Flash memory encryption method and device, computing device, and computer storage medium

An encryption method and flash memory technology, applied in the storage field, can solve the problems of flash memory piracy, encryption increment, flash memory expansion, etc., and achieve the effects of increasing the difficulty of reverse compilation, reducing the volume of flash memory, and reducing storage power consumption.

Inactive Publication Date: 2019-03-05
FUTUREPATH TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, flash reverse developers or flash reverse products often can easily obtain the source code in flash memory by decompiling flash memory, which makes piracy and repackaging of flash memory emerge in endlessly
[0003] However, the inventor found in the process of implementing the present invention that the above-mentioned method in the prior art has at least the following defects: currently, in the process of decompiling the flash memory, the execution logic of the flash memory can often be easily obtained through reverse compilation; and, Existing encryption methods tend to expand the flash memory after encrypting the flash memory, resulting in encryption increments, thus occupying more storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flash memory encryption method and device, computing device, and computer storage medium
  • Flash memory encryption method and device, computing device, and computer storage medium
  • Flash memory encryption method and device, computing device, and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] figure 1 A schematic flowchart of a method for encrypting a flash memory provided according to an embodiment of the present invention is shown. like figure 1 As shown, the method includes:

[0027] In step S110, the flash memory is scanned, and the ciphertext index fragments contained in the flash memory are obtained according to the scanning result.

[0028] Wherein, this embodiment does not limit the use of flash memory...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a flash memory encryption method and device, a computing device and a computer storage medium. The method comprises the following steps: scanning the flash memory; obtaining ciphertext index slices contained in the flash memory according to the scanning result; when it is determined that the obtained ciphertext index fragment conforms to the preset instruction addition rule, adding the instruction content corresponding to the ciphertext index fragment to the common storage node; replacing a ciphertext index slice contained in the flash memory with a copy instruction corresponding to the ciphertext index slice, wherein a copy instruction corresponding to the ciphertext index fragment is used to copy into the common storage node and execute instruction content corresponding to the ciphertext index fragment in the common storage node. The scheme can confuse the reverse compilation logic of flash memory, improve the reverse compilation difficulty of flash memory, and realize the encryption of flash memory. And the volume of the flash memory can be further reduced and the storage power consumption can be reduced.

Description

technical field [0001] The invention relates to the field of storage technology, in particular to a flash memory encryption method and device, computing equipment, and a computer storage medium. Background technique [0002] With the continuous development of science and technology and society, the number of various flash memory is also increasing rapidly. However, flash reverse developers or flash reverse products can easily obtain the source code in flash memory through decompilation of flash memory, which makes piracy and repackaging of flash memory emerge in endlessly. [0003] However, the inventor found in the process of implementing the present invention that the above-mentioned method in the prior art has at least the following defects: currently, in the process of decompiling the flash memory, the execution logic of the flash memory can often be easily obtained through reverse compilation; and, Existing encryption methods tend to expand the flash memory after encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79G06F21/72
CPCG06F21/79G06F21/72
Inventor 肖军
Owner FUTUREPATH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products