Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cracking method of encryption equipment

A technology of encryption equipment and equipment, which is applied in the direction of metal processing equipment, welding equipment, internal/peripheral computer component protection, etc., can solve the problems of long time consumption, no duplication, high cost, etc., achieve low cost, reduce cost and time, and improve The effect of cracking success rate

Pending Publication Date: 2020-06-30
广东安创信息科技开发有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For software-encrypted products, cracking software is generally used to crack at present. However, traditional cracking software needs to extract the content of the flash memory chip, reverse the master control algorithm, and recover the sector data. The cost is very high, it takes a long time, and there is no copying. Different products need to be cracked one by one, and data may be lost or incomplete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cracking method of encryption equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0026] figure 1 It is a flow chart of steps of a cracking method of an encryption device according to the present invention. Such as figure 1 As shown, a method for cracking an encryption device of the present invention comprises the following steps:

[0027] Step S1, obtaining the main control chip and storage chip of the encrypted device to be cracked, as well as the information of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cracking method of encryption equipment. The cracking method comprises the following steps: S1, acquiring a main control chip and a storage chip of to-be-cracked encryption equipment, and equipment manufacturer information and model; S2, according to the information obtained in the step S1, selecting a product of the same type similar to a storage chip of a main control chip of the to-be-cracked encryption equipment; S3, disassembling a storage chip of the encryption equipment to be cracked, and cleaning the storage chip; S4, disassembling the memory chips in the sametype of products selected in the step S2, and cleaning the bonding pads; S5, welding the disassembled storage chip of the encryption equipment to be cracked onto the bonding pad of the same type of product processed in the step S4; S6, electrifying the same type of product welded with the storage chip of the to-be-cracked encryption equipment, and connecting the same type of product to electronicequipment to obtain successfully cracked file content.

Description

technical field [0001] The invention relates to the technical field of electronic equipment, in particular to a method for cracking encryption equipment. Background technique [0002] Although smartphones are now a must-have product, the market for recording pens is still vast. The core is that the recording function of mobile phones is difficult to meet various needs in complex recording environments, such as sound quality, recording distance and confidentiality. Make the demand of voice recorder unabated. [0003] At present, the basic functions of recording pens on the market are similar, and most of them have encryption function. After setting a password, the recording file can not be leaked. Some devices use hardware encryption schemes, but for general low-end digital products (such as recording pens, encrypted U disks), hardware encryption schemes are rarely used, and software encryption schemes are often used. [0004] In some cases, for example, if the user has not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/72B23K1/018
CPCG06F21/78G06F21/72B23K1/018
Inventor 余文珣钟英南杨威马名泽余斯聪汤进涛
Owner 广东安创信息科技开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products