CN109889333A - Firmware data encryption method, device, computer equipment and storage medium - Google Patents
Firmware data encryption method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109889333A CN109889333A CN201910068225.3A CN201910068225A CN109889333A CN 109889333 A CN109889333 A CN 109889333A CN 201910068225 A CN201910068225 A CN 201910068225A CN 109889333 A CN109889333 A CN 109889333A
- Authority
- CN
- China
- Prior art keywords
- firmware
- random number
- key
- plaintext
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
This application involves a kind of firmware data encryption method, device, computer equipment and storage mediums, wherein this method comprises: obtaining firmware data CIPHERING REQUEST;Random number and random number key address are generated according to the firmware data CIPHERING REQUEST, by the random number and cipher key address is counted at any time and is filled in the reserved bit of firmware header file of plaintext;Corresponding random number is taken out from the random number according to the random number key address, according to the generating random number key of the taking-up;It is encrypted to obtain the firmware binary file of ciphertext according to the firmware binary file of plaintext described in the key pair;It is combined the firmware binary file of the firmware header file of the plaintext and the ciphertext to obtain complete encrypted firmware data.The present invention is realized by using random number as key the firmware file in solid state hard disk, and then firmware is cracked caused by avoiding because of Key Exposure, has reached the safety for improving solid state hard disk data.
Description
Technical field
The present invention relates to solid state hard disk technical fields, more particularly to a kind of firmware data encryption method, device, computer
Equipment and storage medium.
Background technique
Currently, the firmware file in solid state hard disk is stored in solid state hard disk Flash, firmware file by firmware header file
The binary file two parts composition generated with firmware engineering compiling.To protect the firmware code with core knowledge property right to pacify
Entirely.Solid state hard disk manufacturer can be encrypted the binary file of firmware using symmetric encipherment algorithm, and ciphertext is used in firmware
Firmware binary file.I.e. firmware file is made of the firmware header file of plaintext and the firmware binary file of ciphertext.
In the conventional technology, once hacker obtains the firmware file in Flash by illegal means.Due to consolidating for plaintext
The data of part header file and the firmware binary file of ciphertext are with obviously difference, hacker are easy to judge firmware two
The initial address of binary file.And the length of the offset address of firmware storage, firmware binary file is generally comprised in header file
The key messages such as degree, encryption key.There is no some random interference informations in header file, veteran hacker passes through observation
Or the trial of fewer number can accurately obtain the relevant information in header file, hacker utilizes these information, fragile to solve admittedly
The binary file of part.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of may be implemented to improve firmware data safety consolidate
Part data ciphering method, device, computer equipment and storage medium.
A kind of firmware data encryption method, which comprises
Obtain firmware data CIPHERING REQUEST;
Generate random number and random number key address according to the firmware data CIPHERING REQUEST, by the random number and
Cipher key address is counted at any time to be filled in the reserved bit of firmware header file of plaintext;
According to the random number key address corresponding random number is taken out from the random number, according to the taking-up with
Machine number generates key;
It is encrypted to obtain the firmware binaries text of ciphertext according to the firmware binary file of plaintext described in the key pair
Part;
The firmware binary file of the firmware header file of the plaintext and the ciphertext is combined to obtain and is completely added
Close firmware data.
In one of the embodiments, in the firmware binaries of the firmware header file by the plaintext and the ciphertext
File was combined after the step of obtaining complete encrypted firmware data further include:
The random number key address is read from the firmware header file of the plaintext;
Read from the random number in the firmware header file of the plaintext according to the random number key address it is corresponding with
Machine number, according to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair
Part.
In one of the embodiments, the method also includes:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
In one of the embodiments, in the firmware binaries of the firmware header file by the plaintext and the ciphertext
File was combined after the step of obtaining complete encrypted firmware data further include:
The multiple random number key address is read from the firmware header file of the plaintext;
It is read from the random number in the firmware header file of the plaintext according to the multiple random number key address multiple
Corresponding random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair
Part.
A kind of firmware data encryption device, the firmware data encryption device include:
Module is obtained, the acquisition module is for obtaining firmware data CIPHERING REQUEST;
Random number generation module, the generation module be used for according to the firmware data CIPHERING REQUEST generate random number and
Random number key address counts the reserved bit that cipher key address are filled in the firmware header file of plaintext by the random number and at any time
In;
Key production module, the key production module are used for according to the random number key address from the random number
Corresponding random number is taken out, according to the generating random number key of the taking-up;
Encrypting module, firmware binary file of the encrypting module for the plaintext according to the key pair are added
The close firmware binary file for obtaining ciphertext;
Composite module, the composite module are used for the firmware binaries of the firmware header file of the plaintext and the ciphertext
File is combined to obtain complete encrypted firmware data.
Described device in one of the embodiments, further include: deciphering module, the deciphering module are used for:
The random number key address is read from the firmware header file of the plaintext;
Read from the random number in the firmware header file of the plaintext according to the random number key address it is corresponding with
Machine number, according to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair
Part.
The encrypting module is also used in one of the embodiments:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
The deciphering module is also used in one of the embodiments:
The multiple random number key address is read from the firmware header file of the plaintext;
It is read from the random number in the firmware header file of the plaintext according to the multiple random number key address multiple
Corresponding random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair
Part.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage
The step of computer program, the processor realizes above-mentioned any one method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of above-mentioned any one method is realized when row.
Above-mentioned firmware data encryption method, device, computer equipment and storage medium, the first encryption of acquisition firmware data are asked
It asks;Random number and random number key address are generated according to the firmware data CIPHERING REQUEST, by the random number and at any time
Number cipher key address is filled in the reserved bit of firmware header file of plaintext;According to the random number key address from the random number
It is middle to take out corresponding random number, according to the generating random number key of the taking-up;According to the firmware of plaintext described in the key pair
Binary file is encrypted to obtain the firmware binary file of ciphertext;By the firmware header file of the plaintext and the ciphertext
Firmware binary file is combined to obtain complete encrypted firmware data.The present invention is realized by by consolidating in solid state hard disk
Part file all uses random number as key, and then firmware is cracked caused by avoiding because of Key Exposure, and it is hard to have reached raising solid-state
The safety of disk data.
Detailed description of the invention
Fig. 1 is the storage state schematic diagram of firmware in solid state hard disk in traditional technology;
Fig. 2 is the storage state schematic diagram of firmware in solid state hard disk in one embodiment;
Fig. 3 is the flow diagram of firmware data encryption method in one embodiment;
Fig. 4 is the flow diagram of firmware data encryption method in another embodiment;
Fig. 5 is the flow diagram of firmware data encryption method in further embodiment;
Fig. 6 is the flow diagram of firmware data encryption method in another embodiment;
Fig. 7 is the flow diagram for realizing firmware file ciphering process in one embodiment by strapping tool;
Fig. 8 is the flow diagram for realizing firmware file decrypting process in one embodiment by controller;
Fig. 9 is the structural block diagram of firmware data encryption device in one embodiment;
Figure 10 is the structural block diagram of firmware data encryption device in another embodiment;
Figure 11 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
The storage state of firmware is as shown in Figure 1 in solid state hard disk at present.In general, the firmware file in solid state hard disk is stored in admittedly
In state hard disk Flash, firmware file is made of binary file two parts that header file and the firmware engineering compiling of firmware generate.
To protect the firmware code safety with core knowledge property right.Solid state hard disk manufacturer can use the binary file of firmware symmetrical
Encryption Algorithm is encrypted, and the firmware binary file of ciphertext is used in firmware.I.e. firmware file by plaintext firmware header file
It is formed with the firmware binary file of ciphertext.
Once hacker obtains the firmware file in Flash by illegal means.Due to the firmware header file of plaintext and close
The data of the firmware binary file of text have obviously difference, and hacker is easy to judge rising for firmware binary file
Beginning address.And the offset address of firmware storage, length, the encryption key of firmware binary file etc. are generally comprised in header file
Key message.There is no some random interference informations in header file, veteran hacker passes through observation or fewer number
Trial can accurately obtain the relevant information in header file, hacker utilizes these information, the fragile binary system text for solving firmware
Part.
To prevent hacker from obtaining the binary file of firmware, the invention proposes a kind of safe encryption sides of firmware data
Method improves the safety of firmware data.
Specifically, the present invention in solid state hard disk in firmware storage state as shown in Fig. 2, firmware file still by plaintext
Ciphertext binary file two parts composition that firmware header file and firmware engineering compiling generate, the key that encrypted firmware uses is still
It is stored in header file.In order to allow hacker that can not identify the initial position of firmware binary file easily, this patent use with
The mode of machine number fills the reserved bit in header file, rather than assigns 0 directly to reserved bit.And the key of encryption is exactly from these
Composition is randomly selected in random number, ensure that the firmware file in each solid state hard disk is different, and is increased and certain is obscured
Property.
2 data segments are increased relative to existing version in header file, for indicating the storage address of key.Firmware is packaged
The address that tool can be stored according to the two data segments, takes out two parts of random numbers, by this two parts of random numbers from corresponding position
Combination becomes in order to which we need complete encryption key to be used.Strapping tool is encrypted using the key pair firmware.Due to
What the value of the two data segments was also randomly generated, confusion is equally also increased, this makes hacker that can not obtain accurate add
Key cracks the firmware of encryption.
It is understood that 2 data segments in the present embodiment are also possible to multiple data segments, by multiple random numbers into
Row combination producing key, to improve the confusion of key.
In one embodiment, as shown in figure 3, providing a kind of firmware data encryption method, this method comprises:
Step 302, firmware data CIPHERING REQUEST is obtained;
Step 304, random number and random number key address are generated according to firmware data CIPHERING REQUEST, by random number and
Cipher key address is counted at any time to be filled in the reserved bit of firmware header file of plaintext;
Step 306, corresponding random number is taken out from random number according to random number key address, according to the random number of taking-up
Generate key;
Step 308, it is encrypted to obtain the firmware binaries text of ciphertext according to the firmware binary file of key pair plaintext
Part;
Step 310, the firmware binary file of the firmware header file of plaintext and ciphertext is combined to obtain and is completely added
Close firmware data.
Specifically, in conjunction with reference Fig. 7, the encryption flow of firmware data is described as follows:
1. strapping tool generates random number and is filled in the useless reserved bit of header file.Process 2 is executed in next step.
2. strapping tool generates two random number key addresses, according to cipher key address from the random number generated in process 1
Random number is taken out, the key by random number combination as encryption.Process 3 is executed in next step.
3. the firmware binary file of the key pair plaintext of the generation in strapping tool process for using 2 encrypts, ciphertext is generated
Firmware binary file.Process 4 is executed in next step.
4. strapping tool combines the firmware header file of plaintext and the firmware binary file of ciphertext.
In the present embodiment, firmware data CIPHERING REQUEST is obtained first;Random number is generated according to firmware data CIPHERING REQUEST
And random number key address, the reserved bit that cipher key address are filled in the firmware header file of plaintext is counted by random number and at any time
In;Corresponding random number is taken out from random number according to random number key address, according to the generating random number key of taking-up;According to
The firmware binary file of key pair plaintext is encrypted to obtain the firmware binary file of ciphertext;By the firmware header file of plaintext
It is combined to obtain complete encrypted firmware data with the firmware binary file of ciphertext.The present embodiment is realized by by solid-state
Firmware file in hard disk all uses random number as key, and then firmware is cracked caused by avoiding because of Key Exposure, reaches
Improve the safety of solid state hard disk data.
In one embodiment, it as shown in figure 4, providing a kind of firmware data encryption method, also wraps after step 310
It includes:
Step 312, random number key address is read from the firmware header file of plaintext;
Step 314, read from the random number in the firmware header file of plaintext according to random number key address it is corresponding with
Machine number, according to the generating random number key of taking-up;
Step 316, it is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of key pair ciphertext
Part.
Specifically, in conjunction with reference Fig. 7 and Fig. 8, the encryption flow of firmware data is described as follows:
1. strapping tool generates random number and is filled in the useless reserved bit of header file.Process 2 is executed in next step.
2. strapping tool generates two random number key addresses, according to cipher key address from the random number generated in process 1
Random number is taken out, the key by random number combination as encryption.Process 3 is executed in next step.
3. the firmware binary file of the key pair plaintext of the generation in strapping tool process for using 2 encrypts, ciphertext is generated
Firmware binary file.Process 4 is executed in next step.
4. strapping tool combines the firmware header file of plaintext and the firmware binary file of ciphertext.
The decryption process description of firmware data is as follows:
1. controller reads the address value of 2 storage keys from header file code key data segment, deposited according to the two data segments
The address put takes out two parts of random numbers from corresponding position, executes process 2 in next step.
2. this two parts of random numbers are combined into complete encryption key by controller.Process 3 is executed in next step.
3. the firmware for generating plaintext is decrypted using key pair encryption firmware for controller.Process 4 is executed in next step.
4. controller load operating firmware.
In the present embodiment, complete encryption and decrypting process are realized by strapping tool and controller, passed through
The reserved bit in firmware header file is filled using the mode of random number, rather than directly to retention position 0.And encryption key from
Composition is randomly selected in these random numbers, be ensure that the firmware file in each solid state hard disk is different, is increased certain
Confusion.
In one embodiment, as shown in figure 5, providing a kind of firmware data encryption method, this method further include:
Step 502, multiple random number key addresses are generated according to firmware data CIPHERING REQUEST;
Step 504, multiple corresponding random numbers are taken out from random number according to multiple random number key addresses;
Step 506, multiple corresponding random numbers are combined to the key as encryption.
In one embodiment, it as shown in fig. 6, providing a kind of firmware data encryption method, also wraps after step 310
It includes:
Step 602, multiple random number key addresses are read from the firmware header file of plaintext;
Step 604, it is read from the random number in the firmware header file of plaintext according to multiple random number key addresses multiple
Corresponding random number;
Step 606, multiple corresponding random numbers are combined as key;
Step 608, it is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of key pair ciphertext
Part.
In the present embodiment, by increasing multiple data segments relative to existing version in header file, for indicating key
Storage address.Firmware strapping tool can according to the two data segments store address, taken out from corresponding position more parts with
Machine number becomes this more parts of random number combinations in order to which we need complete encryption key to be used.Strapping tool uses the key
Firmware is encrypted.It is also randomly generated due to the value of this multiple data segment, equally also increases confusion, this makes black
Visitor can not obtain accurate encryption key to crack the firmware of encryption.
It should be understood that although each step in the flow chart of Fig. 3-6 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 3-6
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 9, providing a kind of firmware data encryption device 900, which includes:
Module 901 is obtained, for obtaining firmware data CIPHERING REQUEST;
Random number generation module 902, for according to firmware data CIPHERING REQUEST generation random number and random number key
Location by random number and counts cipher key address at any time and is filled in the reserved bit of firmware header file of plaintext;
Key production module 903, for taking out corresponding random number from random number according to random number key address, according to
The generating random number key of taking-up;
Encrypting module 904 obtains the firmware of ciphertext for being encrypted according to the firmware binary file of key pair plaintext
Binary file;
Composite module 905, for the firmware binary file of the firmware header file of plaintext and ciphertext to be combined to obtain
Complete encrypted firmware data.
In one embodiment, as shown in Figure 10, a kind of firmware data encryption device 900, the device are provided further include:
Deciphering module 906, is used for:
Random number key address is read from the firmware header file of plaintext;
Corresponding random number is read from the random number in the firmware header file of plaintext according to random number key address, according to
The generating random number key of taking-up;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of key pair ciphertext.
In one embodiment, which is also used to:
Multiple random number key addresses are generated according to firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from random number according to multiple random number key addresses;
Multiple corresponding random numbers are combined to the key as encryption.
In one embodiment, which is also used to:
Multiple random number key addresses are read from the firmware header file of plaintext;
Read from the random number in the firmware header file of plaintext according to multiple random number key addresses it is multiple it is corresponding with
Machine number;
Multiple corresponding random numbers are combined as key;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of key pair ciphertext.
Specific about firmware data encryption device limits the limit that may refer to above for firmware data encryption method
Fixed, details are not described herein.
In one embodiment, a kind of computer equipment is provided, internal structure chart can be as shown in figure 11.The calculating
Machine equipment includes processor, memory and the network interface connected by system bus.Wherein, the processing of the computer equipment
Device is for providing calculating and control ability.The memory of the computer equipment includes non-volatile memory medium, built-in storage.It should
Non-volatile memory medium is stored with operating system, computer program and database.The built-in storage is non-volatile memories Jie
The operation of operating system and computer program in matter provides environment.The network interface of the computer equipment is used for and external end
End passes through network connection communication.To realize a kind of firmware data encryption method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 11, only part relevant to application scheme
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor are realized when executing computer program in above each embodiment of the method
The step of.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
The step in above each embodiment of the method is realized when machine program is executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of firmware data encryption method, which comprises
Obtain firmware data CIPHERING REQUEST;
Random number and random number key address are generated according to the firmware data CIPHERING REQUEST, by the random number and at any time
Number cipher key address is filled in the reserved bit of firmware header file of plaintext;
Corresponding random number is taken out from the random number according to the random number key address, according to the random number of the taking-up
Generate key;
It is encrypted to obtain the firmware binary file of ciphertext according to the firmware binary file of plaintext described in the key pair;
The firmware binary file of the firmware header file of the plaintext and the ciphertext is combined to obtain complete encryption admittedly
Number of packages evidence.
2. firmware data encryption method according to claim 1, which is characterized in that in the firmware head by the plaintext
File and the firmware binary file of the ciphertext were combined after the step of obtaining complete encrypted firmware data further include:
The random number key address is read from the firmware header file of the plaintext;
Corresponding random number is read from the random number in the firmware header file of the plaintext according to the random number key address,
According to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
3. firmware data encryption method according to claim 2, which is characterized in that the method also includes:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
4. firmware data encryption method according to claim 3, which is characterized in that in the firmware head by the plaintext
File and the firmware binary file of the ciphertext were combined after the step of obtaining complete encrypted firmware data further include:
The multiple random number key address is read from the firmware header file of the plaintext;
Multiple correspondences are read from the random number in the firmware header file of the plaintext according to the multiple random number key address
Random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
5. a kind of firmware data encryption device, which is characterized in that the firmware data encryption device includes:
Module is obtained, the acquisition module is for obtaining firmware data CIPHERING REQUEST;
Random number generation module, the generation module is for according to firmware data CIPHERING REQUEST generation random number and at random
Number cipher key address by the random number and counts cipher key address at any time and is filled in the reserved bit of firmware header file of plaintext;
Key production module, the key production module according to the random number key address from the random number for taking out
Corresponding random number, according to the generating random number key of the taking-up;
Encrypting module, firmware binary file of the encrypting module for the plaintext according to the key pair encrypt
To the firmware binary file of ciphertext;
Composite module, the composite module are used for the firmware binary file of the firmware header file of the plaintext and the ciphertext
It is combined to obtain complete encrypted firmware data.
6. firmware data encryption device according to claim 5, which is characterized in that described device further include: deciphering module,
The deciphering module is used for:
The random number key address is read from the firmware header file of the plaintext;
Corresponding random number is read from the random number in the firmware header file of the plaintext according to the random number key address,
According to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
7. firmware data encryption device according to claim 6, which is characterized in that the encrypting module is also used to:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
8. firmware data encryption device according to claim 7, which is characterized in that the deciphering module is also used to:
The multiple random number key address is read from the firmware header file of the plaintext;
Multiple correspondences are read from the random number in the firmware header file of the plaintext according to the multiple random number key address
Random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
9. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any one of claims 1 to 4 institute when executing the computer program
The step of stating method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of Claims 1-4 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910068225.3A CN109889333B (en) | 2019-01-24 | 2019-01-24 | Firmware data encryption method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910068225.3A CN109889333B (en) | 2019-01-24 | 2019-01-24 | Firmware data encryption method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109889333A true CN109889333A (en) | 2019-06-14 |
CN109889333B CN109889333B (en) | 2022-03-29 |
Family
ID=66926800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910068225.3A Active CN109889333B (en) | 2019-01-24 | 2019-01-24 | Firmware data encryption method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889333B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545175A (en) * | 2019-08-23 | 2019-12-06 | 国网湖北省电力有限公司电力科学研究院 | Security authentication method for communication protocol of charging pile and electric vehicle |
CN110545172A (en) * | 2019-06-28 | 2019-12-06 | 深圳忆联信息系统有限公司 | safe card opening method and device for controller |
CN111177751A (en) * | 2019-12-20 | 2020-05-19 | 苏州浪潮智能科技有限公司 | Method, equipment and readable medium for encrypting pdf file |
CN113688399A (en) * | 2021-08-25 | 2021-11-23 | 深圳忆联信息系统有限公司 | Firmware digital signature protection method and device, computer equipment and storage medium |
CN114567476A (en) * | 2022-02-23 | 2022-05-31 | 平安普惠企业管理有限公司 | Data security protection method and device, electronic equipment and medium |
CN116910711A (en) * | 2023-07-13 | 2023-10-20 | 北京领创医谷科技发展有限责任公司 | MCU firmware confusion method, system, server and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100058047A1 (en) * | 2008-08-28 | 2010-03-04 | General Instrument Corporation | Encrypting a unique cryptographic entity |
CN102291418A (en) * | 2011-09-23 | 2011-12-21 | 胡祥义 | Method for realizing cloud computing security architecture |
US20160246964A1 (en) * | 2015-02-24 | 2016-08-25 | Dell Products, Lp | Method to Protect BIOS NVRAM from Malicious Code Injection by Encrypting NVRAM Variables and System Therefor |
CN106201925A (en) * | 2016-07-01 | 2016-12-07 | 四川效率源信息安全技术股份有限公司 | A kind of decryption method of western number hard disk |
CN106503494A (en) * | 2016-11-05 | 2017-03-15 | 福建省北峰电讯科技有限公司 | A kind of firmware protection location and guard method with flash memory microcontroller on piece |
US20170373851A1 (en) * | 2015-12-18 | 2017-12-28 | Shenzhen Zhenhua Microelectronics Co., Ltd | Computer security locks having separate key pairs |
CN108599930A (en) * | 2018-04-02 | 2018-09-28 | 湖南国科微电子股份有限公司 | Firmware encrypting and deciphering system and method |
CN108762791A (en) * | 2018-06-07 | 2018-11-06 | 深圳市元征科技股份有限公司 | Firmware upgrade method and device |
-
2019
- 2019-01-24 CN CN201910068225.3A patent/CN109889333B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100058047A1 (en) * | 2008-08-28 | 2010-03-04 | General Instrument Corporation | Encrypting a unique cryptographic entity |
CN102291418A (en) * | 2011-09-23 | 2011-12-21 | 胡祥义 | Method for realizing cloud computing security architecture |
US20160246964A1 (en) * | 2015-02-24 | 2016-08-25 | Dell Products, Lp | Method to Protect BIOS NVRAM from Malicious Code Injection by Encrypting NVRAM Variables and System Therefor |
US20170373851A1 (en) * | 2015-12-18 | 2017-12-28 | Shenzhen Zhenhua Microelectronics Co., Ltd | Computer security locks having separate key pairs |
CN106201925A (en) * | 2016-07-01 | 2016-12-07 | 四川效率源信息安全技术股份有限公司 | A kind of decryption method of western number hard disk |
CN106503494A (en) * | 2016-11-05 | 2017-03-15 | 福建省北峰电讯科技有限公司 | A kind of firmware protection location and guard method with flash memory microcontroller on piece |
CN108599930A (en) * | 2018-04-02 | 2018-09-28 | 湖南国科微电子股份有限公司 | Firmware encrypting and deciphering system and method |
CN108762791A (en) * | 2018-06-07 | 2018-11-06 | 深圳市元征科技股份有限公司 | Firmware upgrade method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545172A (en) * | 2019-06-28 | 2019-12-06 | 深圳忆联信息系统有限公司 | safe card opening method and device for controller |
CN110545172B (en) * | 2019-06-28 | 2022-06-07 | 深圳忆联信息系统有限公司 | Safe card opening method and device for controller |
CN110545175A (en) * | 2019-08-23 | 2019-12-06 | 国网湖北省电力有限公司电力科学研究院 | Security authentication method for communication protocol of charging pile and electric vehicle |
CN110545175B (en) * | 2019-08-23 | 2022-08-26 | 国网湖北省电力有限公司电力科学研究院 | Security authentication method for communication protocol of charging pile and electric vehicle |
CN111177751A (en) * | 2019-12-20 | 2020-05-19 | 苏州浪潮智能科技有限公司 | Method, equipment and readable medium for encrypting pdf file |
CN111177751B (en) * | 2019-12-20 | 2022-05-24 | 苏州浪潮智能科技有限公司 | Method and equipment for encrypting pdf file and readable medium |
CN113688399A (en) * | 2021-08-25 | 2021-11-23 | 深圳忆联信息系统有限公司 | Firmware digital signature protection method and device, computer equipment and storage medium |
CN114567476A (en) * | 2022-02-23 | 2022-05-31 | 平安普惠企业管理有限公司 | Data security protection method and device, electronic equipment and medium |
CN114567476B (en) * | 2022-02-23 | 2024-02-13 | 天翼安全科技有限公司 | Data security protection method and device, electronic equipment and medium |
CN116910711A (en) * | 2023-07-13 | 2023-10-20 | 北京领创医谷科技发展有限责任公司 | MCU firmware confusion method, system, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109889333B (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109889333A (en) | Firmware data encryption method, device, computer equipment and storage medium | |
US10361850B2 (en) | Authenticator, authenticatee and authentication method | |
KR102201062B1 (en) | System for generating a cryptographic key from a memory used as a physically unclonable function | |
CN103345609B (en) | A kind of text encipher-decipher method and encryption and decryption equipment | |
US10176121B2 (en) | Apparatus and method for memory address encryption | |
CN105450620A (en) | Information processing method and device | |
US20210119780A1 (en) | Data cryptographic devices and memory systems | |
CN109460670A (en) | Configuration item decryption method, device, computer equipment and storage medium | |
US8015416B2 (en) | Memory information protection system and methods | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
CN109766731A (en) | Encryption data processing method, device and computer equipment based on solid state hard disk | |
JP2005522912A (en) | How to secure an electronic entity using encrypted access | |
CN110472445A (en) | Data guard method, device, solid state hard disk and storage medium | |
CN110324322A (en) | Data transmission method, device, computer equipment | |
KR20180022800A (en) | Security programming of secret data | |
CN106656473B (en) | MAC (media Access control) calculation method and system of safe DES (data encryption Standard) algorithm | |
CN104081712A (en) | Repeatable application-specific encryption key derivation using a hidden root key | |
CN110008724B (en) | Solid state hard disk controller safe loading method and device and storage medium | |
CN104866738A (en) | Program code protection method and device | |
CN110381067A (en) | IP packet encryption method, decryption method and its device | |
JP2019121955A (en) | Semiconductor device and generating method of encryption key | |
CN111542050B (en) | TEE-based method for guaranteeing remote initialization safety of virtual SIM card | |
US11595201B2 (en) | System and method for generation of a disposable software module for cryptographic material protection | |
EP3439225A1 (en) | Method to secure a software code performing accesses to look-up tables | |
CN109446790A (en) | Air-conditioner set encrypting and decrypting method, device and encrypting and decrypting terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |