CN-121980591-A - Memory encryption dump method, device, communication equipment, chip and chip module
Abstract
The application relates to a memory encryption dump method, a memory encryption dump device, communication equipment, a chip and a chip module. The method comprises the steps of obtaining preset dump information of a memory to be dumped, enabling the preset dump information to comprise encryption identifications corresponding to a plurality of memory segments, responding to the encryption identifications to represent that encryption is needed, encrypting data in the memory segments to be encrypted based on a preset key to obtain encrypted data, and writing the encrypted data into a dump file. By adopting the method, memory encryption dump can be realized, and the security of technical confidentiality or sensitive data is ensured.
Inventors
- LU QINGHUA
Assignees
- 展讯通信(上海)有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20260129
Claims (10)
- 1. A memory encryption dump method, the method comprising: Acquiring preset dump information of a memory to be dumped, wherein the preset dump information comprises encryption identifiers corresponding to a plurality of memory segments; responding to the encryption identification to represent that encryption is needed, and encrypting data in a memory segment to be encrypted based on a preset key to obtain encrypted data; Writing the encrypted data into a dump file.
- 2. The method according to claim 1, wherein the method further comprises: and responding to the encryption identification to indicate that encryption is not needed, and writing the data in the memory segment which is not needed to be encrypted into the dump file.
- 3. The method according to claim 1, wherein encrypting the data in the memory segment to be encrypted based on the preset key to obtain the encrypted data comprises: acquiring the preset secret key from a safe storage area of the equipment where the memory to be dumped is located; And encrypting the data in the memory segment to be encrypted based on the preset key to obtain the encrypted data.
- 4. A method according to claim 3, wherein the preset key is stored in firmware of the device, the method further comprising: and in response to the first start-up of the device, writing the preset key in the firmware into the secure storage area, and erasing the preset key in the firmware.
- 5. The method according to any one of claims 1-4, wherein the preset dump information further includes location information corresponding to a plurality of memory segments, and encrypting the data in the memory segments to be encrypted based on the preset key to obtain encrypted data includes: acquiring target data from a memory segment to be encrypted according to the position information; And encrypting the target data based on the preset key to obtain the encrypted data.
- 6. The method of claim 1, wherein obtaining the preset dump information of the memory to be dumped comprises: The preset dump information is obtained from the shared memory segment of the memory to be dumped, and the preset dump information further comprises an index, a starting address and a length.
- 7. A memory encryption dump device, the device comprising: The system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring preset dump information of a memory to be dumped, and the preset dump information comprises encryption identifiers corresponding to a plurality of memory segments; The encryption module is used for responding to the encryption identification to represent the need of encryption and encrypting the data in the memory segment which needs to be encrypted based on a preset key to obtain encrypted data; and the first writing module is used for writing the encrypted data into a dump file.
- 8. A communication device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
- 9. A chip comprising a processor and a communication interface, the processor being configured to cause the chip to perform the steps of the method of any one of claims 1 to 6.
- 10. The utility model provides a chip module, its characterized in that includes communication module, power module, storage module and chip, wherein: The power supply module is used for providing electric energy for the chip module; the storage module is used for storing data and instructions; the communication module is used for carrying out internal communication of the chip module or carrying out communication between the chip module and external equipment; The chip being for performing the steps of the method of any one of claims 1 to 6.
Description
Memory encryption dump method, device, communication equipment, chip and chip module Technical Field The present application relates to the field of communications technologies, and in particular, to a memory encryption and dump method, device, communications equipment, chip, and chip module. Background Different parts of the communication chip software usually have different security levels, but when the chip fails or is abnormal, all memory data are often Dumped (DUMP) for technical experts to analyze, and the DUMP process lacks security. Taking the communication part (Communication Part, CP) in the communication chip as an example, CP software is generally divided into a protocol software communication part (Protocol Software Communication Part, PSCP) and a physical layer software communication part (PHYSICAL LAYER Software Communication Part, PHYCP), wherein PSCP may be sourced to clients, and PHYCP belongs to technical secrets of a company, not only is not opened to clients but also is prohibited from being viewed by non-PHYCP technicians. When the CP software is abnormal, the field information of the CP software is usually dumped to the DUMP file for the CP software technical expert to analyze and solve the problems, and the data leakage is easy to be caused by the full dumping mode because the DUMP file usually contains all relevant memories and all running codes and data. For this reason, in the related art, when an abnormality occurs in the CP software, only the memory data of PSCP is dumped, and the memory data of PHYCP is not dumped. However, anomalies may originate from PHYCP, which can be inconvenient for a given problem when it is necessary to view PHYCP, because the memory data of PHYCP is not dumped. Disclosure of Invention In view of the foregoing, it is desirable to provide a memory encryption dump method, device, communication device, chip, and chip module capable of implementing encryption dump. In a first aspect, the present application provides a memory encryption dumping method, including: Acquiring preset dump information of a memory to be dumped, wherein the preset dump information comprises encryption identifiers corresponding to a plurality of memory segments; responding to the encryption identification to represent that encryption is needed, and encrypting data in a memory segment to be encrypted based on a preset key to obtain encrypted data; Writing the encrypted data into a dump file. In one embodiment, the method further comprises writing data in the memory segment that does not need to be encrypted to the dump file in response to the encryption identification characterizing that encryption is not needed. In one embodiment, encrypting the data in the memory segment to be encrypted based on the preset key to obtain encrypted data includes obtaining the preset key from a secure storage area of the device where the memory to be dumped is located, and encrypting the data in the memory segment to be encrypted based on the preset key to obtain the encrypted data. In one embodiment, the preset key is stored in firmware of the device, and the method further comprises writing the preset key in the firmware to the secure storage area and erasing the preset key in the firmware in response to the device being booted for the first time. In one embodiment, the preset dump information further includes location information corresponding to a plurality of memory segments, and encrypting the data in the memory segments to be encrypted based on the preset key to obtain encrypted data includes obtaining target data from the memory segments to be encrypted according to the location information, and encrypting the target data based on the preset key to obtain the encrypted data. In one embodiment, the obtaining the preset dump information of the to-be-dumped memory includes obtaining the preset dump information from a shared memory segment of the to-be-dumped memory, where the preset dump information further includes an index, a start address and a length. In a second aspect, the present application further provides a memory encryption dumping device, including: The system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring preset dump information of a memory to be dumped, and the preset dump information comprises encryption identifiers corresponding to a plurality of memory segments; The encryption module is used for responding to the encryption identification to represent the need of encryption and encrypting the data in the memory segment which needs to be encrypted based on a preset key to obtain encrypted data; and the first writing module is used for writing the encrypted data into a dump file. In a third aspect, the present application also provides a communication device comprising a memory storing a computer program and a processor implementing the steps of the method provided in the first aspect when the computer pr