CN103761456B - A kind of anti-method cracking of monolithic microcomputer kernel code - Google Patents

A kind of anti-method cracking of monolithic microcomputer kernel code Download PDF

Info

Publication number
CN103761456B
CN103761456B CN201310475562.7A CN201310475562A CN103761456B CN 103761456 B CN103761456 B CN 103761456B CN 201310475562 A CN201310475562 A CN 201310475562A CN 103761456 B CN103761456 B CN 103761456B
Authority
CN
China
Prior art keywords
code
ciphertext
chip microcomputer
expressly
core
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310475562.7A
Other languages
Chinese (zh)
Other versions
CN103761456A (en
Inventor
沈秀清
陈维哲
王鲁克
储祝君
陈冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lierda Science & Technology Group Co Ltd
Original Assignee
Lierda Science & Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lierda Science & Technology Group Co Ltd filed Critical Lierda Science & Technology Group Co Ltd
Priority to CN201310475562.7A priority Critical patent/CN103761456B/en
Publication of CN103761456A publication Critical patent/CN103761456A/en
Application granted granted Critical
Publication of CN103761456B publication Critical patent/CN103761456B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of anti-method cracking of monolithic microcomputer kernel code. it comprises the following steps: in single-chip microcomputer run time version process, in the time carrying out the particular memory region at ciphertext code place, MPU memory protect module produces an interruption, in interruption, adopt AES module that ciphertext code is decrypted into expressly code, after CRC check is correct, plaintext code is passed back to particular memory region, interruption is returned, single-chip microcomputer is carried out the plaintext code of particular memory region, after code is finished, the plaintext code encryption of particular memory region is become ciphertext code by AES module, after CRC check is correct, ciphertext code is passed back to particular memory region. the present invention makes the core code in single-chip microcomputer exist with the form of ciphertext, even if cracker uses intrusive mood, mode has cracked single-chip microcomputer, single-chip microcomputer inner core code is read, also the core code of ciphertext form cannot be translated into expressly, thereby protect core code.

Description

A kind of anti-method cracking of monolithic microcomputer kernel code
Technical field
The present invention relates to single-chip microcomputer code protection technical field, relate in particular to a kind of monolithic microcomputer kernelThe anti-method cracking of code.
Background technology
Now on the market the technology that cracks of single-chip microcomputer is emerged in an endless stream, mainly contain two kinds of modes: non-Intrusive mood and immersion. The mode of non-intrusion type is to utilize chip design or chip programming sequentialIn some leak chip is cracked. Certain development along with chip design industry, this kindSituation also can be fewer and feweri. The mode of intrusive mood is to destroy the encapsulation of chip, utilizes semiconductor to surveyExamination equipment, the instruments such as microscope and micropositioner find the position of chip protection fuse and are repaiiedMultiple, make its chip that becomes not encrypted, then with Special programming, program is read, orDirectly probe is placed on to the program in readout memory in chip internal bus.
China Patent Publication No. CN1971470A, open day on May 30th, 2007, inventionName be called a kind of system encrypted method that adopts multifunctional assistant SCM, this application case is openA kind of system encrypted method that adopts multifunctional assistant SCM, it is to be at multidigit processorIn system, get function is relatively simple, software program amount is little support microprocessor with being with built-in burning to deathThe single-chip microcomputer of program storage substitutes, and in host-processor program and assistant SCM program, increasesAccording to the cryptographic check of agreement cryptographic protocol algorithm, calling program can not be read out and cannot answerSystem, thus reach the object of system encryption. Its weak point is that the code in this single-chip microcomputer isPlain code, cracker can crack by the mode of intrusive mood, by the plaintext code in single-chip microcomputerRead out, thereby be reduced into high-level language, grasp core technology.
Summary of the invention
The object of the invention is to overcome the technology that current single-chip microcomputer is easily cracked by intrusive mood modeProblem, provides a kind of monolithic microcomputer kernel code the anti-method cracking, and it makes the core in single-chip microcomputerHeart code exists with the form of ciphertext, even if cracker uses intrusive mood, mode has cracked monolithicMachine, reads single-chip microcomputer inner core code, also the core code of ciphertext form cannot be translated intoExpressly, thus protected core code.
In order to address the above problem, the present invention is achieved by the following technical solutions:
The anti-method cracking of monolithic microcomputer kernel code, described single-chip microcomputer is with MPU internal memoryProtection module, AES be part accelerating module, dma module and CRC module just, comprises followingStep:
S1: in advance the core code needing protection in single-chip microcomputer is carried out to initial encryption, by coreCode is encrypted to ciphertext code by AES AES, this ciphertext code is carried out standby simultaneouslyPart, the ciphertext code storage of backup is on the nonvolatile memory of single-chip microcomputer;
S2: in single-chip microcomputer run time version process, when carrying out the specific of one section of ciphertext code placeWhen storage area, MPU memory protect module produces an interruption;
S3: the code of the current execution of single-chip microcomputer enters interruption, dma module is by this ciphertext codeBe transferred to the appointed area in the volatile memory of single-chip microcomputer, AES just part accelerating module will refer toThe ciphertext code of determining region is decrypted into expressly code, and the verification of CRC module is code expressly, ifCheck errors, performs step S4, if verification is correct, performs step S5;
S4: former ciphertext code remains unchanged, dma module can not pass back to plaintext code formerThe particular memory region at ciphertext code place, the code of the current execution of single-chip microcomputer is always in interruptingIn, interruption cannot be returned;
S5:DMA module passes back to plaintext code the specific memory section at former ciphertext code placeSingle-chip microcomputer, by former ciphertext code coverage, after expressly code all returns, is interrupted returning in territoryCarry out expressly code;
S6: after expressly code is finished, this plaintext code is transferred to monolithic by dma moduleAppointed area in the volatile memory of machine, AES is bright by appointed area of part accelerating module justLiterary composition code encryption becomes ciphertext code, CRC module verification ciphertext code, if check errors,Perform step S7, if verification is correct, perform step S8;
The ciphertext code of backup is transferred to the specific of former ciphertext code place by S7:DMA moduleStorage area is code coverage expressly, and after ciphertext code end of transmission, single-chip microcomputer is carried out generation belowCode;
S8:DMA module passes back to ciphertext code the specific memory section at former ciphertext code placeTerritory is code coverage expressly, and after ciphertext code all returns, single-chip microcomputer is carried out generation belowCode;
In the process of execution step S2 to S8, if the power down of unit sheet, dma module willThe particular memory region that the ciphertext code of backup is transferred to former ciphertext code place is by current this spyDetermine the code coverage in storage area.
In the technical program, MPU (MemoryProtectionUnit; Memory protect unit)Memory protect module: can configure specific region internal memory reading and writing and code and carry out, work as single-chip microcomputerWhen chip is carried out the ciphertext core code of specific region, MPU produces an interruption. AES(AdvancedEncryptionStandard; Advanced Encryption Standard) just part accelerating module: AESJust just part computing aes algorithm of part accelerating module, greatly reduces the AES enciphering/deciphering time,AES can adopt 128/192/256bits key. DMA (DirectMemoryAccess; DirectlyConnect internal storage access unit) module: data transmission module can transmit under CPU sleep qualityData, reduce power consumption and transmission data time. CRC (CyclicRedundancyCheck;CRC) module: data check module, after energy verification AES module enciphering/decipheringData.
Move in whole process at singlechip chip, the core code overwhelming majority time is all with closeThe form of literary composition code exists, and only has in the time that it is performed, and after deciphering verification are correct, just can go outAfter now plaintext code, and this plaintext code is finished, can become ciphertext code by re-encrypted again,The time that expressly code occurs is very short. Even if competitor uses immersion mode to obtain single-chip microcomputerBinary code, the core code that in this binary code, we will protect be encrypt ciphertextCode, competitor cannot be reduced into source code, obtains the core code that we will protect, chipThe value cracking reduces greatly.
Execution step S2 to the process of step S8, if single-chip microcomputer power down, former ciphertext generationThe particular memory region at code place may retain whole plaintext codes or expressly code of a part,Can cause like this data entanglement, single-chip microcomputer cannot normally be moved next time, have code quilt simultaneouslyCrack the risk of reading. Therefore in the time of single-chip microcomputer power down, it is right that the ciphertext code of backup is transferred toThe particular memory region at the former ciphertext code place of answering is by the generation in current this particular memory regionCode covers, and prevents that power down, causes data entanglement in the expressly stage of particular memory region.
As preferably, in described step S1 to before core code initial encryption first by core codeBe divided into some sections, the data length of every section of core code is 0 to 1024bytes, then willEvery section of core code is encrypted to ciphertext code by AES AES respectively. Every execution toThe particular memory region at Duan Miwen code place, MPU memory protect module all produces in oneDisconnected, then perform step S3 to S8. The data length of every section of core plaintext code is controlled atIn 1024bytes, because ciphertext code is identical, close with corresponding plaintext code data lengthThe data length of literary composition code also, in 1024bytes, makes single-chip microcomputer carry out each time expressly generationCode and encryption and decryption expressly time of code very short, thereby reduce each section expressly code existence timeBetween, increase the difficulty cracking, improve the security of core code. Meanwhile, even core generationCode data length is longer, and the volatile memory of temporarily depositing expressly code and ciphertext code is not yetNeed too large.
As preferably, in described step S1 to single-chip microcomputer inner core code initial encryption comprise withLower step: use computer host computer that the plaintext core code in single-chip microcomputer code is passed through to AESAES is encrypted to ciphertext code, and this ciphertext code is transferred to single-chip microcomputer binary system burning literary compositionExpressly expressly core code covering of the storage area at core code place in part, simultaneously by computerThe plaintext CRC key that host computer generates and ciphertext CRC key add single-chip microcomputer binary system to and burnIn record file.
As preferably, in described step S6, plaintext code is transferred to monolithic by dma moduleBehind appointed area in the volatile memory of machine, remove specific memory section, former ciphertext code placePlaintext code on territory. Reduce the section time that expressly code exists, increased the difficulty cracking,Improve the security of core code.
As preferably, described AES just part accelerating module adopts 256bits key.
Substantial effect of the present invention is: (1) makes core code in the single-chip microcomputer shape with ciphertextFormula exists, even if cracker uses intrusive mood, mode has cracked single-chip microcomputer, by single-chip microcomputer inner coreCode is read, and also the core code of ciphertext form cannot be translated into expressly, thereby protect coreHeart code. (2) core code is divided into some sections, and the data length of every section of core code is0 to 1024bytes, make single-chip microcomputer carry out each time expressly code and encryption and decryption expressly code timeBetween shorter, thereby reduce each section period that expressly code exists, increased the difficulty cracking,Improve the security of core code.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the present invention.
Detailed description of the invention
Below by embodiment, and by reference to the accompanying drawings, technical scheme of the present invention is made to further toolThe explanation of body.
Embodiment: a kind of anti-method cracking of monolithic microcomputer kernel code of the present embodiment, single-chip microcomputerWith just part accelerating module, dma module and CRC mould of MPU memory protect module, AESPiece, as shown in Figure 1, comprises the following steps:
S1: in advance the plaintext core code in single-chip microcomputer is divided into some sections of expressly codes, everyThe data length of Duan Mingwen code is 0 to 1024bytes, uses computer host computer bright by every sectionLiterary composition code is encrypted to ciphertext code by AES AES, and every section of ciphertext code is transferred toIn single-chip microcomputer, the storage area at corresponding one section of plaintext code place covers one section of plaintext code of correspondenceLid, and plaintext CRC key and ciphertext CRC key are sent to single-chip microcomputer, simultaneously by theseCiphertext code is transferred to the back-up storage region of the nonvolatile memory of single-chip microcomputer and backs up;
S2: in single-chip microcomputer run time version process, when carrying out the specific of one section of ciphertext code placeWhen storage area (first address in this section of ciphertext code storage region), MPU memory protect moduleProduce an interruption;
S3: the code of the current execution of single-chip microcomputer enters interruption, dma module is by this ciphertext codeBe transferred to the appointed area in the volatile memory of single-chip microcomputer, AES just part accelerating module will refer toThe ciphertext code of determining region is decrypted into expressly code, and the verification of CRC module is code expressly, ifCheck errors, performs step S4, if verification is correct, performs step S5;
S4: former ciphertext code remains unchanged, dma module can not pass back to plaintext code formerThe particular memory region at ciphertext code place, the plaintext code decrypting is retained in volatile storageAppointed area on device, the code of the current execution of single-chip microcomputer is always in interrupting, and interruption cannotReturn to single-chip microcomputer cisco unity malfunction;
S5:DMA module passes back to plaintext code the specific memory section at former ciphertext code placeTerritory is by former ciphertext code coverage, and former ciphertext code is all removed, and expressly code has all returnedBi Hou, interrupts returning, and single-chip microcomputer is carried out expressly code;
S6: after expressly code is finished, this plaintext code is transferred to monolithic by dma moduleAppointed area in the volatile memory of machine, removes former ciphertext code place spy after end of transmissionDetermine the plaintext code on storage area, AES just part accelerating module by the plaintext code of appointed areaBe encrypted to ciphertext code, CRC module verification ciphertext code, if check errors is carried outStep S7, if verification is correct, performs step S8;
The ciphertext code of backup is transferred to the specific of former ciphertext code place by S7:DMA moduleStorage area is code coverage expressly, and after ciphertext code end of transmission, single-chip microcomputer is carried out generation belowCode;
S8:DMA module passes back to ciphertext code the specific memory section at former ciphertext code placeTerritory is code coverage expressly, and after ciphertext code all returns, single-chip microcomputer is carried out generation belowCode;
In the process of execution step S2 to S8, if the power down of unit sheet, dma module willThe particular memory region that the ciphertext code of backup is transferred to corresponding former ciphertext code place is by currentCode coverage in this particular memory region.
MPU (MemoryProtectionUnit; Memory protect unit) memory protect module:Can configure specific region internal memory reading and writing and code and carry out, when singlechip chip is carried out given zoneWhen the ciphertext core code in territory, MPU produces an interruption. AES (AdvancedEncryptionStandard; Advanced Encryption Standard) just just just part of part accelerating module of part accelerating module: AESComputing aes algorithm, greatly reduces the AES enciphering/deciphering time, and AES can adopt128/192/256bits key. DMA (DirectMemoryAccess; Direct memory accessUnit) module: data transmission module, can under CPU sleep quality, transmit data, reducePower consumption and transmission data time. CRC (CyclicRedundancyCheck; Cyclic redundancy schoolTest code) module: data check module, the data after energy verification AES module enciphering/deciphering.
Move in whole process at singlechip chip, the core code overwhelming majority time is all with closeThe form of literary composition code exists, and only has in the time that it is performed, and after deciphering verification are correct, just can go outAfter now plaintext code, and this plaintext code is finished, can become ciphertext code by re-encrypted again,The time that expressly code occurs is very short. Even if competitor uses immersion mode to obtain single-chip microcomputerBinary code, the core code that in this binary code, we will protect be encrypt ciphertextCode, competitor cannot be reduced into source code, obtains the core code that we will protect, chipThe value cracking reduces greatly.
In the present embodiment, single-chip microcomputer dominant frequency is 8MHz, and AES just part accelerating module adopts 256bitsKey, the data length of the monolithic microcomputer kernel code that protect is 2304bytes. At step S1In be divided into 5 sections of expressly codes, 5 sections expressly the data length of codes be respectively512bytes, 512bytes, 512bytes, 512bytes and 256bytes, every period of plaintext generationThe data length of code is all no more than 512bytes, due to ciphertext code and corresponding plaintext code numberIdentical according to length, so the data length of every section of ciphertext code is also all no more than 512bytes.
Be 8MHz in single-chip microcomputer dominant frequency, AES just part accelerating module adopts 256bits keyIn situation, the code for data length 512bytes: the deciphering time is 1.35ms, encryptsTime is 1.35ms, and the code time of implementation is 0.1ms. Single-chip microcomputer is carried out expressly code each timeWith encryption and decryption expressly time of code very short, thereby reduce each section expressly code exist timeBetween, increase the difficulty cracking, improve the security of core code. Meanwhile, even core generationCode data length is longer, and the volatile memory of temporarily depositing expressly code and ciphertext code is not yetNeed too large.
Execution step S2 to the process of step S8, if single-chip microcomputer power down, former ciphertext generationThe particular memory region at code place may retain whole plaintext codes or expressly code of a part,Can cause like this data entanglement, single-chip microcomputer cannot normally be moved next time, have code quilt simultaneouslyCrack the risk of reading. Therefore in the time of single-chip microcomputer power down, it is right that the ciphertext code of backup is transferred toThe particular memory region at the former ciphertext code place of answering is by the generation in current this particular memory regionCode covers, and prevents that power down, causes data entanglement in the expressly stage of particular memory region.

Claims (4)

1. the anti-method cracking of monolithic microcomputer kernel code, described single-chip microcomputer is protected with MPU internal memoryProtect module, AES hardware accelerator, dma module and CRC module, its feature existsIn, comprise the following steps:
S1: in advance the core code needing protection in single-chip microcomputer is carried out to initial encryption, by coreCode is encrypted to ciphertext code by AES AES, this ciphertext code is carried out simultaneouslyBackup, the ciphertext code storage of backup is on the nonvolatile memory of single-chip microcomputer;
S2: in single-chip microcomputer run time version process, when carrying out the specific of one section of ciphertext code placeWhen storage area, MPU memory protect module produces an interruption;
S3: the code of the current execution of single-chip microcomputer enters interruption, dma module passes this ciphertext codeBe passed to the appointed area in the volatile memory of single-chip microcomputer, AES hardware accelerator willThe ciphertext code of appointed area is decrypted into expressly code, and the verification of CRC module is code expressly,If check errors, performs step S4, if verification is correct, perform step S5;
S4: former ciphertext code remains unchanged, dma module can not pass back to plaintext code former closeThe particular memory region at literary composition code place, the code of the current execution of single-chip microcomputer always inIn disconnected, interruption cannot be returned;
S5:DMA module passes back to plaintext code the particular memory region at former ciphertext code placeBy former ciphertext code coverage, after expressly code all returns, interrupt returning monolithicMachine is carried out expressly code;
S6: after expressly code is finished, this plaintext code is transferred to single-chip microcomputer by dma moduleVolatile memory on appointed area, AES hardware accelerator is by appointed areaExpressly code encryption becomes ciphertext code, and CRC module verification ciphertext code, if verification mistakeMistake, performs step S7, if verification is correct, performs step S8;
S7:DMA module is transferred to the ciphertext code of backup specific the depositing at former ciphertext code placeExpressly code coverage of storage region, after ciphertext code end of transmission, single-chip microcomputer is carried out belowCode;
S8:DMA module passes back to ciphertext code the particular memory region at former ciphertext code placeExpressly code coverage, after ciphertext code all returns, single-chip microcomputer is carried out generation belowCode;
In the process of execution step S2 to S8, if the power down of unit sheet, dma moduleThe particular memory region that the ciphertext code of backup is transferred to former ciphertext code place is by currentCode coverage in this particular memory region;
If in described step S1 to first core code being divided into before core code initial encryptionDry section, the data length of every section of core code is 0 to 1024bytes, then by every section of coreHeart code is encrypted to ciphertext code by AES AES respectively.
2. the anti-method cracking of a kind of monolithic microcomputer kernel code according to claim 1, its spyLevy and be, in described step S1, single-chip microcomputer inner core code initial encryption is comprised to following stepRapid: to use computer host computer that the plaintext core code in single-chip microcomputer code is added by AESClose algorithm for encryption becomes ciphertext code, and this ciphertext code is transferred to the burning of single-chip microcomputer binary systemExpressly expressly core code covering of the storage area at core code place in file, simultaneouslyPlaintext CRC key and ciphertext CRC key that computer host computer is generated add monolithic toIn machine binary system recordable paper.
3. the anti-method cracking of a kind of monolithic microcomputer kernel code according to claim 1 and 2,It is characterized in that: in described step S6, plaintext code is transferred to monolithic by dma moduleBehind appointed area in the volatile memory of machine, remove specific the depositing in former ciphertext code placePlaintext code on storage region.
4. the anti-method cracking of a kind of monolithic microcomputer kernel code according to claim 1 and 2,It is characterized in that: described AES hardware accelerator adopts 256bits key.
CN201310475562.7A 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code Active CN103761456B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310475562.7A CN103761456B (en) 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310475562.7A CN103761456B (en) 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code

Publications (2)

Publication Number Publication Date
CN103761456A CN103761456A (en) 2014-04-30
CN103761456B true CN103761456B (en) 2016-05-11

Family

ID=50528692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310475562.7A Active CN103761456B (en) 2013-10-12 2013-10-12 A kind of anti-method cracking of monolithic microcomputer kernel code

Country Status (1)

Country Link
CN (1) CN103761456B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156675A (en) * 2014-08-05 2014-11-19 唐道成 Chip encipher
CN104573425B (en) * 2014-12-31 2018-01-30 上海格尔软件股份有限公司 A kind of Python program module encryption methods based on symmetry algorithm and special load-on module
CN107066843A (en) * 2017-03-31 2017-08-18 武汉斗鱼网络科技有限公司 A kind of method and device protected to application program
CN106951746B (en) * 2017-04-25 2020-01-21 厦门芯阳科技股份有限公司 Method and system for preventing reverse cracking of temperature control program
CN107194210B (en) * 2017-05-05 2019-07-30 厦门芯阳科技股份有限公司 A kind of anti-crack method of single-chip microcontroller code
FR3069935A1 (en) * 2017-08-01 2019-02-08 Maxim Integrated Products, Inc. DEVICES AND METHODS FOR INTELLECTUAL PROPERTY PROTECTION OF SOFTWARE FOR INTEGRATED PLATFORMS
CN109858241B (en) * 2017-11-22 2021-12-17 浙江智贝信息科技有限公司 Single-equipment code safe execution and interaction method and interaction system thereof
CN109446757B (en) * 2018-10-25 2022-03-15 石生花微电子(南京)有限公司 Method for protecting general MCU program
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950345A (en) * 2010-09-29 2011-01-19 山东大学 Hardware decryption-based high-reliability terminal equipment and working method thereof
CN102324006A (en) * 2011-09-06 2012-01-18 四川九洲电器集团有限责任公司 Processor program safety protection device and method
CN102938046A (en) * 2012-10-11 2013-02-20 杭州晟元芯片技术有限公司 Code protection method based on static encrypted storage and dynamic decrypted operation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011068996A1 (en) * 2009-12-04 2011-06-09 Cryptography Research, Inc. Verifiable, leak-resistant encryption and decryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950345A (en) * 2010-09-29 2011-01-19 山东大学 Hardware decryption-based high-reliability terminal equipment and working method thereof
CN102324006A (en) * 2011-09-06 2012-01-18 四川九洲电器集团有限责任公司 Processor program safety protection device and method
CN102938046A (en) * 2012-10-11 2013-02-20 杭州晟元芯片技术有限公司 Code protection method based on static encrypted storage and dynamic decrypted operation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《单片机控制程序加密策略探索与应用》;潘永雄 等;《计算机工程与设计》;20100616;第2466-2469页 *

Also Published As

Publication number Publication date
CN103761456A (en) 2014-04-30

Similar Documents

Publication Publication Date Title
CN103761456B (en) A kind of anti-method cracking of monolithic microcomputer kernel code
US9251380B1 (en) Method and storage device for isolating and preventing access to processor and memory used in decryption of text
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
CN101854243B (en) Circuit system design encryption circuit and encryption method thereof
CN102436423B (en) Controller and method for protecting NorFlash core data outside universal sheet
US20130163764A1 (en) Secure dynamic on chip key programming
KR101303278B1 (en) FPGA apparatus and method for protecting bitstream
CN104252881A (en) Semiconductor integrated circuit and system
CN108090366B (en) Data protection method and device, computer device and readable storage medium
CN103136458A (en) Code protection method for Linux operating system and module of method
CN104463026B (en) A kind of system and method for the anti-flight of hardware
CN204242180U (en) A kind of security password input system based on safe touch screen control chip
CN101742072A (en) Anti-copy method for set-top box software
CN101124768A (en) System and method of using a protected non-volatile memory
CN103258172A (en) Off-chip Nor Flash bus interface hardware encryption device
CN104834835A (en) Universal digital rights protection method under Windows platform
CN104537320A (en) Automatic encrypting method and system for chip
CN105184196A (en) Electronic system information security protection system and method
CN109492418A (en) A kind of safe encrypting and deciphering system of general dsp based on aes algorithm
US11019098B2 (en) Replay protection for memory based on key refresh
CN103347017A (en) Data processing method and system on chip
CN109977702B (en) FPGA equipment encryption authentication system based on DS2432 chip
TWI393006B (en) Security system and method for code dump protection
JP2007310601A (en) Microcomputer and method for protecting its software
RU2009131703A (en) SINGLE-CRYST COMPUTER AND TACHOGRAPH

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant