Special processor software encryption and decryption method

An encryption method and processor technology, which are applied in the fields of electrical digital data processing, instruments, program/content distribution protection, etc., can solve problems such as inconvenience and impracticality, and achieve the effect of simple function, smart structure, and difficult to break.

Active Publication Date: 2008-03-26
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] As mentioned above, for many portable devices with simple functions and smart structures (such as smart terminals such as mobile phones and PDAs), it is neither convenient nor practical to register online or add peripherals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Special processor software encryption and decryption method
  • Special processor software encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] This embodiment provides an encryption and decryption method of special processor software. First, there is a unique serial number HW_UID that represents the identity of the chip stored in the chip of the dedicated processor. The length of the serial number is determined by the manufacturer itself, but it must not be repeated. The following will introduce in detail how to use this unique serial number to realize the encryption and decryption process of the special processor software from two aspects of encryption and decryption.

[0035] In this example, the implementation process of the encryption terminal is shown in Figure 1. Among them: Key_pub represents the public key, which is used for asymmetric encryption; Key_sym represents the symmetric key, which is used for symmetric encryption; Plain text represents the plaintext of the software to be encrypted; SW_UID represents the unique serial number of the software, which is HW_UID through the hash function Obtained ...

Embodiment 2

[0048] This embodiment provides an encryption and decryption method for special processor software, the steps of the encryption and decryption method are basically the same as those in Embodiment 1, the difference lies in the composition of Key_sym. As shown in Figure 3: what RN and SW_UID adopt is to divide the two sequences into the same number of shares, and then perform interpolation to form Key_sym, such as inserting M (M=2, 3...) SW_UID values ​​into N ( N=1, 2...) RN values.

Embodiment 3

[0050] This embodiment also provides an encryption and decryption method for special processor software, the steps of the encryption and decryption method are basically the same as those in Embodiments 1 and 2, the difference lies in the composition of Key_sym. As shown in Figure 4: it adopts the method of interleaving and combining, first decomposing the sequences SW_UID and RN into matrices A and B respectively, then combining A and B into matrix C, and finally matrix C according to certain rules (such as by row or column readout) into a sequence to form Key_sym.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to encryption and decryption method of software of dedicated processors, especially encryption and decryption process for the phone, PDA, and other intelligent terminal software. The encryption process is: random generate number RN by random number generator RNG; RN and the only one software serial number SW_UID constitute symmetric key system, encrypt software Plaintext through symmetric encryption algorithm; thereinto, the SW_UID was transformed through hash function from the only serial number HW_UID which represent the identity of slug and saved in the special processor; the public Key_pub encrypt Key_sym through asymmetry encryption algorithm; encrypted Plaintext and Key_sym were put together and downloaded to memory. In addition, it also provides a decryption method to the above encryption method. The method by this invention use certain transformation of hardware serial numbers of dedicated processor to achieve the encryption to special software, enhanced security of processor software and its own hardware equipment.

Description

technical field [0001] The invention relates to an encryption and decryption method of software equipped with a special processor, in particular to the encryption and decryption process of intelligent terminal software such as mobile phones and PDAs. Background technique [0002] At present, in a terminal system with a central processing unit, the protection methods for software are mainly divided into three categories: online registration, license protection, and software encryption. The first two types of protection methods require the use of external channels such as the network to obtain the normal use rights of the software, and are suitable for use in devices connected to the network. There are two main methods of software encryption: dongle and key disk. [0003] Wherein, the dongle is a software encryption product combined with software and hardware inserted into the parallel port of the computer. It generally has tens or hundreds of bytes of non-volatile storage s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/10
Inventor 缪晖吕玲
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products