Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption and decryption method based on embedded Linux system

A system implementation and embedded technology, applied in encryption devices with shift registers/memory, instruments, electrical digital data processing, etc., can solve problems such as complex encryption and decryption methods, difficult implementation, and unguaranteed security , to increase difficulty, reduce complexity, and increase security

Active Publication Date: 2014-02-26
AUTEL HUNAN CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But existing encryption, decryption method are relatively easy to realize in Windows system, have following shortcoming when being applied to embedded system field:
[0004] (1) Various encryption and decryption methods are relatively complicated, and it is difficult to implement without very professional auxiliary tools;
[0005] (2) The encryption and decryption methods cannot be put together (that is, the data is encrypted in the code and decrypted in the same code), and the security is not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method based on embedded Linux system
  • Encryption and decryption method based on embedded Linux system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] like figure 1 As shown, a kind of based on the embedded Linux system that the embodiment of the present invention provides realizes encryption method and comprises the following steps:

[0030] S102. Add encryption function definitions and implementation codes to the system call file of the Linux kernel code.

[0031] Preferably, the encryption function definition and the implementation code of the encryption function can be added to the kernel / sys.c file, wherein the encryption algorithm can be various current encryption algorithms (such as MD5...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method based on an embedded Linux system, and belongs to the technical field of computer software. The method includes adding an encryption function definition and an implementation code into a system call file of a Linux kernel code; adding an encryption function statement into a system call function list of a corresponding kernel code of a processor; recompiling and re-solidifying the kernel code; calling an encryption function to encrypt in application software according to the function statement. According to the method, through encryption and decryption codes of a system call kernel, an encryption and decryption coexisting mode correlated with the kernel is realized, data decryption difficulty is increased, and safety of codes and data is improved. Meanwhile, complexity of application software with the embedded Linux kernel code is lowered, and same encryption and decryption functions can be applied to different application software.

Description

technical field [0001] The invention belongs to the field of automobiles, and more specifically relates to an encryption and decryption method based on an embedded Linux system. Background technique [0002] As computer technology has been widely used around the world, it has provided great convenience for enterprises or individual users to work. However, in the process of computer popularization, it also faces many security risks. Users have caused huge losses. Under the background of the information age, mastering various encryption and decryption methods is an effective measure to ensure data security. With the rapid development of electronic technology, embedded devices are becoming more and more prosperous, and various encryption and decryption methods have also been deeply developed in the embedded field. [0003] Among the existing encryption and decryption methods, the more famous ones are MD5 (Message-Digest Algorithm5), RSA, etc., and there are many symmetric algo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L9/06
CPCG06F21/602
Inventor 李红京余世均
Owner AUTEL HUNAN CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More