Supercharge Your Innovation With Domain-Expert AI Agents!

An embedded terminal encryption system and encryption method combining software and hardware

An embedded terminal and encryption system technology, applied in encryption devices with shift registers/memory, transmission systems, digital transmission systems, etc., can solve problems such as product cracking, increasing the difficulty of cracking products, and unsatisfactory encryption effects. , to achieve the effect of preventing competitors, low encryption cost, and high reliability

Active Publication Date: 2019-12-10
康威通信技术股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Doing so does increase the difficulty of cracking the product to a certain extent, but overall the product is still more likely to be cracked, and the encryption effect is not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An embedded terminal encryption system and encryption method combining software and hardware
  • An embedded terminal encryption system and encryption method combining software and hardware
  • An embedded terminal encryption system and encryption method combining software and hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0050] Such as figure 1 As shown, an embedded encryption system includes an embedded terminal and a server or a mobile terminal, and the two communicate through WIFI or Bluetooth.

[0051] Embedded terminal includes MCU, FLASH storage unit, encryption chip. The MCU is the main control unit, which is connected with the FLASH storage unit and the encryption chip to transmit data and command information; the FLASH storage unit is used to store valid information that needs to be saved, and is controlled by the MCU. The encryption chip is responsible for the encryption operation, and the encryption method is selected through the control of the MCU.

[0052] The server or mobile terminal communicates with the embedded terminal to realize the verification of encrypted information between the two to ensure the security of the system.

[0053] Such as figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded terminal encryption system and an encryption method combining software and hardware; comprising: an embedded terminal, which communicates with a server or a mobile terminal; the embedded terminal includes an MCU, and the MCU communicates with a FLASH storage unit and an encryption chip respectively connection; transmission of data and command information; the FLASH storage unit is controlled by the MCU; the encryption chip is used for encryption operations, and the encryption method is selected according to the control instructions of the MCU; when the embedded terminal is working, the encryption verification is first started by hardware, Then pass the wireless communication encryption verification, and finally it can run normally. Through the combination of hardware startup encryption and wireless communication encryption, the encryption of embedded terminals is realized together, double encryption, double protection, which ensures the safe and reliable operation of embedded terminals, and also effectively prevents malicious cracking of hardware devices and their embedded devices. Competitors with formal programs effectively ensure that the technology is not leaked.

Description

technical field [0001] The invention relates to an encryption method, in particular to an embedded terminal encryption system and encryption method combining software and hardware. Background technique [0002] At present, the research and development cost of hardware products is very high, and the research on its stability and reliability is even more time-consuming and laborious. Some competitors, in order to save effort, will crack hardware products in the same industry, which often causes great damage to manufacturers. Loss, in response to this imagination, many manufacturers have adopted encrypted counting to prevent the product from being cracked. [0003] At present, manufacturers of large logarithms use software encryption methods. The main methods are to use software methods to hide or cover up part of the program codes used in the product, and use obfuscation methods to confuse part of the program codes and data. Use the method of jumping randomly to make the prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32H04L9/06H04W12/03
CPCH04L9/0625H04L9/0631H04L9/0643H04L9/32H04W12/06
Inventor 孔得朋杨震威
Owner 康威通信技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More