Design and Implementation of Multi-level Interaction Memory Controller
YU Bin① FENG Li① GONG Bi① KONG Zhiyin②
①(PLA Information Engineering University, Zhengzhou 450004, China) ②(Science and Technology on Information Assurance Laboratory, Beijing 100072, China)
Abstract:Considering the problem of data interaction in multi-level information environment, a multi-level interaction memory controller is designed and implemented. On the basis of the interactive model design, the overall structure of the controller is constructed. The key modules of memory system and interactive control logic are designed in detail, and a prototype system is used to complete multi-level information interaction in term of user strategy. The experimental results show that the multi-level interactive memory controller can be configured according to users’ actual needs, and the multi-level information interaction function can be realized, which is significant to the information hierarchical management.
ZHANG Pengjian and SANG Hongshi. High-performance memory controller design based on SOC[J]. Journal of Microelectronics and Computers, 2016, 33(5): 37-41.
ZHANG Yujia, YANG Xiaofei, and YAO Hangzhong. Based on the satellite receiver AXI4 DDR3 multi-port storage design [J]. Chinese Journal of Electron Devices, 2016, 39(3): 617-622. doi:10.3969/j.issn.1005-9490.2016.03.023.
[3]
GOPALAKRISHNAN L. R QDR II SRAM Interface for Virtex-5 Devices[R]. XAPP853 (v1.3) June 7, 2010.
[4]
CHIEN C D, WANG C W, LIN C C, et al. A low latency memory controller for video coding systems[C]. Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, 2007: 1211-1214. doi: 10.1109/ICME. 2007.4284874.
LAI Sheng. Snow video image detection based on FPGA research[J]. Journal of Information and Communication, 2016(1): 27-29. doi: 10.3969/j.issn.1673-1131.2016.01.012.
CHEN Zhanliang, JIN Longxu, TAO Hongjiang, et al. High- speed image compression system realization of DDR3 controller[J]. Electronics Optics and Control, 2016, 23 (8): 85-88.
LI Yanping and XU Haixian. 36 channels synchronous data acquisition storage controller based on FPGA design and implementation[J]. Industrial Control Computer, 2016, 29(11): 20-21. doi: 10.3969/j.issn. 1001-182X.2016.11.009.
XU Yi and HUANG Jing. Based on the real-time imaging transpose memory DDR2 and FPGA design[J]. Journal of Internet Technology, 2016(6): 56-57.
[9]
KANEKO K, KAWAMOTO Y, NISHIYAMA H, et al. An efficient utilization of intermittent surface-satellite optical links by using mass storage device embedded in satellites[J]. Performance Evaluation, 2015, 87(C): 37-46.
[10]
魏刚. 涉密信息系统分级保护[J]. 电子技术与软件工程, 2016(21): 203.
WEI Gang. Classified information system grading protection [J]. Journal of Electronic Technology and Software Engineering, 2016(21): 203.
[11]
BELL D E and LAPADULA L J. Secure computer system: Unified exposition and multics interpretation[R]. The Miter Corporation Technical Report, MTR-2997 Rev.1, 1976.
[12]
TU Shanshan and HUANG Y. Towards efficient and secure access control system for mobile cloud computing[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, 2015, 12(12): 43-52.
[13]
YE Xinfeng. Privacy preserving and delegated access control for cloud applications[J]. Tsinghua Science & Technology, 2016, 21(1): 40-54. doi: 10.1109/TST.2016.7399282.
[14]
LEE Sunho, KWAK Jin, and LEE Imyeong. The study on the security solutions of USB memory[C]. International Conference on Ubiquitous Information Technologies & Applications (ICUT2009), Fukuoka, 2009: 470-473.
[15]
AMIN R, SHERRATT R S, GIRI D, et al. A software agent enabled biometric security algorithm for secure file access in consumer storage devices[J]. IEEE Transactions on Consumer Electronics, 2017, 63(1): 53-61. doi: 10.1109/TCE. 2017.014735.
[16]
GIRI D, SHERRATT R S, MAITRA T, et al. Efficient biometric and password based mutual authentication for consumer USB mass storage devices[J]. IEEE Transactions on Consumer Electronics, 2015, 61(4): 491-499. doi: 10.1109/ TCE.2015.7389804.
[17]
LEE Kyungroul, YEUK Hyeungjun, CHOI Youngtae, et al. Reverse-safe authentication protocol for secure USB memories[J]. Security and Communication Networks, 2012, 5(8): 834-845. doi: 10.1002/sec.580.
[18]
JEONG Hanjae, CHOI Younsung, JEON Woongryel, et al. Vulnerability Analysis of secure USB flash drives[C]. International Workshop on Memory Technology, Design and Testing, Taipei, 2007: 61-64. doi: 10.1109/MTDT.2007. 4547620.
LI Bo, LIU Jiayong, JIANG Yu, et al. Design and implementation of unidirectional transmission system based on EZ-USB[J]. Information and Electronic Engineering, 2008, 6(1): 46-50.
YIN Wenhao. Design of secure USB disk and its application in multi-level file management[D]. [Master dissertation], PLA Information Engineering University, 2011.
WANG Xiaohai, YUAN Jianguo, ZHANG Xi, et al. Design of mobile storage across security domains based on user interaction[J]. Computer Security, 2012(3): 43-46. doi: 10.3969/j.issn.1671-0428.2012.03.012.