[go: up one dir, main page]

CN104598357A - Anti-interference protecting method for data - Google Patents

Anti-interference protecting method for data Download PDF

Info

Publication number
CN104598357A
CN104598357A CN201510076727.2A CN201510076727A CN104598357A CN 104598357 A CN104598357 A CN 104598357A CN 201510076727 A CN201510076727 A CN 201510076727A CN 104598357 A CN104598357 A CN 104598357A
Authority
CN
China
Prior art keywords
data
program
state
state value
state machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510076727.2A
Other languages
Chinese (zh)
Other versions
CN104598357B (en
Inventor
金元兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhaoxun Hengda Technology Co., Ltd
Original Assignee
ZHAOXUN HENGDA MICROELECTRONICS TECHNOLOGY (BEIJING) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHAOXUN HENGDA MICROELECTRONICS TECHNOLOGY (BEIJING) Co Ltd filed Critical ZHAOXUN HENGDA MICROELECTRONICS TECHNOLOGY (BEIJING) Co Ltd
Priority to CN201510076727.2A priority Critical patent/CN104598357B/en
Publication of CN104598357A publication Critical patent/CN104598357A/en
Application granted granted Critical
Publication of CN104598357B publication Critical patent/CN104598357B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-interference protecting method for preventing data of a memory unit from being mistakenly erased. The method comprises the following steps: S1, protecting the partitions: that is, dividing the memory unit of stored data into a plurality of partitions independently controlling the erasing rights; S2, setting a state machine of an erasing program and examining whether the state value of the partition is a predetermined state value or not before the partition executes each command of the erasing program, if so, executing the command and updating the state value; or program error. According to the anti-interference protecting method for data disclosed by the invention, after electronic equipment subjected to an interference program is out of control, program runaway is detected, and program parameters and procedure codes are prevented from being damaged.

Description

The anti-interference guard method of a kind of data
Technical field
The present invention relates to data guard method, the anti-interference guard method that the data relating more specifically to a kind of storage unit for preventing electronic equipment are erased and written by mistake.
Background technology
Electronic equipment has been widely used in the every field of productive life, not only increases production efficiency, also allows the life of people more convenient.But electronic equipment is interfered under severe electromagnetic environment, internal processes operation there will be out of control.If the storage unit of electronic equipment internal is in Full-open state, program may to the erasing of the data execution error in storage unit, write operation.After directly causing electronic equipment to re-power, because data are modified, program cannot normally be run.Strong jamming may cause program to go to the position of erasable data, mistake perform the erasable operation of data, cause data by bug patch.
As shown in Figure 1, memory cell data is destroyed to have following several situation to occur:
Program directly flies to the start address of the 2nd line code, when p, addr, buf and len are stored in internal memory, may revise or wipe the data in any memory unit address space; Most possibly can wipe p page when p, addr and len are constant, and revise the data of len the byte that addr address starts.
Eliminate storage unit write-protect after program fleet, when directly the inside of the 3rd row, the 4th row or the erasable function of data is flown in race more afterwards, the data in storage unit may be destroyed.
Generally speaking, the number of times that code above occurs is more, and the probability that data are erased and written by mistake is larger.The maximum problem of this program is that storage unit unlocks and erasablely can directly sequentially to perform.
The probability may by mistake wiped after program out of control is wherein Pa is the size (unit is byte) in the instruction addressing space of MCU, and Ic is the instruction strip number that possible cause erasing by mistake.Pc is the parameter situation that possible occur, the length as parameter each in program is 8bit, then the span of all parameters is between 0 ~ 255, has 256 values, then Pc is 256.Pv is can by erasable sector number.Ep is the probability of erasing by mistake.Suppose in certain electronic equipment, there is an erasing instruction, and Pa is 65536, Pv be 94, Pc is 256, then after program out of control may is by the probability wiped by mistake
The probability by mistake writing data after program out of control is wherein the definition of Pa, Pc, Pv is with identical above, and Ic may cause the instruction strip number by mistake write, and Ep is the probability by mistake write.If there is one to write instruction in program, and Pa is 65536, Pv when be 48640, Pc being 65536, then write probability after program out of control is by mistake 1 65536 × 48640 65536 ≈ 1 88301 .
Below be only the probability of storage unit maloperation under limiting case, actual probabilities should judge with the actuating logic in conjunction with program, as have invoked 4 (comprise packed after call number) above-mentioned codes in practical situations both, there is 1 package interface, and have call erasable interface 2 times in the inside of encapsulation, the interface after encapsulation has been called 10 times.Final race flies rear storage unit 1 178481 × ( 4 + 10 × 2 ) = 24 178481 , By the probability write by mistake be 1 88301 × ( 4 + 10 × 2 ) = 24 88301 , The probability that memory cell data is destroyed is
Namely program directly may be run and be flown to unblock place and perform erasable, also may run and call place after flying to encapsulation, storage unit finally also may be caused by mistake to be wiped.
Summary of the invention
For the problems referred to above, the object of this invention is to provide the anti-interference guard method of a kind of data, after making electronic equipment be disturbed program out of control, program fleet detected, and defence program parameter and program code itself are not destroyed.
The anti-interference guard method of data of the present invention comprises:
Step one, partition protecting, be divided into the subregion that several control separately its erasable authority by the storage unit of storage data;
Step 2, arrange the state machine of erasable program, before each order performing erasable program for described subregion, check whether its state value is preset state value, is then, fill order also upgrades state value; Otherwise program is run and is occurred mistake, and program enters endless loop until device reset.
Preferably, described subregion is provided with three kinds of states, i.e. guard mode, non-guard mode and lock-out state.
Preferably, described guard mode refers to: the memory cell region be under this state can not directly carry out wiping, write operation, and to carry out wiping, write operation first must cancel write-protect;
Described non-guard mode refers to: the memory cell region be under this state can be wiped arbitrarily, write operation:
Described lock-out state refers to: the memory cell region be under this state can not carry out any wiping, write operation again before device reset.
Preferably, first the anti-interference guard method of described data also comprises carries out partition protecting initialization to the data in storage element, specifically comprises:
A, routine data and supplemental characteristic are stored to different subregion;
B, described routine data place subregion is set to lock-out state;
C, supplemental characteristic place subregion is set to guard mode.
Preferably, the state machine arranging erasable program comprises and carries out initialization to state machine, specifically comprises:
A, the original state value p of state machine is set to 0;
Whether B, inspection original state value p are 0, are then, normal program operation, and upgrading state value is 1, performs next order; Otherwise program run-time error, program enters endless loop until device reset.
Preferably, the anti-interference guard method of described data, comprises and first carries out initialization protection to the storage element of storage data, specifically comprise:
Step one, state machine original state value p is set to 0;
Step 2, routine data place subregion is set to lock-out state, then, before device reset, this sector data can not carry out any wiping, write operation;
Step 3, storage parameter data place subregion is set to guard mode, before de-preservation, cannot wipes corresponding data, write operation;
Whether step 4, inspection original state value p are 0; Then, normal program operation, upgrading state value is 1, performs next order; Otherwise program run-time error, after this program enters endless loop until device reset.
Preferably, the anti-interference guard method of described data also comprises after initialization, protects, specifically comprise when carrying out erasable program to the data of storage element:
The state value p of step one, inspection current state machine
Whether step 2, inspection state value p are preset state value; Then carry out step 3, otherwise jump to step 9;
Step 3, cancel described specified partition parameter protection;
Step 4, renewal state value are p+1;
Step 5, closedown software locks;
Whether step 6, inspection state value p+1 are preset state value; Then carry out step 7, otherwise jump to step 9;
Step 7, amendment designated parameter;
Step 8, open software locks;
Step 9, open software locks;
Step 10, the protection of unlatching specified partition.
The anti-interference guard method of data of the present invention adopts the mode of " state machine+partition protecting " two class protection to protect for program,
Wherein, partition protecting storage unit is divided into several regions that can control separately its erasable authority, and there are three kinds of states in each region, i.e. guard mode, non-guard mode and lock-out state.
Guard mode: the memory cell region be under this state can not directly carry out wiping, write operation, to carry out wiping, write operation first must cancel write-protect;
Non-guard mode: the memory cell region be under this state can be wiped arbitrarily, write operation;
Lock-out state: the memory cell region be under this state can not carry out any wiping, write operation again before device reset.
The execution flow process of described state machine essential record program, namely a state machine state of often advancing must carry out strict status checking, as long as Discovery Status machine is abnormal with regard to endless loop.Finally in cancellation write-protect and the validity checking that state machine must be carried out when carrying out erasable, only just allow to perform when state machine is legal to cancel write-protect and erasable operation.
Wherein in an embodiment, after program brings into operation, first carry out initialization protection according to state machine+partition protecting method to storage unit, step is as follows:
State machine parameter p is set to 0.
Sector, routine data place is set to lock-out state, then, before device reset, this sector data can not carry out any wiping, write operation.
The sector of stored parameter data is set to guard mode, before de-preservation, cannot wipes corresponding data, write operation.
Check whether state machine p is 0.If met, prover normally runs, and state machine is set to 1, performs next order.Otherwise read-me run-time error, after this program enters endless loop until device reset.
Wherein in an embodiment, when modifying to the parameter in storage unit, step is as follows:
1, inspection arranges state machine p
2, whether in the reasonable scope state machine p is checked.If correct, perform step 3-5, otherwise jump to step 9.
3, designated sector parameter protection is cancelled;
4, inspection arranges state machine p;
5, software locks is closed;
6, whether in the reasonable scope state machine p is checked.If correct, perform step 7-8, otherwise jump to step 9.
7, designated parameter is revised;
8, software locks is opened;
9, software locks is opened;
10, designated sector protection is opened.
Wherein, check and arrange in the step of state machine p, first check whether state machine is function input value P.If correct, read-me normally runs, and performs next order after p being set to P+1.Otherwise read-me is out of control, after this program enters endless loop, until Program reset.
Accompanying drawing explanation
Fig. 1 shows the erasable program code not adding protection described in prior art of the present invention;
Fig. 2 shows the schematic diagram of the partition protecting of the anti-interference guard method of data described in one of them embodiment of the present invention;
Fig. 3 shows the initialize flow schematic diagram of the anti-interference guard method of data described in one of them embodiment of the present invention;
Fig. 4 shows the schematic flow sheet of the erasable operation protection of the anti-interference guard method of data described in one of them embodiment of the present invention;
Fig. 5 shows the erasable operation code of part of the anti-interference guard method of data described in one of them embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail, can implement according to this with reference to instructions word to make those skilled in the art.
The anti-interference guard method of data of the present invention adopts the mode of " state machine+partition protecting " two class protection to protect program,
Wherein, partition protecting storage unit is divided into several regions that can control separately its erasable authority, and there are three kinds of states in each region, i.e. guard mode, non-guard mode and lock-out state.
Guard mode: the memory cell region be under this state can not directly carry out wiping, write operation, to carry out wiping, write operation first must cancel write-protect;
Non-guard mode: the memory cell region be under this state can be wiped arbitrarily, write operation;
Lock-out state: the memory cell region be under this state can not carry out any wiping, write operation again before device reset.
The execution flow process of described state machine essential record program, namely a state machine state of often advancing must carry out strict status checking, as long as Discovery Status machine is abnormal with regard to endless loop.Finally in cancellation write-protect and the validity checking that state machine must be carried out when carrying out erasable, only just allow to perform when state machine is legal to cancel write-protect and erasable operation.
Wherein in an embodiment, after program brings into operation, first carry out initialization protection according to state machine+partition protecting method to storage unit, step is as follows:
State machine parameter p is set to 0.
Sector, routine data place is set to lock-out state, then, before device reset, this sector data can not carry out any wiping, write operation.
The sector of stored parameter data is set to guard mode, before de-preservation, cannot wipes corresponding data, write operation.
Check whether state machine p is 0.If met, prover normally runs, and state machine is set to 1, performs next order.Otherwise, read-me run-time error.
Wherein in an embodiment, when modifying to the parameter in storage unit, step is as follows:
1, inspection arranges state machine p
2, whether in the reasonable scope state machine p is checked.If correct, perform step 3-5, otherwise jump to step 9.
3, designated sector parameter protection is cancelled;
4, inspection arranges state machine p;
5, software locks is closed;
6, whether in the reasonable scope state machine p is checked.If correct, perform step 7-8, otherwise jump to step 9.
7, designated parameter is revised;
8, software locks is opened;
9, software locks is opened;
10, designated sector protection is opened.
Wherein, check and arrange in the step of state machine p, first check whether state machine is function input value P.If correct, read-me normally runs, and performs next order after p being set to P+1.Otherwise read-me is out of control.After this program enters endless loop, until Program reset.
As shown in Figure 2, partition protecting storage unit is divided into several regions that can control separately its erasable authority, and there are three kinds of states in each region, i.e. guard mode, non-guard mode and lock-out state.
Guard mode: the memory cell region be under this state can not directly carry out wiping, write operation, to carry out wiping, write operation first must cancel write-protect;
Non-guard mode: the memory cell region be under this state can be wiped arbitrarily, write operation;
Lock-out state: the memory cell region be under this state can not carry out any wiping, write operation again before device reset.
As shown in Figure 3, the anti-interference guard method of data of the present invention, after program brings into operation, first carry out initialization protection to storage unit, step is as follows:
S101, inspection arrange state machine p, are set to 0 by state machine parameter p.
S102, lock program district, be set to lock-out state by sector, routine data place, then, before device reset, this sector data can not carry out any wiping, write operation.
S103, Protection parameters district, the sector by stored parameter data is set to guard mode, before de-preservation, cannot wipe corresponding data, write operation.
S104, inspection arrange state machine p, namely check whether state machine p is 0.If met, prover normally runs, and state machine is set to 1, performs next order.Otherwise, read-me run-time error.After this program enters endless loop, until Program reset.
As described in Figure 4, the anti-interference guard method of data of the present invention, after initialization, when carrying out erasable operation to storage element, it adopts following steps protection:
S201, inspection arrange state machine p
In the reasonable scope whether S202, inspection state machine p.If correct, perform step S203-S205, otherwise jump to step S209.
S203, cancellation designated sector parameter protection;
S204, inspection arrange state machine p;
S205, closedown software locks;
In the reasonable scope whether S206, inspection state machine p.If correct, perform step S207-S208, otherwise jump to step S209.
S207, amendment designated parameter;
S208, open software locks;
S209, open software locks;
S210, the protection of unlatching designated sector.
Fig. 5 shows in the anti-interference guard method of data of the present invention, the code that one section of using state machine+partition protecting mode is protected the data in storage unit.First, to state machine initialization, state machine is set to 0.Then partition protecting initialization is arranged to the data in memory device.Program code is stored in sector 2-11, and supplemental characteristic is stored in sector 12-22.The third line code, by program area data interlock, before guaranteeing to re-power, cannot be modified to program.The sector settings of stored parameter data is guard mode by fourth line code, and the data in sector just can perform erasable operation after only having de-preservation to enter not protect state.After partition protecting initialization completes, executing state machine check renewal rewards theory.Clipped code between the 6th row to the 7th line code.7th walks to the protection that the 10th line code relieves designated sector, the 11st walk to the 14th line code erasable be protection state sector in designated parameter.15th to walk to the 16th line code by sector settings be guard mode.
Suppose 1: program is flown to eighth row and performed cancellation write-protect, will make mistakes, and because state 3 and state 4 are arranged in reception program, cannot wipe by mistake when arranging state machine;
Suppose 2: program is flown to the 10th row and performed the operation of closing software locks, and because Flash write-protect is not opened, and the step of state machine is invalid, cannot wipe by mistake;
Suppose 3: program flies to the 12nd row or the 13rd row, because Flash software lock and write-protect are not all opened, finally cannot perform erasable operation.
The mechanism of this " state machine+partition protecting " security of flow process; no matter PC runs to fly to what address, all impossible directly Flash erase/write, except discontinuous very repeatedly race flies; this probability is each product running error probability when flying, and error probability is less than 2 32/ 1.
Suppose under strong interference environment, chip to run and to fly 1000 times every 1 second, needs continuous working 49 talent under capable and experienced environment may occur the situation that 1 Flash is erased and written by mistake.
Although embodiment of the present invention are open as above, but it is not restricted to listed in instructions and embodiment utilization, it can be applied to various applicable the field of the invention completely, for those skilled in the art, can easily realize other amendment, therefore do not deviating under the universal that claim and equivalency range limit, the present invention is not limited to specific details and illustrates here and the legend described.

Claims (7)

1. the anti-interference guard method of data, comprising:
Step one, partition protecting, be divided into the subregion that several control separately its erasable authority by the storage unit of storage data;
Step 2, arrange the state machine of erasable program, before each order performing erasable program for described subregion, check whether its state value is preset state value, is then, fill order also upgrades state value; Otherwise program is run and is occurred mistake, and program enters endless loop until device reset.
2. the anti-interference guard method of data as claimed in claim 1, it is characterized in that, described subregion is provided with three kinds of states, i.e. guard mode, non-guard mode and lock-out state.
3. the anti-interference guard method of data as claimed in claim 2, it is characterized in that, described guard mode refers to: the memory cell region be under this state can not directly carry out wiping, write operation, and to carry out wiping, write operation first must cancel write-protect;
Described non-guard mode refers to: the memory cell region be under this state can be wiped arbitrarily, write operation;
Described lock-out state refers to: the memory cell region be under this state can not carry out any wiping, write operation again before device reset.
4. the anti-interference guard method of data as claimed in claim 3, is characterized in that, also comprise and first carry out partition protecting initialization to the data in storage element, specifically comprise:
A, routine data and supplemental characteristic are stored to different subregion;
B, described routine data place subregion is set to lock-out state;
C, supplemental characteristic place subregion is set to guard mode.
5. the anti-interference guard method of data as claimed in claim 1, is characterized in that, the state machine arranging erasable program comprises and carries out initialization to state machine, specifically comprises:
A, the original state value p of state machine is set to 0;
Whether B, inspection original state value p are 0, are then, normal program operation, and upgrading state value is 1, performs next order; Otherwise, program run-time error.
6. the anti-interference guard method of data as described in any one of claim 4 or 5, is characterized in that, first carries out initialization protection to the storage element of storage data, specifically comprises:
Step one, state machine original state value p is set to 0;
Step 2, routine data place subregion is set to lock-out state, then, before device reset, this sector data can not carry out any wiping, write operation;
Step 3, storage parameter data place subregion is set to guard mode, before de-preservation, cannot wipes corresponding data, write operation;
Whether step 4, inspection original state value p are 0; Then, normal program operation, upgrading state value is 1, performs next order; Otherwise, program run-time error.
7. the anti-interference guard method of data as claimed in claim 6, is characterized in that, also comprise after initialization, protect, specifically comprise when carrying out erasable program to the data of storage element:
The state value p of step one, inspection current state machine
Whether step 2, inspection state value p are preset state value; Then carry out step 3, otherwise jump to step 9;
Step 3, cancel described specified partition parameter protection;
Step 4, renewal state value are p+1;
Step 5, closedown software locks;
Whether step 6, inspection state value p+1 are preset state value; Then carry out step 7, otherwise jump to step 9;
Step 7, amendment designated parameter;
Step 8, open software locks;
Step 9, open software locks;
Step 10, the protection of unlatching specified partition.
CN201510076727.2A 2015-02-12 2015-02-12 A kind of anti-interference guard method of data Active CN104598357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510076727.2A CN104598357B (en) 2015-02-12 2015-02-12 A kind of anti-interference guard method of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510076727.2A CN104598357B (en) 2015-02-12 2015-02-12 A kind of anti-interference guard method of data

Publications (2)

Publication Number Publication Date
CN104598357A true CN104598357A (en) 2015-05-06
CN104598357B CN104598357B (en) 2018-05-08

Family

ID=53124170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510076727.2A Active CN104598357B (en) 2015-02-12 2015-02-12 A kind of anti-interference guard method of data

Country Status (1)

Country Link
CN (1) CN104598357B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106502585A (en) * 2016-10-13 2017-03-15 深圳Tcl数字技术有限公司 Nor flash storage storage content guard methods and device
CN108984383A (en) * 2017-05-31 2018-12-11 芜湖美的厨卫电器制造有限公司 Detection method, device and the household electrical appliance of program fleet
CN110321078A (en) * 2019-06-18 2019-10-11 海芯科技(厦门)有限公司 A kind of reduction system is disturbed the design method of accidentally erasable single-chip microcontroller MTP data
CN110321672A (en) * 2019-06-28 2019-10-11 兆讯恒达微电子技术(北京)有限公司 A method of generating data field scrambling code
CN111414316A (en) * 2020-03-13 2020-07-14 海芯科技(厦门)有限公司 Electronic scale system structure for improving safety of calibration data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201465572U (en) * 2009-05-15 2010-05-12 Tcl集团股份有限公司 Mistake-proof read-write memory
EP2226810A1 (en) * 2009-03-04 2010-09-08 Apple Inc. Data whitening for writing and reading data to and from a non-volatile memory
CN102122366A (en) * 2010-01-07 2011-07-13 上海华虹集成电路有限责任公司 Method for protecting flash in IC (Integrated Circuit) card chip
CN102867154A (en) * 2012-09-12 2013-01-09 迈普通信技术股份有限公司 Source code protecting method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2226810A1 (en) * 2009-03-04 2010-09-08 Apple Inc. Data whitening for writing and reading data to and from a non-volatile memory
CN201465572U (en) * 2009-05-15 2010-05-12 Tcl集团股份有限公司 Mistake-proof read-write memory
CN102122366A (en) * 2010-01-07 2011-07-13 上海华虹集成电路有限责任公司 Method for protecting flash in IC (Integrated Circuit) card chip
CN102867154A (en) * 2012-09-12 2013-01-09 迈普通信技术股份有限公司 Source code protecting method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴瑾等: ""嵌入式系统稳定性的研究及应用"", 《计算机应用与软件》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106502585A (en) * 2016-10-13 2017-03-15 深圳Tcl数字技术有限公司 Nor flash storage storage content guard methods and device
WO2018068408A1 (en) * 2016-10-13 2018-04-19 深圳Tcl数字技术有限公司 Method and device for protecting storage content of nor flash memory
CN108984383A (en) * 2017-05-31 2018-12-11 芜湖美的厨卫电器制造有限公司 Detection method, device and the household electrical appliance of program fleet
CN110321078A (en) * 2019-06-18 2019-10-11 海芯科技(厦门)有限公司 A kind of reduction system is disturbed the design method of accidentally erasable single-chip microcontroller MTP data
CN110321078B (en) * 2019-06-18 2022-06-17 海芯科技(厦门)有限公司 Method for preventing system from mistakenly erasing MTP data of single chip microcomputer under interference
CN110321672A (en) * 2019-06-28 2019-10-11 兆讯恒达微电子技术(北京)有限公司 A method of generating data field scrambling code
CN110321672B (en) * 2019-06-28 2021-04-09 兆讯恒达科技股份有限公司 Method for generating data area scrambling code
CN111414316A (en) * 2020-03-13 2020-07-14 海芯科技(厦门)有限公司 Electronic scale system structure for improving safety of calibration data

Also Published As

Publication number Publication date
CN104598357B (en) 2018-05-08

Similar Documents

Publication Publication Date Title
CN104598357A (en) Anti-interference protecting method for data
WO2018016199A1 (en) Data overwriting device and data overwriting program
CN106528106B (en) A kind of embedded system start method of adaptive various different Flash chip types
CN105096860B (en) A kind of TFTLCD drive circuits communication means, communicator and system
CN104063477B (en) Embedded system starts abnormal processing method and processing device
US20150154110A1 (en) Data Storage Device and Flash Memory Control Method
CN102567049A (en) Upgrade method of embedded operating system
CN104268448B (en) Using the program code guard method of the microprocessor of flash memory
CN104657258A (en) Method and device for injecting Java bit codes into target process
CN100465910C (en) Method for error protecting and error correcting of flash memory data in products
CN103366814B (en) A kind of flash data security protection circuit and method
TWI530954B (en) Apparatuses for securing software code stored in a non-volatile memory
WO2006064318A1 (en) Method to secure writing in memory against attacks by radiation or other means
JP2010146410A (en) Portable electronic device
CN101925906B (en) Method of masking attainment of end of lifetime of electronic device and device comprising corresponding control module
US7673690B2 (en) Method and apparatus for dynamic application management in sub-sea well installations
CN107145805A (en) A kind of anti-error erasable implementation method of FLASH/MTP internal datas
CN102789426B (en) Method and device for storing information in nonvolatile storage device
CN109977049B (en) Controller, method and system
JP2011227659A (en) Data writing method and system
EP3940566B1 (en) Using a variable write profile for detecting intrusion of a computer program
CN113836600B (en) Embedded Flash error writing protection method
JP2010079686A (en) Data processor, memory control circuit, and memory control method
CN106293531A (en) A kind of method surprisingly distorted based on flash during the flash write-protected SD of preventing use
EP1821214A1 (en) Nonvolatile memory system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Li Li

Inventor after: Jin Yuanbing

Inventor before: Jin Yuanbing

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100080, Beijing, Suzhou Street, Haidian District No. 20, building 2, on the north side of the four floor

Patentee after: Zhaoxun Hengda Technology Co., Ltd

Address before: 100080, Beijing, Suzhou Street, Haidian District No. 20, building 2, on the north side of the four floor

Patentee before: MEGAHUNT MICROELECTRONIC TECH. (BEIJING) Co.,Ltd.

CP01 Change in the name or title of a patent holder