Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flash encryption method and device for vehicle-mounted terminal

An encryption method and a vehicle-mounted terminal technology are applied in the field of the vehicle-mounted terminal Flash encryption method and the device thereof, and can solve the problem that the cost cannot be borne by ordinary users.

Active Publication Date: 2013-04-03
SHENZHEN HANGSHENG ELECTRONICS
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the need to lease international channels to connect to the Internet, the cost is unaffordable for ordinary users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flash encryption method and device for vehicle-mounted terminal
  • Flash encryption method and device for vehicle-mounted terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Below in conjunction with accompanying drawing, preferred embodiment of the present invention is described in further detail:

[0032] Such as figure 1 with figure 2 As shown, sending and transferring information between the PC end and the LPC end includes the following steps:

[0033] Step A: In the MCU, generate the ciphertext, compare it with the ciphertext passed from the upper position, if they are the same, the burning is successful;

[0034] Step B: analyze the ISP instruction on the MCU side at the host computer through the serial port, and obtain the serial number of the MCU;

[0035] Step C: pass in the obtained MCU serial number into the MD5 algorithm, and obtain 16-bit MD5 ciphertext after encryption;

[0036] Step D: Utilize the last data block of the MCU to save the corresponding verification information.

[0037] However, the solution of the present invention is not limited to generating ciphertext from the serial number of the MCU, and the ciphertex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a flash encryption method and device for a vehicle-mounted terminal. The method comprises the following steps: step A: generating a cipher text on an MCU (micro-programmed control unit) and comparing the cipher text with a cipher text transmitted from an upper machine, wherein if the two cipher texts are the same, the programming is successful; step B: analyzing an ISP (internet service provider) instruction of the MCU side and acquiring a serial number of the MCU by the upper machine through a serial port; step C: transmitting the acquired serial number of the MCU to an MD5 algorithm and encrypting to obtain a 16-bit MD5 cipher text; and step D: storing the corresponding verification information by using a last data block of the MCU. A binary file well programmed by the MCU can be used for universal programming, and one binary file can be used for programming all the MCUs of the same type, but technology loss becomes possible in such a way, so that programming is conducted bit by bit, the programmed binary code can only be used for an MCU chip but cannot be applied to other MCU chips.

Description

technical field [0001] The invention relates to an RT-Thread-based vehicle terminal Flash encryption method and a device thereof, in particular to an RT-Thread-based vehicle terminal Flash encryption method and a device thereof. Background technique [0002] In the electronics industry, in view of the fact that copycats are everywhere in the market, the state advocates vigorous enterprises and groups in the market to speed up industrial upgrading, strive to innovate, and form their own core strength. In order to prevent the core technology of the enterprise from being copied by unscrupulous elements, a technology is needed to protect its own technological achievements, which requires a new type of encryption technology. [0003] The traditional MCU encryption technology is to add a read protection (CRP) mechanism to the startup code, and there are three levels of protection mechanisms in total: [0004] CRP1: Disable chip access via JTAG pins. This mode allows partial flas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
Inventor 何照丹唐金涛
Owner SHENZHEN HANGSHENG ELECTRONICS
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More