CN103366103A - Application encipherment protection method of card reader - Google Patents

Application encipherment protection method of card reader Download PDF

Info

Publication number
CN103366103A
CN103366103A CN2013102341716A CN201310234171A CN103366103A CN 103366103 A CN103366103 A CN 103366103A CN 2013102341716 A CN2013102341716 A CN 2013102341716A CN 201310234171 A CN201310234171 A CN 201310234171A CN 103366103 A CN103366103 A CN 103366103A
Authority
CN
China
Prior art keywords
identifying code
bytes
application program
card reader
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102341716A
Other languages
Chinese (zh)
Other versions
CN103366103B (en
Inventor
谢振东
刘强
何建兵
方晓洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG LINGNAN PASS CO Ltd
Original Assignee
GUANGDONG LINGNAN PASS CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG LINGNAN PASS CO Ltd filed Critical GUANGDONG LINGNAN PASS CO Ltd
Priority to CN201310234171.6A priority Critical patent/CN103366103B/en
Publication of CN103366103A publication Critical patent/CN103366103A/en
Application granted granted Critical
Publication of CN103366103B publication Critical patent/CN103366103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an application encipherment protection method of a card reader. The method adopts a three verification techniques: (1) the verification of an App (Application) to Bootloader is used for verifying the validity of the bootloader; the App is executed if the verification passes, or else, the App performs self-destruction; and the situation that the App is acquired illegally and used for other illegal test or production is avoided; (2) the verification of the App to unique CID (Chip Identification) of a singlechip is used for binding the App with a corresponding chip; and even if chip contents are illegally copied to another chip, the App cannot run normally; and (3) the verification of the Bootloader to the App is used for verifying the validity of the App; and an illegal App is prevented from being downloaded and upgraded.

Description

The application program encryption protecting method of card reader
 
Technical field
The present invention relates to software cryptography and resist technology, be specifically related to the application program encryption protecting method of card reader.
 
Background technology
Along with the development of electronic technology, IC-card is used widely at aspects such as mass transit card, bank card, electronic tag, employee's cards.
Current card reader consists of single-chip microcomputer, antenna, RFID module, outside FLASH storer and encryption chip, for convenience of explanation, the inside FLASH storer of single-chip microcomputer and outside FLASH storer is referred to as to the FLASH storer.Card reader, when dispatching from the factory, is burned onto application program (App, Application) in the FLASH storer by manufacturer.
Card reader is for reading the equipment of IC-card data, utilize the built-in application program of card reader to be examined and made cuts or to supplement with money the stored value card in IC-card, therefore, must application programs be encrypted, prevent that lawless person's application programs from carrying out bootlegging and modification.Yet current encryption method is to complete by encryption chip is set, and has so just increased the cost of equipment, nor is beneficial to the exploitation of embedded device.
 
Summary of the invention
The object of the invention is to propose a kind of application program encryption protecting method of card reader, it adopts the mode of soft encryption, solves the high problem of equipment cost.
In order to achieve the above object, the technical solution adopted in the present invention is as follows:
The application program encryption protecting method of card reader, it comprises the following steps:
(1) initialization card reader step, it comprises following sub-step:
1a, host computer write application program to the FLASH storer of initialized card reader;
1b, application program are according to the chip unique identifying number of single-chip microcomputer and utilize algorithm to generate random number, application program is according to chip unique identifying number and the described random number of single-chip microcomputer and utilize algorithm to generate identifying code Cc, and identifying code Cc and random number are stored in the FLASH storer;
1c, application program are according to described random number and utilize algorithm to generate identifying code Ca, and the Bootloader in the FLASH storer is according to described random number and utilize algorithm to generate identifying code Cb,, identifying code Ca and identifying code Cb are stored in the FLASH storer;
(2) the application program verification step of the card reader after initialization, it comprises following sub-step:
Card reader electrifying startup after 2a, initialization;
2b, application program load identifying code Cc, read the chip unique identifying number of random number in the FLASH storer and single-chip microcomputer and utilize algorithm to generate identifying code Cc ', judge whether identifying code Cc ' equals identifying code Cc, if not, perform step 2c, if perform step 2d;
2c, wipe application program, and restart and return to initialization card reader step;
2d, Bootloader load identifying code Ca, read the random number in the FLASH storer and utilize algorithm to generate identifying code Ca ', judge whether identifying code Ca ' equals identifying code Ca, if not, perform step 2c, if perform step 2e;
2e, application program load identifying code Cb, read the random number in the FLASH storer and utilize algorithm to generate identifying code Cb ', judge whether identifying code Cb ' equals identifying code Cb, if not, perform step 2c, if perform step 2f;
2f, run application.
Preferably, between step 2e and step 2f, also have the following steps:
Application program loads identifying code Ca, reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Ca ', judges whether identifying code Ca ' equals identifying code Ca, if not, use identifying code Ca ' to replace identifying code Ca, then just perform step 2f, if directly perform step 2f.
Preferably, this application program encryption protecting method also comprises:
(3) the application program updating step of the card reader after initialization, it comprises following sub-step:
Card reader after 3a, initialization receives the upgrade of host computer;
3b, host computer are upgraded to the application program in the FLASH storer of the card reader after initialization;
Application program after 3c, renewal generates new random number and identifying code Cc, and the random number in the FLASH storer and identifying code Cc are upgraded;
Application program after 3d, renewal is upgraded the identifying code Ca in the FLASH storer, and Bootloader is upgraded the identifying code Cb in the FLASH storer.Further preferred, between step 3a and step 3b, also have the following steps: host computer sends verify data to the card reader after initialization, and card reader is authenticated verify data, and authentication, by the rear step 3b that just carries out, authenticates not by exiting.
Preferably, the generative process of identifying code Ca and identifying code Ca ' is as follows:
Obtaining offset address from random number is the data R1 of 32 bytes of 0 beginning;
Carry out by front 16 bytes and rear 16 bytes of data R1 the ciphertext R2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext R2 is carried out to the ciphertext R3 that block encryption algorithm obtains 16 bytes, described ciphertext R3 is identifying code Ca or identifying code Ca '.
Preferably, the generative process of identifying code Cb and identifying code Cb ' is as follows:
Obtaining offset address from random number is the data K1 of 32 bytes of 32 beginnings;
Carry out by front 16 bytes and rear 16 bytes of data K1 the ciphertext K2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext K2 is carried out to the ciphertext K3 that block encryption algorithm obtains 16 bytes, described ciphertext K3 is identifying code Cb or identifying code Cb '.
Preferably, the generative process of identifying code Cc and identifying code Cc ' is as follows:
Obtaining offset address from random number is the data L1 of 32 bytes of 64 beginnings;
Read the chip unique identifying number CID of single-chip microcomputer, and carry out position, end filling algorithm by front 4 bytes of data L1, obtain data L2;
Carry out by front 16 bytes and rear 16 bytes of data L1 the ciphertext L3 that block encryption algorithm obtains 16 bytes;
With ciphertext L3, data L2 is carried out to the ciphertext L4 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext L4 is carried out to the ciphertext L5 that block encryption algorithm obtains 16 bytes, described ciphertext L5 is identifying code Cc or identifying code Cc ';
Wherein, key K ey solidifies in the FLASH storer.
Preferably, the generative process of random number is as follows:
Read the chip unique identifying number;
That utilizes single-chip microcomputer chooses the data A1 of 12 bytes in the chip unique identifying number from tape function;
Utilize single-chip microcomputer from tape function, in data A1, carry out choose for 6 times, obtain the data A2 of 272 bytes;
The data of 256 bytes of data intercept A2 front obtain random number.
Wherein, single-chip microcomputer is srand function or rand function from tape function.The unique read-only sequence number that the chip unique identifying number of single-chip microcomputer is 96bit.
The present invention has following beneficial effect:
1, the checking of App to Bootloader, for verifying the legitimacy of bootloader, be verified and carry out App, otherwise self-destruction App can prevent from illegally obtaining the App test illegal for other or production;
2, the checking of App to the chip unique identifying number CID of single-chip microcomputer, for binding App and corresponding chip, even the illegal copies chip content to another chip, App also can't normally move;
3, the checking of Bootloader to App, for verifying the legitimacy of App, prevent from downloading and the illegal App that upgrades.
 
The accompanying drawing explanation
The logical partition schematic diagram of the FLASH storer that Fig. 1 is preferred embodiment of the present invention;
The process flow diagram that Fig. 2 is preferred embodiment of the present invention;
The particular flow sheet of the step S1 that Fig. 3 is Fig. 2;
The particular flow sheet that in the step S102 that Fig. 4 is Fig. 3, random number generates;
The particular flow sheet of the step S2 that Fig. 5 is Fig. 3;
The sub-process figure of the step S203 that Fig. 6 is Fig. 5;
The sub-process figure of the step S209 that Fig. 7 is Fig. 5;
The sub-process figure of the step S212 that Fig. 8 is Fig. 5;
The particular flow sheet of the step S3 that Fig. 9 is Fig. 3.
 
Embodiment
Below, by reference to the accompanying drawings and embodiment, the present invention is described further.
As shown in Figure 1, the logical partition of the FLASH storer of card reader is same as the prior art, and boot section, systematic parameter district and application area are arranged.Bootloader is stored in boot section, and M, random number, Ca, Cb, Cc are stored in the systematic parameter district, and App is stored in application area.
In order to narrate aspect, first the noun the present invention relates to is made an explanation.
Bootloader: Bootloader;
App:Application, application program;
CID:ChipIndentify, the chip unique identifying number, be the unique read-only sequence number of 96bit;
M: start-up code is variable, for identifying program operating mode, three kinds of operational modes is arranged, and is respectively the App operational mode, upgrading downloading mode and the downloading mode that dispatches from the factory;
The Ca:App identifying code, the particular data that App generates according to algorithm, for verifying the legitimacy of App;
The Cb:Bootloader identifying code, the particular data that Bootloader generates according to algorithm, for verifying the legitimacy of Bootloader;
The Cc:CID identifying code, the particular data generated according to the chip unique identifying number, for verifying the uniqueness of App and chip;
Random number, utilize the data that generate from tape function of single-chip microcomputer, and after regenerating, each identifying code need upgrade simultaneously at every turn;
TEA:Tiny Encryption Algorithm, block encryption algorithm, the present invention in use, has increased filling algorithm and the algorithm that interweaves, and has strengthened the security of algorithm;
Key: the data encrypting and deciphering key, while dispatching from the factory, be solidificated in the FLASH storer, whenever all can not be read out.
The inside FLASH address assignment of single-chip microcomputer:
Chip content FLASH space is 256K altogether, and the physical address start address is 0x08000000;
1) offset address 0x00000000-0x00002FFF is boot section, altogether 12K;
2) offset address 0x00003000-0x00003FFF is the systematic parameter district, altogether 4K;
3) offset address 0x00004000-0x0003FFFF is application area, altogether 240K.
It should be noted that, when inner FLASH storage application district insufficient space, substituted by outside FLASH storer.
As shown in Fig. 2 to Fig. 9, a kind of application program encryption protecting method of card reader, it comprises the following steps:
Step S1: initialization card reader step, this step, when card reader is dispatched from the factory, is completed by manufacturer, after the first electrifying startup of card reader, according to start-up code M, enters the downloading mode that dispatches from the factory, and it comprises following concrete steps:
Step S101: host computer writes App to the FLASH storer of initialized card reader;
Step S102:App is according to the chip unique identifying number CID of single-chip microcomputer and utilize algorithm to generate random number, App is according to chip unique identifying number CID and the described random number of single-chip microcomputer and utilize algorithm to generate identifying code Cc, and identifying code Cc and random number are stored in the FLASH storer;
Wherein, the generative process of random number is as follows:
Step S1021: read the chip unique identifying number;
Step S1022: that utilizes single-chip microcomputer chooses the data A1 of 12 bytes in the chip unique identifying number from tape function, single-chip microcomputer from tape function, be srand function or rand function;
Step S1023: utilize single-chip microcomputer from tape function, in data A1, carry out choose for 6 times, obtain the data A2 of 272 bytes;
Step S1024: the data of 256 bytes of data intercept A2 front obtain random number;
Step S103:App is according to described random number and utilize algorithm to generate identifying code Ca, Bootloader is according to described random number and utilize algorithm to generate identifying code Cb, identifying code Ca and identifying code Cb are stored in the FLASH storer, and start-up code M is set to the App operational mode.
After step S1 completes, just can carry out step S2 or step S3.
Step S2: the application program verification step of the card reader after initialization, App must could move by checking, and it comprises following concrete steps:
Step S201: the card reader electrifying startup after initialization enters the App operational mode according to start-up code M;
Step S202:App loads identifying code Cc;
Step S203:App reads the chip unique identifying number CID of random number in the FLASH storer and single-chip microcomputer and utilizes algorithm to generate identifying code Cc ';
Wherein, the generative process of identifying code Cc ' is as follows:
Step S2031: obtaining offset address from random number is the data L1 of 32 bytes of 64 beginnings;
Step S2032: read the chip unique identifying number CID of single-chip microcomputer, and carry out position, end filling algorithm by front 4 bytes of data L1, obtain data L2;
Step S2033: by front 16 bytes and rear 16 bytes of data L1, carry out the ciphertext L3 that block encryption algorithm obtains 16 bytes;
Step S2034: data L2 is carried out to the ciphertext L4 that block encryption algorithm obtains 16 bytes with ciphertext L3;
Step S2035: with key K ey, ciphertext L4 is carried out to the ciphertext L5 that block encryption algorithm obtains 16 bytes, described ciphertext L5 is identifying code Cc or identifying code Cc ';
Step S204: judge whether identifying code Cc ' equals identifying code Cc, if not, perform step S206, if perform step S208;
Step S206: wipe App;
Step S207: restart and return to step S1;
Step S208:Bootloader loads identifying code Ca;
Step S209:Bootloader reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Ca ';
Wherein, the generative process of identifying code Ca ' is:
Step S2091: obtaining offset address from random number is the data R1 of 32 bytes of 0 beginning;
Step S2092: by front 16 bytes and rear 16 bytes of data R1, carry out the ciphertext R2 that block encryption algorithm obtains 16 bytes;
Step S2093: with key K ey, ciphertext R2 is carried out to the ciphertext R3 that block encryption algorithm obtains 16 bytes, described ciphertext R3 is: identifying code Ca ';
Step S210: judge whether identifying code Ca ' equals identifying code Ca, if not, perform step S206, if perform step S211;
Step S211:App loads identifying code Cb;
Step S212:App reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Cb ';
Wherein, the generative process of identifying code Cb ' is:
Step S2121: obtaining offset address from random number is the data K1 of 32 bytes of 32 beginnings;
Step S2122: by front 16 bytes and rear 16 bytes of data K1, carry out the ciphertext K2 that block encryption algorithm obtains 16 bytes;
Step S2123: with key K ey, ciphertext K2 is carried out to the ciphertext K3 that block encryption algorithm obtains 16 bytes, described ciphertext K3 is identifying code Cb ';
Step S213: judge whether identifying code Cb ' equals identifying code Cb, if not, perform step S206, if perform step S214;
Step S214:App loads identifying code Ca;
Step S215: read the random number in the FLASH storer and utilize algorithm to generate identifying code Ca ', judge whether identifying code Ca ' equals identifying code Ca, if not, perform step S216, if perform step S217;
Step S216: use identifying code Ca ' to replace identifying code Ca, then perform step S217;
Step S217: operation App.
When needs upgrading App, enter step S3.
Step S3: the application program updating step of the card reader after initialization, it comprises following concrete steps:
Step S301: the card reader after initialization receives the upgrade of host computer, and host computer and card reader communicate, and start-up code M is set to the downloading mode of upgrading;
Step S302: host computer sends verify data to the card reader after initialization, described verify data has identification number, and card reader is authenticated verify data, identification number is identified, authentication is by rear just execution step S303, and authentication is not by performing step S306;
Step S303: host computer is upgraded to the App in the FLASH storer of the card reader after initialization;
Step S304: the application program after renewal generates new random number and identifying code Cc, and the random number in the FLASH storer and identifying code Cc are upgraded;
Step S305: the application program after renewal is upgraded the identifying code Ca in the FLASH storer, and Bootloader is upgraded the identifying code Cb in the FLASH storer;
Step S306: upgrading finishes, and start-up code M is set to the App operational mode, returns to step S2.
It should be noted that, the generative process of the identifying code Ca of the present embodiment is the same with the generative process of identifying code Ca ', and the generative process of identifying code Cb is the same with the generative process of identifying code Cb ', and the generative process of identifying code Cc is the same with the generative process of identifying code Cc '.
From above-mentioned flow process, the present invention has the triple-authentication flow process, has guaranteed the encryption of App:
1, the checking of App to Bootloader, for verifying the legitimacy of bootloader, be verified and carry out App, otherwise self-destruction App can prevent from illegally obtaining the App test illegal for other or production;
2, the checking of App to the chip unique identifying number CID of single-chip microcomputer, for binding App and corresponding chip, even the illegal copies chip content to another chip, App also can't normally move;
3, the checking of Bootloader to App, for verifying the legitimacy of App, prevent from downloading and the illegal App that upgrades.
For a person skilled in the art, can make other various corresponding changes and distortion according to technical scheme described above and design, and these all changes and the distortion all should belong to the protection domain of the claims in the present invention within.

Claims (10)

1. the application program encryption protecting method of card reader, is characterized in that, comprises the following steps:
Initialization card reader step, it comprises following sub-step:
1a, host computer write application program to the FLASH storer of initialized card reader;
1b, application program are according to the chip unique identifying number of single-chip microcomputer and utilize algorithm to generate random number, application program is according to chip unique identifying number and the described random number of single-chip microcomputer and utilize algorithm to generate identifying code Cc, and identifying code Cc and random number are stored in the FLASH storer;
1c, application program are according to described random number and utilize algorithm to generate identifying code Ca, and the Bootloader in the FLASH storer is according to described random number and utilize algorithm to generate identifying code Cb,, identifying code Ca and identifying code Cb are stored in the FLASH storer;
The application program verification step of the card reader after initialization, it comprises following sub-step:
Card reader electrifying startup after 2a, initialization;
2b, application program load identifying code Cc, read the chip unique identifying number of random number in the FLASH storer and single-chip microcomputer and utilize algorithm to generate identifying code Cc ', judge whether identifying code Cc ' equals identifying code Cc, if not, perform step 2c, if perform step 2d;
2c, wipe application program, and restart and return to initialization card reader step;
2d, Bootloader load identifying code Ca, read the random number in the FLASH storer and utilize algorithm to generate identifying code Ca ', judge whether identifying code Ca ' equals identifying code Ca, if not, perform step 2c, if perform step 2e;
2e, application program load identifying code Cb, read the random number in the FLASH storer and utilize algorithm to generate identifying code Cb ', judge whether identifying code Cb ' equals identifying code Cb, if not, perform step 2c, if perform step 2f;
2f, run application.
2. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, between step 2e and step 2f, also has the following steps:
Application program loads identifying code Ca, reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Ca ', judges whether identifying code Ca ' equals identifying code Ca, if not, use identifying code Ca ' to replace identifying code Ca, then just perform step 2f, if directly perform step 2f.
3. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, also comprises:
The application program updating step of the card reader after initialization, it comprises following sub-step:
Card reader after 3a, initialization receives the upgrade of host computer;
3b, host computer are upgraded to the application program in the FLASH storer of the card reader after initialization;
Application program after 3c, renewal generates new random number and identifying code Cc, and the random number in the FLASH storer and identifying code Cc are upgraded;
Application program after 3d, renewal is upgraded the identifying code Ca in the FLASH storer, and Bootloader is upgraded the identifying code Cb in the FLASH storer.
4. the application program encryption protecting method of card reader as claimed in claim 3; it is characterized in that; between step 3a and step 3b, also have the following steps: host computer sends verify data to the card reader after initialization; card reader is authenticated verify data; authentication is by the rear step 3b that just carries out, and authentication is not by exiting.
5. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of identifying code Ca and identifying code Ca ' is as follows:
Obtaining offset address from random number is the data R1 of 32 bytes of 0 beginning;
Carry out by front 16 bytes and rear 16 bytes of data R1 the ciphertext R2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext R2 is carried out to the ciphertext R3 that block encryption algorithm obtains 16 bytes, described ciphertext R3 is identifying code Ca or identifying code Ca ';
Wherein, key K ey solidifies in the FLASH storer.
6. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of identifying code Cb and identifying code Cb ' is as follows:
Obtaining offset address from random number is the data K1 of 32 bytes of 32 beginnings;
Carry out by front 16 bytes and rear 16 bytes of data K1 the ciphertext K2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext K2 is carried out to the ciphertext K3 that block encryption algorithm obtains 16 bytes, described ciphertext K3 is identifying code Cb or identifying code Cb ';
Wherein, key K ey solidifies in the FLASH storer.
7. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of identifying code Cc and identifying code Cc ' is as follows:
Obtaining offset address from random number is the data L1 of 32 bytes of 64 beginnings;
Read the chip unique identifying number CID of single-chip microcomputer, and carry out position, end filling algorithm by front 4 bytes of data L1, obtain data L2;
Carry out by front 16 bytes and rear 16 bytes of data L1 the ciphertext L3 that block encryption algorithm obtains 16 bytes;
With ciphertext L3, data L2 is carried out to the ciphertext L4 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext L4 is carried out to the ciphertext L5 that block encryption algorithm obtains 16 bytes, described ciphertext L5 is identifying code Cc or identifying code Cc ';
Wherein, key K ey solidifies in the FLASH storer.
8. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of random number is as follows:
Read the chip unique identifying number;
That utilizes single-chip microcomputer chooses the data A1 of 12 bytes in the chip unique identifying number from tape function;
Utilize single-chip microcomputer from tape function, in data A1, carry out choose for 6 times, obtain the data A2 of 272 bytes;
The data of 256 bytes of data intercept A2 front obtain random number.
9. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, single-chip microcomputer from tape function, be srand function or rand function.
10. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the unique read-only sequence number that the chip unique identifying number of single-chip microcomputer is 96bit.
CN201310234171.6A 2013-06-13 2013-06-13 The application program encryption protecting method of card reader Active CN103366103B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310234171.6A CN103366103B (en) 2013-06-13 2013-06-13 The application program encryption protecting method of card reader

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310234171.6A CN103366103B (en) 2013-06-13 2013-06-13 The application program encryption protecting method of card reader

Publications (2)

Publication Number Publication Date
CN103366103A true CN103366103A (en) 2013-10-23
CN103366103B CN103366103B (en) 2016-02-10

Family

ID=49367428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310234171.6A Active CN103366103B (en) 2013-06-13 2013-06-13 The application program encryption protecting method of card reader

Country Status (1)

Country Link
CN (1) CN103366103B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069350A (en) * 2015-08-24 2015-11-18 上海繁易电子科技有限公司 Encryption method and apparatus for embedded operating system
CN106055932A (en) * 2016-05-26 2016-10-26 东莞博力威电池有限公司 MCU program anti-plagiarizing method and system with Boost loader function
CN106529223A (en) * 2016-12-15 2017-03-22 重庆兆洲科技发展有限公司 Microcontroller unit and control method thereof
CN106779682A (en) * 2016-11-30 2017-05-31 深圳航信德诚科技有限公司 The intelligent SD card and its method of mobile payment of a kind of mobile payment
CN107832588A (en) * 2017-11-17 2018-03-23 珠海市多泰吉智能技术有限公司 A kind of anti-method and apparatus and computer-readable storage medium divulged a secret of Flash
CN107958141A (en) * 2017-11-15 2018-04-24 广西师范大学 A kind of method for protecting software based on chip ID number
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN110249299A (en) * 2017-12-13 2019-09-17 深圳市汇顶科技股份有限公司 Generate method, chip and the electronic equipment of random number
CN111159711A (en) * 2019-12-06 2020-05-15 珠海慧联科技有限公司 Method and system for preventing goods from being mixed
CN111159722A (en) * 2019-11-06 2020-05-15 武汉迈威通信股份有限公司 Encryption method of chip system based on single chip microcomputer and encryption chip system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1818923A (en) * 2006-03-17 2006-08-16 清华大学 Enciphering authentication for radio-frequency recognition system
CN1932835A (en) * 2006-09-30 2007-03-21 华中科技大学 Safety identification method in radio frequency distinguishing system
CN101183416A (en) * 2007-12-10 2008-05-21 东信和平智能卡股份有限公司 Software protection method and system thereof
US20080148393A1 (en) * 2006-12-15 2008-06-19 Barry Myron Wendt Neural authenticator and method
CN201126577Y (en) * 2007-11-06 2008-10-01 吴荣洲 Card reader with identifiable function
CN102013001A (en) * 2010-12-06 2011-04-13 苏州国芯科技有限公司 Card reader with authentication function and authentication method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1818923A (en) * 2006-03-17 2006-08-16 清华大学 Enciphering authentication for radio-frequency recognition system
CN1932835A (en) * 2006-09-30 2007-03-21 华中科技大学 Safety identification method in radio frequency distinguishing system
US20080148393A1 (en) * 2006-12-15 2008-06-19 Barry Myron Wendt Neural authenticator and method
CN201126577Y (en) * 2007-11-06 2008-10-01 吴荣洲 Card reader with identifiable function
CN101183416A (en) * 2007-12-10 2008-05-21 东信和平智能卡股份有限公司 Software protection method and system thereof
CN102013001A (en) * 2010-12-06 2011-04-13 苏州国芯科技有限公司 Card reader with authentication function and authentication method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
於辉等: "基于TMS320VC5410的DES加密系统设计", 《电子设计工程》, 30 September 2010 (2010-09-30) *
潘学海: "基于MSP430射频IC卡读写系统研究", 《煤炭技术》, 31 January 2012 (2012-01-31) *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069350A (en) * 2015-08-24 2015-11-18 上海繁易电子科技有限公司 Encryption method and apparatus for embedded operating system
CN106055932A (en) * 2016-05-26 2016-10-26 东莞博力威电池有限公司 MCU program anti-plagiarizing method and system with Boost loader function
CN106779682A (en) * 2016-11-30 2017-05-31 深圳航信德诚科技有限公司 The intelligent SD card and its method of mobile payment of a kind of mobile payment
CN106529223A (en) * 2016-12-15 2017-03-22 重庆兆洲科技发展有限公司 Microcontroller unit and control method thereof
CN107958141A (en) * 2017-11-15 2018-04-24 广西师范大学 A kind of method for protecting software based on chip ID number
CN107832588A (en) * 2017-11-17 2018-03-23 珠海市多泰吉智能技术有限公司 A kind of anti-method and apparatus and computer-readable storage medium divulged a secret of Flash
CN110249299A (en) * 2017-12-13 2019-09-17 深圳市汇顶科技股份有限公司 Generate method, chip and the electronic equipment of random number
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN109462477B (en) * 2018-12-28 2021-05-25 芯海科技(深圳)股份有限公司 White box encryption method based on Internet of things embedded equipment
CN111159722A (en) * 2019-11-06 2020-05-15 武汉迈威通信股份有限公司 Encryption method of chip system based on single chip microcomputer and encryption chip system
CN111159722B (en) * 2019-11-06 2023-05-16 武汉迈威通信股份有限公司 Encryption method of chip system based on single chip microcomputer and encryption chip system
CN111159711A (en) * 2019-12-06 2020-05-15 珠海慧联科技有限公司 Method and system for preventing goods from being mixed

Also Published As

Publication number Publication date
CN103366103B (en) 2016-02-10

Similar Documents

Publication Publication Date Title
CN103366103B (en) The application program encryption protecting method of card reader
US11861372B2 (en) Integrity manifest certificate
EP2630606B1 (en) Application usage policy enforcement
WO2009107349A1 (en) Information processing device
CN107832589B (en) Software copyright protection method and system
JP2007226839A (en) Memory unit and system for storing data structure
EP2350982A1 (en) Physical access control system with smartcard and methods of operating
US20090287917A1 (en) Secure software distribution
CN111984962A (en) Firmware security verification method and device
CN109086578A (en) A kind of method that soft ware authorization uses, equipment and storage medium
EP2876593B1 (en) Method of generating a structure and corresponding structure
CN111160879A (en) Hardware wallet and security improving method and device thereof
CN111953634B (en) Access control method and device for terminal equipment, computer equipment and storage medium
CN102238135A (en) Security authentication server
CN112613011B (en) USB flash disk system authentication method and device, electronic equipment and storage medium
CN102012978B (en) Method and system for safely upgrading ISO (International Standard Code) file
JP3491273B2 (en) Chip card and how to import information on it
CN112445705A (en) Software running system, method, device, computer equipment and storage medium
CN102148054A (en) Flash memory storage system, controller of flash memory storage system and data falsification preventing method
CN110688663A (en) Execution command protection method and device, android device and storage medium
US20200012823A1 (en) Secure storage system
TW201508541A (en) Protection system and method with smartcard device
CN101620545A (en) Method for safely upgrading application program on chip layer
CN201742426U (en) Sim card safety certificate server
CN109344089B (en) Method and device for operating norflash

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant