Method and system for protecting software on additional card of peripheral equipment

A technology of peripheral equipment and add-on cards, which is applied in the direction of instruments, electronic digital data processing, program control devices, etc., and can solve the problems of being vulnerable to illegal plagiarism and mass duplication

Inactive Publication Date: 2004-08-04
ICP ELECTRONICS
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when reading and writing data through the aforementioned non-volatile memory interface, the traditional method does not go through a proper security encryption mechanism to prevent data from being stolen
Once the data in the non

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting software on additional card of peripheral equipment
  • Method and system for protecting software on additional card of peripheral equipment
  • Method and system for protecting software on additional card of peripheral equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] refer to figure 1 , the traditional peripheral equipment add-in card 120 is made up of microprocessor 122 and nonvolatile memory 124, and microprocessor 122 has interface 126 to connect nonvolatile memory 124 in order to read and write the data stored therein, and microprocessor 122 can be replaced by an Application Specific Integrated Circuit (ASIC). Taking a microprocessor as an example, the host computer 100 is controlled by a peripheral component interconnect (Peripheral Component Interconnect, PCI) bus 110. The microprocessor on the peripheral add-on card 120 122 and exchange data with it. The driver program or application program 102 dedicated to the microprocessor 122 is loaded into the host computer 100 for execution after booting, and resets the microprocessor 122 through the reset signal RST# of the PCI bus 110 to activate the peripheral device add-in card 120 to work. Since the data in the non-volatile memory 124 is read and written through the interface 126...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for protecting the software on additional card of peripheral is disclosed. Said method includes such steps as reading the encryped particular information from non-volatile memory by microcontroller when the first reset signal from peripheral bus is disabled, decrypting it, generating the second reset signal by microcontroller, receiving it by microprocessor, reading the decrypted particular information, transmitting it to host, recognizing and varifying it, and running the dedicated program of microprocessor to start said additional card.

Description

technical field [0001] The invention relates to the field of software protection methods, in particular to a technology for protecting software executed on an additional card of peripheral equipment. Background technique [0002] Generally speaking, the control chip on the peripheral device add-in card has a related driver or application program on the host computer to work with the operating system, so that the peripheral device add-in card can play the best function. In addition, the current chip design has developed towards multi-functional and systematic integration. In order to make the application meet the different needs of different customers, the control chips on many peripheral equipment add-on cards provide non-easy to read and write functions. The interface of the volatile memory, so that the driver or application program can instruct the control chip to read and write the necessary or customized specific data stored in the non-volatile memory through the interfa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/22G06F9/44G06F13/14
Inventor 刘建兴陈勇志沈信成
Owner ICP ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products