Remote authorization method for embedded software in terminal set

An embedded software and remote authorization technology, applied in electrical components, computer security devices, program/content distribution protection, etc., can solve problems such as unfavorable upgrades and maintenance, inability to meet manufacturers' personalized production, and inability to separate memory combinations. achieve the effect of protecting legitimate rights and interests

Inactive Publication Date: 2007-07-11
JIANGSU YINHE ELECTRONICS
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are two traditional methods to protect the embedded software in the terminal: one is to solidify it in the memory, and coat the memory and its related circuits with special substances so that there are no leaking pins , and the combination of this special substance and the memory is very tight and inseparable, so that pirates cannot read the embedded software stored in the memory. This protection method is effective, but it is not conducive to future upgrades and maintenance; the other It is to add a dedicated chip to the embedded terminal. The terminal needs to detect whether there is such a dedicated chip in the terminal every time it works. If there is no such dedicated chip, the software will stop running. This method was once widely used. Adoption, the effect is not bad, but since each terminal has such an identical chip, it is relatively easy to crack this chip, and the cost of this special chip is relatively high, and it is not flexible enough to satisfy many The needs of manufacturers for personalized production

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] The remote authorization method of the embedded software in the terminal according to the present invention is based on the sending and receiving communication circuit in the terminal, and the embedded software is provided with a security authentication mechanism and a remote signature mechanism. A specific form of the remote signature mechanism is: the terminal performs remote authorization with the remote server through the signature PC relay, that is: the remote signature mechanism in the terminal combines the unique serial number of the terminal and other information in the terminal The hardware information is uploaded to the signature PC which has a communication link with the terminal, and the signature tool software in the signature PC transmits the received terminal’s unique serial number and other hardware information to the remote signature server through the network, and the remote signature server Use the set encryption algorithm to encrypt the received uniqu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A remote authorization method for the embedded software of a terminal machine is established on the receiving and sending communication circuit, with safety certification mechanism and remote signature mechanism of the embedded software. The terminal machine uploads the only serial number and other hardware information to the remote signature server through signature PC, with the cipher computation for the uploaded information to return the authorized data to the terminal machine. The said remote authorization method can be widely applied to embedded remote authorization of the terminal embedded software.

Description

technical field [0001] The invention relates to a remote authorization method for embedded software, in particular to a remote authorization method for embedded software in a terminal. Background technique [0002] With the continuous development of science and technology, embedded software has penetrated into all walks of life and every corner of people's lives. Most of the embedded software in the early terminals was stored in readable memory without any protection measures. Pirates can easily read the binary code files of the embedded software stored in the memory and copy them to another In the case of imitation products, the legitimate rights and interests of software authors will be lost. Therefore, how to effectively protect the embedded software in the terminal from being copied or pirated has always been a problem that people care about and want to solve. At present, there are two traditional methods to protect the embedded software in the terminal: one is to soli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22H04L9/00G06F21/10
Inventor 顾洪春徐成
Owner JIANGSU YINHE ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products