A method for managing a security program library supporting data storage and an electronic device

A technology of security program and electronic device, which is applied in computer security device, input/output process of data processing, electronic digital data processing, etc., can solve problems such as data destruction and tampering, and achieve the effect of optimizing performance

Pending Publication Date: 2021-02-26
ARTERY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the secondary development, these data may be destroyed unintentionally, or even tampered with intentionally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for managing a security program library supporting data storage and an electronic device
  • A method for managing a security program library supporting data storage and an electronic device
  • A method for managing a security program library supporting data storage and an electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] figure 1 It is a schematic diagram of an electronic device 100 according to an embodiment of the present invention. The electronic device 100 may include at least one processor (for example, one or more processors) such as a processor 110, a memory controller 120, and a non-volatile memory 130, wherein the at least one processor such as the processor 110 may have a A debug port (debug port) DEBUG_PORT, a data port D_PORT and an instruction port I_PORT. For example, the non-volatile memory 130 can be a flash memory (Flash memory), but the invention is not limited thereto. In addition, the memory controller 120 may be coupled to at least one processor such as the processor 110 and the non-volatile memory 130 . In particular, the processor 110 can be coupled to the memory controller 120 through a bus to access the non-volatile memory 130 under the control of the memory controller 120 . based on figure 1 In the architecture shown, the processor 110 can respectively perf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for managing a security program library supporting data storage and an electronic device. The method comprises the following steps: respectively configuring at least one first sub-region and at least one second sub-region in a security program library region in a nonvolatile memory as an instruction region and a data region of the security program library; after the security program library is enabled, prohibiting any write operation and any erase operation from being applied to the security program library area by using a memory controller so as to protect thepredetermined instruction and the predetermined data respectively located in the instruction area and the data area; and after the security program library is enabled, reading the instruction area and the data area by using at least one processor through an instruction port and a data port of the at least one processor respectively. According to the invention, the security program library supporting data storage can be realized under the condition that the overall efficiency is not reduced, and the optimization efficiency of the electronic device is achieved.

Description

technical field [0001] The present invention relates to the control of electronic products, in particular to a method and electronic device for managing a secure library supporting data storage. Background technique [0002] A program library in the related art can store program codes for further use. For example, these program codes can be executed, but cannot be read or rewritten by users. A solution provider can sell integrated circuit products pre-recorded with these program codes to system manufacturers for secondary development. Since these program codes cannot be read or rewritten, such a mechanism helps to protect these program codes from being stolen in order to maintain such a business model. However, certain problems may occur. For example, the program library in the related art can only store instructions. In typical cases, data must be stored elsewhere. During the secondary development, these data may be destroyed unintentionally, or even tampered with inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79G06F21/71
CPCG06F21/79G06F21/71G06F21/6218G06F21/85G06F3/0644G06F3/0623G06F3/0679G06F21/604G06F3/0659
Inventor 赖俊元
Owner ARTERY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products