Embedded software safety protection system

A technology of embedded software and security protection, applied in the field of information security, which can solve the problems of fragile protection measures and easy to be cracked.

Inactive Publication Date: 2012-11-28
北京京航计算通讯研究所
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, such protections ar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded software safety protection system
  • Embedded software safety protection system
  • Embedded software safety protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A kind of embedded software safety protection system provided by the present invention is further introduced below in conjunction with accompanying drawing and embodiment:

[0025] Such as figure 1 , 2 As shown, an embedded software security system adds a security protection module on the embedded device, and the security protection module includes a physical tamper-proof device and a tamper-proof cover 1, a hardware encryption and decryption module circuit 2; the encryption and decryption module circuit 2 realizes The CPU takes over the access to the EPROM data, and cooperates with the physical tamper-proof device and the tamper-proof cover 1 to realize the dynamic protection of the SRAM data. in,

[0026] (1) The encryption and decryption module circuit includes FPGA, security chip, pin header (including CPU signal and NVM signal); FPGA is connected to the security chip, and FPGA outputs CPU signal and NVM signal. FPGA realizes the generation of various logic contr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information safety, and in particular relates to an embedded software safety protection system which aims to improve the safety of embedded software. According to the system, a safety protection module is arranged on embedded equipment and comprises a physical prying-resistant device, a prying-resistant cover plate and a hardware encryption and decryption module circuit, wherein the hardware encryption and decryption module circuit is applied to adaption of a central processing unit (CPU) to data access of an electrically programmable read only memory (EPROM) and is matched with the physical prying-resistant device and the prying-resistant cover plate to dynamically protect static random access memory (SRAM) data. By virtue of the physical prying-resistant device and the prying-resistant cover plate, the system has destroy resistance and can prevent an attacker from acquiring sensitive information in a probe detection mode and the like; and moreover, the prying-resistant cover plate can shield electromagnetic radiation, thus preventing the attacker from attacking the safety system by utilizing the leakage of the electromagnetic radiation.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an embedded software safety protection system. The method is applied in the embedded software safety protection process, which can increase the safety of the embedded software. Background technique [0002] At present, there are very few security protection measures for ARM, DSP, and single-chip microcomputers in the market, and important programs are directly exposed in transparent Flash and EEPROM. Facing the continuous development of attack technology and the competition among hackers, the time and cost of cracking products are getting lower and lower. Compared with the huge benefits obtained by product imitators, sometimes the cost of cracking can even be ignored. Therefore, how to protect their own interests is a problem that product designers must face. Single-chip microcomputers and embedded systems generally have internal ROM / EEPROM / FLASH for use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F12/14
Inventor 苏均生李宁
Owner 北京京航计算通讯研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products