Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption protection method for single-chip microcomputer software and storage medium

A technology of storage media and single-chip microcomputer, which is applied in the direction of program/content distribution protection, computer security devices, instruments, etc., can solve the problems of the proliferation of single-chip software piracy, achieve the effect of protecting single-chip software, simplify the production process, and improve the difficulty

Active Publication Date: 2020-03-24
WUHAN GEWEI ELECTRONICS TECH
View PDF17 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the invention is to overcome the problem that the software piracy of the single-chip microcomputer is flooded in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption protection method for single-chip microcomputer software and storage medium
  • Encryption protection method for single-chip microcomputer software and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] In describing the present invention, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", The orientations or positional relationships indicated by "top", "bottom", "inner", "outer", etc. are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and simplifying the description, rather than in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of single-chip microcomputer safety. The invention particularly provides an encryption protection method for single-chip microcomputer software and a storage medium. The method comprises the following steps: randomly generating multiple groups of original passwords, calculating a check value of each group of original passwords by using a hash function,performing multiple groups of hash operations on each group of original passwords to obtain HASH1, performing symmetric encryption on the HASH1 to obtain CODE1, and burning and inputting the originalpasswords, the check values and the CODE1 into a fixed storage area of a single chip microcomputer; then presetting and storing an independent UID, performing operation on the checked original password by using a plurality of hash functions to obtain HASH1, adding an independent UID to the HASH1, performing hash operation again to obtain HASH2, performing symmetric encryption on the HASH2 to obtain CODE2, and writing the CODE2 into a region position of the original password in a covering manner; and finally, randomly accessing each group of CODE1 and corresponding CODE2 data, and performing legal copy verification through calculation. According to the scheme, encryption protection of single-chip microcomputer software with an application programming function is supported, and whether software operated by a single-chip microcomputer is a legal genuine version or not is verified by using an independent UID and an original password of the single-chip microcomputer or a peripheral chip andthe like.

Description

technical field [0001] The invention belongs to the technical field of single-chip microcomputer security, and in particular relates to an encryption protection method and a storage medium of single-chip microcomputer software. Background technique [0002] Application programming is IAP, which is the acronym for In Application Programming. IAP is the programming of some areas of User Flash by the user's own program during the running process. The purpose is to conveniently pass through the reserved communication port after the product is released. Update and upgrade the firmware program in the product. [0003] The development of single-chip microcomputers is very rapid, from 51-core single-chip microcomputers, to 8-bit machines, 16-bit machines, and 32-bit machines with private instruction sets introduced by various manufacturers, to general-purpose ARM core single-chip microcomputers, and then to open-source instruction set RISC-V architecture single-chip microcomputers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/121G06F21/123
Inventor 张孝龙
Owner WUHAN GEWEI ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products