Encryption and verification method for embedded equipment

An embedded device and verification method technology, applied in the field of embedded device encryption and verification, can solve the problems of illegal migration of core software, unfavorable manufacturer's device version control, etc., to achieve the effects of strong personalization, lower production costs, and great difficulty in cracking

Active Publication Date: 2015-10-07
GUODIAN NANJING AUTOMATION
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, the same manufacturer often develops devices with different functional versions based on the same software and hardware platform according to market demand and price levels. Due to design complexity, the same encryption method is often used. The existing encryption method is based on the key After the verification is passed, the core code will be loaded, and it will not be verified whether the core code is authorized to run in the current version of the device, which may lead to illegal transplantation of core software between different versions of devices, which is not conducive to the manufacturer's device version control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and verification method for embedded equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0033] figure 1 It is a schematic flow diagram of an embodiment of the embedded device encryption and verification method provided by the present invention, as figure 1 shown, including steps:

[0034] S101. Burn the driver code and core code to the embedded device.

[0035] Wherein, the driver code includes an encryption program and a memory driver, and the core code includes a core application program and a device version serial number suitable for this type of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and verification method for embedded equipment. The encryption and verification method for embedded equipment comprises: S101, burning a driving code and a core code into the embedded equipment; S102, after the embedded equipment is powered on, operating the driving code by a CPU (Central Processing Unit) of the embedded equipment; S103, reading a chip number of a memory from the memory by the CPU, and extracting an equipment version serial number from the core code; S104, encrypting the chip number and the equipment version serial number by the CPU through an encryption procedure to form a first equipment password; S105, reading a second equipment password from an equipment password region of the memory by the CPU; if the read second equipment password is null, executing S106; otherwise, executing S107; S106, outputting the chip number to a data safe region of the memory by the CPU and stopping running; and S107, carrying out consistency verification on the first equipment password and the second equipment password by the CPU; if so, judging that the verification passes and operating the core code by the CPU; otherwise, executing the S106. According to the encryption and verification method for embedded equipment, an extra encryption device is not additionally arranged, so that the core code and hardware of the embedded equipment can be prevented from malicious duplication and falsification.

Description

technical field [0001] The invention relates to the field of embedded technology, in particular to an encryption and verification method for an embedded device. Background technique [0002] With the widespread application of embedded devices, its hardware and software design technology directly represents the value of the device, and the encryption protection of embedded devices is becoming more and more important. At present, the encryption methods for embedded systems are mainly as follows: using a protected EEPROM in the device to perform key verification and encryption on the software, that is, the embedded system writes the generated key into the EEPROM chip and the device memory at the same time when it leaves the factory. After the device is powered on, the CPU will read the key in the EEPROM chip and the key in the memory for consistency verification. If the verification passes, the core code will be loaded. [0003] In the above method, an additional encryption ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/79
CPCG06F21/123G06F21/79
Inventor 蔡亮亮陈磊卢家力
Owner GUODIAN NANJING AUTOMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products