Library file encryption method, decryption method and encryption device

An encryption method and technology of an encryption device, which are applied in the embedded field, can solve the problems of increasing cost and increasing complex decryption methods, and achieve the effects of preventing content leakage, ensuring convenience and development efficiency, and improving security.

Pending Publication Date: 2022-04-26
ESPRESSIF SYST SHANGHAI
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the method of software packing is adopted, a custom complex decryption method needs to be added
Furthermore, if an encryption chip is used, it will cause an increase in cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Library file encryption method, decryption method and encryption device
  • Library file encryption method, decryption method and encryption device
  • Library file encryption method, decryption method and encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The method and device of the present application will be described in detail below with reference to the accompanying drawings and specific implementation manners. It should be understood that the embodiments shown in the drawings and described below are for illustrative purposes only, and are not intended to limit the application.

[0042] figure 1 A flow chart showing a specific implementation of the library file encryption method provided by this application, refer to figure 1 , the method includes the following steps:

[0043] S101: Use the public key to encrypt the library file to form an encrypted library file.

[0044] It can be understood that the public key in this application can be generated in advance. Specifically, a pair of public key and private key can be obtained by using an asymmetric encryption algorithm, and there is a unique correspondence between the two. Encrypt the library file based on the generated public key to generate an encrypted libr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a library file encryption method, a library file decryption method and a library file encryption device, and the method comprises the steps: encrypting a library file through employing a public key, and forming an encrypted library file; obtaining calling information of an application program on the encrypted library file, and generating interface information; respectively storing the encrypted library file and the interface information in a firmware file; and programming the firmware file to an internal or external read-write memory of the SoC chip, so that when the firmware file is loaded to an internal or external random access memory of the SoC chip, the encrypted library file is decrypted by adopting a private key, and a decrypted library file is obtained. According to the method, the content of the library file is prevented from being leaked while the library file is allowed to be published to the outside. The convenience and the development efficiency of secondary development by using the library file can be ensured, and the security of the library file can be improved.

Description

technical field [0001] The present application relates to the field of embedded technology, and in particular to a library file encryption method, a library file decryption method and a library file encryption device. Background technique [0002] For software protection, there are already many solutions, which can be divided into encrypting software running on a computer according to their application scenarios. For example, Chinese patent CN103425911A relates to using an encryption device to encrypt software running on a computer. [0003] Another application scenario is to protect applications running in embedded systems. In the current embedded market, some important framework programs or core algorithm programs will be published in the form of library files to prevent the leakage of core algorithms or key parameters and achieve the role of intellectual property protection. For example, the voice wake-up function of Espressif’s chip ESP32 is released in the form of a s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/121G06F21/602
Inventor 不公告发明人
Owner ESPRESSIF SYST SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products