[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112711752A - Embedded equipment safety system - Google Patents

Embedded equipment safety system Download PDF

Info

Publication number
CN112711752A
CN112711752A CN202011629861.8A CN202011629861A CN112711752A CN 112711752 A CN112711752 A CN 112711752A CN 202011629861 A CN202011629861 A CN 202011629861A CN 112711752 A CN112711752 A CN 112711752A
Authority
CN
China
Prior art keywords
module
subsystem
storage resource
embedded
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011629861.8A
Other languages
Chinese (zh)
Inventor
黄龙飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pan Yu Network Technology Co ltd
Original Assignee
Shanghai Pan Yu Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pan Yu Network Technology Co ltd filed Critical Shanghai Pan Yu Network Technology Co ltd
Priority to CN202011629861.8A priority Critical patent/CN112711752A/en
Publication of CN112711752A publication Critical patent/CN112711752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

An embedded device security system, comprising a security architecture subsystem, a security boot subsystem, a software encryption subsystem, and a security storage subsystem: the safety framework subsystem is in communication connection with the safety starting subsystem, the software encryption subsystem and the safety storage subsystem; the safety promoter system comprises an embedded processor, a nonvolatile memory, an FPGA and an external boot ROM; the software encryption subsystem comprises a key generation module, a key verification module and a software operation module; the safe storage subsystem comprises a storage resource description module, a storage resource allocation module, a storage resource recovery module and a storage resource safety management module. The method and the device are beneficial to ensuring that the system is not tampered and damaged by malicious programs or unauthorized persons when being started, so that the embedded equipment is not easily replaced or tampered and damaged by the malicious programs, the equipment safety is ensured, the safe operation of software and the safe storage of resources can be carried out, and the reliability and the safety of the embedded equipment are obviously improved.

Description

Embedded equipment safety system
Technical Field
The invention relates to the technical field of embedded equipment, in particular to a safety system of embedded equipment.
Background
The embedded device mainly comprises an embedded processor, related supporting hardware and an embedded software system, and is an independent working device integrating software and hardware; the embedded processor mainly comprises a single chip microcomputer or a microcontroller, and related supporting hardware comprises a display card, a storage medium, communication equipment, reading equipment of an IC card or a credit card and the like; the embedded system is different from a general computer processing system, does not have a large-capacity storage medium like a hard disk, and mostly uses a flash memory as the storage medium, wherein the embedded software comprises bottom layer software related to hardware, an operating system, a graphical interface, a communication protocol, a database system, a standardized browser, application software and the like; with the wide application of embedded devices in the important field of security, more and more embedded devices are illegally invaded and damaged, the problem that important information data is stolen to be secret and the like already causes huge economic loss, and for system hardware, safety problems of hardware trojans, side channel attacks, reverse hardware engineering and the like exist; for system software, there are security problems such as code integrity attack, application software attack, private data theft attack, and the like, so the security performance of the embedded device needs to be improved, so that the embedded device can operate safely and normally.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an embedded device security system which is beneficial to ensuring that the system is not tampered and damaged by malicious programs or unauthorized persons when being started, so that the embedded device is not easily replaced or tampered and damaged by the malicious programs, the device security is ensured, the safe operation of software and the safe storage of resources can be carried out, and the reliability and the security of the embedded device are obviously improved.
(II) technical scheme
The invention provides an embedded equipment safety system, which comprises a safety framework subsystem, a safety starting subsystem, a software encryption subsystem and a safety storage subsystem:
the safety architecture subsystem is in communication connection with the safety starting subsystem, the software encryption subsystem and the safety storage subsystem, and is used for constructing an embedded equipment network safety system;
the safety promoter system comprises an embedded processor, a nonvolatile memory, an FPGA and an external boot ROM; the embedded processor also comprises an address bus, a data bus and a control bus, the embedded processor is in communication connection with the nonvolatile memory through the address bus, the data bus and the control bus, the address bus and the control bus are in communication connection with the external boot ROM through the FPGA, and the data bus is in communication connection with the external boot ROM;
the software encryption subsystem comprises a key generation module, a key verification module and a software operation module; the key generation module is used for generating an encryption key; the key checking module is used for acquiring a decryption key and checking the key; the software running module is used for starting software running or stopping software running according to the checking result;
the safe storage subsystem comprises a storage resource description module, a storage resource allocation module, a storage resource recovery module and a storage resource safety management module; the storage resource description module is used for providing a compact embedded system CPU system architecture and storage resource description and sending storage resource description information to the storage resource allocation module; the storage resource allocation module establishes a storage resource pool through the information provided by the storage resource description module, and reasonably allocates the storage resources in the storage resource pool in a static and dynamic combination mode according to the application requirements of the embedded system; the storage resource recovery module is used for performing recovery management on the storage resources released by the system and compressing and decompressing the temporarily unused data; and the storage resource security management module is used for monitoring the storage resources which are distributed to the application by the storage resource distribution module.
Preferably, the specific steps of the secure boot subsystem are as follows:
establishing a safe starting authentication environment and executing a safe starting authentication module;
after the embedded processor is reset, a safety starting authentication module in the external starting ROM is preferentially executed, and safety authentication detection is carried out on a starting program of the embedded equipment;
and judging whether the starting program is safe or not according to the execution result of the safe starting authentication module, if the starting program is safe, starting to execute the starting program, and if the starting program is unsafe, stopping executing the starting program.
Preferably, in the secure boot subsystem, the FPGA chip integrates a communication module, a pci eip interface, an embedded CPU, and an algorithm module; the algorithm module provides three types of algorithm IP cores of SM2, SM3 and SM 4; the PCIeIP interface is used for providing a PCIe fast channel to the outside; the communication module comprises a management channel and an algorithm channel, wherein the management channel is used for realizing transmission management of the data packet in the signal channel, and the algorithm channel distributes mutually independent logic resources and high-speed buffer areas for the algorithms supported in the algorithm module; the algorithm module is used for carrying out operation based on a preset algorithm.
Preferably, in the secure boot subsystem, the enable terminal of the nonvolatile memory is connected with the CS1 chip select signal terminal of the embedded processor, and the address space of the nonvolatile memory is configured by the address register corresponding to CS 1; the enabling end of the external boot ROM is connected with a CS0 chip selection signal end of the embedded processor; the address signal and the CS0 chip selection signal are firstly decoded and controlled by the FPGA and then are connected to the external boot ROM, and the address space of the external boot ROM is configured by an address register corresponding to the CS 0.
Preferably, the specific working process of the software encryption subsystem is as follows:
when burning software, the key generation module acquires the MAC address of the embedded equipment and obtains an encryption key through a secure hash algorithm on the MAC address;
when software is started, a key verification module acquires an MAC address of embedded equipment of the software to be started at present and obtains a decryption key by operating the MAC address;
the key verification module compares whether the decryption key is consistent with the encryption key, when the decryption key is consistent with the encryption key, the software running module starts software running, and when the decryption key is inconsistent with the encryption key, the software running module stops software running.
Preferably, in the software encryption subsystem, the key generation module includes an encrypted plaintext acquisition submodule, an encrypted seed acquisition submodule and an encrypted key generation submodule; the key checking module comprises a decrypted plaintext obtaining sub-module, a decrypted key generating sub-module, a comparison checking sub-module and a decrypted seed obtaining sub-module.
Preferably, the encrypted plaintext acquisition submodule is used for acquiring the MAC address of the embedded device when burning the software, so as to obtain an encrypted plaintext; the encryption seed obtaining submodule is used for obtaining the serial number or the model of the embedded equipment when burning the software so as to obtain an encryption seed; the encryption key generation submodule is used for operating the encrypted plaintext and the encryption seed to obtain an encryption key;
the decryption plaintext acquisition submodule is used for acquiring the MAC address of the embedded equipment to be started at present so as to obtain a decryption plaintext; the decryption key generation submodule is used for operating the decrypted plaintext and the decrypted seed to obtain a decryption key; the comparison and check submodule is used for comparing whether the decryption key is consistent with the encryption key; and the decryption seed obtaining submodule is used for obtaining the serial number or the equipment model of the embedded equipment so as to obtain the decryption seed.
Preferably, in the secure storage subsystem, the storage resource description module includes a system architecture description submodule and a system storage resource description submodule, and the storage resource allocation module includes a storage resource pool establishment submodule and a system storage resource allocation submodule; the system architecture description submodule comprises a CPU architecture and an MCU bus architecture of the embedded MCU.
Preferably, the storage resource pool establishing submodule is used for completing the establishment of a system resource pool of the storage resources; the system storage resource submodule is used for distributing the storage resources according to the application requirements of the embedded system.
Preferably, in the secure storage subsystem, the storage resource security management module is further configured to discover an abnormal condition of an illegal access to the storage resource and a physical damage to the storage resource, so as to ensure a safe and reliable operation of the system.
The technical scheme of the invention has the following beneficial technical effects:
the safety framework subsystem constructs an embedded equipment network safety system; the safe starting subsystem is used for safely starting the embedded equipment system, the software encryption subsystem is used for safely and stably running software, and the safe storage subsystem can safely store resources;
the method and the device are beneficial to ensuring that the system is not tampered and damaged by malicious programs or unauthorized persons when being started, so that the embedded equipment is not easily replaced or tampered and damaged by the malicious programs, the equipment safety is ensured, the safe operation of software and the safe storage of resources can be carried out, and the reliability and the safety of the embedded equipment are obviously improved.
Drawings
Fig. 1 is a system block diagram of an embedded device security system according to the present invention.
Fig. 2 is a system block diagram of a secure boot subsystem in an embedded device security system according to the present invention.
Fig. 3 is a system block diagram of a software encryption subsystem in an embedded device security system according to the present invention.
Fig. 4 is a system block diagram of a key generation module in an embedded device security system according to the present invention.
Fig. 5 is a system block diagram of a key checking module in the security system of an embedded device according to the present invention.
Fig. 6 is a flowchart illustrating a secure boot of a secure boot subsystem in a security system of an embedded device according to the present invention.
Fig. 7 is a flowchart illustrating the operation of a software encryption subsystem in the security system of an embedded device according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1 to 7, the embedded device security system provided by the present invention includes a security architecture subsystem, a security boot subsystem, a software encryption subsystem, and a security storage subsystem:
the safety architecture subsystem is in communication connection with the safety starting subsystem, the software encryption subsystem and the safety storage subsystem, and is used for constructing an embedded equipment network safety system;
the safety promoter system comprises an embedded processor, a nonvolatile memory, an FPGA and an external boot ROM; the embedded processor also comprises an address bus, a data bus and a control bus, the embedded processor is in communication connection with the nonvolatile memory through the address bus, the data bus and the control bus, the address bus and the control bus are in communication connection with the external boot ROM through the FPGA, and the data bus is in communication connection with the external boot ROM;
the software encryption subsystem comprises a key generation module, a key verification module and a software operation module; the key generation module is used for generating an encryption key; the key checking module is used for acquiring a decryption key and checking the key; the software running module is used for starting software running or stopping software running according to the checking result;
the safe storage subsystem comprises a storage resource description module, a storage resource allocation module, a storage resource recovery module and a storage resource safety management module; the storage resource description module is used for providing a compact embedded system CPU system architecture and storage resource description and sending storage resource description information to the storage resource allocation module; the storage resource allocation module establishes a storage resource pool through the information provided by the storage resource description module, and reasonably allocates the storage resources in the storage resource pool in a static and dynamic combination mode according to the application requirements of the embedded system; the storage resource recovery module is used for performing recovery management on the storage resources released by the system and compressing and decompressing the temporarily unused data; and the storage resource security management module is used for monitoring the storage resources which are distributed to the application by the storage resource distribution module.
In an alternative embodiment, the specific steps of the secure boot subsystem for secure boot are as follows: establishing a safe starting authentication environment and executing a safe starting authentication module; after the embedded processor is reset, a safety starting authentication module in the external starting ROM is preferentially executed, and safety authentication detection is carried out on a starting program of the embedded equipment; and judging whether the starting program is safe or not according to the execution result of the safe starting authentication module, if the starting program is safe, starting to execute the starting program, and if the starting program is unsafe, stopping executing the starting program.
In an optional embodiment, in the secure boot subsystem, the FPGA chip integrates a communication module, a pcie ip interface, an embedded CPU, and an algorithm module; the algorithm module provides three types of algorithm IP cores of SM2, SM3 and SM 4; the PCIeIP interface is used for providing a PCIe fast channel to the outside; the communication module comprises a management channel and an algorithm channel, wherein the management channel is used for realizing transmission management of the data packet in the signal channel, and the algorithm channel distributes mutually independent logic resources and high-speed buffer areas for the algorithms supported in the algorithm module; the algorithm module is used for performing operation based on a preset algorithm; the enabling end of the nonvolatile memory is connected with a CS1 chip selection signal end of the embedded processor, and the address space of the nonvolatile memory is configured by an address register corresponding to the CS 1; the enabling end of the external boot ROM is connected with a CS0 chip selection signal end of the embedded processor; the address signal and the CS0 chip selection signal are firstly decoded and controlled by the FPGA and then are connected to the external boot ROM, and the address space of the external boot ROM is configured by an address register corresponding to the CS 0.
In an alternative embodiment, the specific working process of the software encryption subsystem is as follows: when burning software, the key generation module acquires the MAC address of the embedded equipment and obtains an encryption key through a secure hash algorithm on the MAC address; when software is started, a key verification module acquires an MAC address of embedded equipment of the software to be started at present and obtains a decryption key by operating the MAC address; the key verification module compares whether the decryption key is consistent with the encryption key, when the decryption key is consistent with the encryption key, the software running module starts software running, and when the decryption key is inconsistent with the encryption key, the software running module stops software running.
In an optional embodiment, in the software encryption subsystem, the key generation module includes an encrypted plaintext acquisition sub-module, an encrypted seed acquisition sub-module, and an encrypted key generation sub-module; the key checking module comprises a decrypted plaintext obtaining sub-module, a decrypted key generating sub-module, a comparison checking sub-module and a decrypted seed obtaining sub-module; the encrypted plaintext acquisition submodule is used for acquiring the MAC address of the embedded equipment when burning software so as to obtain an encrypted plaintext; the encryption seed obtaining submodule is used for obtaining the serial number or the model of the embedded equipment when burning the software so as to obtain an encryption seed; the encryption key generation submodule is used for operating the encrypted plaintext and the encryption seed to obtain an encryption key; the decryption plaintext acquisition submodule is used for acquiring the MAC address of the embedded equipment to be started at present so as to obtain a decryption plaintext; the decryption key generation submodule is used for operating the decrypted plaintext and the decrypted seed to obtain a decryption key; the comparison and check submodule is used for comparing whether the decryption key is consistent with the encryption key; and the decryption seed obtaining submodule is used for obtaining the serial number or the equipment model of the embedded equipment so as to obtain the decryption seed.
In an optional embodiment, in the secure storage subsystem, the storage resource description module includes a system architecture description submodule and a system storage resource description submodule, and the storage resource allocation module includes a storage resource pool establishment submodule and a system storage resource allocation submodule; the system architecture description submodule comprises a CPU architecture and an MCU bus architecture of an embedded MCU; the storage resource pool establishing submodule is used for completing the establishment of a system resource pool of the storage resources; the system storage resource submodule is used for distributing the application requirements according to the embedded system and distributing the storage resources; the storage resource safety management module is also used for discovering the abnormal conditions of illegal access of the storage resources and physical damage of the storage resources so as to ensure the safe and reliable operation of the system.
In the invention, when in use, the safety architecture subsystem constructs an embedded equipment network safety system; the safety starting subsystem comprises an embedded processor, a nonvolatile memory, an FPGA (field programmable gate array) and an external starting ROM (read only memory), the embedded processor also comprises an address bus, a data bus and a control bus, the embedded processor is in communication connection with the nonvolatile memory through the address bus, the data bus and the control bus, the address bus and the control bus are in communication connection with the external starting ROM through the FPGA, the data bus is in communication connection with the external starting ROM and is used for safely starting the embedded equipment system, and the software encryption subsystem comprises a secret key generation module, a secret key verification module and a software operation module; the key generation module is used for generating an encryption key, the key verification module is used for acquiring a decryption key and verifying the key, and the software operation module is used for starting or stopping software operation according to a verification result and is used for safe and stable operation of the software; the safe storage subsystem comprises a storage resource description module, a storage resource allocation module, a storage resource recovery module and a storage resource safety management module, wherein the storage resource description module provides a compact embedded system CPU system framework and storage resource description and sends storage resource description information to the storage resource allocation module, the storage resource allocation module establishes a storage resource pool through the information provided by the storage resource description module and reasonably allocates the storage resources in the storage resource pool in a static and dynamic combined mode according to the application requirements of the embedded system, the storage resource recovery module is used for recovering and managing the storage resources released by the system and compressing and decompressing the temporarily unused data, and the storage resource safety management module is used for monitoring the storage resources allocated to the application by the storage resource allocation module, the safe storage of resources is realized;
the method and the device are beneficial to ensuring that the system is not tampered and damaged by malicious programs or unauthorized persons when being started, so that the embedded equipment is not easily replaced or tampered and damaged by the malicious programs, the equipment safety is ensured, the safe operation of software and the safe storage of resources can be carried out, and the reliability and the safety of the embedded equipment are obviously improved.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (10)

1. An embedded device security system, comprising a security architecture subsystem, a security boot subsystem, a software encryption subsystem, and a security storage subsystem:
the safety architecture subsystem is in communication connection with the safety starting subsystem, the software encryption subsystem and the safety storage subsystem, and is used for constructing an embedded equipment network safety system;
the safety promoter system comprises an embedded processor, a nonvolatile memory, an FPGA and an external boot ROM; the embedded processor also comprises an address bus, a data bus and a control bus, the embedded processor is in communication connection with the nonvolatile memory through the address bus, the data bus and the control bus, the address bus and the control bus are in communication connection with the external boot ROM through the FPGA, and the data bus is in communication connection with the external boot ROM;
the software encryption subsystem comprises a key generation module, a key verification module and a software operation module; the key generation module is used for generating an encryption key; the key checking module is used for acquiring a decryption key and checking the key; the software running module is used for starting software running or stopping software running according to the checking result;
the safe storage subsystem comprises a storage resource description module, a storage resource allocation module, a storage resource recovery module and a storage resource safety management module; the storage resource description module is used for providing a compact embedded system CPU system architecture and storage resource description and sending storage resource description information to the storage resource allocation module; the storage resource allocation module establishes a storage resource pool through the information provided by the storage resource description module, and reasonably allocates the storage resources in the storage resource pool in a static and dynamic combination mode according to the application requirements of the embedded system; the storage resource recovery module is used for performing recovery management on the storage resources released by the system and compressing and decompressing the temporarily unused data; and the storage resource security management module is used for monitoring the storage resources which are distributed to the application by the storage resource distribution module.
2. The embedded device security system of claim 1, wherein the steps of the secure boot subsystem for secure boot are as follows:
establishing a safe starting authentication environment and executing a safe starting authentication module;
after the embedded processor is reset, a safety starting authentication module in the external starting ROM is preferentially executed, and safety authentication detection is carried out on a starting program of the embedded equipment;
and judging whether the starting program is safe or not according to the execution result of the safe starting authentication module, if the starting program is safe, starting to execute the starting program, and if the starting program is unsafe, stopping executing the starting program.
3. The embedded device security system of claim 1, wherein the FPGA chip integrates the communication module, the pcie ip interface, the embedded CPU, and the algorithm module in the secure boot subsystem; the algorithm module provides three types of algorithm IP cores of SM2, SM3 and SM 4; the PCIeIP interface is used for providing a PCIe fast channel to the outside; the communication module comprises a management channel and an algorithm channel, wherein the management channel is used for realizing transmission management of the data packet in the signal channel, and the algorithm channel distributes mutually independent logic resources and high-speed buffer areas for the algorithms supported in the algorithm module; the algorithm module is used for carrying out operation based on a preset algorithm.
4. The embedded device security system of claim 1, wherein in the secure boot subsystem, the enable terminal of the non-volatile memory is connected to the CS1 chip select signal terminal of the embedded processor, and the address space of the non-volatile memory is configured by the address register corresponding to the CS 1; the enabling end of the external boot ROM is connected with a CS0 chip selection signal end of the embedded processor; the address signal and the CS0 chip selection signal are firstly decoded and controlled by the FPGA and then are connected to the external boot ROM, and the address space of the external boot ROM is configured by an address register corresponding to the CS 0.
5. The embedded device security system of claim 1, wherein the software encryption subsystem operates as follows:
when burning software, the key generation module acquires the MAC address of the embedded equipment and obtains an encryption key through a secure hash algorithm on the MAC address;
when software is started, a key verification module acquires an MAC address of embedded equipment of the software to be started at present and obtains a decryption key by operating the MAC address;
the key verification module compares whether the decryption key is consistent with the encryption key, when the decryption key is consistent with the encryption key, the software running module starts software running, and when the decryption key is inconsistent with the encryption key, the software running module stops software running.
6. The embedded device security system of claim 1, wherein in the software encryption subsystem, the key generation module comprises an encrypted plaintext acquisition sub-module, an encrypted seed acquisition sub-module, and an encrypted key generation sub-module; the key checking module comprises a decrypted plaintext obtaining sub-module, a decrypted key generating sub-module, a comparison checking sub-module and a decrypted seed obtaining sub-module.
7. The embedded device security system of claim 6, wherein the encrypted plaintext acquisition submodule is configured to acquire the MAC address of the embedded device during burning of the software to obtain the encrypted plaintext; the encryption seed obtaining submodule is used for obtaining the serial number or the model of the embedded equipment when burning the software so as to obtain an encryption seed; the encryption key generation submodule is used for operating the encrypted plaintext and the encryption seed to obtain an encryption key;
the decryption plaintext acquisition submodule is used for acquiring the MAC address of the embedded equipment to be started at present so as to obtain a decryption plaintext; the decryption key generation submodule is used for operating the decrypted plaintext and the decrypted seed to obtain a decryption key; the comparison and check submodule is used for comparing whether the decryption key is consistent with the encryption key; and the decryption seed obtaining submodule is used for obtaining the serial number or the equipment model of the embedded equipment so as to obtain the decryption seed.
8. The embedded device security system of claim 1, wherein in the secure storage subsystem, the storage resource description module comprises a system architecture description submodule and a system storage resource description submodule, and the storage resource allocation module comprises a storage resource pool establishment submodule and a system storage resource allocation submodule; the system architecture description submodule comprises a CPU architecture and an MCU bus architecture of the embedded MCU.
9. The embedded device security system of claim 8, wherein the storage resource pool establishment sub-module is configured to complete establishment of the system resource pool of storage resources; the system storage resource submodule is used for distributing the storage resources according to the application requirements of the embedded system.
10. The embedded device security system of claim 1, wherein in the secure storage subsystem, the storage resource security management module is further configured to discover an abnormal situation of an illegal access to the storage resource or a physical damage to the storage resource, so as to ensure a secure and reliable operation of the system.
CN202011629861.8A 2020-12-31 2020-12-31 Embedded equipment safety system Pending CN112711752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011629861.8A CN112711752A (en) 2020-12-31 2020-12-31 Embedded equipment safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011629861.8A CN112711752A (en) 2020-12-31 2020-12-31 Embedded equipment safety system

Publications (1)

Publication Number Publication Date
CN112711752A true CN112711752A (en) 2021-04-27

Family

ID=75547750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011629861.8A Pending CN112711752A (en) 2020-12-31 2020-12-31 Embedded equipment safety system

Country Status (1)

Country Link
CN (1) CN112711752A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113886834A (en) * 2021-09-29 2022-01-04 南方科技大学 ARM architecture-based GPU trusted execution method, system, equipment and storage medium
CN114861191A (en) * 2022-04-27 2022-08-05 北京计算机技术及应用研究所 Embedded equipment safety starting framework and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765987A (en) * 2015-04-17 2015-07-08 深圳市西迪特科技有限公司 System and method for embedded device software encryption
CN104866343A (en) * 2015-05-15 2015-08-26 长城信息产业股份有限公司 Security startup method for embedded equipment and securely-started embedded equipment
CN107092562A (en) * 2017-04-10 2017-08-25 中云信安(深圳)科技有限公司 A kind of embedded device secure storage management system and method
CN110851885A (en) * 2019-11-08 2020-02-28 北京计算机技术及应用研究所 Embedded system safety protection architecture system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765987A (en) * 2015-04-17 2015-07-08 深圳市西迪特科技有限公司 System and method for embedded device software encryption
CN104866343A (en) * 2015-05-15 2015-08-26 长城信息产业股份有限公司 Security startup method for embedded equipment and securely-started embedded equipment
CN107092562A (en) * 2017-04-10 2017-08-25 中云信安(深圳)科技有限公司 A kind of embedded device secure storage management system and method
CN110851885A (en) * 2019-11-08 2020-02-28 北京计算机技术及应用研究所 Embedded system safety protection architecture system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113886834A (en) * 2021-09-29 2022-01-04 南方科技大学 ARM architecture-based GPU trusted execution method, system, equipment and storage medium
CN113886834B (en) * 2021-09-29 2022-06-21 南方科技大学 ARM architecture-based GPU trusted execution method, system, equipment and storage medium
CN114861191A (en) * 2022-04-27 2022-08-05 北京计算机技术及应用研究所 Embedded equipment safety starting framework and method
CN114861191B (en) * 2022-04-27 2024-04-05 北京计算机技术及应用研究所 Embedded equipment safe starting architecture and method

Similar Documents

Publication Publication Date Title
CN109858265B (en) Encryption method, device and related equipment
CN111723383B (en) Data storage and verification method and device
CN102624699B (en) Method and system for protecting data
CN107463838B (en) Method for safety monitoring, device, system and storage medium based on SGX
CN202795383U (en) Device and system for protecting data
WO2021164166A1 (en) Service data protection method, apparatus and device, and readable storage medium
US20100185843A1 (en) Hardware encrypting storage device with physically separable key storage device
CN107908574B (en) Safety protection method for solid-state disk data storage
CN105260663A (en) Secure storage service system and method based on TrustZone technology
JP2006501581A (en) Encapsulation of reliable platform module functions by TCPA inside server management coprocessor subsystem
US11469880B2 (en) Data at rest encryption (DARE) using credential vault
CN107430658A (en) Fail-safe software certification and checking
CN109086620B (en) Physical isolation dual-system construction method based on mobile storage medium
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN112711752A (en) Embedded equipment safety system
CN116126463A (en) Memory access method, configuration method, computer system and related devices
CN113127141B (en) Container system management method and device, terminal equipment and storage medium
CN109583196B (en) Key generation method
WO2020207292A1 (en) Data security processing system and method, storage medium, processor, and hardware security card
CN113342896A (en) Scientific research data security protection system based on cloud fusion and working method thereof
CN111339578A (en) Key access method, device, system, equipment and storage medium
CN112363800A (en) Network card memory access method, security processor, network card and electronic equipment
CN115361140B (en) Method and device for verifying security chip key
CN110781472A (en) Fingerprint data storage and verification method, terminal and storage medium
CN115776405A (en) Embedded equipment terminal safety protection method, device and system for smart power grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210427