Hardware encryption device, embedded system copyright protection system and method
An embedded system, hardware encryption technology, applied in digital data protection, computer security devices, program/content distribution protection, etc., can solve problems such as increased production and manufacturing costs, and achieve the effect of improving security and avoiding theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] Such as figure 1 Said, the present embodiment provides a kind of embedded system copyright protection method, comprises the following steps:
[0054] S101. Receive an authentication request sent by the embedded system;
[0055] S102. Obtain a key according to the authentication request, and encrypt and authorize the hardware circuit, software copyright, algorithm or data of the embedded system according to the key; wherein, the key is not transmitted by communication.
[0056] The method of this embodiment is performed by a hardware encryption device. After receiving the authentication request of the embedded system, a key is obtained, and the key is calculated and generated by a corresponding algorithm. The corresponding algorithm can be DES encryption algorithm, 3DES Encryption algorithm, AES encryption algorithm or self-defined algorithm, the encryption algorithm is not defined in this embodiment. Because the key in the encryption process is generated by the hardwa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


