CN102937907A - Method for utilizing secure digital (SD) card to perform licensed software installation and update - Google Patents

Method for utilizing secure digital (SD) card to perform licensed software installation and update Download PDF

Info

Publication number
CN102937907A
CN102937907A CN2012104353450A CN201210435345A CN102937907A CN 102937907 A CN102937907 A CN 102937907A CN 2012104353450 A CN2012104353450 A CN 2012104353450A CN 201210435345 A CN201210435345 A CN 201210435345A CN 102937907 A CN102937907 A CN 102937907A
Authority
CN
China
Prior art keywords
card
upgrading
upgrade
embedded device
cid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104353450A
Other languages
Chinese (zh)
Other versions
CN102937907B (en
Inventor
陈淮琰
钟辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Xingditong Communication Technology Co ltd
Original Assignee
Inventec Besta Xian Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Besta Xian Co Ltd filed Critical Inventec Besta Xian Co Ltd
Priority to CN201210435345.0A priority Critical patent/CN102937907B/en
Publication of CN102937907A publication Critical patent/CN102937907A/en
Application granted granted Critical
Publication of CN102937907B publication Critical patent/CN102937907B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a method for utilizing a secure digital (SD) card to perform licensed software installation and update. The method comprises the following steps: performing batch production of upgrade cards; and utilizing the SD card to perform one-card and one-machine software installation and update on an embedded device. According to the method for utilizing the SD card to perform licensed software installation and update, burn can be directly performed in batches, the card does not need to correspond to a main frame serial number of the specific embedded device, and the production, circulation and sales process of the cards is flexible and convenient.

Description

Utilize the SD card to authorize software to install and upgrade the method for using
Technical field
The present invention relates to a kind of SD of utilization card and authorize software that the method for upgrading use is installed, relate in particular to a kind of mandate software installation that utilizes the SD card to carry out a card one machine at embedded device and upgrade the method for using.
Background technology
Some products-hardware platforms of embedded device are identical, only be that S/W Content content upper and that load is different, up to a hundred Japanese dictionaries may have been loaded such as A money e-dictionary for a product of Japanese learner, and B money e-dictionary is for the user of English learning, having loaded up to a hundred English dictionaries, is the German dictionary and C money e-dictionary perhaps loads.And A, B, C three dictionary hardware platform possibility general (the same hardware).For the user of product of study Japanese, if follow-uply want English learning (Britain and Japan are two repaiies), and it can buy upgrading card bag at A money e-dictionary again, to install some English dictionaries.
Although online website can be by management such as DRM, the sequence number that cooperates subscriber set, carry out empowerment management, but it often will require to obtain the sequence number (client or by USB link PC of client machine, send to the website and use website or PC ending tool to grab sequence number, perhaps by user's registration of website user, fill in the sequence number that prints on consumer products instructions or the product box), then the website background program downloads and installs for the user according to user's the sequence number backstage special installation procedure bag for this subscriber set of generation.But these modes all need to know the condition code (such as sequence number) of subscriber set.Then encryption need to be authorized according to the program that the special medical treatment code of designated user is downloaded user's needs in the backstage, only allows to install and use at the embedded device of assigned serial number with the card that limits this mandate, to avoid a card Multi-computer Sharing.
And the user may meet difficulty to obtaining of embedded device sequence number, such as some users Website login (without INTERNET time can't submit sequence number to) easily, some user after buying product not in time (or lazy) use sequence number carry out website account registration and binding, some user may absolutely can not find the nameplate that is printed with sequence number, and the sequence number of the embedded device of the use that is in no position to take possession of, ask for help after sale and need phone to send a telegraph, some user can't find the sequence number (losing etc. such as packing box) that prints on the packing box.
The sequence number of some users input (such as the sequence number of reference product nameplate or packing box, might with the sequence number input error), and when producing verification or installation sequence number can't be corresponding upper and so that DRM can't normal authorization software installation and use.
Even if receive by approach and collected the embedded device product ID that allows the user of use, in the upgrading card manufacturing process, because read numerous user's sequence numbers (as from certain database, reading) of collecting, increased the operation of burning, and the user that holds that also will guarantee the embedded device of sheet that burning goes out and correlated series correspondence does correspondingly one by one, and any collocation of obscuring can not be arranged.This will certainly produce operation and increase production cost and time for batch making and production upgrading card.
And the distribution of upgrading card, logistics distribution, if it is the same to be similar to the marketing channel of embedded device, if a kind of upgrade card can be arranged, make card and do not need to collect in advance the sequence number of user's embedded device (perhaps further feature value, such as CID/PID of the SD card of the built-in card of embedded device), and can be directly in batches carry out burning, need not to block respectively with the host sequence of specific embedded device number corresponding one by one, and then so that the production of card, circulation, sales process are more flexible and convenient.
Summary of the invention
In order to solve the above-mentioned technical matters that exists in the background technology, the invention provides a kind of can be directly in batches carry out burning, need not card with the host sequence of specific embedded device number corresponding and can so that the production of card, circulation, sales process reach more flexibly and utilize easily the SD card to authorize software to install to upgrade the method for using.
Technical solution of the present invention is: the invention provides a kind of SD of utilization card and authorize software that the method for upgrading use is installed, its special character is: said method comprising the steps of:
1) batch production upgrade card;
2) the mandate software that utilizes the SD card to carry out a card one machine at embedded device is installed and is upgraded and use.
Above-mentioned steps 1) specific implementation is:
1.1) identification upgrading card and obtain the CID/PID value of this upgrading card;
1.2) but rebuild card MBR at the storage area of upgrading card; Described MBR comprises Authorization Card id field and First Used Device id field at least;
1.3) data or the program of the required loading of burning upgrading card.
Above-mentioned steps 1.2) Authorization Card id field is that the CID/PID that upgrading card firmware CID Register grasps obtains the ID that ciphertext is preserved through after encrypting in; Described Authorization Card id field can be reduced through deciphering and be obtained upgrading the CID/PID value of card; The decoded CID/PID value of upgrading card Authorization Card ID of described publisher's distribution equates with the CID/PID of card own;
Described step 1.2) First Used Device id field is at the special string of the Virgin state that is used for the sign upgrade card that every upgrade card is carried out setting in the burning production run in; Described special string is preserved through ciphertext after encrypting; Described Virgin state is that this card was not was not installed and used by any embedded device; After card is used by certain embedded device success update contruction, the sequence number of the embedded device that then the supporting success of First and upgrading card is used under the keeping records of First Used Device id field.
Above-mentioned steps 2) specific implementation is:
2.1) embedded device identification upgrade card;
2.2) judge whether upgrade card is that the legal distribution of publisher or illegal clone are pirate; If then carry out step 2.3); If not, then withdraw from the renewal updating operation;
2.3) judge whether upgrade card moves first for embedded device; If then carry out the renewal updating operation that normal publisher authorizes; If not, then carry out step 2.4);
2.4) judge whether embedded device is the object that this upgrade card upgrades upgrading for the first time; If then carry out the renewal updating operation that normal publisher authorizes; If not, then withdraw from the renewal updating operation.
Above-mentioned steps 2.2) specific implementation is:
2.2.1) embedded device is from the CID/PID value of upgrade card CID register read card, obtains the A-id data;
2.2.2) read the Authorization Card id field of MBR in the upgrade card, and it is decrypted, the B-id data obtained;
2.2.3) determining step 2.2.1) resulting A-id data and step 2.2.2) whether resulting B-id data identical; If identical, then this upgrade card is the legal distribution of publisher; If not identical, then this upgrade card is that illegal clone is pirate.
Above-mentioned steps 2.3) specific implementation is:
2.3.1) embedded device reads the First Used Device id field of MBR, and to its deciphering, obtain the C-id data from upgrade card;
2.3.2) determining step 2.3.1) resulting C-id data and step 1.2) in the special string that sets whether identical, if identical, then upgrade card is to move first for embedded device, the renewal updating operation that allows normal publisher to authorize, use later no matter whether upgrading card write protector is opened at this upgrade card simultaneously, all by force unique sequence number of the embedded device that uses is written to the Authorization Card id field of the MBR of upgrade card according to the agreement password; If not, then upgrade card moves first for the embedded device right and wrong, forbids upgrading upgrading.
Above-mentioned steps 2.4) specific implementation is:
2.4.1) according to step 2.3.2) and in the Authorization Card id field that writes by force upgrade card MBR, deciphering obtains the D-id data;
2.4.2) determining step 2.3.1) resulting C-id data and step 2.4.1) whether the D-id data that obtain identical, if, represent that then this upgrading card is exactly successful operation on this embedded equipment for the first time, belong to normally and reuse, allow to continue to upgrade updating operation; If not, represent that then this upgrade card attempts to use to many embedded devices, refusal is carried out and is upgraded updating operation and also withdraw from.
The cipher mode of above-mentioned CID/PID is to adopt the Crypted password of agreement or directly take the value of the CID/PID of upgrading card as Crypted password.
The manner of decryption of above-mentioned CID/PID is to adopt the clear crytpographic key of agreement or directly take the value of the CID/PID of upgrading card as clear crytpographic key.
Advantage of the present invention is:
The invention discloses a kind of sequence number (eigenwert) that does not need to collect in advance the embedded device that the user uses, do not need to take the SD card of hardware enciphering and deciphering, and only any possess the storage data common SD card in, by the value of zone, end, the zone of the Master Boot Record in the MBR of card in conjunction with the CID/PID in the card firmware, and four values of sequence number of the embedded device that uses contrast cleverly, namely can reach the mechanism that card and embedded device 1 card 1 machine are licensed.And possess the card of preventing and be used echo cloning instrument (such as WinHex) etc. and illegally clone piracy.The restriction of card and use main frame is postponed the write protection label of ignoring card after card normally successfully uses for the first time and is write by force; so allow the batch burning of card can be without any need for the sequence number of embedded device; and the simplification production procedure; and only write an approximately definite value that can the special identifier card never be used (such as the ciphertext after to be 0 data oneself entirely according to the password of agreement be encrypted); increase substantially burning efficient; and the card of burning is being sold and the logistics distribution channel can not need to paste other maintenance card and specific user's (coupling of card and embedded device) and matches correct information, so allow sell with Logistics Operation more simple.Selling card can be convenient as enjoying other embedded equipment (main frame).And because the information in the MBR all is to have carried out encryption (as using fixed password according to special rule, perhaps with this province of card CID/PID as password), can resist the disabled user and enumerate the intention that many cards attempt to find out rule, and realize that finally the restriction of card and embedded equipment (main frame) card one machine licenses.
Description of drawings
Fig. 1 is the schematic flow sheet of method provided by the present invention;
Fig. 2 be the present invention upgrade card is carried out in batches burning schematic flow sheet;
Fig. 3 is that the present invention is to the ciphering process schematic diagram of upgrading card CID/PID;
Fig. 4 is that the present invention is to the decrypting process schematic diagram of upgrading card CID/PID.
Embodiment
16 bytes of the CID/PID of each SD card producer are unique numberings.
The structure of card subregion MBR is as follows:
Main boot partition table
Byte displacement Field length Field name and definition Content (value)
0 446 Main Boot Record Unrestrictedly
446 16 The 1st partition table 16 byte information of subregion 1
462 16 The 2nd partition table 16 byte information of subregion 2
478 16 The 3rd partition table 16 byte information of subregion 3
494 16 The 4th partition table 16 byte information of subregion 4
510 2 The end mark word 0x55,0xAA
The value of CID/PID of loading the upgrading card of installation procedure is write the specific location area of delimitation in the Master Boot Record zone of MBR by encrypting (such as AES, or other cryptographic algorithm such as 3DES).
The batch production upgrade card, only need cd-rom recorder in the process of burning card, in the time of identification card the CID/PID that grabs is encrypted and writes in the specific field (referring to table two) of MBR among the card 0sector according to the mode of agreement, do not need additionally to ask in reply database and collect characteristic sequences that the permission of so-called binding uses embedded device number.
By 2 partial datas among the MBR of the card Sector0 that writes, and then when realizing that the upgrading card is produced, only allow cd-rom recorder grasp the intrinsic CID/PID of upgrading card through being stored in after the encryption in the MBR table, can identify the card and illegal card (upgrade card of former factory distribution, the character code that obtains behind the field decoding among the MBR is consistent with card CID/PID) of cloning copy that former factory produces by this field.
And limit the requirement that (only allowing) uses at an embedded device for a upgrade card, also be in the MBR of upgrading card, to reserve a field, fill in into a special character string when dispatching from the factory (as all writing 0 character string, Virgin state with the sign upgrade card, namely changing card was not was not installed and used by any embedded device), and then when producing line batch burning upgrading card, do not need to fill out in advance the intrinsic sequence number of embedded device that is authorized to, produce the host sequence number that the upgrading card can not need to collect user's embedded device at hand to allow, and allow and produce and circulation sale (distribution) link does not need to bind the host sequence number of concrete user's embedded device, can omit the link of guaranteeing upgrade card and relevant embedded device host sequence information matches, save time and cost.
The authorized upgrade card of the normal channel of user; its success is complete card programmed the time in machine upgrading (installation); the sequence number of this embedded device is namely ignored the write-protect state of card after upgrading, be written to by force in the MBR relevant field of upgrading card Sector 0.And afterwards in this card the Virgin identity change (the unique sequence number that namely allows the embedded device that is used on the record), and then when attempting to block to other embedded device use with this, the MBR relative recording that can read out upgrading card Sector 0 allows the sequence number of embedded device of card upgrading (installation) program of unique sequence number of the embedded device main frame that is used and operation itself to compare, on the coupling, representing then that card remains at used embedded device for the first time reuses, if do not mate, represent that then this card attempts to use to second embedded device, and judge as not allowing the use of (without authorize), and denial of service.
In the regional selected part of card MBR " Master Boot Record " zone, mark off 2 part fields:
Field: the ciphertext after the CID/PID of record upgrading card itself encrypts.
A field: dispatching from the factory at card system is preset as particular value (writing in this field such as the ciphertext after entirely being set to 0 data and encrypting, to identify this card for the Virgin state that dispatches from the factory).When card is successfully upgraded (installation) use for the first time by certain embedded device after; ignore the write-protect of card, automatically by force the serial number encryption of used embedded device is obtained in the field that ciphertext is written to card MBR " Master Boot Record " Region specification.
The dealer can be the same with common other embedded device with the upgrading card of volume production, do not distinguish client's direct marketing, as long as the normal channel of client is bought obtain, can use at the embedded device that can use the upgrading card to carry out software upgrading (perhaps extender installation).Because understand unique sequence number feedback record of the embedded device that will use after using in upgrading card MBR, so follow-up restriction of used upgrading card and this successfully use the embedded device of upgrading (installation) function first, if and the user uses this to use card once to attempt to use at other embedded device (equipment that successfully use the non-first time), then can be inconsistent because of the embedded device of the sequence number that blocks interior MBR binding and use, and can't pass through mandate, and do not ban use of the service of the program upgrade (installation) of upgrading card.
The present invention does not need to use special category (such as the card of support hardware encryption technology [being that Class 7 supports CMD42LOCK UNLOCK order]) SD card, and any common SD card, the T-Flash card.Be written in the fixedly value of unique CID/PID all of every card in the register of card by the manufacturer at record upgrading card in MBR, and be recorded in the specific field of MBR of card after the process encryption, and omitted unique sequence number number that production burning card is just collected the embedded device that is allowed to use, and fill in such as all be 0 special string and encrypt after be recorded among the MBR of Sector 0 of upgrade card in the special field.Thus, i.e. easily batch production, circulation, and sale, but realized that again the upgrading card prevents by illegal piracy simultaneously, because the upgrading card is designed to can collect unique sequence number of the embedded device main frame of operation after being upgraded (installation) success the first time, block the restriction (having accomplished the restriction of a card one machine) that only permission is used to an embedded device to reach one of restriction.
For MBR gauge outfit 446 bytes, choose some spaces and be used for depositing the sequence number information that upgrading card copyright ID and card are authorized to the embedded device that uses first.Embedded device CPU starts among the MBR also do not rely in the outside card " Master Boot Record " Code, so MasterBoot Record also can't deposit the Code content that Boot loader starts among the MBR of general card.
Table 1
Partition 1 is partition table 1 in the upper table; Partition 2 is partition tables 2; Partition 3 is partition tables 3; Partition 4 is partition tables 4;
→ be adjusted to following compatible structure
Table 2
Figure BDA00002355833400072
Wherein: New Boot Code(Master Boot Record), Authorization Card ID, three field total lengths of First Used Device ID be 446 bytes.
Authorization Card ID: the CID/PID of upgrading card firmware CID Register crawl obtains the ID that ciphertext is preserved through after encrypting.Obtain expressly (the CID/PID value of the card of namely upgrading) through deciphering to reduce.
The decoded plaintext of upgrading card Authorization Card ID of publisher's distribution equates with the CID/PID of card own.Even if using reflect tool (such as the WinHex mirror image) to attempt that the card of publisher's distribution is attempted Clone mirror such as the disabled user looks like to revert on certain other SD card.But because every CID/PID of card own can be different, so be not former card, clone's pirate card can't be correct the CID/PID of coupling card own and MBR in the plaintext that reduces of Authorization Card ID decoding, and then the card that can differentiate upgrading is publisher's master, the card that still illegally clones.
First Used Device ID: when every card of card that burning in enormous quantities is produced dispatches from the factory all the content in this field be set to particular value (as all being 0), and preserve through ciphertext after encrypting.Can reduce through decoding and to obtain expressly, the card factory state expressly equals the particular value set, (as being 0 entirely).When card is successfully upgraded (installation) use by certain embedded device after, the sequence number (Serial Number) of the embedded device that then the supporting success of First and upgrading card is used under the keeping records of this field.
If among the upgrade card MBR First Used Device id field content by decoding after value be particular value (preset value of burning (entirely be 0 such as content), show that this upgrading card always was not used, be in the Virgin state, allow under this state to be used by any embedded device.But authorize card in case successfully used by certain embedded device, then embedded unique serial number encryption of using can be recorded in the First Used Device id field of MBR in the successful use procedure, again re-used by other equipment to limit this card.This writes the write protection label that need to ignore card, namely no matter whether the user opens the write-protect of card when using card, all needs to write by force in the First Used Device id field of MBR of card.
The decoded clear content of First Used Device ID (such as complete non-zero situation) when being not equal to particular value among the upgrade card MBR, represent that then this card bound by certain embedded device, and the Displacement Sequence of the embedded device of binding has been kept among the card MBR in the First Used Device id field after number also encrypting.When used the also upgrading card of bound mistake by certain embedded device, use if again be inserted in other embedded device, then can the sequence number (Serial Number) of upper embedded device can't be mated because of the decoded plaintext of First Used Device ID among the upgrade card MBR, and mandate unusually and not upgrade upgrading and the use of card content can be judged to.
The burning upgrade card as shown in Figure 2 in batches.
The flow process of embedded device identification and use upgrade card as shown in Figure 1.
After embedded device recognizes the upgrading card, CID/PID value from card CID register read card, obtain the data of A-id, read afterwards the Authorization Card id field of the MBR of upgrading card, and be decrypted according to intrinsic agreement password (perhaps take the A-id value as password), obtain B-id.(wherein B-id in burning, just fill in be exactly that the value of A-id is according to the value of agreement after the password encryption).So if the card of the legal distribution of producer, then A-id can be the same with the B-id value.And if illegally with the cards such as similar WinHex clones' card because every card dispatches from the factory producer write the CID/PID of CID register can be different, so be cloned in the Authorization Card id field content of the MBR of card decipher out B-id can be not identical.And then can identification card whether be that the legal distribution of publisher or illegal clone are pirate.
Confirmed card be legal distribution (non-clone piracy) afterwards, then read again First Used Device id field among the card MBR, obtain C-id if the value that reads out is deciphered according to the agreement password (perhaps take the A-id value as password) of agreement equally.
If the value that C-id equals to preset (as being 0 entirely) sign upgrading card was never used by any embedded device main frame; then allow the user upgrade (installation) use; and use later and whether open regardless of upgrading card write protector; all by force unique sequence number of the embedded device that uses is written to the Authorization Card id field of the MBR of upgrading card according to agreement password (perhaps with the A-id value as password), realizes only allowing to use (rather than the burning embedded device sequence number of just collecting upper user when making the upgrading card writes) to this main frame so that card is limited with this.
If C-id is not equal to default value (as not being 0 entirely), represent that then this upgrade card was successfully used by certain embedded equipment, and this C-id is exactly the sequence number of that embedded equipment of use.Then need to contrast the sequence number of embedded equipment main frame of this operation and the value (being the D-id value) of C-id,
If C-id and D-id are equal, then expression upgrading card is exactly successful operation on this embedded equipment for the first time, belongs to normally to reuse (normal authorization), allows to continue use.
Value such as D-id and C-id; if unequal, represent that then this card attempts to use to many embedded devices, and run counter to " card limits a machine " principle used; and refusal is carried out the service of back, and then reaches mandates " card limits a machine " use protect.
Card CID/PID encrypting and decrypting Fig. 3 and shown in Figure 4 respectively wherein can take the password of arranging or directly take the value of the CID/PID of upgrading card as password.

Claims (9)

1. one kind is utilized the SD card to authorize software that the method for upgrading use is installed, and it is characterized in that: said method comprising the steps of:
1) batch production upgrade card;
2) the mandate software that utilizes the SD card to carry out a card one machine at embedded device is installed and is upgraded and use.
2. the SD of utilization card according to claim 1 authorizes software that the method for upgrading use is installed, and it is characterized in that: the specific implementation of described step 1) is:
1.1) identification upgrading card and obtain the CID/PID value of this upgrading card;
1.2) but rebuild card MBR at the storage area of upgrading card; Described MBR comprises Authorization Card id field and First Used Device id field at least;
1.3) data or the program of the required loading of burning upgrading card.
3. the SD of utilization card according to claim 2 authorizes the software installation to upgrade the method for using, and it is characterized in that: Authorization Card id field is that the CID/PID that upgrading card firmware CIDRegister grasps obtains the ID that ciphertext is preserved through after encrypting described step 1.2); Described Authorization CardID field can be reduced through deciphering and be obtained upgrading the CID/PID value of card; The decoded CID/PID value of upgrading card Authorization Card ID of described publisher's distribution equates with the CID/PID of card own;
Described step 1.2) First Used Device id field is at the special string of the Virgin state that is used for the sign upgrade card that every upgrade card is carried out setting in the burning production run in; Described special string is preserved through ciphertext after encrypting; Described Virgin state is that this card was not was not installed and used by any embedded device; After card is used by certain embedded device success update contruction, the sequence number of the embedded device that then the supporting success of First and upgrading card is used under the keeping records of First Used Device id field.
4. the SD of utilization card according to claim 3 authorizes software that the method for upgrading use is installed, and it is characterized in that: specific implementation described step 2) is:
2.1) embedded device identification upgrade card;
2.2) judge whether upgrade card is that the legal distribution of publisher or illegal clone are pirate; If then carry out step 2.3); If not, then withdraw from the renewal updating operation;
2.3) judge whether upgrade card moves first for embedded device; If then carry out the renewal updating operation that normal publisher authorizes; If not, then carry out step 2.4);
2.4) judge whether embedded device is the object that this upgrade card upgrades upgrading for the first time; If then carry out the renewal updating operation that normal publisher authorizes; If not, then withdraw from the renewal updating operation.
5. the SD of utilization card according to claim 4 authorizes software that the method for upgrading use is installed, and it is characterized in that: specific implementation described step 2.2) is:
2.2.1) embedded device is from the CID/PID value of upgrade card CID register read card, obtains the A-id data;
2.2.2) read the Authorization Card id field of MBR in the upgrade card, and it is decrypted, the B-id data obtained;
2.2.3) determining step 2.2.1) resulting A-id data and step 2.2.2) whether resulting B-id data identical; If identical, then this upgrade card is the legal distribution of publisher; If not identical, then this upgrade card is that illegal clone is pirate.
6. the SD of utilization card according to claim 5 authorizes software that the method for upgrading use is installed, and it is characterized in that: specific implementation described step 2.3) is:
2.3.1) embedded device reads the First Used Device id field of MBR, and to its deciphering, obtain the C-id data from upgrade card;
2.3.2) determining step 2.3.1) resulting C-id data and step 1.2) in the special string that sets whether identical, if identical, then upgrade card is to move first for embedded device, the renewal updating operation that allows normal publisher to authorize, use later no matter whether upgrading card write protector is opened at this upgrade card simultaneously, all by force unique sequence number of the embedded device that uses is written to the Authorization Card id field of the MBR of upgrade card according to the agreement password; If not, then upgrade card moves first for the embedded device right and wrong, forbids upgrading upgrading.
7. the SD of utilization card according to claim 6 authorizes software that the method for upgrading use is installed, and it is characterized in that: specific implementation described step 2.4) is:
2.4.1) according to step 2.3.2) and in the Authorization Card id field that writes by force upgrade card MBR, deciphering obtains the D-id data;
2.4.2) determining step 2.3.1) resulting C-id data and step 2.4.1) whether the D-id data that obtain identical, if, represent that then this upgrading card is exactly successful operation on this embedded equipment for the first time, belong to normally and reuse, allow to continue to upgrade updating operation; If not, represent that then this upgrade card attempts to use to many embedded devices, refusal is carried out and is upgraded updating operation and also withdraw from.
8. the described SD of the utilization card of arbitrary claim is authorized the method that software install to upgrade uses according to claim 3-7, it is characterized in that: the cipher mode of described CID/PID is to adopt the Crypted password of agreement or directly take the value of the CID/PID of upgrading card as Crypted password.
9. the SD of utilization card according to claim 8 is authorized the method that software install to upgrade uses, and it is characterized in that: the manner of decryption of described CID/PID is to adopt the clear crytpographic key of agreement or directly take the value of the CID/PID of upgrading card as clear crytpographic key.
CN201210435345.0A 2012-11-05 2012-11-05 Utilize SD card to authorize software to install and upgrade the method using Expired - Fee Related CN102937907B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210435345.0A CN102937907B (en) 2012-11-05 2012-11-05 Utilize SD card to authorize software to install and upgrade the method using

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210435345.0A CN102937907B (en) 2012-11-05 2012-11-05 Utilize SD card to authorize software to install and upgrade the method using

Publications (2)

Publication Number Publication Date
CN102937907A true CN102937907A (en) 2013-02-20
CN102937907B CN102937907B (en) 2016-05-11

Family

ID=47696806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210435345.0A Expired - Fee Related CN102937907B (en) 2012-11-05 2012-11-05 Utilize SD card to authorize software to install and upgrade the method using

Country Status (1)

Country Link
CN (1) CN102937907B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440465A (en) * 2013-08-29 2013-12-11 成都卫士通信息安全技术有限公司 Mobile storage medium safety control method
CN104504345A (en) * 2014-12-20 2015-04-08 无敌科技(西安)有限公司 Device and method for hiding documents to be protected of card in universal documentation system
CN108874402A (en) * 2018-04-20 2018-11-23 新华三技术有限公司 A kind of network attached storage software installation method and device
CN111400776A (en) * 2020-03-11 2020-07-10 中安云科科技发展(山东)有限公司 Method, system and device for producing password cards in quantity

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101344854A (en) * 2008-08-22 2009-01-14 四川长虹电器股份有限公司 Method for upgrading embedded type Linux equipment through SD card
US20090292876A1 (en) * 2008-05-22 2009-11-26 Winbond Electronics Corporation In-System Programming to Switch Memory Access from One Area to Another in Memory Cards
CN101777106A (en) * 2010-01-22 2010-07-14 中兴通讯股份有限公司 Method and device for preventing mobile terminal software from being stolen
CN102279755A (en) * 2010-06-10 2011-12-14 康佳集团股份有限公司 Embedded device and updating method of embedded software thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090292876A1 (en) * 2008-05-22 2009-11-26 Winbond Electronics Corporation In-System Programming to Switch Memory Access from One Area to Another in Memory Cards
CN101344854A (en) * 2008-08-22 2009-01-14 四川长虹电器股份有限公司 Method for upgrading embedded type Linux equipment through SD card
CN101777106A (en) * 2010-01-22 2010-07-14 中兴通讯股份有限公司 Method and device for preventing mobile terminal software from being stolen
CN102279755A (en) * 2010-06-10 2011-12-14 康佳集团股份有限公司 Embedded device and updating method of embedded software thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440465A (en) * 2013-08-29 2013-12-11 成都卫士通信息安全技术有限公司 Mobile storage medium safety control method
CN104504345A (en) * 2014-12-20 2015-04-08 无敌科技(西安)有限公司 Device and method for hiding documents to be protected of card in universal documentation system
CN108874402A (en) * 2018-04-20 2018-11-23 新华三技术有限公司 A kind of network attached storage software installation method and device
CN111400776A (en) * 2020-03-11 2020-07-10 中安云科科技发展(山东)有限公司 Method, system and device for producing password cards in quantity
CN111400776B (en) * 2020-03-11 2022-09-16 中安云科科技发展(山东)有限公司 Method, system and device for producing password cards in quantity

Also Published As

Publication number Publication date
CN102937907B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN101281468B (en) Method and apparatus for generating firmware update file and updating firmware by using the firmware update file
US8600064B2 (en) Apparatus, method, and computer program product for processing information
EP1423771B1 (en) Method to protect software against unauthorized use
CN102073826B (en) Utilize the system and method for the digital copyright management of lightweight digital watermark adding component
US20060168580A1 (en) Software-management system, recording medium, and information-processing device
CN101523399A (en) Methods and systems for modifying an integrity measurement based on user athentication
CN101765845A (en) System and method for digital content distribution
JP2006295872A (en) Formation method of device-dependent key, confidential information lsi equipped with secret information function using the method, host equipment using the lsi, record medium with authentication function used for the host equipment, and mobile terminal with recording medium equipped with authentication function
WO2012106878A1 (en) Information security processing method and device
CN106503494A (en) A kind of firmware protection location and guard method with flash memory microcontroller on piece
CN103839011A (en) Protecting method and device of confidential files
CN103797488A (en) Method and apparatus for using non-volatile storage device
CN101419557A (en) Program downloading control method
JP5567033B2 (en) Software license protection method, system therefor, server, terminal, and computer-readable recording medium
CN102937907B (en) Utilize SD card to authorize software to install and upgrade the method using
CN104778954A (en) Optical disc partition encryption method and system
CN100596058C (en) System and method for managing credible calculating platform key authorization data
US9166783B2 (en) Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
CN102855419A (en) Copyright protection method for data files of intelligent terminals
CN100464341C (en) Generation and management method for digital content use trace based on reliable computing technology
CN100472391C (en) License information management apparatus and license information management method
CN100410831C (en) Random binding software installing method
JP2005122283A (en) Method and system for license authentication, authenticating device, and program
WO2010134517A1 (en) System for browsing or viewing/listening to the contents of removable memory media
JP2010271771A5 (en)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180524

Address after: 226156 999 Harbour Road, Binhai New Area, Haimen, Nantong, Jiangsu

Patentee after: HAIMEN HUANGHAI PIONEER PARK SERVICES Co.,Ltd.

Address before: 710075 2 building, 2 Guangde Road, Xi'an hi tech Development Zone, Shaanxi

Patentee before: INVENTEC BESTA (XI'AN) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180607

Address after: 211300 1 Riverside Road, Qiqiao Town, Gaochun District, Nanjing, Jiangsu

Patentee after: Jiangsu Xingditong Communication Technology Co.,Ltd.

Address before: 226156 999 Harbour Road, Binhai New Area, Haimen, Nantong, Jiangsu

Patentee before: HAIMEN HUANGHAI PIONEER PARK SERVICES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160511

Termination date: 20211105