CN111865574A - CPU chip simulator supporting data secure transmission and data secure transmission method - Google Patents

CPU chip simulator supporting data secure transmission and data secure transmission method Download PDF

Info

Publication number
CN111865574A
CN111865574A CN202010573850.6A CN202010573850A CN111865574A CN 111865574 A CN111865574 A CN 111865574A CN 202010573850 A CN202010573850 A CN 202010573850A CN 111865574 A CN111865574 A CN 111865574A
Authority
CN
China
Prior art keywords
transmission
data
random number
simulator
control module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010573850.6A
Other languages
Chinese (zh)
Inventor
刘俊
种挺
张茜歌
刘亮
原义栋
张海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Original Assignee
Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd, State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, Beijing Smartchip Microelectronics Technology Co Ltd filed Critical Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd
Priority to CN202010573850.6A priority Critical patent/CN111865574A/en
Publication of CN111865574A publication Critical patent/CN111865574A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3648Software debugging using additional hardware
    • G06F11/3652Software debugging using additional hardware in-circuit-emulation [ICE] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a CPU chip simulator supporting data safe transmission and a data safe transmission method, and belongs to the field of chip simulation. The chip simulator comprises simulator software and simulator hardware, data interaction is carried out between the simulator software and the simulator hardware through a debugging channel, and the chip simulator further comprises: the transmission management module and the transmission control module; the transmission management module is configured in simulator software and used for encrypting data transmitted to the simulator hardware by the simulator software or decrypting received data; the transmission control module is configured in the simulator hardware and is used for encrypting data transmitted to the simulator software by the simulator hardware or decrypting received data. According to the invention, the transmission management module and the transmission control module are used for safely transmitting the data interacted between the simulator software and the simulator hardware, so that the data protection from the simulator software to the debugging channel of the simulator hardware is realized.

Description

CPU chip simulator supporting data secure transmission and data secure transmission method
Technical Field
The invention relates to the field of chip simulation, in particular to a CPU chip simulator supporting data secure transmission and a data secure transmission method.
Background
The development and debugging of software programs executed on a CPU chip generally use an emulator. The emulator is a set of devices that realizes debugging and running of a software program by emulating functions of a CPU chip, where the CPU chip is a chip that includes a CPU (central processing Unit) and can execute an embedded program. The simulator mainly comprises two parts, namely simulator hardware and simulator software. The hardware part mainly comprises a simulation chip realized by adopting an FPGA (Field Programmable gate array); the software part mainly comprises an embedded software integrated development environment which can carry out program compiling and debugging. The simulator is used for debugging and developing a software program, generally, an embedded software integrated development environment is used for compiling the software program, a debugging channel is used for executing downloading operation to download the compiled software program to simulator hardware, and then debugging operation of the program is executed through a debugging command.
The CPU chip is widely applied to the fields of electric power, finance, communication and the like as a security chip, and a security algorithm software library and a simulator are generally provided for CPU chip manufacturers in order to reduce the development threshold of system developers. The safety algorithm software library mainly comprises algorithm modules for safety authentication, data protection and the like, and is called by system software. In view of intellectual property protection, the source program of the security algorithm software library and the compiled library file are generally not directly provided to the system developer. In the chip production stage, leakage can be effectively prevented by masking the binary data of the security algorithm software library into the security area of the chip; however, in the development stage of system software, when the simulator is used for debugging, because the simulator has the functions of program downloading and code checking, how to effectively protect the security algorithm software library on the simulator becomes a problem that a CPU chip manufacturer needs to consider in the design of the simulator. In the existing simulator, a CPU chip manufacturer usually compiles a source program of a security algorithm software library into a library file, and then encrypts the library file to exist in a ciphertext library. When the simulator is used for downloading the program, the ciphertext library is decrypted through simulator software to obtain the program data and the address information of the plaintext, the program data are downloaded to the address corresponding to the simulator hardware, and then the access authority of the area is configured to be unreadable through register configuration. Therefore, the user can not directly contact the plaintext program data in the downloading stage and can not read the program data in the debugging stage, and the protection of the security algorithm software library is completed.
In the existing emulator design, although the protection of the program in the program downloading stage and the debugging stage is considered, the data protection on a debugging channel from emulator software to emulator hardware is ignored, and a transmission protocol on the debugging channel is directly utilized, so that the safety problem exists. The common debugging channel is mainly based on a transmission mechanism of a USB interface, transmitted data can be easily captured by means of a USB protocol analysis tool, plaintext data such as program downloading and register configuration operation can be obtained by analyzing the data to a certain extent, and even after the data configured by the register is analyzed, the data configured by the register is forged, so that hardware of the simulator is attacked.
Disclosure of Invention
The invention aims to provide a CPU chip simulator supporting data secure transmission so as to realize data protection on a debugging channel from simulator software to simulator hardware.
In order to achieve the above object, an aspect of the present invention provides a CPU chip emulator supporting secure data transmission, including emulator software and emulator hardware, where the emulator software and the emulator hardware perform data interaction through a debug channel, and further including: the transmission management module and the transmission control module;
The transmission management module is configured in the simulator software and used for encrypting data transmitted to the simulator hardware by the simulator software or decrypting received data;
the transmission control module is configured in the emulator hardware and is used for encrypting data transmitted to the emulator software by the emulator hardware or decrypting received data.
Further, the emulator hardware includes a chip emulation module, which includes a random number generation unit; the chip simulation module is used for sending the random number generated by the random number generation unit to the transmission control module.
Further, the emulator hardware further includes a key storage module, and the key storage module is configured to store key data required for the transmission control module to perform data encryption or decryption operation.
Further, the transmission control module stores a preset key, and the preset key participates in the encryption or decryption operation of data in the transmission control module.
Furthermore, the emulator software includes a data generation module, and the data generation module is configured to parse and convert data to be debugged into a data packet that can be transmitted through the debug channel, and transmit the data packet to the transmission management module.
The invention also provides a data security transmission method, which is based on the CPU chip simulator supporting the data security transmission, and the method comprises the following steps:
when debugging is started, simulator software sends a request for acquiring a random number to a transmission control module of simulator hardware through a transmission management module;
the simulator hardware generates a random number according to the received random number acquisition request, and returns the random number to the transmission management module through the transmission control module;
the transmission management module encrypts the random number by adopting a preset key to generate a transmission key, encrypts data to be sent to the transmission control module by utilizing the transmission key, and sends the encrypted data to the transmission control module;
and the transmission control module encrypts the random number by adopting a preset key to generate a transmission key, and decrypts the encrypted data sent by the transmission management module by utilizing the transmission key.
Further, the method further comprises:
the transmission control module encrypts data needing to be returned to the transmission management module by using the transmission key;
and the transmission management module decrypts the encrypted data returned by the transmission control module by using the transmission key.
Further, the sending, by the emulator software, the request for obtaining the random number to the transmission control module of the emulator hardware through the transmission management module includes:
and when the random number acquisition request is sent, the transmission management module encrypts a data packet of the random number acquisition request by using a preset key.
Further, the step of the emulator hardware generating a random number according to the received random number acquisition request and returning the random number to the transmission management module through the transmission control module includes:
the simulator hardware generates a random number through a random number generating unit in a chip simulation module and transmits the random number to the transmission control module;
and the transmission control module stores the random number, encrypts the random number by adopting a preset key and returns the encrypted random number to the transmission management module.
Further, the method further comprises:
when the debugging is started again, the transmission management module sends a request for obtaining the random number to the transmission control module again;
and the transmission management module regenerates the transmission key according to the random number returned by the transmission control module.
According to the CPU chip simulator supporting the data safe transmission, the transmission management module and the transmission control module are used for carrying out safe transmission protection on data interacted between the simulator software and the simulator hardware, a bidirectional encryption mode is adopted for transmission, the data transmission is safer, and the data protection on a debugging channel from the simulator software to the simulator hardware is realized.
The data security transmission method provided by the invention can protect all data on the debugging channel, and can protect the debugging operations such as downloading of a security algorithm software library, register configuration and the like.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the embodiments of the invention without limiting the embodiments of the invention. In the drawings:
FIG. 1 is a block diagram of a CPU chip emulator supporting secure data transmission according to an embodiment of the present invention;
FIG. 2 is a block diagram of a CPU chip emulator supporting secure data transmission according to another embodiment of the present invention;
fig. 3 is a flowchart of a method for securely transmitting data according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
Fig. 1 is a block diagram of a CPU chip emulator supporting secure data transmission according to an embodiment of the present invention. As shown in fig. 1, an embodiment of the present invention provides a CPU chip emulator capable of supporting secure data transmission, including emulator software and emulator hardware, where the emulator software is connected to the emulator hardware through a debug channel, and the emulator software and the emulator hardware perform data interaction through the debug channel. The simulator also comprises a transmission management module and a transmission control module. The transmission management module is configured in the emulator software and is used for encrypting data transmitted to the emulator hardware by the emulator software or decrypting received data. The transmission control module is configured in the emulator hardware and is used for encrypting data transmitted to the emulator software by the emulator hardware or decrypting received data. According to the embodiment of the invention, the transmission management module and the transmission control module are used for encrypting the data interacted between the simulator software and the simulator hardware, so that the function of data safe transmission is realized.
The emulator hardware includes a chip emulation module including a random number generation unit for generating a random number required for an encryption/decryption operation. The chip simulation module is used for sending the random number generated by the random number generation unit to the transmission control module. The emulator hardware also includes a key storage module for storing key data, such as a preset key, required for the transmission control module to perform data encryption or decryption operations. The transmission control module adopts a symmetric encryption algorithm, encrypts the random number by using a preset key in the key storage module to generate a transmission key, and encrypts data to be sent to the transmission management module or decrypts encrypted data sent by the transmission management module by using the transmission key. In this embodiment, the key storage module is configured to store the key data separately, the key data and the program data are stored separately, and the transmission control module reads the key data in the key storage module through the dedicated access interface, thereby reducing the risk of unintended reading or modification of the key data.
The emulator software includes a data generation module configured to parse and convert data to be debugged (e.g., a downloaded program, register operation data, etc.) into a data packet that can be transmitted through the debug channel, and transmit the data packet to the transmission management module. The debugging data, such as the downloaded program, can be a common user program or a security algorithm software library in a ciphertext format. Aiming at a security algorithm software library in a ciphertext format, a data generation module firstly analyzes a ciphertext and then converts the ciphertext into a data packet which can be used for transmission. When debugging is started, the transmission management module sends a request for obtaining the random number to the transmission control module, and the transmission control module returns the random number generated by the random number generation unit. The transmission management module stores a preset key, and encrypts a data packet of the random number acquisition request by using the preset key; after the random number is obtained, a symmetric encryption algorithm is adopted to encrypt the random number by using a preset key to generate a transmission key. The transmission management module uses the transmission key to encrypt data (for example, a data packet for debugging operations such as program downloading and register configuration) to be sent to the transmission control module or decrypt encrypted data sent by the transmission control module.
The preset key in the transmission management module is the same as the preset key in the key storage module, and the transmission key generated by the transmission management module is the same as the transmission key generated by the transmission control module. The transmission management module and the transmission control module adopt a symmetric encryption algorithm to encrypt interactive data between the transmission management module and the transmission control module through a transmission key. When the debugging is started each time, the transmission management module and the transmission control module acquire the random number again and generate the transmission key again, the characteristics of the random number are utilized to ensure that the transmission keys generated when the debugging is started each time are different, and the difficulty of breaking the transmission data is increased.
Fig. 2 is a block diagram of a CPU chip emulator supporting secure data transmission according to another embodiment of the present invention. In another embodiment, the transmission control module stores a preset key, and the preset key participates in the encryption or decryption operation of data in the transmission control module. The preset key in the transmission management module is the same as the preset key in the transmission control module. As shown in fig. 2, the transmission control module is provided with a key storage unit, the preset key is stored in the key storage unit, and the program data and the key data of the transmission control module are located in the same storage area, so that the transmission control module can directly call the preset key to participate in encryption and decryption operations, and the hardware implementation and access operation are simpler.
The CPU chip simulator supporting the data secure transmission provided by the embodiment of the invention has the following advantages:
1. data on a debugging channel between emulator software and emulator hardware is transmitted in an encryption mode, and data transmission is safer.
2. The random number participating in the generation of the transmission key is generated by the chip simulation module, and the generation operation of the random number is positioned in the chip simulation module, so that the random number generation logic of the chip simulation module can be directly utilized, and the realization is easier.
3. When debugging is started each time, the transmission key is regenerated, and the difficulty of cracking the transmission data is increased.
4. The operation of obtaining the random number is initiated by simulator software, and the transmission of the random number adopts encryption transmission to increase the safety of the random number.
5. Both the emulator software and the emulator hardware have the functions of encrypting and decrypting transmitted data, so that bidirectional data transmission protection is realized.
Fig. 3 is a flowchart of a method for securely transmitting data according to an embodiment of the present invention. As shown in fig. 3, an embodiment of the present invention provides a data secure transmission method, based on the above CPU chip emulator supporting data secure transmission, where the method includes:
s1), when starting debugging, the emulator software sends a request for obtaining a random number to a transmission control module of the emulator hardware through the transmission management module.
When sending the request for obtaining the random number, the transmission management module encrypts a data packet of the request for obtaining the random number by using a preset key.
S2) the simulator hardware generates random number according to the received request for obtaining random number, and the random number is returned to the transmission management module through the transmission control module.
Specifically, the simulator hardware generates a random number through a random number generation unit in a chip simulation module, and transmits the random number to the transmission control module; and the transmission control module stores the random number, encrypts the random number by adopting a preset key and returns the encrypted random number to the transmission management module.
S3), the transmission management module encrypts the random number by adopting a preset key to generate a transmission key, encrypts data to be sent to the transmission control module by utilizing the transmission key, and sends the encrypted data to the transmission control module.
Specifically, a symmetric encryption algorithm is adopted, and the preset key is used for encrypting the random number to generate the transmission key. And encrypting data to be sent to the transmission control module, such as a data packet of debugging operations of program downloading, register configuration and the like, by using the transmission key.
S4) the transmission control module encrypts the random number by adopting a preset key to generate a transmission key, and decrypts the encrypted data sent by the transmission management module by utilizing the transmission key.
Specifically, a symmetric encryption algorithm is adopted, and a preset key is used for encrypting the random number to generate a transmission key. And decrypting the encrypted data sent by the transmission management module by using the transmission key.
In this embodiment, the method further includes:
and the transmission control module encrypts data needing to be returned to the transmission management module by using the transmission key. And the transmission management module decrypts the encrypted data returned by the transmission control module by using the transmission key.
When the debugging is started again, the transmission management module sends a request for obtaining the random number to the transmission control module again; and the transmission management module regenerates the transmission key according to the random number returned by the transmission control module. When debugging is started each time, the random number is obtained again, the transmission key is generated again, the characteristics of the random number are utilized to ensure that the transmission key generated when debugging is started each time is different, and the difficulty of cracking transmission data is increased.
According to the data safety transmission method provided by the embodiment of the invention, the interactive data between the simulator software and the simulator hardware is transmitted in a bidirectional encryption mode, so that the data transmission is safer. The data security transmission scheme can protect all data on the debugging channel, and can protect debugging operations such as downloading of a security algorithm software library, register configuration and the like.
While the embodiments of the present invention have been described in detail with reference to the accompanying drawings, the embodiments of the present invention are not limited to the details of the above embodiments, and various simple modifications can be made to the technical solution of the embodiments of the present invention within the technical idea of the embodiments of the present invention, and the simple modifications are within the scope of the embodiments of the present invention. It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, the embodiments of the present invention will not be described separately for the various possible combinations.
In addition, any combination of the various embodiments of the present invention is also possible, and the same should be considered as disclosed in the embodiments of the present invention as long as it does not depart from the spirit of the embodiments of the present invention.

Claims (10)

1. A CPU chip simulator supporting data secure transmission comprises simulator software and simulator hardware, wherein data interaction is carried out between the simulator software and the simulator hardware through a debugging channel, and the CPU chip simulator is characterized by further comprising: the transmission management module and the transmission control module;
The transmission management module is configured in the simulator software and used for encrypting data transmitted to the simulator hardware by the simulator software or decrypting received data;
the transmission control module is configured in the emulator hardware and is used for encrypting data transmitted to the emulator software by the emulator hardware or decrypting received data.
2. The CPU chip emulator supporting secure data transmission of claim 1, wherein the emulator hardware comprises a chip emulation module, the chip emulation module comprising a random number generation unit;
the chip simulation module is used for sending the random number generated by the random number generation unit to the transmission control module.
3. The CPU chip emulator capable of supporting secure data transmission of claim 1, wherein the emulator hardware further comprises a key storage module for storing key data required for data encryption or decryption operations performed by the transmission control module.
4. The CPU chip emulator capable of supporting secure data transmission according to claim 1, wherein a preset key is stored in the transmission control module, and the preset key participates in an encryption or decryption operation of data in the transmission control module.
5. The CPU chip emulator supporting secure data transmission of claim 1, wherein the emulator software comprises a data generation module, the data generation module is configured to parse and convert data to be debugged into data packets that can be transmitted through the debug channel, and transmit the data packets to the transmission management module.
6. A data secure transmission method based on the CPU chip emulator supporting data secure transmission of claim 1, the method comprising:
when debugging is started, simulator software sends a request for acquiring a random number to a transmission control module of simulator hardware through a transmission management module;
the simulator hardware generates a random number according to the received random number acquisition request, and returns the random number to the transmission management module through the transmission control module;
the transmission management module encrypts the random number by adopting a preset key to generate a transmission key, encrypts data to be sent to the transmission control module by utilizing the transmission key, and sends the encrypted data to the transmission control module;
and the transmission control module encrypts the random number by adopting a preset key to generate a transmission key, and decrypts the encrypted data sent by the transmission management module by utilizing the transmission key.
7. The method for secure transmission of data according to claim 6, further comprising:
the transmission control module encrypts data needing to be returned to the transmission management module by using the transmission key;
and the transmission management module decrypts the encrypted data returned by the transmission control module by using the transmission key.
8. The method for securely transmitting data according to claim 6, wherein the sending, by the emulator software, the request for obtaining the random number to the transmission control module of the emulator hardware via the transmission management module comprises:
and when the random number acquisition request is sent, the transmission management module encrypts a data packet of the random number acquisition request by using a preset key.
9. The method according to claim 6, wherein the emulator hardware generates a random number according to the received request for obtaining a random number, and returns the random number to the transmission management module through the transmission control module, and the method comprises:
the simulator hardware generates a random number through a random number generating unit in a chip simulation module and transmits the random number to the transmission control module;
And the transmission control module stores the random number, encrypts the random number by adopting a preset key and returns the encrypted random number to the transmission management module.
10. The method for secure transmission of data according to claim 6, further comprising:
when the debugging is started again, the transmission management module sends a request for obtaining the random number to the transmission control module again;
and the transmission management module regenerates the transmission key according to the random number returned by the transmission control module.
CN202010573850.6A 2020-06-22 2020-06-22 CPU chip simulator supporting data secure transmission and data secure transmission method Pending CN111865574A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010573850.6A CN111865574A (en) 2020-06-22 2020-06-22 CPU chip simulator supporting data secure transmission and data secure transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010573850.6A CN111865574A (en) 2020-06-22 2020-06-22 CPU chip simulator supporting data secure transmission and data secure transmission method

Publications (1)

Publication Number Publication Date
CN111865574A true CN111865574A (en) 2020-10-30

Family

ID=72987304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010573850.6A Pending CN111865574A (en) 2020-06-22 2020-06-22 CPU chip simulator supporting data secure transmission and data secure transmission method

Country Status (1)

Country Link
CN (1) CN111865574A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030216902A1 (en) * 2002-05-20 2003-11-20 Hwang-Kyu Lim Chip development system with built-in function library
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN109101386A (en) * 2018-06-26 2018-12-28 北京中电华大电子设计有限责任公司 A kind of emulator for supporting ram test
CN109977024A (en) * 2019-04-03 2019-07-05 北京智芯微电子科技有限公司 The cpu chip emulator for supporting NVM to download in real time
CN109977023A (en) * 2019-04-03 2019-07-05 北京智芯微电子科技有限公司 Support the cpu chip emulator of debugging permission control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030216902A1 (en) * 2002-05-20 2003-11-20 Hwang-Kyu Lim Chip development system with built-in function library
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN109101386A (en) * 2018-06-26 2018-12-28 北京中电华大电子设计有限责任公司 A kind of emulator for supporting ram test
CN109977024A (en) * 2019-04-03 2019-07-05 北京智芯微电子科技有限公司 The cpu chip emulator for supporting NVM to download in real time
CN109977023A (en) * 2019-04-03 2019-07-05 北京智芯微电子科技有限公司 Support the cpu chip emulator of debugging permission control

Similar Documents

Publication Publication Date Title
US20160203087A1 (en) Method for providing security for common intermediate language-based program
AU2019271965A1 (en) POS System with white box encryption key sharing
CN110621014B (en) Vehicle-mounted equipment, program upgrading method thereof and server
CN110912690A (en) Data encryption and decryption method, vehicle and storage medium
CN105915502A (en) Method and system for facilitating network joining
CN106372497B (en) Application programming interface API protection method and protection device
CN104902138A (en) ENCRYPTION/DECRYPTION SYSTEM and its control method
CN111181898A (en) Data security protection method based on background server and APP client
CN109194467A (en) A kind of safe transmission method and system of encryption data
CN111865574A (en) CPU chip simulator supporting data secure transmission and data secure transmission method
JP2013045277A (en) Program obfuscation method and remote debug system
CN114039743A (en) Data encryption method, device, storage medium and terminal
CN201029035Y (en) Device for performing software protection code
KR102050797B1 (en) Middle Box Apparatus and processing Encrypted Traffic Method Thereof
CN115310115B (en) Privatization deployment encryption method, device, equipment and storage medium
CN113785294A (en) Method and device for transmitting boot code with improved data security
Schulz et al. Evaluation of a formalized encryption library for safety-critical embedded systems
CN104580181A (en) Device and method for data encryption and encryption accelerator engine
CN112613330B (en) Ultrahigh frequency RFID verification system based on GJB protocol
Guštin CAN Bus Security Protocol: lightweight message confidentiality, authentication, and freshness on an automotive bus
CN113783832B (en) Development and manufacturing method and device for block chain common cryptographic algorithm SDK (software development kit) packet
CN115993525B (en) Chip batch sample testing and verifying method based on Ymodem protocol
CN117714513B (en) Method and system for controlling target equipment based on cloud server
CN115883115A (en) Encryption and decryption device and encryption and decryption method for data transmission
CN117556461A (en) RISC-V privilege instruction based inter-application authentication and secure communication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030

RJ01 Rejection of invention patent application after publication