Target application running method and device and storage medium

A technology of target application and operation method, applied in the field of information security, can solve the problems of cumbersome operation, cumbersome method, low security, etc., and achieve the effects of simple operation, improved security, and prevention of plagiarism and copy operation.

Pending Publication Date: 2021-04-09
珠海极海半导体有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If only the UID is bound, but the protection program is still inside the chip, it is easier to bypass the protection program to obtain the source program of the MCU
If you add some advance operations before binding the UID, for example: first load the special code to the chip, and then cooperate with the protection program to protect the source code program, but this method is more cumbersome
[0004] Therefore, the method for protecting the source code program of the MCU in the prior art is either low in security or cumbersome to operate, and cannot simply and safely prevent the source code program of the MCU from being plagiarized and copied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target application running method and device and storage medium
  • Target application running method and device and storage medium
  • Target application running method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to better understand the technical solutions of the present invention, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0053] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly indicates otherwise.

[0055] It should be understood that the ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a target application running method and device and a storage medium. According to the technical scheme of the target application running method and device and the storage medium, whether a target application comprises an encryption program or not is judged, if yes, the encryption program is run, a secret key is generated, then the encryption program is erased, and the step of judging whether the target application comprises the encryption program or not continues to be executed; if not, the secret key of the target application is verified, when the secret key passes the verification, the target application is operated, and the source code program of the MCU can be simply and safely prevented from being plagiarized, copied and operated.

Description

【Technical field】 [0001] The present invention relates to the technical field of information security, in particular to a target application running method, device and storage medium. 【Background technique】 [0002] At present, the protection measures for the source code programs of most Micro Control Units (MCU) in the market are to set the read protection level of the chip to prevent the source code programs from being read through the Serial Wire Debug (SWD) interface, but through a certain Technical means can still obtain the source program of the MCU. [0003] Another method of protecting the source program of the MCU is to bind the unique identifiers (Unique Identifiers, UID) of the MCU, and determine whether it can work by performing a verification operation on the native program. If only the UID is bound, but the protection program is still inside the chip, it is easier to bypass the protection program to obtain the source program of the MCU. If you add some advanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/125G06F21/602
Inventor 吴锴李区建庆孙万里
Owner 珠海极海半导体有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products