Embedded terminal software anti-copy and anti-plagiarism method

An embedded terminal and anti-copy technology, which is applied in electrical components, user identity/authority verification, transmission systems, etc., can solve the problems of terminal failure and high cost, and achieve command function and performance-price ratio advantages, low cost, High safety effect

Inactive Publication Date: 2013-05-08
FUJIAN SUNNADA TECH CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some products use dongles to protect software and data to prevent illegal use of intellectual property rights. This method can effectively copy and plagiarize software, but the cost is relatively high, and there are certain risks for terminals that are used outdoors and unattended. , for example, if the dongle is artificially destroyed, the terminal will not work normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded terminal software anti-copy and anti-plagiarism method
  • Embedded terminal software anti-copy and anti-plagiarism method
  • Embedded terminal software anti-copy and anti-plagiarism method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0029] Such as figure 1 with figure 2 As shown, this embodiment provides a method for preventing copying and plagiarism of embedded terminal software, which is characterized in that it includes generation and loading of private keys, and terminal identity authentication;

[0030] The generation and loading of the private key includes the following steps:

[0031] Step S011: Extract the unique identifier of the main control chip of the terminal, the unique identifier of the encryption chip and the unique identifier of the terminal, and send these three unique identifiers into a data packet and send it to a server;

[0032] Step S012: The server extracts three unique identifiers from the data packet, encrypts the three unique identifiers using an encryption algorithm, and extracts the first N bytes of the encrypted result as the final private key and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an embedded terminal software anti-copy and anti-plagiarism method. The method consists of two parts including generation and load of a private key and authentication of a terminal identity. A dedicated security chip is embedded based on a product hardware design, and a procedure process is controlled by a method of authenticating the private key at random on the utility software design. Due to the fact that the security chip is welded on a motherboard, the security is higher and the cost is lower compared with a modular encryption dog. Meanwhile, the embedded terminal software anti-copy and anti-plagiarism method has the obvious advantages on security features, instruction function and cost performance of a hardware and a software compared with software dogs of a general concept.

Description

technical field [0001] The invention relates to software anti-copying and plagiarism technology, in particular to a method for preventing copying and plagiarism of embedded terminal software. Background technique [0002] In the fiercely competitive electronic equipment product development and program design industry in China, many companies probably have this experience. They invested a lot of money and spent a lot of time and effort to develop and design products. Soon after they were put on the market, they were thoroughly analyzed by competitors or pirates. From the hardware to the software, it was cloned intact, and a new shell was put on the market. As a result, my genuine product was defeated by my own low-priced pirated product, and the painstaking efforts and a lot of money invested in the early stage were wasted. When some companies entrust manufacturers to produce products, the manufacturers produce a large number of the same products and put them on the market un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12H04L9/32H04L29/06
Inventor 肖锋胡光杰曹礼玉吴长太
Owner FUJIAN SUNNADA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products