System encrypted method using multifunctional assistant SCM

An encryption method and single-chip technology, applied in computer security devices, protection of internal/peripheral computer components, instruments, etc., can solve the problems of easy COPY, less time required, etc., and achieve simple functions, improved security, and high safety factor. Effect

Active Publication Date: 2007-05-30
XIAMEN PRIMA TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this system, the software program of the main processor 1' is stored in the program memory 2' (ROM / Flash), and due to the inherent characteristics of ROM / Flash, the software program stored in it is easy to be COPY; the auxiliary microcontroller The 3′ software program is stored in its internal integrated program memory. If no anti-COPY measures are taken, it is easy to be copied. Even if the method of burning (anti-reading) the program memory is used to prevent the program from being copied, but due to auxiliary The single-chip microcomputer 3' has simple functions, and the amount of software programs is small. It is also very easy to write a program that matches the main processor 1', and the required time is also very little. Even some systems can still operate without the auxiliary single-chip microcomputer 3' Complete the main functions of the system, so it is very simple to COPY the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System encrypted method using multifunctional assistant SCM
  • System encrypted method using multifunctional assistant SCM
  • System encrypted method using multifunctional assistant SCM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment one, referring to Fig. 2 to shown in Fig. 4, a kind of system encryption method that adopts multi-purpose auxiliary single-chip microcomputer of the present invention, is on the basis of using the single-chip microcomputer with built-in burning (anti-reading) program memory, by The main processor program and the auxiliary single-chip microcomputer program add the password verification method of the agreed encryption protocol algorithm, so that the system program cannot be read or copied, and the purpose of system encryption is achieved. The system hardware usually includes the main processor 1, ROM The / Flash program memory 2 and the auxiliary single-chip microcomputer 3 adopt unencrypted mode communication and storage between the main processor 1 and the external program memory 2, so that maintenance work such as modification and upgrading of the software can be facilitated. All key points in the software running of the main processor 1 are cryptographically ...

Embodiment 2

[0054] Embodiment two, referring to Fig. 6, a kind of system encryption method that adopts multi-purpose auxiliary single-chip microcomputer of the present invention, differs from embodiment one in that the encryption protocol algorithm adopted is a reversible algorithm; therefore,

[0055] In step e: the main processor 1 decrypts and restores the password sent by the auxiliary single-chip microcomputer 3 into a plain code according to the encryption protocol algorithm of the reversible algorithm, and compares the decrypted and restored plain code with the original plain code;

[0056] In step f: when the corresponding two plain codes are consistent, the main processor 1 continues to run the follow-up program or includes repeating step c;

[0057] When the two corresponding plain codes are inconsistent, the main processor 1 refuses to run the follow-up program, and the system stops running.

[0058] Fig. 6 is a schematic flowchart of the encryption of the reversible algorithm;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system enciphering method adopting multi-purpose auxiliary singlechip, it is in multiple microprocessor system, the support microprocessor (for example power management support microprocessor) that its function is relatively simple and the amount of software programme is few is substituted with singlechip which equipped with inner read only program memory, the code checking of the stipulated enciphering protocol algorithm is added to the program of main processor and auxiliary singlechip to avoid the program to be read out and copied, so the purpose of system encryption can be achieved.

Description

technical field [0001] The invention relates to a computer program encryption method, in particular to a system encryption method using a multipurpose auxiliary single-chip microcomputer. Background technique [0002] At present, in complex control systems using microprocessors, due to the large amount of software programs, the required program memory (ROM) is also relatively large, and the commonly used architecture is a two-chip structure of microprocessor + program memory. At the same time, starting from the convenience of development and production operability, the program memory generally adopts rewritable program memory (FLASH ROM). Due to the inherent characteristics of FLASH ROM itself, the program can be read and copied, so that the system has no secrecy when the hardware is copied. In order to solve this problem, a programmable logic device is usually introduced to encrypt data between the microprocessor and the FLASH ROM. However, because the programmable logic d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00
CPCG06F2221/2149G06F21/602G06F21/72G06F2221/2107G06F2221/2141
Inventor 林耀亮范锦华曾庆将
Owner XIAMEN PRIMA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products