[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106503494A - A kind of firmware protection location and guard method with flash memory microcontroller on piece - Google Patents

A kind of firmware protection location and guard method with flash memory microcontroller on piece Download PDF

Info

Publication number
CN106503494A
CN106503494A CN201610971108.4A CN201610971108A CN106503494A CN 106503494 A CN106503494 A CN 106503494A CN 201610971108 A CN201610971108 A CN 201610971108A CN 106503494 A CN106503494 A CN 106503494A
Authority
CN
China
Prior art keywords
firmware
encryption
bootloader
flash memory
piece
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610971108.4A
Other languages
Chinese (zh)
Inventor
杜清海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN BEIFENG TELECOM TECHNOLOGY Co Ltd
Original Assignee
FUJIAN BEIFENG TELECOM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN BEIFENG TELECOM TECHNOLOGY Co Ltd filed Critical FUJIAN BEIFENG TELECOM TECHNOLOGY Co Ltd
Priority to CN201610971108.4A priority Critical patent/CN106503494A/en
Publication of CN106503494A publication Critical patent/CN106503494A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of firmware protection location of microcontroller, including the firmware bag that publishes and Bootloader;Disclosed firmware bag instructs the firmware after block and encryption to constitute by encryption;The encryption instructs block to include the information of the encryption regional area of firmware, and which includes side-play amount and length, orients ciphertext region during for decrypting;Also include the random number of 16 bytes, for producing actual working key;Its firmware protection is specific as follows:First by being encrypted to firmware local, every time encryption is encrypted using different keys, then boot loader Bootloader, is carried out one identification code of a machine and is started, rises level decryption firmware, firmware is stored in secure storage section completing.The firmware protection location with flash memory microcontroller on piece of the present invention and guard method, it is allowed to the binary file of open firmware, keep interactive with validated user, and software resource consumes that little, pirate clone's difficulty is high, can the original side of effective protection interests.

Description

A kind of firmware protection location and guard method with flash memory microcontroller on piece
Technical field
A kind of the present invention relates to communication apparatus technology, more particularly to firmware protection location with flash memory microcontroller on piece And guard method.
Background technology
When a communication apparatus successfully researches and develops listing, fast sale, now often there is a hidden danger:Illegal businessman directly plagiarizes Hardware design, and announced firmware is usurped, rapid release is pirate to clone counterfeit products, so as to cause the company for researching and developing this equipment Interests suffer damage;It is the product of software particularly with core technology, the imitation of its hardware is not difficult, as long as piracy side obtains The binary file of firmware has been taken, so that it may the imitation of quick-speed large-scale, therefore, it is necessary to management and control is carried out to firmware, general management and control is led to Crossing following two directions is carried out:First, it is impossible to from the binary file that open channel obtains firmware, second, it is impossible to direct from equipment Read the binary file of reduction firmware;But, the epoch prevailing are popularized in mobile Internet, the iteration cycle of software development is big Big shortening, user interaction participate in the custom of feedback and have formed, thus, user is obtained, is experienced often by refreshing firmware Value-added service, but above-mentioned management and control measures, it is impossible to channel is obtained to validated user Open Firmware, causes the decline of Consumer's Experience.
Content of the invention
For solving the above problems, the present invention proposes a kind of firmware protection location with flash memory microcontroller on piece and guarantor Maintaining method, it is allowed to the binary file of open firmware, keeps interactive with validated user, and software resource consumes little, pirate clone Difficulty is high, can the original side of effective protection interests.
The firmware protection location of the microcontroller of the present invention, including the firmware bag that publishes and Bootloader;Open Firmware bag by encryption instruct block and encryption after firmware constitute;The encryption instructs block to include the encryption partial zones of firmware The information in domain, it include side-play amount and length, orient ciphertext region during for decrypting;Also include the random of 16 bytes Number, for producing actual working key;The working key encryption algorithm adopts AES128, the computational methods of working key For:AES128-ECB mode encryption computings are carried out to the random number of 16 bytes with master key, and ciphertext result is actually used work Make key.
Further, the encryption regional area is sensitive critical code area.
A kind of firmware guard method of microcontroller, methods described are specific as follows:
First by being encrypted to firmware local, encryption every time is encrypted using different keys, then start-up loading journey Sequence Bootloader, carries out a machine one identification code and starts, rises level decryption firmware, firmware is stored in secure storage section completing.
Further, described to firmware local be encrypted specific as follows:
Firmware encrypting master key is stored in secure storage section, for the MCU with flash memory on piece, forbids debugging The passage for accessing flash memory on piece of mouth, makes flash memory on piece become secure storage section, master key is stored in flash memory on piece then Interior;During firmware encrypting, encrypted using regional area, may specify arbitrary region;During firmware encrypting, using working key encryption, per Secondary encryption is encrypted using different keys, even if in addition, firmware is constant, when issuing every time, firmware encrypting result still can be inconsistent; And the firmware bag for publishing, do not include Bootloader, but need to include that block is instructed in an encryption, for informing encryption Regional area, and the working key that auxiliary generation is actual.
Further, boot loader Bootloader is specific as follows:
Bootloader is stored in secure storage section, i.e., on piece in flash memory, now introduce the chip unique identification of MCU Code UID testing mechanisms, realize that one identification code of a machine starts;During factory burning Bootloader, Bootloader will read reality The UID of border MCU, writes the storage address that specifies inside Bootloader, and the UID after now storing becomes Bootloader itself A part;During starting up, Bootloader reads out UID from specified storage address, is compared with the UID of actual MCU Compared with unanimously then continuation starts, inconsistent then locked Bootloader;And when upgrading, Bootloader instructs area according to encryption Block, you can produce actual working key, correctly decrypts regional area, so as to by firmware full backup, be stored in safe storage In region.
The present invention compared with prior art, the present invention the firmware protection location with flash memory microcontroller on piece and guarantor Maintaining method, may specify the local cypher of arbitrary region, effectively reduce the software resource expense of encryption and decryption;The encryption of one-time pad, Can effective protection master key, every time the key of encryption is different, improves the difficulty for cracking;Firmware and Bootloader are deposited in itself Storage possesses certain difficulty that cracks, and one yard of a machine of Bootloader starts in secure storage areas, improves the difficulty for cracking again Degree, if on piece flash memory by Brute Force, so as to be read out complete binary file, but now in the binary file Bootloader, still be able to cannot run directly on the equipment of imitation because UID detections do not pass through;Accordingly, piracy side cannot Obtain key easily, it is impossible to decrypt firmware, therefore, firmware allows to be disclosed issue, good interaction can be kept with user.
Description of the drawings
Fig. 1 is the overall structure diagram of the present invention.
Specific embodiment
As shown in figure 1, the firmware protection location of the microcontroller of the present invention, including the firmware bag that publishes and Bootloader;Disclosed firmware bag instructs the firmware after block and encryption to constitute by encryption;The encryption instructs block to include The information of the encryption regional area of firmware, which includes side-play amount and length, orients ciphertext region during for decrypting;Also include one The random number of individual 16 byte, for producing actual working key.
Further, its AES of the firmware adopts the computational methods of AES128, working key to be:With master key pair The random number of 16 bytes carries out AES128-ECB mode encryption computings, and ciphertext result is actually used working key.
Further, the encryption regional area is sensitive critical code area;If so that not decrypting, program is just Cannot correctly start, run, for RTOS systems, the time reference of selectively actuatable system processes function and starts with, for example, For the ARM Cortex-M series platform products of a new generation, it is preferable that only need to fall the encryption of above 64 bytes, this part Including most crucial, the crucial parts of ARM Cortex-M, the time reference for wherein just having RTOS processes function SysTick_ The entry address of Handler.
A kind of firmware guard method of microcontroller, methods described are specific as follows:
First by being encrypted to firmware local, encryption every time is encrypted using different keys, then start-up loading journey Sequence Bootloader, carries out a machine one identification code and starts, rises level decryption firmware, firmware is stored in secure storage section completing.
Embodiment 1:
First, firmware encrypting master key is stored in secure storage section, for the MCU with flash memory on piece, is forbidden Fall the passage for accessing flash memory on piece of debugging mouth, make flash memory on piece become secure storage section, master key is stored in piece then In upper flash memory;During firmware encrypting, encrypted using regional area, may specify arbitrary region;During firmware encrypting, using working key plus Close, every time encryption is encrypted using different keys, even if in addition, firmware is constant, when issuing every time, firmware encrypting result still can not Unanimously;And the firmware bag for publishing, do not include Bootloader, but need to include that block is instructed in an encryption, for informing The regional area of encryption, and the working key that auxiliary generation is actual.
Secondly, Bootloader is stored in secure storage section, i.e., on piece in flash memory, now introduce the chip of MCU only One identification code UID testing mechanism, realizes that one identification code of a machine starts;During factory burning Bootloader, Bootloader will The UID of actual MCU is read, the storage address that specifies inside Bootloader is write, the UID after now storing becomes A part of Bootloader itself;During starting up, Bootloader reads out UID from specified storage address, with reality The UID of MCU is compared, and unanimously then continues to start, inconsistent then locked Bootloader;And when upgrading, Bootloader Block is instructed according to encryption, you can produce actual working key, correctly decrypt regional area, so as to by firmware full backup, It is stored in secure storage section.
When a software development cycle of equipment is completed, with working key, execute AES128's to encrypting regional area Encryption, realize one-time pad, local cypher, then packing firmware, publish external environment condition;The firmware bag for publishing Security context completes to build.
Above-mentioned master key and UID are stored in inside Bootloader, in the plant produced stage, master key with Mono- piece of Bootloader is burnt to flash memory on the piece of MCU, and UID then reads when MCU is first powered on, automatically and then writes; Simultaneously during factory burning Bootloader, the hardware security grade of MCU is improved, is forbidden on the access piece of any external interface The passage of flash memory, such as debugging mouth so that the data of flash memory on piece cannot be read easily from outside;During follow-up starting up, Bootloader can execute the detection of one yard of a machine, if the UID of MCU, inconsistent with the UID stored by Bootloader Words, then locked MCU, does not continue to down execute;During upgrading brush machine (refreshing firmware), Bootloader obtains encryption first and instructs Block, obtains the area information of encryption, and random number, and calculates actual AES128 working keys;Secondly receive follow-up Firmware program, and responded according to encryption section information in real time, when firmware program falls in this region, then need to carry out The decryption reduction of AES128-ECB patterns;Most whole firmware program full backup at last, is stored in flash memory on piece.
Compared with prior art, the firmware guard method of the microcontroller of the present invention may specify arbitrary region to the present invention Local cypher, effectively reduce the software resource expense of encryption and decryption;The encryption of one-time pad, can effective protection master key, every time The key of encryption is different, improves the difficulty for cracking;Firmware and Bootloader are stored in secure storage areas in itself, possess one Fixed cracks difficulty, and one yard of a machine of Bootloader starts, and improves the difficulty for cracking again, if on piece, flash memory is broken by violence Solution, so as to be read out complete binary file, but the now Bootloader in the binary file, can be because UID be examined Survey and do not pass through, cannot still run directly on the equipment of imitation;Accordingly, piracy side cannot obtain key easily, it is impossible to decrypt Firmware, therefore, firmware allows to be disclosed issue, can keep good interaction with user.
With the above-mentioned desirable embodiment according to the present invention as enlightenment, by above-mentioned description, relevant staff is complete Various change and modification can be carried out entirely in the range of without departing from this invention technological thought.The technology of this invention Property scope is not limited to the content on specification, it is necessary to determine its technical scope according to right.

Claims (6)

1. the firmware protection location of a kind of microcontroller, it is characterised in that:Including the firmware bag that publishes and Bootloader; Disclosed firmware bag instructs the firmware after block and encryption to constitute by encryption;The encryption instructs block to include the encryption office of firmware The information in portion region, it include side-play amount and length, orient ciphertext region during for decrypting;Also include 16 bytes with Machine number, for producing actual working key.
2. the firmware protection location of microcontroller according to claim 1, it is characterised in that:The firmware its AES Using AES128, the computational methods of working key are:AES128-ECB patterns are carried out with master key to the random number of 16 bytes to add Close computing, ciphertext result are actually used working key.
3. the firmware protection location of microcontroller according to claim 1, it is characterised in that:Described encryption regional area be Sensitive critical code area.
4. the firmware guard method of a kind of microcontroller, it is characterised in that:Methods described is specific as follows:
First by being encrypted to firmware local, encryption every time is encrypted using different keys, then boot loader Bootloader, carries out a machine one identification code and starts, rises level decryption firmware, firmware is stored in secure storage section completing.
5. the firmware guard method of microcontroller according to claim 4, it is characterised in that:Described to firmware local carry out Encryption is specific as follows:
Firmware encrypting master key is stored in secure storage section, for the MCU with flash memory on piece, forbids debugging mouth The passage of flash memory on piece is accessed, is made flash memory on piece become secure storage section, then master key is stored on piece in flash memory;Gu When part is encrypted, encrypted using regional area, may specify arbitrary region;During firmware encrypting, using working key encryption, encrypt every time Encrypted using different key, even if in addition, firmware is constant, when issuing every time, firmware encrypting result still can be inconsistent;And disclose The firmware bag of issue, does not include Bootloader, but needs to include that block is instructed in an encryption, for informing the partial zones of encryption Domain, and the working key that auxiliary generation is actual.
6. the firmware guard method of microcontroller according to claim 4, it is characterised in that:The boot loader Bootloader is specific as follows:
Bootloader is stored in secure storage section, i.e., on piece in flash memory, now introduce the chip unique identifier of MCU UID testing mechanisms, realize that one identification code of a machine starts;During factory burning Bootloader, Bootloader will read reality The UID of MCU, writes the storage address that specifies inside Bootloader, and the UID after now storing becomes Bootloader's itself A part;During starting up, Bootloader reads out UID from specified storage address, is compared with the UID of actual MCU Compared with unanimously then continuation starts, inconsistent then locked Bootloader;And when upgrading, Bootloader instructs area according to encryption Block, you can produce actual working key, correctly decrypts regional area, so as to by firmware full backup, be stored in safe storage In region.
CN201610971108.4A 2016-11-05 2016-11-05 A kind of firmware protection location and guard method with flash memory microcontroller on piece Pending CN106503494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610971108.4A CN106503494A (en) 2016-11-05 2016-11-05 A kind of firmware protection location and guard method with flash memory microcontroller on piece

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610971108.4A CN106503494A (en) 2016-11-05 2016-11-05 A kind of firmware protection location and guard method with flash memory microcontroller on piece

Publications (1)

Publication Number Publication Date
CN106503494A true CN106503494A (en) 2017-03-15

Family

ID=58323077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610971108.4A Pending CN106503494A (en) 2016-11-05 2016-11-05 A kind of firmware protection location and guard method with flash memory microcontroller on piece

Country Status (1)

Country Link
CN (1) CN106503494A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632024A (en) * 2017-03-21 2018-10-09 中兴通讯股份有限公司 A kind of method and device of operation bootstrap
CN108681459A (en) * 2018-03-26 2018-10-19 深圳前海有电物联科技有限公司 A kind of firmware update of intelligent hardware devices, apparatus and system
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN109495527A (en) * 2017-09-12 2019-03-19 北京普源精电科技有限公司 A kind of upgrade method and oscillograph of oscillograph
CN109598105A (en) * 2018-12-03 2019-04-09 深圳忆联信息系统有限公司 A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware
CN109828763A (en) * 2018-12-24 2019-05-31 惠州市蓝微电子有限公司 A kind of method of closed loop burning calibration
CN109889333A (en) * 2019-01-24 2019-06-14 深圳忆联信息系统有限公司 Firmware data encryption method, device, computer equipment and storage medium
CN109934024A (en) * 2019-03-12 2019-06-25 深圳忆联信息系统有限公司 A kind of flash data encryption and decryption optimization method and its system
CN110008724A (en) * 2019-03-29 2019-07-12 记忆科技(深圳)有限公司 Solid-state hard disk controller method for secure loading, device and storage medium
CN110545175A (en) * 2019-08-23 2019-12-06 国网湖北省电力有限公司电力科学研究院 A security authentication method for communication protocol between charging pile and electric vehicle
CN112100624A (en) * 2020-08-24 2020-12-18 泰斗微电子科技有限公司 Firmware protection method and device and terminal equipment
CN112231649A (en) * 2020-10-19 2021-01-15 迅镭智能(广州)科技有限公司 A firmware encryption processing method, device, device and medium
CN113326512A (en) * 2021-05-21 2021-08-31 深圳矽递科技股份有限公司 Electronic equipment and MCU firmware protection method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043641A (en) * 2009-10-22 2011-05-04 盛大计算机(上海)有限公司 Firmware upgrading method of electronic equipment
CN103577765A (en) * 2012-08-08 2014-02-12 解放日报报业集团 Method for encrypting and decrypting streaming document and device thereof
CN105574441A (en) * 2015-11-09 2016-05-11 北京中电华大电子设计有限责任公司 Embedded firmware protection method and device
CN105808978A (en) * 2016-03-02 2016-07-27 上海斐讯数据通信技术有限公司 Single chip firmware-based hardware pirate preventing method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043641A (en) * 2009-10-22 2011-05-04 盛大计算机(上海)有限公司 Firmware upgrading method of electronic equipment
CN103577765A (en) * 2012-08-08 2014-02-12 解放日报报业集团 Method for encrypting and decrypting streaming document and device thereof
CN105574441A (en) * 2015-11-09 2016-05-11 北京中电华大电子设计有限责任公司 Embedded firmware protection method and device
CN105808978A (en) * 2016-03-02 2016-07-27 上海斐讯数据通信技术有限公司 Single chip firmware-based hardware pirate preventing method and system

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632024A (en) * 2017-03-21 2018-10-09 中兴通讯股份有限公司 A kind of method and device of operation bootstrap
CN109495527B (en) * 2017-09-12 2021-11-02 北京普源精电科技有限公司 An oscilloscope upgrade method and oscilloscope
CN109495527A (en) * 2017-09-12 2019-03-19 北京普源精电科技有限公司 A kind of upgrade method and oscillograph of oscillograph
CN108681459A (en) * 2018-03-26 2018-10-19 深圳前海有电物联科技有限公司 A kind of firmware update of intelligent hardware devices, apparatus and system
CN109598105A (en) * 2018-12-03 2019-04-09 深圳忆联信息系统有限公司 A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware
CN109828763A (en) * 2018-12-24 2019-05-31 惠州市蓝微电子有限公司 A kind of method of closed loop burning calibration
CN109462477B (en) * 2018-12-28 2021-05-25 芯海科技(深圳)股份有限公司 White box encryption method based on Internet of things embedded equipment
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN109889333A (en) * 2019-01-24 2019-06-14 深圳忆联信息系统有限公司 Firmware data encryption method, device, computer equipment and storage medium
CN109889333B (en) * 2019-01-24 2022-03-29 深圳忆联信息系统有限公司 Firmware data encryption method and device, computer equipment and storage medium
CN109934024A (en) * 2019-03-12 2019-06-25 深圳忆联信息系统有限公司 A kind of flash data encryption and decryption optimization method and its system
CN110008724A (en) * 2019-03-29 2019-07-12 记忆科技(深圳)有限公司 Solid-state hard disk controller method for secure loading, device and storage medium
CN110008724B (en) * 2019-03-29 2023-03-21 记忆科技(深圳)有限公司 Solid state hard disk controller safe loading method and device and storage medium
CN110545175A (en) * 2019-08-23 2019-12-06 国网湖北省电力有限公司电力科学研究院 A security authentication method for communication protocol between charging pile and electric vehicle
CN110545175B (en) * 2019-08-23 2022-08-26 国网湖北省电力有限公司电力科学研究院 Security authentication method for communication protocol of charging pile and electric vehicle
CN112100624A (en) * 2020-08-24 2020-12-18 泰斗微电子科技有限公司 Firmware protection method and device and terminal equipment
CN112231649A (en) * 2020-10-19 2021-01-15 迅镭智能(广州)科技有限公司 A firmware encryption processing method, device, device and medium
CN113326512A (en) * 2021-05-21 2021-08-31 深圳矽递科技股份有限公司 Electronic equipment and MCU firmware protection method thereof

Similar Documents

Publication Publication Date Title
CN106503494A (en) A kind of firmware protection location and guard method with flash memory microcontroller on piece
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
KR100792287B1 (en) Security method using self-generated encryption key and applied security device
CN100377028C (en) Semiconductor device with encryption part or external interface and content reproduction method
RU2541196C2 (en) Method of providing software integrity
WO2004006075A1 (en) Open type general-purpose attack-resistant cpu, and application system thereof
CN106599629B (en) Android application program reinforcing method and device
CN101872404B (en) Method for protecting Java software program
JPH11509023A (en) Protecting software against unauthorized use
CN105637800A (en) Keying infrastructure
CA2925733A1 (en) Encryption and decryption processing method, apparatus, and device
CN105612715A (en) Security processing unit with configurable access control
CN104486355A (en) Method and device for preventing malicious manipulation of codes
WO2023240866A1 (en) Cipher card and root key protection method therefor, and computer readable storage medium
CN104850764A (en) Smart card based software protection method and system
CN109446757B (en) Method for protecting general MCU program
CN1323350C (en) Method for securing program in LSI, program development support device and method thereof
US8479014B1 (en) Symmetric key based secure microprocessor and its applications
CN105574441A (en) Embedded firmware protection method and device
WO2015154469A1 (en) Database operation method and device
CN101950345B (en) Hardware decryption-based high-reliability terminal equipment and working method thereof
CN112241523A (en) Embedded computer starting-up identity authentication method
CN102937907A (en) Method for utilizing secure digital (SD) card to perform licensed software installation and update
CN114816549B (en) A method and system for protecting bootloader and its environment variables
CN113542303B (en) Software importing system and method for secret key in non-trusted environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170315