CN102317948A - Protection method of chip and chip itself - Google Patents

Protection method of chip and chip itself Download PDF

Info

Publication number
CN102317948A
CN102317948A CN2011800009354A CN201180000935A CN102317948A CN 102317948 A CN102317948 A CN 102317948A CN 2011800009354 A CN2011800009354 A CN 2011800009354A CN 201180000935 A CN201180000935 A CN 201180000935A CN 102317948 A CN102317948 A CN 102317948A
Authority
CN
China
Prior art keywords
software
chip
authorization information
security
security authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011800009354A
Other languages
Chinese (zh)
Inventor
郭德伟
孙代红
潘峰
申明会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN102317948A publication Critical patent/CN102317948A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This embodiment of the invention provides a protection method of chip and chip itself. The method includes: encrypting security verification information of software stored in chip by means of chip add principle to prevent the modification of the mentioned software security verification information; verifying the security of the mentioned software package stored in the chip by employing the software security verification information as soon as the single plate is connected to power. The technical proposal of this invention can guarantee the security of software verification information, effectively solve the problem of modification of chip contents, and also effectively assure the security of software that is operated on the single plate.

Description

The method for security protection of chip and chip
Technical field
The embodiment of the invention relates to technical field of electronic equipment, relates in particular to a kind of method for security protection and chip of chip.
Background technology
Chip like Flash chip and so on is a kind of common element that is applied in the various electronic equipments.For example the Flash chip can be applied to wireless access node (Access Point; Hereinafter to be referred as AP) etc. in the network element.
In the various electronic equipments of chip, can write various files in advance in the chip, so that operation in use.In the prior art, the content that writes in the chip can read through special software, and after the content of chip read, can distort through the dis-assembling technology.The electronic equipment of wireless aps etc. and so on that adopts chip for veneer is as family and work-at-home (Small Office Home Office; Hereinafter to be referred as SOHO) user realizes the bridge that cable network and wireless network are linked up, some important information of storage user have determined this class of electronic devices to have higher security than large-scale base station equipment.And the content of storing on the existing chip is arbitrarily distorted easily, and the software security that causes moving on the veneer is lower.
Summary of the invention
The embodiment of the invention provides a kind of method for security protection and chip of chip, is arbitrarily distorted easily in order to solve the content of storing on the existing chip in the prior art, causes the lower defective of moving on the veneer of software security.
The embodiment of the invention provides a kind of method for security protection of chip, comprising:
Adopt chip to add principle software stored safety verification information on the chip is encrypted, be not modified to guarantee said software security authorization information;
When Board Power up, utilize said software security authorization information that the said software package of storing on the said chip is carried out security verification.
The embodiment of the invention provides a kind of chip, stores software security authorization information and software package on the said chip;
Said software security authorization information is used for said software package is carried out security verification; And said software security authorization information adopts the chip principle that locks to encrypt, and is not modified to guarantee said software security authorization information;
Also be provided with chip controller on the said chip; Said chip controller is used for when Board Power up, and control utilizes said software security authorization information that said software package is carried out security verification.
The method for security protection of the chip of the embodiment of the invention and chip are encrypted software stored safety verification information on the chip through adopting chip to add principle, are not modified to guarantee said software security authorization information; When Board Power up, utilize said software security authorization information that the said software package of storing on the said chip is carried out security verification.Adopt the technical scheme of the embodiment of the invention, adopt the chip principle that locks that the software security authorization information is encrypted,, can solve the problem that chip content is arbitrarily distorted effectively to guarantee the security of software security authorization information.And then software package is carried out security verification according to safer software security authorization information, and the security of the software that can guarantee effectively to move on the veneer, thus guarantee to adopt the security of the electronic equipment such as AP of chip effectively.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply; Obviously, the accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work property, can also obtain other accompanying drawing according to these accompanying drawings.
The process flow diagram of the method for security protection of the chip that Fig. 1 provides for an embodiment of the present invention.
The process flow diagram of the method for security protection of the chip that Fig. 2 provides for the another kind of embodiment of the present invention.
Fig. 3 is the Flash chip principle schematic that locks.
The process flow diagram of the method for security protection of the chip that Fig. 4 provides for further embodiment of this invention.
Fig. 5 is the synoptic diagram that software version launch phase software package generates.
Fig. 6 is a single board starting stage software startup process flow diagram.
The structural representation of the chip that Fig. 7 provides for an embodiment of the present invention.
The structural representation of the chip that Fig. 8 provides for the another kind of embodiment of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
The process flow diagram of the method for security protection of the chip that Fig. 1 provides for an embodiment of the present invention.As shown in Figure 1, the method for security protection of the chip of present embodiment specifically can comprise as follows:
100, adopt chip to add principle software stored safety verification information on the chip is encrypted, be not modified to guarantee the software security authorization information;
101, when Board Power up, utilize the software security authorization information that software stored bag on the chip is carried out security verification.
The method for security protection of the chip of present embodiment and chip are encrypted software stored safety verification information on the chip through adopting chip to add principle, are not modified to guarantee the software security authorization information; When Board Power up, utilize the software security authorization information that the said software package of storing on the said chip is carried out security verification.Adopt the technical scheme of present embodiment, adopt the chip principle that locks that the software security authorization information is encrypted,, can solve the problem that chip content is arbitrarily distorted effectively to guarantee the security of software security authorization information.And then software package is carried out security verification according to safer software security authorization information, and the security of the software that can guarantee effectively to move on the veneer, thus guarantee to adopt the security of the electronic equipment such as AP of chip effectively.
Alternatively, the chip in the foregoing description can be the Flash chip, and the principle that locks of chip wherein specifically can be the Flash chip principle that locks, and adopts this moment the Flash chip principle that locks that software stored safety verification information on the Flash chip is encrypted.
The process flow diagram of the method for security protection of the chip that Fig. 2 provides for the another kind of embodiment of the present invention.So that the software security authorization information is stored in the file, this document is stored in the chip technical scheme of the present invention is described again in the present embodiment for example.And the chip in the present embodiment is that example is explained with the Flash chip, can realize equally for the embodiment of other chips according to present embodiment.As shown in Figure 2, the method for security protection of the Flash chip of present embodiment specifically can comprise as follows:
200, hereof with the storage of software security authorization information.
Wherein this software security authorization information is used for software stored bag on the Flash chip is carried out security verification.
201, adopt the Flash chip principle that locks that file is encrypted, to guarantee that software stored safety verification information is not modified in the file.
Particularly, Fig. 3 is the Flash chip principle schematic that locks.As shown in Figure 3, disposable programmable read only memory (One Time Programmable Read-Only Memory; Hereinafter to be referred as OTPROM) can not carry out reading and writing again after writing a secondary data.The Flash chip adopts OTP ROM to be used to store the Flash unlocking pin, controll block (Lock) byte (Bit) state; Lock Bit is used to control permanent safeguard bit (Persistent Protection Bit; Hereinafter to be referred as PPB Bit) state, Lock Bit is that 0 expression PPB Bit state can be revised, Lock Bit is that 1 expression PPB Bit state can not be revised; PPB Bit is used to protect corresponding Block state, and PPB Bit is that the corresponding Block content of 0 expression is read-write, and PPBBit is that corresponding Block content is only readable can not revise in 1 expression.
The space of Flash chip can be divided into N Block, and each Block size is fixing, and this size is provided by Flash chip manufacturer, can not revise.
Suppose that the Flash chip has been provided with the value among the OTP ROM; Lock Bit is that 1 and 0 PPB Bit is 1; Then when needs were revised the content of Block0, it was 0 that the Password among the needs input OTP ROM changes Lock Bit state, and so just can revise 0 PPB Bit is 0; Thereby release Block0 state is revised its content.
After the content on the OTP function and protecting Flash chip of use Flash chip; Even the Flash chip down; Use the function of the corresponding BLOCK of Flash chip cryptoguard also can not disappear; Avoid the use of instrument such as chip burner and revise the content on the Flash chip, effectively guaranteed the security of the content on the Flash chip.
In the present embodiment, file can occupy one or more Block on the Flash chip.Adopt the Flash chip to lock principle when file is encrypted, for example can for adopt the Flash chip lock principle to file occupied to all Block encrypt, to guarantee that software stored safety verification information is not modified in the file.
202, when Board Power up, from file, obtain the software security authorization information.
203, utilize the software security authorization information that software stored bag on the Flash chip is carried out security verification.
The startup file of present embodiment file after as Board Power up is used for being responsible for the necessary resource of initialization, the startup of the software in the Bootstrap Software bag.For example this document can be the boot file.When Board Power up, file start can obtain the software security authorization information the files stored from the Flash chip.Because in 101, adopted the Flash chip principle that locks that file is encrypted.So the software security authorization information that obtain this moment from file is the safety information of not distorted.Can utilize the software security authorization information of the safety of not distorted that software stored bag on the Flash chip is carried out security verification then, thereby guarantee that the software in the software package can be in safe operation after the Board Power up.
The method for security protection of the chip of present embodiment is through storing the software security authorization information hereof; Adopt the Flash chip principle that locks that file is encrypted, to guarantee that software stored safety verification information is not modified in the file.Adopt the technical scheme of present embodiment, adopt the Flash chip principle that locks that software security authorization information place file is encrypted,, can solve the problem that the Flash chip content is arbitrarily distorted effectively to guarantee the security of software security authorization information.And then software package is carried out security verification according to safer software security authorization information, and the security of the software that can guarantee effectively to move on the veneer, thus guarantee to adopt the security of the electronic equipment such as AP of Flash chip effectively.
The process flow diagram of the method for security protection of the chip that Fig. 4 provides for further embodiment of this invention.The present embodiment chips is an example with the Flash chip, is that the boot file is an example with the file in the foregoing description, and this boot file is the code of operation at first behind the Board Power up, be mainly used in the resource of necessity is carried out initialization, and the startup of software in the Bootstrap Software bag.
In the present embodiment, the software stored bag can comprise software and digital signature information on the Flash chip.Wherein digital signature information generates for the software launch phase.Fig. 5 is the synoptic diagram that software version launch phase software package generates.At the software version launch phase; The computed in software software message summary of software publisher tool using to generating; For example adopt software message digest calculations algorithm that the software that generates is carried out message digest computation and get access to the software message summary, and then the digital signature information that adopts private key and AES that the software message summary is encrypted the software that obtains.The software publisher is with software and digital signature information packing issue then then.Therefore comprise software and digital signature information in the software package of issue.
As shown in Figure 4, the method for security protection of the chip of present embodiment specifically can comprise as follows:
300, with PKI, decipherment algorithm and software message digest calculations algorithm stores in the boot of Flash chip file;
Wherein PKI and decipherment algorithm are used for the digital signature information of software package is deciphered, and the private key of PKI and software launch phase is complementary.Decipherment algorithm is corresponding with the AES of software launch phase.Comprise that with the software security authorization information PKI, decipherment algorithm and software message digest calculations algorithm are example in the present embodiment, in the practical application, this software security authorization information can also comprise other information.
301, adopt the Flash chip principle that locks that the boot file is encrypted;
Adopt the Flash chip principle that locks that the boot file is encrypted, concrete implementation procedure can be encrypted all Block at boot file place on the Flash chip for adopting the Flash chip principle that locks.This step can guarantee that PKI, decipherment algorithm and the software message digest calculations algorithm stored in the boot file are not distorted, thus the security of PKI, decipherment algorithm and the software message digest calculations algorithm stored in the assurance boot file.
302, when Board Power up starts, the boot file start obtains PKI, decipherment algorithm and software message digest calculations algorithm from the boot file;
Because boot file start; Software startup in the meeting Bootstrap Software bag; Can utilize PKI, decipherment algorithm and software message digest calculations algorithm in the boot file that software package is carried out security verification, thereby the software that guarantees safety can move, and specifically carries out following steps:
303, utilize software message digest calculations algorithm that the software in the software package is carried out message digest computation, calculate the software message summary;
304, utilize PKI and decipherment algorithm that the digital signature information in the software package is deciphered, deciphering obtains the software message summary;
305, the software message summary that the software message that calculates is made a summary and deciphering obtains is compared, judge whether both are consistent; When both are consistent, carry out 306; Otherwise when both are inconsistent, carry out 307.
306, continue to start software; Finish.
307, refusal starts software, finishes.
Can know that by 307 there is safety issue in this software, start software through refusal this moment, can guarantee to adopt the security of the electronic equipment of this Flash chip.The operation of 302-307 is the operation that carried out by the control of Flash chip controller.
According to the technical scheme of above-mentioned 301-307, can obtain single board starting stage software startup process flow diagram as shown in Figure 6.Fig. 6 is corresponding with above-mentioned process flow diagram shown in Figure 5, and technical scheme shown in Figure 6 can repeat no more at this with reference to the explanation of above-mentioned 301-307.
The method for security protection of the chip of present embodiment is through storing the software security authorization information hereof; Adopt the Flash chip principle that locks that said file is encrypted, be not modified with the said software security authorization information that guarantees to store in the said file.Adopt the technical scheme of present embodiment, adopt the Flash chip principle that locks that software security authorization information place file is encrypted,, can solve the problem that the Flash chip content is arbitrarily distorted effectively to guarantee the security of software security authorization information.And then software package is carried out security verification according to safer software security authorization information, and the security of the software that can guarantee effectively to move on the veneer, thus guarantee to adopt the security of the electronic equipment such as AP of Flash chip effectively.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of programmed instruction; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
The structural representation of the chip that Fig. 7 provides for an embodiment of the present invention.As shown in Figure 7, the chip 10 of present embodiment stores software security authorization information 11 and software package 12.
Wherein software security authorization information 11 is used for software package 12 is carried out security verification; And software security authorization information 11 adopts the chips principle that locks to encrypt, and is not modified to guarantee software security authorization information 11.
Also be provided with chip controller 13 on the chip 10 of present embodiment, chip controller 13 is connected with software package 12 with software security authorization information 11 respectively.Chip controller 13 is used for when Board Power up, and control utilizes 11 pairs of software packages of software security authorization information 12 to carry out security verification.
The specific descriptions of software stored safety verification information 11, software package 12 and chip controller 13 and explanation are identical with the description of above-mentioned correlation technique embodiment in the chip of present embodiment and the chip; Can repeat no more at this with reference to the record of above-mentioned correlation technique embodiment in detail.
The chip of present embodiment stores software security authorization information and software package on the chip, wherein the software security authorization information is used for software package is carried out security verification; And the software security authorization information adopts the chip principle that locks to encrypt, and is not modified to guarantee the software security authorization information.Adopt the technical scheme of present embodiment, adopt the chip principle that locks that the software security authorization information is encrypted,, can solve the problem that chip content is arbitrarily distorted effectively to guarantee the security of software security authorization information.And then software package is carried out security verification according to safer software security authorization information, and the security of the software that can guarantee effectively to move on the veneer, thus guarantee to adopt the security of the electronic equipment such as AP of chip effectively.
The structural representation of the chip that Fig. 8 provides for the another kind of embodiment of the present invention.As shown in Figure 8, the software security authorization information 11 on the chip 10 of present embodiment can be stored in the file 14 on the chip 10.Adopt this moment the chip principle that locks that file 14 is encrypted, be not modified to guarantee the software security authorization information 11 in the file 14.This document 14 is connected with chip controller 13.
Accordingly, in the present embodiment, when Board Power up, chip controller 13 obtains earlier software security authorization information 11 from file 14, controls then and utilizes the 11 pairs of software packages of software security authorization information 12 that obtain to carry out security verification.
Alternatively, the chip in the present embodiment 10 can be a Flash chip.Corresponding chip controller can be the Flash chip controller.When as above-mentioned embodiment illustrated in fig. 7, when software security authorization information 11 directly is stored on the Flash chip, adopt the Flash chip principle that locks that software security authorization information 11 is encrypted.When software security authorization information 11 is stored in the file on the Flash chip, adopt the Flash chip principle that locks that the file on the Flash chip is encrypted.
Alternatively, the file in the foregoing description 14 specifically can be the boot file; This boot file is the code of operation at first behind the Board Power up, is mainly used in the resource of necessity carried out initialization, and the startup of software in the Bootstrap Software bag 12.Store the software security authorization information in this boot file.
In the present embodiment; Software package 12 specifically comprises software and digital signature information; Wherein digital signature information gets access to the software message summary for the software launch phase adopts software message digest calculations algorithm that software is carried out message digest computation, and encryption obtains to the software message summary to adopt private key and AES then.
In the present embodiment, software security authorization information 11 comprises PKI, decipherment algorithm and software message digest calculations algorithm, and PKI and decipherment algorithm are used for digital signature information is deciphered, and deciphering obtains the software message summary; The private key of PKI and software launch phase is complementary; Decipherment algorithm is corresponding with the AES that software is pressed launch phase.Software message digest calculations algorithm in the software security authorization information 11 is used for when the Board Power up at chip 10 places, the software in the software package 12 being carried out message digest computation, calculates the software message summary.Chip controller 13 specifically is used for the software message summary that calculates and deciphers the software message summary that obtains comparing, and when both are consistent, continues to start software; Otherwise when both were inconsistent, refusal started software.
The technical scheme that the chip of present embodiment is introduced is identical with the technical scheme of the realization of the method for security protection of said chip, can repeat no more at this with reference to the record of above-mentioned correlation technique embodiment in detail.
The chip of present embodiment can guarantee the security of software security authorization information, can solve the problem that chip content is arbitrarily distorted effectively.And then software package is carried out security verification according to safer software security authorization information, and the security of the software that can guarantee effectively to move on the veneer, thus guarantee to adopt the security of the electronic equipment such as AP of chip effectively.
Device embodiment described above only is schematic; Wherein the unit as the separating component explanation can or can not be physically to separate also; The parts that show as the unit can be or can not be physical locations also; Promptly can be positioned at a place, perhaps also can be distributed at least two NEs.Can realize the purpose of present embodiment scheme according to the needs selection some or all of module wherein of reality.Those of ordinary skills promptly can understand and implement under the situation of not paying performing creative labour.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.

Claims (10)

1. the method for security protection of a chip is characterized in that, comprising:
Adopt chip to add principle software stored safety verification information on the chip is encrypted, be not modified to guarantee said software security authorization information;
When Board Power up, utilize said software security authorization information that the said software package of storing on the said chip is carried out security verification.
2. method according to claim 1 is characterized in that, said employing chip adds principle to be encrypted software stored safety verification information on the chip, specifically comprises:
Said software security authorization information is stored in the file on the said chip;
Adopting said chip to add principle encrypts said file.
3. method according to claim 2; It is characterized in that; After Board Power up, utilize said software security authorization information that the said software package of storing on the said chip is carried out also comprising: from said file, obtain said software security authorization information before the security verification.
4. according to the arbitrary described method of claim 1-3; It is characterized in that; The software stored bag comprises software and digital signature information on the said chip; Said digital signature information gets access to the software message summary for the software launch phase adopts software message digest calculations algorithm that said software is carried out message digest computation, and encryption obtains to said software message summary to adopt private key and AES then.
5. method according to claim 4 is characterized in that, said software security authorization information specifically comprises: PKI, decipherment algorithm and said software message digest calculations algorithm; Said PKI and said decipherment algorithm are used for said digital signature information is deciphered, and said PKI and said private key are complementary, and said decipherment algorithm is corresponding with said AES.
6. method according to claim 5 is characterized in that, utilizes said software security authorization information that the said software package of storing on the said chip is carried out security verification, specifically comprises:
Utilize said software message digest calculations algorithm that the said software in the said software package is carried out message digest computation, calculate the software message summary;
Utilize said PKI and said decipherment algorithm that the said digital signature information in the said software package is deciphered, deciphering obtains the software message summary;
The said software message summary that the said software message that calculates is made a summary and deciphering obtains is compared, when both are consistent, continue the said software of startup; Otherwise when both were inconsistent, refusal started said software.
7. a chip is characterized in that, stores software security authorization information and software package on the said chip;
Said software security authorization information is used for said software package is carried out security verification; And said software security authorization information adopts the chip principle that locks to encrypt, and is not modified to guarantee said software security authorization information;
Also be provided with chip controller on the said chip; Said chip controller is used for when Board Power up, and control utilizes said software security authorization information that said software package is carried out security verification.
8. chip according to claim 7 is characterized in that, said software security authorization information is stored in the file on the said chip; Said file adopts the said chip principle that locks to encrypt, and is not modified with the said software security authorization information that guarantees to store in the said file.
9. according to claim 7 or 8 described chips; It is characterized in that; Said software package specifically comprises software and digital signature information; Said digital signature information gets access to the software message summary for the software launch phase adopts software message digest calculations algorithm that said software is carried out message digest computation, and encryption obtains to said software message summary to adopt private key and AES then.
10. chip according to claim 9; It is characterized in that; Said software security authorization information comprises PKI, decipherment algorithm and said software message digest calculations algorithm, and said PKI and said decipherment algorithm are used for said digital signature information is deciphered, and deciphering obtains the software message summary; Said PKI and said private key are complementary; Said decipherment algorithm is corresponding with said AES; Said software message digest calculations algorithm in the said software security authorization information is used for when Board Power up, and the said software in the said software package is carried out message digest computation, calculates the software message summary;
Said chip controls implement body is used for the said software message summary that calculates and deciphers the said software message summary that obtains comparing, and when both are consistent, continues to start said software; Otherwise when both were inconsistent, refusal started said software.
CN2011800009354A 2011-06-23 2011-06-23 Protection method of chip and chip itself Pending CN102317948A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/076197 WO2012174726A1 (en) 2011-06-23 2011-06-23 Chip and safety protection method for chip

Publications (1)

Publication Number Publication Date
CN102317948A true CN102317948A (en) 2012-01-11

Family

ID=45429421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011800009354A Pending CN102317948A (en) 2011-06-23 2011-06-23 Protection method of chip and chip itself

Country Status (2)

Country Link
CN (1) CN102317948A (en)
WO (1) WO2012174726A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609665A (en) * 2012-01-19 2012-07-25 福建三元达软件有限公司 Method and device for signing user program and method and device for verifying signature of user program
CN105320891A (en) * 2015-11-18 2016-02-10 北京微智全景信息技术有限公司 Method and device for securely loading system image for computer
CN105453519A (en) * 2014-07-28 2016-03-30 华为技术有限公司 Method and apparatus for information security verification
CN105930728A (en) * 2016-06-17 2016-09-07 浪潮(北京)电子信息产业有限公司 Application examining method and device
CN106599729A (en) * 2016-12-09 2017-04-26 郑州云海信息技术有限公司 Safety verification method and system for driving program
CN106919858A (en) * 2015-12-28 2017-07-04 上海新微技术研发中心有限公司 Chip, and data protection device and method of chip
CN106919862A (en) * 2015-12-28 2017-07-04 上海新微技术研发中心有限公司 Chip, authentication circuit and method of chip
CN109446011A (en) * 2018-11-01 2019-03-08 郑州云海信息技术有限公司 A kind of firmware safety detecting method, device and the storage medium of hard disk
CN109542518A (en) * 2018-10-09 2019-03-29 华为技术有限公司 The method of chip and bootrom
CN112711780A (en) * 2019-10-25 2021-04-27 中车株洲电力机车研究所有限公司 Memory unlocking method, system, storage medium and computer equipment
CN112948831A (en) * 2021-03-12 2021-06-11 哈尔滨安天科技集团股份有限公司 Application program risk identification method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6101476A (en) * 1996-05-28 2000-08-08 Kamatakis; John CD-ROM software protection system
CN101175267A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and software detecting method and device
CN102024118A (en) * 2009-09-14 2011-04-20 中兴通讯股份有限公司 Method and device for protecting programmable device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69527773T2 (en) * 1995-05-18 2002-11-28 Hewlett Packard Co Circuit arrangement for monitoring the use of functions in an integrated circuit
CN101145906B (en) * 2006-09-13 2010-10-06 北京邦天信息技术有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network
WO2010019916A1 (en) * 2008-08-14 2010-02-18 The Trustees Of Princeton University Hardware trust anchors in sp-enabled processors
CN101986597A (en) * 2010-10-20 2011-03-16 杭州晟元芯片技术有限公司 Identity authentication system with biological characteristic recognition function and authentication method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6101476A (en) * 1996-05-28 2000-08-08 Kamatakis; John CD-ROM software protection system
CN101175267A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and software detecting method and device
CN102024118A (en) * 2009-09-14 2011-04-20 中兴通讯股份有限公司 Method and device for protecting programmable device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609665A (en) * 2012-01-19 2012-07-25 福建三元达软件有限公司 Method and device for signing user program and method and device for verifying signature of user program
CN102609665B (en) * 2012-01-19 2014-12-10 福建三元达软件有限公司 Method and device for signing user program and method and device for verifying signature of user program
CN105453519B (en) * 2014-07-28 2019-06-21 华为技术有限公司 A kind of information security verification method and equipment
CN105453519A (en) * 2014-07-28 2016-03-30 华为技术有限公司 Method and apparatus for information security verification
CN105320891B (en) * 2015-11-18 2018-10-09 北京微智全景信息技术有限公司 A kind of method and device of computer security loading system mirror image
CN105320891A (en) * 2015-11-18 2016-02-10 北京微智全景信息技术有限公司 Method and device for securely loading system image for computer
CN106919858A (en) * 2015-12-28 2017-07-04 上海新微技术研发中心有限公司 Chip, and data protection device and method of chip
CN106919862A (en) * 2015-12-28 2017-07-04 上海新微技术研发中心有限公司 Chip, authentication circuit and method of chip
CN106919858B (en) * 2015-12-28 2020-01-24 上海新微技术研发中心有限公司 Chip, and data protection device and method of chip
CN106919862B (en) * 2015-12-28 2019-11-12 上海新微技术研发中心有限公司 Chip, authentication circuit and method of chip
CN105930728A (en) * 2016-06-17 2016-09-07 浪潮(北京)电子信息产业有限公司 Application examining method and device
CN105930728B (en) * 2016-06-17 2019-05-10 浪潮(北京)电子信息产业有限公司 A kind of application checking method and device
CN106599729A (en) * 2016-12-09 2017-04-26 郑州云海信息技术有限公司 Safety verification method and system for driving program
CN109542518A (en) * 2018-10-09 2019-03-29 华为技术有限公司 The method of chip and bootrom
CN109446011A (en) * 2018-11-01 2019-03-08 郑州云海信息技术有限公司 A kind of firmware safety detecting method, device and the storage medium of hard disk
CN112711780A (en) * 2019-10-25 2021-04-27 中车株洲电力机车研究所有限公司 Memory unlocking method, system, storage medium and computer equipment
CN112948831A (en) * 2021-03-12 2021-06-11 哈尔滨安天科技集团股份有限公司 Application program risk identification method and device
CN112948831B (en) * 2021-03-12 2024-02-13 安天科技集团股份有限公司 Application risk identification method and device

Also Published As

Publication number Publication date
WO2012174726A1 (en) 2012-12-27

Similar Documents

Publication Publication Date Title
CN102317948A (en) Protection method of chip and chip itself
CN101231622B (en) Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
CN110490008B (en) Security device and security chip
US20060026442A1 (en) Encryption apparatus and decryption apparatus
EP1855281A2 (en) Apparatus for writing data to a medium
EP2264639B1 (en) Securing executable code integrity using auto-derivative key
WO2008082949A1 (en) Upgrading a memory card that has security mechanisms that prevent copying of secure content and applications
US7818567B2 (en) Method for protecting security accounts manager (SAM) files within windows operating systems
TW200405164A (en) Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
CN103946856A (en) Encryption and decryption process method, apparatus and device
EP2503482A1 (en) Electronic device with flash memory component
KR101910826B1 (en) Method and apparatus for security of internet of things devices
CN109657497B (en) Secure file system and method thereof
CN102460456B (en) Memory device and method for adaptive protection of content
WO2011134207A1 (en) Method for protecting software
US20100205460A1 (en) Encryption method for digital data memory card and assembly for performing the same
CN112486607B (en) Virtual desktop authorization permission method based on combination of software and hardware
JP2004326425A (en) Information processor and memory card
JP2008005408A (en) Recorded data processing apparatus
CN112199740B (en) Encryption lock implementation method and encryption lock
US9003201B2 (en) Hardware protection for encrypted strings and protection of security parameters
RU2560827C1 (en) Information security method and portable multifunctional information security device
CN101403985B (en) Software permission backup method for software protection apparatus
WO2007128418A1 (en) Apparatus for writing data to a medium
JP4265156B2 (en) Information leakage prevention device and information leakage prevention method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120111