Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method and system for embedded system programs

An embedded system, encryption and decryption technology, applied in the encryption and decryption method of embedded system programs and the system field, can solve problems such as program security not being guaranteed, Linux system application programs not being applicable, increasing hardware costs, etc., to achieve protection Legitimate rights, increased difficulty, and enhanced security effects

Active Publication Date: 2018-07-27
AOTAI ELECTRIC
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Through this external encryption chip, although the program can be prevented from being illegally cracked to a certain extent, it requires additional hardware costs
And the embedded products it faces are mostly single-chip bare-metal programs, which are not suitable for Linux system applications
The most important thing is that most of the encryption chips currently on the market adopt the encryption method of comparative authentication, which still cannot avoid malicious modification of the authentication point by reverse engineering, resulting in the failure of program security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and system for embedded system programs
  • Encryption and decryption method and system for embedded system programs
  • Encryption and decryption method and system for embedded system programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0036] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0037] As introduced in the background technology, there are deficiencies in program security in the prior ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method and system for embedded system programs. The method comprises steps as follows: listing an execution view of an executable program binary file according to the file format, and selecting a designated position, where encryption starts, of each structural module in the execution view; calculating the offset address of the encryption position of the selected structural module in the file according to execution view extraction information, and encrypting multiple bytes behind the designated position with an encryption algorithm; loading the encrypted file, adding the writing permission before mapping of a file code segment, and calculating the decryption position for decryption after mapping. The safety of user programs is improved and the legal rights and interests of the user are protected under the condition that the normal functions of the programs are not affected.

Description

technical field [0001] The invention relates to the technical field of software security, in particular to an encryption and decryption method and system for embedded system programs. Background technique [0002] In recent years, with the maturity of system control, communication, sensing and other technologies, embedded systems have been rapidly popularized in industries such as consumer electronics, automobiles, industrial control and communications. However, with the continuous development of hacking techniques such as decompilation and reverse engineering, embedded systems are facing more and more attacks, and pirated products emerge in endlessly. How to use low-cost, high-reliability methods in these embedded systems to protect the R&D and design results of enterprises or individuals from illegal plagiarism and plagiarism has become an important issue in the field of embedded product design. [0003] At present, the encryption of embedded products mostly uses encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 张光先缪庆瑞苗文玲蔡一旺刘明松
Owner AOTAI ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products