CN106897635A - Movable memory equipment and its operating method - Google Patents

Movable memory equipment and its operating method Download PDF

Info

Publication number
CN106897635A
CN106897635A CN201710112002.3A CN201710112002A CN106897635A CN 106897635 A CN106897635 A CN 106897635A CN 201710112002 A CN201710112002 A CN 201710112002A CN 106897635 A CN106897635 A CN 106897635A
Authority
CN
China
Prior art keywords
address
node
password
memory
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710112002.3A
Other languages
Chinese (zh)
Inventor
邓俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongqin Communication Technology Co Ltd
Original Assignee
Guangdong Hongqin Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongqin Communication Technology Co Ltd filed Critical Guangdong Hongqin Communication Technology Co Ltd
Priority to CN201710112002.3A priority Critical patent/CN106897635A/en
Publication of CN106897635A publication Critical patent/CN106897635A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

The invention discloses movable memory equipment and its operating method, wherein movable memory equipment includes:Memory, data-interface and microprocessor.Concrete operation method is as follows:First, the corresponding all nodes of password are traveled through according to password;Secondly, corresponding user memory area is accessed according to the corresponding first address of each node and tail address.The present invention has multiple passwords compared to prior art, has different data access authorities for different passwords;The present invention is not hidden to data storage, but dynamic partition is carried out to storage region, and different storage regions are accessed according to different rights, is realized different users and is only capable of in operating movable storage device specific storage region, realizes the protection to data.The present invention changes cipher mode of the prior art to storage device, realizes different rights and accesses different storage regions, is more beneficial for data-privacy protection and data safety.

Description

Movable memory equipment and its operating method
Technical field
The present invention relates to technical field of data storage, and in particular to movable memory equipment and its operating method.
Background technology
In order to realize data transmission security, the use of movable memory equipment is more and more extensive.But in the prior art Movable memory equipment, when carrying out data transmission with terminal device, user by inputing password, just may have access to flash disk in Data in flash disk are served certain protective effect by total data.
But in real work, the owner of movable memory equipment, it is desirable to share for other different users Different data.And user use existing movable memory equipment when, only by input password i.e. be capable of achieving in flash disk All data conduct interviews;Prior art can only realize the protection for file by way of hiding certain file, but User can still access the address of this document, and the data for simply reading out are hidden, and there is the insecurity of data.
The content of the invention
It is an object of the invention in order to solve existing movable memory equipment when using, user is not intended to user's reading Data the appearance of problem of data safety such as still there is to be read;Movable memory equipment and its operation side are provided Method.
In order to achieve the above object, the present invention is achieved through the following technical solutions:
A kind of movable memory equipment, the movable memory equipment includes:
Memory, for storing user data and at least one password address chained list;Each described password address chained list bag Include:Password and corresponding at least one node of the password, each described node include the first ground of correspondence user memory area Location and tail address;The user data storage is in the corresponding user memory area of the password address chained list;
Data-interface, for connecting terminal device;
Microprocessor, for traveling through the corresponding all nodes of the password according to the password, and according to each institute State the corresponding first address of node and tail address accesses corresponding user memory area.
It is preferred that the microprocessor accesses corresponding user according to the corresponding first address of each described node and tail address After storage region, also include:
External data is write the idle memory region of the movable memory equipment;And/or
Read the user data of the storage in the password all user memory areas of correspondence;And/or
According to the user data, search and delete and/or change the user memory area where the user data The corresponding node.
It is preferred that microprocessor is additionally operable to travel through all described node of all password address chained lists, search described The idle memory region in memory.
It is preferred that the memory includes:
System area, equipment firmware and metadata for storing the movable memory equipment;
Address area, for storing password address chained list described at least one;
Main storage area, for storing the user data;The main storage area includes user storage area described at least one Domain and at least one idle memory region, each described user memory area are corresponded with the node.
A kind of operating method for the movable memory equipment, including the movable memory equipment and terminal are set It is standby to be attached;The operating method also includes:
The corresponding all nodes of the password are traveled through according to password;
Corresponding user memory area is accessed according to the corresponding first address of each described node and tail address.
It is preferred that accessing corresponding user memory area according to the corresponding first address of each described node and tail address Afterwards, also include:
External data is write the idle memory region of the movable memory equipment;And/or
Read the user data of the storage in the password all user memory areas of correspondence;And/or
According to the user data, search and delete and/or change the user memory area where the user data The corresponding node.
It is preferred that the step of write-in idle memory region by external data, specifically includes:
The all described node of all password address chained lists is traveled through, at least one is searched to store the external data The idle memory region;
The external data is stored in idle memory region described at least one, and it is corresponding described close in the password Code address link list end adds at least one newly-increased node, each one described in the newly-increased nodes records shared by external data The first address of the idle memory region and tail address.
It is preferred that the step external data being stored in idle memory region described at least one, specific bag Contain:
Whether the memory capacity for the idle memory region that judgement finds is more than or equal to the user data Data volume, be that the user data is stored in an idle memory region, otherwise the user data is separated It is sequentially stored into idle memory region described at least two.
It is preferred that after the step of being attached the movable memory equipment and terminal device, the operation side Method also includes:
The movable memory equipment reads the password of user input from the terminal device.
It is preferred that all described node of all password address chained lists of traversal, to store the external data The step of searching idle memory region described at least one, specifically includes:
The order of the beginning and end address little-endian included according to all nodes, searches idle described at least one Storage region.
It is preferred that the user data for reading storage in the password all user memory areas of correspondence The step of, specifically include:
All password address chained lists are traveled through, the corresponding password address chained list of the password is searched;
The corresponding storage region of the first address of each node of the password address chained list and tail address is shown Show;
Read and/or operate the user data of the storage in corresponding each the described user memory area of the password.
It is preferred that it is described according to the user data, search and delete and/or change the use where the user data The step of family storage region corresponding node, specifically include:
User data to be deleted is chosen, the first address of the user memory area where the user data to be deleted is read With tail address;
In the corresponding password address chained list of the user data to be deleted, search the user data to be deleted and relate to And all described node;
The node that user data to be deleted is related to described in the password address chained list is deleted or modified.
It is preferred that described be deleted or modified the section that user data to be deleted is related to described in the password address chained list The step of point, specifically include:
When the entirety of the user memory area that the node that the user data to be deleted takes is pointed to, delete described The corresponding node in password address chained list;
When the partial memory area of the user memory area that the node that the user data to be deleted takes is pointed to During domain, first address and/or the tail address of the node that the user data to be deleted is related to are changed.
It is preferred that described be deleted or modified the section that user data to be deleted is related to described in the password address chained list The step of point, also include:
When the user data to be deleted occupies the first half of the corresponding user memory area of the node Or during latter half, correspondence changes the first address of the node or the tail address;
When the user data to be deleted occupies the center section of the corresponding storage region of the node, institute The corresponding storage region of node is stated to form first area, second area and store the 3rd area of the user data to be deleted Domain, the node forms first node and Section Point;The first node correspondence first area, the Section Point pair Answer the second area;The first address of the first node is the first address of the node, and the tail address of the Section Point is The tail address of the node;The tail address of the correspondence modification first node and the first address of the Section Point.
On the basis of common sense in the field is met, above-mentioned each optimum condition can be combined, and obtain final product each preferable reality of the present invention Example.
Positive effect of the invention is:
Movable memory equipment disclosed by the invention and its operating method, wherein movable memory equipment include:Memory, Data-interface and microprocessor.Concrete operation method is as follows:First, the corresponding all nodes of password are traveled through according to password;Its It is secondary, corresponding user memory area is accessed according to the corresponding first address of each node and tail address.The present invention is compared to existing skill Art has multiple passwords, has different data access authorities for different passwords;The present invention is not carried out to data storage Hide, but dynamic partition is carried out to storage region, different storage regions are accessed according to different rights, realize different use Family is only capable of in operating movable storage device specific storage region, realizes the protection to data.The present invention changes existing skill Art realizes different rights and accesses different storage regions to the cipher mode to storage device, is more beneficial for data-privacy guarantor Shield and data safety.
Brief description of the drawings
Fig. 1 is a kind of overall structure diagram of movable memory equipment of the invention.
Fig. 2 is a kind of overall flow schematic diagram of operating method for movable memory equipment of the invention.
Fig. 3 is a kind of one of embodiment schematic diagram of operating method for movable memory equipment of the invention.
Fig. 4 is the two of the embodiment schematic diagram of a kind of operating method for movable memory equipment of the invention.
Fig. 5 is the three of the embodiment schematic diagram of a kind of operating method for movable memory equipment of the invention.
Fig. 6 is the four of the embodiment schematic diagram of a kind of operating method for movable memory equipment of the invention.
Fig. 7 is the five of the embodiment schematic diagram of a kind of operating method for movable memory equipment of the invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Embodiment 1
As shown in figure 1, a kind of movable memory equipment, including:Memory, data-interface and microprocessor.
In the present embodiment, memory is used to store user data and at least one password address chained list.Data-interface is used for Connection terminal device.
In the present embodiment, each password address chained list includes:Password and corresponding at least one node of password, each section Point includes first address and the tail address of correspondence user memory area;User data storage is deposited in the corresponding user of password address chained list In storage area domain.
In movable memory equipment init state, keeper sets at least one initial password address chained list, should Initial password address chained list only includes password.
Microprocessor is used to travel through the corresponding all nodes of password according to password, and according to the corresponding first address of each node Corresponding user memory area is accessed with tail address.
In the present embodiment, microprocessor is additionally operable to the interaction data for the treatment of and terminal device, for example, verify user by eventually Whether the password of end equipment input correctly waits operation.
Movable memory equipment disclosed in the present embodiment, comprising one or more password address chained lists, each password address The unique password of chained list correspondence and at least one node, unique user memory area in each node correspondence memory;It is logical The corresponding all nodes of microprocessor traversal password are crossed, and accesses corresponding according to the corresponding first address of each node and tail address User memory area.The present invention reaches different user by the above method can only operate the effect in its specific region, Neng Goushi Referring now to the further protection of data.
Embodiment 2
As shown in figure 1, a kind of movable memory equipment, including:Memory, data-interface and microprocessor.
In the present embodiment, memory is used to store user data and at least one password address chained list.Data-interface is used for Connection terminal device.
In the present embodiment, using flash memory (FLASH Memory) as memory, using USB interface as data-interface.
In the present embodiment, each password address chained list includes:Password and corresponding at least one node of password, each section Point includes first address and the tail address of correspondence user memory area;User data storage is deposited in the corresponding user of password address chained list In storage area domain.In movable memory equipment init state, keeper sets at least one initial password address chained list, should Initial password address chained list only includes password.
As shown in figure 3, in password address chained list 1, the user of password 1 and password 1 is respectively in node beginning and end address Data are incorporated in 02h, 04h and 07h, the corresponding user memory areas of 08h.In password address chained list 2, password 2 and password 2 User respectively node beginning and end address be the corresponding user memory area of 05h, 06h in incorporate data.
In the present embodiment, memory includes:System area, address area and main storage area.Wherein, system area can for storage The equipment firmware and metadata of movable storage device;Address area is used to store at least one password address chained list;Use in main storage area In storage user data;Main storage area includes at least one user memory area and at least one idle memory region, each use Family storage region is corresponded with node.
In movable memory equipment init state, main storage area only includes idle memory region;In removable Storage Equipment in memory capacity expired state when, main storage area only include user memory area.
In the present embodiment, after the smart machines such as movable memory equipment and computer are connected, the corresponding use of user input Family password, microprocessor travels through the corresponding all nodes of password according to password, and according to the corresponding first address of each node and tail Address accesses corresponding user memory area.
Microprocessor also has following function:
(1), external data is write the idle memory region of movable memory equipment.
(2) user data of the storage in the password all user memory areas of correspondence, is read.
(3), according to user data, search and delete and/or change the corresponding section of user memory area where user data Point.
(4), microprocessor travels through all nodes of all password address chained lists, searches the free storage in memory Domain.
(5) whether just, treatment and the interaction data of terminal device, for example, verify password that user is input into by terminal device Really wait operation.
In the present embodiment, when user enters movable memory equipment with password 1, microprocessor can read storage and exist The user data of 02h~04h, 07h~08h;Similarly, when user enters movable memory equipment with password 2, microprocessor can Read user data of the storage in 05h~06h.
When user needs write-in data, microprocessor travels through all nodes of all password address chained lists, searches storage Idle memory region in device, and data are write in corresponding idle memory region, and store the conduct of corresponding initial and end address New node is write in corresponding password address chained list.
Movable memory equipment disclosed in the present embodiment, in view of the shortcomings of the prior art, with multiple passwords, can solve the problem that The all data in movable memory equipment can all be exposed to the problem of user in the prior art.The present embodiment is to storage address It is hidden, having reached different user can only operate the effect in its specific region, and data are played a protective role.
Embodiment 3
As shown in Fig. 2 a kind of operating method for movable memory equipment, the present invention in embodiment 1,2 can Movable storage device.The method includes:
S0, movable memory equipment is attached with terminal device.In this step, in the user interface of terminal device One drive of movable memory equipment of display, user clicks on the drive by the user interface of terminal device, defeated according to pointing out Enter the corresponding user memory area of cryptographic acess.
S1, the corresponding all nodes of password are traveled through according to password.In this step, correspondence is searched according to the password having input Password address chained list.
S2, corresponding user memory area is accessed according to the corresponding first address of each node and tail address.
The present embodiment also includes upon step s 2:
When there is external data to need to be stored in movable memory equipment, external data is write the sky of movable memory equipment Not busy storage region.After data are stored in corresponding idle memory region, added behind the corresponding password address chained list of the password One node, the first address of the nodes records this storage regions and tail address.
When needing to read the data in movable memory equipment, movable memory equipment is by correspondence password address chained list The first address of all nodes, tail address be back to terminal device;Terminal device reads storage close according to above-mentioned return address User data in all user memory areas of code correspondence.And/or
When needing to delete portion of user data, according to user data, search and delete and/or change user data place The corresponding node of user memory area, by the corresponding user memory area release of the node.
A kind of operating method for movable memory equipment disclosed in the present embodiment, first by movable memory equipment with Terminal device is attached.Secondly, the corresponding all nodes of password are traveled through according to password.Finally, it is corresponding according to each node First address and tail address access corresponding user memory area.This method can also according to user need to carry out the storage of data, Read and delete.The present embodiment is conducive to the data-privacy of user to protect and data safety, to share movable memory equipment Provides convenient;The present embodiment is only hidden to address rather than only file is hidden.
Embodiment 4
As shown in Fig. 2 a kind of operating method for movable memory equipment, for be may move disclosed in embodiment 1,2 Storage device.Method includes disclosed in the present embodiment:
S0, movable memory equipment is attached with terminal device.After this step, movable memory equipment is from end End equipment reads the password of user input.
S1, the corresponding all nodes of password are traveled through according to password;In this step, correspondence is searched according to the password having input Password address chained list.
S2, corresponding user memory area is accessed according to the corresponding first address of each node and tail address.
The present embodiment also includes upon step s 2:
S3.1, external data is write the idle memory region of movable memory equipment.The step is specifically included:
S3.1.1, travels through all nodes of all password address chained lists, for storage external data searched at least one free time Storage region.The step is specifically included:
The order of the beginning and end address little-endian included according to all nodes, the memory in movable memory equipment Main storage area in search at least one idle memory region.
S3.1.2, external data is stored at least one idle memory region, and in the corresponding password address chain of password Table end adds at least one newly-increased node, the first address of the idle memory region shared by each newly-increased nodes records external data With tail address.
In this step, external data is stored at least one idle memory region, specifically included:
Whether the memory capacity for idle memory region that judgement finds is more than or equal to the data volume of user data, It is that user data is stored in an idle memory region, user data was otherwise separately sequentially stored at least two free time to be deposited In storage area domain.
In the present embodiment, when data volume of the memory capacity for idle memory region more than or equal to user data, Then user data is stored in the idle memory region, and a newly-increased node is added in corresponding password address chained list end. When a memory capacity for idle memory region is less than user data, second free storage is continued to search for, if first When being more than or equal to the data volume of user data with second memory capacity sum of free storage, then user data is separated Two free storages are stored in, and add two newly-increased nodes, each node to remember respectively in corresponding password address chained list end Employ first address and the tail address of idle memory region shared by user data.When depositing for first, second idle memory region When storage capacity sum is still less than user data, by that analogy, the 3rd, the 4th clear area are continually looked for, until all of The memory capacity sum of clear area is more than or equal to user data.When the memory capacity sum of all of clear area is not enough to During storage user data, prompt message to terminal device is returned.
S3.2, reads user data of the storage in the password all user memory areas of correspondence.The step is specifically included:
S3.2.1, travels through all password address chained lists, searches the corresponding password address chained list of password.When can not find the password During corresponding password address chained list, error message to terminal device is returned.
S3.2.2, the corresponding user memory area of the first address of each node of password address chained list and tail address is carried out Display.
In the present embodiment, movable memory equipment is the corresponding user's storage of each node in corresponding password address chained list The first address in region and tail address are sent to terminal device.
S3.2.3, reads and/or operates user data of the storage in corresponding each user memory area of password.
In the present embodiment, head of the terminal device according to the corresponding all nodes of the password in the movable memory equipment for obtaining Address and tail address, read and/or operate the user data of correspondence user memory area.
S3.3, according to user data, searches and deletes and/or change the corresponding section of user memory area where user data Point.The step is specifically included:
S3.3.1, chooses user data to be deleted, reads the first address of user memory area where user data to be deleted With tail address.
User sends user memory area where the user data after terminal device chooses user data to be deleted First address and tail address are to movable memory equipment.
S3.3.2, in the corresponding password address chained list of user data to be deleted, searches what user data to be deleted was related to All nodes.
S3.3.3, is deleted or modified the node that user data to be deleted in password address chained list is related to.The step is specifically wrapped Include:
S3.3.3.1, when the entirety of the user memory area that the node that user data to be deleted takes is pointed to, deletes close Corresponding node in code address link list, and the pointer of the previous node of password address chained list is pointed into latter node.
As shown in figure 4, password address chained list includes two nodes:02h-04h, 07h-08h, when the node for requiring to delete is During 02h-04h, then the node is directly deleted, and cause that the pointer of the password address chained list after updating is pointing directly at node 07h- 08h。
S3.3.3.2, when the partial memory area domain of the user memory area that the node that user data to be deleted takes is pointed to When, change first address and/or the tail address of the node that user data to be deleted is related to.
Step S3.3.3.2 also includes:
S3.3.3.2.1, when user data to be deleted occupy the corresponding user memory area of node first half or During latter half, correspondence changes first address or the tail address of node.
As shown in figure 5, password address chained list includes two nodes:02h-04h, 07h-08h, when the user for requiring to delete deposits When storage area domain is 04h, then the user memory area 04h in the node is directly deleted, by the tail address of the node 02h-04h 04h is revised as 03h, then the password address chained list after updating includes two nodes:02h-03h、07h-08h.
When user data to be deleted occupies the center section of the corresponding storage region of node, the node is corresponding to be deposited Storage area domain forms first area, second area and stores the 3rd region of user data to be deleted, node formed first node and Section Point;First node correspondence first area, Section Point correspondence second area;The first address of first node is the head of node Address, the tail address of Section Point is the tail address of node;The tail address of correspondence modification first node and the first ground of Section Point Location.
As shown in fig. 6, password address chained list includes two nodes:02h-04h, 07h-08h, when the number of users for requiring to delete During according to being stored in storage region 03h, then the corresponding storage regions of the node 02h-04h form first area 02h, second area 04h and the 3rd region 03h;Then the password address chained list after renewal is comprising node:02h-02h、04h-04h、07h-08h.
When the storage region corresponding to user data to be deleted takes two or more nodes, then will be according to figure Method shown in 4 to Fig. 6, the first address and/or tail address of modification and/or deletion corresponding node.
As shown in fig. 7, password address chained list includes two nodes:02h-04h, 07h-08h, when the number of users for requiring to delete During according to being stored in storage region 04h and 07h~08h, then the user in direct deletion of node 07h-08h and node 02h-04h deposits Storage area domain 04h, 03h is revised as by the tail address 04h of the node 02h-04h;Password address chained list after then updating includes section Put and be:02h-03h.
A kind of operating method for movable memory equipment disclosed in the present embodiment, the storage to movable memory equipment Address is hidden so that different user in use, can only read, operate, deleting the corresponding password address of the password User memory area on chained list, so as to protect the specifically used of other users.Meanwhile, this method can also travel through removable All idle memory regions in storage device, after user data is stored in, it is right that the address of the idle memory region is added to On the password address chained list answered.The present invention changes sole user's password, realizes many cipher modes of multi-user, facilitates data hidden Private protection and safeguard protection.
Although the foregoing describing specific embodiment of the invention, it will be appreciated by those of skill in the art that these It is merely illustrative of, protection scope of the present invention is defined by the appended claims.Those skilled in the art is not carrying on the back On the premise of principle of the invention and essence, various changes or modifications can be made to these implementation methods, but these are changed Protection scope of the present invention is each fallen within modification.

Claims (14)

1. a kind of movable memory equipment, it is characterised in that the movable memory equipment includes:
Memory, for storing user data and at least one password address chained list;Each described password address chained list includes:It is close Code and corresponding at least one node of the password, each described node include the first address and tail of correspondence user memory area Address;The user data storage is in the corresponding user memory area of the password address chained list;
Data-interface, for connecting terminal device;
Microprocessor, for traveling through the corresponding all nodes of the password according to the password, and according to each section The corresponding first address of point and tail address access corresponding user memory area.
2. movable memory equipment as claimed in claim 1, it is characterised in that the microprocessor is according to each node After corresponding first address and tail address access corresponding user memory area, also include:
External data is write the idle memory region of the movable memory equipment;And/or
Read the user data of the storage in the password all user memory areas of correspondence;And/or
According to the user data, search and delete and/or change the user memory area correspondence where the user data The node.
3. movable memory equipment as claimed in claim 2, it is characterised in that it is all described close that microprocessor is additionally operable to traversal The all described node of code address link list, searches the idle memory region in the memory.
4. movable memory equipment as claimed in claim 2, it is characterised in that the memory includes:
System area, equipment firmware and metadata for storing the movable memory equipment;
Address area, for storing password address chained list described at least one;
Main storage area, for storing the user data;The main storage area include user memory area described at least one and At least one idle memory region, each described user memory area is corresponded with the node.
5. a kind of operating method for the movable memory equipment as described in any one of Claims 1-4, including will be described removable Dynamic storage device is attached with terminal device;Characterized in that, the operating method also includes:
The corresponding all nodes of the password are traveled through according to password;
Corresponding user memory area is accessed according to the corresponding first address of each described node and tail address.
6. the operating method of movable memory equipment as claimed in claim 5, it is characterised in that according to each node After corresponding first address and tail address access corresponding user memory area, also include:
External data is write the idle memory region of the movable memory equipment;And/or
Read the user data of the storage in the password all user memory areas of correspondence;And/or
According to the user data, search and delete and/or change the user memory area correspondence where the user data The node.
7. the operating method of movable memory equipment as claimed in claim 6, it is characterised in that described to write external data The step of idle memory region, specifically include:
The all described node of all password address chained lists is traveled through, is searched described at least one to store the external data Idle memory region;
The external data is stored in idle memory region described at least one, and the password it is corresponding it is described cryptographically Location chained list end adds at least one newly-increased node, described in each one described in the newly-increased nodes records shared by external data The first address of idle memory region and tail address.
8. the operating method of movable memory equipment as claimed in claim 7, it is characterised in that described by the external data The step in idle memory region described at least one is stored in, is specifically included:
Whether the memory capacity for the idle memory region that judgement finds is more than or equal to the number of the user data According to amount, it is that the user data is stored in an idle memory region, otherwise by the user data separately successively It is stored in idle memory region described at least two.
9. the operating method of movable memory equipment as claimed in claim 5, it is characterised in that by the removable Storage After the step of equipment is attached with terminal device, the operating method also includes:
The movable memory equipment reads the password of user input from the terminal device.
10. the operating method of movable memory equipment as claimed in claim 7, it is characterised in that the traversal is all described The all described node of password address chained list, to store the step that the external data searches idle memory region described at least one Suddenly, specifically include:
The order of the beginning and end address little-endian included according to all nodes, searches idle storage described at least one Region.
The operating method of 11. movable memory equipments as claimed in claim 6, it is characterised in that the reading storage is in institute The step of stating the user data in the password all user memory areas of correspondence, specifically includes:
All password address chained lists are traveled through, the corresponding password address chained list of the password is searched;
The corresponding storage region of the first address of each node of the password address chained list and tail address is shown;
Read and/or operate the user data of the storage in corresponding each the described user memory area of the password.
The operating method of 12. movable memory equipments as claimed in claim 6, it is characterised in that described according to the user Data, the step of searching and delete and/or change the corresponding node of the user memory area where the user data, Specifically include:
User data to be deleted is chosen, the first address and tail of the user memory area where the user data to be deleted is read Address;
In the corresponding password address chained list of the user data to be deleted, search what the user data to be deleted was related to All nodes;
The node that user data to be deleted is related to described in the password address chained list is deleted or modified.
The operating method of 13. movable memory equipments as claimed in claim 12, it is characterised in that described that institute is deleted or modified The step of stating the node that user data to be deleted is related to described in password address chained list, specifically includes:
When the entirety of the user memory area that the node that the user data to be deleted takes is pointed to, the password is deleted The corresponding node in address link list;
When the partial memory area domain of the user memory area that the node that the user data to be deleted takes is pointed to, Change first address and/or the tail address of the node that the user data to be deleted is related to.
The operating method of 14. movable memory equipments as claimed in claim 13, it is characterised in that described that institute is deleted or modified The step of stating the node that user data to be deleted is related to described in password address chained list, also includes:
When the user data to be deleted occupy the corresponding user memory area of the node first half or after During half part, correspondence changes the first address of the node or the tail address;
When the user data to be deleted occupies the center section of the corresponding storage region of the node, the section The corresponding storage region of point forms first area, second area and stores the 3rd region of the user data to be deleted, The node forms first node and Section Point;The first node correspondence first area, the Section Point correspondence The second area;The first address of the first node is the first address of the node, and the tail address of the Section Point is institute State the tail address of node;The tail address of the correspondence modification first node and the first address of the Section Point.
CN201710112002.3A 2017-02-28 2017-02-28 Movable memory equipment and its operating method Pending CN106897635A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710112002.3A CN106897635A (en) 2017-02-28 2017-02-28 Movable memory equipment and its operating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710112002.3A CN106897635A (en) 2017-02-28 2017-02-28 Movable memory equipment and its operating method

Publications (1)

Publication Number Publication Date
CN106897635A true CN106897635A (en) 2017-06-27

Family

ID=59184714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710112002.3A Pending CN106897635A (en) 2017-02-28 2017-02-28 Movable memory equipment and its operating method

Country Status (1)

Country Link
CN (1) CN106897635A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460287A (en) * 2018-03-21 2018-08-28 南通大学 The division methods in user's control region and memory protect system in memory protection location
CN110826113A (en) * 2018-08-09 2020-02-21 深圳市菲德越科技有限公司 Data secure storage method and device
CN111008411A (en) * 2019-09-30 2020-04-14 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Universal serial bus medium and data reading method thereof
CN113127402A (en) * 2021-04-29 2021-07-16 广东湾区智能终端工业设计研究院有限公司 SPI (Serial peripheral interface) access control method, system, computing equipment and storage medium
CN117311639B (en) * 2023-10-17 2024-04-12 刘湛渊 Information hiding storage device and initialization, reading and writing method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7027350B2 (en) * 2001-04-05 2006-04-11 Stmicroelectronics S.A. Device and method for partial read-protection of a non-volatile storage
CN101196877A (en) * 2007-12-29 2008-06-11 大唐微电子技术有限公司 Multiple memory cell operation isolated smart card and its implementing method
CN102347079A (en) * 2010-08-02 2012-02-08 雅格罗技(北京)科技有限公司 Device and method using password protection memory

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7027350B2 (en) * 2001-04-05 2006-04-11 Stmicroelectronics S.A. Device and method for partial read-protection of a non-volatile storage
CN101196877A (en) * 2007-12-29 2008-06-11 大唐微电子技术有限公司 Multiple memory cell operation isolated smart card and its implementing method
CN102347079A (en) * 2010-08-02 2012-02-08 雅格罗技(北京)科技有限公司 Device and method using password protection memory

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460287A (en) * 2018-03-21 2018-08-28 南通大学 The division methods in user's control region and memory protect system in memory protection location
CN110826113A (en) * 2018-08-09 2020-02-21 深圳市菲德越科技有限公司 Data secure storage method and device
CN111008411A (en) * 2019-09-30 2020-04-14 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Universal serial bus medium and data reading method thereof
CN113127402A (en) * 2021-04-29 2021-07-16 广东湾区智能终端工业设计研究院有限公司 SPI (Serial peripheral interface) access control method, system, computing equipment and storage medium
CN117311639B (en) * 2023-10-17 2024-04-12 刘湛渊 Information hiding storage device and initialization, reading and writing method thereof

Similar Documents

Publication Publication Date Title
CN106897635A (en) Movable memory equipment and its operating method
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
CN105378687B (en) Access the method and relevant device of file
CN109376156B (en) Method for reading hybrid index with storage awareness
CN103116634B (en) System for supporting high concurrent cache task queue and asynchronous batch operation method thereof
Hutflesz et al. Globally order preserving multidimensional linear hashing
CN103544077B (en) Data processing method and device, shared storage device
CN106708921A (en) Poly-logarithmic range queries on encrypted data
CN101655858B (en) Cryptograph index structure based on blocking organization and management method thereof
CN102982151B (en) Method for merging multiple physical files into one logic file
CN105138678A (en) Reading and distributing method and system for map tile data
CN103229164B (en) Data access method and device
CN106354805A (en) Optimization method and system for searching and caching distribution storage system NoSQL
CN102467566A (en) Method and system for browsing web pages without traces
CN105824879A (en) Migration method based on PostgreSQL block storage equipment
CN110287160A (en) A kind of spatial cache method for cleaning and device
CN106446038A (en) Hybrid database-based data access control system and method
CN103886109A (en) Method and device for realizing row lock of database
CN110830561A (en) Multi-user ORAM access system and method under asynchronous network environment
CN104573571B (en) A kind of generation method of smart card security file system
CN103942301A (en) Distributed file system oriented to access and application of multiple data types
CN107315539A (en) A kind of date storage method and data extraction method
CN103425694B (en) The searching method of relational data and device
CN104391947B (en) Magnanimity GIS data real-time processing method and system
Anciaux et al. Pluggable personal data servers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170627

WD01 Invention patent application deemed withdrawn after publication