Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System encrypting method using multifunctional assistant SCM

An encryption method and single-chip microcomputer technology, applied in computer security devices, internal/peripheral computer component protection, instruments, etc., can solve the problem of low confidentiality, achieve the effect of improving security, reducing the probability of being copied, and simple functions

Active Publication Date: 2009-02-11
XIAMEN PRIMA TECH
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The confidentiality of the existing system is very low. For hardware circuits, it is very simple to copy. The confidentiality we talk about is generally aimed at software programs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System encrypting method using multifunctional assistant SCM
  • System encrypting method using multifunctional assistant SCM
  • System encrypting method using multifunctional assistant SCM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Example one, see Figure 2 to Figure 4 As shown, a system encryption method using a multi-purpose auxiliary single-chip microcomputer of the present invention is based on the use of a single-chip computer with a built-in burn-out (anti-reading) program memory, by adding the main processor program and the auxiliary single-chip microcomputer program The method of cryptographic verification of the encryption protocol algorithm is agreed so that the system program cannot be read and cannot be copied to achieve the purpose of system encryption. The system hardware usually includes the main processor 1, the FLASH ROM program memory 2, the auxiliary single-chip 3, and The main processor 1 and the external FLASH ROM program memory 2 communicate and store in an unencrypted manner, so that maintenance work such as software modification and upgrade can be facilitated. The key points in the software operation of the main processor 1 are all password-checked, that is, the check points ar...

Embodiment 2

[0054] Example two, see Figure 6 As shown, the system encryption method of the present invention using a multi-purpose auxiliary single-chip microcomputer is different from the first embodiment in that the encryption protocol algorithm used is a reversible algorithm; therefore,

[0055] In step e: the main processor 1 decrypts and restores the password sent by the auxiliary single-chip microcomputer 3 into a clear code according to the encryption protocol algorithm of the reversible algorithm, and compares the decrypted and restored clear code with the originally generated clear code;

[0056] In step f: when the corresponding two plain codes are consistent, the main processor 1 continues to run subsequent programs or includes repeating step c;

[0057] When the corresponding two plain codes are inconsistent, the main processor 1 refuses to run the subsequent program, and the system ends the operation.

[0058] Figure 6 Schematic flow chart of encryption of reversible algorithm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system enciphering method adopting multi-purpose auxiliary singlechip, it is in multiple microprocessor system, the support microprocessor (for example power management support microprocessor) that its function is relatively simple and the amount of software programme is few is substituted with singlechip which equipped with inner read only program memory, the code checking of the stipulated enciphering protocol algorithm is added to the program of main processor and auxiliary singlechip to avoid the program to be read out and copied, so the purpose of system encryption can be achieved.

Description

Technical field [0001] The invention relates to a computer program encryption method, in particular to a system encryption method using a multi-purpose auxiliary single-chip microcomputer. Background technique [0002] At present, in a complex control system using a microprocessor, due to the large amount of software programs, the required program memory (ROM) is relatively large. The generally adopted architecture is a two-chip structure of a microprocessor + a program memory. At the same time, starting from the convenience of development and the operability of production, the program memory generally adopts an erasable program memory (FLASH ROM). Due to the inherent characteristics of FLASH ROM itself, the program can be read and copied, so that the system has no confidentiality when the hardware is copied. In order to solve this problem, the data read between the microprocessor and the FLASH ROM is usually encrypted by introducing programmable logic devices. However, due to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
CPCG06F2221/2149G06F21/602G06F21/72G06F2221/2107G06F2221/2141
Inventor 林耀亮范锦华曾庆将
Owner XIAMEN PRIMA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products