Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption methods of embedded software program

A technology of embedded software and encryption method, which is applied in the field of encryption and decryption, can solve problems such as difficult to prevent malicious refresh and decryption failure, and achieve the effect of ensuring security and strong flexibility

Active Publication Date: 2011-01-19
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of encryption and decryption method can effectively prevent imitation, but it is difficult to prevent malicious refresh, and once the software program memory itself generates new bad blocks during the use of embedded devices, it will directly lead to decryption failure, which is artificially embedded The normal operation of the equipment sets a barrier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption methods of embedded software program
  • Encryption and decryption methods of embedded software program
  • Encryption and decryption methods of embedded software program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] At first, explain the inventive idea:

[0041] (1) Anti-imitation:

[0042] When downloading the embedded software program to the storage medium of the embedded device, execute the encryption process described in the present invention, and download the encryption program into the storage medium of the embedded device;

[0043] When the encryption program in the storage medium is loaded during the startup process of the embedded device, the decryption process described in the present invention is executed. If the decryption is successful (ie: the embedded device is our authorized device), continue to start, and if the decryption fails, exit Start the process.

[0044] (2) Anti-refresh:

[0045] When our embedded device downloads the program to the storage medium of our embedded device, it executes the decryption process described in the present invention. If the decryption is successful (that is, the downloaded program is our authorized encrypted program), the program ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to encryption and decryption methods of an embedded software program. The encryption method comprises the following steps of: randomly extracting a data block from an original software program to form sampled data szSampVal; and inserting the offset and size of the extracted data block, szEncryptHashVal and a valid equipment identification code range VALID_UID into the original software program to form an encryption program. The decryption method comprises the following steps of: reading an embedded equipment identification code UID; and if the UID belongs to VALID_UID and D(szEncryptHashVal) is equal to HASH(szSampVal+VALID_UID), judging that decryption succeeds, and if the UID does not belong to VALID_UID and D(szEncryptHashVal) is equal to HASH(szSampVal+VALID_UID), judging that decryption fails. In the encryption and decryption methods of the embedded software program, after being bound with the valid equipment identification code range, codes are encrypted to be used, so that the basis is provided for anti-copying and refreshing.

Description

technical field [0001] The invention relates to encryption and decryption technology, in particular to an encryption and decryption method for an embedded software program. Background technique [0002] Embedded products have become increasingly popular, especially with the popularity of portable electronic devices, making them an indispensable part of daily life. [0003] Embedded software programs are usually stored in the memory of embedded devices (such as flash memory FLASH or read-only memory ROM), and it is quite easy to illegally copy software programs in the memory. On the other hand, many embedded products use the same or similar solutions, resulting in some people using other people's hardware platforms to burn their own software programs for malicious refresh, or reading software from the memory of other people's embedded products. The program is used for its own hardware platform for imitation. [0004] In the prior art, existing embedded software program encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/12
Inventor 林进全
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products