CN103761456A - Anti-cracking method for core code of singlechip - Google Patents

Anti-cracking method for core code of singlechip Download PDF

Info

Publication number
CN103761456A
CN103761456A CN201310475562.7A CN201310475562A CN103761456A CN 103761456 A CN103761456 A CN 103761456A CN 201310475562 A CN201310475562 A CN 201310475562A CN 103761456 A CN103761456 A CN 103761456A
Authority
CN
China
Prior art keywords
code
ciphertext
chip microcomputer
plaintext
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310475562.7A
Other languages
Chinese (zh)
Other versions
CN103761456B (en
Inventor
沈秀清
陈维哲
王鲁克
储祝君
陈冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lierda Science & Technology Group Co Ltd
Original Assignee
Lierda Science & Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lierda Science & Technology Group Co Ltd filed Critical Lierda Science & Technology Group Co Ltd
Priority to CN201310475562.7A priority Critical patent/CN103761456B/en
Publication of CN103761456A publication Critical patent/CN103761456A/en
Application granted granted Critical
Publication of CN103761456B publication Critical patent/CN103761456B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Abstract

The invention discloses an anti-cracking method for the core code of a singlechip. The method comprises the following steps: during code execution of the singlechip, generating an interrupt by using an MPU (Microprocessor Unit) memory protection module when executing a specific storage area when a ciphertext code is positioned; during the interrupt, decrypting the ciphertext code into a plaintext code by adopting an AES (Auxiliary Encoder System) module, and transmitting the plaintext code back to the specific storage area after correct CRC (Cyclic Redundancy Check); returning from the interrupt, executing the plaintext code in the specific storage area by using the singlechip, and encrypting the plaintext code of the specific storage area into the ciphertext code by using the AES module; after correct CRC, transmitting the ciphertext code to the specific storage area. By adopting the anti-cracking method, the core code in the singlechip exists in the form of the ciphertext, and a cracker cannot translate the core code in the form of the ciphertext into a plaintext even if the core code in the singlechip is read out, thereby protecting the core code.

Description

A kind of anti-method cracking of monolithic microcomputer kernel code
Technical field
The present invention relates to single-chip microcomputer code protection technical field, relate in particular to a kind of anti-method cracking of monolithic microcomputer kernel code.
Background technology
Now on the market the technology that cracks of single-chip microcomputer is emerged in an endless stream, mainly contain two kinds of modes: non-intrusion type and immersion.The mode of non-intrusion type is to utilize some leak in chip design or chip programming sequential to crack chip.Certainly along with the development of chip design industry, this kind of situation also can be fewer and feweri.The mode of intrusive mood is to destroy the encapsulation of chip; utilize semiconductor testing apparatus; the instrument such as microscope and micropositioner finds the position of chip protection fuse and by its reparation; make it become the chip of not encrypted; then with Special programming, program is read, or directly probe is placed on to the program in readout memory in chip internal bus.
China Patent Publication No. CN1971470A, open day on May 30th, 2007, the name of invention is called a kind of system encrypted method that adopts multifunctional assistant SCM, this application case discloses a kind of system encrypted method that adopts multifunctional assistant SCM, it is in multidigit processor system, get function relatively simple, the support microprocessor that software program amount is little is used with the built-in single-chip microcomputer of burning program storage to death and is substituted, in host-processor program and assistant SCM program, increase according to the cryptographic check of agreement cryptographic protocol algorithm, calling program can not be read out and cannot copy, thereby reach the object of system encryption.Its weak point is, the code in this single-chip microcomputer is plain code, and cracker can crack by the mode of intrusive mood, the plaintext code in single-chip microcomputer read out, thereby be reduced into higher level lanquage, grasps core technology.
Summary of the invention
The object of the invention is to overcome the technical matters that current single-chip microcomputer is easily cracked by intrusive mood mode; provide a kind of monolithic microcomputer kernel code the anti-method cracking; it makes core code in single-chip microcomputer exist with the form of ciphertext; even if cracker uses intrusive mood, mode has cracked single-chip microcomputer; single-chip microcomputer inner core code is read; also the core code of ciphertext form cannot be translated into expressly, thereby protect core code.
In order to address the above problem, the present invention is achieved by the following technical solutions:
The anti-method cracking of monolithic microcomputer kernel code, described single-chip microcomputer, with MPU memory protect module, AES just part accelerating module, dma module and CRC module, comprises the following steps:
S1: in advance the core code needing protection in single-chip microcomputer is carried out to initial encryption, core code is encrypted to ciphertext code by AES cryptographic algorithm, this ciphertext code is backed up simultaneously, the ciphertext code storage of backup is on the nonvolatile memory of single-chip microcomputer;
S2: in single-chip microcomputer run time version process, when carrying out the particular memory region at one section of ciphertext code place, MPU memory protect module produces an interruption;
S3: the code of the current execution of single-chip microcomputer enters interruption; dma module is transferred to this ciphertext code the appointed area in the volatile memory of single-chip microcomputer; AES just part accelerating module is decrypted into expressly code by the ciphertext code of appointed area; the verification of CRC module is code expressly; if check errors; perform step S4, if verification is correct, perform step S5;
S4: former ciphertext code remains unchanged, dma module can not pass back to plaintext code the particular memory region at former ciphertext code place, and the code of the current execution of single-chip microcomputer is always in interrupting, and interruption cannot be returned;
The particular memory region that S5:DMA module passes back to former ciphertext code place by plaintext code, by former ciphertext code coverage, after expressly code all returns, interrupts returning, and single-chip microcomputer is carried out expressly code;
S6: after expressly code is finished; dma module is transferred to this plaintext code the appointed area in the volatile memory of single-chip microcomputer; AES just part accelerating module becomes ciphertext code by the plaintext code encryption of appointed area; CRC module verification ciphertext code; if check errors; perform step S7, if verification is correct, perform step S8;
S7:DMA module is transferred to the ciphertext code of backup the particular memory region at former ciphertext code place by plaintext code coverage, and after ciphertext code end of transmission, single-chip microcomputer is carried out code below;
S8:DMA module passes back to ciphertext code the particular memory region at former ciphertext code place by plaintext code coverage, and after ciphertext code all returns, single-chip microcomputer is carried out code below;
In the process of execution step S2 to S8, if the power down of unit sheet, the particular memory region that dma module is transferred to former ciphertext code place by the ciphertext code of backup is by the code coverage in current this particular memory region.
In the technical program, MPU (MemoryProtectionUnit; Memory protect unit) memory protect module: can configure specific region internal memory reading and writing and code and carry out, when singlechip chip is carried out the ciphertext core code of specific region, MPU produces an interruption.AES (AdvancedEncryptionStandard; Advanced Encryption Standard) just just just part computing aes algorithm of part accelerating module of part accelerating module: AES, greatly reduces the AES enciphering/deciphering time, and AES can adopt 128/192/256bits key.DMA (DirectMemoryAccess; Direct memory access unit) module: data transmission module, can under CPU sleep quality, transmit data, reduce power consumption and transmission data time.CRC (CyclicRedundancyCheck; Cyclic redundancy check (CRC) code) module: data check module, the data after energy verification AES module enciphering/deciphering.
At singlechip chip, move in whole process, the core code overwhelming majority time is all that the form with ciphertext code exists, only have when it is performed, after deciphering verification are correct, just there will be expressly code, and after this plaintext code is finished, can become ciphertext code by re-encrypted again, the time that expressly code occurs is very short.Even if rival uses immersion mode to obtain the binary code of single-chip microcomputer; the core code that in this binary code, we will protect is the ciphertext code of encrypting; rival cannot be reduced into source code, obtains the core code that we will protect, and the value that chip cracks reduces greatly.
Performing step S2 to the process of step S8, if single-chip microcomputer power down, the particular memory region at former ciphertext code place may retain whole plaintext codes or part plaintext code, can cause data entanglement like this, single-chip microcomputer cannot normally be moved next time, the risk that simultaneously exists code to be cracked to read.Therefore when single-chip microcomputer power down, the particular memory region that the ciphertext code of backup is transferred to corresponding former ciphertext code place, by the code coverage in current this particular memory region, prevents that power down, causes data entanglement in the particular memory region plaintext stage.
As preferably, in described step S1, to first core code being divided into some sections before core code initial encryption, the data length of every section of core code is 0 to 1024bytes, then every section of core code is encrypted to ciphertext code by AES cryptographic algorithm respectively.The particular memory region at every execution to section ciphertext code place, MPU memory protect module all produces an interruption, then performs step S3 to S8.The data length of every section of core plaintext code is controlled in 1024bytes, because ciphertext code is identical with corresponding plaintext code data length, the data length of ciphertext code is also in 1024bytes, make single-chip microcomputer carry out each time expressly code and encryption and decryption expressly time of code very short, thereby reduce each section period that expressly code exists, increase the difficulty cracking, improved the security of core code.Meanwhile, even if core code data length is longer, the volatile memory of temporarily depositing plaintext code and ciphertext code does not need too large yet.
As preferably, in described step S1, single-chip microcomputer inner core code initial encryption is comprised the following steps: use computer host computer that the plaintext core code in single-chip microcomputer code is encrypted to ciphertext code by AES cryptographic algorithm, this ciphertext code is transferred to expressly expressly core code covering of the storage area at core code place in single-chip microcomputer scale-of-two recordable paper, and the plaintext CRC key and the ciphertext CRC key that computer host computer are generated add in single-chip microcomputer scale-of-two recordable paper simultaneously.
As preferably, in described step S6, dma module is transferred to plaintext code behind the appointed area in the volatile memory of single-chip microcomputer, removes the plaintext code in the particular memory region of former ciphertext code place.Reduce the section time that expressly code exists, increased the difficulty cracking, improve the security of core code.
As preferably, described AES just part accelerating module adopts 256bits key.
Substantial effect of the present invention is: (1) makes core code in single-chip microcomputer exist with the form of ciphertext; even if cracker uses intrusive mood, mode has cracked single-chip microcomputer; single-chip microcomputer inner core code is read; also the core code of ciphertext form cannot be translated into expressly, thereby protect core code.(2) core code is divided into some sections, the data length of every section of core code is 0 to 1024bytes, make single-chip microcomputer carry out each time expressly code and encryption and decryption expressly time of code shorter, thereby reduce each section period that expressly code exists, increase the difficulty cracking, improved the security of core code.
Accompanying drawing explanation
Fig. 1 is a kind of process flow diagram of the present invention.
Embodiment
Below by embodiment, and by reference to the accompanying drawings, technical scheme of the present invention is described in further detail.
Embodiment: the anti-method cracking of a kind of monolithic microcomputer kernel code of the present embodiment, single-chip microcomputer, with MPU memory protect module, AES just part accelerating module, dma module and CRC module, as shown in Figure 1, comprises the following steps:
S1: in advance the plaintext core code in single-chip microcomputer is divided into some sections of expressly codes; every section expressly the data length of code be 0 to 1024bytes; use computer host computer that every section of plaintext code is encrypted to ciphertext code by AES cryptographic algorithm; every section of ciphertext code is transferred to the storage area at corresponding one section of plaintext code place in single-chip microcomputer by one section of plaintext code coverage of correspondence; and plaintext CRC key and ciphertext CRC key are sent to single-chip microcomputer, back up in the back-up storage region that simultaneously these ciphertext codes is transferred to the nonvolatile memory of single-chip microcomputer;
S2: in single-chip microcomputer run time version process, when carrying out the particular memory region at one section of ciphertext code place (first address in this section of ciphertext code storage region), MPU memory protect module produces an interruption;
S3: the code of the current execution of single-chip microcomputer enters interruption; dma module is transferred to this ciphertext code the appointed area in the volatile memory of single-chip microcomputer; AES just part accelerating module is decrypted into expressly code by the ciphertext code of appointed area; the verification of CRC module is code expressly; if check errors; perform step S4, if verification is correct, perform step S5;
S4: former ciphertext code remains unchanged; dma module can not pass back to plaintext code the particular memory region at former ciphertext code place; the plaintext code decrypting is retained in the appointed area in volatile memory; the code of the current execution of single-chip microcomputer is always in interrupting; interruption cannot be returned, single-chip microcomputer cisco unity malfunction;
The particular memory region that S5:DMA module passes back to former ciphertext code place by plaintext code is by former ciphertext code coverage, and former ciphertext code, by full scale clearance, after expressly code all returns, interrupts returning, and single-chip microcomputer is carried out expressly code;
S6: after expressly code is finished; dma module is transferred to this plaintext code the appointed area in the volatile memory of single-chip microcomputer; after end of transmission, remove the plaintext code in the particular memory region of former ciphertext code place; AES just part accelerating module becomes ciphertext code by the plaintext code encryption of appointed area; CRC module verification ciphertext code, if check errors performs step S7; if verification is correct, perform step S8;
S7:DMA module is transferred to the ciphertext code of backup the particular memory region at former ciphertext code place by plaintext code coverage, and after ciphertext code end of transmission, single-chip microcomputer is carried out code below;
S8:DMA module passes back to ciphertext code the particular memory region at former ciphertext code place by plaintext code coverage, and after ciphertext code all returns, single-chip microcomputer is carried out code below;
In the process of execution step S2 to S8, if the power down of unit sheet, the particular memory region that dma module is transferred to corresponding former ciphertext code place by the ciphertext code of backup is by the code coverage in current this particular memory region.
MPU (MemoryProtectionUnit; Memory protect unit) memory protect module: can configure specific region internal memory reading and writing and code and carry out, when singlechip chip is carried out the ciphertext core code of specific region, MPU produces an interruption.AES (AdvancedEncryption Standard; Advanced Encryption Standard) just just just part computing aes algorithm of part accelerating module of part accelerating module: AES, greatly reduces the AES enciphering/deciphering time, and AES can adopt 128/192/256bits key.DMA (DirectMemoryAccess; Direct memory access unit) module: data transmission module, can under CPU sleep quality, transmit data, reduce power consumption and transmission data time.CRC (CyclicRedundancyCheck; Cyclic redundancy check (CRC) code) module: data check module, the data after energy verification AES module enciphering/deciphering.
At singlechip chip, move in whole process, the core code overwhelming majority time is all that the form with ciphertext code exists, only have when it is performed, after deciphering verification are correct, just there will be expressly code, and after this plaintext code is finished, can become ciphertext code by re-encrypted again, the time that expressly code occurs is very short.Even if rival uses immersion mode to obtain the binary code of single-chip microcomputer; the core code that in this binary code, we will protect is the ciphertext code of encrypting; rival cannot be reduced into source code, obtains the core code that we will protect, and the value that chip cracks reduces greatly.
In the present embodiment, single-chip microcomputer dominant frequency is 8MHz, and AES just part accelerating module adopts 256bits key, and the data length of the monolithic microcomputer kernel code that protect is 2304bytes.In step S1, be divided into 5 sections of expressly codes, the data length of 5 sections of plaintext codes is respectively 512bytes, 512bytes, 512bytes, 512bytes and 256bytes, the data length of every section of plaintext code is all no more than 512bytes, because ciphertext code is identical with corresponding plaintext code data length, so the data length of every section of ciphertext code is also all no more than 512bytes.
In single-chip microcomputer dominant frequency, be 8MHz, AES just part accelerating module adopts in the situation of 256bits key, for the code of data length 512bytes: the deciphering time is 1.35ms, and the encryption time is 1.35ms, and the code execution time is 0.1ms.It is very short that single-chip microcomputer is carried out the time of plaintext code and encryption and decryption plaintext code each time, thereby reduce each section period that expressly code exists, and increased the difficulty cracking, and improves the security of core code.Meanwhile, even if core code data length is longer, the volatile memory of temporarily depositing plaintext code and ciphertext code does not need too large yet.
Performing step S2 to the process of step S8, if single-chip microcomputer power down, the particular memory region at former ciphertext code place may retain whole plaintext codes or part plaintext code, can cause data entanglement like this, single-chip microcomputer cannot normally be moved next time, the risk that simultaneously exists code to be cracked to read.Therefore when single-chip microcomputer power down, the particular memory region that the ciphertext code of backup is transferred to corresponding former ciphertext code place, by the code coverage in current this particular memory region, prevents that power down, causes data entanglement in the particular memory region plaintext stage.

Claims (5)

1. the anti-method cracking of monolithic microcomputer kernel code, described single-chip microcomputer with MPU memory protect module, AES just part accelerating module, dma module and CRC module, is characterized in that, comprises the following steps:
S1: in advance the core code needing protection in single-chip microcomputer is carried out to initial encryption, core code is encrypted to ciphertext code by AES cryptographic algorithm, this ciphertext code is backed up simultaneously, the ciphertext code storage of backup is on the nonvolatile memory of single-chip microcomputer;
S2: in single-chip microcomputer run time version process, when carrying out the particular memory region at one section of ciphertext code place, MPU memory protect module produces an interruption;
S3: the code of the current execution of single-chip microcomputer enters interruption; dma module is transferred to this ciphertext code the appointed area in the volatile memory of single-chip microcomputer; AES just part accelerating module is decrypted into expressly code by the ciphertext code of appointed area; the verification of CRC module is code expressly; if check errors; perform step S4, if verification is correct, perform step S5;
S4: former ciphertext code remains unchanged, dma module can not pass back to plaintext code the particular memory region at former ciphertext code place, and the code of the current execution of single-chip microcomputer is always in interrupting, and interruption cannot be returned;
The particular memory region that S5:DMA module passes back to former ciphertext code place by plaintext code, by former ciphertext code coverage, after expressly code all returns, interrupts returning, and single-chip microcomputer is carried out expressly code;
S6: after expressly code is finished; dma module is transferred to this plaintext code the appointed area in the volatile memory of single-chip microcomputer; AES just part accelerating module becomes ciphertext code by the plaintext code encryption of appointed area; CRC module verification ciphertext code; if check errors; perform step S7, if verification is correct, perform step S8;
S7:DMA module is transferred to the ciphertext code of backup the particular memory region at former ciphertext code place by plaintext code coverage, and after ciphertext code end of transmission, single-chip microcomputer is carried out code below;
S8:DMA module passes back to ciphertext code the particular memory region at former ciphertext code place by plaintext code coverage, and after ciphertext code all returns, single-chip microcomputer is carried out code below;
In the process of execution step S2 to S8, if the power down of unit sheet, the particular memory region that dma module is transferred to former ciphertext code place by the ciphertext code of backup is by the code coverage in current this particular memory region.
2. a kind of monolithic microcomputer kernel code according to claim 1 is prevented the method cracking, it is characterized in that: in described step S1 to first core code being divided into some sections before core code initial encryption, the data length of every section of core code is 0 to 1024bytes, then every section of core code is encrypted to ciphertext code by AES cryptographic algorithm respectively.
3. a kind of monolithic microcomputer kernel code according to claim 1 is prevented the method cracking, it is characterized in that, in described step S1, single-chip microcomputer inner core code initial encryption is comprised the following steps: use computer host computer that the plaintext core code in single-chip microcomputer code is encrypted to ciphertext code by AES cryptographic algorithm, this ciphertext code is transferred to expressly expressly core code covering of the storage area at core code place in single-chip microcomputer scale-of-two recordable paper, the plaintext CRC key and the ciphertext CRC key that computer host computer are generated add in single-chip microcomputer scale-of-two recordable paper simultaneously.
4. according to the anti-method cracking of a kind of monolithic microcomputer kernel code described in claim 1 or 2 or 3, it is characterized in that: in described step S6, dma module is transferred to plaintext code behind the appointed area in the volatile memory of single-chip microcomputer, removes the plaintext code in the particular memory region of former ciphertext code place.
5. according to the anti-method cracking of a kind of monolithic microcomputer kernel code described in claim 1 or 2 or 3, it is characterized in that: described AES just part accelerating module adopts 256bits key.
CN201310475562.7A 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code Active CN103761456B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310475562.7A CN103761456B (en) 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310475562.7A CN103761456B (en) 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code

Publications (2)

Publication Number Publication Date
CN103761456A true CN103761456A (en) 2014-04-30
CN103761456B CN103761456B (en) 2016-05-11

Family

ID=50528692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310475562.7A Active CN103761456B (en) 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code

Country Status (1)

Country Link
CN (1) CN103761456B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156675A (en) * 2014-08-05 2014-11-19 唐道成 Chip encipher
CN104573425A (en) * 2014-12-31 2015-04-29 上海格尔软件股份有限公司 Python program module encryption method based on symmetric algorithm and dedicated loading module
CN106951746A (en) * 2017-04-25 2017-07-14 厦门芯阳科技股份有限公司 The anti-reversing crack method and system of a kind of temperature control class method
CN107066843A (en) * 2017-03-31 2017-08-18 武汉斗鱼网络科技有限公司 A kind of method and device protected to application program
CN107194210A (en) * 2017-05-05 2017-09-22 厦门芯阳科技股份有限公司 A kind of anti-crack method of single-chip microcomputer code
CN109325322A (en) * 2017-08-01 2019-02-12 马克西姆综合产品公司 Software Intellectual Property Rights for embedded platform protect system and method
CN109446757A (en) * 2018-10-25 2019-03-08 石生花微电子(南京)有限公司 A method of for general MCU programmed protection
CN109858241A (en) * 2017-11-22 2019-06-07 浙江智贝信息科技有限公司 A kind of single device code security executes and exchange method and its interactive system
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950345A (en) * 2010-09-29 2011-01-19 山东大学 Hardware decryption-based high-reliability terminal equipment and working method thereof
US20110138192A1 (en) * 2009-12-04 2011-06-09 Kocher Paul C Verifiable, Leak-Resistant Encryption and Decryption
CN102324006A (en) * 2011-09-06 2012-01-18 四川九洲电器集团有限责任公司 Processor program safety protection device and method
CN102938046A (en) * 2012-10-11 2013-02-20 杭州晟元芯片技术有限公司 Code protection method based on static encrypted storage and dynamic decrypted operation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110138192A1 (en) * 2009-12-04 2011-06-09 Kocher Paul C Verifiable, Leak-Resistant Encryption and Decryption
CN101950345A (en) * 2010-09-29 2011-01-19 山东大学 Hardware decryption-based high-reliability terminal equipment and working method thereof
CN102324006A (en) * 2011-09-06 2012-01-18 四川九洲电器集团有限责任公司 Processor program safety protection device and method
CN102938046A (en) * 2012-10-11 2013-02-20 杭州晟元芯片技术有限公司 Code protection method based on static encrypted storage and dynamic decrypted operation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
潘永雄 等: "《单片机控制程序加密策略探索与应用》", 《计算机工程与设计》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156675A (en) * 2014-08-05 2014-11-19 唐道成 Chip encipher
CN104573425B (en) * 2014-12-31 2018-01-30 上海格尔软件股份有限公司 A kind of Python program module encryption methods based on symmetry algorithm and special load-on module
CN104573425A (en) * 2014-12-31 2015-04-29 上海格尔软件股份有限公司 Python program module encryption method based on symmetric algorithm and dedicated loading module
CN107066843A (en) * 2017-03-31 2017-08-18 武汉斗鱼网络科技有限公司 A kind of method and device protected to application program
CN106951746A (en) * 2017-04-25 2017-07-14 厦门芯阳科技股份有限公司 The anti-reversing crack method and system of a kind of temperature control class method
CN107194210B (en) * 2017-05-05 2019-07-30 厦门芯阳科技股份有限公司 A kind of anti-crack method of single-chip microcontroller code
CN107194210A (en) * 2017-05-05 2017-09-22 厦门芯阳科技股份有限公司 A kind of anti-crack method of single-chip microcomputer code
CN109325322A (en) * 2017-08-01 2019-02-12 马克西姆综合产品公司 Software Intellectual Property Rights for embedded platform protect system and method
CN109325322B (en) * 2017-08-01 2024-01-02 马克西姆综合产品公司 Software intellectual property protection system and method for embedded platform
CN109858241A (en) * 2017-11-22 2019-06-07 浙江智贝信息科技有限公司 A kind of single device code security executes and exchange method and its interactive system
CN109858241B (en) * 2017-11-22 2021-12-17 浙江智贝信息科技有限公司 Single-equipment code safe execution and interaction method and interaction system thereof
CN109446757A (en) * 2018-10-25 2019-03-08 石生花微电子(南京)有限公司 A method of for general MCU programmed protection
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification

Also Published As

Publication number Publication date
CN103761456B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN103761456B (en) A kind of anti-method cracking of monolithic microcomputer kernel code
US9251380B1 (en) Method and storage device for isolating and preventing access to processor and memory used in decryption of text
EP2506488B1 (en) Secure dynamic on-chip key programming
KR100792287B1 (en) Method for security and the security apparatus thereof
US10318765B2 (en) Protecting critical data structures in an embedded hypervisor system
CN102163268B (en) The term of execution verifying software code the method and apparatus of integrality
KR20140019599A (en) Method of managing key for secure storage of data, and and apparatus there-of
US20130159725A1 (en) Fpga apparatus and method for protecting bitstream
US9460312B2 (en) Data integrity protection from rollback attacks for use with systems employing message authentication code tags
CN103136458A (en) Code protection method for Linux operating system and module of method
CN104486355A (en) Method and device for preventing malicious manipulation of codes
CN104834835A (en) Universal digital rights protection method under Windows platform
CN109977702B (en) FPGA equipment encryption authentication system based on DS2432 chip
CN105184196A (en) Electronic system information security protection system and method
CN104537320A (en) Automatic encrypting method and system for chip
TW201939267A (en) Method and apparatus for performing firmware programming on microcontroller chip, and associated microcontroller chip
TWI393006B (en) Security system and method for code dump protection
US11019098B2 (en) Replay protection for memory based on key refresh
CN103347017A (en) Data processing method and system on chip
CN109598105B (en) Method and device for safely loading firmware by microcontroller, computer equipment and storage medium
US20220171671A1 (en) Methods and systems for generating core dump in a user equipment
CN107861892B (en) Method and terminal for realizing data processing
CN105022651A (en) Anti-piratic method in equipment production process and firmware burning device
CN104866740A (en) Static analysis preventing method and device for files
CN104751026A (en) Software protection method and software application method of android system, and related devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant