Embedded software encryption registration method combining with embedded equipment

An embedded device and embedded software technology, applied in the field of encryption, can solve problems such as increasing the difficulty of cracking products, loss of original manufacturers, cracking, etc., to prevent malicious cracking and malicious competition, and the encryption method is simple and easy to maintain.

Inactive Publication Date: 2018-11-27
河南正来电子科技有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, some industries use online monitoring, online monitoring and other technological and informational means to manage, which improves the management level and reduces and eliminates losses caused by improper management. However, these technological and informational means such as online monitoring and online monitoring are all It is inseparable from the corresponding hardware products and management software. The R&D costs of the relevant manufacturers to develop these high-stability and reliable hardware products are very high. However, some competitors will crack these products of the same industry in order to save effort. Some users are willing to use cracked products in order to save costs, which often causes great losses to the original manufacturers. In order to prevent this phenomenon, many manufacturers will use encryption methods to prevent products from being cracked
[0003] At present, most manufacturers use a relatively simple encryption method. When the user changes the system time, the encryption method may be destroyed, resulting in cracking. A few manufacturers use relatively simple hardware encryption, such as: switching buses, using alternative RAM, using GAL devices, and encrypting the software in the EPROM outside the device, this does increase the difficulty of cracking the product to a certain extent, but overall the product is still more likely to be cracked, and the encryption effect is not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded software encryption registration method combining with embedded equipment
  • Embedded software encryption registration method combining with embedded equipment
  • Embedded software encryption registration method combining with embedded equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] like figure 1 As shown, the hardware architecture of the embedded device includes a model of ARM Cortex-M3 core 1, memory 2, RTC clock 4 and touch screen 3, the ARM Cortex-M3 core 1 is in the center of the architecture, and the memory 2, RTC Both the clock 4 and the touch screen 3 surround the ARM Cortex-M3 core 1 to verify, calculate, display, read and store corresponding data.

[0035] The embedded software is stored in the memory 2, and the operation of the embedded software requires the cooperation of the ARM Cortex-M3 core 1, the memory 2, the RTC clock 4 and the touch screen 2.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded software encryption registration method combining with embedded equipment. According to the method, embedded software and the core processing unit ID of connected embedded equipment are bonded, the core processing unit ID and time of the embedded equipment are taken as encrypted parameter variables, registration is conducted by using an Rijndael algorithm in anaes algorithm to generate registration codes, secondary packaging encryption is conducted on the generated registration codes and the core processing unit ID of the embedded equipment to prevent errors in the mutual transmission process of the registration codes, the registration encryption of the embedded software is achieved, the normal, safe and reliable operation of the embedded software is ensured, malicious decryption on management software of a malicious opponent is effectively prevented, and the loss of an original producer is reduced.

Description

technical field [0001] The invention relates to the technical field of an encryption method, in particular to an embedded software encryption registration method combined with an embedded device. Background technique [0002] At present, some industries use online monitoring, online monitoring and other technological and informational means to manage, which improves the management level and reduces and eliminates losses caused by improper management. However, these technological and informational means such as online monitoring and online monitoring are all It is inseparable from the corresponding hardware products and management software. The R&D costs of the relevant manufacturers to develop these high-stability and reliable hardware products are very high. However, some competitors will crack these products of the same industry in order to save effort. Some users are willing to use cracked products in order to save costs, which often causes great losses to the original ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 王树茂
Owner 河南正来电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products