CN103488916A - On-missile software encipherment protection method - Google Patents

On-missile software encipherment protection method Download PDF

Info

Publication number
CN103488916A
CN103488916A CN201310347652.8A CN201310347652A CN103488916A CN 103488916 A CN103488916 A CN 103488916A CN 201310347652 A CN201310347652 A CN 201310347652A CN 103488916 A CN103488916 A CN 103488916A
Authority
CN
China
Prior art keywords
hardware protection
protection module
missile
cryptographic algorithm
target program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310347652.8A
Other languages
Chinese (zh)
Other versions
CN103488916B (en
Inventor
王可
朱天成
李红军
鲁毅
李鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Jinhang Computing Technology Research Institute
Original Assignee
No 8357 Research Institute of Third Academy of CASIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by No 8357 Research Institute of Third Academy of CASIC filed Critical No 8357 Research Institute of Third Academy of CASIC
Priority to CN201310347652.8A priority Critical patent/CN103488916B/en
Publication of CN103488916A publication Critical patent/CN103488916A/en
Application granted granted Critical
Publication of CN103488916B publication Critical patent/CN103488916B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Abstract

The invention belongs to the field of the computer information security, and particularly relates to an on-missile software encipherment protection method. The on-missile software encipherment protection method has the technical scheme that a target program plaintext is generated after core software is designed, developed and debugged on the basis of the traditional method. The on-missile software encipherment protection method disclosed by the invention is characterized in that an encipherment flow is added, the target program plaintext is encrypted into a ciphertext by a high-safety encipherment algorithm, and then the ciphertext is programmed into a missile-borne computer read only memory, which is different from the traditional method that the program plaintext is directly programmed into the missile-borne computer read only memory. In the hardware framework of the missile-borne computer, a hardware protection module is added and is mainly used for decrypting the program ciphertext stored in the read only memory. After the missile-borne computer system is electrified, the hardware protection module reads the program ciphertext from the read only memory to decrypt the ciphertext by the self algorithm logic to obtain the target program plaintext, then the plaintext is handed to the processer to be loaded and executed, and the subsequent work is kept consistent with the starting operation flow of the traditional missile-borne computer.

Description

A kind of software encryption and protection method on bullet
Technical field
The invention belongs to field of computer information security.Be specifically related to a kind of software encryption and protection method on bullet.
Background technology
Guided missile is most important weaponry in modern war.Along with improving constantly of China's Missile Information level, the missile-borne computer system that supports the Missile Equipment systemic-function reaches software on the bullet moved thereon and also becomes increasingly complex.Yet; under the Missile Equipment system condition of current China; the kernel software that has comprised a lot of important informations is not all done in the storage unit that any protection is stored in embedded system; software executable code can be read easily; the running environment that adds software is almost transparent, by conversed analysis and dis-assembling means, can obtain core algorithm and the critical data be hidden in software.Like this, the technology that war industry designs and develops a large amount of painstaking effort of personnel, time and fund of having condensed very easily is cracked and steals.For the model software of Missile Equipment, particularly for foreign trade guided missile model, if on bullet, kernel software is cracked, not only be related to the soft ware autonomous intellecture property of model, be related to especially national interests and national defense safety.Therefore, need to take corresponding safety precautions to the kernel software in Missile Equipment, guarantee the safety of core algorithm, data and index parameter.
For realizing the safeguard protection to the Missile Equipment kernel software, need fully to understand general missile-borne computer and start and workflow.As shown in Figure 1, the start-up course of system is tradition missile-borne computer system architecture: after a) system powers on, cpu reset signal is by unified control on circuit board, and on plate, reset signal makes CPU start operation after dragging down; B) at first CPU reads the bios program in ROM on plate, is loaded into RAM and carries out, and the one-level of completion system starts; C) after bios program completes corresponding initial work, be directed to curing storer (EPROM or Flash) program memory address, CPU reads the target program that solidifies preservation and is loaded in RAM, and carries out, this has just completed the secondary startup, and target program has moved corresponding systemic-function subsequently.
Summary of the invention
(1) technical matters that will solve
The technical problem to be solved in the present invention is: how for general missile-borne computer system architecture; by design hardware protection module and working-flow; how to realize encryption storage and the online decipher operation of kernel software in in-line memory; prevent that kernel software from being read easily and cracking, thereby improve the security of kernel software.
(2) technical scheme
For solving the problems of the technologies described above, the invention provides a kind of software encryption and protection method on bullet, described method is implemented based on the hardware protection module, described hardware protection module communicates by bus and CPU, for controlling reset signal and the debug signal of central processor CPU of missile-borne computer, simultaneously, described hardware protection module connects curing storer; Described hardware protection module comprises: programmable gate array FPGA and SRAM; Wherein, pass through gate array logic realization cryptographic algorithm in described FPGA, for deciphering the target program ciphertext; Described SRAM deciphers the plaintext obtained after the target program ciphertext for buffer memory; Wherein,
Described method comprises the steps:
Step S1: after design, exploitation and debugging based on carrying out kernel software under classic method, generate target program expressly; Host computer adopts the cryptographic algorithm of high security that the target program plain text encryption is become to ciphertext, then by the ciphertext programming in the curing storer of missile-borne computer;
Step S2: after system powers on, cpu reset signal, by the hardware protection module controls, maintains the reset signal high-end trim after the hardware protection module powers on, and stops CPU to start;
Step S3: the hardware protection module reads and solidifies the target program ciphertext of preserving from solidify storer, by inner decipherment algorithm, by decrypt ciphertext, synchronously the plaintext obtained after deciphering is saved in the SRAM of hardware protection inside modules;
Step S4: after completing the whole deciphering of target program, target program expressly in the whole internal SRAM that is kept at the hardware protection module after, the hardware protection module drags down cpu reset signal;
At first step S5:CPU reads the bios program in ROM on plate, is loaded into RAM and carries out, and the one-level of completion system starts;
After step S6:BIOS program completes corresponding initial work, be directed to the address mapping of hardware protection inside modules SRAM, CPU is usingd hardware protection inside modules SRAM as the curing storer under conventional architectures, the target program that reads buffer memory in SRAM expressly is loaded in RAM, and carry out, complete secondary and start;
Step S7: subsequently, the target program operation, complete corresponding systemic-function.
Wherein, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is symmetric encipherment algorithm each other; decipherment algorithm in cryptographic algorithm in host computer and hardware protection module is consistent, simultaneously cryptographic algorithm key used also will with key agreement used during deciphering in the hardware protection module.
Wherein, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is the AES cryptographic algorithm.
Wherein, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is the close algorithm of commercial cryptographic algorithm or state.
(3) beneficial effect
By adopting, reliability is high in the present invention, the close algorithm of commercial cryptographic algorithm or state of safety on cryptography, to after missile-borne computer kernel software code encryption, store again, can prevent the reading of kernel software program, inverting and crack analysis, effectively raising the security of core knowledge property right.
The accompanying drawing explanation
Fig. 1 is traditional missile-borne computer system architecture.
Fig. 2 is the principle schematic of technical solution of the present invention.
Fig. 3 is the missile-borne computer framework in the present invention.
Embodiment
For making purpose of the present invention, content and advantage clearer, below in conjunction with drawings and Examples, the specific embodiment of the present invention is described in further detail.
For solving the problem of prior art, technical solution of the present invention, after design, exploitation and debugging based on carrying out kernel software under classic method, generates target program expressly.Be different under classic method and directly the programming of program plaintext solidified to the way in storer to missile-borne computer, increased an encryption flow in the present invention, expressly adopt the cryptographic algorithm of high security to be encrypted to ciphertext target program, then the ciphertext programming is solidified in storer to missile-borne computer.
In the missile-borne computer hardware structure, increased a hardware protection module, major function is to be decrypted solidifying the program ciphertext of preserving in storer.Like this; after the missile-borne computer system powers on; the hardware protection module is the fetch program ciphertext from solidify storer; utilize the algorithm logic of self to decrypt ciphertext; obtain target program expressly; plaintext is given to processor again and loaded and carry out, the startup operational scheme of follow-up work and traditional missile-borne computer is consistent.
Particularly, as shown in Figure 2, software encryption and protection method on bullet provided by the present invention, it is implemented based on the hardware protection module, described hardware protection module communicates by bus and CPU, for controlling reset signal and the debug signal of central processor CPU of missile-borne computer, simultaneously, described hardware protection module connects solidifies storer; Described hardware protection module comprises: programmable gate array FPGA and SRAM; Wherein, pass through gate array logic realization cryptographic algorithm in described FPGA, for deciphering the target program ciphertext; Described SRAM deciphers the plaintext obtained after the target program ciphertext for buffer memory; Wherein,
Described method comprises the steps:
Step S1: after design, exploitation and debugging based on carrying out kernel software under classic method, generate target program expressly; Host computer adopts the cryptographic algorithm of high security that the target program plain text encryption is become to ciphertext, then by the ciphertext programming in the curing storer of missile-borne computer;
Step S2: after system powers on, cpu reset signal, by the hardware protection module controls, maintains the reset signal high-end trim after the hardware protection module powers on, and stops CPU to start;
Step S3: the hardware protection module reads and solidifies the target program ciphertext of preserving from solidify storer, by inner decipherment algorithm, by decrypt ciphertext, synchronously the plaintext obtained after deciphering is saved in the SRAM of hardware protection inside modules;
Step S4: after completing the whole deciphering of target program, target program expressly in the whole internal SRAM that is kept at the hardware protection module after, the hardware protection module drags down cpu reset signal;
At first step S5:CPU reads the bios program in ROM on plate, is loaded into RAM and carries out, and the one-level of completion system starts;
After step S6:BIOS program completes corresponding initial work, be directed to the address mapping of hardware protection inside modules SRAM, CPU is usingd hardware protection inside modules SRAM as the curing storer under conventional architectures, the target program that reads buffer memory in SRAM expressly is loaded in RAM, and carry out, complete secondary and start;
Step S7: subsequently, the target program operation, complete corresponding systemic-function.
Wherein, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is symmetric encipherment algorithm each other; decipherment algorithm in cryptographic algorithm in host computer and hardware protection module is consistent, simultaneously cryptographic algorithm key used also will with key agreement used during deciphering in the hardware protection module.
Wherein, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is the AES cryptographic algorithm.
Wherein, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is the close algorithm of commercial cryptographic algorithm or state.
Below in conjunction with specific embodiment, describe in detail.
Embodiment
As shown in Figure 2, the core of the present embodiment scheme is to solidify storage after target program is encrypted to the present embodiment, and system is real time decrypting operation again after starting.In order to guarantee the speed of encrypting/separating; the cryptographic algorithm adopted in host computer encryption and hardware protection module is symmetric encipherment algorithm; as AES(Advanced Encryption Standard, Advanced Encryption Standard) cryptographic algorithm, the close algorithm of commercial cryptographic algorithm or its other country.In realization, require cryptographic algorithm in host computer and the decipherment algorithm in the hardware protection module to be consistent, simultaneously cryptographic algorithm key used also will with key agreement used during deciphering in the hardware protection module.
(2) design of hardware protection module.The hardware protection module is emphasis of the present invention, and as shown in Figure 3, this module is realized by programmable gate array FPGA and the design of SRAM static RAM, wherein, in FPGA, by gate array logic realization cryptographic algorithm, can decipher the target program ciphertext; SRAM deciphers the plaintext obtained after the target program ciphertext for buffer memory.
(3) in the present embodiment, the startup workflow of missile-borne computer has been compared to partly change with classic method, in detail as shown in Figure 3.The key distinction be the reset signal of central processor CPU of missile-borne computer and debug signal by the hardware protection module controls, solidify storer simultaneously and be not connected to cpu bus, but be connected with the hardware protection module.The concrete start-up course of system is:
A) after system powers on, cpu reset signal, by the hardware protection module controls, maintains the reset signal high-end trim after the hardware protection module powers on, and stops CPU to start;
B) the hardware protection module reads and solidifies the target program ciphertext of preserving from solidify storer, by inner decryption logic, by decrypt ciphertext, synchronously the plaintext obtained after deciphering is saved in the internal SRAM of hardware protection module;
C) after completing the whole deciphering of target program, target program expressly in the whole internal SRAM that is kept at the hardware protection module after, the hardware protection module drags down cpu reset signal;
D) similar with conventional situation, at first CPU reads the bios program in ROM on plate, is loaded into RAM and carries out, and the one-level of completion system starts;
E) after bios program completes corresponding initial work, be directed to the address mapping of hardware protection inside modules SRAM, like this, curing storer under the conventional architectures that CPU just treats as hardware protection inside modules SRAM, the target program that CPU reads buffer memory in SRAM expressly is loaded in RAM, and carry out, this has just completed the secondary startup;
F) target program operation subsequently, complete corresponding systemic-function, with consistent under conventional architectures.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the technology of the present invention principle; can also make some improvement and distortion, these improvement and distortion also should be considered as protection scope of the present invention.

Claims (4)

1. software encryption and protection method on a bullet, it is characterized in that, described method is implemented based on the hardware protection module, described hardware protection module communicates by bus and CPU, for controlling reset signal and the debug signal of central processor CPU of missile-borne computer, simultaneously, described hardware protection module connects curing storer; Described hardware protection module comprises: programmable gate array FPGA and SRAM; Wherein, pass through gate array logic realization cryptographic algorithm in described FPGA, for deciphering the target program ciphertext; Described SRAM deciphers the plaintext obtained after the target program ciphertext for buffer memory; Wherein,
Described method comprises the steps:
Step S1: after design, exploitation and debugging based on carrying out kernel software under classic method, generate target program expressly; Host computer adopts the cryptographic algorithm of high security that the target program plain text encryption is become to ciphertext, then by the ciphertext programming in the curing storer of missile-borne computer;
Step S2: after system powers on, cpu reset signal, by the hardware protection module controls, maintains the reset signal high-end trim after the hardware protection module powers on, and stops CPU to start;
Step S3: the hardware protection module reads and solidifies the target program ciphertext of preserving from solidify storer, by inner decipherment algorithm, by decrypt ciphertext, synchronously the plaintext obtained after deciphering is saved in the SRAM of hardware protection inside modules;
Step S4: after completing the whole deciphering of target program, target program expressly in the whole internal SRAM that is kept at the hardware protection module after, the hardware protection module drags down cpu reset signal;
At first step S5:CPU reads the bios program in ROM on plate, is loaded into RAM and carries out, and the one-level of completion system starts;
After step S6:BIOS program completes corresponding initial work, be directed to the address mapping of hardware protection inside modules SRAM, CPU is usingd hardware protection inside modules SRAM as the curing storer under conventional architectures, the target program that reads buffer memory in SRAM expressly is loaded in RAM, and carry out, complete secondary and start;
Step S7: subsequently, the target program operation, complete corresponding systemic-function.
2. software encryption and protection method on bullet as claimed in claim 1; it is characterized in that; the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is symmetric encipherment algorithm each other; decipherment algorithm in cryptographic algorithm in host computer and hardware protection module is consistent, simultaneously cryptographic algorithm key used also will with key agreement used during deciphering in the hardware protection module.
3. software encryption and protection method on bullet as claimed in claim 1, is characterized in that, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is the AES cryptographic algorithm.
4. software encryption and protection method on bullet as claimed in claim 1, is characterized in that, the cryptographic algorithm that the cryptographic algorithm that described host computer adopts and described hardware protection module adopt is the close algorithm of commercial cryptographic algorithm or state.
CN201310347652.8A 2013-08-12 2013-08-12 A kind of software encryption and protection method on bullet Active CN103488916B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310347652.8A CN103488916B (en) 2013-08-12 2013-08-12 A kind of software encryption and protection method on bullet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310347652.8A CN103488916B (en) 2013-08-12 2013-08-12 A kind of software encryption and protection method on bullet

Publications (2)

Publication Number Publication Date
CN103488916A true CN103488916A (en) 2014-01-01
CN103488916B CN103488916B (en) 2017-09-19

Family

ID=49829131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310347652.8A Active CN103488916B (en) 2013-08-12 2013-08-12 A kind of software encryption and protection method on bullet

Country Status (1)

Country Link
CN (1) CN103488916B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105528548A (en) * 2015-12-09 2016-04-27 乐鑫信息科技(上海)有限公司 Method for encoding and automatically decoding codes in chip OutNvMem in batches
CN106066829A (en) * 2016-06-13 2016-11-02 江西洪都航空工业集团有限责任公司 A kind of missile-borne time-consuming real-time computing technique of embedded Control software cycle
CN107808099A (en) * 2016-09-08 2018-03-16 北京自动化控制设备研究所 Embedded software encryption/deciphering system and method
CN108881223A (en) * 2018-06-17 2018-11-23 张红卫 A method of protecting computer software is realized based on network communication
CN109255258A (en) * 2018-08-27 2019-01-22 重庆天箭惯性科技股份有限公司 Encrypt navigational computer circuit
CN111814208A (en) * 2020-07-02 2020-10-23 国家广播电视总局广播电视科学研究院 Method for preventing fault injection during safe starting of soc security chip
CN112363956A (en) * 2020-11-11 2021-02-12 上海磐启微电子有限公司 Method and device for encrypting and decrypting FLASH memory
CN112417521A (en) * 2020-11-05 2021-02-26 中国航空工业集团公司西安航空计算技术研究所 Information security system based on FPGA + processor architecture and working method thereof
CN112446055A (en) * 2019-08-10 2021-03-05 丹东东方测控技术股份有限公司 Method for preventing embedded electronic circuit equipment from being copied
CN112685758A (en) * 2020-12-31 2021-04-20 南方电网科学研究院有限责任公司 Data encryption system based on elliptic curve encryption algorithm

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010032318A1 (en) * 1999-12-03 2001-10-18 Yip Kun Wah Apparatus and method for protecting configuration data in a programmable device
CN102799819A (en) * 2012-07-04 2012-11-28 北京京航计算通讯研究所 Embedded software safety protection system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010032318A1 (en) * 1999-12-03 2001-10-18 Yip Kun Wah Apparatus and method for protecting configuration data in a programmable device
CN102799819A (en) * 2012-07-04 2012-11-28 北京京航计算通讯研究所 Embedded software safety protection system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王毅: "FPGA在硬盘加密卡中的应用与研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
高帅娜: "基于FPGA的数据加密设备的设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105528548A (en) * 2015-12-09 2016-04-27 乐鑫信息科技(上海)有限公司 Method for encoding and automatically decoding codes in chip OutNvMem in batches
CN106066829A (en) * 2016-06-13 2016-11-02 江西洪都航空工业集团有限责任公司 A kind of missile-borne time-consuming real-time computing technique of embedded Control software cycle
CN107808099A (en) * 2016-09-08 2018-03-16 北京自动化控制设备研究所 Embedded software encryption/deciphering system and method
CN107808099B (en) * 2016-09-08 2021-03-16 北京自动化控制设备研究所 Embedded software encryption/decryption system and method
CN108881223A (en) * 2018-06-17 2018-11-23 张红卫 A method of protecting computer software is realized based on network communication
CN109255258A (en) * 2018-08-27 2019-01-22 重庆天箭惯性科技股份有限公司 Encrypt navigational computer circuit
CN109255258B (en) * 2018-08-27 2020-07-14 重庆天箭惯性科技股份有限公司 Encrypted navigation computer circuit
CN112446055A (en) * 2019-08-10 2021-03-05 丹东东方测控技术股份有限公司 Method for preventing embedded electronic circuit equipment from being copied
CN111814208A (en) * 2020-07-02 2020-10-23 国家广播电视总局广播电视科学研究院 Method for preventing fault injection during safe starting of soc security chip
CN111814208B (en) * 2020-07-02 2023-07-28 国家广播电视总局广播电视科学研究院 Method for defending fault injection during secure start of soc national security chip
CN112417521A (en) * 2020-11-05 2021-02-26 中国航空工业集团公司西安航空计算技术研究所 Information security system based on FPGA + processor architecture and working method thereof
CN112417521B (en) * 2020-11-05 2023-09-05 中国航空工业集团公司西安航空计算技术研究所 Information security system based on FPGA+processor architecture and working method thereof
CN112363956A (en) * 2020-11-11 2021-02-12 上海磐启微电子有限公司 Method and device for encrypting and decrypting FLASH memory
CN112685758A (en) * 2020-12-31 2021-04-20 南方电网科学研究院有限责任公司 Data encryption system based on elliptic curve encryption algorithm
CN112685758B (en) * 2020-12-31 2024-02-06 南方电网科学研究院有限责任公司 Data encryption system based on elliptic curve encryption algorithm

Also Published As

Publication number Publication date
CN103488916B (en) 2017-09-19

Similar Documents

Publication Publication Date Title
CN103488916A (en) On-missile software encipherment protection method
CN101782956B (en) Method and device for protecting data on basis of AES real-time encryption
CN104156642B (en) A kind of security password input system and method based on safe touch screen control chip
US20160300064A1 (en) Secure processor for soc initialization
US10261854B2 (en) Memory integrity violation analysis method and apparatus
US10019603B2 (en) Secured memory system and method therefor
CN108075882A (en) Cipher card and its encipher-decipher method
CN103761456B (en) A kind of anti-method cracking of monolithic microcomputer kernel code
CN104537320A (en) Automatic encrypting method and system for chip
CN103258172A (en) Off-chip Nor Flash bus interface hardware encryption device
US9122894B2 (en) Method and apparatus for encryption
GB2578410A (en) Computer system software/firmware and a processor unit with a security module
CN103136458A (en) Code protection method for Linux operating system and module of method
CN109670345A (en) Guard method, accelerator module and the SOC chip of memory pages swapping in and out
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
US20170046280A1 (en) Data processing device and method for protecting a data processing device against attacks
CN103347017A (en) Data processing method and system on chip
WO2016053407A3 (en) Speculative cryptographic processing for out of order data
US9838199B2 (en) Initialization vectors generation from encryption/decryption
KR100748434B1 (en) Method and device for protecting file data by using real time decryption technics
CN105426702A (en) Android operating system based application program encrypting method and device, and Android operating system based application program decrypting method and device
US9740837B2 (en) Apparatus and method for preventing cloning of code
CN102880818A (en) Software protection method
CN106156658B (en) A kind of software protecting encryption and authentication method based on firmware layer
US10992453B2 (en) System architecture for encrypting external memory

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180409

Address after: 300308 Tianjin District of Dongli City Airport Economic Zone bonded Road No. 357

Patentee after: TIANJIN JINHANG INSTITUTE OF COMPUTING TECHNOLOGY

Address before: 300308 Tianjin District of Dongli City Airport Economic Zone bonded Road No. 357

Patentee before: NO.8357 Research Institute of the Third Academy of China Aerospace Science & Industry Corp.

TR01 Transfer of patent right