Protection method of chip and chip itself

A security protection and chip technology, applied in computer security devices, internal/peripheral computer component protection, instruments, etc., can solve the problems of easy tampering and low software security, and achieve the goal of solving random tampering and ensuring security Effect

Inactive Publication Date: 2012-01-11
HUAWEI TECH CO LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a chip security protection method and a chip, which are used to solve the defect in the prior art that the content stored on the chip is easily tampered with at will, resulting in low security of the software running on the single board

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method of chip and chip itself
  • Protection method of chip and chip itself
  • Protection method of chip and chip itself

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] figure 1 It is a flowchart of a chip security protection method provided by an embodiment of the present invention. Such as figure 1 As shown, the chip security protection method of this embodiment may specifically include the following:

[0023] 100. Using the principle of chip addition to encrypt the software security verification info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This embodiment of the invention provides a protection method of chip and chip itself. The method includes: encrypting security verification information of software stored in chip by means of chip add principle to prevent the modification of the mentioned software security verification information; verifying the security of the mentioned software package stored in the chip by employing the software security verification information as soon as the single plate is connected to power. The technical proposal of this invention can guarantee the security of software verification information, effectively solve the problem of modification of chip contents, and also effectively assure the security of software that is operated on the single plate.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of electronic equipment, and in particular, to a chip security protection method and the chip. Background technique [0002] A chip such as a Flash chip is a common component used in various electronic devices. For example, the Flash chip can be applied to a network element such as a wireless access point (Access Point; hereinafter referred to as AP). [0003] In the various electronic devices of the chip, various files can be pre-written in the chip to run when it is used. In the prior art, the content written in the chip can be read by special software, and after the content of the chip is read, it can be tampered with by disassembly technology. For electronic devices such as wireless APs with single-board chips, they are used as a bridge for home and home office (Small Office Home Office; Such electronic equipment requires higher security than large base station equipment. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/71
CPCG06F12/1408G06F21/00
Inventor 郭德伟孙代红潘峰申明会
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products