CN109889333A - Firmware data encryption method, device, computer equipment and storage medium - Google Patents

Firmware data encryption method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109889333A
CN109889333A CN201910068225.3A CN201910068225A CN109889333A CN 109889333 A CN109889333 A CN 109889333A CN 201910068225 A CN201910068225 A CN 201910068225A CN 109889333 A CN109889333 A CN 109889333A
Authority
CN
China
Prior art keywords
firmware
random number
key
plaintext
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910068225.3A
Other languages
Chinese (zh)
Other versions
CN109889333B (en
Inventor
杨志佳
冯元元
马越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN201910068225.3A priority Critical patent/CN109889333B/en
Publication of CN109889333A publication Critical patent/CN109889333A/en
Application granted granted Critical
Publication of CN109889333B publication Critical patent/CN109889333B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This application involves a kind of firmware data encryption method, device, computer equipment and storage mediums, wherein this method comprises: obtaining firmware data CIPHERING REQUEST;Random number and random number key address are generated according to the firmware data CIPHERING REQUEST, by the random number and cipher key address is counted at any time and is filled in the reserved bit of firmware header file of plaintext;Corresponding random number is taken out from the random number according to the random number key address, according to the generating random number key of the taking-up;It is encrypted to obtain the firmware binary file of ciphertext according to the firmware binary file of plaintext described in the key pair;It is combined the firmware binary file of the firmware header file of the plaintext and the ciphertext to obtain complete encrypted firmware data.The present invention is realized by using random number as key the firmware file in solid state hard disk, and then firmware is cracked caused by avoiding because of Key Exposure, has reached the safety for improving solid state hard disk data.

Description

Firmware data encryption method, device, computer equipment and storage medium
Technical field
The present invention relates to solid state hard disk technical fields, more particularly to a kind of firmware data encryption method, device, computer Equipment and storage medium.
Background technique
Currently, the firmware file in solid state hard disk is stored in solid state hard disk Flash, firmware file by firmware header file The binary file two parts composition generated with firmware engineering compiling.To protect the firmware code with core knowledge property right to pacify Entirely.Solid state hard disk manufacturer can be encrypted the binary file of firmware using symmetric encipherment algorithm, and ciphertext is used in firmware Firmware binary file.I.e. firmware file is made of the firmware header file of plaintext and the firmware binary file of ciphertext.
In the conventional technology, once hacker obtains the firmware file in Flash by illegal means.Due to consolidating for plaintext The data of part header file and the firmware binary file of ciphertext are with obviously difference, hacker are easy to judge firmware two The initial address of binary file.And the length of the offset address of firmware storage, firmware binary file is generally comprised in header file The key messages such as degree, encryption key.There is no some random interference informations in header file, veteran hacker passes through observation Or the trial of fewer number can accurately obtain the relevant information in header file, hacker utilizes these information, fragile to solve admittedly The binary file of part.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of may be implemented to improve firmware data safety consolidate Part data ciphering method, device, computer equipment and storage medium.
A kind of firmware data encryption method, which comprises
Obtain firmware data CIPHERING REQUEST;
Generate random number and random number key address according to the firmware data CIPHERING REQUEST, by the random number and Cipher key address is counted at any time to be filled in the reserved bit of firmware header file of plaintext;
According to the random number key address corresponding random number is taken out from the random number, according to the taking-up with Machine number generates key;
It is encrypted to obtain the firmware binaries text of ciphertext according to the firmware binary file of plaintext described in the key pair Part;
The firmware binary file of the firmware header file of the plaintext and the ciphertext is combined to obtain and is completely added Close firmware data.
In one of the embodiments, in the firmware binaries of the firmware header file by the plaintext and the ciphertext File was combined after the step of obtaining complete encrypted firmware data further include:
The random number key address is read from the firmware header file of the plaintext;
Read from the random number in the firmware header file of the plaintext according to the random number key address it is corresponding with Machine number, according to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair Part.
In one of the embodiments, the method also includes:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
In one of the embodiments, in the firmware binaries of the firmware header file by the plaintext and the ciphertext File was combined after the step of obtaining complete encrypted firmware data further include:
The multiple random number key address is read from the firmware header file of the plaintext;
It is read from the random number in the firmware header file of the plaintext according to the multiple random number key address multiple Corresponding random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair Part.
A kind of firmware data encryption device, the firmware data encryption device include:
Module is obtained, the acquisition module is for obtaining firmware data CIPHERING REQUEST;
Random number generation module, the generation module be used for according to the firmware data CIPHERING REQUEST generate random number and Random number key address counts the reserved bit that cipher key address are filled in the firmware header file of plaintext by the random number and at any time In;
Key production module, the key production module are used for according to the random number key address from the random number Corresponding random number is taken out, according to the generating random number key of the taking-up;
Encrypting module, firmware binary file of the encrypting module for the plaintext according to the key pair are added The close firmware binary file for obtaining ciphertext;
Composite module, the composite module are used for the firmware binaries of the firmware header file of the plaintext and the ciphertext File is combined to obtain complete encrypted firmware data.
Described device in one of the embodiments, further include: deciphering module, the deciphering module are used for:
The random number key address is read from the firmware header file of the plaintext;
Read from the random number in the firmware header file of the plaintext according to the random number key address it is corresponding with Machine number, according to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair Part.
The encrypting module is also used in one of the embodiments:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
The deciphering module is also used in one of the embodiments:
The multiple random number key address is read from the firmware header file of the plaintext;
It is read from the random number in the firmware header file of the plaintext according to the multiple random number key address multiple Corresponding random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of ciphertext described in the key pair Part.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage The step of computer program, the processor realizes above-mentioned any one method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of above-mentioned any one method is realized when row.
Above-mentioned firmware data encryption method, device, computer equipment and storage medium, the first encryption of acquisition firmware data are asked It asks;Random number and random number key address are generated according to the firmware data CIPHERING REQUEST, by the random number and at any time Number cipher key address is filled in the reserved bit of firmware header file of plaintext;According to the random number key address from the random number It is middle to take out corresponding random number, according to the generating random number key of the taking-up;According to the firmware of plaintext described in the key pair Binary file is encrypted to obtain the firmware binary file of ciphertext;By the firmware header file of the plaintext and the ciphertext Firmware binary file is combined to obtain complete encrypted firmware data.The present invention is realized by by consolidating in solid state hard disk Part file all uses random number as key, and then firmware is cracked caused by avoiding because of Key Exposure, and it is hard to have reached raising solid-state The safety of disk data.
Detailed description of the invention
Fig. 1 is the storage state schematic diagram of firmware in solid state hard disk in traditional technology;
Fig. 2 is the storage state schematic diagram of firmware in solid state hard disk in one embodiment;
Fig. 3 is the flow diagram of firmware data encryption method in one embodiment;
Fig. 4 is the flow diagram of firmware data encryption method in another embodiment;
Fig. 5 is the flow diagram of firmware data encryption method in further embodiment;
Fig. 6 is the flow diagram of firmware data encryption method in another embodiment;
Fig. 7 is the flow diagram for realizing firmware file ciphering process in one embodiment by strapping tool;
Fig. 8 is the flow diagram for realizing firmware file decrypting process in one embodiment by controller;
Fig. 9 is the structural block diagram of firmware data encryption device in one embodiment;
Figure 10 is the structural block diagram of firmware data encryption device in another embodiment;
Figure 11 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
The storage state of firmware is as shown in Figure 1 in solid state hard disk at present.In general, the firmware file in solid state hard disk is stored in admittedly In state hard disk Flash, firmware file is made of binary file two parts that header file and the firmware engineering compiling of firmware generate. To protect the firmware code safety with core knowledge property right.Solid state hard disk manufacturer can use the binary file of firmware symmetrical Encryption Algorithm is encrypted, and the firmware binary file of ciphertext is used in firmware.I.e. firmware file by plaintext firmware header file It is formed with the firmware binary file of ciphertext.
Once hacker obtains the firmware file in Flash by illegal means.Due to the firmware header file of plaintext and close The data of the firmware binary file of text have obviously difference, and hacker is easy to judge rising for firmware binary file Beginning address.And the offset address of firmware storage, length, the encryption key of firmware binary file etc. are generally comprised in header file Key message.There is no some random interference informations in header file, veteran hacker passes through observation or fewer number Trial can accurately obtain the relevant information in header file, hacker utilizes these information, the fragile binary system text for solving firmware Part.
To prevent hacker from obtaining the binary file of firmware, the invention proposes a kind of safe encryption sides of firmware data Method improves the safety of firmware data.
Specifically, the present invention in solid state hard disk in firmware storage state as shown in Fig. 2, firmware file still by plaintext Ciphertext binary file two parts composition that firmware header file and firmware engineering compiling generate, the key that encrypted firmware uses is still It is stored in header file.In order to allow hacker that can not identify the initial position of firmware binary file easily, this patent use with The mode of machine number fills the reserved bit in header file, rather than assigns 0 directly to reserved bit.And the key of encryption is exactly from these Composition is randomly selected in random number, ensure that the firmware file in each solid state hard disk is different, and is increased and certain is obscured Property.
2 data segments are increased relative to existing version in header file, for indicating the storage address of key.Firmware is packaged The address that tool can be stored according to the two data segments, takes out two parts of random numbers, by this two parts of random numbers from corresponding position Combination becomes in order to which we need complete encryption key to be used.Strapping tool is encrypted using the key pair firmware.Due to What the value of the two data segments was also randomly generated, confusion is equally also increased, this makes hacker that can not obtain accurate add Key cracks the firmware of encryption.
It is understood that 2 data segments in the present embodiment are also possible to multiple data segments, by multiple random numbers into Row combination producing key, to improve the confusion of key.
In one embodiment, as shown in figure 3, providing a kind of firmware data encryption method, this method comprises:
Step 302, firmware data CIPHERING REQUEST is obtained;
Step 304, random number and random number key address are generated according to firmware data CIPHERING REQUEST, by random number and Cipher key address is counted at any time to be filled in the reserved bit of firmware header file of plaintext;
Step 306, corresponding random number is taken out from random number according to random number key address, according to the random number of taking-up Generate key;
Step 308, it is encrypted to obtain the firmware binaries text of ciphertext according to the firmware binary file of key pair plaintext Part;
Step 310, the firmware binary file of the firmware header file of plaintext and ciphertext is combined to obtain and is completely added Close firmware data.
Specifically, in conjunction with reference Fig. 7, the encryption flow of firmware data is described as follows:
1. strapping tool generates random number and is filled in the useless reserved bit of header file.Process 2 is executed in next step.
2. strapping tool generates two random number key addresses, according to cipher key address from the random number generated in process 1 Random number is taken out, the key by random number combination as encryption.Process 3 is executed in next step.
3. the firmware binary file of the key pair plaintext of the generation in strapping tool process for using 2 encrypts, ciphertext is generated Firmware binary file.Process 4 is executed in next step.
4. strapping tool combines the firmware header file of plaintext and the firmware binary file of ciphertext.
In the present embodiment, firmware data CIPHERING REQUEST is obtained first;Random number is generated according to firmware data CIPHERING REQUEST And random number key address, the reserved bit that cipher key address are filled in the firmware header file of plaintext is counted by random number and at any time In;Corresponding random number is taken out from random number according to random number key address, according to the generating random number key of taking-up;According to The firmware binary file of key pair plaintext is encrypted to obtain the firmware binary file of ciphertext;By the firmware header file of plaintext It is combined to obtain complete encrypted firmware data with the firmware binary file of ciphertext.The present embodiment is realized by by solid-state Firmware file in hard disk all uses random number as key, and then firmware is cracked caused by avoiding because of Key Exposure, reaches Improve the safety of solid state hard disk data.
In one embodiment, it as shown in figure 4, providing a kind of firmware data encryption method, also wraps after step 310 It includes:
Step 312, random number key address is read from the firmware header file of plaintext;
Step 314, read from the random number in the firmware header file of plaintext according to random number key address it is corresponding with Machine number, according to the generating random number key of taking-up;
Step 316, it is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of key pair ciphertext Part.
Specifically, in conjunction with reference Fig. 7 and Fig. 8, the encryption flow of firmware data is described as follows:
1. strapping tool generates random number and is filled in the useless reserved bit of header file.Process 2 is executed in next step.
2. strapping tool generates two random number key addresses, according to cipher key address from the random number generated in process 1 Random number is taken out, the key by random number combination as encryption.Process 3 is executed in next step.
3. the firmware binary file of the key pair plaintext of the generation in strapping tool process for using 2 encrypts, ciphertext is generated Firmware binary file.Process 4 is executed in next step.
4. strapping tool combines the firmware header file of plaintext and the firmware binary file of ciphertext.
The decryption process description of firmware data is as follows:
1. controller reads the address value of 2 storage keys from header file code key data segment, deposited according to the two data segments The address put takes out two parts of random numbers from corresponding position, executes process 2 in next step.
2. this two parts of random numbers are combined into complete encryption key by controller.Process 3 is executed in next step.
3. the firmware for generating plaintext is decrypted using key pair encryption firmware for controller.Process 4 is executed in next step.
4. controller load operating firmware.
In the present embodiment, complete encryption and decrypting process are realized by strapping tool and controller, passed through The reserved bit in firmware header file is filled using the mode of random number, rather than directly to retention position 0.And encryption key from Composition is randomly selected in these random numbers, be ensure that the firmware file in each solid state hard disk is different, is increased certain Confusion.
In one embodiment, as shown in figure 5, providing a kind of firmware data encryption method, this method further include:
Step 502, multiple random number key addresses are generated according to firmware data CIPHERING REQUEST;
Step 504, multiple corresponding random numbers are taken out from random number according to multiple random number key addresses;
Step 506, multiple corresponding random numbers are combined to the key as encryption.
In one embodiment, it as shown in fig. 6, providing a kind of firmware data encryption method, also wraps after step 310 It includes:
Step 602, multiple random number key addresses are read from the firmware header file of plaintext;
Step 604, it is read from the random number in the firmware header file of plaintext according to multiple random number key addresses multiple Corresponding random number;
Step 606, multiple corresponding random numbers are combined as key;
Step 608, it is decrypted to obtain the firmware binaries text of plaintext according to the firmware binary file of key pair ciphertext Part.
In the present embodiment, by increasing multiple data segments relative to existing version in header file, for indicating key Storage address.Firmware strapping tool can according to the two data segments store address, taken out from corresponding position more parts with Machine number becomes this more parts of random number combinations in order to which we need complete encryption key to be used.Strapping tool uses the key Firmware is encrypted.It is also randomly generated due to the value of this multiple data segment, equally also increases confusion, this makes black Visitor can not obtain accurate encryption key to crack the firmware of encryption.
It should be understood that although each step in the flow chart of Fig. 3-6 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 3-6 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 9, providing a kind of firmware data encryption device 900, which includes:
Module 901 is obtained, for obtaining firmware data CIPHERING REQUEST;
Random number generation module 902, for according to firmware data CIPHERING REQUEST generation random number and random number key Location by random number and counts cipher key address at any time and is filled in the reserved bit of firmware header file of plaintext;
Key production module 903, for taking out corresponding random number from random number according to random number key address, according to The generating random number key of taking-up;
Encrypting module 904 obtains the firmware of ciphertext for being encrypted according to the firmware binary file of key pair plaintext Binary file;
Composite module 905, for the firmware binary file of the firmware header file of plaintext and ciphertext to be combined to obtain Complete encrypted firmware data.
In one embodiment, as shown in Figure 10, a kind of firmware data encryption device 900, the device are provided further include: Deciphering module 906, is used for:
Random number key address is read from the firmware header file of plaintext;
Corresponding random number is read from the random number in the firmware header file of plaintext according to random number key address, according to The generating random number key of taking-up;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of key pair ciphertext.
In one embodiment, which is also used to:
Multiple random number key addresses are generated according to firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from random number according to multiple random number key addresses;
Multiple corresponding random numbers are combined to the key as encryption.
In one embodiment, which is also used to:
Multiple random number key addresses are read from the firmware header file of plaintext;
Read from the random number in the firmware header file of plaintext according to multiple random number key addresses it is multiple it is corresponding with Machine number;
Multiple corresponding random numbers are combined as key;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of key pair ciphertext.
Specific about firmware data encryption device limits the limit that may refer to above for firmware data encryption method Fixed, details are not described herein.
In one embodiment, a kind of computer equipment is provided, internal structure chart can be as shown in figure 11.The calculating Machine equipment includes processor, memory and the network interface connected by system bus.Wherein, the processing of the computer equipment Device is for providing calculating and control ability.The memory of the computer equipment includes non-volatile memory medium, built-in storage.It should Non-volatile memory medium is stored with operating system, computer program and database.The built-in storage is non-volatile memories Jie The operation of operating system and computer program in matter provides environment.The network interface of the computer equipment is used for and external end End passes through network connection communication.To realize a kind of firmware data encryption method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 11, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor are realized when executing computer program in above each embodiment of the method The step of.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated The step in above each embodiment of the method is realized when machine program is executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of firmware data encryption method, which comprises
Obtain firmware data CIPHERING REQUEST;
Random number and random number key address are generated according to the firmware data CIPHERING REQUEST, by the random number and at any time Number cipher key address is filled in the reserved bit of firmware header file of plaintext;
Corresponding random number is taken out from the random number according to the random number key address, according to the random number of the taking-up Generate key;
It is encrypted to obtain the firmware binary file of ciphertext according to the firmware binary file of plaintext described in the key pair;
The firmware binary file of the firmware header file of the plaintext and the ciphertext is combined to obtain complete encryption admittedly Number of packages evidence.
2. firmware data encryption method according to claim 1, which is characterized in that in the firmware head by the plaintext File and the firmware binary file of the ciphertext were combined after the step of obtaining complete encrypted firmware data further include:
The random number key address is read from the firmware header file of the plaintext;
Corresponding random number is read from the random number in the firmware header file of the plaintext according to the random number key address, According to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
3. firmware data encryption method according to claim 2, which is characterized in that the method also includes:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
4. firmware data encryption method according to claim 3, which is characterized in that in the firmware head by the plaintext File and the firmware binary file of the ciphertext were combined after the step of obtaining complete encrypted firmware data further include:
The multiple random number key address is read from the firmware header file of the plaintext;
Multiple correspondences are read from the random number in the firmware header file of the plaintext according to the multiple random number key address Random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
5. a kind of firmware data encryption device, which is characterized in that the firmware data encryption device includes:
Module is obtained, the acquisition module is for obtaining firmware data CIPHERING REQUEST;
Random number generation module, the generation module is for according to firmware data CIPHERING REQUEST generation random number and at random Number cipher key address by the random number and counts cipher key address at any time and is filled in the reserved bit of firmware header file of plaintext;
Key production module, the key production module according to the random number key address from the random number for taking out Corresponding random number, according to the generating random number key of the taking-up;
Encrypting module, firmware binary file of the encrypting module for the plaintext according to the key pair encrypt To the firmware binary file of ciphertext;
Composite module, the composite module are used for the firmware binary file of the firmware header file of the plaintext and the ciphertext It is combined to obtain complete encrypted firmware data.
6. firmware data encryption device according to claim 5, which is characterized in that described device further include: deciphering module, The deciphering module is used for:
The random number key address is read from the firmware header file of the plaintext;
Corresponding random number is read from the random number in the firmware header file of the plaintext according to the random number key address, According to the generating random number key of the taking-up;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
7. firmware data encryption device according to claim 6, which is characterized in that the encrypting module is also used to:
Multiple random number key addresses are generated according to the firmware data CIPHERING REQUEST;
Multiple corresponding random numbers are taken out from the random number according to the multiple random number key address;
The multiple corresponding random number is combined to the key as encryption.
8. firmware data encryption device according to claim 7, which is characterized in that the deciphering module is also used to:
The multiple random number key address is read from the firmware header file of the plaintext;
Multiple correspondences are read from the random number in the firmware header file of the plaintext according to the multiple random number key address Random number;
The multiple corresponding random number is combined as key;
It is decrypted to obtain the firmware binary file of plaintext according to the firmware binary file of ciphertext described in the key pair.
9. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes any one of claims 1 to 4 institute when executing the computer program The step of stating method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of Claims 1-4 is realized when being executed by processor.
CN201910068225.3A 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium Active CN109889333B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910068225.3A CN109889333B (en) 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910068225.3A CN109889333B (en) 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109889333A true CN109889333A (en) 2019-06-14
CN109889333B CN109889333B (en) 2022-03-29

Family

ID=66926800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910068225.3A Active CN109889333B (en) 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109889333B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545175A (en) * 2019-08-23 2019-12-06 国网湖北省电力有限公司电力科学研究院 Security authentication method for communication protocol of charging pile and electric vehicle
CN110545172A (en) * 2019-06-28 2019-12-06 深圳忆联信息系统有限公司 safe card opening method and device for controller
CN111177751A (en) * 2019-12-20 2020-05-19 苏州浪潮智能科技有限公司 Method, equipment and readable medium for encrypting pdf file
CN113688399A (en) * 2021-08-25 2021-11-23 深圳忆联信息系统有限公司 Firmware digital signature protection method and device, computer equipment and storage medium
CN114567476A (en) * 2022-02-23 2022-05-31 平安普惠企业管理有限公司 Data security protection method and device, electronic equipment and medium
CN116910711A (en) * 2023-07-13 2023-10-20 北京领创医谷科技发展有限责任公司 MCU firmware confusion method, system, server and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100058047A1 (en) * 2008-08-28 2010-03-04 General Instrument Corporation Encrypting a unique cryptographic entity
CN102291418A (en) * 2011-09-23 2011-12-21 胡祥义 Method for realizing cloud computing security architecture
US20160246964A1 (en) * 2015-02-24 2016-08-25 Dell Products, Lp Method to Protect BIOS NVRAM from Malicious Code Injection by Encrypting NVRAM Variables and System Therefor
CN106201925A (en) * 2016-07-01 2016-12-07 四川效率源信息安全技术股份有限公司 A kind of decryption method of western number hard disk
CN106503494A (en) * 2016-11-05 2017-03-15 福建省北峰电讯科技有限公司 A kind of firmware protection location and guard method with flash memory microcontroller on piece
US20170373851A1 (en) * 2015-12-18 2017-12-28 Shenzhen Zhenhua Microelectronics Co., Ltd Computer security locks having separate key pairs
CN108599930A (en) * 2018-04-02 2018-09-28 湖南国科微电子股份有限公司 Firmware encrypting and deciphering system and method
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100058047A1 (en) * 2008-08-28 2010-03-04 General Instrument Corporation Encrypting a unique cryptographic entity
CN102291418A (en) * 2011-09-23 2011-12-21 胡祥义 Method for realizing cloud computing security architecture
US20160246964A1 (en) * 2015-02-24 2016-08-25 Dell Products, Lp Method to Protect BIOS NVRAM from Malicious Code Injection by Encrypting NVRAM Variables and System Therefor
US20170373851A1 (en) * 2015-12-18 2017-12-28 Shenzhen Zhenhua Microelectronics Co., Ltd Computer security locks having separate key pairs
CN106201925A (en) * 2016-07-01 2016-12-07 四川效率源信息安全技术股份有限公司 A kind of decryption method of western number hard disk
CN106503494A (en) * 2016-11-05 2017-03-15 福建省北峰电讯科技有限公司 A kind of firmware protection location and guard method with flash memory microcontroller on piece
CN108599930A (en) * 2018-04-02 2018-09-28 湖南国科微电子股份有限公司 Firmware encrypting and deciphering system and method
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545172A (en) * 2019-06-28 2019-12-06 深圳忆联信息系统有限公司 safe card opening method and device for controller
CN110545172B (en) * 2019-06-28 2022-06-07 深圳忆联信息系统有限公司 Safe card opening method and device for controller
CN110545175A (en) * 2019-08-23 2019-12-06 国网湖北省电力有限公司电力科学研究院 Security authentication method for communication protocol of charging pile and electric vehicle
CN110545175B (en) * 2019-08-23 2022-08-26 国网湖北省电力有限公司电力科学研究院 Security authentication method for communication protocol of charging pile and electric vehicle
CN111177751A (en) * 2019-12-20 2020-05-19 苏州浪潮智能科技有限公司 Method, equipment and readable medium for encrypting pdf file
CN111177751B (en) * 2019-12-20 2022-05-24 苏州浪潮智能科技有限公司 Method and equipment for encrypting pdf file and readable medium
CN113688399A (en) * 2021-08-25 2021-11-23 深圳忆联信息系统有限公司 Firmware digital signature protection method and device, computer equipment and storage medium
CN114567476A (en) * 2022-02-23 2022-05-31 平安普惠企业管理有限公司 Data security protection method and device, electronic equipment and medium
CN114567476B (en) * 2022-02-23 2024-02-13 天翼安全科技有限公司 Data security protection method and device, electronic equipment and medium
CN116910711A (en) * 2023-07-13 2023-10-20 北京领创医谷科技发展有限责任公司 MCU firmware confusion method, system, server and storage medium

Also Published As

Publication number Publication date
CN109889333B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN109889333A (en) Firmware data encryption method, device, computer equipment and storage medium
US10361850B2 (en) Authenticator, authenticatee and authentication method
KR102201062B1 (en) System for generating a cryptographic key from a memory used as a physically unclonable function
CN103345609B (en) A kind of text encipher-decipher method and encryption and decryption equipment
US10176121B2 (en) Apparatus and method for memory address encryption
CN105450620A (en) Information processing method and device
US20210119780A1 (en) Data cryptographic devices and memory systems
CN109460670A (en) Configuration item decryption method, device, computer equipment and storage medium
US8015416B2 (en) Memory information protection system and methods
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN109766731A (en) Encryption data processing method, device and computer equipment based on solid state hard disk
JP2005522912A (en) How to secure an electronic entity using encrypted access
CN110472445A (en) Data guard method, device, solid state hard disk and storage medium
CN110324322A (en) Data transmission method, device, computer equipment
KR20180022800A (en) Security programming of secret data
CN106656473B (en) MAC (media Access control) calculation method and system of safe DES (data encryption Standard) algorithm
CN104081712A (en) Repeatable application-specific encryption key derivation using a hidden root key
CN110008724B (en) Solid state hard disk controller safe loading method and device and storage medium
CN104866738A (en) Program code protection method and device
CN110381067A (en) IP packet encryption method, decryption method and its device
JP2019121955A (en) Semiconductor device and generating method of encryption key
CN111542050B (en) TEE-based method for guaranteeing remote initialization safety of virtual SIM card
US11595201B2 (en) System and method for generation of a disposable software module for cryptographic material protection
EP3439225A1 (en) Method to secure a software code performing accesses to look-up tables
CN109446790A (en) Air-conditioner set encrypting and decrypting method, device and encrypting and decrypting terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant