Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting embedded type device software

A technology for embedded devices and software protection, applied in the direction of program/content distribution protection, etc., can solve the problems of software identification, software verification, and poor security.

Active Publication Date: 2013-03-20
PHICOMM (SHANGHAI) CO LTD
View PDF3 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, the above two protection methods have their own disadvantages.
[0010] The first verification method requires that the network device must have a user interface, which can provide the user with the input and storage of the verification serial number; and the user can input a large number of the same serial number, and the software cannot recognize it.
[0011] The second verification method is more flexible than the first method, but if the network device used by the customer cannot be connected to the Internet and is only used in the internal network, software verification will not be possible; and this method has hidden dangers of leaking user information and poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting embedded type device software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in combination with principle diagrams and specific operation examples.

[0028] The present invention has a premise assumption: in the network equipment, there must be an action of burning the MAC address before leaving the factory, and there is no less than one block of reserved space in the dynamic memory (Flash). The special physical structure of a block ranges from 4KB to 128KB, accounting for about 0.2%-0.5% of the Flash size. This part of the space is used to store the check code that is burned simultaneously with the MAC address.

[0029] Under this premise, Flash will have an area in the software to store authentication information.

[0030] In the execution structure of the software itself, first of all, corresponding to each version of the embedded software, the software itself will have an 8-digit serial number, corresponding to the number of the software version itself, defined here as FIRMWARE_NUMBER, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting embedded type device software. The method comprises the steps that a piece of storage space is drawn from dynamic memory of a network device to be used for storing check codes; the software is started, burn information is read, and the burn information comprises MAC (media access control) addresses and a serial number; the MAC addresses and the serial number are subjected to checking; if the checking fails, the operation enters a check code input mode, the newly input check codes are written into the dynamic memory, and the software is started again; and if the checking succeeds, the software is started normally. According to the method for protecting the embedded type device software, a check method of the MAC addresses is utilized, characteristics that the network device is required to burn the MAC addresses and the MAC addresses are globally unique are utilized, so that software validity checking and copy protection checking are simultaneously performed during a process of MAC burning; without device networking, the checking can be performed and the MAC addresses are bound; but by means of encryption algorithm calculation, larger irreversibility of the burn information is achieved.

Description

technical field [0001] The invention relates to a software protection method, in particular to an embedded device software protection method. Background technique [0002] Traditional network access devices have simple functions, and usually the software is directly solidified in the chip. Embedded software has transformed from a simple hardware add-on product to a value-added product that highlights the market competitiveness of hardware products. It can not only be used as an add-on product to hardware, but also It can be commercialized separately as a function extension. Under such a prospect trend, the copyright protection of the software itself is more important than ever. [0003] The complexity of home gateway equipment is getting higher and higher, and the functions that can be realized are also increasing. But the ensuing problem is that due to its characteristics, embedded software is usually solidified in the hardware device and stored in the flash directly by b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
Inventor 周宸晏
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products