CN117034325A - Flash data content encryption method, device, equipment and storage medium - Google Patents

Flash data content encryption method, device, equipment and storage medium Download PDF

Info

Publication number
CN117034325A
CN117034325A CN202311281117.7A CN202311281117A CN117034325A CN 117034325 A CN117034325 A CN 117034325A CN 202311281117 A CN202311281117 A CN 202311281117A CN 117034325 A CN117034325 A CN 117034325A
Authority
CN
China
Prior art keywords
data
flash
state value
time programmable
programmable memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311281117.7A
Other languages
Chinese (zh)
Other versions
CN117034325B (en
Inventor
何小学
黄正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingyin Nuclear Technology Xiamen Co ltd
Original Assignee
Jingyin Nuclear Technology Xiamen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingyin Nuclear Technology Xiamen Co ltd filed Critical Jingyin Nuclear Technology Xiamen Co ltd
Priority to CN202311281117.7A priority Critical patent/CN117034325B/en
Publication of CN117034325A publication Critical patent/CN117034325A/en
Application granted granted Critical
Publication of CN117034325B publication Critical patent/CN117034325B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a Flash data content encryption method, device, equipment and storage medium, and belongs to the technical field of chip information protection. The invention obtains the data to be encrypted; reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data; and writing the encrypted data into Flash of the chip. The invention realizes the encryption protection of the flash internal data in a non-fixed encryption mode, thereby avoiding the illegal theft of the flash internal data.

Description

Flash data content encryption method, device, equipment and storage medium
Technical Field
The present invention relates to the field of chip information protection technologies, and in particular, to a method, an apparatus, a device, and a storage medium for encrypting Flash data content.
Background
Flash (Flash memory) is a nonvolatile memory that can hold data for a long time even without current supply. Flash is classified into NOR type and NAND type, and NOR type Flash is mainly integrated inside a chip for storing programs or data. NAND flash is mainly used for data storage with large data volume, such as a usb disk or a memory card. Flash technology is widely used due to the characteristic of large data volume storage and long-term data storage.
At present, data protection is generally carried out on internal flash of a chip in the market, no reliable protection measures are carried out on external flash, even internal flash is limited to be read, but if the chip is disassembled by some special means, the risk of data reading cannot be avoided, so that a flash data protection method is provided, encryption protection is carried out on the flash internal data, the internal data cannot be broken even if the flash is broken, and the technical problem to be solved is urgent.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide a Flash data content encryption method, device and equipment and a storage medium, and aims to solve the technical problems in the prior art.
In order to achieve the above purpose, the present invention provides a Flash data content encryption method, which includes the following steps:
acquiring data to be encrypted;
reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data;
and programming the encrypted data into Flash of the chip.
Optionally, after the encrypted data is programmed into Flash of the chip, the method further comprises:
receiving a data access instruction;
reading a current one-time programmable memory state value in the chip according to the data access instruction, and determining a decryption program for accessing target data according to the current one-time programmable memory state value;
executing the decryption program of the access target data to decrypt the access target data to obtain decrypted data.
Optionally, the reading the state value of the one-time programmable memory in the chip, and encrypting the data to be encrypted according to the state value of the one-time programmable memory, so as to obtain the encrypted data specifically includes the following steps:
reading a one-time programmable memory state value inside the chip;
determining a data encryption mode according to the one-time programmable memory state value;
and carrying out corresponding data processing on the data to be encrypted according to the data encryption mode to obtain the encrypted data.
Optionally, the specific step of determining the data encryption mode according to the one-time programmable memory state value includes:
and determining the type of logic processing circuits and the sequence of data flow which need to pass when the subsequent data encryption processing is carried out according to the one-time programmable memory state value.
Optionally, according to the data access instruction, reading a state value of a one-time programmable memory in the chip, and determining a decryption program for accessing the target data according to the state value of the one-time programmable memory comprises the following specific steps:
reading a one-time programmable memory state value in the chip according to the data access instruction;
determining an access target data encryption program according to the one-time programmable memory state value;
and carrying out inverse transformation on the access target data encryption program to obtain a decryption program of the access target data.
Optionally, according to the data access instruction, reading a state value of the one-time programmable memory inside the chip, and the specific steps include:
analyzing the data access instruction to obtain access target data information;
judging whether the access target data belongs to the encrypted data or not according to the access target data information;
and when the access target data belong to the encrypted data, reading the one-time programmable memory state value inside the chip.
Optionally, before obtaining the data to be encrypted, further includes:
and burning the preset one-time programmable memory state value into the one-time programmable memory in the chip through an off-line burner.
In addition, in order to achieve the above object, the present invention also provides a Flash data content encryption device, including:
and a data acquisition module: acquiring data to be encrypted;
and a data encryption module: reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data;
and a data storage module: and programming the encrypted data into Flash of the chip.
In addition, in order to achieve the above object, the present invention also provides a Flash data content encryption device, including: the Flash data content encryption device comprises a memory, a processor and a Flash data content encryption program stored on the memory and capable of running on the processor, wherein the Flash data content encryption program is configured to realize the steps of the Flash data content encryption method.
In addition, in order to achieve the above object, the present invention also proposes a computer-readable storage medium storing a computer program, the storage medium storing thereon a Flash data content encryption program which, when executed by a processor, implements the steps of the Flash data content encryption method as described above.
The invention obtains the data to be encrypted; reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data; and writing the encrypted data into Flash of the chip. The invention realizes the encryption protection of the flash internal data in a non-fixed encryption mode, thereby avoiding the illegal theft of the flash internal data.
Drawings
FIG. 1 is a schematic diagram of a Flash data content encryption device of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of the Flash data content encryption method of the present invention;
FIG. 3 is a flowchart of a second embodiment of the Flash data content encryption method of the present invention;
FIG. 4 is a flowchart of a third embodiment of the Flash data content encryption method of the present invention;
FIG. 5 is a flowchart of a fourth embodiment of the Flash data content encryption method of the present invention;
fig. 6 is a block diagram showing the structure of a first embodiment of the Flash data content encryption device of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic diagram of a Flash data content encryption device of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the Flash data content encryption device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the structure shown in fig. 1 does not constitute a limitation of the Flash data content encryption device, and may include more or fewer components than shown, or may combine certain components, or may have a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a Flash data content encryption program may be included in the memory 1005 as one storage medium.
In the Flash data content encryption device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the Flash data content encryption device of the present invention may be disposed in the Flash data content encryption device, where the Flash data content encryption device calls the Flash data content encryption program stored in the memory 1005 through the processor 1001, and executes the Flash data content encryption method provided by the embodiment of the present invention.
The embodiment of the invention provides a Flash data content encryption method, referring to fig. 2, fig. 2 is a flow chart of a first embodiment of the Flash data content encryption method of the invention.
In this embodiment, the Flash data content encryption method includes the following steps:
step S10: acquiring data to be encrypted;
it should be noted that, in a specific implementation, the data to be encrypted is an operation program or file data stored in the flash and needing to be subjected to corresponding data protection.
Step S20: reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data;
it will be appreciated that the one-time programmable memory state value inside the chip refers to the eFuse value of the chip, where eFuse (electronic fuse) is a one-time programmable memory module inside a CPU that supports Secure Boot (a process or mechanism that ensures the integrity of a program running on a platform), where eFuse values are programmed before the chip stores a specific program or data.
The specific encryption process is to select one or more modes from the data change processing modes such as bit-to-bit, bit-or, bit-exclusive-or, bit-inverting, cyclic shift with specified bit number and the like according to the one-time programmable memory state value, and perform conversion processing on each byte data in the data to be encrypted.
Step S30: and writing the encrypted data into Flash of the chip.
In a specific implementation, the encrypted data is typically written into an internal Flash or an external Flash by an internal controller of the chip.
The embodiment obtains the data to be encrypted; reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data; and writing the encrypted data into Flash of the chip. According to the embodiment, encryption protection of the flash internal data is achieved through an unfixed encryption mode, so that the flash internal data is prevented from being illegally stolen.
Referring to fig. 3, fig. 3 is a flowchart of a second embodiment of a Flash data content encryption method according to the present invention.
Based on the first embodiment, in this embodiment, the step S30 further includes:
step S40: receiving a data access instruction;
it will be appreciated that the data access instruction is specifically an access read instruction for data or a copy instruction for data, etc., and relates to an associated instruction for storing data in the chip.
Step S50: reading a current one-time programmable memory state value in the chip according to the data access instruction, and determining a decryption program for accessing the target data according to the current one-time programmable memory state value;
it should be noted that, the current otp memory state value inside the chip is not necessarily a otp memory state value that is burned in advance before storing the encrypted data, for example: when the copied flash is placed on a chip which is not burnt with the efuse value or is inconsistent with the pre-burnt efuse value, the current one-time programmable memory state value in the chip is not the pre-burnt one-time programmable memory state value before the encrypted data is stored, and at the moment, the chip cannot acquire a decryption program of correct access target data due to the fact that the current one-time programmable memory state value in the chip is different from the pre-burnt one-time programmable memory state value, and further cannot normally respond to a data access instruction.
Step S60: executing the decryption program of the access target data to decrypt the access target data to obtain decrypted data.
It can be understood that in the specific implementation, the decryption process occurs inside the chip, and even if the data content of the flash is read through other external means, the data content of the flash at this time is encrypted and cannot be directly used, so that the purpose of protecting the flash data of the chip is achieved.
It should be noted that, the operation process of the decryption program is inverse transformation compared with the encryption process, and the finally obtained decrypted data is the original data to be encrypted.
According to the embodiment, the state value of the one-time programmable memory is read, so that a corresponding data encryption processing mode is obtained, further, the data encryption processing mode is subjected to inverse processing to obtain a decryption program of the access target data, and finally, the decryption processing of the access target data is realized, and the corresponding decryption data is obtained.
Further, the specific steps of reading the state value of the one-time programmable memory in the chip, and encrypting the data to be encrypted according to the state value of the one-time programmable memory to obtain the encrypted data include: reading a one-time programmable memory state value inside the chip; determining a data encryption mode according to the one-time programmable memory state value; and carrying out corresponding data processing on the data to be encrypted according to the data encryption mode to obtain encrypted data.
Further, the specific steps of determining the data encryption mode according to the one-time programmable memory state value include: and determining the type of logic processing circuits and the data flow sequence which need to be passed when the subsequent data encryption processing is carried out according to the one-time programmable memory state value.
It should be noted that in this embodiment, different logic processing circuits may be controlled by information in eFuses, for example: in performing the shifting circuit, the information within the eFuses will determine whether to shift left or right, and how many bits to shift.
It should be further noted that, in this embodiment, the main control module responsible for encryption and decryption is a data integrated processing module inside the chip, and the module determines the flow direction and sequence of the input data according to the information in the efuses. For example: according to the eFuse information, the encryption is determined to sequentially send the data to an NOT circuit, an OR circuit and a shift circuit.
It can be understood that the encryption or decryption module in this embodiment is completely automatically completed inside the chip, without intervention of other software or hardware outside the user, and the whole encryption and decryption process is completed without feeling of the user when the chip is running.
Referring to fig. 4, fig. 4 is a flowchart of a third embodiment of a Flash data content encryption method according to the present invention.
Based on the above second embodiment, in this embodiment, the specific steps of step S50 include:
step S51: reading a one-time programmable memory state value in the chip according to the data access instruction;
it should be noted that, in a specific implementation, when the chip receives the data access instruction, a corresponding data access response is performed, and when the encrypted data stored in the chip is related, the state value of the one-time programmable memory inside the chip is read to perform the acquisition of the decryption processing program.
Step S52: determining an access target data encryption program according to the one-time programmable memory state value;
it can be understood that different otp memory state values correspond to different data encryption manners, so when the otp memory state value of the chip is pre-recorded, the corresponding otp memory state value can be recorded according to the data encryption manner customized by the manufacturer of the chip.
Step S53: and carrying out inverse transformation on the access target data encryption program to obtain a decryption program of the access target data.
It can be understood that only if the access target data encryption program determined according to the one-time programmable memory state value is the correct data encryption program under the condition of legal access, the corresponding legal encrypted data decryption program can be further obtained through inverse transformation processing, otherwise, normal operation or acquisition of normal decrypted data cannot be performed due to illegal program.
According to the embodiment, the access target data encryption program is obtained through reading the one-time programmable memory state value, then the decryption program of the access target data is obtained through inverse transformation, the encrypted data is decrypted, and then normal decrypted data is obtained.
Referring to fig. 5, fig. 5 is a flowchart of a fourth embodiment of a Flash data content encryption method according to the present invention.
Based on the above third embodiment, in this embodiment, the specific steps of step S51 include:
step S511: analyzing the data access instruction to obtain access target data information;
it may be understood that the access target data information is specifically file data information or program data information stored in the chip and related to the data access instruction, and in a specific implementation, the controller in the chip may perform corresponding operations according to the access target data information.
Step S512: judging whether the access target data belongs to the encrypted data or not according to the access target data information;
it should be noted that the access target data information includes data storage attribute information inside the chip, and in a specific implementation, a controller inside the chip performs a corresponding operation according to the determination result.
Step S513: and when the access target data belongs to the encrypted data, reading the one-time programmable memory state value inside the chip.
It should be noted that, when the access target data belongs to the encrypted data, the subsequent data decryption process can be performed, so as to read the state value of the one-time programmable memory inside the chip; when the access target data does not belong to the encrypted data, the corresponding data decryption processing is not required.
According to the embodiment, whether the access target data belongs to the encrypted data is determined through analysis of the data access instruction, and finally, when the access target data belongs to the encrypted data, the subsequent corresponding operation is executed, so that data content judgment related to the data access instruction is realized, and the protection of the encrypted data is effectively improved.
Further, before obtaining the data to be encrypted, the method further comprises: and burning the preset one-time programmable memory state value into the one-time programmable memory in the chip through an off-line burner.
It should be noted that the preset one-time programmable memory state value is burned before the data to be encrypted is stored in the chip, and different one-time programmable memory state values can be burned according to different data encryption modes.
In addition, the embodiment of the invention also provides a computer readable storage medium storing a computer program, wherein the storage medium stores a Flash data content encryption program, and the Flash data content encryption program realizes the steps of the Flash data content encryption method when being executed by a processor.
Because the storage medium adopts all the technical solutions of all the embodiments, at least all the beneficial effects brought by the technical solutions of the embodiments are not described in detail herein.
Referring to fig. 6, fig. 6 is a block diagram showing the structure of a first embodiment of the Flash data content encryption device according to the present invention.
As shown in fig. 6, the Flash data content encryption device provided by the embodiment of the invention includes:
the data acquisition module 10: acquiring data to be encrypted;
data encryption module 20: reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data;
data storage module 30: and writing the encrypted data into Flash of the chip.
The embodiment obtains the data to be encrypted; reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data; and writing the encrypted data into Flash of the chip. According to the embodiment, encryption protection of the flash internal data is achieved through an unfixed encryption mode, so that the flash internal data is prevented from being illegally stolen.
It should be understood that the foregoing is illustrative only and is not limiting, and that in specific applications, those skilled in the art may set the invention as desired, and the invention is not limited thereto.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of the present invention, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details not described in detail in this embodiment may refer to the Flash data content encryption method provided in any embodiment of the present invention, which is not described herein.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of embodiments, it will be clear to a person skilled in the art that the above embodiment method may be implemented by means of software plus a necessary general hardware platform, but may of course also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory (ROM)/RAM, magnetic disk, optical disk) and including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (9)

1. A Flash data content encryption method, comprising:
acquiring data to be encrypted, wherein the data to be encrypted is file data which is stored in flash and needs to be subjected to corresponding data protection;
reading a one-time programmable memory state value in the chip, and determining the type of a logic processing circuit and the data flow sequence which need to be passed when the subsequent data encryption processing is carried out according to the one-time programmable memory state value to obtain encrypted data;
and programming the encrypted data into Flash of the chip.
2. The Flash data content encryption method according to claim 1, wherein after writing the encrypted data into Flash of the chip, further comprising:
receiving a data access instruction;
reading a current one-time programmable memory state value in the chip according to the data access instruction, and determining a decryption program for accessing target data according to the current one-time programmable memory state value;
executing the decryption program of the access target data to decrypt the access target data to obtain decrypted data.
3. The method for encrypting Flash data content according to claim 2, wherein the specific steps of reading the state value of the one-time programmable memory in the chip, determining the type of logic processing circuit and the data flow sequence to be passed in the subsequent data encryption processing according to the state value of the one-time programmable memory, and obtaining the encrypted data comprise:
reading a one-time programmable memory state value inside the chip;
determining the type of logic processing circuits and the sequence of data flow which need to pass when the subsequent data encryption processing is carried out according to the one-time programmable memory state value;
and carrying out corresponding data processing on the data to be encrypted according to the data encryption mode to obtain the encrypted data.
4. The Flash data content encryption method according to claim 3, wherein the specific steps of reading the state value of the one-time programmable memory in the chip according to the data access instruction, and determining the decryption program for accessing the target data according to the state value of the one-time programmable memory include:
reading a one-time programmable memory state value in the chip according to the data access instruction;
determining an access target data encryption program according to the one-time programmable memory state value;
and carrying out inverse transformation on the access target data encryption program to obtain a decryption program of the access target data.
5. The method for encrypting Flash data contents according to claim 4, wherein the step of reading the state value of the one-time programmable memory in the chip according to the data access command comprises the following specific steps:
analyzing the data access instruction to obtain access target data information;
judging whether the access target data belongs to the encrypted data or not according to the access target data information;
and when the access target data belong to the encrypted data, reading the one-time programmable memory state value inside the chip.
6. The Flash data content encryption method according to any one of claims 1 to 5, characterized by further comprising, before obtaining the data to be encrypted:
and burning the preset one-time programmable memory state value into the one-time programmable memory in the chip through an off-line burner.
7. A Flash data content encryption device, characterized in that the Flash data content encryption device comprises:
and a data acquisition module: acquiring data to be encrypted;
and a data encryption module: reading a one-time programmable memory state value in the chip, and encrypting data to be encrypted according to the one-time programmable memory state value to obtain encrypted data;
and a data storage module: and programming the encrypted data into Flash of the chip.
8. A Flash data content encryption device, characterized in that the Flash data content encryption device comprises: memory, a processor and a Flash data content encryption program stored on the memory and executable on the processor, the Flash data content encryption program configured to implement the Flash data content encryption method according to any one of claims 1 to 6.
9. A computer readable storage medium storing a computer program, characterized in that the computer program is capable of realizing the steps in the Flash data content encryption method according to any one of claims 1 to 6 when executed by a processor.
CN202311281117.7A 2023-10-07 2023-10-07 Flash data content encryption method, device, equipment and storage medium Active CN117034325B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311281117.7A CN117034325B (en) 2023-10-07 2023-10-07 Flash data content encryption method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311281117.7A CN117034325B (en) 2023-10-07 2023-10-07 Flash data content encryption method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117034325A true CN117034325A (en) 2023-11-10
CN117034325B CN117034325B (en) 2024-01-30

Family

ID=88630255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311281117.7A Active CN117034325B (en) 2023-10-07 2023-10-07 Flash data content encryption method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117034325B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109886033A (en) * 2019-02-25 2019-06-14 深圳忆联信息系统有限公司 Key reading and control method thereof, device and computer equipment based on Efuse
US20190238312A1 (en) * 2018-02-01 2019-08-01 The University Of Chicago Stream Ciphers for Digital Storage Encryption
CN111800262A (en) * 2020-07-01 2020-10-20 北京金山云网络技术有限公司 Digital asset processing method and device and electronic equipment
CN112363956A (en) * 2020-11-11 2021-02-12 上海磐启微电子有限公司 Method and device for encrypting and decrypting FLASH memory
CN113868674A (en) * 2020-06-30 2021-12-31 广东美的制冷设备有限公司 Data encryption storage method and device, readable storage medium and household appliance
CN115276966A (en) * 2022-06-29 2022-11-01 中国电信股份有限公司 Data encryption method and device, electronic equipment and storage medium
CN115859903A (en) * 2022-12-27 2023-03-28 北京紫光展锐通信技术有限公司 Verification processing method in chip and related product
CN116756781A (en) * 2023-08-23 2023-09-15 菁音核创科技(厦门)有限公司 Encryption protection method, device and equipment for chip and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190238312A1 (en) * 2018-02-01 2019-08-01 The University Of Chicago Stream Ciphers for Digital Storage Encryption
CN109886033A (en) * 2019-02-25 2019-06-14 深圳忆联信息系统有限公司 Key reading and control method thereof, device and computer equipment based on Efuse
CN113868674A (en) * 2020-06-30 2021-12-31 广东美的制冷设备有限公司 Data encryption storage method and device, readable storage medium and household appliance
CN111800262A (en) * 2020-07-01 2020-10-20 北京金山云网络技术有限公司 Digital asset processing method and device and electronic equipment
CN112363956A (en) * 2020-11-11 2021-02-12 上海磐启微电子有限公司 Method and device for encrypting and decrypting FLASH memory
CN115276966A (en) * 2022-06-29 2022-11-01 中国电信股份有限公司 Data encryption method and device, electronic equipment and storage medium
CN115859903A (en) * 2022-12-27 2023-03-28 北京紫光展锐通信技术有限公司 Verification processing method in chip and related product
CN116756781A (en) * 2023-08-23 2023-09-15 菁音核创科技(厦门)有限公司 Encryption protection method, device and equipment for chip and storage medium

Also Published As

Publication number Publication date
CN117034325B (en) 2024-01-30

Similar Documents

Publication Publication Date Title
US6457126B1 (en) Storage device, an encrypting/decrypting device and method of accessing a non-volatile memory
US8639946B2 (en) System and method of using a protected non-volatile memory
JP3638770B2 (en) Storage device with test function
US7076667B1 (en) Storage device having secure test process
JP2006164273A (en) Protection booting device and method
KR940007351B1 (en) Portable electronic equipement
WO2011134207A1 (en) Method for protecting software
CN112363956A (en) Method and device for encrypting and decrypting FLASH memory
CN107273150B (en) Preloading firmware downloading and writing method and device
CN110020561B (en) Semiconductor device and method of operating semiconductor device
CN107688756B (en) Hard disk control method, equipment and readable storage medium storing program for executing
CN108171041B (en) Method and apparatus for authenticating an application accessing memory
EP2541456B1 (en) Method for protecting the digital contents of a solid state memory
CN114398598A (en) Library file encryption method, decryption method and encryption device
CN116756781B (en) Encryption protection method, device and equipment for chip and storage medium
CN117034325B (en) Flash data content encryption method, device, equipment and storage medium
US20170075608A1 (en) Solid state memory unit and method for protecting a memory including verification of a sequence of requests for access to physical blocks
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium
CN115391850A (en) OTP programming method, OTP programming device, OTP equipment and computer-readable storage medium
JP6215468B2 (en) Program protector
EP4030682A1 (en) Method and device for controlling access to a resource
JP5070137B2 (en) Storage device and data writing device
CN115438314A (en) MCU encryption method and MCU
CN112685754A (en) Unlocking circuit and unlocking method of debugging interface
JP5055487B2 (en) Semiconductor memory and information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant