CN103377350A - Method and device for protecting codes of embedded software by hardware encryption module - Google Patents

Method and device for protecting codes of embedded software by hardware encryption module Download PDF

Info

Publication number
CN103377350A
CN103377350A CN2012101194471A CN201210119447A CN103377350A CN 103377350 A CN103377350 A CN 103377350A CN 2012101194471 A CN2012101194471 A CN 2012101194471A CN 201210119447 A CN201210119447 A CN 201210119447A CN 103377350 A CN103377350 A CN 103377350A
Authority
CN
China
Prior art keywords
password
register
module
storage area
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101194471A
Other languages
Chinese (zh)
Inventor
韩东坡
高占东
金传恩
阎斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEFEI KESHENG MICROELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
HEFEI KESHENG MICROELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HEFEI KESHENG MICROELECTRONIC TECHNOLOGY Co Ltd filed Critical HEFEI KESHENG MICROELECTRONIC TECHNOLOGY Co Ltd
Priority to CN2012101194471A priority Critical patent/CN103377350A/en
Publication of CN103377350A publication Critical patent/CN103377350A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a technique for protecting codes of embedded software by a hardware encryption module. The main function of the technique includes that a code space is encrypted according to needs of users in different hierarchies to enable the code space to be separated from other levels to enter an encryption state. Each user is managed in a hierarchy manner by the technique, the users in each hierarchy provide user interfaces to lower-level users, rest codes can be placed in a protected range, the lower-level users must perform related configuration according to the interfaces provided by upper-level users, and a principal layer is prohibited to directly read and modify code spaces of other hierarchies. The technique can effectively protect key data information of manufacturers, and the key data information can be prevented from being read and modified by other manufacturers.

Description

Utilize hardware encryption module to realize the method and apparatus of the code protection of embedded software
Technical field
The present invention relates to a kind of technology of utilizing hardware module to realize the embedded software code protection, mainly is that code and the data message that will need protection is encrypted protection, and making it is transparent to external world, in order to prevent the leakage of gordian technique and information.
Background technology
Along with the development of built-in system software, the development of a complete system software is not undertaken by a manufacturer usually fully, usually is from upstream to the participation that the downstream can relate to a lot of manufacturers.Therefore the cooperation of upstream and downstream just becomes particularly important, therefore when carrying out product development, all can use some technical information and the relevant documentation that front end manufacturer provides from the nearest manufacturer of end user, and some information relates to critical data and technical information in the product development process in these data, and therefore offering the client can exist very large technical security hidden danger.Traditional approach is to provide library file to the client, and the document that furnishes an explanation simultaneously illustrates the specifying information of the interface function that exists in the storehouse, and this mode preliminary work in earlier stage can be very loaded down with trivial details.In order to address this problem, the present invention utilizes hardware encryption module to carry out the encipherment protection of software code and critical data aspect.And adopt hierarchical mode to process user's request at all levels; various level user can be protected core data information according to the actual conditions of oneself; can only offer client's specification documents; step and flow process that introduce to use get final product, need not the complete transparent client that offers of these information.
Summary of the invention
In order to address the above problem, the invention provides a kind of hardware encryption module that utilizes software code is encrypted the method for protection, the method may further comprise the steps:
1) as required the file behind the code compilation that needs protection is left in the corresponding storage area, be provided with corresponding password memory block in the described storage area;
2) utilize hardware encryption module with Password Input in the password memory block, thereby make described storage area enter encrypted state;
3) when needs are accessed described storage area, by to hardware encryption module input password, thereby obtain the authority of the described storage area of access.
Further, described hardware encryption module comprises password register, authentication module and ciphering unit.And wherein the password register is used for the password value of storage user input; Whether authentication module to be input to the password value of password register consistent with the password value of the corresponding password memory block of storage area if being used for authentication of users; Ciphering unit is used for determining whether to allow the user to access corresponding storage area according to the result of authentication module.
Further, described authentication module comprises: the encrypted state register is used for storage and characterizes the state value whether described storage area enters encrypted state; The comparison password unit, whether the password value that is used in the password memory block of comparison password register and corresponding storage area is consistent.
Further, described ciphering unit comprises the bus encryption control module, and it is used for the operation of the respective memory regions of restricted passage bus access storer; Control register by carrying out write operation to this control register, thereby starts this bus encryption control module.
Further, utilize hardware encryption module with Password Input in the password memory block, thereby the step that makes described storage area enter encrypted state comprises: a) read the encrypted state register, judge whether described storer has entered encrypted state, if do not enter encrypted state then enter step c), otherwise from step b) order carries out; B) write password value to the password register, whether the password value of described comparison password unit comparison password register and the password value of the password memory block in the respective memory regions be consistent, and comparison result passed to user and ciphering unit, if comparison result is inconsistent, then finish ciphering process, bus encryption control module in the ciphering unit no longer limits the access to described storage area if comparison result is consistent, and execution in step c); C) the password memory block of corresponding storage area writes password in the storer, the control register of ciphering unit is carried out write operation, thereby start the bus encryption control module, makes storer enter encrypted state.
Further, by to hardware encryption module input password, thereby the operation that obtains the authority of the described storage area of access comprises: a) password value is write the password register; B) whether the comparison password unit value of judging the password register is consistent with the password value of the password memory block of corresponding storage area, if comparison result is for unanimously then the corresponding storage area of bus access is passed through in permission.
The present invention also provides a kind of system that the particular memory region of storer is encrypted and deciphers by hardware encryption module, described particular memory region comprises when corresponding with it password memory block is used for the storage password for this storage area of access to be compared, and described system comprises:
Line module is used for writing password to hardware encryption module,
Hardware encryption module receives the password value that line module writes, thereby finishes encryption or deciphering to storage area;
Wherein, hardware encryption module comprises password register, authentication module and ciphering unit,
The password register is used for the password value of storage line module input;
Whether authentication module to be input to the password value of password register consistent with the password value of the corresponding password memory block of storage area if being used for the authentication of users module;
Ciphering unit is used for determining whether to allow the user to access corresponding storage area according to the result of authentication module.
Further, described authentication module comprises: the encrypted state register is used for storage and characterizes the state value whether described storage area enters encrypted state; The comparison password unit, whether the password value that is used in the password memory block of comparison password register and corresponding storage area is consistent.
Further, described ciphering unit comprises: the bus encryption control module, and it is used for the operation of the respective memory regions of restricted passage bus access storer; Control register by carrying out write operation to this control register, thereby starts this bus encryption control module.
Description of drawings
Fig. 1 realizes the general frame of the code protection of embedded software by the hardware encipher device
The module frame chart of Fig. 2 hardware encipher device
Fig. 3 realizes the process flow diagram of ciphering process
Fig. 4 realizes the process flow diagram of decrypting process
Embodiment
The present invention utilizes line module to go the control hardware encrypting module that storer is encrypted operation, realizes the protection to code.Wherein said line module can be software, also can be to carry out the processor of particular step or the hardware module of other types.Main thought of the present invention is the multistage image that will generate after the code compilation link corresponding to zones of different; then it is burnt in the corresponding region; mode by line module control hardware encrypting module realizes separating of memory block and user, thereby plays the effect of code protection.
As shown in Figure 1, this invention is divided into Three regions with storer, i.e. FB_Region, F0_Region, F1_Region.FB_Region mainly is some critical datas and the code information of depositing the hardware driving layer; F0_Region is that L 1 customer is encrypted the zone; F1_Region is that the secondary client encrypts the zone, and is as follows:
FB_Region Hardware driving
F0_Region L 1 customer
F1_Region The secondary client
Each memory area has separately independently cryptographic zone, i.e. FB password area, F0 password area and F1 password area.Also according to zones of different corresponding password register is arranged in the password register of hardware encryption module, be FB password register, F0 password register and F1 password register, the operation that the user can directly read and write data to any one password register by line module.Hardware encryption module links to each other by bus with storer, thereby can each interior password area of reference-to storage.
As shown in Figure 2, hardware encryption module comprises password register (being FB password register, F0 password register and F1 password register), authentication module and ciphering unit.The password register provides the password input interface to the user, and the user can directly carry out write operation to the password register by line module, thereby writes password.The authentication module major function is the function of carrying out authentication, and there are an encrypted state register and a comparison password unit in its inside.The state that the encrypted state register is recording regional (being FB_Region, F0_Region and F1_Region) is in encrypted state or is in non-encrypted state, if the zone of access is when being non-encrypted state, ciphering unit does not just limit its read-write motion so, can directly conduct interviews to storer; If the zone of access is encrypted state, then ciphering unit is by the regional of bus encryption control module limited subscriber module by the bus access storer.Whether the comparison password unit is consistent by the password value in each corresponding password area of password and storer of line module input in the comparison password register, judges whether the user is authorized user, and whether allows the corresponding memory block of its reference-to storage.The password comparing unit can pass to line module and ciphering unit with the result of comparison, if write the password value coupling of password value and the password area of password register, namely think authorized user, the password comparing unit passes to line module and ciphering unit with comparison result, thereby ciphering unit allows line module that code and the data of respective memory level are just read and revise; If comparison result is unauthorized user, the comparison password unit can pass to comparison result line module and ciphering unit, and ciphering unit can stop the read write command of line module.Ciphering unit comprises control register and bus encryption control module, and wherein line module is by writing control numerical value to control register, thereby starts the work of ciphering unit; And ciphering unit is to come the limited subscriber module to realize by the respective regions in the bus access storer by the bus encryption control module to the restrict access work of storer.When the encrypted state register is encrypted state, ciphering unit passes through bus encryption control module limited subscriber module by the access of bus to the corresponding storage area of storer (at least one among FB_Region, F0_Region and the F1_Region), for write operation, its numerical value can not be updated in the respective regions of storer, for read operation, return fixing reading (such as 0); When the encrypted state register was non-encrypted state, ciphering unit did not limit its read-write.
Mainly comprise following step in the method for the present invention, i.e. the layering of Bin file storage, encryption, deciphering.The task of bin file subregion storage in storer that the main completion code of step of the layering storage of Bin file generates after compiling through compiler, namely leave the file behind the code compilation of different levels in corresponding memory block at first as required, this process is to finish by the scatter file that disposes compiler.Encryption is the process that the arbitrary levels among FB, F0, the F1 three is encrypted, and mainly plays the effect that code and data with corresponding level are isolated from the outside.The corresponding password storage area of each level, write password to this zone after, then write control numerical value in the control register of ciphering unit and can make this zone enter encrypted state.Deciphering mainly is to finish the task that a certain zone is decrypted, the user writes password in the password register of corresponding level, hardware can start the comparison password unit immediately after writing password, whether the password that is the password that writes in the password comparison register and corresponding cryptographic zone is consistent, if contrast unanimously should the zone deciphering finish, the user is authorized user, can read and revise this regional code data, otherwise Decryption failures, this level still is in encrypted state.
The below introduces detailed process
1) layering of Bin file storage
The groundwork of this level is the configuration effort of finishing compiler scatter file, and the user carries out the code of correspondence according to existing physical storage structure the configuration of space distribution.The below is configured as an example of Nut MCU platform amount of physical memory structure example, owing to be divided into FB, F0 and three storage areas of F1 under the Nut MCU platform.We just are assigned as example with following address space:
FB:0x0000_0000---0x0000_3FFF
F0:0x0000_4000---0x0000_BFFF
F1:0x0000_C000---0x0000_FFFF
We just can be configured according to following mode
Figure BSA00000705284700041
Figure BSA00000705284700051
After with upper type scatter file being configured, through compiling out three sections different Bin files and a Bin map file after the compiling, then utilize burn recording software according to the content of Bin map file three sections Bin burning files to be arrived in the corresponding storage space, so just finished the layering storage of Bin file.System could normal operation like this.
2) encrypt
After finishing the layering storage of Bin file, can be encrypted action to any one zone in the middle of FB, F0, the F1 as required, each zone has one section space to store the password that belongs to the one's respective area, i.e. FB password area, F0 password area and F1 password area.The process need authorized user of encrypting is controlled cryptographic module by line module, dispose the password value in the password space (FB password area, F0 password area and F1 password area) of every segment memory, write after the password value, the control register that arranges in the ciphering unit by line module enables ciphering unit, thereby enters encrypted state.Concrete ciphering process as shown in Figure 3, at first, line module reads the encrypted state register, the encrypted state register with the storage state value turn back to line module (being step S1).Then, line module judges according to encrypting register whether system is in encrypted state (being step S2).If system is in encrypted state, line module writes password register (being step S3) with the password value of user's input.After line module writes password, the comparison password unit of authentication module is compared the interior password of described password register and whether the password in the storer password area mates, and then determine whether this user is authorized user, and comparison result is turned back to line module and ciphering unit, if the result that the comparison password unit returns is not authorized user, then line module finishes ciphering process, the respective regions of ciphering unit restricting user access storer; The result that returns of comparison password is authorized user, and then ciphering unit allows the user by the bus access storer, and line module is determined and can be write password (being step S4) by bus corresponding password space in the storer according to return results.Then line module writes password (being step S5) to the password area of the correspondence of storer.If system is not in encrypted state, line module does not need to carry out the password comparison, can directly write password (being step S5) to password space corresponding to storer by bus.After line module is finished the operation of writing password to each password area of storer, line module carries out write operation to the control register of ciphering unit and starts this bus encryption control module (being step S6), thereby makes system enter encrypted state (being step S7).
3) deciphering
Decrypting process mainly is a process of authentication module in the hardware encryption module, main task is whether finish the active user be the judgement of authorized user, if authorized user, ciphering unit is opened this regional read-write capability to this user, namely realized decipher function, authorized user can read and revise the content of this memory area according to the needs of oneself.
Under encrypted state, the user wants to read or revise code and the data in the storer, must carry out first the checking of rights relating the person limit, and the user side that checking is passed through can read and revise code and the data message of corresponding level.The process need user of deciphering gets final product by the value of line module configuration password register, then authentication module can compare with the value of the password area of corresponding level according to the value in the password register of user's input, if value equates then successful decryption, detailed identity authority proof procedure as shown in Figure 4.When system is in encrypted state, described line module access and configuration password register (being step S1), whether the password of storing in the corresponding password area in the password of then comparing password unit comparison password register and the storer mates, and then judges whether described user is authorized user (being step S2).If judge it is authorized user, the comparison password unit passes to ciphering unit and line module with comparison result, and ciphering unit makes system enter decrypted state, and line module is by the corresponding memory block of bus access (being step S3).If judge it is not authorized user, then to compare password unit comparison result is passed to ciphering unit and line module, ciphering unit is forbidden user's reference-to storage (being step S4) by the bus encryption control module.Then, line module judges whether to proceed Authority Verification (being step S5), if otherwise finish decrypting process, if it is line module further judges whether to have carried out the checking (for example 5 times) (being step S6) of pre-determined number, if not, then line module returns step S1, if it is finishes decrypting process.

Claims (9)

1. one kind is utilized hardware encryption module that software code is encrypted the method for protection, and the method may further comprise the steps:
1) as required the file behind the code compilation that needs protection is left in the corresponding storage area, be provided with corresponding password memory block in the described storage area;
2) utilize hardware encryption module with Password Input in the password memory block, thereby make described storage area enter encrypted state;
3) when needs are accessed described storage area, by to hardware encryption module input password, thereby obtain the authority of the described storage area of access.
2. the method for claim 1, wherein said hardware encryption module comprises password register, authentication module and ciphering unit, and wherein:
The password register is used for the password value of storage user input;
Whether authentication module to be input to the password value of password register consistent with the password value of the corresponding password memory block of storage area if being used for authentication of users;
Ciphering unit is used for determining whether to allow the user to access corresponding storage area according to the result of authentication module.
3. method as claimed in claim 2, wherein said authentication module comprises:
The encrypted state register is used for storage and characterizes the state value whether described storage area enters encrypted state;
The comparison password unit, whether the password value that is used in the password memory block of comparison password register and corresponding storage area is consistent.
4. method as claimed in claim 3, wherein said ciphering unit comprises:
The bus encryption control module, it is used for the operation of the respective memory regions of restricted passage bus access storer;
Control register by carrying out write operation to this control register, thereby starts this bus encryption control module.
5. method as claimed in claim 4, wherein utilize hardware encryption module with Password Input in the password memory block, thereby the step that makes described storage area enter encrypted state comprises:
A) read the encrypted state register, judge whether described storer has entered encrypted state, if do not enter encrypted state then enter step c), otherwise from step b) order carries out;
B) write password value to the password register, whether the password value of described comparison password unit comparison password register and the password value of the password memory block in the respective memory regions be consistent, and comparison result passed to user and ciphering unit, if comparison result is inconsistent, then finish ciphering process, bus encryption control module in the ciphering unit no longer limits the access to described storage area if comparison result is consistent, and execution in step c);
C) the password memory block of corresponding storage area writes password in the storer, the control register of ciphering unit is carried out write operation, thereby start the bus encryption control module, makes storer enter encrypted state.
6. method as claimed in claim 4 is wherein passed through to hardware encryption module input password, thereby the operation of the authority of the described storage area of acquisition access comprises:
A) password value is write the password register
B) whether the comparison password unit value of judging the password register is consistent with the password value of the password memory block of corresponding storage area, if comparison result is for unanimously then the corresponding storage area of bus access is passed through in permission.
7. system that the particular memory region of storer is encrypted and deciphers by hardware encryption module, described particular memory region comprises when corresponding with it password memory block is used for the storage password for this storage area of access to be compared, and described system comprises:
Line module is used for writing password to hardware encryption module,
Hardware encryption module receives the password value that line module writes, thereby finishes encryption or deciphering to storage area;
Wherein, hardware encryption module comprises password register, authentication module and ciphering unit,
The password register is used for the password value of storage line module input;
Whether authentication module to be input to the password value of password register consistent with the password value of the corresponding password memory block of storage area if being used for the authentication of users module;
Ciphering unit is used for determining whether to allow the user to access corresponding storage area according to the result of authentication module.
8. system as claimed in claim 7, wherein said authentication module comprises:
The encrypted state register is used for storage and characterizes the state value whether described storage area enters encrypted state; The comparison password unit, whether the password value that is used in the password memory block of comparison password register and corresponding storage area is consistent.
9. system as claimed in claim 7, wherein said ciphering unit comprises:
The bus encryption control module, it is used for the operation of the respective memory regions of restricted passage bus access storer;
Control register by carrying out write operation to this control register, thereby starts this bus encryption control module.
CN2012101194471A 2012-04-23 2012-04-23 Method and device for protecting codes of embedded software by hardware encryption module Pending CN103377350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101194471A CN103377350A (en) 2012-04-23 2012-04-23 Method and device for protecting codes of embedded software by hardware encryption module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101194471A CN103377350A (en) 2012-04-23 2012-04-23 Method and device for protecting codes of embedded software by hardware encryption module

Publications (1)

Publication Number Publication Date
CN103377350A true CN103377350A (en) 2013-10-30

Family

ID=49462442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101194471A Pending CN103377350A (en) 2012-04-23 2012-04-23 Method and device for protecting codes of embedded software by hardware encryption module

Country Status (1)

Country Link
CN (1) CN103377350A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105786662A (en) * 2014-12-24 2016-07-20 北京兆易创新科技股份有限公司 MCU (Micro Control Unit) calibration method and system
CN105785967A (en) * 2014-12-24 2016-07-20 北京兆易创新科技股份有限公司 Calibration method and calibration system for MCU
CN105786661A (en) * 2014-12-24 2016-07-20 北京兆易创新科技股份有限公司 MCU calibration method and system
CN107341412A (en) * 2017-06-26 2017-11-10 中交航局安装工程有限公司 A kind of PLC encryption methods based on AB systems
CN110490008A (en) * 2018-05-14 2019-11-22 英韧科技(上海)有限公司 Safety device and safety chip
CN110943834A (en) * 2019-12-06 2020-03-31 歌尔股份有限公司 Network device, password processing method thereof, control device and readable storage medium
WO2024046125A1 (en) * 2022-09-01 2024-03-07 华润微集成电路(无锡)有限公司 Hardware encryption module, chip, and encryption method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060117314A1 (en) * 2002-12-11 2006-06-01 Kenji Sato Software execution control system and software execution control program
EP1684460A1 (en) * 2003-10-29 2006-07-26 Hui Lin A method of internet clearance security certification and ic card certification hardware
CN101320355A (en) * 2007-06-04 2008-12-10 群联电子股份有限公司 Memory device, storing card access apparatus and its read-write method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060117314A1 (en) * 2002-12-11 2006-06-01 Kenji Sato Software execution control system and software execution control program
EP1684460A1 (en) * 2003-10-29 2006-07-26 Hui Lin A method of internet clearance security certification and ic card certification hardware
CN101320355A (en) * 2007-06-04 2008-12-10 群联电子股份有限公司 Memory device, storing card access apparatus and its read-write method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105786662A (en) * 2014-12-24 2016-07-20 北京兆易创新科技股份有限公司 MCU (Micro Control Unit) calibration method and system
CN105785967A (en) * 2014-12-24 2016-07-20 北京兆易创新科技股份有限公司 Calibration method and calibration system for MCU
CN105786661A (en) * 2014-12-24 2016-07-20 北京兆易创新科技股份有限公司 MCU calibration method and system
CN105785967B (en) * 2014-12-24 2018-10-16 北京兆易创新科技股份有限公司 A kind of calibration method and system of MCU
CN105786661B (en) * 2014-12-24 2019-09-17 北京兆易创新科技股份有限公司 A kind of calibration method and system of MCU
CN105786662B (en) * 2014-12-24 2019-11-15 北京兆易创新科技股份有限公司 A kind of calibration method and system of MCU
CN107341412A (en) * 2017-06-26 2017-11-10 中交航局安装工程有限公司 A kind of PLC encryption methods based on AB systems
CN110490008A (en) * 2018-05-14 2019-11-22 英韧科技(上海)有限公司 Safety device and safety chip
CN110943834A (en) * 2019-12-06 2020-03-31 歌尔股份有限公司 Network device, password processing method thereof, control device and readable storage medium
CN110943834B (en) * 2019-12-06 2023-02-28 歌尔科技有限公司 Network device, password processing method thereof, control device and readable storage medium
WO2024046125A1 (en) * 2022-09-01 2024-03-07 华润微集成电路(无锡)有限公司 Hardware encryption module, chip, and encryption method

Similar Documents

Publication Publication Date Title
CN101819612B (en) Versatile content control with partitioning
CN1647443B (en) Method and aystem for helping secure operation within an integrated system employing a data access control function
CN101908106B (en) Memory system with versatile content control
CN103377350A (en) Method and device for protecting codes of embedded software by hardware encryption module
CN101894224B (en) Protecting content on client platforms
CN101490687B (en) Control system and method using identity objects
CN100354786C (en) Open type general-purpose attack-resistant CPU and application system thereof
JP3774260B2 (en) Memory card security system device and memory card thereof
CN101120355B (en) System for creating control structure for versatile content control
CN101329658B (en) Encryption and decryption method, and PLC system using the same
US7971017B1 (en) Memory card with embedded identifier
CN104318176A (en) Terminal and data management method and device thereof
CN102955746A (en) Read-only mode mobile storage device and data access method thereof
CN102257483A (en) Managing access to an address range in a storage device
CN102456111B (en) Method and system for license control of Linux operating system
CN102906755A (en) Content control method using certificate revocation lists
CN101361076A (en) Mobile memory system for secure storage and delivery of media content
US20130340087A1 (en) Software License Management
CN101523399A (en) Methods and systems for modifying an integrity measurement based on user athentication
US8307181B2 (en) Apparatus and method for password protection of secure hidden memory
CN102053925A (en) Realization method of data encryption in hard disk
CN103839011A (en) Protecting method and device of confidential files
JPH0383132A (en) Software protection control system
CN101120356A (en) Control structure for versatile content control and method using structure
CN101132275B (en) Safety system for implementing use right of digital content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131030

WD01 Invention patent application deemed withdrawn after publication