Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware encryption device, embedded system copyright protection system and method

An embedded system, hardware encryption technology, applied in digital data protection, computer security devices, program/content distribution protection, etc., can solve problems such as increased production and manufacturing costs, and achieve the effect of improving security and avoiding theft

Inactive Publication Date: 2020-03-13
华晟现代电子科技(香港)有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method increases the difficulty of being plagiarized, but in such an encryption protection scheme, the encryption key is generally stored in the memory, so there is a certain probability that the key will be cracked by the plagiarist, and additional memory is required to store the key , so the manufacturing cost also increases accordingly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware encryption device, embedded system copyright protection system and method
  • Hardware encryption device, embedded system copyright protection system and method
  • Hardware encryption device, embedded system copyright protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Such as figure 1 Said, the present embodiment provides a kind of embedded system copyright protection method, comprises the following steps:

[0054] S101. Receive an authentication request sent by the embedded system;

[0055] S102. Obtain a key according to the authentication request, and encrypt and authorize the hardware circuit, software copyright, algorithm or data of the embedded system according to the key; wherein, the key is not transmitted by communication.

[0056] The method of this embodiment is performed by a hardware encryption device. After receiving the authentication request of the embedded system, a key is obtained, and the key is calculated and generated by a corresponding algorithm. The corresponding algorithm can be DES encryption algorithm, 3DES Encryption algorithm, AES encryption algorithm or self-defined algorithm, the encryption algorithm is not defined in this embodiment. Because the key in the encryption process is generated by the hardwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware encryption device, an embedded system copyright protection system and a method. A software and hardware cooperative work mode is adopted between the hardware encryption device and software of an embedded system. The hardware encryption device is used for obtaining a secret key according to an authentication request after receiving the authentication request sentby the embedded system, and carrying out encryption authorization on a hardware circuit, a software copyright, an algorithm or data of the embedded system according to the secret key; wherein the secret key does not perform communication transmission. The secret key in the encryption process is generated and obtained by the hardware encryption device, and the secret key is uniquely related to theencryption device, so that the security is greatly improved; besides, the secret key does not need to communicate between the embedded system and the hardware encryption device in the encryption authentication process, so that the possibility that the secret key is stolen in the transmission process is avoided, and the method can be widely applied to the field of copyright protection.

Description

technical field [0001] The invention relates to the field of copyright protection, in particular to a hardware encryption device, an embedded system copyright protection system and a method. Background technique [0002] The hardware circuits and software algorithms of embedded systems always face the danger of copyright infringement. Competitors and counterfeit manufacturers always use various means to plagiarize and imitate the hardware circuits and software algorithms of embedded systems. These intellectual property security issues will undoubtedly It will bring a huge blow to the innovation motivation of developers, and it will also affect the normal operation of the market economy. [0003] There are generally two methods for copyright protection of existing embedded systems. The first one is to encrypt and store software programs or data through encryption algorithms. Only with the correct key can the software programs or data be decrypted and work can be performed. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/60
CPCG06F21/10G06F21/602
Inventor 陈弟虎
Owner 华晟现代电子科技(香港)有限公司