CN101968834A - Encryption method and device for anti-copy plate of electronic product - Google Patents

Encryption method and device for anti-copy plate of electronic product Download PDF

Info

Publication number
CN101968834A
CN101968834A CN2009100554482A CN200910055448A CN101968834A CN 101968834 A CN101968834 A CN 101968834A CN 2009100554482 A CN2009100554482 A CN 2009100554482A CN 200910055448 A CN200910055448 A CN 200910055448A CN 101968834 A CN101968834 A CN 101968834A
Authority
CN
China
Prior art keywords
electronic product
hash code
flash
sequence number
system software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100554482A
Other languages
Chinese (zh)
Inventor
杨中志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Queclink Wireless Solutions Co Ltd
Original Assignee
Queclink Wireless Solutions Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Queclink Wireless Solutions Co Ltd filed Critical Queclink Wireless Solutions Co Ltd
Priority to CN2009100554482A priority Critical patent/CN101968834A/en
Publication of CN101968834A publication Critical patent/CN101968834A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an encryption method for an anti-copy plate of an electronic product, which comprises the following steps of: 1, generating hash codes according to preset keys and device sequence numbers only identifying the product in the production process of the factory electronic product, and writing the hash codes into the user programming space of Flash of the factory electronic product; 2, generating new hash codes according to keys the same as that in the step 1 and the device sequence numbers only identifying the tested electronic product, which is read from the Flash of the tested electronic product, through system software in the operation process of the system software; and 3, reading out the hash numbers generated in the step 1 from the user programming space of the Flash of the tested electronic product, and comparing the hash number with the new hash numbers generated in the step 2; if the hash numbers are the same, judging that the system software operates normally; and otherwise, judging that the system software is in an abnormal state. The invention also discloses an encryption device for the anti-copy plate of the electronic product, corresponding to the method. The invention has the advantages of high reliability and stability, without increasing hardware cost.

Description

The anti-flight encryption method and the device of electronic product
Technical field
The present invention relates to a kind of anti-flight encryption method and device of electronic product, particularly relate to a kind of anti-flight encryption method and device that adopts the electronic product of hashing algorithm.
Background technology
Along with developing rapidly of the research and development of electronic products such as present domestic mobile phone, GSM/GPRS communication module, production, (Printed Circuit Board writes a Chinese character in simplified form by adopting PCB, Chinese is a printed circuit board, claiming printed circuit board (PCB) again) the flight technology is cloned the electronic product of former factory becomes increasingly serious copy right piracy, and the intellecture property of former factory product has been caused serious infringement.
The core formation of electronic product comprises that mainly circuit board is pcb board and system software.The clone of electronic product comprises mainly that also PCB flight and system software copy/steal.1, PCB flight: so-called PCB flight is the components and parts on the PCB wiring board to be removed to make BOM single (Bill of Material (BOM)) earlier, and hollow plate is scanned into picture through the flight software processes, can clone raw sheet fully.2, system software copies/steals: the system software of electronic product all is stored among the Flash (flash memory) on the pcb board usually, the system software among the former Flash of factory can be read out and downloads among the Flash on clone's pcb board by tool software.Because clone's pcb board and raw sheet are duplicate on circuit diagram and components and parts, system software can't be distinguished the product of clone's hardware product and former factory usually, therefore also can normally move on clone's electronic product.
In addition, the system software of electronic product also can be stolen acquisition by other approach, is stolen by former factory inside as production or developer by former factory.
By above step, piracy side need not carrying out a large amount of software and hardware R﹠D works, just can go out a stable electronic product by quick clone.Owing to evaded a large amount of R﹠D works, the cost that makes the DCRP product is far below former factory product, and the intellecture property of former factory product has been caused great infringement.
In the prior art following several anti-PCB flight cloning process is arranged at present.
1, in the PCB design, increases the complexity of PCB, increase the difficulty of PCB flight, also can increase pcb board fraction defective when producing of illegal clone simultaneously.The method has increased the complexity of design on the one hand maybe need buy third-party anti-flight design service; also can't guarantee the reliability of anti-flight on the other hand; the development of flight software is also being maked rapid progress; in case flight software or method at this design are developed, the pcb board that adopts the method design to produce will no longer be protected.
2, adopt MCU (microcontroller) to prevent the flight encryption.Encrypt with a cheap MCU, realize the process of argumentation by main system and its communication.The shortcoming of the method is that with respect to present software and hardware technology MCU encrypts and fallen behind, and MCU is easy crack and simulation relatively.
3, adopt the encryption chip of specialty.Adopt the encryption chip of third party's encryption chip company of specialty, main system is by carrying out legitimate verification with its communication.The reliability and stability of this method are higher, but can increase the hardware cost of electronic product.
Summary of the invention
The technical problem to be solved in the present invention is in order to overcome anti-flight method reliability, poor stability in the prior art, the defective that hardware cost is high provides a kind of anti-flight encryption method and device that does not increase hardware cost and reliability, electronic product that stability is high.
The present invention solves above-mentioned technical matters by following technical proposals:
A kind of anti-flight encryption method of electronic product, its characteristics are that it may further comprise the steps:
S 1, in former factory electronic product production run, generate hash code according to the components and parts sequence number of predefined key and this product of unique identification, and this hash code write the user program space of the Flash of this former factory electronic product;
S 2, in the system software operational process, system software according to and step S 1In identical key, and the components and parts sequence number of this tested electronic product of unique identification of reading from the Flash of tested electronic product generates new hash code;
S 3, from the user program space of the Flash of tested electronic product read step S 1The middle hash code that generates is with step S 2In the new hash code comparison that generates, if identical then system software normally moves, otherwise system software enters abnormality.
Wherein, step S 1In the components and parts sequence number of this unique identification electronic product be the sequence number of master chip or the sequence number of Flash.
Wherein, the components and parts sequence number of this unique identification electronic product is stored in the factory program space of Flash.
Wherein, step S 1And S 2In the hashing algorithm that adopts when generating hash code be MD5 or SHA.
Another technical scheme of the present invention is: a kind of anti-flight encryption device of electronic product, and its characteristics are that it comprises:
One hash code generation module is used in electronic product production run or system software operational process, according to the components and parts sequence number generation hash code of predefined key and unique this product of identification; And
One hash code comparing module is used for the hash code that generates in the electronic product production run, compares with the new hash code that generates in the system software operational process, if identical then system software normally moves, otherwise system software enters abnormality.
Wherein, the anti-flight encryption device of this electronic product also comprises a hash code writing module, and the hash code that is used for generating in the electronic product production run is written in the user program space of this electronic product Flash.
Wherein, the components and parts sequence number of this unique identification electronic product is the sequence number of master chip or the sequence number of Flash.
Wherein, the components and parts sequence number of this unique identification electronic product is stored in the factory program space of Flash.
The hashing algorithm that adopts when wherein, this hash code generation module generates hash code is MD5 or SHA.
Positive progressive effect of the present invention is:
1) there is not the increase of hardware and software cost
Owing to do not adopt extra encryption chip or MCU, do not cause the increase of electronic product hardware cost.Design proposal at pcb board does not need to carry out extra design yet simultaneously, can not produce the third party and design service fee.Be in low margin age at current electronic product market, it is particularly important that the control of cost seems.With respect to other scheme, the advantage of this programme on cost is very obvious.
2) be difficult to crack by the MCU simulated mode
Because of not having extra encryption chip or MCU, the checking of data to read by main system that secure data carries out among the Flash, there is not independent data IO channel, so be difficult to adopt the MCU simulated mode to tackle and crack.
3) do not rely on maintaining secrecy of the hash code of storing among the Flash
Hash code is by carrying out the hash operations generation to key and Flash sequence number, and the sequence number of every Flash is unique, therefore the hash code that generates also is unique, and the hash code of being preserved in the user program space among every Flash also has nothing in common with each other.Even the hash code among the Flash of former factory electronic product is read out, and be written among the Flash of clone's product, also can't be when system software moves by checking.
4) high reliability
Electronic product manufacturer usually can carry out strict checking to the Flash chip reliability according to the product environment for use when selecting the Flash chip for use, as the high and low temperature environment for use etc.This has also guaranteed the high reliability of encipherment scheme simultaneously, avoids encryption chip or MCU the possibility that error in data causes authentication failed to occur in application circumstances.
5) high ease for use
Only be required to be each product type and set different keys, can realize the anti-piracy function of software, even the electronic product of the close model of same manufacturer, the user also can not read out the software in the product A and download in the product B and move.Make manufacturer protect the Software Intellectual Property Rights of each product line easily.
Description of drawings
Fig. 1 is that synoptic diagram is divided in Flash of the present invention safe space.
Fig. 2 is generation hash code of the present invention and the process flow diagram that writes the safe space of Flash.
Fig. 3 carries out the process flow diagram of legitimate verification for system software of the present invention is in operation.
Fig. 4 is the structural representation of anti-flight encryption device of the present invention.
Embodiment
Provide preferred embodiment of the present invention below in conjunction with accompanying drawing, to describe technical scheme of the present invention in detail.
Method of the present invention mainly is under the prerequisite that does not increase hardware cost, utilizes existing components and parts on the pcb board of electronic product, and coupled system software realizes that anti-flight encrypts, and makes that system software can judge whether to operate on the hardware of former factory.If judge it is to operate on clone's the hardware, then system software will enter abnormality, make pirate clone's electronic product normally to use.
A Flash chip that is used for storage system software is all arranged on the pcb board of electronic product usually.And this Flash chip is except normal storage space, often also has tens safe spaces to the hundreds of byte, and some are used to control the data of the function, information etc. of product mainly to offer user storage.Flash (flash memory) with the SST34HF3284 model of SST company in the present embodiment is an example.
As Fig. 1, the safe space of SST34HF3284 is divided into two parts.One is the factory program space 1 of 128-bit, and when Flash dispatched from the factory, Flash manufacturer can write the sequence number of a unique 128bit in every Flash, and this space is added latching operation.Sequence number in this space can't be done any change again and insert and remove, and can be used as the uniqueness sign of every Flash.Another then is the user program space 2 of 256-Byte, can allow the user of Flash, and promptly electronic product manufacturer programmes, and writes user data.
The enforcement of this method mainly is divided into two parts, and the one, in the electronic product production run, generate hash code and write the safe space of Flash according to key and Flash sequence number; The 2nd, in the system software operational process, from the user security space of Flash, read hash code and carry out verification.As Fig. 2, first is described as follows step by step:
Step 101 in former factory electronic product production run, is input as the key that product A is set, as 12345678.
Step 102 reads sequence number, as 103EB84 from the Flash of product.Can other components and parts from the pcb board select can the unique identification product sequence number, as the sequence number of master chip, replace the Flash sequence number, as the uniqueness sign of product.In the present embodiment only the sequence number with Flash be that example is introduced, be stored in the factory program space of Flash.
Step 103 uses hashing algorithm to generate hash code, as: SHA (12345678,103EB84)=FAFE1CDF67DACB87F35C449B67.
Step 104 is written to hash code FAFE1CDF67DACB87F35C449B67 the user program space segment in the safe space of Flash.
Step 105, hash code write to be finished.
Electronic product manufacturer can be key of each Product Definition, use hashing algorithm (as MD5, SHA etc.) sequence number with key and Flash carries out cryptographic calculation, can generate a unique hash code for every Flash, and it is write in the user program space of Flash.
As Fig. 3, the system software process of carrying out legitimate verification that is in operation is described as follows step by step.
Step 201, system software are ready to the corresponding key with product type A, as 12345678.
Step 202, system software read the sequence number of this Flash from the Flash of product, as 103EB84.
Step 203 uses hashing algorithm to generate hash code, as: SHA (12345678,103EB84)=FAFE1CDF67DACB87F35C449B67.
Step 204, system software read the data in the user program space in the Flash safe space, as XXXXXXXXX.
Step 205 judges whether XXXXXXXXX is identical with FAFE1CDF67DACB87F35C449B67.
Step 206, if identical, then show it is former factory product, the sequence number of reading in the step 202 is identical with sequence number in the step 102, and the key in the step 201 is also identical with key in the step 101, so identical in the hash code in the step 204 and the step 104.Verification succeeds, system software normally moves.
Step 207 represents then that as difference running software is on the illegal hardware of piracy.This is because if be pirate illegal hardware, different just and in the step 102 of the sequence number in the step 202, so the sequence number that generates also with step 104 in before preserve different, so verification is failed, system software enters abnormality.
As Fig. 4, the present invention also provides a kind of anti-flight encryption device 3 of the electronic product corresponding with said method, it comprises: a hash code generation module 31, be used in electronic product production run or system software operational process, according to the components and parts sequence number generation hash code of predefined key and unique this product of identification; And a hash code comparing module 33, be used for the hash code that generates in the electronic product production run, compare with the new hash code that generates in the system software operational process, if identical then system software normally moves, otherwise system software enters abnormality.This device can also comprise a hash code writing module 32, and the hash code that is used for generating in the electronic product production run is written in the user program space of this electronic product Flash.Equally, the components and parts sequence number of this unique identification electronic product can be the sequence number of master chip or the sequence number of Flash, is stored in the factory program space of Flash.The hashing algorithm that this hash code generation module adopts when generating hash code can be MD5 or SHA.Aforesaid hashing algorithm, as MD5, SHA is a prior art, repeats no more here.
Though more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, under the prerequisite that does not deviate from principle of the present invention and essence, can make numerous variations or modification to these embodiments.Therefore, protection scope of the present invention is limited by appended claims.

Claims (9)

1. the anti-flight encryption method of an electronic product is characterized in that it may further comprise the steps:
S 1, in former factory electronic product production run, generate hash code according to the components and parts sequence number of predefined key and this product of unique identification, and this hash code write the user program space of the Flash of this former factory electronic product;
S 2, in the system software operational process, system software according to and step S 1In identical key, and the components and parts sequence number of this tested electronic product of unique identification of reading from the Flash of tested electronic product generates new hash code;
S 3, from the user program space of the Flash of tested electronic product read step S 1The middle hash code that generates is with step S 2In the new hash code comparison that generates, if identical then system software normally moves, otherwise system software enters abnormality.
2. the anti-flight encryption method of electronic product as claimed in claim 1 is characterized in that step S 1In the components and parts sequence number of this unique identification electronic product be the sequence number of master chip or the sequence number of Flash.
3. the anti-flight encryption method of electronic product as claimed in claim 1 is characterized in that, the components and parts sequence number of this unique identification electronic product is stored in the factory program space of Flash.
4. as the anti-flight encryption method of above any described electronic product of claim, it is characterized in that step S 1And S 2In the hashing algorithm that adopts when generating hash code be MD5 or SHA.
5. the anti-flight encryption device of an electronic product is characterized in that it comprises:
One hash code generation module is used in electronic product production run or system software operational process, according to the components and parts sequence number generation hash code of predefined key and unique this product of identification; And
One hash code comparing module is used for the hash code that generates in the electronic product production run, compares with the new hash code that generates in the system software operational process, if identical then system software normally moves, otherwise system software enters abnormality.
6. the anti-flight encryption device of electronic product as claimed in claim 5 is characterized in that, it also comprises a hash code writing module, and the hash code that is used for generating in the electronic product production run is written in the user program space of this electronic product Flash.
7. the anti-flight encryption device of electronic product as claimed in claim 5 is characterized in that, the components and parts sequence number of this unique identification electronic product is the sequence number of master chip or the sequence number of Flash.
8. the anti-flight encryption device of electronic product as claimed in claim 5 is characterized in that, the components and parts sequence number of this unique identification electronic product is stored in the factory program space of Flash.
9. as the anti-flight encryption device of any described electronic product among the claim 5-8, it is characterized in that the hashing algorithm that this hash code generation module adopts when generating hash code is MD5 or SHA.
CN2009100554482A 2009-07-28 2009-07-28 Encryption method and device for anti-copy plate of electronic product Pending CN101968834A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100554482A CN101968834A (en) 2009-07-28 2009-07-28 Encryption method and device for anti-copy plate of electronic product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100554482A CN101968834A (en) 2009-07-28 2009-07-28 Encryption method and device for anti-copy plate of electronic product

Publications (1)

Publication Number Publication Date
CN101968834A true CN101968834A (en) 2011-02-09

Family

ID=43547990

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100554482A Pending CN101968834A (en) 2009-07-28 2009-07-28 Encryption method and device for anti-copy plate of electronic product

Country Status (1)

Country Link
CN (1) CN101968834A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509051A (en) * 2011-11-22 2012-06-20 康佳集团股份有限公司 Method and system preventing software from copying
CN102902899A (en) * 2012-09-04 2013-01-30 惠州三华工业有限公司 Microchip software protection method
CN102915412A (en) * 2011-08-04 2013-02-06 波音公司 Software part validation using hash values
CN102938045A (en) * 2012-07-23 2013-02-20 吴俊杰 Encryption method and authorization method after encryption for electronic product
CN103577727A (en) * 2013-11-13 2014-02-12 深圳市创维群欣安防科技有限公司 Software deadline verifying method and device
CN104966003A (en) * 2015-06-12 2015-10-07 国电南京自动化股份有限公司 Encryption and verification method for embedded equipment
CN105512574A (en) * 2015-12-08 2016-04-20 李灵超 Anti-clone encryption method and device for electronic product
CN106599693A (en) * 2015-10-16 2017-04-26 深圳市博巨兴实业发展有限公司 Multiple time programmable hardware encryption method and apparatus
CN106603227A (en) * 2016-12-12 2017-04-26 江苏宝丰新能源科技有限公司 Software and hardware encryption method applied to grid connected inverter
CN106777749A (en) * 2016-12-29 2017-05-31 杭州朔天科技有限公司 A kind of chip UID methods for designing based on embedded Nor Flash
CN107590368A (en) * 2017-08-25 2018-01-16 济南中维世纪科技有限公司 The method of embedded device program anti-copy
CN108304700A (en) * 2017-12-19 2018-07-20 浙江泰米电子科技有限公司 The anti-decompiling encryption method of software based on MCU
CN108460252A (en) * 2017-12-21 2018-08-28 创新科存储技术(深圳)有限公司 A kind of software product license information setting methods
CN108647499A (en) * 2018-05-16 2018-10-12 广州视源电子科技股份有限公司 A kind of method, apparatus, equipment and storage medium that anti-copy check code generates
CN112948893A (en) * 2021-04-20 2021-06-11 成都启英泰伦科技有限公司 Firmware encryption method based on batch hardware burning
CN114201235A (en) * 2021-12-14 2022-03-18 深圳市科金明电子股份有限公司 Encryption method of electronic equipment

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102915412A (en) * 2011-08-04 2013-02-06 波音公司 Software part validation using hash values
CN102509051A (en) * 2011-11-22 2012-06-20 康佳集团股份有限公司 Method and system preventing software from copying
CN102938045A (en) * 2012-07-23 2013-02-20 吴俊杰 Encryption method and authorization method after encryption for electronic product
CN102938045B (en) * 2012-07-23 2016-02-03 吴俊杰 The encryption method of electronic product and the authorization method after encrypting
CN102902899A (en) * 2012-09-04 2013-01-30 惠州三华工业有限公司 Microchip software protection method
CN103577727A (en) * 2013-11-13 2014-02-12 深圳市创维群欣安防科技有限公司 Software deadline verifying method and device
CN103577727B (en) * 2013-11-13 2016-10-19 深圳市创维群欣安防科技股份有限公司 A kind of method and device of software deadline checking
CN104966003B (en) * 2015-06-12 2018-02-06 国电南京自动化股份有限公司 Embedded device is encrypted and verification method
CN104966003A (en) * 2015-06-12 2015-10-07 国电南京自动化股份有限公司 Encryption and verification method for embedded equipment
CN106599693A (en) * 2015-10-16 2017-04-26 深圳市博巨兴实业发展有限公司 Multiple time programmable hardware encryption method and apparatus
CN106599693B (en) * 2015-10-16 2020-02-18 深圳市博巨兴微电子科技有限公司 Multi-time programmable hardware encryption method and device
CN105512574A (en) * 2015-12-08 2016-04-20 李灵超 Anti-clone encryption method and device for electronic product
CN106603227A (en) * 2016-12-12 2017-04-26 江苏宝丰新能源科技有限公司 Software and hardware encryption method applied to grid connected inverter
CN106777749A (en) * 2016-12-29 2017-05-31 杭州朔天科技有限公司 A kind of chip UID methods for designing based on embedded Nor Flash
CN107590368A (en) * 2017-08-25 2018-01-16 济南中维世纪科技有限公司 The method of embedded device program anti-copy
CN108304700A (en) * 2017-12-19 2018-07-20 浙江泰米电子科技有限公司 The anti-decompiling encryption method of software based on MCU
CN108460252A (en) * 2017-12-21 2018-08-28 创新科存储技术(深圳)有限公司 A kind of software product license information setting methods
CN108647499A (en) * 2018-05-16 2018-10-12 广州视源电子科技股份有限公司 A kind of method, apparatus, equipment and storage medium that anti-copy check code generates
CN112948893A (en) * 2021-04-20 2021-06-11 成都启英泰伦科技有限公司 Firmware encryption method based on batch hardware burning
CN114201235A (en) * 2021-12-14 2022-03-18 深圳市科金明电子股份有限公司 Encryption method of electronic equipment

Similar Documents

Publication Publication Date Title
CN101968834A (en) Encryption method and device for anti-copy plate of electronic product
US9589138B2 (en) Computing device boot software authentication
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
CN109313690A (en) Self-contained encryption boot policy verifying
JP5793709B2 (en) Key implementation system
CN100437618C (en) Portable information safety device
CN103597496A (en) Method and apparatus for authenticating a non-volatile memory device
CN110362427A (en) A kind of processing method of image file, system, BMC and readable storage medium storing program for executing
CN105631361A (en) Application program channel source identification method and device
CN104956620A (en) Methods and devices for authentication and key exchange
CN107832589A (en) Software copyright protecting method and its system
CN102971984B (en) Method for authenticating a storage device and host device
CN102196317A (en) Set-top box protection method and set-top box
CN101447009A (en) Method, device and system for installing software
US20080127078A1 (en) Method and apparatus for preventing modulation of executable program
US9471413B2 (en) Memory device with secure test mode
CN101447013A (en) Method, device and system for running software
JP2009080772A (en) Software starting system, software starting method and software starting program
CN102289607A (en) Universal serial bus (USB) device verification system and method
CN103177739A (en) Information processing apparatus, information processing system, information storing device, and program
CN103548030A (en) Information processing device, information processing method and program
CN103336918A (en) Electronic hard disk system authorization method and device
CN100464341C (en) Generation and management method for digital content use trace based on reliable computing technology
CN111125791B (en) Memory data encryption method and device, CPU chip and server
CN103034594A (en) Memory storage device and memory controller and password authentication method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110209