CN108920980B - Encryption method, chip and device - Google Patents

Encryption method, chip and device Download PDF

Info

Publication number
CN108920980B
CN108920980B CN201810709323.6A CN201810709323A CN108920980B CN 108920980 B CN108920980 B CN 108920980B CN 201810709323 A CN201810709323 A CN 201810709323A CN 108920980 B CN108920980 B CN 108920980B
Authority
CN
China
Prior art keywords
chip
key
data
encryption
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810709323.6A
Other languages
Chinese (zh)
Other versions
CN108920980A (en
Inventor
吕苏谊
陈克勇
李照华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Qiangli Photoelectricity Co Ltd
Original Assignee
Fujian Qiangli Photoelectricity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Qiangli Photoelectricity Co Ltd filed Critical Fujian Qiangli Photoelectricity Co Ltd
Priority to CN201810709323.6A priority Critical patent/CN108920980B/en
Publication of CN108920980A publication Critical patent/CN108920980A/en
Application granted granted Critical
Publication of CN108920980B publication Critical patent/CN108920980B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Abstract

The invention relates to an encryption method, a chip and a device, comprising the following steps: acquiring instruction data belonging to the chip and contained in external control data; decoding the instruction data to identify a matching key instruction therein; and responding to the key matching instruction, verifying whether the key in the external control data is matched with the preset key in the built-in memory, and if the key in the external control data is matched with the preset key in the built-in memory, controlling the working chip electrically connected with the built-in memory to work. The working chip is controlled to work by acquiring instruction data belonging to the chip in external control data, identifying a key matching instruction from the instruction data, checking whether a key in the control data is matched with a preset key in the built-in memory or not, and checking and matching. Thereby realizing the encryption of the working chip. Because the chip keys are different, the working chips cannot read data mutually, and the homogenization and data leakage of the chips are avoided.

Description

Encryption method, chip and device
Technical Field
The present invention relates to the field of chip technologies, and in particular, to an encryption method, a chip, and an apparatus.
Background
At present, chips used in the field of landscape lighting and other displays generally use common communication protocols, such as a return-to-zero protocol, a two-wire protocol, a DMX512 protocol, and the like.
Because chip manufacturers adopt a general communication protocol, controllers produced by the chip manufacturers can be compatible with each other, and data reading is realized, namely, the homogenization phenomenon of the chip occurs. The chip homogenization phenomenon can cause that the content data of the chip is easily copied, and then the problem of data leakage occurs.
Disclosure of Invention
Based on this, it is necessary to provide an encryption method, a chip and an apparatus for solving the problem in the prior art that data leakage occurs due to easy copying of chip content data caused by a chip homogenization phenomenon.
An encryption method, comprising:
acquiring instruction data belonging to the chip and contained in external control data;
decoding the instruction data to identify a matching key instruction therein;
and responding to the key matching instruction, verifying whether the key in the external control data is matched with the preset key in the built-in memory, and if the key in the external control data is matched with the preset key in the built-in memory, controlling the working chip electrically connected with the built-in memory to work.
Further, before the obtaining of the instruction data belonging to the chip and included in the external control data, the method further includes:
acquiring write instruction data belonging to the chip in external control data;
decoding the write command data to identify a write command therein and the key;
and responding to the writing instruction, erasing the data in the built-in memory and writing the key into the built-in memory.
Further, the method further comprises:
acquiring reading instruction data belonging to the chip in external control data;
decoding the read instruction data to identify a read instruction therein;
and responding to the reading instruction, reading the key in the built-in memory, and returning the key to the controller sending the external control data.
Further, the verifying whether the key in the external control data matches with the preset key in the internal memory, and if the key in the external control data matches with the preset key in the internal memory, the verifying method further includes the following steps:
and transmitting the control data to a second encryption chip electrically connected with the control data so that the second encryption chip acquires the instruction data to which the second encryption chip belongs.
Further, the encryption method is applied to an application specific integrated circuit.
A cryptographic chip, comprising:
the acquisition module is used for acquiring instruction data which belongs to the chip and is contained in the external control data;
the decoding module is used for decoding the instruction data to identify a matching key instruction in the instruction data;
and the execution module is used for responding to the key matching instruction, verifying whether the key in the external control data is matched with the preset key in the built-in memory or not, and if the key in the external control data is matched with the preset key in the built-in memory, controlling the working chip electrically connected with the execution module to work.
Further, the encryption chip further comprises:
the first acquisition submodule is used for acquiring write-in instruction data belonging to the chip in the external control data;
the first decoding submodule is used for decoding the write command data so as to identify the write command and the secret key in the write command data;
and the first execution submodule is used for responding to the writing instruction, erasing the data in the built-in memory and writing the secret key into the built-in memory.
Further, the encryption chip further comprises:
the second acquisition submodule acquires read instruction data belonging to the chip in the external control data;
the second decoding submodule decodes the reading instruction data to identify the reading instruction in the reading instruction data;
and the second execution submodule is used for responding to the reading instruction, reading the key in the built-in memory and transmitting the key back to the controller which sends the external control data.
Further, the encryption chip further comprises:
and the transmission module is used for transmitting the control data to a second encryption chip electrically connected with the transmission module so that the second encryption chip can acquire the instruction data to which the second encryption chip belongs.
An encryption apparatus comprising: an encryption chip and a working chip;
the encryption chip is used for realizing the encryption method of any one of claims 1 to 4.
The working chip is electrically connected with the encryption chip and used for working after the encryption chip is successfully verified.
Further, the encryption chip and the working chip are connected in an integrated mode.
According to the encryption method, the chip and the device provided by the embodiment of the invention, the instruction data belonging to the chip in the external control data is obtained, the key matching instruction is identified from the instruction data, whether the key in the control data is matched with the preset key in the built-in memory is verified, and after the key in the control data is verified and matched, the electrically connected working chip is controlled to work, so that the encryption of the working chip is realized. Because the chip keys are different, the working chips cannot read data mutually, and the homogenization and data leakage of the chips are avoided.
Drawings
FIG. 1 is a schematic diagram of a basic flow of an encryption method according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an encryption chip according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a basic flow chart of a chip key writing method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a basic flow chart of a chip key reading method according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an encryption chip connection according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a basic structure of an encryption chip according to an embodiment of the present invention.
Fig. 7 is a schematic diagram of a basic structure of an encryption apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a diagram illustrating an encryption method according to an embodiment of the present invention, the method including:
s1100, acquiring instruction data belonging to the chip and contained in external control data;
the external control data is data transmitted by the controller, wherein the control data includes instruction data and working data. The controller is a terminal for controlling the working chip to process data, and the controller can be a single chip microcomputer, a computer, a mobile phone or a tablet personal computer and the like.
The working data is data which is electrically connected with the encryption chip and is operated by the working chip to realize various functions. In practical applications, the work chip performs data processing to implement certain functions, for example, the work data includes rendering instructions and image data to the work chip, so that the work chip processes the image data according to the rendering instructions and displays the image on a display screen.
In the embodiment of the invention, the control data comprises the address of the encryption chip, and when the controller sends the control data, the command data belonging to the encryption chip is sent to the encryption chip according to the chip address contained in the control data.
S1200, decoding the instruction data to identify a matching key instruction in the instruction data;
in the embodiment of the present invention, the encryption chip decodes the instruction data by using a preset decoding program, so as to identify the matching key instruction. The matching key instruction is used for matching a key in the control data with a preset key in a built-in memory of the encryption chip.
In the embodiment of the present invention, the preset key in each encryption chip may be the same or different. In an application scenario of the embodiment of the present invention, the chip key may be set according to a user of the working chip electrically connected to the cryptographic chip, for example, the preset key of the cryptographic chip used by the same user is the same. Therefore, different users can use respective encryption chips, and chip homogenization and data leakage are avoided. In other application scenarios, the chip key may also be set according to the function of the working chip encrypted by the encryption chip, which is not limited herein.
Preferably, the encryption chip is an Application Specific Integrated Circuit (ASIC) chip. In this embodiment, the ASIC chip can implement the encryption process by only matching the preset key in the internal memory with the key in the external control data, and the ASIC chip has a simple structure and low cost compared with a common single chip microcomputer and a common microprocessor.
S1300, responding to the key matching instruction, verifying whether the key in the external control data is matched with the preset key in the built-in memory, and if the key in the external control data is matched with the preset key in the built-in memory, controlling the work chip electrically connected with the built-in memory to work.
The encryption chip responds to the matching key command, checks whether the key in the external control data is matched with a preset key in the built-in memory, and when the key is matched with the preset key in the built-in memory, the encryption chip transmits the digital control command and transmits the external control data to the working chip in an analog wire control mode so that the working chip processes the working data, and therefore encryption of the working chip is achieved. Due to the fact that preset keys in the encryption chips are different, data cannot be read mutually between the working chips, and homogenization of the chips and data leakage are avoided.
Fig. 2 shows an embodiment of the present invention, and fig. 2 is a schematic structural diagram of an encryption chip. In this embodiment, the encryption chip includes: the device comprises a data decoding module, an instruction decoding module, a storage control circuit module and a storage module. The data decoding module receives external control data sent by the controller through a DIN interface of the encryption chip, intercepts a key belonging to the chip and decodes the key, instructs the decoding module to decode the decoded data within the RESET time, identifies a matched key instruction in the decoded data, responds to the matched key instruction, calls a key in the storage module and matches the key in the external data, and sends an analog signal instruction to the working chip through an EN interface after matching is successful so that the working chip works.
In an embodiment of the present invention, when a plurality of cryptographic chips are cascaded, the data decoding module sends the external control data to the second cryptographic chip through the DOUT interface after receiving the external control data.
In one embodiment of the invention, when the chip key and the data key are unsuccessfully matched, the encryption chip does not transmit the external control data to the working chip, and the working chip cannot work.
According to the encryption method, the chip and the device, the instruction data belonging to the chip in the external control data are obtained, the key matching instruction is identified from the instruction data, whether the key in the control data is matched with the preset key in the built-in memory is verified, and after the key in the control data is verified and matched, the work chip which is electrically connected is controlled to work. Thereby realizing the encryption of the working chip. Because the chip keys are different, the working chips cannot read data mutually, and the homogenization and data leakage of the chips are avoided.
An embodiment of the present invention further provides a method for writing a secret key, please refer to fig. 3, where fig. 3 is a basic flowchart diagram of a chip secret key writing method, and specifically, before step S1100, the method further includes the following steps:
s1110, obtaining write-in instruction data belonging to the chip in external control data;
s1120, decoding the write instruction data to identify the write instruction and the key in the write instruction data;
s1130, in response to the write command, erases the data in the internal memory, and writes the key in the internal memory.
The write instruction is used to indicate an instruction to control the cryptographic chip to write the key to the internal memory.
In an application scenario of this embodiment, the working chip is a working chip specifically used by a user, and in order to encrypt the working chip, an encryption chip electrically connected to the working chip is disposed on the working chip. The user needs to write the key into the encryption chip in advance before using the encryption chip. In the writing process, a user can send writing control data containing a key and a writing instruction to the encryption chip by using the controller, so that the encryption chip erases data in the built-in memory according to the writing instruction and writes the key into the built-in memory.
It should be noted that, in this embodiment, the write instruction is a program composed of a preset character string, where the preset character string is consistent with a rule of a character string pre-designed in the encryption chip, and can be identified by the encryption chip and used for directly accessing the memory of the encryption chip. The encryption chip accesses the memory of the encryption chip through a preset character string and stores the secret key. In practical applications, in order to ensure that the data of the working chip is encrypted tightly without leakage, a write command is sent by the manufacturer of the cryptographic chip via an external write device to store the chip key.
In the actual use process, the situation that the user forgets to encrypt the key of the chip can occur, so that when the user sends control data by using the controller, the working chip can not be normally used due to the fact that the key in the control data is not matched with the preset key of the chip. Therefore, in order to solve the problem, an embodiment of the present invention further provides a method for reading a key in an encrypted chip, please refer to fig. 4, where fig. 4 is a basic flowchart of the method for reading a chip key, and specifically, the method for reading a chip key includes:
s1400, obtaining reading instruction data belonging to the chip in external control data;
the reading instruction is used for reading a pre-stored key in the encryption chip.
S1500, decoding the read instruction data to identify the read instruction;
and S1600, responding to the reading instruction, reading the key in the built-in memory, and transmitting the key back to the controller sending the external control data.
In an application scenario of this embodiment, when the user forgets the key in the chip, the working chip cannot be normally operated, and the controller may send a read instruction to obtain the key pre-stored in the encryption chip.
It should be noted that, in this embodiment, the read instruction is also composed of a preset character string, and may be used to directly access the internal memory of the cryptographic chip and obtain information from the internal memory. The encryption chip reads the key from the memory through a preset character string and transmits the key back to the controller which sends the read control data, thereby realizing reading. In practical applications, in order to ensure that the data encryption of the working chip is tight, the read command is also sent by the manufacturer of the encryption chip through the controller to obtain the key.
After step S1300, an embodiment of the present invention further includes:
and transmitting the control data to a second encryption chip electrically connected with the control data so that the second encryption chip acquires the instruction data of the second encryption chip.
Referring to fig. 5, fig. 5 is a schematic diagram of an encryption chip according to an embodiment of the invention. In this embodiment, the number of the encryption chips is plural, each encryption chip is connected in cascade, and each encryption chip is electrically connected to one working chip. And when the first encryption chip is successfully verified, transmitting the control data to the second encryption chip so that the second encryption chip can obtain the instruction data to which the second encryption chip belongs, and repeating the steps S1200 and S1300 so as to control the work chip electrically connected with the second encryption chip to work. In this embodiment, the number of encryption chips is not limited.
In an application scenario of this embodiment, the working chip is an LED chip, the LED chips form an LED display screen, each LED chip is electrically connected to an encryption chip, and each encryption chip is connected in cascade. The first encryption chip obtains control data sent by an external controller, wherein the control data comprises data for adjusting the gray scale of the LED display screen. The first encryption chip acquires instruction data belonging to the first encryption chip from the control data. The first encryption chip decodes the instruction data, identifies a matched key instruction in the instruction data, responds to the matched key instruction, verifies whether a key in the control data is matched with a preset key in a built-in memory of the first encryption chip, controls the LED chip electrically connected with the first encryption chip to change the brightness if the key in the control data is matched with the preset key in the built-in memory of the first encryption chip, transmits the control data to the second encryption chip, enables the second encryption chip to control the LED chip electrically connected with the second encryption chip to change the brightness according to the method, and sequentially performs the steps, finally enables each LED chip to change the brightness of the LED chip, and finally achieves the purpose of adjusting the gray scale of the LED display screen.
An embodiment of the present invention provides an encryption chip, as shown in fig. 6, the encryption chip includes: an acquisition module 2100, a decoding module 2200, and an execution module 2300. The acquisition module is used for acquiring instruction data which belongs to the chip and is contained in the external control data; the decoding module is used for decoding the instruction data to identify a matching key instruction in the instruction data; and the execution module is used for responding to the key matching instruction, verifying whether the key in the external control data is matched with the preset key in the built-in memory or not, and if the key in the external control data is matched with the preset key in the built-in memory, controlling the working chip electrically connected with the execution module to work.
The encryption chip of the embodiment of the invention controls the work chip which is electrically connected to work by acquiring the instruction data which belongs to the chip in the external control data, identifying the matched key instruction from the instruction data, checking whether the key in the control data is matched with the preset key in the built-in memory or not, and checking and matching. Thereby realizing the encryption of the working chip. Because the chip keys are different, the working chips cannot read data mutually, and the homogenization and data leakage of the chips are avoided.
In an embodiment of the present invention, the encryption chip further includes: the first acquisition submodule is used for acquiring write-in instruction data belonging to the chip in the external control data; the first decoding submodule is used for decoding the write command data so as to identify the write command and the secret key in the write command data; and the first execution submodule is used for responding to the writing instruction, erasing the data in the built-in memory and writing the secret key into the built-in memory.
In an embodiment of the present invention, the encryption chip further includes: the second acquisition submodule acquires read instruction data belonging to the chip in the external control data; the second decoding submodule decodes the reading instruction data to identify the reading instruction in the reading instruction data; and the second execution submodule is used for responding to the reading instruction, reading the key in the built-in memory and transmitting the key back to the controller which sends the external control data.
In an embodiment of the present invention, the encryption chip further includes: and the transmission module is used for transmitting the control data to a second encryption chip electrically connected with the transmission module so that the second encryption chip can acquire the instruction data to which the second encryption chip belongs.
An embodiment of the present invention provides an encryption apparatus, as shown in fig. 7, the encryption apparatus includes: an encryption chip 3100 and a working chip 3200.
The encryption chip 3100 is used for implementing the encryption method described in the above embodiments.
The working chip 3200 is electrically connected with the encryption chip 3100, and is used for working after the encryption chip 3100 is successfully verified.
The encryption device of the embodiment of the invention controls the work chip electrically connected to work after the key in the control data is verified and matched with the preset key in the built-in memory by acquiring the instruction data belonging to the chip in the external control data, identifying the matched key instruction from the instruction data, verifying whether the key in the control data is matched with the preset key in the built-in memory or not and verifying and matching. Thereby realizing the encryption of the working chip. Because the chip keys are different, the working chips cannot read data mutually, and the homogenization and data leakage of the chips are avoided.
Further, the encryption chip and the working chip are connected in an integrated mode.
In an embodiment of the present invention, as shown in fig. 5, the authentication apparatus of the embodiment includes a plurality of cryptographic chips and a working chip connected to each cryptographic chip, wherein each cryptographic chip is cascaded. For details of the implementation of this embodiment, please refer to the embodiment shown in fig. 5 in the above method, which is not described herein again.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. An encryption method, comprising:
step 1: acquiring instruction data belonging to a first encryption chip and contained in external control data;
step 2: decoding the instruction data to identify a matching key instruction therein;
and step 3: responding to the key matching instruction, verifying whether a key in the external control data is matched with a preset key in the built-in memory, and if the key in the external control data is matched with the preset key in the built-in memory, transmitting the external control data to a working chip electrically connected with the external control data so that the working chip processes the working data in the external control data;
and 4, step 4: when the first encryption chip is successfully verified, controlling a working chip electrically connected with the first encryption chip to change the brightness and transmitting the external control data to a second encryption chip electrically connected with the working chip; the second encryption chip obtains instruction data belonging to the second encryption chip from the external control data and executes the steps 2 and 3 to control a working chip electrically connected with the second encryption chip to change the brightness; the working chip is an LED chip.
2. The encryption method according to claim 1, wherein before the obtaining of the instruction data belonging to the first encryption chip and included in the external control data, the method further comprises:
acquiring write instruction data belonging to a first encryption chip in external control data;
decoding the write command data to identify a write command therein and the key;
and responding to the writing instruction, erasing the data in the built-in memory and writing the key into the built-in memory.
3. The encryption method of claim 1, wherein the method further comprises:
acquiring reading instruction data belonging to a first encryption chip in external control data;
decoding the read instruction data to identify a read instruction therein;
and responding to the reading instruction, reading the key in the built-in memory, and returning the key to the controller sending the external control data.
4. The encryption method according to any one of claims 1 to 3, wherein the encryption method is applied to an application specific integrated circuit.
5. A cryptographic chip, comprising:
an acquisition module for executing a step of acquiring instruction data belonging to a first cryptographic chip contained in external control data;
the decoding module is used for decoding the instruction data to identify the step of matching the key instruction;
the execution module is used for responding to the key matching instruction, verifying whether a key in the external control data is matched with a preset key in the built-in memory or not, and if the key in the external control data is matched with the preset key in the built-in memory, transmitting the external control data to a working chip electrically connected with the external control data so that the working chip processes the working data in the external control data;
the execution module is further to: when the first encryption chip is successfully verified, controlling a working chip electrically connected with the first encryption chip to change the brightness and transmitting the external control data to a second encryption chip electrically connected with the working chip; the second encryption chip acquires instruction data belonging to the second encryption chip from the external control data and executes the steps executed by the decoding module and the execution module so as to control a working chip electrically connected with the second encryption chip to change the brightness; the working chip is an LED chip.
6. The cryptographic chip of claim 5, wherein the cryptographic chip further comprises:
the first obtaining submodule is used for obtaining write-in instruction data which belongs to a first encryption chip in external control data;
the first decoding submodule is used for decoding the write command data so as to identify the write command and the secret key in the write command data;
and the first execution submodule is used for responding to the writing instruction, erasing the data in the built-in memory and writing the secret key into the built-in memory.
7. The cryptographic chip of claim 5, wherein the cryptographic chip further comprises:
the second obtaining submodule is used for obtaining reading instruction data belonging to the first encryption chip in the external control data;
the second decoding submodule decodes the reading instruction data to identify the reading instruction in the reading instruction data;
and the second execution submodule is used for responding to the reading instruction, reading the key in the built-in memory and transmitting the key back to the controller which sends the external control data.
8. An encryption apparatus, comprising: an encryption chip and a working chip;
the encryption chip is used for realizing the encryption method of any one of claims 1 to 4;
the working chip is electrically connected with the encryption chip and used for working after the encryption chip is successfully verified.
9. The encryption device of claim 8, wherein the encryption chip and the working chip are integrally connected.
CN201810709323.6A 2018-07-02 2018-07-02 Encryption method, chip and device Active CN108920980B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810709323.6A CN108920980B (en) 2018-07-02 2018-07-02 Encryption method, chip and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810709323.6A CN108920980B (en) 2018-07-02 2018-07-02 Encryption method, chip and device

Publications (2)

Publication Number Publication Date
CN108920980A CN108920980A (en) 2018-11-30
CN108920980B true CN108920980B (en) 2020-10-27

Family

ID=64424783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810709323.6A Active CN108920980B (en) 2018-07-02 2018-07-02 Encryption method, chip and device

Country Status (1)

Country Link
CN (1) CN108920980B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981671B (en) * 2019-04-03 2020-12-08 北京深思数盾科技股份有限公司 Data processing method based on encryption machine and encryption machine

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6757832B1 (en) * 2000-02-15 2004-06-29 Silverbrook Research Pty Ltd Unauthorized modification of values in flash memory
CN101098540B (en) * 2006-06-27 2012-05-23 国民技术股份有限公司 Encrypting chip based mobile terminal network-locking method
CN101854243B (en) * 2010-04-30 2012-12-12 株洲南车时代电气股份有限公司 Circuit system design encryption circuit and encryption method thereof
CN103390140A (en) * 2013-06-20 2013-11-13 上海鼎为通讯电子有限公司 Mobile terminal and information security control method thereof
CN103413097B (en) * 2013-07-15 2017-02-15 北京华大信安科技有限公司 Encryption method, encryption device and security chip
CN106203134A (en) * 2016-06-30 2016-12-07 珠海智融科技有限公司 Anti-brush machine system and method based on hardware encryption
CN107220545A (en) * 2017-05-31 2017-09-29 郑州云海信息技术有限公司 A kind of hardware encryption system, method and server
CN107994989A (en) * 2017-12-11 2018-05-04 建荣集成电路科技(珠海)有限公司 A kind of data encryption system, encryption method, encryption chip and storage device

Also Published As

Publication number Publication date
CN108920980A (en) 2018-11-30

Similar Documents

Publication Publication Date Title
US10361857B2 (en) Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon
US8254883B2 (en) Confidential information management by mobile terminal
EP3197059B1 (en) Method for controlling sim card and sd card and electronic device implementing the same
KR102218693B1 (en) Method for processing multiple sim information and an electronic device thereof
US20170201378A1 (en) Electronic device and method for authenticating identification information thereof
US10200201B2 (en) Method for application installation, electronic device, and certificate system
KR20150022276A (en) Apparatas and method for extravting a encrypted message of image file in an electronic device
US7210044B2 (en) Mobile phone with an encryption function
CN107948170A (en) Interface requests parameter encryption method, device, equipment and readable storage medium storing program for executing
CN110727614A (en) EDID dynamic configuration method and device and electronic equipment
KR102203130B1 (en) Method for controlling an use of sim card and an electronic device thereof
KR20140112399A (en) Application access control method and electronic device implementing the same
CN108920980B (en) Encryption method, chip and device
WO2015186072A1 (en) Encryption and decryption of data between a communications device and smart card with near field communication function
KR102348217B1 (en) Method and apparatus for controlling the security screen in electronic device
CN113127844A (en) Variable access method, device, system, equipment and medium
CN113411203A (en) Terminal configuration method and device, computer equipment and storage medium
US20220103350A1 (en) Electronic device for selecting key to be used for encryption on basis of amount of information of data to be encrypted, and operation method of electronic device
US20150326394A1 (en) Method for certifying a displayed picture
CN106375813B (en) Method, playing terminal and system for realizing application processing
KR101007376B1 (en) Method and terminal for booting of terminal
KR20160015636A (en) System and method for wireless communications using MAC address authentication
CN103747315A (en) Television, and writing and reading methods and devices of property data thereof
CN111090894B (en) Method and device for reconstructing data of lock card
WO2010023138A1 (en) A method for managing data between a terminal and a token, corresponding token and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant