patents.google.com

CN103258172A - Off-chip Nor Flash bus interface hardware encryption device - Google Patents

  • ️Wed Aug 21 2013

CN103258172A - Off-chip Nor Flash bus interface hardware encryption device - Google Patents

Off-chip Nor Flash bus interface hardware encryption device Download PDF

Info

Publication number
CN103258172A
CN103258172A CN2013101334128A CN201310133412A CN103258172A CN 103258172 A CN103258172 A CN 103258172A CN 2013101334128 A CN2013101334128 A CN 2013101334128A CN 201310133412 A CN201310133412 A CN 201310133412A CN 103258172 A CN103258172 A CN 103258172A Authority
CN
China
Prior art keywords
data
flash
aes
bus interface
decryption
Prior art date
2012-06-13
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101334128A
Other languages
Chinese (zh)
Inventor
宋慰云
林峰
陈挺立
汪孝晃
叶明统
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN WITSI MICRO-ELECTRONICS Co Ltd
Original Assignee
FUJIAN WITSI MICRO-ELECTRONICS Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
2012-06-13
Filing date
2013-04-17
Publication date
2013-08-21
2013-04-17 Application filed by FUJIAN WITSI MICRO-ELECTRONICS Co Ltd filed Critical FUJIAN WITSI MICRO-ELECTRONICS Co Ltd
2013-04-17 Priority to CN2013101334128A priority Critical patent/CN103258172A/en
2013-08-21 Publication of CN103258172A publication Critical patent/CN103258172A/en
Status Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an off-chip Nor Flash bus interface hardware encryption device which comprises an EMI (external memory interface), a data reading decryption passage, a data reading bypass passage, a data writing passage and an AES (advanced encryption standard) encryption engine, wherein the EMI is used for CPU (central processing unit) extensible external memories, the three passages connects the EMI with external Nor Flash memories, the AES encryption engine is connected between a CPU and the data reading decryption passage and used for plaintext data encryption, and the data reading decryption passage comprises an address analyzing unit, an address comparing unit, an indication control unit, a cipher text buffer unit, an AES decryption engine, a plaintext buffer unit and a secret key storage unit. Hardware-software combination is used to provide data encryption for off-chip Nor Flash memories. The device supports a bypass function, data can be written into off-chip Nor Flash memories in plaintext and read in plaintext, so that data storage flexibility is achieved. By the device which is flexible in extensibility, easy to design, high in reliability and safety and the like, Nor Flash bus interface encryption is achieved.

Description

The outer Nor Flash bus interface hardware encipher device of a kind of chip slapper

Technical field

The present invention relates to computer science, information security, built-in terminal field, particularly the outer Nor Flash memory bus interface encryption technology field of sheet.

Background technology

The Flash storer is owing to have characteristics such as little, low in energy consumption, the intrinsic involatile of volume, reliable and stable, data holding time are long, its erasable number of times nearly 100,000 times, Data Update speed is fast more a lot of than EEPROM, under powering-off state, also can preserve data, be widely used in the embedded product, be used for preserving some important configuration informations; In addition, a kind of as in the Flash storer of Nor Flash has and can read data, the fast characteristics of reading speed at random; Supporting pieces moves on using, and program can directly be moved in FLASH, and need not to import other data storage device; Therefore, a lot of embedded products and application system thereof all use Nor Flash as the storer of program and data.

But, because Nor Flash memory interface sequential logic is fairly simple, only address bus, data bus and control bus; Illegal rival can be by reading data on the Nor Flash memory chip, by plagiarizing or the replicated product circuit board, can copy other people product easily or crack data on the product sheet, form unequal competition, not only encroach on rival's rights and interests, also the interests of serious harm End-Customer; Therefore, some Nor Flash producers increase safety protection function at Nor Flash chip, protect information security; Adopt the Krypto safety technique as Micro company, this technology can and be wiped protection scheme strengthening system level protection mechanism by reading and writing, protects the data information security on the Nor Flash sheet; But, in system work process, still can be by instrument monitoring bus signals such as logic analysers, to reach the purpose that cracks data on the sheet.

Software scenario is generally adopted in data protection to Nor Flash now, earlier data encryption then programming to Nor Flash; When using data, the data of crossing by reading encrypted in system also use software to be decrypted; There is following defective in this implementation: the first, and data must be encrypted programming more earlier, the disappearance dirigibility; The second, generally use same key that data are encrypted, namely key is single, if support the key that each product is different, produces and software output complexity; The 3rd, one of key is to exist when data encryption and use, and another is to solidify in software, all has potential safety hazard, namely has easily the risk by other people steal.

The AES cryptographic algorithm is that (Advanced Encryption Standard AES), claims the Rijndael enciphered method again, is a kind of block encryption standard that Federal Government adopts for Advanced Encryption Standard in the cryptography; This standard is used for substituting original DES, analyzed in many ways and widely the whole world use; Through the selection flow process in 5 years, Advanced Encryption Standard was published on FIPS PUB 197 by National Institute of Standards and Technology (NIST) November 26 calendar year 2001, and became effective standard on May 26th, 2002; Aes algorithm is a kind of symmetric key algorithm, namely uses identical secret key encryption and data decryption; At present, the software and hardware of aes algorithm is realized all ripe.

Summary of the invention

The technical problem to be solved in the present invention is to reach data information security on the protection Nor Flash sheet for the outer Nor Flash bus interface of sheet provides a kind of data encrypting and deciphering technical method.

The present invention is achieved in that the outer Nor Flash bus interface hardware encipher device of a kind of chip slapper, it is characterized in that, comprising: external bus interface EMI is used for CPU expansion external memory storage; Be connected to three passages of external bus interface and outside Nor Flash storer: data read decryption channel, data read bypass channel and data write passage, and described three passages are realized the read-write operation of the storer of CPU; AES crypto engine: connect between CPU processor and the data read decryption channel, be used for clear data and encrypt.

Described data read decryption channel comprises address resolution unit, address comparing unit, reading control module, ciphertext buffer cell, AES decryption engine, the plaintext buffer cell that connects successively, wherein the address comparing unit also connects expressly buffer cell, reading control module, ciphertext buffer cell also are connected to outside Nor Flash storer, address resolution unit and plaintext buffer cell are connected to external bus interface EMI respectively, key storing unit connects AES decryption engine and AES crypto engine respectively, is used for the storage AES key.

Described data write passage and are not with the automatic encryption function of hardware; For non-vital data, data can be by the software outside Nor Flash storer that writes direct; For security information, data write outside Nor Flash storer after can using hardware cryptographic engine to encrypt earlier again.

Described data read decryption channel adopts hardware-accelerated realization, can directly read clear data to the enciphered data that is stored on the outside Nor Flash storer by bus; And directly read the data that are stored on the Nor Flash by the data read bypass channel.

Described AES data encrypting and deciphering is piecemeal, and it reads that to write all be to be unit with the encryption and decryption piece concerning outside Nor Flash storer.

Described key for the AES encryption and decryption produces at random, when each software upgrading, be updated to key storing unit automatically synchronously, this key after entering personal code work, has only AES crypto engine, AES decryption engine to visit by safe Boot control on the sheet.

Described ciphertext buffer cell and plaintext buffer cell are that piecemeal is read and is stored in the ciphertext buffer cell when reading ciphertext from outside Nor Flash storer, then through being stored in expressly buffer cell after the deciphering of AES decryption engine again; CPU reads required data from interface bus afterwards, but realizes execution pattern on the supporting pieces.

The cryptographic algorithm of described AES crypto engine also can realize with software.

The invention has the advantages that: the outer Nor Flash bus interface hardware encipher device of chip slapper of the present invention, use aes algorithm, by the encryption of hardware realization to bus interface, its key is by producing at random, be stored in certain storage unit on the SOC sheet, this storage unit starts the back by top BOOT control in system, has only AES encryption and decryption engine to visit after the control; The present invention uses the scheme of software and hardware combining, and being embodied as the outer Nor Flash storage of sheet provides data encryption, and software is realized writing Nor Flash after a data that will write Nor Flash is encrypted through hardware cryptographic engine; Automatic deciphering is read hardware realizes reading data from Nor Flash after; The present invention is by encryption, the decryption mechanisms of separate type, and by pass mechanism is provided, for product development provides more flexibility, have expansion flexibly, design easily, characteristics such as good reliability, degree of safety height.

Description of drawings

The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.

Fig. 1: the present invention's logic and application schematic block diagram.

Embodiment

Relevant feature of the present invention and technology contents please refer to following detailed description and accompanying drawing, and accompanying drawing only provides reference and explanation, and the present invention is limited.

Fig. 1 is the logic of the outer Nor Flash bus interface hardware encipher device of a kind of chip slapper of the present invention and uses schematic block diagram; On the whole, master cpu is connected with outside Nor Flash storer and reference-to storage by external interface bus EMI.

External bus interface encryption and decryption of the present invention partly comprises: external bus interface EMI: be used for CPU expansion external memory storage; Three passages that connect external bus interface and Nor Flash storer: data read decryption channel, data read bypass channel and data write passage; AES crypto engine: be used for clear data and encrypt; Wherein, the data read decryption channel comprises address resolution unit, address comparing unit, reading control module, ciphertext buffer cell, AES decryption engine, plaintext buffer cell, key storing unit.

Encryption and decryption of the present invention is used aes algorithm, is example to use 128 keys, and data must be that unit is encrypted and decryption processing with 128; But bus interface generally is 8,16 or 32, and Nor Flash commonly used generally is 16; Therefore, bus data will carry out encryption and decryption, will read the storer piecemeal; The reading control module plays this effect among Fig. 1; In addition, because block data can not directly deliver on the bus again, even the data after the deciphering, so increased by two buffer zones, i.e. ciphertext buffer cell and expressly buffer cell; The ciphertext buffer cell is deposited the block data of reading from Nor Flash storer, and expressly buffer cell is deposited the clear data to generating after the decrypt ciphertext.

Its data read decryption channel is work like this:

1) send when reading Nor Flash data command as CPU, at first address resolution unit is resolved the address information on the bus, decomposites piecemeal entry address and piece bias internal address;

2) whether by the address comparing unit compared in the piecemeal entry address that parses, it is consistent with the entry address of analyzing the data loading last time to compare this entry address again;

3) if comparison address unanimity illustrates that then this block data loads, namely the data that will read have left in the plaintext buffer cell; Then, according to the piece bias internal address that the first step is resolved, obtain data from the corresponding skew of plaintext buffer cell, output on the data bus; Master cpu just reads desired data like this, and this situation is called hits;

4) if comparison address and to be loaded into port address last time inconsistent is called in the unnatural death, then give the reading control module with this new port address that is loaded into;

5) reading control once loads 128 (i.e. 16 bytes) data to the ciphertext buffer cell according to the configuration of Nor Flash interface sequence the Nor Flash storer outside sheet;

6) notice AES decryption engine was decrypted ciphertext after data loaded and finish, and put into expressly buffer cell after the generation expressly;

7) clear data generates the piece bias internal address that resolve according to the first step back, from expressly cushioning corresponding skew obtains data, outputs on the data bus, and master cpu just reads desired data like this.

Above-mentioned is the process that reads of enciphered data; To writing of enciphered data, data of the present invention write passage and are not with the automatic encryption function of hardware; Storing Nor Flash after whether data need to encrypt into is to be realized determining by software; According to user's needs, for non-vital data, data can not be encrypted by the software Nor Flash that writes direct; For security information, data write Nor Flash after can using hardware cryptographic engine to encrypt earlier again; Be that the present invention uses a kind of scheme of software and hardware combining that enciphered data is written in the Nor Flash storer; This method can namely be stored security information such as important program and data for the user is implemented on the Nor Flash memory bank, also stores other non-important program and data; Data write this realization mechanism of passage, also for system support the Nor Flash chip of various models provide may and convenient; Because, Nor Flash to different model, its control command or time sequential routine may be inconsistent, if use pure hardware encipher to write realization, certainly will be various Nor Flash control commands or the different logic of sequential realization, in the complexity that increases design, the dirigibility of the system of reduction.

Be not encrypted for non-significant data and be stored in Nor Flash, the mechanism that the present invention is not decrypted when also supporting data read in design, namely the data read bypass channel is realized.

Among the present invention, AES encrypts, decryption engine all will be used AES key; This key is stored in key storing unit; AES key generates at random by the random number generation module, generates automatically when every software upgrading and renewal synchronously; This key storing unit is controllable in design, can dispose by software, makes this unit not controlled by CPU, and can only be read by AES crypto engine and decryption engine; Realize this control by top Boot on using, in case system jumps out top Boot like this, the user just again can't visit this AES key; Thereby guarantee that in whole software code operational process, program can not touch key, guaranteed that key can not reveal; Because top Boot is realized and maintenance by production producer, therefore can guarantee that this key is shielded, guarantee that also this key can be by random distorting (do not distort the ciphertext that will cause storing and can't recover its cleartext information) simultaneously.

The above is the specific embodiment of the present invention, and in order to limit the present invention, in the technical scope that the present invention discloses, any modification and replacement that the present invention is made all should not be encompassed within protection scope of the present invention.

Claims (8)

1. the outer Nor Flash bus interface hardware encipher device of chip slapper is characterized in that, comprising: external bus interface EMI is used for CPU expansion external memory storage; Be connected to three passages of external bus interface and outside Nor Flash storer: data read decryption channel, data read bypass channel and data write passage, and described three passages are realized the read-write operation of the storer of CPU; AES crypto engine: connect between CPU processor and the data read decryption channel, be used for clear data and encrypt.

2. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 1, it is characterized in that: described data read decryption channel comprises the address resolution unit that connects successively, the address comparing unit, the reading control module, the ciphertext buffer cell, the AES decryption engine, the plaintext buffer cell, wherein the address comparing unit also connects expressly buffer cell, the reading control module, the ciphertext buffer cell also is connected to outside Nor Flash storer, address resolution unit and plaintext buffer cell are connected to external bus interface EMI respectively, key storing unit connects AES decryption engine and AES crypto engine respectively, is used for the storage AES key.

3. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 1, it is characterized in that: described data write passage and are not with the automatic encryption function of hardware; For non-vital data, data can be by the software outside Nor Flash storer that writes direct; For security information, data write outside Nor Flash storer after can using hardware cryptographic engine to encrypt earlier again.

4. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 1, it is characterized in that: the data read decryption channel adopts hardware-accelerated realization, and the enciphered data that is stored on the outside Nor Flash storer is directly read clear data by bus; And directly read the data that are stored on the Nor Flash by the data read bypass channel.

5. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 1, it is characterized in that: described AES data encrypting and deciphering is piecemeal, it reads that to write all be to be unit with the encryption and decryption piece concerning outside Nor Flash storer.

6. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 2, it is characterized in that: described AES key produces at random, when each software upgrading, be updated to key storing unit automatically synchronously, this key is by safe Boot control on the sheet, after entering personal code work, have only AES crypto engine and AES decryption engine to visit.

7. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 2, it is characterized in that: described ciphertext buffer cell and plaintext buffer cell are that piecemeal is read and is stored in the ciphertext buffer cell when reading ciphertext from outside Nor Flash storer, then through being stored in expressly buffer cell after the deciphering of AES decryption engine again; CPU reads required data from interface bus afterwards, but realizes execution pattern on the supporting pieces.

8. the outer Nor Flash bus interface hardware encipher device of chip slapper according to claim 1, it is characterized in that: the cryptographic algorithm of described AES crypto engine can realize with software.

CN2013101334128A 2012-06-13 2013-04-17 Off-chip Nor Flash bus interface hardware encryption device Pending CN103258172A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101334128A CN103258172A (en) 2012-06-13 2013-04-17 Off-chip Nor Flash bus interface hardware encryption device

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201220277379.7 2012-06-13
CN201220277379 2012-06-13
CN2013101334128A CN103258172A (en) 2012-06-13 2013-04-17 Off-chip Nor Flash bus interface hardware encryption device

Publications (1)

Publication Number Publication Date
CN103258172A true CN103258172A (en) 2013-08-21

Family

ID=48962079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101334128A Pending CN103258172A (en) 2012-06-13 2013-04-17 Off-chip Nor Flash bus interface hardware encryption device

Country Status (1)

Country Link
CN (1) CN103258172A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104750636A (en) * 2013-12-31 2015-07-01 环达电脑(上海)有限公司 SOC (system on chip) based application expanding device
CN106383790A (en) * 2016-08-26 2017-02-08 北京智芯微电子科技有限公司 Bus management unit and high safety system on chip
CN107808099A (en) * 2016-09-08 2018-03-16 北京自动化控制设备研究所 Embedded software encryption/deciphering system and method
CN107979608A (en) * 2017-12-09 2018-05-01 天津津航计算技术研究所 The data encrypting and deciphering Transmission system and transmission method that a kind of interface can configure
CN108563964A (en) * 2018-05-09 2018-09-21 武汉大学 The encryption device and method of ephemeral data in a kind of external RAM of FPGA
CN108667793A (en) * 2018-03-13 2018-10-16 大族激光科技产业集团股份有限公司 A kind of hardware cryptographic devices based on PROFIBUS buses
CN111492353A (en) * 2018-08-15 2020-08-04 华为技术有限公司 Safe data transfer device, system and method
CN112363956A (en) * 2020-11-11 2021-02-12 上海磐启微电子有限公司 Method and device for encrypting and decrypting FLASH memory
TWI722496B (en) * 2019-06-20 2021-03-21 慧榮科技股份有限公司 Method and apparatus for encrypting and decrypting user data
CN113220498A (en) * 2021-05-08 2021-08-06 青芯半导体科技(上海)有限公司 Embedded Flash controller supporting encrypted storage
US11132304B2 (en) 2017-11-01 2021-09-28 Realtek Semiconductor Corporation Data accessing device and method
CN118484177A (en) * 2024-06-13 2024-08-13 武汉芯必达微电子有限公司 A method for implementing an extensible debugging tool with encryption function

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051892A (en) * 2007-03-14 2007-10-10 江中尧 Enciphering device and method for CPU special data
WO2009136161A1 (en) * 2008-05-08 2009-11-12 John Michael Data encryption device
CN102054137A (en) * 2009-11-10 2011-05-11 美信集成产品公司 Block encryption security for integrated microcontroller and external memory system
CN102436423A (en) * 2011-10-13 2012-05-02 浙江大学 Controller and method for protecting NorFlash core data outside universal sheet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051892A (en) * 2007-03-14 2007-10-10 江中尧 Enciphering device and method for CPU special data
WO2009136161A1 (en) * 2008-05-08 2009-11-12 John Michael Data encryption device
CN102054137A (en) * 2009-11-10 2011-05-11 美信集成产品公司 Block encryption security for integrated microcontroller and external memory system
CN102436423A (en) * 2011-10-13 2012-05-02 浙江大学 Controller and method for protecting NorFlash core data outside universal sheet

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104750636A (en) * 2013-12-31 2015-07-01 环达电脑(上海)有限公司 SOC (system on chip) based application expanding device
CN106383790A (en) * 2016-08-26 2017-02-08 北京智芯微电子科技有限公司 Bus management unit and high safety system on chip
CN107808099A (en) * 2016-09-08 2018-03-16 北京自动化控制设备研究所 Embedded software encryption/deciphering system and method
CN107808099B (en) * 2016-09-08 2021-03-16 北京自动化控制设备研究所 Embedded software encryption/decryption system and method
US11132304B2 (en) 2017-11-01 2021-09-28 Realtek Semiconductor Corporation Data accessing device and method
CN107979608B (en) * 2017-12-09 2021-02-12 天津津航计算技术研究所 Interface-configurable data encryption and decryption transmission system and transmission method
CN107979608A (en) * 2017-12-09 2018-05-01 天津津航计算技术研究所 The data encrypting and deciphering Transmission system and transmission method that a kind of interface can configure
CN108667793A (en) * 2018-03-13 2018-10-16 大族激光科技产业集团股份有限公司 A kind of hardware cryptographic devices based on PROFIBUS buses
CN108563964A (en) * 2018-05-09 2018-09-21 武汉大学 The encryption device and method of ephemeral data in a kind of external RAM of FPGA
CN111492353A (en) * 2018-08-15 2020-08-04 华为技术有限公司 Safe data transfer device, system and method
CN111492353B (en) * 2018-08-15 2023-07-18 华为技术有限公司 Safe data transfer device, system and method
US11888827B2 (en) 2018-08-15 2024-01-30 Huawei Technologies Co., Ltd. Secure data transfer apparatus, system, and method
TWI722496B (en) * 2019-06-20 2021-03-21 慧榮科技股份有限公司 Method and apparatus for encrypting and decrypting user data
US11651707B2 (en) 2019-06-20 2023-05-16 Silicon Motion, Inc. Method and apparatus for encrypting and decrypting user data
CN112363956A (en) * 2020-11-11 2021-02-12 上海磐启微电子有限公司 Method and device for encrypting and decrypting FLASH memory
CN113220498A (en) * 2021-05-08 2021-08-06 青芯半导体科技(上海)有限公司 Embedded Flash controller supporting encrypted storage
CN118484177A (en) * 2024-06-13 2024-08-13 武汉芯必达微电子有限公司 A method for implementing an extensible debugging tool with encryption function

Similar Documents

Publication Publication Date Title
CN103258172A (en) 2013-08-21 Off-chip Nor Flash bus interface hardware encryption device
US11347898B2 (en) 2022-05-31 Data protection device and method and storage controller
US20170046281A1 (en) 2017-02-16 Address dependent data encryption
CN101782956B (en) 2012-06-13 Method and device for protecting data on basis of AES real-time encryption
US20190384938A1 (en) 2019-12-19 Storage apparatus and method for address scrambling
US10013363B2 (en) 2018-07-03 Encryption using entropy-based key derivation
KR100445406B1 (en) 2004-08-25 Apparatus for encrypting the data and method therefor
CN202650015U (en) 2013-01-02 System for access of encrypted memory
US20180074975A1 (en) 2018-03-15 Multi-stage memory integrity method and apparatus
CN102436423A (en) 2012-05-02 Controller and method for protecting NorFlash core data outside universal sheet
CN103154963A (en) 2013-06-12 Scrambling an address and encrypting write data for storing in a storage device
JP2020535693A (en) 2020-12-03 Storage data encryption / decryption device and method
CN105095945A (en) 2015-11-25 SD card capable of securely storing data
JP2020529758A (en) 2020-10-08 Equipment and methods for encrypting and decrypting stored data
CN202870835U (en) 2013-04-10 External chip RAM bus interface hardware encryption device
CN102541762A (en) 2012-07-04 Data protector for external memory and data protection method
EP2990953B1 (en) 2017-10-04 Periodic memory refresh in a secure computing system
CN103246852A (en) 2013-08-14 Enciphered data access method and device
CN110659506A (en) 2020-01-07 Replay protection of memory based on key refresh
CN109492418A (en) 2019-03-19 A kind of safe encrypting and deciphering system of general dsp based on aes algorithm
CN112887077B (en) 2023-04-21 SSD main control chip random cache confidentiality method and circuit
US20210004495A1 (en) 2021-01-07 Method and apparatus for encrypting and decrypting data on an integrated circuit
CN213876729U (en) 2021-08-03 Random cache secret circuit of SSD main control chip
CN104077243A (en) 2014-10-01 SATA hard disc device encryption method and system
CN107861892B (en) 2021-08-03 Method and terminal for realizing data processing

Legal Events

Date Code Title Description
2013-08-21 C06 Publication
2013-08-21 PB01 Publication
2013-09-18 C10 Entry into substantive examination
2013-09-18 SE01 Entry into force of request for substantive examination
2017-06-06 RJ01 Rejection of invention patent application after publication
2017-06-06 RJ01 Rejection of invention patent application after publication

Application publication date: 20130821