A Database-Based Encryption Method for Embedded System

An embedded system and encryption method technology, applied in the field of system management, can solve the problems of inconvenient administrator passwords and registration code keys, inability to restrict illegal copying of firmware, inability to use configuration file system functions or modules, etc., and achieve convenient parameters. The effect of passing

Active Publication Date: 2018-01-09
上海柏楚电子科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, it is inconvenient to allow each device to have a different administrator password and registration code key during the production stage; it is impossible to restrict the firmware of one device from being illegally copied to run on another clone device; it is not possible to use configuration files to configure The function or module of the system; the parameter transfer between the boot program and the main program is not convenient enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Database-Based Encryption Method for Embedded System
  • A Database-Based Encryption Method for Embedded System
  • A Database-Based Encryption Method for Embedded System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below according to the accompanying drawings.

[0021] Such as figure 1 As shown, the FLASH is divided into three areas: the startup code area, the system parameter area and the database / main program area.

[0022] After initializing the system, the startup code area has two modes by judging the content stored in the database / main program area: configuration mode and normal mode.

[0023] Configuration mode: When it is judged that the database / main program area is stored in the database, enter the configuration mode. In the configuration mode, many operations can be performed with the participation of the user, such as: query the database, extract and store the relevant data such as the administrator password and registration code key in the database to the system parameter area; read the chip UID and store it in the system parameter area; generate configuration files, store them in the system parameter area, etc.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the field of system management technologies, in particular to a database-based embedded system encryption method. The database-based embedded system encryption method comprises: dividing FLASH into three areas, that is, a startup code area, a system parameter area and a database / main program area, and implementing an encryption solution by using a required database file. Compared with the prior art, the method uses an encryption manner of retrieving a database, and retrieved data are stored to the system parameter area of a system, so as to conveniently realize that each device has a unique administrator password and a registration code key at delivery. In addition, a firmware can be prevented from being illegally copied to another device for running by a UID of a chip; a functional module of the system can be conveniently planned and configured by using a configuration file; and parameter passing between a bootstrap program and a main program can also be conveniently implemented.

Description

technical field [0001] The invention relates to the technical field of system management, in particular to a database-based encryption method for an embedded system. Background technique [0002] Embedded systems are generally implemented in the form of Boot Loader+APP. This method has simple functions and structures, and can realize the booting and operation of embedded systems, but this method seems a bit powerless when trying to obtain better functions and effects. For example, it is inconvenient to allow each device to have a different administrator password and registration code key during the production stage; it is impossible to restrict the firmware of one device from being illegally copied to run on another clone device; it is not possible to use configuration files to configure The functions or modules of the system; the parameter transfer between the boot program and the main program is not convenient enough. Contents of the invention [0003] In order to overc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 代田田王仕卿
Owner 上海柏楚电子科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products