CN109889333B - Firmware data encryption method and device, computer equipment and storage medium - Google Patents

Firmware data encryption method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109889333B
CN109889333B CN201910068225.3A CN201910068225A CN109889333B CN 109889333 B CN109889333 B CN 109889333B CN 201910068225 A CN201910068225 A CN 201910068225A CN 109889333 B CN109889333 B CN 109889333B
Authority
CN
China
Prior art keywords
firmware
random number
key
plaintext
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910068225.3A
Other languages
Chinese (zh)
Other versions
CN109889333A (en
Inventor
杨志佳
冯元元
马越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN201910068225.3A priority Critical patent/CN109889333B/en
Publication of CN109889333A publication Critical patent/CN109889333A/en
Application granted granted Critical
Publication of CN109889333B publication Critical patent/CN109889333B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to a firmware data encryption method, a firmware data encryption device, a computer device and a storage medium, wherein the method comprises the following steps: acquiring a firmware data encryption request; generating a random number and a random number key address according to the firmware data encryption request, and filling the random number and the random number key address in reserved bits of a plaintext firmware header file; taking out a corresponding random number from the random number according to the random number key address, and generating a key according to the taken out random number; encrypting the firmware binary file of the plaintext according to the key to obtain a firmware binary file of a ciphertext; and combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data. The invention realizes that the firmware files in the solid state disk all use the random numbers as the secret keys, thereby avoiding the firmware from being cracked due to the secret key leakage and achieving the purpose of improving the data security of the solid state disk.

Description

Firmware data encryption method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of solid state disks, in particular to a firmware data encryption method and device, computer equipment and a storage medium.
Background
At present, a firmware file in a solid state disk is stored in a solid state disk Flash, and the firmware file is composed of a header file of a firmware and a binary file generated by firmware engineering compilation. To secure firmware code with core intellectual property. The solid state disk manufacturer encrypts the binary file of the firmware by using a symmetric encryption algorithm, and the firmware uses the binary file of the ciphertext. Namely, the firmware file consists of a plain text firmware header file and a cipher text firmware binary file.
In the conventional technology, once a hacker has obtained a firmware file in Flash by an illegal means. Since the data of the firmware header file of the plaintext and the data of the firmware binary file of the ciphertext have very obvious difference, a hacker can easily judge the start address of the firmware binary file. And the header file usually contains key information such as the offset address where the firmware is stored, the length of the firmware binary file, and the encryption key. The header file does not have random interference information, and an experienced hacker can accurately acquire relevant information in the header file by observation or a few times of attempts, and the hacker can easily break the binary file of the firmware by using the information.
Disclosure of Invention
In view of the above, it is necessary to provide a firmware data encryption method, apparatus, computer device and storage medium that can achieve improved security of firmware data.
A method of firmware data encryption, the method comprising:
acquiring a firmware data encryption request;
generating a random number and a random number key address according to the firmware data encryption request, and filling the random number and the random number key address in reserved bits of a plaintext firmware header file;
taking out a corresponding random number from the random number according to the random number key address, and generating a key according to the taken out random number;
encrypting the firmware binary file of the plaintext according to the key to obtain a firmware binary file of a ciphertext;
and combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data.
In one embodiment, after the step of combining the plaintext firmware header file and the ciphertext firmware binary file to obtain complete encrypted firmware data, the method further includes:
reading the random number key address from the firmware header file of the plaintext;
reading a corresponding random number from the random number in the firmware header file of the plaintext according to the random number key address, and generating a key according to the taken random number;
and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
In one embodiment, the method further comprises:
generating a plurality of random number key addresses according to the firmware data encryption request;
taking out a plurality of corresponding random numbers from the random numbers according to the plurality of random number key addresses;
and combining the plurality of corresponding random numbers to be used as an encrypted key.
In one embodiment, after the step of combining the plaintext firmware header file and the ciphertext firmware binary file to obtain complete encrypted firmware data, the method further includes:
reading the plurality of random number key addresses from the firmware header file of the plaintext;
reading a plurality of corresponding random numbers from the random numbers in the firmware header file of the plaintext according to the plurality of random number key addresses;
combining the corresponding random numbers to be used as a key;
and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
A firmware data encryption apparatus, the firmware data encryption apparatus comprising:
the acquisition module is used for acquiring a firmware data encryption request;
a random number generation module, configured to generate a random number and a random number key address according to the firmware data encryption request, and fill the random number and the random number key address in a reserved bit of a firmware header file in a plaintext;
the key generation module is used for taking out a corresponding random number from the random number according to the random number key address and generating a key according to the taken out random number;
the encryption module is used for encrypting the firmware binary file of the plaintext according to the secret key to obtain a firmware binary file of a ciphertext;
and the combination module is used for combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data.
In one embodiment, the apparatus further comprises: a decryption module to:
reading the random number key address from the firmware header file of the plaintext;
reading a corresponding random number from the random number in the firmware header file of the plaintext according to the random number key address, and generating a key according to the taken random number;
and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
In one embodiment, the encryption module is further configured to:
generating a plurality of random number key addresses according to the firmware data encryption request;
taking out a plurality of corresponding random numbers from the random numbers according to the plurality of random number key addresses;
and combining the plurality of corresponding random numbers to be used as an encrypted key.
In one embodiment, the decryption module is further configured to:
reading the plurality of random number key addresses from the firmware header file of the plaintext;
reading a plurality of corresponding random numbers from the random numbers in the firmware header file of the plaintext according to the plurality of random number key addresses;
combining the corresponding random numbers to be used as a key;
and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the above methods when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of any of the methods described above.
According to the firmware data encryption method, the firmware data encryption device, the computer equipment and the storage medium, firstly, a firmware data encryption request is obtained; generating a random number and a random number key address according to the firmware data encryption request, and filling the random number and the random number key address in reserved bits of a plaintext firmware header file; taking out a corresponding random number from the random number according to the random number key address, and generating a key according to the taken out random number; encrypting the firmware binary file of the plaintext according to the key to obtain a firmware binary file of a ciphertext; and combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data. The invention realizes that the firmware files in the solid state disk all use the random numbers as the secret keys, thereby avoiding the firmware from being cracked due to the secret key leakage and achieving the purpose of improving the data security of the solid state disk.
Drawings
FIG. 1 is a diagram illustrating a storage state of firmware in a solid state drive according to a conventional technique;
FIG. 2 is a diagram illustrating an embodiment of a storage state of firmware in a solid state drive;
FIG. 3 is a flowchart illustrating a firmware data encryption method according to an embodiment;
FIG. 4 is a flowchart illustrating a firmware data encryption method according to another embodiment;
FIG. 5 is a flowchart illustrating a firmware data encryption method according to yet another embodiment;
FIG. 6 is a flowchart illustrating a firmware data encryption method according to another embodiment;
FIG. 7 is a flow diagram that illustrates the implementation of a firmware file encryption process via a packaging tool in one embodiment;
FIG. 8 is a flowchart illustrating a firmware file decryption process implemented by the controller in one embodiment;
FIG. 9 is a block diagram of a firmware data encryption device in one embodiment;
FIG. 10 is a block diagram showing the structure of a firmware data encryption device according to another embodiment;
FIG. 11 is a diagram illustrating an internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The storage state of firmware in the solid state disk is shown in fig. 1. Usually, the firmware file in the solid state disk is stored in the solid state disk Flash, and the firmware file is composed of a header file of the firmware and a binary file generated by firmware engineering compilation. To secure firmware code with core intellectual property. The solid state disk manufacturer encrypts the binary file of the firmware by using a symmetric encryption algorithm, and the firmware uses the binary file of the ciphertext. Namely, the firmware file consists of a plain text firmware header file and a cipher text firmware binary file.
Once a hacker has obtained the firmware files in Flash by illegal means. Since the data of the firmware header file of the plaintext and the data of the firmware binary file of the ciphertext have very obvious difference, a hacker can easily judge the start address of the firmware binary file. And the header file usually contains key information such as the offset address where the firmware is stored, the length of the firmware binary file, and the encryption key. The header file does not have random interference information, and an experienced hacker can accurately acquire relevant information in the header file by observation or a few times of attempts, and the hacker can easily break the binary file of the firmware by using the information.
In order to prevent hackers from acquiring the binary file of the firmware, the invention provides a secure encryption method of the firmware data, and the security of the firmware data is improved.
Specifically, the storage state of the firmware in the solid state disk in the present invention is as shown in fig. 2, the firmware file still consists of a plaintext firmware header file and a ciphertext binary file generated by firmware engineering compilation, and the key used by the encrypted firmware is still stored in the header file. In order to prevent hackers from easily identifying the start position of the firmware binary file, the present patent uses a random number to fill the reserved bits in the header file, rather than directly assigning 0 to the reserved bits. And the encrypted key is randomly extracted from the random numbers, so that the firmware files in each solid state disk are different, and certain confusion is increased.
The header file is added with 2 data segments relative to the existing version for indicating the storage address of the key. The firmware packaging tool will take out two random numbers from the corresponding positions according to the addresses stored in the two data segments, and the two random numbers are combined to form the complete encryption key which needs to be used. The packaging tool encrypts the firmware using the key. Since the values of the two data segments are also randomly generated, the confusion is also increased, so that a hacker cannot acquire an accurate encryption key to crack encrypted firmware.
It is understood that the 2 data segments in this embodiment may also be multiple data segments, and the key is generated by combining multiple random numbers, so as to improve the obfuscation of the key.
In one embodiment, as shown in fig. 3, there is provided a firmware data encryption method, including:
step 302, acquiring a firmware data encryption request;
step 304, generating a random number and a random number key address according to the firmware data encryption request, and filling the random number and the random number key address in reserved bits of a firmware header file of a plaintext;
step 306, taking out the corresponding random number from the random number according to the random number key address, and generating a key according to the taken out random number;
step 308, encrypting the firmware binary file of the plaintext according to the secret key to obtain the firmware binary file of the ciphertext;
step 310, combining the plain text firmware header file and the cipher text firmware binary file to obtain complete encrypted firmware data.
Specifically, with reference to fig. 7, the encryption flow of the firmware data is described as follows:
1. the packing tool generates random numbers to fill in the useless reserved bits of the header file. The next step is to perform flow 2.
2. The packaging tool generates two random number key addresses, takes out the random number from the random number generated in the process 1 according to the key addresses, and combines the random number into an encrypted key. The next step is to perform flow 3.
3. The packaging tool encrypts the firmware binary file of the plaintext by using the generated key in the flow 2 to generate the firmware binary file of the ciphertext. The next step is to perform the flow 4.
4. The packaging tool combines the firmware header file of the plaintext and the firmware binary file of the ciphertext.
In this embodiment, a firmware data encryption request is first obtained; generating a random number and a random number key address according to the firmware data encryption request, and filling the random number and the random number key address in reserved bits of a firmware header file of a plaintext; taking out the corresponding random number from the random number according to the random number key address, and generating a key according to the taken out random number; encrypting the firmware binary file of the plaintext according to the secret key to obtain a firmware binary file of the ciphertext; and combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data. According to the embodiment, the random number is used as the secret key for the firmware file in the solid state disk, so that the firmware is prevented from being cracked due to secret key leakage, and the purpose of improving the data security of the solid state disk is achieved.
In one embodiment, as shown in fig. 4, there is provided a firmware data encryption method, further comprising after step 310:
step 312, reading the random number key address from the firmware header file of the plaintext;
step 314, reading a corresponding random number from the random number in the firmware header file of the plaintext according to the random number key address, and generating a key according to the random number;
and step 316, decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
Specifically, with reference to fig. 7 and 8, the encryption flow of the firmware data is described as follows:
1. the packing tool generates random numbers to fill in the useless reserved bits of the header file. The next step is to perform flow 2.
2. The packaging tool generates two random number key addresses, takes out the random number from the random number generated in the process 1 according to the key addresses, and combines the random number into an encrypted key. The next step is to perform flow 3.
3. The packaging tool encrypts the firmware binary file of the plaintext by using the generated key in the flow 2 to generate the firmware binary file of the ciphertext. The next step is to perform the flow 4.
4. The packaging tool combines the firmware header file of the plaintext and the firmware binary file of the ciphertext.
The decryption flow of the firmware data is explained as follows:
1. the controller reads 2 address values of the stored keys from the header file key data segment, takes out two random numbers from corresponding positions according to the addresses stored in the two data segments, and executes the flow 2 next.
2. The controller combines the two random numbers into a complete encryption key. The next step is to perform flow 3.
3. The controller decrypts the encrypted firmware using the key to generate plaintext firmware. The next step is to perform the flow 4.
4. The controller loads the operating firmware.
In this embodiment, the complete encryption and decryption process is implemented by the packaging tool and the controller, and the reserved bits in the firmware header file are filled by using a random number, rather than directly giving reserved bit 0. And the encrypted key is randomly extracted from the random numbers to form the encrypted key, so that the firmware files in each solid state disk are different, and certain confusion is increased.
In one embodiment, as shown in fig. 5, there is provided a firmware data encryption method, further comprising:
step 502, generating a plurality of random number key addresses according to the firmware data encryption request;
step 504, taking out a plurality of corresponding random numbers from the random numbers according to the plurality of random number key addresses;
step 506, a plurality of corresponding random numbers are combined to be used as an encryption key.
In one embodiment, as shown in fig. 6, there is provided a firmware data encryption method, further comprising after step 310:
step 602, reading a plurality of random number key addresses from a firmware header file of a plaintext;
step 604, reading a plurality of corresponding random numbers from the random numbers in the firmware header file of the plaintext according to the plurality of random number key addresses;
step 606, combining a plurality of corresponding random numbers as a key;
and step 608, decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
In the embodiment, a plurality of data segments are added in the header file relative to the existing version to indicate the storage address of the key. The firmware packaging tool will take out multiple random numbers from corresponding positions according to the addresses stored in the two data segments, and the multiple random numbers are combined to form the complete encryption key which needs to be used. The packaging tool encrypts the firmware using the key. Since the values of the plurality of data segments are also randomly generated, the confusion is also increased, so that a hacker cannot acquire an accurate encryption key to crack encrypted firmware.
It should be understood that although the various steps in the flow charts of fig. 3-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 3-6 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 9, there is provided a firmware data encryption apparatus 900, the apparatus comprising:
an obtaining module 901, configured to obtain a firmware data encryption request;
a random number generation module 902, configured to generate a random number and a random number key address according to the firmware data encryption request, and fill the random number and the random number key address in a reserved bit of a firmware header file in a plaintext;
a key generation module 903, configured to take out a corresponding random number from the random number according to the random number key address, and generate a key according to the taken out random number;
the encryption module 904 is configured to encrypt the firmware binary file of the plaintext according to the key to obtain a firmware binary file of the ciphertext;
and the combining module 905 is configured to combine the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data.
In one embodiment, as shown in fig. 10, there is provided a firmware data encryption apparatus 900, further comprising: a decryption module 906 to:
reading a random number key address from a firmware header file of a plaintext;
reading a corresponding random number from random numbers in a firmware header file of a plaintext according to a random number key address, and generating a key according to the taken random number;
and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
In one embodiment, the encryption module 904 is further configured to:
generating a plurality of random number key addresses according to the firmware data encryption request;
taking out a plurality of corresponding random numbers from the random numbers according to the plurality of random number key addresses;
and combining a plurality of corresponding random numbers to be used as an encryption key.
In one embodiment, the decryption module 906 is further configured to:
reading a plurality of random number key addresses from a firmware header file of a plaintext;
reading a plurality of corresponding random numbers from the random numbers in the firmware header file of the plaintext according to the plurality of random number key addresses;
combining a plurality of corresponding random numbers to be used as a secret key;
and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
For specific limitations of the firmware data encryption apparatus, reference may be made to the above limitations of the firmware data encryption method, which are not described herein again.
In one embodiment, a computer device is provided, the internal structure of which may be as shown in FIG. 11. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a firmware data encryption method.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method embodiments when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the above respective method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (4)

1. A method of firmware data encryption, the method comprising:
acquiring a firmware data encryption request;
generating a random array and a plurality of random number key addresses according to the firmware data encryption request, and filling the random array and the random number key addresses in reserved bits of a firmware header file of a plaintext;
generating a plurality of random number key addresses according to the firmware data encryption request; taking out a plurality of corresponding random numbers from the random number group according to the plurality of random number key addresses; combining the corresponding random numbers to be used as an encrypted key;
encrypting the firmware binary file of the plaintext according to the key to obtain a firmware binary file of a ciphertext;
combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data;
reading the plurality of random number key addresses from the firmware header file of the plaintext; reading a plurality of corresponding random numbers from a random array in the firmware header file of the plaintext according to the plurality of random number key addresses; combining the corresponding random numbers to be used as a key; and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
2. A firmware data encryption apparatus, characterized in that the firmware data encryption apparatus comprises:
the acquisition module is used for acquiring a firmware data encryption request;
the random number generation module is used for generating a random number group and a plurality of random number key addresses according to the firmware data encryption request, and filling the random number group and the random number key addresses in reserved bits of a firmware header file of a plaintext;
a key generation module for generating a plurality of random number key addresses according to the firmware data encryption request; taking out a plurality of corresponding random numbers from the random number group according to the plurality of random number key addresses; combining the corresponding random numbers to be used as an encrypted key;
the encryption module is used for encrypting the firmware binary file of the plaintext according to the secret key to obtain a firmware binary file of a ciphertext;
the combination module is used for combining the firmware header file of the plaintext with the firmware binary file of the ciphertext to obtain complete encrypted firmware data;
a decryption module for reading the plurality of random number key addresses from the firmware header file of the plaintext; reading a plurality of corresponding random numbers from a random array in the firmware header file of the plaintext according to the plurality of random number key addresses; combining the corresponding random numbers to be used as a key; and decrypting the firmware binary file of the ciphertext according to the key to obtain the firmware binary file of the plaintext.
3. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method of claim 1 are implemented when the computer program is executed by the processor.
4. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method as claimed in claim 1.
CN201910068225.3A 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium Active CN109889333B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910068225.3A CN109889333B (en) 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910068225.3A CN109889333B (en) 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109889333A CN109889333A (en) 2019-06-14
CN109889333B true CN109889333B (en) 2022-03-29

Family

ID=66926800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910068225.3A Active CN109889333B (en) 2019-01-24 2019-01-24 Firmware data encryption method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109889333B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545172B (en) * 2019-06-28 2022-06-07 深圳忆联信息系统有限公司 Safe card opening method and device for controller
CN110545175B (en) * 2019-08-23 2022-08-26 国网湖北省电力有限公司电力科学研究院 Security authentication method for communication protocol of charging pile and electric vehicle
CN111177751B (en) * 2019-12-20 2022-05-24 苏州浪潮智能科技有限公司 Method and equipment for encrypting pdf file and readable medium
CN113688399A (en) * 2021-08-25 2021-11-23 深圳忆联信息系统有限公司 Firmware digital signature protection method and device, computer equipment and storage medium
CN114567476B (en) * 2022-02-23 2024-02-13 天翼安全科技有限公司 Data security protection method and device, electronic equipment and medium
CN116910711B (en) * 2023-07-13 2024-06-11 北京领创医谷科技发展有限责任公司 MCU firmware confusion method, system, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291418A (en) * 2011-09-23 2011-12-21 胡祥义 Method for realizing cloud computing security architecture
CN106201925A (en) * 2016-07-01 2016-12-07 四川效率源信息安全技术股份有限公司 A kind of decryption method of western number hard disk
CN106503494A (en) * 2016-11-05 2017-03-15 福建省北峰电讯科技有限公司 A kind of firmware protection location and guard method with flash memory microcontroller on piece
CN108599930A (en) * 2018-04-02 2018-09-28 湖南国科微电子股份有限公司 Firmware encrypting and deciphering system and method
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8538890B2 (en) * 2008-08-28 2013-09-17 Motorola Mobility Llc Encrypting a unique cryptographic entity
US10146942B2 (en) * 2015-02-24 2018-12-04 Dell Products, Lp Method to protect BIOS NVRAM from malicious code injection by encrypting NVRAM variables and system therefor
WO2017101122A1 (en) * 2015-12-18 2017-06-22 深圳市振华微电子有限公司 Computer encryption lock having separating management and use

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291418A (en) * 2011-09-23 2011-12-21 胡祥义 Method for realizing cloud computing security architecture
CN106201925A (en) * 2016-07-01 2016-12-07 四川效率源信息安全技术股份有限公司 A kind of decryption method of western number hard disk
CN106503494A (en) * 2016-11-05 2017-03-15 福建省北峰电讯科技有限公司 A kind of firmware protection location and guard method with flash memory microcontroller on piece
CN108599930A (en) * 2018-04-02 2018-09-28 湖南国科微电子股份有限公司 Firmware encrypting and deciphering system and method
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device

Also Published As

Publication number Publication date
CN109889333A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
CN109889333B (en) Firmware data encryption method and device, computer equipment and storage medium
CN103345609B (en) A kind of text encipher-decipher method and encryption and decryption equipment
CN110490008B (en) Security device and security chip
AU2019271965A1 (en) POS System with white box encryption key sharing
CN108390759A (en) Code encryption, decryption method, device, computer equipment and storage medium
CN111404952B (en) Transformer substation data encryption transmission method and device, computer equipment and storage medium
CN109657479B (en) Data leakage prevention method and computer readable storage medium
CN109766731B (en) Encrypted data processing method and device based on solid state disk and computer equipment
CN103914666A (en) File encryption and decryption method and device on the basis of partitions
CN113286297B (en) Wireless data encryption transmission method and device, computer equipment and storage medium
CN113014380B (en) File data password management method and device, computer equipment and storage medium
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
US20230269078A1 (en) Key sharing method, key sharing system, authenticating device, authentication target device, recording medium, and authentication method
CN111884814B (en) Method and system for preventing intelligent terminal from being counterfeited
EP3641219A1 (en) Puf based securing of device update
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN114679270B (en) Data cross-domain encryption and decryption method based on privacy calculation
CN110941861B (en) File protection method and device, computer equipment and medium
US11128455B2 (en) Data encryption method and system using device authentication key
US20180013551A1 (en) Apparatus for obfuscating and restoring program execution code and method thereof
CN110011959B (en) Data storage method, data query method and system
TWI488478B (en) Techniques for performing symmetric cryptography
CN106257859A (en) A kind of password using method
JP7057675B2 (en) Semiconductor device and encryption key generation method
CN115766244A (en) Internet of vehicles information encryption method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant