Unlock instant, AI-driven research and patent intelligence for your innovation.

Software verification method, software and hardware binding method and its programmable device

A software verification, software and hardware technology, applied in the direction of equipment, program/content distribution protection, internal/peripheral computer component protection, etc., can solve the problems of being cracked, manufacturer's economic loss, easy to be copied in large quantities, etc., and achieve the goal of improving security Effect

Active Publication Date: 2021-06-04
THE FOURTH PARADIGM BEIJING TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the current software can run on devices developed by different manufacturers, the method based on software encryption is easy to be cracked, and after cracking, it is easy to be copied in large quantities, which will bring huge economic losses to the manufacturers.
[0003] Therefore, more and more manufacturers are now bundling software and hardware for sale, that is, binding hardware devices and corresponding software together so that the supporting software can only run on its corresponding hardware platform. However, the existing The software-hardware binding verification method is executed by the host running the software on the local CPU. For example, the verification public key of the digital signature algorithm must be stored on the local machine. However, it is precisely because the verification public key and other data are stored in the local CPU. Therefore, there is a possibility that the verification key is read or the key generation algorithm is cracked, and then the existing hardware-software binding verification method based on asymmetric key encryption may be cracked, or, in the future In the case of a substantial increase in computing power, the existing software-hardware binding verification method may also be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software verification method, software and hardware binding method and its programmable device
  • Software verification method, software and hardware binding method and its programmable device
  • Software verification method, software and hardware binding method and its programmable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to embodiments of the invention, examples of which are illustrated in the accompanying drawings. The embodiments are described below in order to explain the present invention by referring to the figures.

[0031] Here, in order to facilitate a better understanding of this application, the general idea of ​​the present invention is first described. The present invention realizes software and hardware binding when the software and the computing device leave the factory. The identification of the specified hardware in the device is digitally signed to obtain a digital certificate file, and then the data about the public key corresponding to the private key is solidified in the programmable device. After that, the manufacturer releases the software together with the digital certificate file. , the programmable device may be a hardware component of the computing device or may be combined with the computing device in a pluggable manner. W...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a software verification method, a software-hardware binding method and a programmable device thereof. The software and hardware binding method includes: obtaining the identification of the designated hardware of the computing device that needs to be bound with the software to be released; generating a pair of public key and private key; solidifying the data about the public key in the programmable device; by using The private key digitally signs the identification of the specified hardware according to the digital signature algorithm to generate a digital certificate file, and distributes the digital certificate file together with the software.

Description

technical field [0001] The present application generally relates to the technical field of software and hardware protection of computing devices, and more specifically, relates to a software and hardware binding method, a software verification method and a programmable device thereof. Background technique [0002] At present, software and hardware manufacturers use various measures to protect the intellectual property rights of their own developed software and hardware. However, because the current software can run on devices developed by different manufacturers, the method based on software encryption is easy to be cracked, and after cracking, it is easy to be copied in large quantities, thereby causing huge economic losses to the manufacturer. [0003] Therefore, more and more manufacturers are now bundling software and hardware for sale, that is, binding hardware devices and corresponding software together so that the supporting software can only run on its corresponding ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/60G06F21/64
CPCG06F21/123G06F21/602G06F21/64G06F21/72G06F21/73
Inventor 杨俊李嘉树卢冕季成
Owner THE FOURTH PARADIGM BEIJING TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More