Software protection method based on microchip

A software protection and chip technology, applied in program/content distribution protection, instruments, electrical digital data processing, etc., to achieve the effects of high performance, small amount of computation, and low cost

Inactive Publication Date: 2012-06-13
HUIZHOU DESAY SV AUTOMOTIVE
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims at the problems existing in the current confidentiality requirements for software modules based on microchips, and proposes a method for protecting software based on microchips

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method based on microchip
  • Software protection method based on microchip
  • Software protection method based on microchip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to facilitate the understanding of those skilled in the art, the technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments:

[0022] A method for protecting software based on a microchip, including an application request module, an ID number operation module, a software verification and encryption module, such as figure 1 As shown, its implementation steps are:

[0023] Before use, the step of encrypting the software is to use the acquisition module to read the ID number X of the microchip, and the verification module encrypts the read ID number X to obtain the ciphertext Y, and then write Y to the microchip through the acquisition module in the fuse bit.

[0024] When in use, the steps of reading and verifying the software encrypted information are:

[0025] (1) When the microchip is applied, the application request module requests access to the software module, the ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software protection method based on a microchip. The software protection method comprises the following steps of: encrypting software before use; reading and verifying software encrypted information in use; and handshaking a verification module for verifying and an obtaining module for obtaining the encrypted information before reading and verifying the software encrypted information. The software protection method is realized by using the uniqueness of an ID number of the microchip and adding the steps of handshaking and verifying. As the encrypted ID number is written into the fuse bit of the microchip, when a software module based on the microchip is used each time, handshaking verification and comparison verification of the ID number and the fuse bit is necessarily passed. According to the software protection method disclosed by the invention, the software module is bound with the microchip so as to achieve high security and less possibility of breakage. The referred data amount and the calculation amount are small so that the properties are not influenced basically. Meanwhile, the cost is very low due to no need of adding other hardware equipment.

Description

technical field [0001] The invention relates to a microchip-based software protection method. Background technique [0002] Almost all software companies have their own core technologies, which cannot be illegally embezzled. The phenomenon of illegal misappropriation of software modules belonging to a certain company or a certain person is also common, especially when the project is handed over to an outsourcing company for development, and some of its own core technologies are used in the project. Easy to be stolen illegally. For example: A company has independently developed a handwriting recognition software module, and the company outsources a project that needs to use the handwriting recognition module to an outsourcing company for development. When the company hands over the handwriting recognition software module to the outsourcing company, the handwriting recognition software module The possibility of being stolen is very high. The protection of software modules i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12G06F21/44
Inventor 黄晓亮
Owner HUIZHOU DESAY SV AUTOMOTIVE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products