CN102902899A - Microchip software protection method - Google Patents

Microchip software protection method Download PDF

Info

Publication number
CN102902899A
CN102902899A CN2012103241833A CN201210324183A CN102902899A CN 102902899 A CN102902899 A CN 102902899A CN 2012103241833 A CN2012103241833 A CN 2012103241833A CN 201210324183 A CN201210324183 A CN 201210324183A CN 102902899 A CN102902899 A CN 102902899A
Authority
CN
China
Prior art keywords
microchip
backup
primary
original
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012103241833A
Other languages
Chinese (zh)
Inventor
申云献
张世桐
咸立坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HUIZHOU SANHUA INDUSTRIAL Ltd
Original Assignee
HUIZHOU SANHUA INDUSTRIAL Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUIZHOU SANHUA INDUSTRIAL Ltd filed Critical HUIZHOU SANHUA INDUSTRIAL Ltd
Priority to CN2012103241833A priority Critical patent/CN102902899A/en
Publication of CN102902899A publication Critical patent/CN102902899A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a microchip software protection method which comprises the following steps of: backing up an original ID (identity) number into a FLASH or EEPROM (electrically erasable programmable read-only memory); in the use process, reading the backup ID number and the original ID number in real time through a software program, and comparing the both in real time; if the backup ID number and the original ID number are the same, indicating that a microchip is not reproduced and stolen, and enabling the microchip to work normally; and if the backup ID number and the original ID number are different, indicating that the microchip is reproduced and stolen, and enabling the microchip to be in an abnormal state and immediately stop working. According to the invention, the original ID number of the microchip is backed up, and the backup ID number and the original ID number are read in the use process in real time so as to perform comparison and verification, thus judging whether the microchip is reproduced and stolen; in the method, no hardware circuit needs to be added, so that the production cost is low; the software program is not encrypted, so that the protection strength is high; and the microchip is not subjected to limitations such as a time clock function and the like, thereby being capable of realizing universal application.

Description

The microchip method for protecting software
Technical field
The present invention relates to the technical field of microchip, be specifically related to a kind of microchip method for protecting software.
Background technology
Core technology is the existence lifeblood of each enterprise, so each enterprise quite payes attention to the protection of own core technology.In electron trade, the application of microchip is more and more extensive, is illegally usurped easily in the production of microchip and use procedure.For the microchip technology of the enterprise that makes oneself is not replicated or usurps, different enterprises are also different to the guard method of microchip.Commonplace encryption protecting method has hardware encipher, software code encryption, software and hardware integration encryption at present, misguidance encryption and time encryption etc.Said method has been protected scientific payoffs to a certain extent, has increased the difficulty that cracks product, but limitation is arranged separately.Wherein, hardware encipher increases production cost, and hardware plagiarized easily, and protection intensity is not high; And software code is encrypted, although code is not easy by dis-assembling, is not easy to be modified code, and the data file that can directly be used as microchip is used; And the time enciphered method, microchip itself possesses time clock feature just can be used, and limitation is larger.
The microchip of each brand manufacturers identifies own unique original I D number at the Shi Douyou that dispatches from the factory, the similar identification card number that we use, and it has uniqueness, and the address of depositing is open transparent, is easy to be used by program.Thereby microchip is replicated easily to be usurped.
Summary of the invention
The objective of the invention is to overcome shortcomings and deficiencies of the prior art, a kind of microchip method for protecting software is provided, production cost is low, and protection intensity is high, and can generally use.
The objective of the invention is to be achieved through the following technical solutions: the microchip method for protecting software comprises:
Before using microchip, the step of backup microchip primary ID number;
Use in the microchip process, whether real-time verification primary ID number and Backup ID number identical step.
Particularly, the step of described checking primary ID number and Backup ID number is: read in real time the Backup ID number in the internal memory, and in real time with the Backup ID that reads number and primary ID number contrast, if Backup ID number and primary ID are number consistent, the microchip normal operation, otherwise microchip enters abnormality, quits work immediately.
Particularly, the step of described backup microchip primary ID number comprises:
(1), burning Backup ID program is to microchip;
(2), operation Backup ID program;
(3), burning microchip master routine is to microchip.
Particularly, the Backup ID program is wiped or master routine is burned onto the program area of Backup ID program.
Particularly, described Backup ID number deposits among the FLASH or EEPROM of microchip.
Particularly, the data area of described Backup ID number and the program area of master routine are different storage areas.
The present invention has the following advantages and beneficial effect compared to existing technology: the present invention is by the primary ID number of backup microchip, and in use reads in real time Backup ID number and primary ID and number compare checking, judges with this whether chip is copied and usurps; This method does not need to increase hardware circuit, so production cost is low; This method is not encrypted software program itself, so protection intensity is high; And microchip itself do not had the restrictions such as clock, can generally use.
Description of drawings
Fig. 1 is microchip method for protecting software flow chart of steps in the embodiment of the invention.
Embodiment
The present invention is described in further detail below in conjunction with embodiment and accompanying drawing, but embodiments of the present invention are not limited to this.
The thought of microchip method for protecting software is primary ID corresponding to each microchip number; to back up to for original I D number among the FLASH or EEPROM of microchip; in the use procedure, read in real time Backup ID number and primary ID number by software program, and in real time with both contrasts.If Backup ID number and primary ID are number consistent, illustrate then that microchip is not replicated to usurp the microchip normal operation, if Backup ID number and primary ID number is unlikely, illustrating then that microchip has been replicated usurps, and microchip enters abnormality, and quits work immediately.
Embodiment
As shown in Figure 1, the microchip method for protecting software comprises:
Before using microchip, the step of backup microchip primary ID number;
Use in the microchip process, whether real-time verification primary ID number and Backup ID number identical step.
Wherein, backup microchip primary ID number may further comprise the steps:
S101, with the Backup ID burning program to microchip;
S102, operation Backup ID program number deposit Backup ID among the FLASH or EEPROM of microchip in;
S103, the microchip master routine is burned onto microchip.
Particularly, moved the Backup ID program after, the Backup ID program wiped or master routine is burned onto the program area of Backup ID program, with the Backup ID programming overlay, prevent that the Backup ID program from being plagiarized utilization by master routine.In addition, the data area of described Backup ID number and the program area of master routine are different storage areas, prevent that Backup ID from number being covered by master routine.
The step of described checking primary ID number and Backup ID number:
S201, read Backup ID number in the internal memory in real time, and in real time with the Backup ID that reads number and primary ID number contrast, if Backup ID number and primary ID are number consistent, execution in step S202, otherwise execution in step S203;
S202, microchip normal operation, and execution in step S201;
S203, microchip enter abnormality, quit work immediately.
The present invention is by the primary ID number of backup microchip, and reads in real time Backup ID number and primary ID number compare checking in using the microchip process, judges with this whether microchip is copied and usurps; This method does not need to increase hardware circuit, so production cost is low; This method is not encrypted software program itself, so protection intensity is high; And microchip itself do not had the restrictions such as time clock feature, can generally use.
Above-described embodiment is the better embodiment of the present invention; but embodiments of the present invention are not restricted to the described embodiments; other any do not deviate from change, the modification done under Spirit Essence of the present invention and the principle, substitutes, combination, simplify; all should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (6)

1. the microchip method for protecting software is characterized in that, comprising:
Before using microchip, the step of backup microchip primary ID number;
Use in the microchip process, whether real-time verification primary ID number and Backup ID number identical step.
2. microchip method for protecting software according to claim 1; it is characterized in that; the step of described checking primary ID number and Backup ID number is: read in real time the Backup ID number in the internal memory; and in real time with the Backup ID that reads number and primary ID number contrast; if Backup ID number and primary ID are number consistent; the microchip normal operation, otherwise microchip enters abnormality, quits work immediately.
3. microchip method for protecting software according to claim 2 is characterized in that, the step of described backup microchip primary ID number comprises:
(1), burning Backup ID program is to microchip;
(2), the program code of operation Backup ID number;
(3), burning microchip master routine is to microchip.
4. microchip method for protecting software according to claim 3 is characterized in that: the program area of the Backup ID program being wiped or master routine is burned onto the Backup ID program.
5. it is characterized in that according to claim 3 or 4 described microchip method for protecting software: described Backup ID number deposits among the FLASH or EEPROM of microchip.
6. microchip method for protecting software according to claim 5 is characterized in that: the data area of described Backup ID number and the program area of master routine are different storage areas.
CN2012103241833A 2012-09-04 2012-09-04 Microchip software protection method Pending CN102902899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012103241833A CN102902899A (en) 2012-09-04 2012-09-04 Microchip software protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012103241833A CN102902899A (en) 2012-09-04 2012-09-04 Microchip software protection method

Publications (1)

Publication Number Publication Date
CN102902899A true CN102902899A (en) 2013-01-30

Family

ID=47575127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012103241833A Pending CN102902899A (en) 2012-09-04 2012-09-04 Microchip software protection method

Country Status (1)

Country Link
CN (1) CN102902899A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807177A (en) * 2019-11-06 2020-02-18 南京法艾博光电科技有限公司 Reverse engineering defense device and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222698A (en) * 2007-01-12 2008-07-16 展讯通信(上海)有限公司 IMEI code protection method based on hardware sequence number
CN101673250A (en) * 2009-09-18 2010-03-17 中兴通讯股份有限公司 Method and device for protecting codes or data in mobile phone memory
CN101968834A (en) * 2009-07-28 2011-02-09 上海移为通信技术有限公司 Encryption method and device for anti-copy plate of electronic product

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222698A (en) * 2007-01-12 2008-07-16 展讯通信(上海)有限公司 IMEI code protection method based on hardware sequence number
CN101968834A (en) * 2009-07-28 2011-02-09 上海移为通信技术有限公司 Encryption method and device for anti-copy plate of electronic product
CN101673250A (en) * 2009-09-18 2010-03-17 中兴通讯股份有限公司 Method and device for protecting codes or data in mobile phone memory

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807177A (en) * 2019-11-06 2020-02-18 南京法艾博光电科技有限公司 Reverse engineering defense device and method
CN110807177B (en) * 2019-11-06 2023-04-21 南京法艾博光电科技有限公司 Reverse engineering defense device and method

Similar Documents

Publication Publication Date Title
CN100449558C (en) Sleep protection
CN101356536B (en) Mobile security system and method
US9141802B2 (en) Computing device boot software authentication
CN109241726B (en) User authority control method and device
CN109901911A (en) A kind of information setting method, control method, device and relevant device
CN108399329A (en) A method of improving trusted application safety
CN105678192B (en) A kind of key application method and application apparatus based on smart card
US9442833B1 (en) Managing device identity
CN101968834A (en) Encryption method and device for anti-copy plate of electronic product
CN102118512A (en) Method and system for preventing application program of mobile phone from being cracked
CN104966003B (en) Embedded device is encrypted and verification method
CN102650944A (en) Operation system security bootstrap device and bootstrap device
CN101123507A (en) A protection method and storage device for data information in storage device
CN103023647B (en) A kind of method strengthening secondary radar FPGA fail safe
CN104463026A (en) System and method for hardware anti-copying board
CN106156550A (en) A kind of chip prevents the method cracked
CN103294971A (en) Method for realizing burglary prevention and data protection of hard disk
CN115729568A (en) Program burning protection method and device, burner and board card
CN102902899A (en) Microchip software protection method
CN102938046B (en) A kind of chip-stored body and code protection method storing dynamic decipher operation based on static encryption
CN104573464A (en) Office terminal system reentrant method based on USB controllers
CN108647516B (en) Method and device for defending against illegal privilege escalation
CN104809418A (en) Personal electronic device and personal electronic device loss protection system and method
CN102542698B (en) Safety protective method of electric power mobile payment terminal
CN105631310A (en) Efficient trusted process authentication scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130130