[go: up one dir, main page]

CN101739360B - How to protect memory data - Google Patents

How to protect memory data Download PDF

Info

Publication number
CN101739360B
CN101739360B CN200810176011XA CN200810176011A CN101739360B CN 101739360 B CN101739360 B CN 101739360B CN 200810176011X A CN200810176011X A CN 200810176011XA CN 200810176011 A CN200810176011 A CN 200810176011A CN 101739360 B CN101739360 B CN 101739360B
Authority
CN
China
Prior art keywords
memory
storage data
data
internal storage
internal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200810176011XA
Other languages
Chinese (zh)
Other versions
CN101739360A (en
Inventor
陈桮棬
詹立翔
杨士贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Moai Electronics Corp
Original Assignee
Moai Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Moai Electronics Corp filed Critical Moai Electronics Corp
Priority to CN200810176011XA priority Critical patent/CN101739360B/en
Publication of CN101739360A publication Critical patent/CN101739360A/en
Application granted granted Critical
Publication of CN101739360B publication Critical patent/CN101739360B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for protecting internal memory data includes storing damaged block information, fetching out damaged block address detected out by internal memory when internal memory is scanned and tested as internal memory mark, utilizing specific algorithm to calculate out identification code from damaged block address to let internal memory check said identification code first and confirm whether internal memory pointed by internal memory mark is damaged block or not for preventing unauthorized copied data from being read out for using it at will.

Description

内存数据的保护方法How to protect memory data

技术领域 technical field

本发明涉及一种内存数据的保护方法,尤其是利用内存的损坏区块地址为标记与辨识码以保护储存数据并防止被任意读取。The invention relates to a method for protecting memory data, in particular using the damaged block address of the memory as a mark and an identification code to protect stored data and prevent arbitrary reading.

背景技术 Background technique

随着信息产业的快速进步,储存装置的使用越来越普及而容量也越来越大。目前,已有各式各样的储存装置被当作数据储存的接口在使用,而数据安全的保护显得愈加重要。With the rapid development of the information industry, the use of storage devices is becoming more and more popular and the capacity is also increasing. At present, various storage devices have been used as data storage interfaces, and the protection of data security is becoming more and more important.

目前储存装置的数据保护方式中,大多以密码的方式保护,例如受保护的档案内容经密码锁住,只有在密码正确时,储存装置才允许外界计算机读取所储存的数据,或是所储存的数据是经该密码的编码处理过,因此外界计算机在进行读取时,如果没有获得该密码进行档案译码,则会读取到已编码的数据而无法直接使用。另一常用的保护方式是档案系统特性的保护方式,利用已公开的档案系统格式,植入特定的档案或辨识码到特定的保留区,以监控外界对内存数据的存取操作,防止任意复制以保护内存数据。Most of the current storage device data protection methods are protected by passwords. For example, the protected file content is locked by a password. Only when the password is correct, the storage device allows the external computer to read the stored data, or the stored data. The data has been encoded by the password, so when an external computer reads it, if it does not obtain the password to decode the file, it will read the encoded data and cannot use it directly. Another commonly used protection method is the protection method of file system characteristics. Using the published file system format, a specific file or identification code is implanted into a specific reserved area to monitor external access operations on memory data and prevent arbitrary copying to protect memory data.

然而,现有技术的缺点为,任何以软件程序的方式经计算机来执行保护储存装置的数据,仍有被破解而失败的可能,而档案系统特性的保护方式也只能保护单一储存装置的数据,仍然无法阻止以实体地址的方式所进行的对烤操作,亦即无法防止利用复制机器以内存地址进行数据复制的方式对两个储存装置进行一对一的数据复制操作。以随身碟为例,将两个随身碟以烧录方式进行复制,即可突破档案系统特性的保护方式,进而获得大量具相同数据的随身碟。However, the disadvantage of the prior art is that any data in the protected storage device executed by a computer in the form of a software program may still be cracked and fail, and the protection method of the file system characteristic can only protect the data of a single storage device. However, it is still impossible to prevent the pair-to-bake operation performed by the physical address, that is, it is impossible to prevent the one-to-one data copy operation of the two storage devices by using the copy machine to copy the data by the memory address. Taking the flash drive as an example, copying two flash drives by burning can break through the protection method of the file system characteristics, and then obtain a large number of flash drives with the same data.

因此需要一种内存数据的保护方法,排除软件的保护方式而直接利用内存本身所具有的硬件特性,以解决现有技术的缺点。Therefore, there is a need for a method for protecting memory data, which eliminates the protection method of software and directly utilizes the hardware characteristics of the memory itself, so as to solve the shortcomings of the prior art.

发明内容 Contents of the invention

本发明的主要目的在于提供一种内存数据的保护方法,由储存损坏区块信息(Storage Bad Block Info)中,将内存进行扫描测试时所侦测出的损坏区块地址取出,以当作内存标记,亦即该内存的硬件标记,并利用特定算法由损坏区块地址计算出辨识码,使得外界在读取内存数据时,内存会先检查该辨识码以及损坏区块地址,以防止非授权的复制数据被读取出来被任意使用,以达到保护内存数据的目的。The main purpose of the present invention is to provide a method for protecting memory data. From the storage bad block information (Storage Bad Block Info), the address of the bad block detected when the memory is scanned and tested is taken out to be used as a memory block. Mark, that is, the hardware mark of the memory, and use a specific algorithm to calculate the identification code from the address of the damaged block, so that when the outside world reads the memory data, the memory will first check the identification code and the address of the damaged block to prevent unauthorized The copied data is read out and used arbitrarily to achieve the purpose of protecting memory data.

本发明的另一目的在于提供一种内存数据的保护方法,选取多个内存的损坏区块地址当作内存标记,经适当函数计算出平均值当作辨识码,将内存标记与辨识码存入内存的特定地址中,用以在该内存数据被复制到另一内存后,当使用者读取另一内存中的数据时,该另一内存会先比对该特定位置所储存的辨识码是否为经该函数配合内存标记所计算出的函数值,如果正确,则进一步确认内存标记所指定的内存区块是否为损坏区块,如果正确,则确定该内存的数据是经授权的数据,进行数据读取操作,并传送内存数据给使用者,否则该内存数据被视为未授权的数据,进而阻止外界对内存数据的读取操作,以保护内存的数据被任意复制。Another object of the present invention is to provide a method for protecting memory data, select a plurality of damaged block addresses of the memory as memory marks, calculate the average value through appropriate functions as identification codes, and store the memory marks and identification codes in In the specific address of the memory, after the data in the memory is copied to another memory, when the user reads the data in another memory, the other memory will first compare whether the identification code stored in the specific location is If the function value calculated by the function and the memory mark is correct, then further confirm whether the memory block specified by the memory mark is a damaged block, if correct, then determine that the data in the memory is authorized data, and proceed Data read operation, and transmit the memory data to the user, otherwise the memory data will be regarded as unauthorized data, thereby preventing the outside world from reading the memory data, so as to protect the memory data from being copied arbitrarily.

因此,通过本发明所提供的内存数据的保护方法,会使以实体地址方式将原始内存数据拷贝到另一内存时,另一内存的数据无法被读取而受到保护,以解决上述现有技术的所有缺点。Therefore, through the method for protecting memory data provided by the present invention, when the original memory data is copied to another memory in the form of a physical address, the data in the other memory cannot be read and protected, so as to solve the problem of the above-mentioned prior art all the shortcomings.

附图说明 Description of drawings

图1为显示本发明内存数据保护方法的内存数据写入操作流程图。FIG. 1 is a flow chart showing the memory data writing operation of the memory data protection method of the present invention.

图2为显示本发明内存数据保护方法的内存数据读取操作流程图。FIG. 2 is a flowchart showing the memory data reading operation of the memory data protection method of the present invention.

图3为显示本发明内存数据保护方法的保护操作的示意图。FIG. 3 is a schematic diagram showing protection operations of the memory data protection method of the present invention.

【主要组件符号说明】[Description of main component symbols]

10 原始内存10 raw memory

12 内存标记12 memory tag

30 复制内存30 copy memory

32 内存标记32 memory tag

A、B、C、D、E、F、G 区块A, B, C, D, E, F, G blocks

Ax、Bx、Cx 区块地址Ax, Bx, Cx block address

S110 读取损坏区块地址S110 Read damaged block address

S120 选定多个损坏区块地址当作内存标记S120 Select multiple damaged block addresses as memory marks

S130 利用适当函数带入内存标记而计算出辨识码S130 Use a suitable function to bring in the memory tag to calculate the identification code

S140 将内存标记与辨识码存入内存的特定地址S140 Store the memory tag and identification code in a specific address of the memory

S150 结束写入操作S150 end write operation

S200 开始本发明保护方法的读取操作S200 Start the read operation of the protection method of the present invention

S210读取内存标记与辨识码S210 read memory mark and identification code

S220是否辨识码为正确Whether the identification code of S220 is correct

S230是否内存标记所指定的区块为损坏区块S230 Whether the block specified by the memory mark is a damaged block

S240执行内存数据的读取操作S240 executes the read operation of memory data

S250非授权的内存数据S250 unauthorized memory data

S260停止内存数据的读取操作S260 stops the read operation of memory data

S270结束读取操作S270 ends the read operation

Φ辨识码Φ identification code

具体实施方式 Detailed ways

以下配合附图及组件符号对本发明的实施方式做更详细的说明,使熟习该项技艺者在研读本说明书后能据以实施。The implementation of the present invention will be described in more detail below in conjunction with the accompanying drawings and component symbols, so that those skilled in the art can implement it after studying this specification.

本发明的内存数据保护方法主要包括两个阶段的操作:第一阶段的内存数据写入操作以及第二阶段的内存数据读取操作。内存数据写入操作在内存内建立防止读取非授权的内存数据的机制,而内存数据读取操作在读取内存数据时利用第一阶段所建立的机制以辨识所读取的内存数据是否为授权的内存数据。The memory data protection method of the present invention mainly includes two stages of operations: the memory data writing operation of the first stage and the memory data reading operation of the second stage. The memory data write operation establishes a mechanism in the memory to prevent unauthorized reading of memory data, and the memory data read operation uses the mechanism established in the first stage to identify whether the read memory data is Authorized memory data.

上述的内存数据保护方法由内存的读写控制器负责操作,亦即由该读写控制器实现内存数据写入操作以及内存数据读取操作。读写控制器可为一般的微处理器,执行特定的软件以实现内存数据保护方法,但读写控制器也可为特殊应用集成电路(Application Specific IC,ASIC)而不需软件,直接以硬件电路实现内存数据写入操作以及内存数据读取操作。此外,亦可用独立的电气组件组合成能实现内存数据写入操作以及内存数据读取操作的电路模块。因此,本发明的范围并不限定实现内存数据保护方法的控制器的实体形式与内部运作。The memory data protection method described above is operated by a memory read-write controller, that is, the memory data write operation and memory data read operation are implemented by the read-write controller. The read-write controller can be a general microprocessor, which executes specific software to realize the memory data protection method, but the read-write controller can also be an application specific integrated circuit (Application Specific IC, ASIC) without software, and directly uses hardware The circuit realizes the memory data writing operation and the memory data reading operation. In addition, independent electrical components can also be combined to form a circuit module capable of implementing memory data writing operations and memory data reading operations. Therefore, the scope of the present invention is not limited to the physical form and internal operation of the controller implementing the memory data protection method.

参阅图1,本发明内存数据保护方法的内存数据写入操作流程图。如图1所示,首先在步骤S100中,开始本发明保护方法的写入操作,进入步骤S110。在步骤S110中,读取储存损坏区块信息中所储存的损坏区块地址,进入步骤S120。在步骤S120中,选定复数个(或多个)损坏区块地址当作内存标记,进入步骤S130。在步骤S130中,利用特定函数带入内存标记而计算出辨识码,进入步骤S140。在步骤S140中,将内存标记与辨识码存入内存的特定地址,进入步骤S150。在步骤S150中,结束写入操作。Referring to FIG. 1 , it is a flow chart of the memory data writing operation of the memory data protection method of the present invention. As shown in FIG. 1 , firstly, in step S100 , the write operation of the protection method of the present invention is started, and step S110 is entered. In step S110, read the damaged block address stored in the damaged block information, and proceed to step S120. In step S120, a plurality (or more) of damaged block addresses are selected as memory tags, and the process proceeds to step S130. In step S130, the specific function is used to bring in the memory tag to calculate the identification code, and the process proceeds to step S140. In step S140, the memory tag and identification code are stored in a specific address of the memory, and the process proceeds to step S150. In step S150, the writing operation is ended.

储存损坏区块信息是一般在内存经扫描测试时记录所有损坏区块的地址,并储存在内存的特定地址上,使内存控制器能通过读取损坏区块的地址,以避免对损坏的区块进行数据存取。步骤S130中的特定函数可为任意函数,比如将所选取的损坏区块地址相加,或取平均值,或取最大值。但是要注意的是,本发明的保护方法并不限定特定函数的形式,亦即只要能通过带入所选取的损坏区块地址而得到一数值当作辨识码皆落在本发明的范围内。此外,可随意选取储存内存标记与辨识码的特定地址,只要是非损坏区块即可。To store damaged block information is generally to record the addresses of all damaged blocks when the memory is scanned and tested, and store them in a specific address of the memory, so that the memory controller can read the address of the damaged block to avoid damage to the damaged block. block for data access. The specific function in step S130 can be any function, such as adding up the selected damaged block addresses, or taking an average value, or taking a maximum value. However, it should be noted that the protection method of the present invention does not limit the form of a specific function, that is, as long as a value can be obtained as an identification code by bringing in the selected damaged block address, it falls within the scope of the present invention. In addition, the specific address for storing the memory tag and identification code can be selected arbitrarily, as long as it is a non-damaged block.

参阅图2,本发明内存数据保护方法的内存数据读取操作流程图。如图2所示,首先在步骤S200中,内存在接受外界装置的数据读取请求后,开始本发明保护方法的读取操作,接着进入步骤S210。在步骤S210中,读取内存特定地址的内存标记与辨识码,进入步骤S220。在步骤S220中,判断辨识码是否正确,如果正确则进入步骤S230,如果不正确则进入步骤S250。在步骤S230中,判断内存标记所指定的区块是否为损坏区块,如果为损坏区块则进入步骤S240,如果非损坏区块则进入步骤S250。在步骤S240中,该内存数据确认为授权数据,执行内存数据的读取操作,并将所读取的内存数据传送出去,进入步骤S270。在步骤S250中,该内存数据确认为非授权的内存数据,进入步骤S250。在步骤S260中,停止内存数据的读取操作,进入步骤S250。在步骤S270中,结束读取操作。Referring to FIG. 2 , the flow chart of the memory data reading operation of the memory data protection method of the present invention. As shown in FIG. 2 , firstly in step S200 , after receiving the data reading request from the external device, the memory starts the reading operation of the protection method of the present invention, and then enters step S210 . In step S210, the memory tag and identification code of the specific address of the memory are read, and the process proceeds to step S220. In step S220, it is judged whether the identification code is correct, if correct, proceed to step S230, and if not, proceed to step S250. In step S230, it is judged whether the block designated by the memory mark is a damaged block, if it is a damaged block, proceed to step S240, and if it is not a damaged block, proceed to step S250. In step S240, the memory data is confirmed as authorized data, the read operation of the memory data is executed, and the read memory data is sent out, and the process proceeds to step S270. In step S250, the internal memory data is confirmed as unauthorized internal memory data, and the process proceeds to step S250. In step S260, the operation of reading the memory data is stopped, and the process proceeds to step S250. In step S270, the read operation is ended.

步骤S200的外界装置可为个人计算机、笔记型计算机或个人数字助理。步骤S230中判断是否为损坏区块的方式可由写入与读取来实现,亦即先写入一特定数值再接着读取该数值并作比较,或将不同数值重复写入与读取该内存地址,同时进行数据比较。但是要注意的是,本发明的保护方法并不限定步骤S230的内存判断方式。The external device in step S200 can be a personal computer, a notebook computer or a personal digital assistant. The method of judging whether it is a damaged block in step S230 can be realized by writing and reading, that is, first writing a specific value and then reading the value and comparing it, or repeatedly writing and reading different values into the memory address, and compare data at the same time. However, it should be noted that the protection method of the present invention does not limit the method of memory determination in step S230.

因此,本发明通过步骤230与步骤240分别检查辨识码是否正确以及检查内存标记的内存区块是否为损坏区块,以确认该内存数据是否为授权的数据,以防止任意复制的内存数据被读取出来。Therefore, the present invention checks whether the identification code is correct and checks whether the memory block of the memory mark is a damaged block by step 230 and step 240 respectively, to confirm whether the memory data is authorized data, so as to prevent any copied memory data from being read take out.

为更进一步说明本发明的内容,请参阅图3,本发明内存数据保护方法的保护操作的示意图。如图3所示,原始内存10具有多个损坏区块,比如区块A、B、C、D、E、F、G,被记录在储存损坏区块信息内,选取区块A、B、C的区块地址Ax、Bx、Cx当作该原始内存10的内存标记12,利用特定函数f,产生辨识码Φ,亦即f(Ax、Bx、Cx)=Φ。该特定函数f可为如上述将所选取的损坏区块地址Ax、Bx、Cx相加,或取平均值,或取最大值,但本发明并不限定该特定函数的形式。To further illustrate the content of the present invention, please refer to FIG. 3 , which is a schematic diagram of the protection operation of the memory data protection method of the present invention. As shown in Figure 3, the original memory 10 has a plurality of damaged blocks, such as blocks A, B, C, D, E, F, G, which are recorded in the stored damaged block information, select blocks A, B, The block address Ax, Bx, Cx of C is used as the memory mark 12 of the original memory 10, and the specific function f is used to generate the identification code Φ, that is, f(Ax, Bx, Cx)=Φ. The specific function f can be the addition of the selected damaged block addresses Ax, Bx, and Cx as mentioned above, or take the average value, or take the maximum value, but the present invention does not limit the form of the specific function.

要注意的是,本实施例选取三区块A、B、C的地址当内存标记是为方便说明的示范性实例而已,并非用以限制本发明的范围,亦即本发明的方法包括在所有损坏区块中选取任意数目的损坏区块并以该损坏区块的地址当作内存标记。It should be noted that the present embodiment selects the addresses of the three blocks A, B, and C as memory marks, which is only an exemplary example for convenience of description, and is not intended to limit the scope of the present invention, that is, the method of the present invention is included in all Select any number of damaged blocks in the damaged block and use the address of the damaged block as a memory mark.

内存标记12以及辨识码Φ储存于原始内存10的特定地址,比如0x00fd以方便解说,同时原始内存10的其它地址可供储存数据。该原始内存10因具有内存标记12以及辨识码Φ,所以原始内存10所储存的数据被视为授权的内存数据。The memory mark 12 and the identification code Φ are stored in a specific address of the original memory 10, such as 0x00fd for convenience of explanation, and other addresses of the original memory 10 are available for storing data. Since the original memory 10 has a memory mark 12 and an identification code Φ, the data stored in the original memory 10 is regarded as authorized memory data.

当原始内存10的数据,包括内存标记12、辨识码Φ以及内存数据,被成功复制到复制内存30后,该复制内存30具有内存标记32、辨识码Φ以及内存数据,其中内存标记32以及辨识码Φ位于复制内存30的特定地址0x00fd,而内存数据位于其它相对应内存地址,亦即与原始内存10相同。When the data of the original memory 10, including the memory mark 12, the identification code Φ and the memory data, are successfully copied to the copy memory 30, the copy memory 30 has the memory mark 32, the identification code Φ and the memory data, wherein the memory mark 32 and the identification The code Φ is located at a specific address 0x00fd of the copied memory 30 , while the memory data is located at other corresponding memory addresses, that is, the same as the original memory 10 .

由内存标记32经该特定函数计算出函数值,亦即f(Ax、Bx、Cx),并比较f(Ax、Bx、Cx)与辨识码Φ,如果不相同,则表示该复制内存30的内存数据不是授权的内存数据,内存及其控制器阻止外界的数据读取操作。如果f(Ax、Bx、Cx)与辨识码Φ相同,则检查复制内存30的选取区块A、B、C是否为损坏区块,如果不是损坏区块,则表示该复制内存30的内存数据不是授权的内存数据,内存及其控制器阻止外界的数据读取操作。如果A、B、C皆为损坏区块,则可确认该复制内存30的内存数据为授权的内存数据,该复制内存30允许外界的数据读取操作,并将读取数据传送出去。Calculate the function value by the memory mark 32 through the specific function, i.e. f(Ax, Bx, Cx), and compare f(Ax, Bx, Cx) with the identification code Φ, if they are not the same, it means that the copy memory 30 The memory data is not authorized memory data, and the memory and its controller prevent external data read operations. If f (Ax, Bx, Cx) is the same as the identification code Φ, then check whether the selected block A, B, C of the copy memory 30 is a damaged block, if it is not a damaged block, it means the memory data of the copy memory 30 The memory data is not authorized, and the memory and its controller prevent external data read operations. If A, B, and C are all damaged blocks, it can be confirmed that the memory data in the duplicate memory 30 is authorized memory data, and the duplicate memory 30 allows external data reading operations and transmits the read data.

要注意的是,虽然复制内存30本身具有储存损坏区块信息,而且不同于原始内存10的储存损坏区块信息,因为内存是由半导体制程在晶圆上形成,而受限于晶圆本身的制程变量,使得每个内存的缺陷不相同,亦即具有不同的损坏区块。因此,内存标记12与内存标记32可分别当作原始内存10与复制内存30的辨识资指纹,亦即本发明的方法是利用内存的硬件特征当作辨识是否为授权内存数据的工具。It should be noted that, although the copy memory 30 itself has damaged block information stored, it is different from the stored damaged block information of the original memory 10 because the memory is formed on a wafer by a semiconductor process and is limited by the size of the wafer itself. Process variables, so that each memory defect is not the same, that is, have different damaged blocks. Therefore, the memory mark 12 and the memory mark 32 can be regarded as the identification fingerprints of the original memory 10 and the copy memory 30 respectively, that is, the method of the present invention uses the hardware characteristics of the memory as a tool for identifying whether it is authorized memory data.

因此,本发明的方法能通过内存的硬件特征以确认是否为授权的内存数据,进而防止非授权复制的内存数据被任意读取或应用,以保护内存数据。Therefore, the method of the present invention can confirm whether it is authorized memory data through the hardware characteristics of the memory, thereby preventing unauthorized copying of the memory data from being read or used arbitrarily, so as to protect the memory data.

以上所述仅为用以解释本发明的较佳实施例,并非企图据以对本发明做任何形式上的限制,因此,凡有在相同发明精神下所作有关本发明的任何修饰或变更,皆仍应包含在本发明意图保护的范畴内。The above descriptions are only preferred embodiments for explaining the present invention, and are not intended to limit the present invention in any form. Therefore, any modification or change of the present invention made under the spirit of the same invention is still valid. It should be included in the intended protection scope of the present invention.

Claims (7)

1. the guard method of an internal storage data, in order to protect an internal storage data of an internal memory, the guard method of this internal storage data may further comprise the steps:
One internal storage data write operation, with a memory marker of this internal memory and an identification code that is calculated through a specific function by this memory marker, be stored to a particular address of this internal memory, then this internal storage data is stored in this internal memory, wherein this memory marker comprises the bad block address of a plurality of bad blocks of this internal memory; And
One internal storage data read operation, when receiving a data read request of an external device, read this memory marker and this identification code of this internal memory, relatively whether identical through a functional value and this identification code that this specific function calculated by this memory marker, and whether the block of checking this internal memory that this memory marker is specified is bad block, if this functional value is identical with this identification code and the block of this internal memory that this memory marker is specified is a bad block, confirm that then this stored internal storage data of this internal memory is an internal storage data of authorizing, and carry out a data read operation and data streams read is sent to this external device, otherwise stop the data read request of this external device.
2. the guard method of internal storage data according to claim 1 saves as a flash memory in wherein being somebody's turn to do.
3. the guard method of internal storage data according to claim 1, wherein this specific function is a max function, in order to choose the maximal value in this bad block address.
4. the guard method of internal storage data according to claim 1, wherein this particular address is the address of this bad block memory block in addition of this internal memory.
5. the guard method of internal storage data according to claim 1, wherein this external device is a personal computer.
6. the guard method of internal storage data according to claim 1, wherein this external device is a mobile computer.
7. the guard method of internal storage data according to claim 1, wherein this external device is a personal digital assistant.
CN200810176011XA 2008-11-06 2008-11-06 How to protect memory data Expired - Fee Related CN101739360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810176011XA CN101739360B (en) 2008-11-06 2008-11-06 How to protect memory data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810176011XA CN101739360B (en) 2008-11-06 2008-11-06 How to protect memory data

Publications (2)

Publication Number Publication Date
CN101739360A CN101739360A (en) 2010-06-16
CN101739360B true CN101739360B (en) 2011-12-28

Family

ID=42462866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810176011XA Expired - Fee Related CN101739360B (en) 2008-11-06 2008-11-06 How to protect memory data

Country Status (1)

Country Link
CN (1) CN101739360B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536481A (en) * 2003-04-09 2004-10-13 英业达股份有限公司 Device and method for updating content of flash memory

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536481A (en) * 2003-04-09 2004-10-13 英业达股份有限公司 Device and method for updating content of flash memory

Also Published As

Publication number Publication date
CN101739360A (en) 2010-06-16

Similar Documents

Publication Publication Date Title
US7418602B2 (en) Memory card
JP4054052B2 (en) Biometric parameter protection USB interface portable data storage device with USB interface accessible biometric processor
CN110851886B (en) storage device
KR101960036B1 (en) Method and apparatus for non volatile storage device
TWI405211B (en) Flash memory storage system, controller and data protecting method thereof
TWI393143B (en) Flash memory storage system, and controller and method for anti-falsifying data thereof
US8302209B2 (en) Data processing methods and devices for reading from and writing to external storage devices
US11157181B2 (en) Card activation device and methods for authenticating and activating a data storage device by using a card activation device
US20120036369A1 (en) Memory identification code generation method, management method, controller, and storage system
CN101785014B (en) Authentication information management device and method thereof, authentication device and method thereof
JP2002281019A (en) Portable information storage medium and authentication method thereof
US8738919B2 (en) Control of the integrity of a memory external to a microprocessor
JP4993114B2 (en) Shared management method for portable storage device and portable storage device
CN117034325B (en) Flash data content encryption method, device, equipment and storage medium
CN101739360B (en) How to protect memory data
CN106295362A (en) A kind of chip self-destroying device and method
CN101739757B (en) Flash memory storage system, controller and data protection method
US20090235365A1 (en) Data access system
US20100146221A1 (en) Method For Protecting Memory Data
US20090271585A1 (en) Data accessing system and related storage device
US7730115B2 (en) System, microcontroller and methods thereof
CN110096457B (en) Hardware control system and hardware control method
CN101533373B (en) data access system
US20130173851A1 (en) Non-volatile storage device, access control program, and storage control method
CN108804930B (en) Mobile phone storage system capable of preventing information from being stolen

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111228

Termination date: 20141106

EXPY Termination of patent right or utility model