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105653980B (en) |
WO (1) | WO2017113781A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106708631A (en) * | 2016-11-30 | 2017-05-24 | 福建省天奕网络科技有限公司 | Shared memory property modification method and system |
WO2017113781A1 (en) * | 2015-12-30 | 2017-07-06 | 福建联迪商用设备有限公司 | Virtual memory data protection method and system |
CN108491287A (en) * | 2018-03-21 | 2018-09-04 | 闻泰通讯股份有限公司 | Memory address monitoring method, device and electronic equipment |
CN108958926A (en) * | 2018-05-25 | 2018-12-07 | 厦门普杰信息科技有限公司 | A kind of virtual memory pond design method based on Darwin's streaming media server |
CN109558375A (en) * | 2018-12-05 | 2019-04-02 | 武汉斗鱼网络科技有限公司 | A kind of file memory method of optimization, storage medium, equipment and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080082769A1 (en) * | 2006-10-03 | 2008-04-03 | Bull S.A.S. | Mass storage system and method |
CN101833485A (en) * | 2010-03-23 | 2010-09-15 | 杭州顺网科技股份有限公司 | System protection method based on snapshot |
CN101908108A (en) * | 2010-07-08 | 2010-12-08 | 福建升腾资讯有限公司 | Write-protection method of NOVELL mirror image of local DOS (Disk Operating System) disc |
CN102662799A (en) * | 2012-04-13 | 2012-09-12 | 华为技术有限公司 | Data backup method, server and hot backup system |
CN103559450A (en) * | 2013-10-11 | 2014-02-05 | 南京邮电大学 | Electronic tag data protection method based on kernel driver hook technology |
CN103617135A (en) * | 2013-11-26 | 2014-03-05 | 深圳市江波龙电子有限公司 | Method and device for reading data in storage equipment |
CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385486B (en) * | 2010-09-03 | 2014-01-01 | 深圳市拾三意强者科技有限公司 | Method and device for penetrating and reducing disk and equipment |
CN102063585A (en) * | 2010-10-29 | 2011-05-18 | 华南理工大学 | Xen based secure virtual disk access control method |
CN102855138B (en) * | 2012-07-20 | 2015-12-09 | 腾讯科技(深圳)有限公司 | The hold-up interception method of a kind of API, device and mobile terminal |
CN105550582B (en) * | 2015-12-11 | 2018-08-14 | 福建联迪商用设备有限公司 | Access the method and system of virtual disk |
CN105653980B (en) * | 2015-12-30 | 2019-06-11 | 福建联迪商用设备有限公司 | A kind of guard method and its system of virtual memory data |
-
2015
- 2015-12-30 CN CN201511025006.5A patent/CN105653980B/en active Active
-
2016
- 2016-07-29 WO PCT/CN2016/092339 patent/WO2017113781A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080082769A1 (en) * | 2006-10-03 | 2008-04-03 | Bull S.A.S. | Mass storage system and method |
CN101833485A (en) * | 2010-03-23 | 2010-09-15 | 杭州顺网科技股份有限公司 | System protection method based on snapshot |
CN101908108A (en) * | 2010-07-08 | 2010-12-08 | 福建升腾资讯有限公司 | Write-protection method of NOVELL mirror image of local DOS (Disk Operating System) disc |
CN102662799A (en) * | 2012-04-13 | 2012-09-12 | 华为技术有限公司 | Data backup method, server and hot backup system |
CN103559450A (en) * | 2013-10-11 | 2014-02-05 | 南京邮电大学 | Electronic tag data protection method based on kernel driver hook technology |
CN103617135A (en) * | 2013-11-26 | 2014-03-05 | 深圳市江波龙电子有限公司 | Method and device for reading data in storage equipment |
CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
Non-Patent Citations (1)
Title |
---|
宋宁楠: "磁盘数据完整性保护技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017113781A1 (en) * | 2015-12-30 | 2017-07-06 | 福建联迪商用设备有限公司 | Virtual memory data protection method and system |
CN106708631A (en) * | 2016-11-30 | 2017-05-24 | 福建省天奕网络科技有限公司 | Shared memory property modification method and system |
CN108491287A (en) * | 2018-03-21 | 2018-09-04 | 闻泰通讯股份有限公司 | Memory address monitoring method, device and electronic equipment |
CN108958926A (en) * | 2018-05-25 | 2018-12-07 | 厦门普杰信息科技有限公司 | A kind of virtual memory pond design method based on Darwin's streaming media server |
CN108958926B (en) * | 2018-05-25 | 2021-09-07 | 厦门普杰信息科技有限公司 | Darwin streaming media server-based virtual memory pool design method |
CN109558375A (en) * | 2018-12-05 | 2019-04-02 | 武汉斗鱼网络科技有限公司 | A kind of file memory method of optimization, storage medium, equipment and system |
CN109558375B (en) * | 2018-12-05 | 2021-03-16 | 武汉斗鱼网络科技有限公司 | Optimized file storage method, storage medium, equipment and system |
Also Published As
Publication number | Publication date |
---|---|
CN105653980B (en) | 2019-06-11 |
WO2017113781A1 (en) | 2017-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105653980A (en) | Virtual memory data protection method and system | |
JP6739148B2 (en) | Dynamic memory address remapping in computing systems | |
US11829299B2 (en) | Technologies for execute only transactional memory | |
CN109901911A (en) | A kind of information setting method, control method, device and relevant device | |
CN113312676B (en) | Data access method and device, computer equipment and readable storage medium | |
TW200813776A (en) | Computer system having memory protection function | |
CN103455756B (en) | A kind of course control method based on trust computing | |
US9189426B2 (en) | Protected access to virtual memory | |
CN106527992A (en) | Method and device for destroying data in storage equipment | |
CN103984910A (en) | System partitioning hiding method | |
EP2449500A1 (en) | Data security in solid state memory | |
CN102184143B (en) | Data protection method, device and system for storage device | |
CN112639789A (en) | Integrity tree for memory integrity checking | |
CN103309819B (en) | Embedded system and internal memory method for managing security therein | |
CN109214204B (en) | Data processing method and storage device | |
CN106845261A (en) | A kind of method and device of destruction SSD hard disc datas | |
CN104050014A (en) | Efficient storage management method based on virtualization platform | |
Chen et al. | {PEARL}: Plausibly Deniable Flash Translation Layer using {WOM} coding | |
CN107391028B (en) | Virtual volume authority control method and device | |
KR102066580B1 (en) | Program for injecting watermark into captured data and screen leak realisation service providing method | |
CN106155940A (en) | The System on Chip/SoC of code and the code protection method of System on Chip/SoC can be protected | |
US20190196984A1 (en) | Method, apparatus, and system for dynamic management of integrity-protected memory | |
WO2019070195A1 (en) | Computer implemented method for preventing rowhammer attack in a computing device | |
US20140052893A1 (en) | File deletion for non-volatile memory | |
CN104573509A (en) | System time protection method and system time protection device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |