Anti-copy method for embedded device program

An embedded device and anti-copy technology, applied in the direction of program/content distribution protection, etc., can solve problems such as cumbersome implementation process and complex algorithm

Active Publication Date: 2016-01-20
XUJI GRP +3
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the protection of the program through the mechanism is complex, and in order to consider the anti-copy, the anti-copy mechanism is added to the process and thread, and the implementation process is cumbersome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-copy method for embedded device program
  • Anti-copy method for embedded device program
  • Anti-copy method for embedded device program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0022] The anti-copy method of the embedded device program proposed by the present invention stores ID and License information in a hidden area, protects it, and enters the hidden area after the device program is authorized and confirmed, reads the device ID to the RAM area, and in the RAM area , combine the ID offset information and the authorization algorithm to calculate the license, and finally compare the calculated license with the license in the hidden area. Only when the two are consistent, the program enters the running state.

[0023] Take a certain embedded device program as an example below to illustrate, when the authorization flag of the embedded device program is OX00, it is in an unauthorized state, and when it is OX01, it is in an authorized state; Randomly generated by the server); the corresponding authorization code is ab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-copy method for an embedded device program. The method comprises: firstly, storing an embedded device ID and License information in a hidden region, and reading device ID information to an RAM region from the hidden region after the device program performs authorization; secondly, calculating the License information according to the read device ID information and an authorization algorithm; and finally, comparing the calculated License information with the License information in the hidden region, and if the calculated License information is the same as the License information in the hidden region, the program entering a running state, or otherwise, performing authorization requesting. According to the method, the ID and the License are stored in the hidden region and technically protected, and the program is subjected to authorization management through the ID and the License; and the program stealer does not have a password, so that the hidden region cannot be accessed, data copy also cannot be realized, and further the program is protected. The method is simple and feasible, and can effectively protect an authorization process only by processing a storage mechanism of the ID and the License information without the need for complex encryption and decryption of the algorithm and addition of an anti-copy mechanism in a process and a thread.

Description

technical field [0001] The invention relates to an anti-copy method for embedded device programs, which belongs to the technical field of embedded devices. Background technique [0002] Embedded system programs are written into devices using customized methods, and are used in large-scale systems such as control, monitoring devices, and factories. With the expansion of its application fields, the risk of piracy also increases. It is necessary to provide an embedded The method of program anti-copy is used to prevent this kind of risk. However, the current program operation process with authorization protection is as follows: figure 1 As shown, the device authorization validity calculation program identifies the ID and License information, and the program can be run after confirmation. ID and license information are generally stored in read-only memory, which is written when leaving the factory, which is relatively limited by hardware, and although the addition of authorizat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 陈玉峰王永刚应站煌王旭宁王龙洋郑晓庆
Owner XUJI GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products