Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An anti-interception code encryption burning method

A code encryption and anti-interception technology, applied in information storage, static memory, digital memory information, etc., can solve problems such as hidden dangers of PC burning code software copy, to ensure security and variability, ensure reliability, and prevent interception burning effect

Inactive Publication Date: 2011-12-14
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. There is a hidden danger of copying the PC burning code software. Although the PC software cannot be easily cracked to obtain the burning code (Code0), the factory operator can steal it and install it on any PC to perform the same burning operation
[0009] 2. ISP uses cipher text for communication and transmission during programming. Although the programming code can be prevented from being intercepted and cracked, the entire programming timing and data flow are the same every time, so there is a special data timing capture and sending tool to repeat. Hidden dangers of analog programming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-interception code encryption burning method
  • An anti-interception code encryption burning method
  • An anti-interception code encryption burning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0037] figure 2 Description of the markup:

[0038] (1) Burning tool: It consists of two parts, software and hardware, used to burn the chip;

[0039] (2) Chips: chips to be programmed, including MCU, MPU, DSP, ARM and other embedded programming chips;

[0040] (21) ISP driver: a simple communication driver for data transmission;

[0041] (22) random number (X): one of the seeds used to generate the dynamic encryption key (Key) for burning code Code0;

[0042] (23) Manufacturer code (Num): Generate a dynamic encryption key (Key) for burning code Code0 through a certain operation with a random number (X),

[0043] (24) Encryption and decryption algorithm: Encrypt and decrypt the burning code with a dynamic key (Key), including DES / 3DES, AES, SM1, etc.;

[0044] (3) PC software: including (31) burning code Code0, (32) ISP driver, (33) manufacturer code ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-interception code encryption burning method, the specific steps are as follows: the chip to be burned uses the built-in manufacturer code Num and the random number X just generated as the seed, and generates the decryption key of the burning code ciphertext Code1 through calculation Key; take the manufacturer code Num and random number X as seeds, and generate the encryption key Key of the burning code Code0 through calculation, random number X+manufacturer code Num=key Key; the burning tool of the PC uses the encryption and decryption algorithm to burn the The code Code0 is converted into the ciphertext Code1, and the integrity check value CalibNum is generated from the ciphertext Code1; the programmed chip combines the received integrity check value CalibNum to verify the integrity of the ciphertext Code1, and the burned chip passes the boot Code, the decrypted ciphertext Code1 is the burning code Code0, which is written into the chip code storage medium. The beneficial effect of the invention is that the ciphertext of the burning code is different every time burning, which can prevent interception and burning. The programming code is integrated in the programming tool to prevent the same programming tool from being created by copying the software.

Description

technical field [0001] The invention relates to the application field of embedded programming chips such as MCU, MPU, DSP, ARM, etc., in particular to an anti-interception code encryption burning method. Background technique [0002] ISP (In-System Programming) is programmable in the system, which means that the blank device on the circuit board can be programmed into the end user code without removing the device from the circuit board, and the programmed device can also be erased or erased by ISP. reprogramming. The realization of ISP is relatively simple, and the common practice is that the internal memory can be rewritten by the software of the host computer through the serial port. For the single-chip microcomputer, the data from the host computer can be received through SPI or other serial interfaces and written into the memory. So even if we solder the chip on the circuit board, as long as the serial port to interface with the host computer is reserved, the internal ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G11C7/16
Inventor 黄权
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products