CN102799819A - Embedded software safety protection system - Google Patents

Embedded software safety protection system Download PDF

Info

Publication number
CN102799819A
CN102799819A CN201210228800XA CN201210228800A CN102799819A CN 102799819 A CN102799819 A CN 102799819A CN 201210228800X A CN201210228800X A CN 201210228800XA CN 201210228800 A CN201210228800 A CN 201210228800A CN 102799819 A CN102799819 A CN 102799819A
Authority
CN
China
Prior art keywords
safety
encryption
chip
key
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210228800XA
Other languages
Chinese (zh)
Inventor
苏均生
李宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jinghang Computing Communication Research Institute
Original Assignee
Beijing Jinghang Computing Communication Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jinghang Computing Communication Research Institute filed Critical Beijing Jinghang Computing Communication Research Institute
Priority to CN201210228800XA priority Critical patent/CN102799819A/en
Publication of CN102799819A publication Critical patent/CN102799819A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention belongs to the technical field of information safety, and in particular relates to an embedded software safety protection system which aims to improve the safety of embedded software. According to the system, a safety protection module is arranged on embedded equipment and comprises a physical prying-resistant device, a prying-resistant cover plate and a hardware encryption and decryption module circuit, wherein the hardware encryption and decryption module circuit is applied to adaption of a central processing unit (CPU) to data access of an electrically programmable read only memory (EPROM) and is matched with the physical prying-resistant device and the prying-resistant cover plate to dynamically protect static random access memory (SRAM) data. By virtue of the physical prying-resistant device and the prying-resistant cover plate, the system has destroy resistance and can prevent an attacker from acquiring sensitive information in a probe detection mode and the like; and moreover, the prying-resistant cover plate can shield electromagnetic radiation, thus preventing the attacker from attacking the safety system by utilizing the leakage of the electromagnetic radiation.

Description

A kind of embedded software safety system
Technical field
The invention belongs to field of information security technology, be specifically related to a kind of embedded software safety system, this method is applied to can increase the security of embedded software in the embedded software security protection process.
Background technology
Existing market is to ARM, the common security protection means of DSP, single-chip microcomputer seldom, important program is directly exposed among transparent Flash, the EEPROM.In the face of the attack technology of constantly development and the competition between the hacker, product crack the time with cost is more and more lower, with respect to the huge interests of product image person's acquisition, it cracks cost even can ignore sometimes.Therefore, how protecting the interests of self, is the problem that product designer must be faced.Single-chip microcomputer and embedded system generally all have inner ROM/EEPROM/FLASH to supply the user to deposit program, in the process of system's operation; CPU is loaded into the program in the storer among internal memory or the SDRAM, carries out.In order to prevent the machine internal program of unauthorized access or copy single-chip microcomputer, most of single-chip microcomputer all has encryption lock location or encrypted byte, with the screening glass internal program.If the encryption lock location is enabled (locking) when programming, just can't directly read the program in the single-chip microcomputer with common programmable device, so-called Copy Protection that Here it is is lock function in other words.In fact, such safeguard measure is very fragile, is easy to be cracked.The single-chip microcomputer assailant is by specialized equipment or home-built equipment; Utilize leak or software defect in the singlechip chip design; Through the multiple technologies means; Just key message be can from chip, extract, thereby FLASH or EPROM internal program obtained or directly from SDRAM or internal memory or the critical data content of program run.
Summary of the invention
The objective of the invention is the deficiency to prior art, propose a kind of embedded software safety system that equipment and data are carried out security protection.
The present invention is achieved in that
A kind of embedded software safety system; On embedded device, be provided with safety protection module; Said safety protection module comprises physics anti-picking device and pick-proof cover plate, hardware enciphering and deciphering modular circuit, and said encryption and decryption modular circuit is used for CPU to the adapter of EPROM data access and cooperate the physics anti-picking device and the pick-proof cover plate is realized the dynamic protection to the SRAM data.
Aforesaid a kind of embedded software safety system, wherein: said encryption and decryption modular circuit comprises continuous FPGA and safety chip, FPGA output cpu signal and NVM signal; Said FPGA is used for the generation of logic control signal, and the adapter of responsible CPU reference-to storage; Safety chip is used for encryption and decryption, the key management to data.
Aforesaid a kind of embedded software safety system, wherein: said physics anti-picking device and pick-proof cover plate 1 comprise safe condition bus and safety bus state detection circuit; The exit winding displacement of said safe condition bus adopts out of order mode to distribute; The exit of said safe condition bus is fixed in the pick-proof cover plate through stationary installation.
Aforesaid a kind of embedded software safety system; Wherein: said safety chip is carried out the safety detection program: in communication process; The safety detection program timing generates random number with safety chip and sends to FPGA, and FPGA utilizes hashing algorithm that random number is carried out computing and safety chip is given in passback; The same hashing algorithm of safety detection program utilization carries out computing to random number, and the result is compared with the result of FPGA passback; If the result is consistent, explain that the safe condition bus correctly connects, the security of system state is normal; Otherwise, be regarded as the security of system abnormal state; If the security of system abnormal state, the safety detection program is sent self damaging order to CPU immediately, and the key among the removing SRAM in data and the safety chip is hung up CPU, quits work.
Aforesaid a kind of embedded software safety system, wherein: the key that said encryption and decryption modular circuit adopts when each the encryption is different; Before the data encryption; Safety chip generates new random number, is stored among the flash of safety chip, reads hardware sequence number; Utilize the combination of random number and hardware sequence number to generate key seed; SHA1 hash algorithm through safety chip self carries out computing to key seed, thereby generates data encryption key, is used for data encryption and handles;
Before the data decryption; At first safety chip is configured; Read hardware sequence number, utilize the random number combination of safety chip sequence number and storage to generate key seed again, the SHA1 hash algorithm through safety chip self carries out computing to key seed at last; Thereby the generation data decryption key, the data decryption that is used between CPU and the storer is handled;
The encryption and decryption key is stored in the internal memory of safety chip, and said key disappears after the embedded device power down, and synthetic again key seed generates the encryption and decryption key when powering on once more.
Aforesaid a kind of embedded software safety system; Wherein: said encryption and decryption modular circuit realizes the encryption to embedded software through the encryption of PC end: encryption chip produces a random number earlier; Afterwards random number is stored in the encryption chip; Accomplish the safety protection module initialization procedure, random number combines chip serial number to generate key through the SHA1 hash algorithm, carries out embedded software through the SM1 grouping algorithm again and encrypts; During deciphering, random number, the encryption chip sequence number of encryption chip through having stored, same hash algorithm and decipherment algorithm carry out decryption processing and get final product.
The invention has the beneficial effects as follows:
Through increasing safety protection module, can carry out effective security protection to equipment and data.
Through in safety chip internal operation safety monitoring program, validity that can quantitative check physics anti-picking device.
Adopt physics anti-picking device and pick-proof cover plate anti-, have anti-damage ability, prevent that the assailant from using mode such as probe detection to obtain sensitive information; And the pick-proof cover plate can electromagnetic radiation shielding, prevents that the assailant from utilizing electromagnetic radiation to reveal and attacking security system.
Through adopting " one-time pad " principle, further guarantee the one-to-one relationship of key and hardware module.
Description of drawings
Fig. 1 is the structure principle chart of a kind of embedded software safety system provided by the invention;
Fig. 4 is the external structure of a kind of embedded software safety system provided by the invention;
Fig. 2 is the decrypt circuit workflow;
Fig. 3 is a safe condition monitoring flow process;
Fig. 5 is a PC end encryption process flow diagram;
Among the figure: 1. physics anti-picking device and pick-proof cover plate, 2. encryption and decryption modular circuit, 3. embedded device mainboard, 4. screw.
Embodiment
Below in conjunction with accompanying drawing and embodiment a kind of embedded software safety system provided by the invention is done further introduction:
Like Fig. 1, shown in 2, a kind of embedded software security system increases safety protection module on embedded device, and this safety protection module comprises physics anti-picking device and pick-proof cover plate 1, hardware enciphering and deciphering modular circuit 2; Encryption and decryption modular circuit 2 realizes the adapter of CPU to the EPROM data access, and the dynamic protection that cooperates physics anti-picking device and pick-proof cover plate 1 to realize the SRAM data.Wherein,
(1) the encryption and decryption modular circuit comprises FPGA, safety chip, row's pin (containing cpu signal and NVM signal); FPGA links to each other with safety chip, FPGA output cpu signal and NVM signal.FPGA realizes the generation of various logic control signal, and the adapter of responsible CPU reference-to storage; Safety chip realize to data encryption and decryption, key management and as the operation carrier of safety detection program, realize dynamic protection to data among the SRAM, prevent illegally to analyze and crack.
As shown in Figure 3, encryption and decryption modular circuit principle of work is following:
When embedded device powered at every turn, FPGA steering logic signal was hung up CPU, enables safety chip, and the security of operation trace routine makes FPGA and safety chip handshake communication, so as to judging the security monitoring state; If state is normal, then FPGA reads program among the EPROM in safety chip, utilizes SHA1 algorithm generating solution decryption key, carries out decryption processing, enables CPU after finishing dealing with again, and loading procedure is carried out in internal memory.
The safety chip internal operation has the safety monitoring program, and it is resident safety chip internal memory in system's operational process, and groundwork is exactly the validity of quantitative check physics anti-picking device, guarantees that safety chip and FPGA communicate.As shown in Figure 3; In communication process; The safety detection program timing generates random number with safety chip and sends to FPGA; FPGA utilizes hashing algorithm that random number is carried out computing and safety chip is given in passback, and the safety detection program also utilizes same hashing algorithm that random number is carried out computing, and the result is compared with the result of FPGA passback.If the result is consistent, explain that the safe condition bus correctly connects, the security of system state is normal; Otherwise, be regarded as the security of system abnormal state.If the assailant wants to steal the data among internal memory or the EPROM, at first to move the pick-proof cover plate, in case and after the pick-proof cover plate is removed; The safe condition bus is destroyed, and the safety detection program can not in time be carried out handshake communication with FPGA, thereby detects this attack; The safety detection program is sent self damaging order to CPU immediately; Key among the removing SRAM in data and the safety chip is hung up CPU, quits work.
(2) physics anti-picking device and pick-proof cover plate 1 also comprise safe condition bus (soft winding displacement exit) and safety bus state detection circuit etc.The exit of safe condition bus preferably adopts soft winding displacement, and this winding displacement adopts out of order mode to distribute, in case break irrecoverable original state; The exit of safe condition bus is fixed in the pick-proof cover plate through stationary installation, is promptly broken in case the pick-proof cover plate is opened, and the safety detection program instrumentation promptly emptied key, SRAM and notifies cpu reset to the behavior.
The pick-proof cover plate adopts the hard metal material to process; Has anti-damage ability; And be fixed in embedded device mainboard 3 through screw 4, thus safety protection module is covered into its inside with total control machine CPU, SRAM and EPROM, prevent that the assailant from using mode such as probe detection to obtain sensitive information.The pick-proof cover plate adopts metal material to process, and has good heat-conducting, through contact with the CPU conducting strip, and can auxiliary heat dissipation.In addition, the pick-proof cover plate can electromagnetic radiation shielding, prevents that the assailant from utilizing electromagnetic radiation to reveal and attacking security system.
As shown in Figure 4; Its principle of work of safety bus state detection circuit does; Safety chip regularly produces random number; And sending to FPGA through the safe condition bus, FPGA utilizes embedded hashing algorithm that this random number is carried out computing and the result is passed back to safety chip through safety bus, safety chip checking operation result; If the result is incorrect, it is unusual to explain that the safety bus state exists, thereby carries out relevant safeguard protection action.
In order further to guarantee the one-to-one relationship of key and hardware module, the present invention adopts " one-time pad " principle, and the key that adopts when promptly at every turn encrypting is different, thereby fundamentally guarantees the security of software cryptography.Before the data encryption; Safety chip generates new random number, is stored among the flash of safety chip, reads hardware sequence number; Utilize the combination of random number and hardware sequence number to generate key seed; SHA1 hash algorithm through safety chip self carries out computing to key seed, thereby generates data encryption key, is used for data encryption and handles.
Before the data decryption; At first safety chip is configured; Read hardware sequence number, utilize the random number combination of safety chip sequence number and storage to generate key seed again, the SHA1 hash algorithm through safety chip self carries out computing to key seed at last; Thereby the generation data decryption key, the data decryption that is used between CPU and the storer is handled.
The encryption and decryption key is stored in the internal memory of safety chip, and for the purpose of guaranteeing safety, this key is not done permanent storage, disappears after the embedded device power down, and synthetic again key seed generates the encryption and decryption key when powering on once more.
PC end encipheror is responsible for embedded device software cryptography is carried out the random number initialization to decipher circuit simultaneously, carries out " one-time pad " configuration.PC end encipheror runs on the Windows environment, through serial ports and safety protection module communication, and passes through the hardware enciphering and deciphering circuit and realizes embedded software is encrypted.The encryption of PC end is as shown in Figure 5; Encryption chip produces a random number earlier; Afterwards random number is stored in the encryption chip; Completion meets the safety protection module initialization procedure of " one-time pad ", and random number combines chip serial number to generate key through the SHA1 hash algorithm, carries out embedded software through the SM1 grouping algorithm again and encrypts.In normal course of operation, random number, the encryption chip sequence number of encryption chip through having stored carries out decryption processing through same hash algorithm and decipherment algorithm, just can correctly decipher.

Claims (6)

1. embedded software safety system; It is characterized in that: on embedded device, be provided with safety protection module; Said safety protection module comprises physics anti-picking device and pick-proof cover plate (1), hardware enciphering and deciphering modular circuit (2), and said encryption and decryption modular circuit (2) is used for CPU to the adapter of EPROM data access and cooperate the physics anti-picking device and pick-proof cover plate (1) is realized the dynamic protection to the SRAM data.
2. a kind of embedded software safety system as claimed in claim 1 is characterized in that: said encryption and decryption modular circuit comprises continuous FPGA and safety chip, FPGA output cpu signal and NVM signal; Said FPGA is used for the generation of logic control signal, and the adapter of responsible CPU reference-to storage; Safety chip is used for encryption and decryption, the key management to data.
3. a kind of embedded software safety system as claimed in claim 2 is characterized in that: said physics anti-picking device and pick-proof cover plate 1 comprise safe condition bus and safety bus state detection circuit; The exit winding displacement of said safe condition bus adopts out of order mode to distribute; The exit of said safe condition bus is fixed in the pick-proof cover plate through stationary installation.
4. a kind of embedded software safety system as claimed in claim 3; It is characterized in that: said safety chip is carried out the safety detection program: in communication process; The safety detection program timing generates random number with safety chip and sends to FPGA, and FPGA utilizes hashing algorithm that random number is carried out computing and safety chip is given in passback; The same hashing algorithm of safety detection program utilization carries out computing to random number, and the result is compared with the result of FPGA passback; If the result is consistent, explain that the safe condition bus correctly connects, the security of system state is normal; Otherwise, be regarded as the security of system abnormal state; If the security of system abnormal state, the safety detection program is sent self damaging order to CPU immediately, and the key among the removing SRAM in data and the safety chip is hung up CPU, quits work.
5. a kind of embedded software safety system as claimed in claim 4 is characterized in that: the key that said encryption and decryption modular circuit (2) adopts when each the encryption is different; Before the data encryption; Safety chip generates new random number, is stored among the flash of safety chip, reads hardware sequence number; Utilize the combination of random number and hardware sequence number to generate key seed; SHA1 hash algorithm through safety chip self carries out computing to key seed, thereby generates data encryption key, is used for data encryption and handles;
Before the data decryption; At first safety chip is configured; Read hardware sequence number, utilize the random number combination of safety chip sequence number and storage to generate key seed again, the SHA1 hash algorithm through safety chip self carries out computing to key seed at last; Thereby the generation data decryption key, the data decryption that is used between CPU and the storer is handled;
The encryption and decryption key is stored in the internal memory of safety chip, and said key disappears after the embedded device power down, and synthetic again key seed generates the encryption and decryption key when powering on once more.
6. a kind of embedded software safety system as claimed in claim 5; It is characterized in that: said encryption and decryption modular circuit (2) realizes the encryption to embedded software through the encryption of PC end: encryption chip produces a random number earlier; Afterwards random number is stored in the encryption chip; Accomplish the safety protection module initialization procedure, random number combines chip serial number to generate key through the SHA1 hash algorithm, carries out embedded software through the SM1 grouping algorithm again and encrypts; During deciphering, random number, the encryption chip sequence number of encryption chip through having stored, same hash algorithm and decipherment algorithm carry out decryption processing and get final product.
CN201210228800XA 2012-07-04 2012-07-04 Embedded software safety protection system Pending CN102799819A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210228800XA CN102799819A (en) 2012-07-04 2012-07-04 Embedded software safety protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210228800XA CN102799819A (en) 2012-07-04 2012-07-04 Embedded software safety protection system

Publications (1)

Publication Number Publication Date
CN102799819A true CN102799819A (en) 2012-11-28

Family

ID=47198924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210228800XA Pending CN102799819A (en) 2012-07-04 2012-07-04 Embedded software safety protection system

Country Status (1)

Country Link
CN (1) CN102799819A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819706A (en) * 2012-07-26 2012-12-12 重庆大学 Device and method for implementing credible embedded system on existing embedded equipment
CN103475463A (en) * 2013-08-19 2013-12-25 华为技术有限公司 Encryption realization method and apparatus
CN103488916A (en) * 2013-08-12 2014-01-01 中国航天科工集团第三研究院第八三五七研究所 On-missile software encipherment protection method
CN103530566A (en) * 2013-10-21 2014-01-22 中国科学院深圳先进技术研究院 System for detecting safety performance of safety chip under induced error attacks
CN103902453A (en) * 2014-04-03 2014-07-02 国家电网公司 Embedded equipment security detection method based on components
CN103927470A (en) * 2014-04-30 2014-07-16 北京释码大华科技有限公司 File encryption and decryption system and method based on iris recognition
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN104732120A (en) * 2015-04-08 2015-06-24 迈普通信技术股份有限公司 FPGA property right protection method and system
CN105095097A (en) * 2014-05-19 2015-11-25 英飞凌科技股份有限公司 Randomized memory access
CN105631366A (en) * 2015-10-13 2016-06-01 上海磁宇信息科技有限公司 Encryption chip and encryption method therefor
CN107124425A (en) * 2017-05-26 2017-09-01 北京立思辰新技术有限公司 The method and computing device of monitoring device safety
CN109255259A (en) * 2018-09-11 2019-01-22 网御安全技术(深圳)有限公司 A kind of high safety encryption and decryption operational capability extended method and system
CN109284638A (en) * 2018-09-11 2019-01-29 网御安全技术(深圳)有限公司 A kind of means of defence and system of safety chip running environment
CN110166531A (en) * 2019-04-19 2019-08-23 童迎伟 Internet of Things quantum fail-safe computer and encryption protecting method
CN110310104A (en) * 2019-06-06 2019-10-08 武汉卓目科技有限公司 A kind of self-distroyable disposable hardware wallet
CN110310108A (en) * 2019-06-06 2019-10-08 武汉卓目科技有限公司 A kind of band tears the self-destructed New Hardware wallet of machine open
CN110851888A (en) * 2019-10-12 2020-02-28 天津光电聚能专用通信设备有限公司 High-performance security encryption system with double-path heterogeneous function
CN111669865A (en) * 2020-07-03 2020-09-15 深圳爱克莱特科技股份有限公司 Hardware encryption method for LED intelligent control system
CN112270021A (en) * 2020-09-23 2021-01-26 成都三零嘉微电子有限公司 Wireless self-destruction control circuit and method for security chip
CN113747429A (en) * 2021-08-30 2021-12-03 国网江苏省电力有限公司无锡供电分公司 Wireless data encryption and decryption system and method for relay protection device
CN115080929A (en) * 2022-07-20 2022-09-20 深圳研控自动化科技股份有限公司 Encryption method, decryption method, system and storage medium of FPGA program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917080A (en) * 2006-07-11 2007-02-21 刘学明 Safe U disc storage system and method
US20080112300A1 (en) * 2006-11-15 2008-05-15 David Bruce Kumhyr Method and system for protecting data
CN101510243A (en) * 2009-03-04 2009-08-19 深圳市凯明杨科技有限公司 Data protection device and safety payment equipment
US20100031375A1 (en) * 2008-07-29 2010-02-04 International Business Machines Corporation Signal Quality Monitoring to Defeat Microchip Exploitation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917080A (en) * 2006-07-11 2007-02-21 刘学明 Safe U disc storage system and method
US20080112300A1 (en) * 2006-11-15 2008-05-15 David Bruce Kumhyr Method and system for protecting data
US20100031375A1 (en) * 2008-07-29 2010-02-04 International Business Machines Corporation Signal Quality Monitoring to Defeat Microchip Exploitation
CN101510243A (en) * 2009-03-04 2009-08-19 深圳市凯明杨科技有限公司 Data protection device and safety payment equipment

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819706B (en) * 2012-07-26 2014-12-10 重庆大学 Device and method for implementing credible embedded system on existing embedded equipment
CN102819706A (en) * 2012-07-26 2012-12-12 重庆大学 Device and method for implementing credible embedded system on existing embedded equipment
CN103488916A (en) * 2013-08-12 2014-01-01 中国航天科工集团第三研究院第八三五七研究所 On-missile software encipherment protection method
CN103488916B (en) * 2013-08-12 2017-09-19 中国航天科工集团第三研究院第八三五七研究所 A kind of software encryption and protection method on bullet
CN103475463A (en) * 2013-08-19 2013-12-25 华为技术有限公司 Encryption realization method and apparatus
CN103475463B (en) * 2013-08-19 2017-04-05 华为技术有限公司 Encryption implementation method and device
CN103530566A (en) * 2013-10-21 2014-01-22 中国科学院深圳先进技术研究院 System for detecting safety performance of safety chip under induced error attacks
CN103530566B (en) * 2013-10-21 2016-08-24 中国科学院深圳先进技术研究院 A kind of detection induces the system of safety chip security performance under fault analysis
CN103902453B (en) * 2014-04-03 2016-07-13 国家电网公司 A kind of embedded device safety detection method of Component-Based Development
CN103902453A (en) * 2014-04-03 2014-07-02 国家电网公司 Embedded equipment security detection method based on components
CN103927470A (en) * 2014-04-30 2014-07-16 北京释码大华科技有限公司 File encryption and decryption system and method based on iris recognition
CN105095097A (en) * 2014-05-19 2015-11-25 英飞凌科技股份有限公司 Randomized memory access
CN105095097B (en) * 2014-05-19 2018-10-16 英飞凌科技股份有限公司 The memory access of randomization
US9916261B2 (en) 2014-05-19 2018-03-13 Infineon Technologies Ag Randomized memory access
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN104732120A (en) * 2015-04-08 2015-06-24 迈普通信技术股份有限公司 FPGA property right protection method and system
CN104732120B (en) * 2015-04-08 2017-08-29 迈普通信技术股份有限公司 FPGA property right protection method and system
CN105631366A (en) * 2015-10-13 2016-06-01 上海磁宇信息科技有限公司 Encryption chip and encryption method therefor
CN107124425A (en) * 2017-05-26 2017-09-01 北京立思辰新技术有限公司 The method and computing device of monitoring device safety
CN109255259A (en) * 2018-09-11 2019-01-22 网御安全技术(深圳)有限公司 A kind of high safety encryption and decryption operational capability extended method and system
CN109284638A (en) * 2018-09-11 2019-01-29 网御安全技术(深圳)有限公司 A kind of means of defence and system of safety chip running environment
CN109255259B (en) * 2018-09-11 2020-08-04 网御安全技术(深圳)有限公司 High-security encryption and decryption computing capability expansion method and system
CN110166531A (en) * 2019-04-19 2019-08-23 童迎伟 Internet of Things quantum fail-safe computer and encryption protecting method
CN110310104B (en) * 2019-06-06 2022-04-08 武汉卓目科技有限公司 Self-destruction type hardware wallet
CN110310104A (en) * 2019-06-06 2019-10-08 武汉卓目科技有限公司 A kind of self-distroyable disposable hardware wallet
CN110310108A (en) * 2019-06-06 2019-10-08 武汉卓目科技有限公司 A kind of band tears the self-destructed New Hardware wallet of machine open
CN110310108B (en) * 2019-06-06 2022-04-08 武汉卓目科技有限公司 Novel self-destruction hardware wallet with dismantling machine
CN110851888A (en) * 2019-10-12 2020-02-28 天津光电聚能专用通信设备有限公司 High-performance security encryption system with double-path heterogeneous function
CN111669865A (en) * 2020-07-03 2020-09-15 深圳爱克莱特科技股份有限公司 Hardware encryption method for LED intelligent control system
CN112270021A (en) * 2020-09-23 2021-01-26 成都三零嘉微电子有限公司 Wireless self-destruction control circuit and method for security chip
CN112270021B (en) * 2020-09-23 2024-03-26 成都三零嘉微电子有限公司 Wireless self-destruction control circuit and method for security chip
CN113747429A (en) * 2021-08-30 2021-12-03 国网江苏省电力有限公司无锡供电分公司 Wireless data encryption and decryption system and method for relay protection device
CN113747429B (en) * 2021-08-30 2023-11-24 国网江苏省电力有限公司无锡供电分公司 Wireless data encryption and decryption system and method for relay protection device
CN115080929A (en) * 2022-07-20 2022-09-20 深圳研控自动化科技股份有限公司 Encryption method, decryption method, system and storage medium of FPGA program
CN115080929B (en) * 2022-07-20 2022-11-11 深圳研控自动化科技股份有限公司 Encryption method, decryption method, system and storage medium of FPGA program

Similar Documents

Publication Publication Date Title
CN102799819A (en) Embedded software safety protection system
CN104156642B (en) A kind of security password input system and method based on safe touch screen control chip
US8909932B2 (en) Method and apparatus for security over multiple interfaces
US7082539B1 (en) Information processing apparatus
US20120137126A1 (en) Smart meter and meter reading system
US9250671B2 (en) Cryptographic logic circuit with resistance to differential power analysis
CN108629206B (en) Secure encryption method, encryption machine and terminal equipment
Shepherd et al. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
CN104751036A (en) Computer information security system
CN101882189B (en) Embedded-type system for ensuring completeness of program and realization method thereof
US9042553B2 (en) Communicating device and communicating method
US20180018673A1 (en) Systems and methods for a secure payment terminal without batteries
CN103440462A (en) Embedded control method for improving security and secrecy performance of security microprocessor
CN102915411A (en) Dereplication encryption lock for software and hardware of embedded system
TWI631462B (en) Computing system and computing device-implemented method to secure on-board bus transactions and non-transitory computer readable storage medium
CN105631366A (en) Encryption chip and encryption method therefor
CN205584238U (en) Network data encryption equipment
CN114785503B (en) Cipher card, root key protection method thereof and computer readable storage medium
CN101799852A (en) Hardware cryptographic module and method for protecting bank counter sensitive data
CN105933117A (en) Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
CN102708632B (en) Method and device for protecting sensitive data in POS (point-of-sale) machine
CN105046115A (en) Method and apparatus for detecting tampering with software operation time
CN105022651A (en) Anti-piratic method in equipment production process and firmware burning device
CN114866228A (en) Method, system, storage medium and terminal for realizing soft password module
CN104636655A (en) Credibility verifying method of hot plug device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121128