Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method and device for protecting embedded algorithm of processor and storage medium

An encryption method and processor technology, applied in the computer field, can solve the problems of complex processing mechanism, high hardware cost, and no preset unique ID in MCU chips, and achieve the effects of improving security, low cost, and protecting intellectual property rights.

Pending Publication Date: 2021-07-02
西安电掣风云智能科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Some of the existing protection mechanisms can only protect the processors with a unique ID as a prerequisite for protection, but there are also many low-end processors in the market. Due to production costs and other reasons, many MCU chips do not have a unique ID function preset.
There are also some protection mechanisms with complex processing mechanisms and high hardware costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device for protecting embedded algorithm of processor and storage medium
  • Encryption method and device for protecting embedded algorithm of processor and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] For general-purpose processing devices including ST microprocessing, there is a unique serial number device ID inside, or called device ID. ST devices are 96-bit unique device identifiers. This is built into the chip when the chip leaves the factory. of. According to this unique ID serial number, combined with relevant encryption algorithms and external memory chips, the encryption protection of algorithm codes can be realized. Unauthorized hardware processing / storage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method and device for protecting an embedded algorithm of a processor and a storage medium, and the method specifically comprises the steps of measuring internal RC oscillation frequencies of a plurality of chips of the same model, taking the internal RC oscillation frequencies as preset information of the chips of the model, and storing the preset information in a specific position in an external storage chip FLASH; encrypting the measured internal RC oscillation frequency of the chip and writting into an encryption program of the corresponding chip, and forming verification information; comparing the verification information with preset information, and if verification is wrong, entering an abnormal execution program; if verification is correct, measuring the internal RC oscillation frequency of the chip, comparing the internal RC oscillation frequency with preset information, and entering a normal execution state if the internal RC oscillation frequency is within an error range; otherwise, entering an abnormal execution program. According to the invention, for a chip without a preset ID, the preset ID is replaced by RC oscillator frequency discreteness to serve as a judgment basis, double-layer decoding obstacles are arranged, and the invention is high in safety, simple in processing mechanism, low in cost and higher in applicability.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to an encryption method, device and storage medium for protecting a processor embedded algorithm. Background technique [0002] In the key technology of wireless charging equipment, there are many problems to be solved, including how to ensure the impedance matching between various components, and how to accurately measure voltage and current in complex working conditions, etc. And these problems all need the algorithm of some kind of processor to assist in completing. [0003] Due to cost considerations, most current wireless charging hardware devices store the key algorithm data in the external FLASH, and the data is exposed to the outside. There is no protection mechanism for the algorithm built in the memory; The key algorithm can be obtained by means of decompilation and other means, or the storage chip can be directly removed and installed on its own device, and then run ille...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/72G06F21/75G06F21/57
CPCG06F21/72G06F21/75G06F21/575
Inventor 李谦李钢杨伟祥張瑞昶张宏鹏白旭王彤辉徐猛李扬
Owner 西安电掣风云智能科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More