CN102902899A - Microchip software protection method - Google Patents
Microchip software protection method Download PDFInfo
- Publication number
- CN102902899A CN102902899A CN2012103241833A CN201210324183A CN102902899A CN 102902899 A CN102902899 A CN 102902899A CN 2012103241833 A CN2012103241833 A CN 2012103241833A CN 201210324183 A CN201210324183 A CN 201210324183A CN 102902899 A CN102902899 A CN 102902899A
- Authority
- CN
- China
- Prior art keywords
- microchip
- backup
- primary
- original
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a microchip software protection method which comprises the following steps of: backing up an original ID (identity) number into a FLASH or EEPROM (electrically erasable programmable read-only memory); in the use process, reading the backup ID number and the original ID number in real time through a software program, and comparing the both in real time; if the backup ID number and the original ID number are the same, indicating that a microchip is not reproduced and stolen, and enabling the microchip to work normally; and if the backup ID number and the original ID number are different, indicating that the microchip is reproduced and stolen, and enabling the microchip to be in an abnormal state and immediately stop working. According to the invention, the original ID number of the microchip is backed up, and the backup ID number and the original ID number are read in the use process in real time so as to perform comparison and verification, thus judging whether the microchip is reproduced and stolen; in the method, no hardware circuit needs to be added, so that the production cost is low; the software program is not encrypted, so that the protection strength is high; and the microchip is not subjected to limitations such as a time clock function and the like, thereby being capable of realizing universal application.
Description
Technical field
The present invention relates to the technical field of microchip, be specifically related to a kind of microchip method for protecting software.
Background technology
Core technology is the existence lifeblood of each enterprise, so each enterprise quite payes attention to the protection of own core technology.In electron trade, the application of microchip is more and more extensive, is illegally usurped easily in the production of microchip and use procedure.For the microchip technology of the enterprise that makes oneself is not replicated or usurps, different enterprises are also different to the guard method of microchip.Commonplace encryption protecting method has hardware encipher, software code encryption, software and hardware integration encryption at present, misguidance encryption and time encryption etc.Said method has been protected scientific payoffs to a certain extent, has increased the difficulty that cracks product, but limitation is arranged separately.Wherein, hardware encipher increases production cost, and hardware plagiarized easily, and protection intensity is not high; And software code is encrypted, although code is not easy by dis-assembling, is not easy to be modified code, and the data file that can directly be used as microchip is used; And the time enciphered method, microchip itself possesses time clock feature just can be used, and limitation is larger.
The microchip of each brand manufacturers identifies own unique original I D number at the Shi Douyou that dispatches from the factory, the similar identification card number that we use, and it has uniqueness, and the address of depositing is open transparent, is easy to be used by program.Thereby microchip is replicated easily to be usurped.
Summary of the invention
The objective of the invention is to overcome shortcomings and deficiencies of the prior art, a kind of microchip method for protecting software is provided, production cost is low, and protection intensity is high, and can generally use.
The objective of the invention is to be achieved through the following technical solutions: the microchip method for protecting software comprises:
Before using microchip, the step of backup microchip primary ID number;
Use in the microchip process, whether real-time verification primary ID number and Backup ID number identical step.
Particularly, the step of described checking primary ID number and Backup ID number is: read in real time the Backup ID number in the internal memory, and in real time with the Backup ID that reads number and primary ID number contrast, if Backup ID number and primary ID are number consistent, the microchip normal operation, otherwise microchip enters abnormality, quits work immediately.
Particularly, the step of described backup microchip primary ID number comprises:
(1), burning Backup ID program is to microchip;
(2), operation Backup ID program;
(3), burning microchip master routine is to microchip.
Particularly, the Backup ID program is wiped or master routine is burned onto the program area of Backup ID program.
Particularly, described Backup ID number deposits among the FLASH or EEPROM of microchip.
Particularly, the data area of described Backup ID number and the program area of master routine are different storage areas.
The present invention has the following advantages and beneficial effect compared to existing technology: the present invention is by the primary ID number of backup microchip, and in use reads in real time Backup ID number and primary ID and number compare checking, judges with this whether chip is copied and usurps; This method does not need to increase hardware circuit, so production cost is low; This method is not encrypted software program itself, so protection intensity is high; And microchip itself do not had the restrictions such as clock, can generally use.
Description of drawings
Fig. 1 is microchip method for protecting software flow chart of steps in the embodiment of the invention.
Embodiment
The present invention is described in further detail below in conjunction with embodiment and accompanying drawing, but embodiments of the present invention are not limited to this.
The thought of microchip method for protecting software is primary ID corresponding to each microchip number; to back up to for original I D number among the FLASH or EEPROM of microchip; in the use procedure, read in real time Backup ID number and primary ID number by software program, and in real time with both contrasts.If Backup ID number and primary ID are number consistent, illustrate then that microchip is not replicated to usurp the microchip normal operation, if Backup ID number and primary ID number is unlikely, illustrating then that microchip has been replicated usurps, and microchip enters abnormality, and quits work immediately.
Embodiment
As shown in Figure 1, the microchip method for protecting software comprises:
Before using microchip, the step of backup microchip primary ID number;
Use in the microchip process, whether real-time verification primary ID number and Backup ID number identical step.
Wherein, backup microchip primary ID number may further comprise the steps:
S101, with the Backup ID burning program to microchip;
S102, operation Backup ID program number deposit Backup ID among the FLASH or EEPROM of microchip in;
S103, the microchip master routine is burned onto microchip.
Particularly, moved the Backup ID program after, the Backup ID program wiped or master routine is burned onto the program area of Backup ID program, with the Backup ID programming overlay, prevent that the Backup ID program from being plagiarized utilization by master routine.In addition, the data area of described Backup ID number and the program area of master routine are different storage areas, prevent that Backup ID from number being covered by master routine.
The step of described checking primary ID number and Backup ID number:
S201, read Backup ID number in the internal memory in real time, and in real time with the Backup ID that reads number and primary ID number contrast, if Backup ID number and primary ID are number consistent, execution in step S202, otherwise execution in step S203;
S202, microchip normal operation, and execution in step S201;
S203, microchip enter abnormality, quit work immediately.
The present invention is by the primary ID number of backup microchip, and reads in real time Backup ID number and primary ID number compare checking in using the microchip process, judges with this whether microchip is copied and usurps; This method does not need to increase hardware circuit, so production cost is low; This method is not encrypted software program itself, so protection intensity is high; And microchip itself do not had the restrictions such as time clock feature, can generally use.
Above-described embodiment is the better embodiment of the present invention; but embodiments of the present invention are not restricted to the described embodiments; other any do not deviate from change, the modification done under Spirit Essence of the present invention and the principle, substitutes, combination, simplify; all should be the substitute mode of equivalence, be included within protection scope of the present invention.
Claims (6)
1. the microchip method for protecting software is characterized in that, comprising:
Before using microchip, the step of backup microchip primary ID number;
Use in the microchip process, whether real-time verification primary ID number and Backup ID number identical step.
2. microchip method for protecting software according to claim 1; it is characterized in that; the step of described checking primary ID number and Backup ID number is: read in real time the Backup ID number in the internal memory; and in real time with the Backup ID that reads number and primary ID number contrast; if Backup ID number and primary ID are number consistent; the microchip normal operation, otherwise microchip enters abnormality, quits work immediately.
3. microchip method for protecting software according to claim 2 is characterized in that, the step of described backup microchip primary ID number comprises:
(1), burning Backup ID program is to microchip;
(2), the program code of operation Backup ID number;
(3), burning microchip master routine is to microchip.
4. microchip method for protecting software according to claim 3 is characterized in that: the program area of the Backup ID program being wiped or master routine is burned onto the Backup ID program.
5. it is characterized in that according to claim 3 or 4 described microchip method for protecting software: described Backup ID number deposits among the FLASH or EEPROM of microchip.
6. microchip method for protecting software according to claim 5 is characterized in that: the data area of described Backup ID number and the program area of master routine are different storage areas.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103241833A CN102902899A (en) | 2012-09-04 | 2012-09-04 | Microchip software protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103241833A CN102902899A (en) | 2012-09-04 | 2012-09-04 | Microchip software protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102902899A true CN102902899A (en) | 2013-01-30 |
Family
ID=47575127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012103241833A Pending CN102902899A (en) | 2012-09-04 | 2012-09-04 | Microchip software protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102902899A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807177A (en) * | 2019-11-06 | 2020-02-18 | 南京法艾博光电科技有限公司 | Reverse engineering defense device and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222698A (en) * | 2007-01-12 | 2008-07-16 | 展讯通信(上海)有限公司 | IMEI code protection method based on hardware sequence number |
CN101673250A (en) * | 2009-09-18 | 2010-03-17 | 中兴通讯股份有限公司 | Method and device for protecting codes or data in mobile phone memory |
CN101968834A (en) * | 2009-07-28 | 2011-02-09 | 上海移为通信技术有限公司 | Encryption method and device for anti-copy plate of electronic product |
-
2012
- 2012-09-04 CN CN2012103241833A patent/CN102902899A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222698A (en) * | 2007-01-12 | 2008-07-16 | 展讯通信(上海)有限公司 | IMEI code protection method based on hardware sequence number |
CN101968834A (en) * | 2009-07-28 | 2011-02-09 | 上海移为通信技术有限公司 | Encryption method and device for anti-copy plate of electronic product |
CN101673250A (en) * | 2009-09-18 | 2010-03-17 | 中兴通讯股份有限公司 | Method and device for protecting codes or data in mobile phone memory |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807177A (en) * | 2019-11-06 | 2020-02-18 | 南京法艾博光电科技有限公司 | Reverse engineering defense device and method |
CN110807177B (en) * | 2019-11-06 | 2023-04-21 | 南京法艾博光电科技有限公司 | Reverse engineering defense device and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100449558C (en) | Sleep protection | |
CN101356536B (en) | Mobile security system and method | |
US9141802B2 (en) | Computing device boot software authentication | |
CN109241726B (en) | User authority control method and device | |
CN109901911A (en) | A kind of information setting method, control method, device and relevant device | |
CN108399329A (en) | A method of improving trusted application safety | |
CN105678192B (en) | A kind of key application method and application apparatus based on smart card | |
US9442833B1 (en) | Managing device identity | |
CN101968834A (en) | Encryption method and device for anti-copy plate of electronic product | |
CN102118512A (en) | Method and system for preventing application program of mobile phone from being cracked | |
CN104966003B (en) | Embedded device is encrypted and verification method | |
CN102650944A (en) | Operation system security bootstrap device and bootstrap device | |
CN101123507A (en) | A protection method and storage device for data information in storage device | |
CN103023647B (en) | A kind of method strengthening secondary radar FPGA fail safe | |
CN104463026A (en) | System and method for hardware anti-copying board | |
CN106156550A (en) | A kind of chip prevents the method cracked | |
CN103294971A (en) | Method for realizing burglary prevention and data protection of hard disk | |
CN115729568A (en) | Program burning protection method and device, burner and board card | |
CN102902899A (en) | Microchip software protection method | |
CN102938046B (en) | A kind of chip-stored body and code protection method storing dynamic decipher operation based on static encryption | |
CN104573464A (en) | Office terminal system reentrant method based on USB controllers | |
CN108647516B (en) | Method and device for defending against illegal privilege escalation | |
CN104809418A (en) | Personal electronic device and personal electronic device loss protection system and method | |
CN102542698B (en) | Safety protective method of electric power mobile payment terminal | |
CN105631310A (en) | Efficient trusted process authentication scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130130 |