摘要:
A method includes configuring a flash memory device including a first memory sector having a primary memory sector correspondence, a second memory sector having an alternate memory sector correspondence, and a third memory sector having a free memory sector correspondence, copying a portion of the primary memory sector to the free memory sector, erasing the primary memory sector, and changing a correspondence of each of the first memory sector, the second memory sector, and the third memory sector.
摘要:
A method includes configuring a flash memory device including a first memory sector having a primary memory sector correspondence, a second memory sector having an alternate memory sector correspondence, and a third memory sector having a free memory sector correspondence, copying a portion of the primary memory sector to the free memory sector, erasing the primary memory sector, and changing a correspondence of each of the first memory sector, the second memory sector, and the third memory sector.
摘要:
A method includes configuring a flash memory device including a first memory sector having a primary memory sector correspondence, a second memory sector having an alternate memory sector correspondence, and a third memory sector having a free memory sector correspondence, copying a portion of the primary memory sector to the free memory sector, erasing the primary memory sector, and changing a correspondence of each of the first memory sector, the second memory sector, and the third memory sector.
摘要:
In a value dispensing system, a system and method for securely loading and executing software in a secure device that does not include any non-volatile programmable memory is provided. A non-secure portion of the value dispensing system stores software for loading into the secure portion when needed. Commands being sent to the secure printer are monitored to determine if the secure has the necessary software to execute the command. If the secure device currently does not have the necessary software to execute the command, the command is delayed and the proper software is loaded from the non-secure portion to the RAM of the secure device. A signature associated with the software is verified to ensure the authenticity of the software. If the signature is verified, the command is passed to the secure device, and, utilizing the software in the RAM, the command is executed by the secure device.
摘要:
Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.
摘要:
Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.
摘要:
A method and system that allows for large amounts of data to be printed utilizing a small memory is provided. The complete image to be printed on the print medium is separated into different regions each having associated print data. The memory device, while being too small to store all of the print data for the full image, is capable of storing the print data associated with each region. The print data for each region is released from the print head controller to the memory device for printing in a timed fashion based on movement of the print medium. The print data for a subsequent region will not be passed to the memory until the print medium has moved a sufficient distance, thereby indicating that printing of the preceding region has been completed.
摘要:
A system and method for efficient uncorrectable error detection in flash memory is described. A microcontroller including a non-volatile flash memory utilizes an Error Correction Code (ECC) having a certain error detection and correction bit strength. The user data is first processed by a hash function and hash data is stored with the user data. Then, the user data and hash data are processed by the ECC system. In detection, the hash ensures that a relatively low bit-strength ECC system did not incorrectly manipulate the user data. Such a hash integrity check provides an efficient, robust detection of incorrectly corrected user data resulting from errors beyond the correction but strength of the ECC system utilized.
摘要:
A system and method for efficient uncorrectable error detection in flash memory is described. A microcontroller including a non-volatile flash memory utilizes an Error Correction Code (ECC) having a certain error detection and correction bit strength. The user data is first processed by a hash function and hash data is stored with the user data. Then, the user data and hash data are processed by the ECC system. In detection, the hash ensures that a relatively low bit-strength ECC system did not incorrectly manipulate the user data. Such a hash integrity check provides an efficient, robust detection of incorrectly corrected user data resulting from errors beyond the correction but strength of the ECC system utilized.
摘要:
A method includes receiving at a sub-program a request from an external entity the request comprising at least one parameter and a return address, utilizing the return address and an address list associated with the sub-program to authenticate the external entity, and processing the request if the external entity is authenticated.