TW201546646A - Embedded system and a method of protecting contents thereof - Google Patents

Embedded system and a method of protecting contents thereof Download PDF

Info

Publication number
TW201546646A
TW201546646A TW103120257A TW103120257A TW201546646A TW 201546646 A TW201546646 A TW 201546646A TW 103120257 A TW103120257 A TW 103120257A TW 103120257 A TW103120257 A TW 103120257A TW 201546646 A TW201546646 A TW 201546646A
Authority
TW
Taiwan
Prior art keywords
embedded system
key
content protection
embedded
identification
Prior art date
Application number
TW103120257A
Other languages
Chinese (zh)
Other versions
TWI521375B (en
Inventor
Shih-Chien Hsieh
Teng-Huei Juan
Original Assignee
Weintek Labs Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weintek Labs Inc filed Critical Weintek Labs Inc
Priority to TW103120257A priority Critical patent/TWI521375B/en
Publication of TW201546646A publication Critical patent/TW201546646A/en
Application granted granted Critical
Publication of TWI521375B publication Critical patent/TWI521375B/en

Links

Abstract

An embedded system capable of protecting its contents includes a security integrated circuit (IC) having an identification (ID) key storage for storing an ID key; and a system device having a system key storage for storing a system key. The system key is derived from a mathematical operation performed on the ID key and a function array. Before the embedded system activates functions, a mathematical operation is performed on the ID key and the system key to obtain the function array, according to which the functions are activated.

Description

嵌入式系統及內容保護方法Embedded system and content protection method

本發明係有關一種內容保護機制,特別是關於一種嵌入式系統的軟體保護架構。The present invention relates to a content protection mechanism, and more particularly to a software protection architecture for an embedded system.

由於軟體開發的成本一般較大於硬體,因此需要使用適當的機制來保護軟體,以降低軟體被非法使用或複製。第一A圖顯示一種傳統的軟體保護機制,對於某軟體功能(或版本)A會有一對應的通行碼A。當通行碼A被確認為有效時,才能啟動軟體功能A。當軟體升級為功能B時,如第一B圖所示,則需要另一對應的新通行碼B才能啟動軟體功能B。使用者必須將系統送回工廠以更換為新通行碼B,因此造成成本的增加及使用者的不便。Since the cost of software development is generally larger than hardware, it is necessary to use appropriate mechanisms to protect the software to reduce the illegal use or copying of the software. The first A picture shows a traditional software protection mechanism, which has a corresponding pass code A for a software function (or version) A. The software function A can be started when the pass code A is confirmed to be valid. When the software is upgraded to function B, as shown in the first B diagram, another corresponding new password B is required to start the software function B. The user must return the system to the factory for replacement with the new passcode B, thus causing an increase in cost and inconvenience to the user.

為了改善上述的傳統軟體保護機制(第一A圖、第一B圖)當中,使用者需將系統送回工廠的不便利,因此有另一種軟體保護機制的提出,如第二圖所例示。在此種軟體保護機制中,使用者僅使用單一通行碼C,不同的軟體功能儲存有不同的相應碼。如果系統內為軟體功能C1,當通行碼C被確認為有效時,即會啟動軟體功能C1;如果系統內為軟體功能C2,當通行碼C被確認為有效時,即會啟動軟體功能C2。對於第二圖所示的軟體保護機制,軟體盜用者(亦即,未合法購買升級軟體功能C2者)很容易藉由複製軟體功能C2並配合原來的通行碼C而非法使用軟體功能C2。In order to improve the above-mentioned traditional software protection mechanism (first A picture, first B picture), the user needs to send the system back to the factory is inconvenient, so there is another software protection mechanism proposed, as illustrated in the second figure. In this software protection mechanism, the user only uses a single pass code C, and different software functions store different corresponding codes. If the software function C1 is in the system, the software function C1 is started when the pass code C is confirmed to be valid; if the software function C2 is in the system, the software function C2 is started when the pass code C is confirmed to be valid. For the software protection mechanism shown in the second figure, the software thief (that is, the person who has not legally purchased the upgrade software function C2) can easily use the software function C2 by copying the software function C2 and matching the original pass code C.

鑑於傳統軟體保護機制無法有效防止軟體被非法使用或複製,因此亟需提出一種新穎的軟體保護機制,以改善傳統軟體保護機制的缺點。In view of the fact that traditional software protection mechanisms cannot effectively prevent software from being illegally used or copied, it is urgent to propose a novel software protection mechanism to improve the shortcomings of traditional software protection mechanisms.

鑑於上述,本發明實施例的目的之一在於提出一種具內容保護能力的嵌入式系統,將識別鑰與功能陣列進行數學運算以得到系統鑰。當嵌入式系統要啟動功能時,將識別鑰與系統鑰進行數學運算可得到功能陣列,據以啟動使用者所需求的功能。由於不同的嵌入式系統中儲存有不同的識別鑰與系統鑰,因而可以防止內容被盜用。此外,當進行升級時,使用者不需要更換識別鑰而可直接使用升級後的功能。In view of the above, one of the objects of the embodiments of the present invention is to provide an embedded system with content protection capability, which performs mathematical operations on the identification key and the function array to obtain a system key. When the embedded system wants to start the function, the recognition key and the system key are mathematically operated to obtain an array of functions to activate the functions required by the user. Since different embedded systems store different identification keys and system keys, content can be prevented from being stolen. In addition, when upgrading, the user does not need to change the identification key and can directly use the upgraded function.

根據本發明實施例,嵌入式系統包含安全積體電路及系統裝置。安全積體電路設有識別鑰儲存裝置,用以儲存一識別鑰。系統裝置設有系統鑰儲存裝置,用以儲存一系統鑰。其中系統鑰係由識別鑰與一功能陣列進行數學運算而得到,該功能陣列代表嵌入式系統所需求的一或多個功能。當嵌入式系統要啟動該些功能時,將識別鑰與系統鑰進行數學運算,因而得到功能陣列,據以啟動所需求的該些功能。According to an embodiment of the invention, an embedded system includes a secure integrated circuit and system means. The security integrated circuit is provided with an identification key storage device for storing an identification key. The system device is provided with a system key storage device for storing a system key. The system key is obtained by mathematically computing the identification key and a functional array representing one or more functions required by the embedded system. When the embedded system wants to initiate these functions, the identification key is mathematically operated with the system key, thereby obtaining an array of functions to initiate the required functions.

第三A圖顯示本發明實施例之嵌入式(embedded)系統300的系統方塊圖,其具有保護內容(例如軟體)的能力。在本實施例中,嵌入式系統300主要包含安全積體電路(security IC)31與系統裝置32。雖然第三A圖所示的安全積體電路31與系統裝置32為分開的,然而,其也可以整合在一起。Figure 3A shows a system block diagram of an embedded system 300 in accordance with an embodiment of the present invention having the ability to protect content, such as software. In the present embodiment, the embedded system 300 mainly includes a security integrated circuit (security IC) 31 and a system device 32. Although the safety integrated circuit 31 shown in FIG. 3A is separate from the system device 32, it may be integrated.

安全積體電路31包含有識別鑰(ID key)儲存裝置311,用以儲存一識別鑰。系統裝置32包含有系統鑰(system key)儲存裝置321,用以儲存一系統鑰,其相應於識別鑰。在本實施例中,識別鑰儲存裝置311可使用光罩唯讀記憶體(Mask ROM)來實施,或者使用單次可編程(one time programming, OTP)記憶體來實施。系統鑰儲存裝置321可使用快閃記憶體(flash)或電子可抹除可程式唯讀記憶體(EEPROM)來實施。The secure integrated circuit 31 includes an ID key storage device 311 for storing an identification key. The system device 32 includes a system key storage device 321 for storing a system key corresponding to the identification key. In the present embodiment, the identification key storage device 311 can be implemented using a mask-only memory (Mask ROM) or using one-time programming (OTP) memory. The system key storage device 321 can be implemented using flash memory or electronic erasable programmable read only memory (EEPROM).

第三B圖例示於識別鑰儲存裝置311內儲存有識別鑰A,而於系統鑰儲存裝置321內儲存有系統鑰B。本實施例之識別鑰A與系統鑰B具有相應關係,但是,一般來說,兩者的內容是相異的。第三C圖顯示識別鑰A與系統鑰B的相應關係。詳而言之,根據使用者所需求的一或多個功能F0、F1、F2…Fn,因而指派得到功能陣列(function array),其可使用二進位數值來表示。例如,如果使用者需求功能F0、F1與F4,則功能陣列的值可表示為00…0010011(位元0、1、4為“1”,而其他位元為“0”)。換句話說,功能陣列表示為二進位數值,並以位元位置表示該些功能的有效性。將功能陣列與識別鑰A進行數學運算,例如加密(encryption)運算,因而得到系統鑰B。當嵌入式系統300要啟動軟體功能時,將識別鑰A與系統鑰B進行數學運算,例如加密運算,因而可以得到功能陣列,據以啟動使用者所需求的一或多個軟體功能。The third B diagram illustrates that the identification key A is stored in the identification key storage device 311, and the system key B is stored in the system key storage device 321. The identification key A of the embodiment has a corresponding relationship with the system key B, but in general, the contents of the two are different. The third C diagram shows the corresponding relationship between the identification key A and the system key B. In detail, depending on one or more functions F0, F1, F2 ... Fn required by the user, a function array is assigned, which can be represented using a binary value. For example, if the user requires functions F0, F1, and F4, the value of the function array can be represented as 00...0010011 (bits 0, 1, 4 are "1" and other bits are "0"). In other words, the functional array is represented as a binary value and the validity of the functions is represented by the bit position. The function array is subjected to a mathematical operation, such as an encryption operation, with the identification key A, thereby obtaining the system key B. When the embedded system 300 is to initiate a software function, the identification key A and the system key B are subjected to mathematical operations, such as encryption operations, so that a functional array can be obtained to activate one or more software functions required by the user.

第四圖顯示本發明實施例之嵌入式系統300的內容保護方法的流程圖。系統裝置32在執行軟體之前,於步驟41檢查安全積體電路31是否存在。如果存在,則進入步驟42,使用演算法(algorithm),例如加密演算法,對識別鑰A與系統鑰B進行數學運算。接著,於步驟43,檢視數學運算結果(亦即,功能陣列)是否為正確。例如,檢視循環冗餘檢查碼(cyclic redundancy check, CRC))是否為正確。如果為正確,則進入步驟44,根據(步驟42的)數學運算結果,以判斷使用者需求的為哪一種或多種軟體功能。舉例而言,如果步驟42所得到的數學運算結果的二進位數值表示為“00…0010011”,經檢視其位元0、1、4為“1”,因而得知需求的軟體功能為F0、F1與F4。The fourth figure shows a flow chart of the content protection method of the embedded system 300 of the embodiment of the present invention. The system device 32 checks in step 41 whether or not the secure integrated circuit 31 is present before executing the software. If so, proceed to step 42 to perform mathematical operations on the identification key A and the system key B using an algorithm, such as an encryption algorithm. Next, in step 43, it is checked whether the mathematical operation result (that is, the function array) is correct. For example, check if the cyclic redundancy check (CRC) is correct. If it is correct, proceed to step 44 to determine which one or more of the software functions are required by the user based on the mathematical operation result (of step 42). For example, if the binary value of the mathematical operation result obtained in step 42 is represented as "00...0010011", and the bits 0, 1, and 4 are "1", it is known that the required software function is F0, F1 and F4.

第五圖分別例示三個使用者X、Y、Z的嵌入式系統300X、300Y、300Z的系統方塊圖。在這個例子中,使用者X的識別鑰儲存裝置311儲存有識別鑰A1,而系統鑰儲存裝置321則儲存有相應的系統鑰B1。使用者Y的識別鑰儲存裝置311儲存有識別鑰A2,而系統鑰儲存裝置321則儲存有相應的系統鑰B2。使用者Z的識別鑰儲存裝置311儲存有識別鑰A3,而系統鑰儲存裝置321則儲存有相應的系統鑰B3。一般來說,識別鑰A1、A2、A3彼此不同,且系統鑰B1、B2、B3也彼此不同。根據第五圖所例示的實施例,由於不同的嵌入式系統300X、300Y、300Z中儲存有不同的識別鑰與系統鑰,因此軟體盜用者無法藉由複製他人的系統鑰或軟體功能而非法使用軟體。The fifth figure illustrates the system block diagrams of the embedded systems 300X, 300Y, and 300Z of three users X, Y, and Z, respectively. In this example, the identification key storage device 311 of the user X stores the identification key A1, and the system key storage device 321 stores the corresponding system key B1. The identification key storage device 311 of the user Y stores the identification key A2, and the system key storage device 321 stores the corresponding system key B2. The identification key storage device 311 of the user Z stores the identification key A3, and the system key storage device 321 stores the corresponding system key B3. In general, the identification keys A1, A2, A3 are different from each other, and the system keys B1, B2, B3 are also different from each other. According to the embodiment illustrated in the fifth figure, since different embedded systems 300X, 300Y, and 300Z store different identification keys and system keys, software pirates cannot illegally use by copying other people's system keys or software functions. software.

第六圖例示本實施例之嵌入式系統300應用於軟體升級的系統方塊圖。在這個例子中,軟體功能FI的相應系統鑰為B1,而升級後的軟體功能FII的相應系統鑰為B2。當使用者合法升級後,其系統鑰儲存裝置321將改為儲存系統鑰B2,然而識別鑰儲存裝置311仍然儲存原來的識別鑰A1。The sixth figure illustrates a system block diagram of the embedded system 300 of the present embodiment applied to software upgrade. In this example, the corresponding system key of the software function FI is B1, and the corresponding system key of the upgraded software function FII is B2. When the user is legally upgraded, the system key storage device 321 will change to store the system key B2, but the identification key storage device 311 still stores the original identification key A1.

根據第六圖所示實施例,當進行軟體升級時,使用者不需要更換識別鑰(亦即,不需要將嵌入式系統300送回工廠以替換安全積體電路31),而可直接使用升級後的軟體功能。此外,如前所述,由於不同的嵌入式系統儲存有不同的識別鑰與系統鑰,因此軟體盜用者(亦即,未合法購買升級軟體功能者)不容易藉由複製而輕易盜用軟體。According to the embodiment shown in FIG. 6, when the software upgrade is performed, the user does not need to replace the identification key (that is, the embedded system 300 does not need to be sent back to the factory to replace the security integrated circuit 31), and the upgrade can be directly used. After the software function. In addition, as mentioned above, since different embedded systems store different identification keys and system keys, software pirates (that is, those who do not legally purchase upgrade software functions) are not easily able to steal software by copying.

以上所述僅為本發明之較佳實施例而已,並非用以限定本發明之申請專利範圍;凡其它未脫離發明所揭示之精神下所完成之等效改變或修飾,均應包含在下述之申請專利範圍內。The above description is only the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention; all other equivalent changes or modifications which are not departing from the spirit of the invention should be included in the following Within the scope of the patent application.

300‧‧‧嵌入式系統
300X‧‧‧嵌入式系統
300Y‧‧‧嵌入式系統
300Z‧‧‧嵌入式系統
31‧‧‧安全積體電路
311‧‧‧識別鑰儲存裝置
32‧‧‧系統裝置
321‧‧‧系統鑰儲存裝置
41‧‧‧安全積體電路是否存在
42‧‧‧數學運算
43‧‧‧運算結果是否正確
44‧‧‧判斷軟體的功能
300‧‧‧ embedded system
300X‧‧‧ embedded system
300Y‧‧‧ embedded system
300Z‧‧‧ embedded system
31‧‧‧Safe integrated circuit
311‧‧‧ID storage device
32‧‧‧System installation
321‧‧‧System Key Storage Device
41‧‧‧Whether the safety integrated circuit exists
42‧‧‧Mathematical operations
43‧‧‧Is the result of the operation correct?
44‧‧‧Determining the function of the software

第一A圖與第一B圖顯示一種傳統的軟體保護機制。 第二圖顯示另一種傳統的軟體保護機制。 第三A圖顯示本發明實施例之嵌入式系統的系統方塊圖。 第三B圖例示於第三A圖的識別鑰儲存裝置內儲存有識別鑰,而於系統鑰儲存裝置內儲存有系統鑰。 第三C圖顯示識別鑰與系統鑰的相應關係。 第四圖顯示本發明實施例之嵌入式系統的內容保護方法的流程圖。 第五圖分別例示三個使用者的嵌入式系統的系統方塊圖。 第六圖例示本實施例之嵌入式系統應用於軟體升級的系統方塊圖。The first A picture and the first B picture show a conventional software protection mechanism. The second figure shows another traditional software protection mechanism. Figure 3A shows a system block diagram of an embedded system in accordance with an embodiment of the present invention. The third B diagram illustrates that the identification key is stored in the identification key storage device of the third A picture, and the system key is stored in the system key storage device. The third C diagram shows the corresponding relationship between the identification key and the system key. The fourth figure shows a flow chart of a content protection method of an embedded system according to an embodiment of the present invention. The fifth figure illustrates a system block diagram of an embedded system of three users, respectively. The sixth figure illustrates a system block diagram of the embedded system of the embodiment applied to the software upgrade.

300‧‧‧嵌入式系統 300‧‧‧ embedded system

31‧‧‧安全積體電路 31‧‧‧Safe integrated circuit

311‧‧‧識別鑰儲存裝置 311‧‧‧ID storage device

32‧‧‧系統裝置 32‧‧‧System installation

321‧‧‧系統鑰儲存裝置 321‧‧‧System Key Storage Device

Claims (20)

一種具內容保護能力的嵌入式系統,包含:        一安全積體電路,設有識別鑰儲存裝置,用以儲存一識別鑰;及        一系統裝置,設有系統鑰儲存裝置,用以儲存一系統鑰;        其中該系統鑰係由該識別鑰與一功能陣列進行數學運算而得到,該功能陣列代表該嵌入式系統所需求的一或多個功能;        當該嵌入式系統要啟動該些功能時,將該識別鑰與該系統鑰進行數學運算,因而得到該功能陣列,據以啟動所需求的該些功能。An embedded system with content protection capability, comprising: a secure integrated circuit with an identification key storage device for storing an identification key; and a system device provided with a system key storage device for storing a system key Wherein the system key is obtained by mathematically computing the identification key and a functional array, the functional array representing one or more functions required by the embedded system; when the embedded system is to initiate the functions, The identification key is mathematically operated with the system key, thereby obtaining an array of functions for enabling the required functions. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中該識別鑰儲存裝置包含光罩唯讀記憶體或單次可編程記憶體。The embedded system with content protection capability according to claim 1, wherein the identification key storage device comprises a mask read-only memory or a single-time programmable memory. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中該系統鑰儲存裝置包含快閃記憶體或電子可抹除可程式唯讀記憶體。The content protection capable embedded system according to claim 1, wherein the system key storage device comprises a flash memory or an electronic erasable programmable read only memory. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中該內容包含軟體。An embedded system with content protection capability according to claim 1 of the scope of the patent application, wherein the content includes software. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中該數學運算包含加密運算。An embedded system with content protection capability according to claim 1 of the scope of the patent application, wherein the mathematical operation comprises an encryption operation. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中該功能陣列表示為二進位數值,並以位元位置表示該些功能的有效性。The embedded system with content protection capability according to claim 1 of the patent application scope, wherein the function array is represented as a binary value, and the validity of the functions is represented by a bit position. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,更包含:        該嵌入式系統檢查該安全積體電路是否存在。The embedded system with content protection capability according to claim 1 of the patent application scope further includes: the embedded system checking whether the security integrated circuit exists. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中該進行數學運算以得到該功能陣列的步驟更包含:        檢視該數學運算所得到的功能陣列是否為正確。The embedded system with content protection capability according to claim 1, wherein the step of performing the mathematical operation to obtain the functional array further comprises: checking whether the function array obtained by the mathematical operation is correct. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中不同嵌入式系統的識別鑰彼此不同,且系統鑰也彼此不同。The embedded system with content protection capability according to claim 1 of the patent application scope, wherein the identification keys of different embedded systems are different from each other, and the system keys are also different from each other. 根據申請專利範圍第1項所述具內容保護能力的嵌入式系統,其中同一嵌入式系統的識別鑰為固定不變,且其系統鑰會因軟體升級後而改變。According to the embedded system with content protection capability according to Item 1 of the patent application scope, the identification key of the same embedded system is fixed, and the system key thereof is changed due to the software upgrade. 一種嵌入式系統的內容保護方法,包含:        將一識別鑰與一功能陣列進行數學運算以得到一系統鑰,該功能陣列代表該嵌入式系統所需求的一或多個功能; 儲存該識別鑰於安全積體電路內;        儲存該系統鑰於系統裝置內;及        當該嵌入式系統要啟動該些功能時,將該識別鑰與該系統鑰進行數學運算,因而得到該功能陣列,據以啟動所需求的該些功能。A content protection method for an embedded system, comprising: performing a mathematical operation on a recognition key and a function array to obtain a system key, the function array representing one or more functions required by the embedded system; storing the identification key Storing the system key in the system device; and when the embedded system starts the functions, performing mathematical operations on the identification key and the system key, thereby obtaining the function array, according to the startup These features are required. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中該識別鑰儲存於光罩唯讀記憶體或單次可編程記憶體。The content protection method of the embedded system according to claim 11, wherein the identification key is stored in a mask read-only memory or a single-time programmable memory. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中該系統鑰儲存於快閃記憶體或電子可抹除可程式唯讀記憶體。The content protection method of the embedded system according to claim 11, wherein the system key is stored in a flash memory or an electronic erasable programmable read only memory. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中該內容包含軟體。The content protection method of the embedded system according to claim 11, wherein the content includes software. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中該數學運算包含加密運算。The content protection method of the embedded system according to claim 11, wherein the mathematical operation comprises an encryption operation. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中該功能陣列表示為二進位數值,並以位元位置表示該些功能的有效性。The content protection method of the embedded system according to claim 11, wherein the function array is represented as a binary value, and the validity of the functions is represented by a bit position. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,更包含:        該嵌入式系統檢查該安全積體電路是否存在。According to the content protection method of the embedded system according to claim 11, the embedded system further checks whether the secure integrated circuit exists. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中該進行數學運算以得到該功能陣列的步驟更包含:        檢視該數學運算所得到的功能陣列是否為正確。The content protection method of the embedded system according to claim 11, wherein the step of performing the mathematical operation to obtain the function array further comprises: checking whether the function array obtained by the mathematical operation is correct. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中不同嵌入式系統的識別鑰彼此不同,且系統鑰也彼此不同。The content protection method of the embedded system according to claim 11, wherein the identification keys of the different embedded systems are different from each other, and the system keys are also different from each other. 根據申請專利範圍第11項所述嵌入式系統的內容保護方法,其中同一嵌入式系統的識別鑰為固定不變,且其系統鑰會因軟體升級後而改變。According to the content protection method of the embedded system according to claim 11, wherein the identification key of the same embedded system is fixed, and the system key thereof is changed after the software is upgraded.
TW103120257A 2014-06-11 2014-06-11 Embedded system and a method of protecting contents thereof TWI521375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW103120257A TWI521375B (en) 2014-06-11 2014-06-11 Embedded system and a method of protecting contents thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW103120257A TWI521375B (en) 2014-06-11 2014-06-11 Embedded system and a method of protecting contents thereof

Publications (2)

Publication Number Publication Date
TW201546646A true TW201546646A (en) 2015-12-16
TWI521375B TWI521375B (en) 2016-02-11

Family

ID=55407508

Family Applications (1)

Application Number Title Priority Date Filing Date
TW103120257A TWI521375B (en) 2014-06-11 2014-06-11 Embedded system and a method of protecting contents thereof

Country Status (1)

Country Link
TW (1) TWI521375B (en)

Also Published As

Publication number Publication date
TWI521375B (en) 2016-02-11

Similar Documents

Publication Publication Date Title
CN111095213B (en) Secure boot method, device, equipment and storage medium for embedded program
EP2854066B1 (en) System and method for firmware integrity verification using multiple keys and OTP memory
JP4503576B2 (en) Method and apparatus for safely updating and booting a code image
US8006095B2 (en) Configurable signature for authenticating data or program code
KR100792287B1 (en) Method for security and the security apparatus thereof
US20200084042A1 (en) Information handling system entitlement validation
TWI567580B (en) Method and system for preventing execution of malware
US20030140238A1 (en) Implementation of a secure computing environment by using a secure bootloader, shadow memory, and protected memory
US9117070B2 (en) Method for adapting and executing a computer program and computer architecture therefore
CN107194237B (en) Method and device for application program security authentication, computer equipment and storage medium
KR20080100674A (en) Method and apparatus for checking integrity of firmware
EP3522049B1 (en) Data protection method for chip rewriting equipment, electronic equipment and storage medium
TW200515241A (en) Data management apparatus, data management method and computer program
CN109086578A (en) A kind of method that soft ware authorization uses, equipment and storage medium
US8230495B2 (en) Method for security in electronically fused encryption keys
WO2010130171A1 (en) Mobile terminal and method for protecting its system data
TWI521375B (en) Embedded system and a method of protecting contents thereof
US20190102573A1 (en) Theater ears android app sensitive data management
JP5049179B2 (en) Information processing terminal device and application program activation authentication method
US11429722B2 (en) Data protection in a pre-operation system environment based on an embedded key of an embedded controller
JP2018022486A5 (en)
TWI774902B (en) Private key protection method and private key protection system
US9754133B2 (en) Programmable device personalization
CN104794373A (en) Software encryption lock
JP2011053909A (en) Information processor incorporating control function for security management of password