Method and device for protecting codes of embedded software by hardware encryption module

A hardware encryption and software code technology, applied in the protection of internal/peripheral computer components, digital data protection, etc., can solve problems such as hidden technical security risks and cumbersome preparation work

Inactive Publication Date: 2013-10-30
合肥科盛微电子科技有限公司
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the cooperation between upstream and downstream has become particularly important. Therefore, the manufacturers closest to the product users will use some technical materials and related documents provided by the front-end manufacturers when developing products, and some of the information in these materials is related to the product. Key data and technical information in the development process, so there will be a great technical security risk when provided to customers
The traditional way is to provide customers with library files, and at the same time provide documentation to explain the specific information of the interface functions in the library. In this way, the preparation work in the early stage will be very cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting codes of embedded software by hardware encryption module
  • Method and device for protecting codes of embedded software by hardware encryption module
  • Method and device for protecting codes of embedded software by hardware encryption module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The invention utilizes the user module to control the hardware encryption module to perform encryption operation on the memory, so as to realize the code protection. The user module may be software, or a processor or other types of hardware modules that execute specific steps. The main idea of ​​the present invention is to generate multi-segment images corresponding to different areas after compiling and linking the codes, and then burn them into the corresponding areas, and realize the separation of the storage area and the user through the user module to control the hardware encryption module, thereby to the effect of code protection.

[0026] Such as figure 1 As shown, the invention divides the memory into three regions, namely FB_Region, F0_Region and F1_Region. FB_Region mainly stores some key data and code information of the hardware driver layer; F0_Region is the first-level customer encryption area; F1_Region is the second-level customer encryption area, as sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a technique for protecting codes of embedded software by a hardware encryption module. The main function of the technique includes that a code space is encrypted according to needs of users in different hierarchies to enable the code space to be separated from other levels to enter an encryption state. Each user is managed in a hierarchy manner by the technique, the users in each hierarchy provide user interfaces to lower-level users, rest codes can be placed in a protected range, the lower-level users must perform related configuration according to the interfaces provided by upper-level users, and a principal layer is prohibited to directly read and modify code spaces of other hierarchies. The technique can effectively protect key data information of manufacturers, and the key data information can be prevented from being read and modified by other manufacturers.

Description

technical field [0001] The invention relates to a technology for realizing embedded software code protection by using a hardware module, which mainly encrypts and protects the code and data information to be protected to make it transparent to the outside world, so as to prevent key technologies and information from leaking. Background technique [0002] With the continuous development of embedded system software, the development of a complete system software is usually not completely carried out by one manufacturer, and usually involves the participation of many manufacturers from upstream to downstream. Therefore, the cooperation between upstream and downstream has become particularly important. Therefore, the manufacturers closest to the product users will use some technical materials and related documents provided by the front-end manufacturers when developing products, and some of the information in these materials is related to the product. Key data and technical infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/64
Inventor 韩东坡高占东金传恩阎斌
Owner 合肥科盛微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products