CN112464299A - Method and device for realizing safety data storage, computer storage medium and terminal - Google Patents

Method and device for realizing safety data storage, computer storage medium and terminal Download PDF

Info

Publication number
CN112464299A
CN112464299A CN202011354790.5A CN202011354790A CN112464299A CN 112464299 A CN112464299 A CN 112464299A CN 202011354790 A CN202011354790 A CN 202011354790A CN 112464299 A CN112464299 A CN 112464299A
Authority
CN
China
Prior art keywords
data
generating
safety
security
security data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011354790.5A
Other languages
Chinese (zh)
Other versions
CN112464299B (en
Inventor
李磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Datang Storage Technology Co ltd
Original Assignee
Hefei Datang Storage Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Datang Storage Technology Co ltd filed Critical Hefei Datang Storage Technology Co ltd
Priority to CN202011354790.5A priority Critical patent/CN112464299B/en
Publication of CN112464299A publication Critical patent/CN112464299A/en
Application granted granted Critical
Publication of CN112464299B publication Critical patent/CN112464299B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method, a device, a computer storage medium and a terminal for realizing safe data storage, wherein after a one-time password (OTP) storage area is full of second safe data, a code file of first safe data generated by the second safe data is stored in a code storage area of a storage chip, so that the first safe data is stored in the storage chip, and the use efficiency of the storage chip is improved; when the first security data is stored through the code file, the second security data of the OTP memory area is applied, and the security of the OTP memory area is continued by storing the first security data based on the security of the second security data.

Description

Method and device for realizing safety data storage, computer storage medium and terminal
Technical Field
The present disclosure relates to, but not limited to, data security technologies, and more particularly, to a method, an apparatus, a computer storage medium, and a terminal for implementing secure data storage.
Background
A memory chip based on a one-time password (OTP) storage medium is a one-time programmable memory that can be programmed only once, and thus is generally used to store security data such as a key, a digital signature, and the like. Since the OTP memory area of the memory chip can be edited only once, when the OTP memory area is full, new security data is written to the user, and the new security data is not written to the OTP memory area in the related art, which limits the use of the memory chip.
In summary, how to improve the utilization efficiency of the memory chip becomes a problem to be solved.
Disclosure of Invention
The following is a summary of the subject matter described in detail herein. This summary is not intended to limit the scope of the claims.
The embodiment of the invention provides a method and a device for realizing safe data storage, a computer storage medium and a terminal, which can improve the use efficiency of a storage chip.
The embodiment of the invention provides a method for realizing safe data storage, which comprises the following steps:
when newly generated first security data to be stored are received, judging whether a one-time password (OTP) storage area of a storage chip is full of second security data or not;
when judging that the OTP memory area of the memory chip is full of second security data, generating a code file for generating first security data according to more than one second security data operation;
and storing the generated code file in a code storage area of the storage chip.
In an exemplary embodiment, the generating a code file that generates first security data according to one or more second security data operations includes:
determining more than one second safety data used for generating the first safety data from the stored second safety data according to a preset strategy;
determining an operation function for generating the first security data by the operation of the more than one second security data according to the more than one determined second security data and the first security data;
and generating the code file according to the determined operation function for generating the first safety data by the more than one second safety data operation.
In one exemplary embodiment, the determining an arithmetic function that generates the first security data from the one or more second security data operations includes:
splitting the first security data into more than one first security byte data according to a preset byte length;
respectively generating more than one byte in the more than one second safety data for each split first safety byte data, and calculating to obtain an operation instruction of the operation required by the first safety byte data;
and combining all the generated operation instructions into the operation function.
In an exemplary embodiment, after storing the generated code file in the code storage area of the memory chip, the method further includes:
and when a reading instruction for reading the first safety data is received, generating the first safety data according to the code file stored in the code storage area.
In an exemplary embodiment, the generating the first security data according to the code file stored in the code storage area includes:
reading the code file according to the received reading instruction;
and loading the code file to read the more than one second safety data from the OTP storage area through the loaded code file, and generating the first safety data according to the operation of the more than one read second safety data.
On the other hand, an embodiment of the present invention further provides a computer storage medium, where a computer program is stored in the computer storage medium, and when the computer program is executed by a processor, the method for implementing the secure data storage is implemented.
In another aspect, an embodiment of the present invention further provides a terminal, including: a memory and a processor, the memory having a computer program stored therein; wherein,
the processor is configured to execute the computer program in the memory;
the computer program, when executed by the processor, implements a method of implementing secure data storage as described above.
In another aspect, an embodiment of the present invention further provides an apparatus for implementing secure data storage, where the apparatus includes: the device comprises a judging unit, a generating unit and a storing unit; wherein,
the judging unit is configured to: when newly generated first security data to be stored are received, judging whether a one-time password (OTP) storage area of a storage chip is full of second security data or not;
the generation unit is configured to: when judging that the OTP memory area of the memory chip is full of second security data, generating a code file for generating first security data according to more than one second security data operation;
the storage unit is configured to: and storing the generated code file in a code storage area of the storage chip.
In an exemplary embodiment, the generating unit is arranged to:
determining more than one second safety data used for generating the first safety data from the stored second safety data according to a preset strategy;
determining an operation function for generating the first security data by the operation of the more than one second security data according to the more than one determined second security data and the first security data;
and generating the code file according to the determined operation function for generating the first safety data by the more than one second safety data operation.
In an exemplary embodiment, the generating unit is configured to determine an arithmetic function for generating the first security data by the one or more second security data operations, and includes:
splitting the first security data into more than one first security byte data according to a preset byte length;
respectively generating more than one byte in the more than one second safety data for each split first safety byte data, and calculating to obtain an operation instruction of the operation required by the first safety byte data;
and combining all the generated operation instructions into the operation function.
In an exemplary embodiment, the apparatus further comprises a reading unit configured to:
and when a reading instruction for reading the first safety data is received, generating the first safety data according to the code file stored in the code storage area.
According to the embodiment of the invention, after the one-time password (OTP) storage area is full of the second safety data, the code file of the first safety data generated by the second safety data is stored in the code storage area of the storage chip, so that the first safety data is stored in the storage chip, and the use efficiency of the storage chip is improved; when the first security data is stored through the code file, the second security data of the OTP memory area is applied, and the security of the OTP memory area is continued by storing the first security data based on the security of the second security data.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is a flow diagram of a method of implementing secure data storage according to an embodiment of the present invention;
FIG. 2 is a block diagram of an apparatus for implementing secure data storage according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
The steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
The inventor of the present application analyzes and finds that the memory chip includes a code storage area in addition to a storage area, when the OTP storage area is full of the security data, the code storage area often has a free storage space, and how to use the storage space of the code storage area to store the security data becomes a direction for improving the use efficiency of the memory chip.
Fig. 1 is a flowchart of a method for implementing secure data storage according to an embodiment of the present invention, as shown in fig. 1, including:
step 101, when newly generated first security data to be stored is received, judging whether a one-time password (OTP) storage area of a storage chip is full of second security data;
step 102, when judging that the OTP memory area of the memory chip is full of second safety data, generating a code file for generating first safety data according to more than one second safety data operation;
it should be noted that, in the embodiment of the present invention, the first security data and the second security data may include security data such as a key and a digital signature. In one illustrative example, an embodiment of the present invention generates a code file that generates first secure data according to one or more second secure data operations, comprising:
determining more than one second safety data used for generating the first safety data from the stored second safety data according to a preset strategy;
determining an operation function for generating the first safety data by the operation of the more than one second safety data according to the more than one determined second safety data and the first safety data;
and generating a code file according to the determined operation function for generating the first safety data by more than one second safety data operation.
It should be noted that, after the operation function is determined, the generation of the code file based on the operation function may be implemented by the existing programming application in the related art.
In an exemplary example, the embodiment of the present invention may determine location information of each byte of data in the first security data in more than one second security data, and generate an operation function for obtaining the first security data according to the location information; in an exemplary embodiment, the embodiment of the present invention may further pre-store more than one operation formula including a preset step number operation, and after determining more than one second security data, select a preset number of operation formulas from the stored more than one operation formulas; substituting the determined more than one second safety data into each selected operation formula, gradually operating, and determining whether the output result of each operation step is equal to the first safety data; before executing the operation of the preset steps, if the output result is equal to the first safety data, determining the operation function according to the operation formula and the operation steps of the output result which is equal to the first safety data. When the first security data is not obtained through the operation of the preset step number in the operation formula, the embodiment of the present invention may obtain the operation function by referring to the method for generating the first security data according to the position information. The following is briefly described by way of example: assuming that only one operation formula is provided, for more than one second safety data, more than one operation including summation, difference calculation, product calculation, quotient calculation, remainder calculation, exclusive or and the like is set in the operation formula, and the preset step number is equal to 100; performing step-by-step operation on the more than one second safety data through an operation formula, determining whether an output result is equal to the first safety data or not every operation step, and determining the first 35-step operation of the operation formula as the operation function if the operation formula with the output result equal to the first safety data is obtained before 100-step operation is performed, for example, the first 35-step operation of the operation formula is performed, and the output result is equal to the first safety data; if the first security data is not obtained through 100 steps of operation, the embodiment of the present invention may obtain the operation function by referring to the method for generating the first security data according to the location information. When a plurality of operation formulas are included, the plurality of operation formulas are independent of each other, and may be processed simultaneously or separately. It should be noted that, after the more than one second security data is determined, the determined more than one second security data may be split into a plurality of parts, and the operation set in the operation formula may perform more than one operation on each split part, including summation, difference calculation, product calculation, quotient calculation, remainder calculation, exclusive or and the like. In order to ensure the security of the first security data, the embodiment of the present invention may set the minimum number of operation steps that need to be executed to generate the first security data through one or more second security data operations, and theoretically, the greater the number of operation steps, the higher the security of the first security data.
In one illustrative example, the preset policy includes: and determining more than one second safety data through the preset starting position and length.
In one illustrative example, an embodiment of the present invention determines an arithmetic function for generating first security data from more than one second security data operation, comprising:
splitting the first security data into more than one first security byte data according to a preset byte length;
respectively generating more than one byte in more than one second safety data for each piece of split first safety byte data, and operating to obtain an operation instruction of operation required by the first safety byte data;
and combining all the generated operation instructions into an operation function.
It should be noted that the method for combining the operation instructions into the operation function can be implemented by referring to the related art, and is not described herein again.
And step 103, storing the generated code file in a code storage area of the storage chip.
According to the embodiment of the invention, after the one-time password (OTP) storage area is full of the second safety data, the code file of the first safety data generated by the second safety data is stored in the code storage area of the storage chip, so that the first safety data is stored in the storage chip, and the use efficiency of the storage chip is improved; when the first security data is stored through the code file, the second security data of the OTP memory area is applied, and the security of the OTP memory area is continued by storing the first security data based on the security of the second security data. In an exemplary embodiment, after storing the generated code file in the code storage area of the memory chip, the method in the embodiment of the present invention further includes:
and when a reading instruction for reading the first security data is received, generating the first security data according to the code file stored in the code storage area.
In one illustrative example, an embodiment of the present invention generates first security data from a code file stored in a code storage area, including:
reading the code file according to the received reading instruction;
and loading the code file to read more than one second safety data from the OTP storage area through the loaded code file, and generating the first safety data according to the operation of the read more than one second safety data.
In an exemplary embodiment, different first security data in the embodiment of the present invention may generate a corresponding code file, and the establishment of the correspondence between the first security data and the code file may be implemented by referring to the related art. The respective first security data may be distinguished by distinguishing information existing in the related art. When a reading instruction is received, the reading instruction should include distinguishing information indicating first security data to be read, and a corresponding code file can be read according to the determined first reading data to be read.
The code file of the embodiment of the invention comprises the operation required by generating the first safety data by more than one second safety data, so the second safety data can be obtained by executing the operation required by generating the first safety data after more than one second safety data is read from the OTP memory area.
The embodiment of the invention also provides a computer storage medium, wherein a computer program is stored in the computer storage medium, and when being executed by a processor, the computer program realizes the method for realizing the safe data storage.
An embodiment of the present invention further provides a terminal, including: a memory and a processor, the memory having stored therein a computer program; wherein,
the processor is configured to execute the computer program in the memory;
the computer program, when executed by a processor, implements a method of implementing secure data storage as described above.
Fig. 2 is a block diagram of an apparatus for implementing secure data storage according to an embodiment of the present invention, as shown in fig. 2, including: the device comprises a judging unit, a generating unit and a storing unit; wherein,
the judging unit is configured to: when newly generated first security data to be stored are received, judging whether a one-time password (OTP) storage area of a storage chip is full of second security data or not;
the generation unit is configured to: when judging that the OTP memory area of the memory chip is full of second security data, generating a code file for generating first security data according to more than one second security data operation;
the storage unit is configured to: and storing the generated code file in a code storage area of the storage chip.
In an exemplary embodiment, the generation unit of the embodiment of the present invention is configured to:
determining more than one second safety data used for generating the first safety data from the stored second safety data according to a preset strategy;
determining an operation function for generating the first safety data by the operation of the more than one second safety data according to the more than one determined second safety data and the first safety data;
and generating a code file according to the determined operation function for generating the first safety data by more than one second safety data operation.
In an exemplary embodiment, the generation unit of the present invention is configured to determine an operation function for generating the first security data by one or more second security data operations, and includes:
splitting the first security data into more than one first security byte data according to a preset byte length;
respectively generating more than one byte in more than one second safety data for each piece of split first safety byte data, and operating to obtain an operation instruction of operation required by the first safety byte data;
and combining all the generated operation instructions into an operation function. In an exemplary embodiment, the apparatus of the present invention further includes a reading unit configured to:
and when a reading instruction for reading the first security data is received, generating the first security data according to the code file stored in the code storage area. In an illustrative example, a reading unit according to an embodiment of the present invention is configured to:
reading the code file according to the received reading instruction;
and loading the code file to read more than one second safety data from the OTP storage area through the loaded code file, and generating the first safety data according to the operation of the read more than one second safety data.
According to the embodiment of the invention, after the one-time password (OTP) storage area is full of the second safety data, the code file of the first safety data generated by the second safety data is stored in the code storage area of the storage chip, so that the first safety data is stored in the storage chip, and the use efficiency of the storage chip is improved; when the first security data is stored through the code file, the second security data of the OTP memory area is applied, and the security of the OTP memory area is continued by storing the first security data based on the security of the second security data.
"one of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.

Claims (11)

1. A method of implementing secure data storage, comprising:
when newly generated first security data to be stored are received, judging whether a one-time password (OTP) storage area of a storage chip is full of second security data or not;
when judging that the OTP memory area of the memory chip is full of second security data, generating a code file for generating first security data according to more than one second security data operation;
and storing the generated code file in a code storage area of the storage chip.
2. The method of claim 1, wherein generating a code file that generates first security data according to one or more second security data operations comprises:
determining more than one second safety data used for generating the first safety data from the stored second safety data according to a preset strategy;
determining an operation function for generating the first security data by the operation of the more than one second security data according to the more than one determined second security data and the first security data;
and generating the code file according to the determined operation function for generating the first safety data by the more than one second safety data operation.
3. The method of claim 2, wherein determining an arithmetic function that generates the first security data from the one or more second security data operations comprises:
splitting the first security data into more than one first security byte data according to a preset byte length;
respectively generating more than one byte in the more than one second safety data for each split first safety byte data, and calculating to obtain an operation instruction of the operation required by the first safety byte data;
and combining all the generated operation instructions into the operation function.
4. The method according to any one of claims 1 to 3, wherein the generated code file is stored in a code storage area of the memory chip, and the method further comprises:
and when a reading instruction for reading the first safety data is received, generating the first safety data according to the code file stored in the code storage area.
5. The method of claim 4, wherein generating the first security data from the code file stored in the code storage area comprises:
reading the code file according to the received reading instruction;
and loading the code file to read the more than one second safety data from the OTP storage area through the loaded code file, and generating the first safety data according to the operation of the more than one read second safety data.
6. A computer storage medium having stored thereon a computer program which, when executed by a processor, implements a method of implementing secure data storage as claimed in any of claims 1 to 5.
7. A terminal, comprising: a memory and a processor, the memory having a computer program stored therein; wherein,
the processor is configured to execute the computer program in the memory;
the computer program, when executed by the processor, implementing a method of implementing secure data storage as claimed in any of claims 1 to 5.
8. An apparatus for implementing secure data storage, comprising: the device comprises a judging unit, a generating unit and a storing unit; wherein,
the judging unit is configured to: when newly generated first security data to be stored are received, judging whether a one-time password (OTP) storage area of a storage chip is full of second security data or not;
the generation unit is configured to: when judging that the OTP memory area of the memory chip is full of second security data, generating a code file for generating first security data according to more than one second security data operation;
the storage unit is configured to: and storing the generated code file in a code storage area of the storage chip.
9. The apparatus of claim 8, wherein the generating unit is configured to:
determining more than one second safety data used for generating the first safety data from the stored second safety data according to a preset strategy;
determining an operation function for generating the first security data by the operation of the more than one second security data according to the more than one determined second security data and the first security data;
and generating the code file according to the determined operation function for generating the first safety data by the more than one second safety data operation.
10. The apparatus of claim 9, wherein the generating unit is configured to determine an arithmetic function for generating the first security data from the one or more second security data operations, comprising:
splitting the first security data into more than one first security byte data according to a preset byte length;
respectively generating more than one byte in the more than one second safety data for each split first safety byte data, and calculating to obtain an operation instruction of the operation required by the first safety byte data;
and combining all the generated operation instructions into the operation function.
11. The apparatus according to any one of claims 8 to 10, further comprising a reading unit configured to:
and when a reading instruction for reading the first safety data is received, generating the first safety data according to the code file stored in the code storage area.
CN202011354790.5A 2020-11-27 2020-11-27 Method, device, computer storage medium and terminal for realizing secure data storage Active CN112464299B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011354790.5A CN112464299B (en) 2020-11-27 2020-11-27 Method, device, computer storage medium and terminal for realizing secure data storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011354790.5A CN112464299B (en) 2020-11-27 2020-11-27 Method, device, computer storage medium and terminal for realizing secure data storage

Publications (2)

Publication Number Publication Date
CN112464299A true CN112464299A (en) 2021-03-09
CN112464299B CN112464299B (en) 2024-08-06

Family

ID=74808877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011354790.5A Active CN112464299B (en) 2020-11-27 2020-11-27 Method, device, computer storage medium and terminal for realizing secure data storage

Country Status (1)

Country Link
CN (1) CN112464299B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150074412A1 (en) * 2013-09-12 2015-03-12 Carl BEAME Cryptographic storage device controller
CN110110548A (en) * 2019-04-12 2019-08-09 深圳市中易通安全芯科技有限公司 The correlation technique that file encryption stores under credible performing environment based on encryption chip
CN110135199A (en) * 2019-05-09 2019-08-16 中国电子科技集团公司第五十八研究所 Safety general Digital Signal Processing dsp chip
CN110489351A (en) * 2018-05-14 2019-11-22 英韧科技(上海)有限公司 Chip finger print managing device and safety chip
CN111241556A (en) * 2019-12-31 2020-06-05 重庆特斯联智慧科技股份有限公司 Data security storage method and device, storage medium and terminal
CN111444553A (en) * 2020-04-01 2020-07-24 中国人民解放军国防科技大学 Secure storage implementation method and system supporting TEE extension

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150074412A1 (en) * 2013-09-12 2015-03-12 Carl BEAME Cryptographic storage device controller
CN110489351A (en) * 2018-05-14 2019-11-22 英韧科技(上海)有限公司 Chip finger print managing device and safety chip
CN110110548A (en) * 2019-04-12 2019-08-09 深圳市中易通安全芯科技有限公司 The correlation technique that file encryption stores under credible performing environment based on encryption chip
CN110135199A (en) * 2019-05-09 2019-08-16 中国电子科技集团公司第五十八研究所 Safety general Digital Signal Processing dsp chip
CN111241556A (en) * 2019-12-31 2020-06-05 重庆特斯联智慧科技股份有限公司 Data security storage method and device, storage medium and terminal
CN111444553A (en) * 2020-04-01 2020-07-24 中国人民解放军国防科技大学 Secure storage implementation method and system supporting TEE extension

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
严飞;于钊;张立强;赵波;: "vTSE:一种基于SGX的vTPM安全增强方案", 工程科学与技术, no. 02, 20 March 2017 (2017-03-20) *

Also Published As

Publication number Publication date
CN112464299B (en) 2024-08-06

Similar Documents

Publication Publication Date Title
JP6804668B2 (en) Block data validation method and equipment
CN107516038B (en) Method and device for determining device fingerprint
KR101734205B1 (en) Method for protecting the integrity of a fixed-length data structure
CN110442473B (en) Nonvolatile data storage method and device, electronic equipment and medium
EP3336702B1 (en) Metadata recovery method and device
CN109710286B (en) System upgrading method, device, equipment and storage medium
CN111931172A (en) Financial system business process abnormity early warning method and device
CN112068958A (en) Bloom filter and data processing method
CN111258756A (en) Load balancing method and device, computer equipment and readable storage medium
CN111523875A (en) Cross-border payment method, device, equipment and system
CN114297630A (en) Malicious data detection method and device, storage medium and processor
CN112464299B (en) Method, device, computer storage medium and terminal for realizing secure data storage
CN111736895A (en) Method, equipment and storage medium for merging and upgrading version numbers of software products
CN113534682A (en) Method and device for managing logic blocks in industrial controller
CN111865616A (en) Method and device for generating key pair based on ECDSA algorithm
CN112866265B (en) CSRF attack protection method and device
CN115599299A (en) Storage bucket management method and device, electronic equipment and storage medium
CN114327259A (en) Flash memory channel controller operation method, device, equipment and storage medium
KR102540932B1 (en) Apparatus for providing update of vehicle and computer-readable storage medium
CN112749159A (en) Form generation method and device, electronic equipment and storage medium
CN117112047B (en) USB equipment management and control method, equipment and storage medium
CN105988804B (en) Software transfer method and terminal
CN116561772B (en) Trusted static metric calculation method, trusted static metric calculation device, storage medium and processor
EP3091469B1 (en) Data card application method and data card
US20220075535A1 (en) Recording control system, control device, recording control method, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 230088 floor 7, block C, building J2, phase II, innovation industrial park, high tech Zone, Hefei, Anhui Province

Applicant after: HEFEI DATANG STORAGE TECHNOLOGY Co.,Ltd.

Address before: 100094 No. 6 Yongjia North Road, Beijing, Haidian District

Applicant before: HEFEI DATANG STORAGE TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant