Flash encryption method and device for vehicle-mounted terminal
An encryption method and a vehicle-mounted terminal technology are applied in the field of the vehicle-mounted terminal Flash encryption method and the device thereof, and can solve the problem that the cost cannot be borne by ordinary users.
Active Publication Date: 2013-04-03
SHENZHEN HANGSHENG ELECTRONICS
4 Cites 2 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention provides a flash encryption method and device for a vehicle-mounted terminal. The method comprises the following steps: step A: generating a cipher text on an MCU (micro-programmed control unit) and comparing the cipher text with a cipher text transmitted from an upper machine, wherein if the two cipher texts are the same, the programming is successful; step B: analyzing an ISP (internet service provider) instruction of the MCU side and acquiring a serial number of the MCU by the upper machine through a serial port; step C: transmitting the acquired serial number of the MCU to an MD5 algorithm and encrypting to obtain a 16-bit MD5 cipher text; and step D: storing the corresponding verification information by using a last data block of the MCU. A binary file well programmed by the MCU can be used for universal programming, and one binary file can be used for programming all the MCUs of the same type, but technology loss becomes possible in such a way, so that programming is conducted bit by bit, the programmed binary code can only be used for an MCU chip but cannot be applied to other MCU chips.
Application Domain
Platform integrity maintainance
Technology Topic
Internet service providerSerial port +6
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.