Dereplication encryption lock for software and hardware of embedded system

An embedded system, software and hardware technology, applied in the field of embedded system software and hardware anti-copy encryption lock, can solve the problem of being unable to prevent a large number of wanton copying of hardware, etc.

Inactive Publication Date: 2013-02-06
张景彬 +1
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And each chip has a corresponding timing defect when it works, and the source code can be read from the chip by using this defect; at the same time, it is impossible to prevent a large number of wanton copying of hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dereplication encryption lock for software and hardware of embedded system
  • Dereplication encryption lock for software and hardware of embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] In order to make the object, technical scheme and advantages of the present invention clearer, the present invention is further described in detail by giving examples below

[0008] The invention adopts the mode of chip family member management and encryption, which effectively prevents the software and hardware of the embedded system from being illegally used, copied and tampered with.

[0009] figure 1 It is the overall unit schematic diagram of the example of the present invention.

[0010] refer to figure 1 The present invention includes on-board member ID and software ID management component 103, password and encryption program management component 104, encryption and decryption component 105, key data and program component 102, self-destruction and guard component 106, and a processor with security verification 107 and on-board interface and control chip 101.

[0011] After the embedded system starts, the member ID and software ID management component 103 on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dereplication encryption lock for software and hardware of an embedded system. The dereplication encryption lock comprises an on-board member chip ID (identification) and software ID management component, a password and encryption program management component, an encryption and decryption component, a self-destruction and guard component, a processor chip with security verification and on-board port and control member chip. The on-board member chip ID (identification) and software ID management component is used for managing and controlling software and hardware in the system. The password and encryption program management component is used for generating secret keys and password exclusive to the system according to ID number of software and hardware, part number and artificial secret keys in the system. The encryption and decryption component is used for decrypting programs or data ciphertexts according to selected secret keys and encryption program to generate executable programs or data plaintexts. The self-destruction and guard component is used for performing safety detection and protection to chips in the system and preventing illegal tamper and replacement. The processor chip guarantees safe operation of programs needed by the system and cannot store any other programs or data except for own necessary serial number, starting code and response programs after power failure. The on-board port and control member chip is a port chipset which is used for finishing all functions of the system.

Description

technical field [0001] The invention is applied to the core software and hardware of the embedded system to prevent illegal duplication or imitation, especially to protect those key equipments related to international people's livelihood and having important strategic significance. Background technique [0002] At present, there are two technologies to prevent illegal copying or imitation of embedded systems. One is to use software encryption technology or hardware dongle to protect the program from illegal copying; the other is to use the chip's own encryption technology to protect Software binaries or source code are not read out. However, the above two techniques cannot completely eradicate such incidents. Due to the logic flaws in the technology, the loopholes of the chip can be found by testing the logic waveform, and the binary code can be read out by using these loopholes. Each chip has a corresponding timing defect when it is working, and the source code can be rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
Inventor 不公告发明人
Owner 张景彬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products