CN109391467A - Encryption method and device, the decryption method and device of nonvolatile memory - Google Patents

Encryption method and device, the decryption method and device of nonvolatile memory Download PDF

Info

Publication number
CN109391467A
CN109391467A CN201710680987.XA CN201710680987A CN109391467A CN 109391467 A CN109391467 A CN 109391467A CN 201710680987 A CN201710680987 A CN 201710680987A CN 109391467 A CN109391467 A CN 109391467A
Authority
CN
China
Prior art keywords
character string
module
encryption key
cryptographic signature
storage chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710680987.XA
Other languages
Chinese (zh)
Inventor
张赛
刘晓庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GigaDevice Semiconductor Beijing Inc
Hefei Geyi Integrated Circuit Co Ltd
Original Assignee
GigaDevice Semiconductor Beijing Inc
Hefei Geyi Integrated Circuit Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GigaDevice Semiconductor Beijing Inc, Hefei Geyi Integrated Circuit Co Ltd filed Critical GigaDevice Semiconductor Beijing Inc
Priority to CN201710680987.XA priority Critical patent/CN109391467A/en
Publication of CN109391467A publication Critical patent/CN109391467A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The embodiment of the invention provides a kind of encryption method of nonvolatile memory and devices, decryption method and device, comprising: when powering on, obtains the first character string;The second character string is generated according to first character string and Encryption Algorithm;Using first character string as the first encryption key, using second character string as the first cryptographic signature;Store first encryption key and first cryptographic signature.The embodiment of the invention provides a kind of encryption method of nonvolatile memory and devices, decryption method and device; pass through twice protective layer; the nonvolatile memory for being the first encryption key and the first cryptographic signature respectively needs is protected to encrypt; for playing the role of protection because storing for the nonvolatile memory that important information needs to encrypt.

Description

Encryption method and device, the decryption method and device of nonvolatile memory
Technical field
The present embodiments relate to non-volatile memory technologies field more particularly to a kind of nonvolatile memory plus Decryption method and device, decryption method and device.
Background technique
With the continuous improvement of nonvolatile memory integrated level, the structure of plurality of nonvolatile storage chip system often by It is applied in actual product.
The structure of traditional plurality of nonvolatile storage chip system, including multiple storage chips.Storage chip composition is deposited Storage module is connected by I/O interface with microcontroller, and microcontroller is for controlling each storage chip.Traditional plurality of nonvolatile is deposited It stores up in chip system structure, it, can be with by the address instruction of microcontroller for choosing the browsing process of storage chip to be Certain information are needed the storage chip of special secrecy that can not play the role of protection by any one storage chip of meaning access.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of encryption method of nonvolatile memory and devices, decryption side Method and device play the role of protection so as to store for the nonvolatile memory that important information needs to encrypt.
In a first aspect, the embodiment of the invention provides a kind of encryption methods of nonvolatile memory, comprising:
When powering on, the first character string is obtained;
The second character string is generated according to first character string and Encryption Algorithm;
Using first character string as the first encryption key, using second character string as the first cryptographic signature;
Store first encryption key and first cryptographic signature.
Optionally, when powering on again, third character string is obtained;
The 4th character string is generated according to the third character string and Encryption Algorithm;
The third character string is as the second encryption key, using the 4th character string as the second cryptographic signature;
Store second encryption key and second cryptographic signature.
Optionally, when powering on again, first encryption key is deleted.
Second aspect, the embodiment of the invention provides a kind of decryption methods of nonvolatile memory, comprising:
Read first encryption key and first cryptographic signature, first encryption key pair and first encryption First encryption key pair and the first cryptographic signature described in any one that signature is mentioned for first aspect;
If first chooses storage chip for storage enciphered storage chip, the first instruction is obtained, first instruction includes the 5th Character string, the 6th character string and described first choose the address of storage chip;
Judge whether the 5th character string and first encryption key are identical;
Judge whether the 6th character string identical with first cryptographic signature;
If the 5th character string and first encryption key is identical and the 6th character string and first encryption It signs identical, then chooses the address of storage chip to read according to the 5th character string, the 6th character string and described first Described first chooses the information of storage chip.
Optionally, when powering on again, second encryption key and second cryptographic signature, second encryption are read Second encryption key pair described in any one that key and second cryptographic signature are mentioned for first aspect and the second encryption label Word;
If second chooses storage chip for storage enciphered storage chip, the second instruction is obtained, second instruction includes the 7th Character string, the 8th character string and described second choose the address of storage chip;
Judge whether the 7th character string and second encryption key are identical;
Judge whether the 8th character string identical with second cryptographic signature;
If the 7th character string and second encryption key is identical and the 8th character string and second encryption It signs identical, then chooses the address of storage chip to read according to the 7th character string, the 8th character string and described second Described second chooses the information of storage chip.
The third aspect, the embodiment of the invention provides a kind of encryption devices of nonvolatile memory, comprising:
Microcontroller, I/O interface and memory module, the memory module include at least one storage chip, the storage Module is connected by the I/O interface with the microcontroller, and the microcontroller is for controlling the memory module;
The microcontroller includes that the first character string obtains module, for obtaining the first character string;
The microcontroller further includes that the second character string obtains module, and second character string obtains module and described first Character string obtains module and is connected, for generating the second character string according to first character string and Encryption Algorithm;
The memory module includes the first encryption key storage unit, the first encryption key module and first word Symbol string obtains module and is connected, for storing first character string, using first character string as the first encryption key;It is described Memory module further includes the first cryptographic signature storage unit, and the first cryptographic signature storage unit is obtained with second character string Modulus block is connected, for storing second character string, using second character string as the first cryptographic signature.
Optionally, the microcontroller further includes that third character string obtains module, for obtaining third character string;
4th character string obtains module, and the 4th character string obtains module and obtains module phase with the third character string Even, for generating the 4th character string according to the third character string and Encryption Algorithm;
The memory module includes the second encryption key storage unit, the second encryption key storage unit and described the Two character strings obtain module and are connected, for storing second character string, using second character string as the second encryption key; The memory module further includes the second cryptographic signature storage unit, the second cryptographic signature storage unit and the 4th character String obtains module and is connected, for storing the 4th character string, using the 4th character string as the second cryptographic signature.
Optionally, the microcontroller includes the first encryption key removing module, the first encryption key removing module Being connected with the first key storage unit, when for powering on again, deleting first encryption key.
Fourth aspect, the embodiment of the invention provides a kind of decryption devices of nonvolatile memory, comprising:
Microcontroller, I/O interface and memory module, the memory module include at least one storage chip, the storage Module is connected by the I/O interface with the microcontroller, and the microcontroller is for controlling the memory module;
The microcontroller includes read module, and the read module is for reading first encryption key and described the One cryptographic signature, first encryption key pair and first cryptographic signature are the first encryption described in third aspect any one Key and the first cryptographic signature;
The microcontroller further includes instruction module, if described instruction module chooses storage chip to deposit for encryption for first Chip is stored up, then obtains the first instruction, first instruction chooses storage including the 5th character string, the 6th character string and described first The address of chip;
The microcontroller further includes first judgment module, the first judgment module and the read module and described Instruction module is connected, for judging whether the 5th character string and first encryption key are identical;
The microcontroller further includes the second judgment module, second judgment module and the read module and described Instruction module is connected, for judging whether the 6th character string identical with first cryptographic signature;
Deciphering module, the deciphering module are connected with the first judgment module and second judgment module, are used for When the 5th character string and first encryption key is identical and the 6th character string is identical as first cryptographic signature When, choose the address of storage chip to read described first according to the 5th character string, the 6th character string and described first Choose the information of storage chip.
Optionally, it when the read module is also used to power on again, reads second encryption key and described second and adds Close signature, second encryption key pair and second cryptographic signature are the second encryption key pair described in third aspect any one With the second cryptographic signature;
If described instruction module is also used to second and chooses storage chip be storage enciphered storage chip, the second instruction, institute are obtained State the second instruction include the 7th character string, the 8th character string and described second choose storage chip address;
The microcontroller further includes third judgment module, and the third judgment module and second encryption key store Unit and described instruction module are connected, for judging whether the 7th character string and second encryption key are identical;
The microcontroller further includes the 4th judgment module, and the 4th judgment module and second cryptographic signature store Unit is connected, for judging whether the 8th character string and second cryptographic signature are identical;
The deciphering module is connected with the third judgment module and the 4th judgment module, for working as the described 7th Symbol string and when second encryption key is identical and the 8th character string is identical as second cryptographic signature, according to described the Seven character strings, the 8th character string and described second choose the address of storage chip to read described second and choose storage chip Information.
The embodiment of the present invention is the first encryption key and the first cryptographic signature respectively to protect needs by twice protective layer The nonvolatile memory of encryption.Any operation (read operation, programming are carried out to the nonvolatile memory of encryption Operation and erasing operation etc.), the first encryption key and the first cryptographic signature are indispensable.Compared to the prior art, Jin Jintong Nonvolatile memory can be accessed by crossing address, for because storing important information needs the nonvolatile memory that encrypts For, play the role of protection.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the encryption method for nonvolatile memory that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow diagram of the encryption method of nonvolatile memory provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of decryption method flow diagram for nonvolatile memory that the embodiment of the present invention three provides;
Fig. 4 is a kind of decryption method flow diagram for nonvolatile memory that the embodiment of the present invention four provides;
Fig. 5 show a kind of encryption device structural schematic diagram of nonvolatile memory of the offer of the embodiment of the present invention five;
Fig. 6 show the encryption device structural representation of another nonvolatile memory of the offer of the embodiment of the present invention five Figure;
Fig. 7 show a kind of decryption apparatus structure schematic diagram of nonvolatile memory of the offer of the embodiment of the present invention six;
Fig. 8 show the decryption apparatus structure signal of another nonvolatile memory of the offer of the embodiment of the present invention six Figure.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is a kind of flow diagram of the encryption method of nonvolatile memory provided in an embodiment of the present invention, the party Method can be executed by a kind of encryption device of nonvolatile memory, wherein the device can be by hardware and/or software Lai real It is existing, specifically comprise the following steps:
Step 101 when powering on, obtains the first character string.
In the present embodiment, the process for referring to that external power supply is connected to nonvolatile memory is powered on.It is non-volatile to deposit The controller of reservoir can generally be chosen micro-control unit (Microcontroller Unit, MCU), the voltage that MCU needs to connect Numerical value is about 1.8V.The process powered on refers to that external power supply supplies MCU power supply, and voltage signal is connected to non-volatile deposit by MCU The process of reservoir.User inputs the first character string, then nonvolatile memory then obtains the first character string of user's input.
Step 102 generates the second character string according to the first character string and Encryption Algorithm.
In the present embodiment, the selection correlation practitioner of Encryption Algorithm, which can according to need, voluntarily selects, the present embodiment It is not limited to a certain algorithm.
Step 103, using the first character string as the first encryption key, using the second character string as the first cryptographic signature.
In the present embodiment, it using the first character string as the first encryption key, is signed the second character string as the first encryption Word is equivalent to and is provided with twice protective layer for the nonvolatile memory of encryption, i.e., to the nonvolatile memory of encryption into Any operation (read operation, programming operation and erasing operation etc.) of row, the first encryption key and the first cryptographic signature lack One can not.
Step 104, the first encryption key of storage and the first cryptographic signature.
In the present embodiment, the first encryption key and the first cryptographic signature are stored, convenient for subsequent to encryption It reads and calls when nonvolatile memory is operated.
The embodiment of the invention provides a kind of encryption methods of nonvolatile memory by twice protective layer is respectively First encryption key and the first cryptographic signature are come the nonvolatile memory of protecting needs to encrypt.It i.e. will be to the non-volatile of encryption Memory carries out any operation (read operation, programming operation and erasing operation etc.), and the first encryption key and first add Close signature is indispensable.Compared to the prior art, nonvolatile memory can be accessed only by address, for because depositing It has stored up for the nonvolatile memory that important information needs to encrypt, has played the role of protection.
Embodiment two
Fig. 2 is a kind of flow diagram of the encryption method of nonvolatile memory provided in an embodiment of the present invention.This reality Apply example on the basis of the above embodiments, it is non-volatile for increasing when power up powers on again later in the above-described embodiments The encryption method of property memory.As shown in Fig. 2, this method specifically comprises the following steps:
Step 201 when powering on, obtains the first character string.
Step 202 generates the second character string according to the first character string and Encryption Algorithm.
Step 203, using the first character string as the first encryption key, using the second character string as the first cryptographic signature.
Step 204, the first encryption key of storage and the first cryptographic signature.
Step 205 when powering on again, obtains third character string.
In the present embodiment, after step 201,202 and 203 when powering on again, reacquire character string, that is, use Family needs to re-enter character string, i.e. third character string.
Optionally, when powering on again, the first encryption key is deleted.Since step 201,202 and 203 generate the of storage One key storage gets off, and is bound to occupy certain memory space, therefore, when powering on again, it is close can to delete the first encryption Key accelerates the speed of service of memory.
Step 206 generates the 4th character string according to third character string and Encryption Algorithm.
Step 207, third character string are as the second encryption key, using the 4th character string as the second cryptographic signature.
Step 208, the second encryption key of storage and the second cryptographic signature.
Step 206, step 207 and step 208 are to regenerate the process of the second encryption key and the second cryptographic signature.
The embodiment of the invention provides a kind of encryption methods of nonvolatile memory, i.e., can all update when powering on every time Encryption key and cryptographic signature avoid the encryption key in last power up and cryptographic signature leakage, for storing For the nonvolatile memory that important information needs to encrypt, play the role of protection.
Embodiment three
Fig. 3 is a kind of decryption method flow diagram of nonvolatile memory provided in an embodiment of the present invention, this method It can be executed by a kind of decryption device of nonvolatile memory, wherein the device can realize by hardware and/or software, Specifically comprise the following steps:
Step 301 reads the first encryption key and the first cryptographic signature.
It should be noted that decrypting process and ciphering process be it is corresponding, in the above-described embodiments, in ciphering process, deposit The first encryption key and the first cryptographic signature are stored up, then to access non-easy after first powers on and during power-off Storage enciphered storage chip in the property lost memory, the first encryption key and the first cryptographic signature stored before needing to read, so as to It is whether identical with the first encryption key and the first cryptographic signature in the information of subsequent process verification user input.
If step 302, first choose storage chip for storage enciphered storage chip, the first instruction is obtained, the first instruction includes 5th character string, the 6th character string and first choose the address of storage chip.
In the present embodiment, the first storage chip for choosing storage chip to want access to for user, needs user defeated at this time Enter the first instruction, i.e., chooses the instruction of the address of storage chip including the 5th character string, the 6th character string and first.
Step 303 judges whether the 5th character string and the first encryption key are identical.
In the present embodiment, the first encryption key is in ciphering process, and the key stored, the 5th character string is user Input.
Step 304 judges whether the 6th character string identical with the first cryptographic signature.
In the present embodiment, the first cryptographic signature is the cryptographic signature stored in ciphering process, and the 6th character string is User's input.
If step 305, the 5th character string and the first encryption key is identical and the 6th character string is identical as the first cryptographic signature, Then the address of storage chip is chosen to read the first letter for choosing storage chip according to the 5th character string, the 6th character string and first Breath.
In the present embodiment, if the 5th character string and the first encryption key is identical and the 6th character string is signed with the first encryption Word is identical, can be by being chosen the address of storage chip to read the first choosing according to the 5th character string, the 6th character string and first The information of middle storage chip.
The embodiment of the invention provides a kind of decryption method of nonvolatile memory, first chooses storage chip for encryption When storage chip, by the information (address comprising choosing storage chip) for inputting user and the first encryption key, first plus Close signature compares one by one, chooses storage chip to access first.It can only be accessed by address compared with prior art non-volatile Property memory in chip, need to play guarantor for the nonvolatile memory that encrypts for because storing important information The effect of shield.
Example IV
Fig. 4 is a kind of decryption method flow diagram of nonvolatile memory provided in an embodiment of the present invention.This implementation Example on the basis of the above embodiments, when increasing the process of first powering on and then once powering on, will access the storage of encryption The corresponding decryption method of chip.As shown in figure 4, this method specifically comprises the following steps:
Step 401 reads the first encryption key and the first cryptographic signature.
If step 402, first choose storage chip for storage enciphered storage chip, the first instruction is obtained, the first instruction includes 5th character string, the 6th character string and first choose the address of storage chip.
Step 403 judges whether the 5th character string and the first encryption key are identical.
Step 404 judges whether the 6th character string identical with the first cryptographic signature.
If step 405, the 5th character string and the first encryption key is identical and the 6th character string is identical as the first cryptographic signature, Then the address of storage chip is chosen to read the first letter for choosing storage chip according to the 5th character string, the 6th character string and first Breath.
Step 406 when powering on again, reads the second encryption key and the second cryptographic signature.
Because having updated the encryption key and cryptographic signature being arranged in last power up after powering on again, Therefore, after powering on again, user wants access to the storage chip after encryption, it is necessary to read the second encryption key and the Two cryptographic signatures.
If step 407, second choose storage chip for storage enciphered storage chip, the second instruction is obtained, the second instruction includes 7th character string, the 8th character string and second choose the address of storage chip.
Step 408 judges whether the 7th character string and the second encryption key are identical.
Step 409 judges whether the 8th character string identical with the second cryptographic signature.
If step 410, the 7th character string and the second encryption key is identical and the 8th character string is identical as the second cryptographic signature, Then the address of storage chip is chosen to read the second letter for choosing storage chip according to the 7th character string, the 8th character string and second Breath.
Step 407, step 408, step 409 and step 410 are in a preceding power up (step 401~step 405) after and then once powering on, need to access corresponding decrypting process when the storage chip of encryption.
The embodiment of the invention provides a kind of decryption method of nonvolatile memory, first chooses storage chip for encryption When storage chip, by the information (address comprising choosing storage chip) for inputting user and the first encryption key, first plus Close signature compares one by one, chooses storage chip to access first.That after powering on again, due to have updated encryption key and Cryptographic signature, when it is storage enciphered storage chip that storage chip is chosen in access second, by the information that inputs user (comprising choosing The address of storage chip) and the second encryption key, the second cryptographic signature compare one by one, choose storage chip to access second.Phase Chip in nonvolatile memory can be accessed by only passing through address than the prior art, for because storing important information needs For the nonvolatile memory to be encrypted, play the role of protection.
Embodiment five
Fig. 5 show a kind of encryption device structural schematic diagram of nonvolatile memory of the offer of the embodiment of the present invention five, The device can be by hardware realization, as shown in figure 5, the device includes:
Microcontroller 501, I/O interface 502 and memory module 503, memory module 503 include at least one storage chip, Memory module 503 is connected by I/O interface 502 with microcontroller 501, and microcontroller 501 is for controlling memory module 503;
Microcontroller 501 includes that the first character string obtains module 5011, for obtaining the first character string;
Microcontroller 501 further includes that the second character string obtains module 5012, and the second character string obtains module 5012 and first Character string obtains module 5011 and is connected, for generating the second character string according to the first character string and Encryption Algorithm;
Memory module 503 includes the first encryption key storage unit 5031, the first encryption key module 5031 and the first word Symbol string obtains module 5011 and is connected, for storing the first character string, using the first character string as the first encryption key;Memory module 503 further include the first cryptographic signature storage unit 5032, and the first cryptographic signature storage unit 5032 and the second character string obtain mould Block 5012 is connected, for storing the second character string, using the second character string as the first cryptographic signature.
The embodiment of the present invention is by the encryption device of nonvolatile memory a kind of, is the respectively by twice protective layer One encryption key and the first cryptographic signature are come the nonvolatile memory of protecting needs to encrypt.The non-volatile of encryption is deposited Reservoir carries out any operation (read operation, programming operation and erasing operation etc.), the first encryption key and the first encryption It signs indispensable.Compared to the prior art, nonvolatile memory can be accessed only by address, for because of storage For the nonvolatile memory that important information needs to encrypt, play the role of protection.
Based on the above technical solution, referring to Fig. 6, microcontroller 501 further includes that third character string obtains module 5013, for obtaining third character string;4th character string obtains module 5014, and the 4th character string obtains module 5014 and third word Symbol string obtains module 5013 and is connected, for generating the 4th character string according to third character string and Encryption Algorithm;Memory module 503 is wrapped The second encryption key storage unit 5033 is included, the second encryption key storage unit 5033 obtains 5012 phase of module with the second character string Even, for storing the second character string, using the second character string as the second encryption key;Memory module 503 further includes the second encryption Signature storage unit 5034, the second cryptographic signature storage unit 5034 obtains module 5014 with the 4th character string and is connected, for depositing The 4th character string is stored up, using the 4th character string as the second cryptographic signature.
Based on the above technical solution, referring to Fig. 6, microcontroller 501 includes the first encryption key removing module 5015, the first encryption key removing module 5015 is connected with the first encryption key storage unit 5031, when for powering on again, deletes Except the first encryption key.
The encryption device of the nonvolatile memory provided in above-described embodiment can be performed any embodiment of that present invention and be mentioned The encryption method of the nonvolatile memory of confession has and executes the corresponding functional module of this method and beneficial effect.Not above-mentioned The technical detail of detailed description in embodiment, reference can be made to the encryption of nonvolatile memory provided by any embodiment of the invention Method.
Embodiment six
Fig. 7 show a kind of decryption apparatus structure schematic diagram of nonvolatile memory of the offer of the embodiment of the present invention five, The device can be by hardware realization, as shown in fig. 7, the device includes:
Microcontroller 601, I/O interface 602 and memory module 603, memory module 603 include at least one storage chip, Memory module 603 is connected by I/O interface 602 with microcontroller 601, and microcontroller 601 is for controlling memory module 603;
Microcontroller 601 includes read module 6011, and read module 6011 adds for reading the first encryption key and first Close signature, it should be noted that the first encryption that the first encryption key and the first cryptographic signature are not stored in memory module 603 is close In key storage unit 6031 and the first cryptographic signature unit 6032;
Microcontroller 601 further includes instruction module 6012, if it is to add that instruction module 6012, which chooses storage chip for first, Close storage chip, then obtain the first instruction, and the first instruction chooses storage chip including the 5th character string, the 6th character string and first Address;
Microcontroller 601 further includes first judgment module 6013, first judgment module 6013 and read module 6011 and Instruction module 6012 is connected, for judging whether the 5th character string and the first encryption key are identical;
Microcontroller 601 further includes the second judgment module 6014, the second judgment module 6014 and read module 6011 and Instruction module 6012 is connected, for judging whether the 6th character string identical with the first cryptographic signature;
Deciphering module 6015, deciphering module 6015 are connected with first judgment module 6013 and the second judgment module 6014, For when the 5th character string and when the first encryption key is identical and the 6th character string is identical as the first cryptographic signature, according to the 5th word Symbol string, the 6th character string and first choose the address of storage chip to read the first information for choosing storage chip.
The embodiment of the present invention chooses storage chip for encryption by a kind of decryption device of nonvolatile memory first When storage chip, by the information (address comprising choosing storage chip) for inputting user and the first encryption key, first plus Close signature compares one by one, chooses storage chip to access first.It can only be accessed by address compared with prior art non-volatile Property memory in chip, need to play guarantor for the nonvolatile memory that encrypts for because storing important information The effect of shield.
Based on the above technical solution, referring to Fig. 8, when read module 6011 is also used to power on again, second is read Encryption key and the second cryptographic signature, the second encryption key and the second cryptographic signature be not stored in memory module 603 second plus In close key storing unit 6033 and the second cryptographic signature unit 6034;
If instruction module 6012 is also used to second and chooses storage chip be storage enciphered storage chip, the second instruction is obtained, the The address of storage chip is chosen in two instructions including the 7th character string, the 8th character string and second;
Microcontroller 601 further includes third judgment module 6016, and third judgment module 6016 and the second encryption key store Unit and instruction module 6012 are connected, for judging whether the 7th character string and the second encryption key are identical;
Microcontroller 601 further includes the 4th judgment module 6017, and the 4th judgment module 6017 and the second cryptographic signature store Unit 6034 is connected, for judging whether the 8th character string and the second cryptographic signature are identical;
Deciphering module 6015 is connected with third judgment module 6016 and the 4th judgment module 6017, for when the 7th symbol string When and eightth character string identical with the second encryption key is identical as the second cryptographic signature, according to the 7th character string, the 8th character string The address of storage chip is chosen to read the second information for choosing storage chip with second.
The decryption device of the nonvolatile memory provided in above-described embodiment can be performed any embodiment of that present invention and be mentioned The decryption method of the nonvolatile memory of confession has and executes the corresponding functional module of this method and beneficial effect.Not above-mentioned The technical detail of detailed description in embodiment, reference can be made to the decryption of nonvolatile memory provided by any embodiment of the invention Method.Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that this Invention is not limited to specific embodiment described here, is able to carry out various apparent variations, again for a person skilled in the art It newly adjusts, be combined with each other and substitutes without departing from protection scope of the present invention.Therefore, although by above embodiments to this hair It is bright to be described in further detail, but the present invention is not limited to the above embodiments only, in the feelings for not departing from present inventive concept It can also include more other equivalent embodiments under condition, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of encryption method of nonvolatile memory characterized by comprising
When powering on, the first character string is obtained;
The second character string is generated according to first character string and Encryption Algorithm;
Using first character string as the first encryption key, using second character string as the first cryptographic signature;
Store first encryption key and first cryptographic signature.
2. the method according to claim 1, wherein
When powering on again, third character string is obtained;
The 4th character string is generated according to the third character string and Encryption Algorithm;
The third character string is as the second encryption key, using the 4th character string as the second cryptographic signature;
Store second encryption key and second cryptographic signature.
3. the method according to claim 1, wherein
When powering on again, first encryption key is deleted.
4. a kind of decryption method of nonvolatile memory characterized by comprising
Read first encryption key and first cryptographic signature, first encryption key pair and first cryptographic signature For the first encryption key pair described in claim 1-3 any one and the first cryptographic signature;
If first chooses storage chip for storage enciphered storage chip, the first instruction is obtained, first instruction includes the 5th character String, the 6th character string and described first choose the address of storage chip;
Judge whether the 5th character string and first encryption key are identical;
Judge whether the 6th character string identical with first cryptographic signature;
If the 5th character string and first encryption key is identical and the 6th character string and first cryptographic signature It is identical, then according to the 5th character string, the 6th character string and described first choose storage chip address read described in First chooses the information of storage chip.
5. according to the method described in claim 4, it is characterized in that,
When powering on again, second encryption key and second cryptographic signature are read, second encryption key pair and described Second cryptographic signature is the second encryption key pair and the second cryptographic signature described in claim 1-3 any one;
If second chooses storage chip for storage enciphered storage chip, the second instruction is obtained, second instruction includes the 7th character String, the 8th character string and described second choose the address of storage chip;
Judge whether the 7th character string and second encryption key are identical;
Judge whether the 8th character string identical with second cryptographic signature;
If the 7th character string and second encryption key is identical and the 8th character string and second cryptographic signature It is identical, then according to the 7th character string, the 8th character string and described second choose storage chip address read described in Second chooses the information of storage chip.
6. a kind of encryption device of nonvolatile memory characterized by comprising
Microcontroller, I/O interface and memory module, the memory module include at least one storage chip, the memory module It is connected by the I/O interface with the microcontroller, the microcontroller is for controlling the memory module;
The microcontroller includes that the first character string obtains module, for obtaining the first character string;
The microcontroller further includes that the second character string obtains module, and second character string obtains module and first character String obtains module and is connected, for generating the second character string according to first character string and Encryption Algorithm;
The memory module includes the first encryption key storage unit, the first encryption key module and first character string It obtains module to be connected, for storing first character string, using first character string as the first encryption key;The storage Module further includes the first cryptographic signature storage unit, and the first cryptographic signature storage unit and second character string obtain mould Block is connected, for storing second character string, using second character string as the first cryptographic signature.
7. device according to claim 6, which is characterized in that
The microcontroller further includes that third character string obtains module, for obtaining third character string;
4th character string obtains module, and the 4th character string obtains module and is connected with third character string acquisition module, uses According to the third character string and Encryption Algorithm the 4th character string of generation;
The memory module includes the second encryption key storage unit, the second encryption key storage unit and second word Symbol string obtains module and is connected, for storing second character string, using second character string as the second encryption key;It is described Memory module further includes the second cryptographic signature storage unit, and the second cryptographic signature storage unit is obtained with the 4th character string Modulus block is connected, for storing the 4th character string, using the 4th character string as the second cryptographic signature.
8. device according to claim 7, which is characterized in that
The microcontroller includes the first encryption key removing module, the first encryption key removing module and described first close Key storage unit is connected, and when for powering on again, deletes first encryption key.
9. a kind of decryption device of nonvolatile memory characterized by comprising
Microcontroller, I/O interface and memory module, the memory module include at least one storage chip, the memory module It is connected by the I/O interface with the microcontroller, the microcontroller is for controlling the memory module;
The microcontroller includes read module, and the read module adds for reading first encryption key and described first Close signature, first encryption key pair and first cryptographic signature are the first encryption described in claim 6-8 any one Key and the first cryptographic signature;
The microcontroller further includes instruction module, if described instruction module chooses storage chip for encryption storage core for first Piece, then obtain the first instruction, and first instruction chooses storage chip including the 5th character string, the 6th character string and described first Address;
The microcontroller further includes first judgment module, the first judgment module and the read module and described instruction Module is connected, for judging whether the 5th character string and first encryption key are identical;
The microcontroller further includes the second judgment module, second judgment module and the read module and described instruction Module is connected, for judging whether the 6th character string identical with first cryptographic signature;
Deciphering module, the deciphering module are connected with the first judgment module and second judgment module, for working as institute State the 5th character string and when first encryption key is identical and the 6th character string is identical as first cryptographic signature, root It chooses the address reading described first of storage chip to choose according to the 5th character string, the 6th character string and described first to deposit Store up the information of chip.
10. device according to claim 9, which is characterized in that
When the read module is also used to power on again, second encryption key and second cryptographic signature are read, it is described Second encryption key pair and second cryptographic signature are that the second encryption key pair described in claim 6-8 any one and second add Close signature;
If described instruction module is also used to second to choose storage chip to be storage enciphered storage chip, the second instruction is obtained, described the The address of storage chip is chosen in two instructions including the 7th character string, the 8th character string and described second;
The microcontroller further includes third judgment module, the third judgment module and the second encryption key storage unit And described instruction module is connected, for judging whether the 7th character string and second encryption key are identical;
The microcontroller further includes the 4th judgment module, the 4th judgment module and the second cryptographic signature storage unit It is connected, for judging whether the 8th character string and second cryptographic signature are identical;
The deciphering module is connected with the third judgment module and the 4th judgment module, for when the 7th symbol string When identical and described with second encryption key the 8th character string is identical as second cryptographic signature, according to the 7th word Symbol string, the 8th character string and described second choose the address of storage chip to read the described second letter for choosing storage chip Breath.
CN201710680987.XA 2017-08-10 2017-08-10 Encryption method and device, the decryption method and device of nonvolatile memory Pending CN109391467A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710680987.XA CN109391467A (en) 2017-08-10 2017-08-10 Encryption method and device, the decryption method and device of nonvolatile memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710680987.XA CN109391467A (en) 2017-08-10 2017-08-10 Encryption method and device, the decryption method and device of nonvolatile memory

Publications (1)

Publication Number Publication Date
CN109391467A true CN109391467A (en) 2019-02-26

Family

ID=65414216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710680987.XA Pending CN109391467A (en) 2017-08-10 2017-08-10 Encryption method and device, the decryption method and device of nonvolatile memory

Country Status (1)

Country Link
CN (1) CN109391467A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204805A (en) * 2021-04-25 2021-08-03 山东英信计算机技术有限公司 Server power-on method, system, equipment and medium
CN117318975A (en) * 2023-02-28 2023-12-29 日照云控大数据科技有限公司 Intelligent retrieval processing method and system suitable for enterprise datamation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101536007A (en) * 2006-11-08 2009-09-16 美光科技公司 Method and system for encryption of information stored in an external nonvolatile memory
CN105184187A (en) * 2015-08-18 2015-12-23 重庆大学 Encrypting method and decrypting method of computer memorizer
CN105632543A (en) * 2014-11-21 2016-06-01 松下知识产权经营株式会社 Tamper-resistant non-volatile memory device
CN106778205A (en) * 2015-10-28 2017-05-31 德州仪器公司 Verified with the no data storehouse of physics unclonable function
CN106919865A (en) * 2017-03-02 2017-07-04 上海东软载波微电子有限公司 Data of nonvolatile storage encryption system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101536007A (en) * 2006-11-08 2009-09-16 美光科技公司 Method and system for encryption of information stored in an external nonvolatile memory
CN105632543A (en) * 2014-11-21 2016-06-01 松下知识产权经营株式会社 Tamper-resistant non-volatile memory device
CN105184187A (en) * 2015-08-18 2015-12-23 重庆大学 Encrypting method and decrypting method of computer memorizer
CN106778205A (en) * 2015-10-28 2017-05-31 德州仪器公司 Verified with the no data storehouse of physics unclonable function
CN106919865A (en) * 2017-03-02 2017-07-04 上海东软载波微电子有限公司 Data of nonvolatile storage encryption system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204805A (en) * 2021-04-25 2021-08-03 山东英信计算机技术有限公司 Server power-on method, system, equipment and medium
CN117318975A (en) * 2023-02-28 2023-12-29 日照云控大数据科技有限公司 Intelligent retrieval processing method and system suitable for enterprise datamation

Similar Documents

Publication Publication Date Title
CN101311942B (en) Software encryption and decryption method and encryption and decryption device
AU2016200941B2 (en) System and method for wireless data protection
US8254571B1 (en) Cryptographic system with halting key derivation function capabilities
CN103390026B (en) A kind of mobile intelligent terminal secure browser and its method of work
TWI496024B (en) An encryption calculation means, a memory means, and an encryption calculation method
KR101226167B1 (en) Method and system for obfuscating a cryptographic function
CN109040090A (en) A kind of data ciphering method and device
CN108133144A (en) A kind of virtual disk files guard method, device, equipment and readable storage medium storing program for executing
ATE435538T1 (en) STORAGE ON A CHIP, GENERATION AND HANDLING OF A SECRET KEY
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
CN106878013B (en) File encryption and decryption method and device
CN105468990A (en) Sensitive information management control method and apparatus
Lee et al. Secure Data Deletion for USB Flash Memory.
CN106415585A (en) Key extraction during secure boot
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN105184181B (en) File encryption method, file decryption method and file encryption device
JP2020529758A (en) Equipment and methods for encrypting and decrypting stored data
CN104283668A (en) Method and device for obtaining application password based on mobile terminal
CN109391467A (en) Encryption method and device, the decryption method and device of nonvolatile memory
CN111008390A (en) Root key generation protection method and device, solid state disk and storage medium
CN102224508B (en) Method of storing data in a memory device and a processing device for processing such data
JPH10271107A (en) Method and device for data ciphering
CN107087002A (en) A kind of encipher-decipher method of data, device and electronic equipment
CN101167301A (en) Confidential information processing host device and confidential information processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190226

RJ01 Rejection of invention patent application after publication