Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing burning data from being stolen by encrypting burning port

A data and port technology, which is applied in the field of MCU programming and data security, can solve data leakage and other problems, and achieve the effect of reducing costs

Active Publication Date: 2019-06-21
GUANGZHOU XINGYI ELECTRONICS TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In order to solve the problem of data leakage caused by maliciously monitoring the burning port during data burning in the prior art, the purpose of the present invention is to provide a method for preventing burning data from being eavesdropped and stolen by encrypting the burning port

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing burning data from being stolen by encrypting burning port
  • Method for preventing burning data from being stolen by encrypting burning port
  • Method for preventing burning data from being stolen by encrypting burning port

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A method to prevent burning data from being eavesdropped and stolen by encrypting the burning port, the specific steps are as follows:

[0031] 1. Open the host computer software running the supporting burner in the host computer;

[0032] 2. The upper computer software used by the supporting burner generates encrypted burning configuration, encrypted burning data and generates a corresponding applet for decryption according to the burning configuration;

[0033] 3. The host computer sends the encrypted programming configuration and programming data, and the decrypted applet to the programmer through USB and other communication interfaces, and the programming configuration and data (including programming data and applet data) inside the programmer ) The analysis and extraction subsystem will correctly analyze and extract the programming configuration, programming data, and store the small program in the internal memory of the chip or the external non-volatile storage. A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of MCU burning and data safety, and particularly relates to a method for preventing burning data from being stolen by encrypting a burning port. The burning port is encrypted, correct data is prevented from being obtained by monitoring the burning port, and the development result is protected from being stolen. Meanwhile, due to the facts that the storage space of a burner is generally small and the storage space of an upper computer is generally large, decrypted small programs are directly stored in the upper computer, and the cost of the burner can be reduced.

Description

technical field [0001] The invention belongs to the technical field of MCU programming and data security, and in particular relates to a method for preventing programming data from being eavesdropped and stolen by encrypting a programming port. Background technique [0002] The existing burning technology is generally to burn the internal memory of microcontrollers such as MCU or external memory. After burning correctly, the whole hardware system can run normally. [0003] For the current programming technology, the entire programming process is realized by the cooperation of the programmer, the host computer, and the host computer software that is used by the programmer and runs on the host computer. The operation steps are as follows: [0004] 1. Connect the programmer to the host computer through a communication interface such as USB; [0005] 2. Open the host computer software supporting the burner, and perform various programming related configurations according to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F8/61
Inventor 龙冠荣
Owner GUANGZHOU XINGYI ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products