CN112506810B - Storage space distribution method applied to chip and chip - Google Patents

Storage space distribution method applied to chip and chip Download PDF

Info

Publication number
CN112506810B
CN112506810B CN202011261820.8A CN202011261820A CN112506810B CN 112506810 B CN112506810 B CN 112506810B CN 202011261820 A CN202011261820 A CN 202011261820A CN 112506810 B CN112506810 B CN 112506810B
Authority
CN
China
Prior art keywords
storage space
user
key
size
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011261820.8A
Other languages
Chinese (zh)
Other versions
CN112506810A (en
Inventor
盛志凡
华力
王强
杨勍
饶丰
陈鹏
黎政
黄新军
刘杰兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Research Institute Of Radio And Television Science State Administration Of Radio And Television
Hunan Goke Microelectronics Co Ltd
Original Assignee
Research Institute Of Radio And Television Science State Administration Of Radio And Television
Hunan Goke Microelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research Institute Of Radio And Television Science State Administration Of Radio And Television, Hunan Goke Microelectronics Co Ltd filed Critical Research Institute Of Radio And Television Science State Administration Of Radio And Television
Priority to CN202011261820.8A priority Critical patent/CN112506810B/en
Publication of CN112506810A publication Critical patent/CN112506810A/en
Application granted granted Critical
Publication of CN112506810B publication Critical patent/CN112506810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/0223User address space allocation, e.g. contiguous or non contiguous base addressing
    • G06F12/023Free address space management
    • G06F12/0238Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The embodiment of the disclosure relates to a chip and memory space allocation applied to the chip. The method comprises the following steps: receiving a storage space application request which is sent by a user and contains the size and the initial address of the applied storage space, determining the storage space to be allocated according to the size and the initial address of the applied storage space, acquiring a key corresponding to the storage space to be allocated, and allocating the storage space to be allocated and the key corresponding to the storage space to the user. By the method, a user can flexibly divide the required space size and the storage space of the initial position by sending the storage space application request containing the size and the initial address of the applied storage space, a chip developer does not divide the storage space in a chip any more, and the requirement of flexibly dividing the storage space by the user is effectively met.

Description

Storage space distribution method applied to chip and chip
Technical Field
The embodiment of the disclosure relates to the technical field of chips, and more particularly, to a memory space allocation method applied to a chip and a chip.
Background
With the continuous development of integrated circuit analysis technology, the security of data stored in a chip is more and more threatened, which makes the management of memory space in the chip more and more important.
At present, a chip developer manages a memory space in a chip by dividing the entire memory space in the chip into a plurality of specific memory areas in advance and allocating the specific memory areas to a user for use.
However, as the service demands are increasing, users have more appeal on flexible definition of the on-chip storage space, and the existing method of specifically dividing the whole storage space into a plurality of storage regions cannot meet the demands of the users, so a scheme for allocating the storage space applied to the chip is required to be provided.
Disclosure of Invention
The embodiment of the disclosure provides a new technical scheme applied to the storage space allocation of a chip.
According to a first aspect of the present specification, there is provided a memory space allocation method applied to a chip, including:
receiving a storage space application request sent by a user, wherein the storage space application request comprises the size and the initial address of the applied storage space;
determining a storage space to be allocated according to the size and the initial address of the applied storage space;
generating a random number aiming at a storage space to be distributed;
generating a key corresponding to the storage space to be distributed according to the random number;
acquiring a key corresponding to a storage space to be distributed;
and distributing the storage space to be distributed and the corresponding key thereof to the user.
Optionally, determining a storage space to be allocated according to the size and the starting address of the applied storage space includes:
determining the size of the applied storage space and the storage space corresponding to the initial address according to the size and the initial address of the applied storage space;
judging whether the size of the applied storage space and the storage space corresponding to the initial address are used or not;
and under the condition that the size of the applied storage space and the storage space corresponding to the starting address are not used, taking the size of the applied storage space and the storage space corresponding to the starting address as the storage space to be allocated.
Optionally, the step of generating a key corresponding to the storage space to be allocated includes:
generating a random number for the storage space;
and generating a key corresponding to the storage space to be distributed according to the random number.
Optionally, the method further comprises:
receiving a key replacement request aiming at the storage space sent by a user;
generating a new random number for the storage space;
and generating a key to be replaced according to the new random number, and updating the key corresponding to the storage space into the key to be replaced.
Optionally, the method further comprises:
receiving an access authority setting request aiming at the storage space, which is sent by a user, wherein the access authority setting request comprises the access authority to be set;
and setting the access authority of the storage space according to the access authority to be set.
Optionally, the method further comprises:
receiving an access request aiming at the storage space and sent by any user, wherein the access request comprises: the authority to be verified;
judging whether any user has the authority to access the storage space or not according to the authority to be verified;
if yes, returning the key corresponding to the storage space to the arbitrary user, and allowing the arbitrary user to use the key to execute the operation aiming at the storage space;
and if not, forbidding the arbitrary user to access the storage space.
Optionally, the operations comprise: a data write operation, a data delete operation, or a data read operation.
According to a second aspect of the present specification, there is also provided a chip comprising:
the storage management control module is used for receiving a storage space application request sent by a user, wherein the storage space application request comprises the size and the initial address of the applied storage space; determining a storage space to be allocated according to the size and the initial address of the applied storage space; generating a random number aiming at a storage space to be distributed; generating a key corresponding to the storage space to be distributed according to the random number; acquiring a key corresponding to a storage space to be distributed; and distributing the storage space to be distributed and the corresponding key thereof to the user.
Optionally, the storage management control module may be configured to determine, according to the size and the starting address of the applied storage space, the size of the applied storage space and a storage space corresponding to the starting address; judging whether the size of the applied storage space and the storage space corresponding to the initial address are used or not; and under the condition that the size of the applied storage space and the storage space corresponding to the starting address are not used, taking the size of the applied storage space and the storage space corresponding to the starting address as the storage space to be allocated.
Optionally, the chip may further include:
a random number generation module, configured to generate a random number for the storage space;
and the key management module is used for generating a key corresponding to the storage space to be distributed according to the random number.
Optionally, the storage management control module may be configured to receive a key exchange request for the storage space sent by a user; the random number generation module may be configured to generate a new random number for the storage space; the key management module may be configured to generate a key to be replaced according to the new random number, and update the key corresponding to the storage space to the key to be replaced.
Optionally, the storage management control module may be configured to receive an access right setting request sent by a user for the storage space, where the access right setting request includes an access right to be set; and setting the access authority of the storage space according to the access authority to be set.
Optionally, the storage management control module may be further configured to receive an access request for the storage space sent by any user, where the access request includes: a right to be verified; judging whether the arbitrary user has the authority to access the storage space or not according to the authority to be verified; if yes, returning the key corresponding to the storage space to the arbitrary user, and allowing the arbitrary user to use the key to execute the operation aiming at the storage space; and if not, forbidding the arbitrary user to access the storage space.
Optionally, the operations comprise: a data write operation, a data delete operation, or a data read operation.
In one embodiment, a user can flexibly divide the required space size and the storage space of the initial position by sending a storage space application request containing the size and the initial address of the applied storage space, and a chip developer does not divide the storage space in a chip any more, so that the requirement of flexibly dividing the storage space by the user is effectively met.
Other features of the present description and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the specification and together with the description, serve to explain the principles of the specification.
Fig. 1 is a flowchart of a memory space allocation method applied to a chip according to an embodiment of the present disclosure;
fig. 2 is a functional block diagram of a chip provided by an embodiment of the disclosure.
Detailed Description
Various exemplary embodiments of the present specification will now be described in detail with reference to the accompanying drawings.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< method examples >
The embodiment provides a memory space allocation method applied to a chip, as shown in fig. 1, the method includes the following steps:
s101: and receiving a storage space application request sent by a user.
In the embodiment of the present disclosure, in order to enable a user to flexibly divide a storage space, a storage space application request sent by the user needs to be received first.
It should be noted that the memory space request includes the size of the requested memory space and a start address, where the start address refers to the starting position of the memory space, and for example, if the size of the entire memory space in the chip is 1000KB, and the start address of the memory space requested by the user is 200KB, the starting position of the memory space is 200 KB.
In addition, the size of the memory space and the starting address together determine the memory space requested.
S102: and determining the storage space to be allocated according to the size and the starting address of the applied storage space.
Since the size of the requested storage space determines the range of the storage space and the start address determines the start position of the storage space, in the embodiment of the present disclosure, the size and the start address of the requested storage space determine which region the requested storage space is, that is, the storage space to be allocated is determined according to the size and the start address of the requested storage space.
For example, assuming that the size of the entire memory space in the chip is 1000KB, the size of the memory space requested by the user is 300KB, and the starting address of the memory space is 200KB, it is determined that the memory space to be allocated is between 200KB and 500KB according to the size of the requested memory space of 300KB and the starting address of 200 KB.
Further, since the memory space in the chip can only be occupied and used by one user, that is, a certain memory space in the chip is already applied and occupied by a user, and other users cannot apply and use the memory space, in the embodiment of the present disclosure, the memory space to be allocated is specifically determined according to the size and the starting address of the applied memory space, and the size of the applied memory space and the memory space corresponding to the starting address are determined according to the size and the starting address of the applied memory space; judging whether the size of the applied storage space and the storage space corresponding to the initial address are used or not; and under the condition that the size of the applied storage space and the storage space corresponding to the starting address are not used, taking the size of the applied storage space and the storage space corresponding to the starting address as the storage space to be allocated.
It should be noted that, after determining the size of the applied storage space and the storage space corresponding to the start address according to the size and the start address of the applied storage space, the storage space needs to be determined, and when the storage space is applied and used by another user, the storage space cannot be allocated to the current user, the application is directly returned to fail, and the storage space of the current user is prompted to be occupied.
S103: generating a random number aiming at a storage space to be distributed; generating a key corresponding to the storage space to be distributed according to the random number; and acquiring a key corresponding to the storage space to be distributed.
Further, in order to ensure the security of the data stored in the storage space by the user, in the embodiment of the present disclosure, after the storage space to be allocated is determined, a key corresponding to the storage space to be allocated needs to be obtained to encrypt the data in the storage space to be allocated.
In the embodiment of the present disclosure, a key corresponding to a storage space to be allocated may be generated through the following implementation manner, specifically, a random number is generated for the storage space; and generating a key corresponding to the storage space to be distributed according to the random number.
It should be noted here that the random number is randomly obtained by a random number algorithm;
it should be further noted that, according to the random number, a key corresponding to the storage space to be allocated is generated, specifically, the random number may be directly used as the key of the storage space to be allocated, or the random number may be processed in a preset processing manner, and the processed random number is used as the key of the storage space to be allocated.
In addition, the secret key used for protecting the storage space data is a national commercial cipher SM4, and the cipher algorithms all adopt the national commercial cipher algorithm to accord with the autonomous controllable national strategy.
S104: and distributing the storage space to be distributed and the corresponding key thereof to the user.
Furthermore, the determined storage space to be allocated and the corresponding key thereof are allocated to the user, and meanwhile, the corresponding relationship among the identifier of the user, the address corresponding to the storage space allocated to the user and the key is established and stored, and subsequently, the user can use the key to perform operations such as writing and reading of data in the storage space.
By the method, the user can flexibly divide the required space size and the storage space of the initial position by sending the storage space application request containing the size of the applied storage space and the initial address, a chip developer does not divide the storage space in the chip any more, and the requirement of flexibly dividing the storage space by the user is effectively met.
In practical applications, there may be a case that a user needs to change a key of an applied storage space, and therefore, in the embodiment of the present disclosure, in order to facilitate the user to change the key of the applied storage space, a key change request for the storage space sent by the user may be specifically received; generating a new random number for the storage space; and generating a key to be replaced according to the new random number, and updating the key corresponding to the storage space into the key to be replaced, so that the user can independently update the key of the storage space, and the data protection is safer.
In practical applications, a user usually wants that a requested storage space can be accessed by himself or by allowing a specific user to access the storage space of himself, so in the embodiment of the present disclosure, the user can set an access right, such as access time, identity of an accessing person, etc., for the requested storage space, and specifically, receive an access right setting request for the storage space sent by the user, where the access right setting request includes an access right to be set; and setting the access authority of the storage space according to the access authority to be set, so that a user can flexibly define the authority of the storage space.
Subsequently, when any user needs to access the storage space with the access right set, receiving an access request sent by any user for the storage space, wherein the access request comprises: the authority to be verified; judging whether the arbitrary user has the authority to access the storage space or not according to the authority to be verified; if yes, returning the key corresponding to the storage space to the arbitrary user, and allowing the arbitrary user to use the key to execute the operation aiming at the storage space; and if not, forbidding the arbitrary user to access the storage space.
It should be noted that any user may be a user who applies for the storage space, or may be another user.
Additionally, the operations include: a data write operation, a data delete operation, or a data read operation.
For example, when the user 1 has acquired a segment of storage space, and the user 2 needs to access the data in the storage space, it needs to send a request to the storage management control module, and the storage management control module queries whether the module has an access right to the storage space (the right is defined by the user 1 applying for the storage space), and if the query right is satisfied, the storage management control module sends a key to the user 2, and the user 2 uses the key to access the data in the storage space, otherwise, the user 2 cannot access the storage space. When the user does not need to use the storage space and needs to apply to the storage management controller to release the storage space, the storage space can be reallocated to other users.
< apparatus embodiment >
Fig. 2 provides a chip 20 for the present embodiment, where the chip 20 includes:
a storage management control module 201, configured to receive a storage space application request sent by a user, where the storage space application request includes a size and an initial address of a storage space to be applied; determining a storage space to be allocated according to the size and the initial address of the applied storage space; generating a random number aiming at a storage space to be distributed; generating a key corresponding to the storage space to be distributed according to the random number; acquiring a key corresponding to a storage space to be distributed; and distributing the storage space to be distributed and the corresponding key thereof to the user.
Optionally, the storage management control module 201 may be configured to determine, according to the size and the starting address of the applied storage space, the size of the applied storage space and a storage space corresponding to the starting address; judging whether the size of the applied storage space and the storage space corresponding to the initial address are used or not; and under the condition that the size of the applied storage space and the storage space corresponding to the starting address are not used, taking the size of the applied storage space and the storage space corresponding to the starting address as the storage space to be allocated.
Optionally, the chip 20 may further include:
a random number generation module 202, configured to generate a random number for the storage space;
and the key management module 203 is configured to generate a key corresponding to the storage space to be allocated according to the random number.
It should be noted that the generated key for each storage space is stored in the storage management control module 201.
It should be further noted that, the operation relationship among the storage management control module 201, the key management module 203, and the random number generation module 202 is that, when the storage management control module 201 acquires a key corresponding to a storage space to be allocated, the key management module 203 sends a key acquisition request to the key management module 203, and then the key management module 203 sends a random number acquisition request to the random number generation module 202, and the random number generation module 202 generates a random number for the storage space and returns the random number to the key management module 203, and the key management module 203 generates a key corresponding to the storage space to be allocated according to the random number and returns the key to the storage management control module 201.
Optionally, the storage management control module 201 may be configured to receive a key exchange request for the storage space sent by a user; the random number generation module 202 may be configured to generate a new random number for the storage space; the key management module 203 may be configured to generate a key to be replaced according to the new random number, and update the key corresponding to the storage space to the key to be replaced.
Optionally, the storage management control module 201 may be configured to receive an access right setting request for the storage space sent by a user, where the access right setting request includes an access right to be set; and setting the access authority of the storage space according to the access authority to be set.
Optionally, the storage management control module 201 may be further configured to receive an access request for the storage space sent by any user, where the access request includes: a right to be verified; judging whether the arbitrary user has the authority to access the storage space or not according to the authority to be verified; if yes, returning the key corresponding to the storage space to the arbitrary user, and allowing the arbitrary user to use the key to execute the operation aiming at the storage space; and if not, forbidding the arbitrary user to access the storage space.
Optionally, the operation includes: a data write operation, a data delete operation, or a data read operation.
Optionally, the chip 20 may further include:
and the data encryption and decryption module 204 is configured to, in the process that any user performs an operation on the storage space by using the key, perform encryption operation on data written into the storage space by any user, store the data in the corresponding storage space, perform decryption operation on read data of any user, return the read data to the user, perform decryption operation on deleted data of any user, and delete the data.
It should be noted here that, the user and the data encryption and decryption module 204 may respectively establish a direct communication relationship with the storage management control module 201, and a user module 205 may also be added, where the user module 205 respectively establishes a direct communication relationship with the data encryption and decryption module 204 and the storage management control module 201, and may be used to be responsible for sending messages, such as a storage space application request, storage space key update, and storage space access authority definition, to the storage management control module 201, and meanwhile, the user module 205 needs to use the applied key to perform data read and write operations on the storage space.
One or more embodiments of the present specification can be a system, method, and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the specification.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations for embodiments of the present disclosure may be assembly instructions, instruction Set Architecture (ISA) instructions, machine related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, an electronic circuit, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA), can execute computer-readable program instructions to implement various aspects of the present description by utilizing state information of the computer-readable program instructions to personalize the electronic circuit.
Aspects of the present description are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present description. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, implementation by software, and implementation by a combination of software and hardware are equivalent.
The foregoing description of the embodiments of the present specification has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the market, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the application is defined by the appended claims.

Claims (10)

1. A memory space allocation method applied to a chip is characterized by comprising the following steps:
receiving a storage space application request sent by a user, wherein the storage space application request comprises the size and the initial address of the applied storage space;
determining a storage space to be allocated according to the size and the initial address of the applied storage space;
generating a random number aiming at the storage space to be distributed;
processing the random number according to a preset processing mode to generate a secret key corresponding to the storage space to be distributed;
acquiring a key corresponding to a storage space to be distributed;
distributing the storage space to be distributed and the corresponding key to the user;
the method further comprises the following steps:
receiving a key replacement request aiming at the storage space to be distributed sent by a user;
generating a new random number aiming at the storage space to be allocated;
and processing the new random number according to a preset processing mode to generate a key to be replaced, and updating the key corresponding to the storage space to be distributed into the key to be replaced.
2. The method of claim 1, wherein determining the memory space to be allocated according to the requested size and starting address of the memory space comprises:
determining the size of the applied storage space and the storage space corresponding to the initial address according to the size and the initial address of the applied storage space;
judging whether the size of the applied storage space and the storage space corresponding to the initial address are used or not;
and under the condition that the size of the applied storage space and the storage space corresponding to the starting address are not used, taking the size of the applied storage space and the storage space corresponding to the starting address as the storage space to be allocated.
3. The method of claim 1, further comprising:
receiving an access authority setting request aiming at the storage space, which is sent by a user, wherein the access authority setting request comprises the access authority to be set;
and setting the access authority of the storage space according to the access authority to be set.
4. The method of claim 3, further comprising:
receiving an access request aiming at the storage space and sent by any user, wherein the access request comprises: a right to be verified;
judging whether the arbitrary user has the authority to access the storage space or not according to the authority to be verified;
if yes, returning the key corresponding to the storage space to the arbitrary user, and allowing the arbitrary user to use the key to execute the operation aiming at the storage space;
and if not, forbidding the arbitrary user to access the storage space.
5. The method of claim 4, wherein the operations comprise: a data write operation, a data delete operation, or a data read operation.
6. A chip, comprising:
the storage management control module is used for receiving a storage space application request sent by a user, wherein the storage space application request comprises the size and the initial address of the applied storage space; determining a storage space to be allocated according to the size and the initial address of the applied storage space; acquiring a key corresponding to a storage space to be distributed; distributing the storage space to be distributed and the corresponding key to the user;
a random number generation module, configured to generate a random number for the storage space to be allocated;
the key management module is used for processing the random number according to a preset processing mode and generating a key of the storage space to be distributed;
the storage management control module may be configured to receive a key exchange request for the storage space sent by a user; the random number generation module may be configured to generate a new random number for the storage space; the key management module may be configured to generate a key to be replaced according to the new random number, and update the key corresponding to the storage space to the key to be replaced.
7. The chip according to claim 6, wherein the storage management control module is configured to determine, according to the size and the start address of the requested storage space, a storage space corresponding to the size and the start address of the requested storage space; judging whether the size of the applied storage space and the storage space corresponding to the initial address are used or not; and under the condition that the size of the applied storage space and the storage space corresponding to the starting address are not used, taking the size of the applied storage space and the storage space corresponding to the starting address as the storage space to be allocated.
8. The chip of claim 6, wherein the storage management control module is configured to receive an access right setting request sent by a user for the storage space, where the access right setting request includes an access right to be set; and setting the access authority of the storage space according to the access authority to be set.
9. The chip according to claim 8, wherein the storage management control module is further configured to receive an access request sent by any user for the storage space, where the access request includes: the authority to be verified; judging whether any user has the authority to access the storage space or not according to the authority to be verified; if yes, returning the key corresponding to the storage space to the arbitrary user, and allowing the arbitrary user to use the key to execute the operation aiming at the storage space; and if not, forbidding the arbitrary user to access the storage space.
10. The chip of claim 9, wherein the operations comprise: a data write operation, a data delete operation, or a data read operation.
CN202011261820.8A 2020-11-12 2020-11-12 Storage space distribution method applied to chip and chip Active CN112506810B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011261820.8A CN112506810B (en) 2020-11-12 2020-11-12 Storage space distribution method applied to chip and chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011261820.8A CN112506810B (en) 2020-11-12 2020-11-12 Storage space distribution method applied to chip and chip

Publications (2)

Publication Number Publication Date
CN112506810A CN112506810A (en) 2021-03-16
CN112506810B true CN112506810B (en) 2023-04-18

Family

ID=74957354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011261820.8A Active CN112506810B (en) 2020-11-12 2020-11-12 Storage space distribution method applied to chip and chip

Country Status (1)

Country Link
CN (1) CN112506810B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2476079A4 (en) * 2009-09-09 2013-07-03 Fusion Io Inc Apparatus, system, and method for allocating storage
CN104426938A (en) * 2013-08-27 2015-03-18 宇宙互联有限公司 Storage management system and method
CN111782561B (en) * 2020-09-07 2020-12-04 新华三半导体技术有限公司 SRAM storage space allocation method, device and chip

Also Published As

Publication number Publication date
CN112506810A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN111539813B (en) Method, device, equipment and system for backtracking processing of business behaviors
EP3123657B1 (en) Method and apparatus for cloud-assisted cryptography
US9769654B2 (en) Method of implementing a right over a content
CN108898005B (en) Hard disk identification method, system, equipment and computer readable storage medium
CN109347839B (en) Centralized password management method and device, electronic equipment and computer storage medium
US10887085B2 (en) System and method for controlling usage of cryptographic keys
JP2016513840A (en) Method, server, host, and system for protecting data security
US11087017B1 (en) Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data
JP7089303B2 (en) Inference device, processing system, inference method and inference program
CN113806777A (en) File access realization method and device, storage medium and electronic equipment
CN110430167B (en) Temporary account management method, electronic device, management terminal and storage medium
CN109543365B (en) Authorization method and device
US9887842B2 (en) Binding software application bundles to a physical execution medium
CN113946863A (en) Data encryption storage method, system, equipment and storage medium
CN111917711B (en) Data access method and device, computer equipment and storage medium
CN110011807B (en) Key information maintenance method and system
CN112506810B (en) Storage space distribution method applied to chip and chip
CN108667647B (en) Method and device for setting device parameters and server
CN107463808B (en) Method for calling functional module integrated in operating system
CN111988262A (en) Authentication method, authentication device, server and storage medium
US11799629B2 (en) Access authorization utilizing homomorphically encrypted access authorization objects
US20190147150A1 (en) Digital certificate containing multimedia content
CN108985109A (en) A kind of date storage method and device
US20220385464A1 (en) Durability enforcement of cryptographic keys in a key management system
CN113986448A (en) Container deployment method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant