CN117454390A - Embedded software configuration parameter storage, use and distribution system and method - Google Patents

Embedded software configuration parameter storage, use and distribution system and method Download PDF

Info

Publication number
CN117454390A
CN117454390A CN202311526160.5A CN202311526160A CN117454390A CN 117454390 A CN117454390 A CN 117454390A CN 202311526160 A CN202311526160 A CN 202311526160A CN 117454390 A CN117454390 A CN 117454390A
Authority
CN
China
Prior art keywords
configuration
parameter
parameter data
data
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311526160.5A
Other languages
Chinese (zh)
Inventor
徐萌飞
宋星驰
孙筱琴
汪丁泉
吴文捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Research Institute Of Marine Electric Propulsion No 712 Research Institute Of China Shipbuilding Corp
Original Assignee
Wuhan Research Institute Of Marine Electric Propulsion No 712 Research Institute Of China Shipbuilding Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Research Institute Of Marine Electric Propulsion No 712 Research Institute Of China Shipbuilding Corp filed Critical Wuhan Research Institute Of Marine Electric Propulsion No 712 Research Institute Of China Shipbuilding Corp
Priority to CN202311526160.5A priority Critical patent/CN117454390A/en
Publication of CN117454390A publication Critical patent/CN117454390A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an embedded software configuration parameter storage, use and distribution system, which consists of embedded equipment, man-machine interaction equipment, a decryption module and an encryption module, wherein the embedded equipment comprises an embedded software module, and the man-machine interaction equipment comprises a parameter data configuration function module; also disclosed is a method of preserving, using and distributing the system; the invention adds the function of respectively storing the parameter data of multi-user and multi-scene configuration in the parameter data storing function realized by the traditional embedded software, provides the sharing and transmitting function, and loads the parameter data function after authentication according to the user identity, and protects the configuration parameter data through an encryption mechanism in the whole process so as to prevent the tampering and leakage of the parameter data. Therefore, the efficiency, flexibility and safety of the user in parameter configuration use of the embedded software are improved.

Description

Embedded software configuration parameter storage, use and distribution system and method
Technical Field
The invention belongs to the technical field of onboard embedded software, and particularly relates to an embedded software configuration parameter storage, use and distribution system and a storage, use and distribution method thereof.
Background
When using embedded software in the embedded device, a user always needs to adjust and configure the embedded software according to different practical application scenes and objects, and the method for modifying parameter data of the embedded software is generally adopted for implementation. After obtaining parameter data configured or modified by a user, the embedded software adjusts the functional behavior and use of the embedded software according to the related parameter data. A set of widely used embedded software often has multiple parameter data configuration options, and different parameter data configuration sets are required to be formed for different use scenes and embedded software application objects of the embedded software. And each time these parameter data are all configured according to the usage scenario and the usage object, additional effort is added to the user.
Generally, the embedded software lacks a function of saving the user configuration parameter data, and part of the embedded software saves the configuration parameter data when the user uses the embedded software last time in a parameter data file or a parameter data table as a default configuration when the user starts to use the embedded software next time.
However, this approach has the following problems: firstly, for users, when embedded software is used, the situation that different configuration parameter data are required to be used when facing different use scenes or application objects is frequently encountered, the existing configuration parameter data storage mode is adopted, when facing new application objects and scenes, the configuration of the last embedded software parameter data is far from enough, a large amount of configuration parameter data are required to be reset, and the efficiency is still low; in addition, embedded software parameter data that has been configured by a user for a certain application scenario generally lacks a method of sharing to other embedded devices.
Often, after an apparatus is replaced and embedded software is reinstalled, the parameter data needs to be reconfigured, and a user has configured configuration parameters, so that a convenient and fast mode is lacking to share the configuration parameters to other users using the same type of embedded apparatus.
In addition, protection of the configuration parameters of the embedded software is lacking in the current embedded software, and the configuration parameters of the embedded software are stored in a human-computer interaction system and an embedded system in a clear text form and can be accessed by anyone, so that the risk of tampering and theft exists.
Disclosure of Invention
In order to overcome the defect of the traditional embedded software parameter data configuration management capability, one of the purposes of the invention is to provide a novel embedded software configuration parameter storage, use and distribution system on the premise of realizing the original embedded software parameter data configuration function module.
The technical scheme adopted for solving the technical problems is as follows: an embedded software configuration parameter saving, using and distributing system is composed of an embedded device, a man-machine interaction device, a parameter data configuration function module, a decryption module and an encryption module; the embedded equipment comprises an embedded software module and a decryption module; the man-machine interaction equipment comprises a parameter data configuration function module and a decryption module; the encryption module is contained in the man-machine interaction equipment or the parameter data configuration function module, and can be independently operated, operated in the man-machine interaction equipment or contained in the parameter data configuration function module.
The second purpose of the invention is to provide a method for storing, using and distributing the embedded software configuration parameters, comprising the following steps:
the user configures system parameters through a man-machine interaction device operation parameter data configuration function module, the content of the configuration parameters is stored in blocks according to the classification defined by the user, and after the configuration is completed, the parameter configuration data to be stored is formed into an encrypted parameter data file/data table with a user-defined name through an encryption module to be protected;
when the stored configuration parameters are needed to be used, the encrypted parameter data file/data table generated by the configuration can be downloaded into the embedded device by using the man-machine interaction device, or all or selected parts of the parameter configuration data to be modified are loaded into the man-machine interaction device for modification by the parameter data configuration function module, and then downloaded into the embedded device after being encrypted by the encryption module, so that the embedded software module operates according to the configured parameters;
when the parameter configuration data stored in the past is reused or modified, an access password is input through the man-machine interaction equipment, the decryption module is used for carrying out identity authentication, and after the authentication, a user can be allowed to access an encrypted parameter data file/data table with authority;
when the formed encrypted parameter data file/data table is copied and distributed to the embedded equipment with the decryption module for use, only a user who inputs a correct password and is authenticated by the decryption module is allowed to load parameter configuration into the embedded equipment for use; in addition, the user only allows to input the password and the user after the identity authentication by the decryption module accesses and modifies the parameter configuration data through the parameter data configuration function module of the man-machine interaction device, and downloads the data in the encrypted parameter data file/data table to the embedded device for use.
Further, the encrypted parameter data file/data table is stored in the embedded device or the man-machine interaction device.
Furthermore, when the user wants to use some classified configuration data of some configuration parameter files to combine into new configuration data, the function module can be configured by operating the parameter data through the man-machine interaction device, the access password of the configuration parameter files to be accessed is input, and after the user passes the authentication through the decryption module, the combination of the plurality of classified configuration data in the plurality of required configuration files is modified to form the new configuration data.
Furthermore, when the user needs to transfer the configured parameter data to other embedded devices for self or sharing to other users, the user still adopts the parameter data configuration function module to call the encryption module to form an encrypted parameter data file/data table with a custom name, and then transfers the generated encrypted parameter data file/data table to other embedded devices; when the set of configuration parameter data is needed to be used in other embedded equipment, the decryption module is also used for identity authentication, after authentication is successful, all encrypted parameter data files/data tables which are accessed by the user with authority are used, the encrypted configuration parameter data are loaded, and if authentication is unsuccessful, the loading of the configuration parameter data is refused.
The invention has the following characteristics:
besides all functions of general embedded software parameter data configuration management, the invention further enhances the functions of storing different batches of parameter data configurations and different kinds of parameter data configurations to cope with unusable scenes and application objects, so that a user can select corresponding special configured parameter data records for loading according to actual application scenes without reconfiguring all parameters. In addition, the parameter configuration function in the invention supports the classified storage and loading of parameters, and a user can select and combine a plurality of types of parameter configuration data in a plurality of configuration parameter files matched with a new application scene into a new configuration parameter, thereby enhancing the flexibility of parameter configuration without reconfiguration.
The invention isolates the parameter configuration data of multiple users and multiple scenes by providing the method for saving the parameter data of different user-defined different use scenes, thereby avoiding the singleness that one set of software in each device only has one set of parameter data file, enabling the user to quickly load and adapt the configuration parameter data under the environment to the embedded software according to different environments for operation, improving the software parameter configuration efficiency, and avoiding confusion and errors by adopting the mode of storing different files in blocks.
Finally, when the user uses software to configure the parameter data sharing and transmitting function, the encryption algorithm and the authentication mechanism are used to ensure that the parameter data can only be transmitted and used by authorized users, and the integrity, accuracy and safety of the configured parameter data are ensured.
Drawings
FIG. 1 is a functional block diagram of an existing embedded software parameter data configuration;
FIG. 2 is a functional block diagram of an embedded software configuration parameter data management system of the present invention;
FIG. 3 is a system frame diagram of embedded software configuration parameter data management of the present invention;
FIG. 4 is a schematic diagram of the present invention for the block preservation and combination of parameters to form new configuration parameters;
FIG. 5 is a flow chart of configuration parameter preservation use and distribution of the present invention;
FIG. 6 is a flow chart of a process for transferring configuration parameters to other embedded devices.
The reference numerals are as follows: h1-embedded equipment, H2-man-machine interaction equipment, S2-embedded software modules, D1-encrypted parameter data files/data tables, M1-parameter data configuration functional modules, M2-decryption modules and M3-encryption modules.
Description of the embodiments
The technical scheme of the present invention will be described in detail with reference to the accompanying drawings and examples, but the scope of the present invention is not limited to the examples.
Referring to fig. 3, the system for storing, using and distributing configuration parameters of embedded software disclosed by the invention is composed of an embedded device H1, a man-machine interaction device H2, a decryption module M2 and an encryption module M3. The embedded software module S2 runs in the embedded device H1; the parameter data configuration function module M1 operates in the man-machine interaction device H2, and the parameter data configuration function module M1 operates in the man-machine interaction device H2.
The decryption module M2 may be run in the man-machine interaction device H2 or in the embedded device H1, and when the decryption module M2 is run in the embedded device H1, it may be run independently of the embedded software module S2 or may be contained in the embedded software module S2 to run as a part of its functions. When the decryption module M2 is operated in the man-machine interaction device H2, the function module M1 may be configured independently of the parameter data, or may be included in the parameter data configuration function module M1 to operate as a part of its function.
The encryption module M3 may be independently operated in the man-machine interaction device H2, or may be included in the parameter data configuration function module M1 of the man-machine interaction device H2 to operate as a part of its functions.
The parameter data configuration function module M1 has functions of adding, deleting, modifying, storing, distributing and the like of parameter data, can form an encrypted parameter data file/data table D1 by the encryption module M3 according to the name appointed by a user through all parameter data of embedded software finally needed by the user, and can perform management functions of adding, deleting, modifying, inquiring and the like on the encrypted parameter data file/data table D1 generated by the user; the parameter configuration data downloaded into the embedded device H1 exists in the form of an encrypted parameter data file/data table D1, and can be decrypted by the decryption module M2 and used in the embedded device H1 only after a user inputs a password, so that risks of tampering, leakage and theft of the configuration parameters in the embedded device are avoided.
In contrast to the functional block diagram of the existing embedded software parameter data configuration shown in fig. 1, the functional block diagram of the embedded software configuration parameter data management system of the present invention is shown in fig. 2.
Referring to fig. 3, 4 and 5, the method for storing, using and distributing the embedded software configuration parameter disclosed by the invention comprises the following steps.
The user configures system parameter data through the human-computer interaction equipment H2 operation parameter data configuration function module M1, finally, the configuration content of the configuration parameters is stored in blocks according to the classification defined by the user, after the configuration is completed, a protection password is input, and the parameter configuration data to be stored is formed into an encrypted parameter data file/data table D1 with a user-defined name through the encryption module M3 for protection; the encrypted parameter data file/data table D1 may exist in the man-machine interaction device H2 or in the embedded device H1 according to the user's needs.
That is, when the parameter data configuration function module M1 in the man-machine interaction device H2 used by the user stores the parameter data of the embedded software module S2 configured by the user, the encryption module M3 encrypts the configuration parameter data to be stored to form an encrypted parameter data file/data table D1, and the encryption algorithm used by the encryption module M3 can be selected and adjusted according to the user' S needs, and is not fixed, so long as the decryption module M2 in the embedded device H1 using the configuration parameter data has a decryption algorithm corresponding to the encrypted parameter data file/data table D1.
If the stored configuration parameters are to be used, the user with the access authority can directly download the parameters configured at this time into the embedded software module S2 of the embedded device H1 by using the human-computer interaction device H2 according to the needs of the user, and after the embedded software module S2 of the embedded device H1 is decrypted by the decryption module M2 existing in the embedded device H1, the embedded software module S2 of the embedded device H1 operates according to the parameters configured at this time; the man-machine interaction device H2 can also be used for selecting a part needing to be modified from a plurality of encrypted parameter data files/data tables D1 through the parameter data configuration function module M1, loading the part to be modified into the man-machine interaction device H2 for modification, encrypting the modified parameter configuration data through the encryption module M3, and then downloading the encrypted parameter configuration data into the embedded software module S2 of the embedded device H1 for use, so that the whole configuration parameter data do not need to be compiled again, and the software parameter configuration efficiency is improved.
When the user wants to reuse or modify the historical parameter configuration data saved in the past, the user can be allowed to access the encrypted parameter data file/data table D1 with the authority after the user inputs the access password through the human-computer interaction device H2 and then uses the decryption module M2 to carry out identity authentication.
The user can copy and distribute the encrypted parameter data file/data table D1 formed by the parameter data configuration function module M1 to other embedded devices H1 with decryption modules M2 for use, so long as the devices have the same decryption algorithm function, so that the generation, distribution and use of the configuration parameter data are not limited to one or a certain device; after being distributed to other users, if the user or other users need to reuse the parameter configuration data, the user or other users must be authenticated by the decryption module M2 through the input password, and the user can be allowed to access and modify the parameter configuration data when the user is determined to have the access right. Only the user with access rights can download the data in the encrypted parameter data file/data table D1 to the embedded device H1 for use, thereby avoiding illegal tampering and use of the parameter configuration data.
When a user wants to use some classified configuration data of a certain configuration parameter files to form new configuration data, the user can operate the parameter data configuration function module M1 through the human-computer interaction device H2, input access passwords of the configuration parameter files to be accessed, load the classified configuration data of the plurality of configuration files to form the new configuration data after passing authentication through the decryption module M2, and therefore, the user is prevented from carrying out mass modification when loading only one configuration file, and the configuration efficiency is improved.
When the user needs to transfer the configured parameter data to other embedded devices H1 for use by himself or for sharing with other users, the user still uses the parameter data configuration function module M1 to call the encryption module M3 to form an encrypted parameter data file/data table D1 with a custom name, and then transfers the generated encrypted parameter data file/data table D1 to other embedded devices H1. When the set of configuration parameter data is needed to be used in other embedded devices H1, the user also needs to use the parameter decryption module M2 to carry out identity authentication, and after the authentication is successful, all encrypted parameter data files/data tables D1 which are accessed by the user with authority are used, the encrypted configuration parameter data are loaded, and if the authentication is unsuccessful, the loading of the configuration parameter data is refused. The whole process is shown in fig. 6.
The invention enhances the function of sharing configuration parameter data, and still uses encryption technology and decryption authentication technology to ensure the sharing safety and correctness during sharing. The user can share the parameter data configuration which needs to be transferred to other embedded devices for continuous use in the form of a parameter data table or a parameter data file, and the shared parameter data table or the parameter data file is encrypted by the encryption module. When a user or other users need to use the shared parameter data information, a decryption module is required to confirm the identity, so that the original information of the shared parameter data set can be obtained and loaded into embedded software for use. The risk of tampering with the configuration parameters is avoided in this process. And the configuration parameter data files stored in the embedded equipment are protected in an encrypted form, so that the safety of parameter data configuration is ensured, and the possibility that data is illegally acquired and used is avoided.
The invention further enhances the functions of saving different batches of parameter data configurations and different kinds of parameter data configurations to cope with unusable scenes and application objects besides the functional basis of the traditional embedded software parameter data configuration management. The user can select to modify the appropriate historical parameter configuration data according to different use scenes and application objects to modify, so that the parameter configuration efficiency is improved.
The invention accesses the parameter configuration data and uses the parameter configuration data, the password authentication is needed, the corresponding parameter data file can be accessed and modified only by the user after the identity authentication is carried out through the decryption module, and the new configuration parameter data can be downloaded to the embedded device only by the user after the identity authentication is carried out through the decryption module, thereby ensuring the safety and the correctness of the configuration data and the data use.
When the invention stores and uses the parameter data, the encryption protection is used, different files can be protected by different passwords, and only the user who passes the password identity authentication through the decryption module can have the authority to access the parameter configuration file data, thereby avoiding the illegal access and tampering of the parameters.
Meanwhile, only users with authority can load the parameter configuration data into the embedded software, so that the parameter data is prevented from being loaded wrongly. And the encryption algorithm can be selected and adjusted according to the needs of the user, and the encryption algorithm can be used as long as the same corresponding decryption algorithm is provided in each device.
Finally, the invention enhances the support of sharing the configuration parameter data, and when sharing the configuration parameter data, the user still uses the encryption technology and the decryption authentication technology to further ensure that the data is not tampered and stolen in the use process.
The foregoing description is for illustrative purposes only and is not intended to be limiting, and any modifications or equivalent changes in embodiment which may occur to those skilled in the art using the teachings disclosed herein will be understood to be encompassed by the scope of the appended claims without departing from the spirit and scope of the invention.

Claims (5)

1. An embedded software configuration parameter preservation, use and distribution system is characterized in that: the system consists of embedded equipment (H1), man-machine interaction equipment (H2), a parameter data configuration functional module (M1), a decryption module (M2) and an encryption module (M3);
the embedded equipment (H1) comprises an embedded software module (S2) and a decryption module (M2);
the man-machine interaction equipment (H2) comprises a parameter data configuration functional module (M1) and a decryption module (M2);
the encryption module (M3) is contained in the man-machine interaction equipment (H2) or the parameter data configuration function module (M1).
2. A method of preserving use and distribution of the system of claim 1, comprising the steps of:
configuring system parameters through a human-computer interaction device (H2) operation parameter data configuration function module (M1), storing configuration contents of the configuration parameters in blocks, and forming the parameter configuration data into an encrypted parameter data file/data table (D1) for protection through an encryption module (M3) after the configuration is completed;
when configuration parameters are needed to be used, a parameter data configuration functional module (M1) in the man-machine interaction equipment (H2) is used for downloading the configuration parameters into the embedded equipment (H1), then the embedded software module (S2) is used for decrypting through a decryption module (M2) and then loading parameter data for operation, or all or part of the parameter configuration data is loaded into the man-machine interaction equipment (H2) for modification through the parameter data configuration functional module (M1), and the configuration parameters are encrypted through an encryption module (M3) and then downloaded into the embedded equipment (H1), and the embedded software module (S2) is used for operation according to the configured parameters;
when the history parameter configuration data is used or modified, an access password is input through the human-computer interaction equipment (H2), and after identity authentication is carried out by using the decryption module (M2), the encrypted parameter data file/data table (D1) with the authority is allowed to be accessed;
when the encrypted parameter data file/data table (D1) is copied and distributed to the embedded device (H1) with the decryption module (M2), only the user who inputs the correct password and is authenticated by the decryption module (M2) is allowed to access and modify the parameter configuration data, and the data in the encrypted parameter data file/data table (D1) is downloaded to the embedded device (H1).
3. The method for storing, using and distributing the embedded software configuration parameters according to claim 2, wherein the encrypted parameter data file/data table (D1) is stored in the embedded device (H1) or the man-machine interaction device (H2).
4. An embedded software configuration parameter saving, using and distributing system according to claim 3, characterized in that when several configuration parameter files are combined into new configuration data, the function module (M1) is configured by operating parameter data through the man-machine interaction device (H2), the access password of the configuration parameter file to be accessed is input, and after passing the authentication through the decryption module (M2), a plurality of configuration data combinations are loaded to form new configuration data.
5. An embedded software configuration parameter saving and distributing system according to claim 3, characterized in that when the configuration parameters need to be transferred to other embedded devices (H1) for use, the parameter data configuration function module (M1) is adopted to call and process the encrypted parameter data file/data table (D1) of the custom name formed by the history, and then the configuration parameters finally needing to be distributed are transferred to other embedded devices (H1) for use to form a new encrypted parameter data file/data table (D1); when other embedded equipment (H1) uses the configuration parameters, a decryption module (M2) is used for identity authentication, the configuration parameters which are encrypted again through authentication are loaded, and if the authentication is unsuccessful, the loading is refused.
CN202311526160.5A 2023-11-16 2023-11-16 Embedded software configuration parameter storage, use and distribution system and method Pending CN117454390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311526160.5A CN117454390A (en) 2023-11-16 2023-11-16 Embedded software configuration parameter storage, use and distribution system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311526160.5A CN117454390A (en) 2023-11-16 2023-11-16 Embedded software configuration parameter storage, use and distribution system and method

Publications (1)

Publication Number Publication Date
CN117454390A true CN117454390A (en) 2024-01-26

Family

ID=89583520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311526160.5A Pending CN117454390A (en) 2023-11-16 2023-11-16 Embedded software configuration parameter storage, use and distribution system and method

Country Status (1)

Country Link
CN (1) CN117454390A (en)

Similar Documents

Publication Publication Date Title
US10341091B2 (en) Secure memory storage
EP2746984B1 (en) Method to access data in an electronic apparatus
CN110391906B (en) Data processing method based on block chain, electronic device and readable storage medium
US11290446B2 (en) Access to data stored in a cloud
CN105227565B (en) The method and apparatus that anti-reversing for Android system cracks shared object file
US20070220610A1 (en) User Based Content Key Encryption For A Drm System
US9547757B2 (en) User terminal, server and controlling method thereof
CN1863038B (en) Method of implementing control and management of applied program in terminal apparatus
MX2007008540A (en) Method and portable storage device for allocating secure area in insecure area.
CN101763469B (en) Digital copyright management system and implementation method thereof
CN105612715A (en) Security processing unit with configurable access control
CN103763313A (en) File protection method and system
EP4064084A1 (en) Password management method and related device
Cilardo et al. Secure distribution infrastructure for hardware digital contents
US11734394B2 (en) Distributed license encryption and distribution
EP2689367B1 (en) Data protection using distributed security key
CN109889334A (en) Embedded firmware encrypting method, apparatus, wifi equipment and storage medium
WO2015154469A1 (en) Database operation method and device
US20150074823A1 (en) Server, terminal and digital copyright management method
US9363081B2 (en) License administration device and license administration method
CN117454390A (en) Embedded software configuration parameter storage, use and distribution system and method
EP3193274B1 (en) Secure memory storage
CN107862209A (en) A kind of file encryption-decryption method, mobile terminal and the device with store function
CN116686316A (en) Encrypted file control
GB2550557A (en) Data management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination