CN103366103A - Application encipherment protection method of card reader - Google Patents
Application encipherment protection method of card reader Download PDFInfo
- Publication number
- CN103366103A CN103366103A CN2013102341716A CN201310234171A CN103366103A CN 103366103 A CN103366103 A CN 103366103A CN 2013102341716 A CN2013102341716 A CN 2013102341716A CN 201310234171 A CN201310234171 A CN 201310234171A CN 103366103 A CN103366103 A CN 103366103A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- bytes
- application program
- card reader
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention relates to an application encipherment protection method of a card reader. The method adopts a three verification techniques: (1) the verification of an App (Application) to Bootloader is used for verifying the validity of the bootloader; the App is executed if the verification passes, or else, the App performs self-destruction; and the situation that the App is acquired illegally and used for other illegal test or production is avoided; (2) the verification of the App to unique CID (Chip Identification) of a singlechip is used for binding the App with a corresponding chip; and even if chip contents are illegally copied to another chip, the App cannot run normally; and (3) the verification of the Bootloader to the App is used for verifying the validity of the App; and an illegal App is prevented from being downloaded and upgraded.
Description
Technical field
The present invention relates to software cryptography and resist technology, be specifically related to the application program encryption protecting method of card reader.
Background technology
Along with the development of electronic technology, IC-card is used widely at aspects such as mass transit card, bank card, electronic tag, employee's cards.
Current card reader consists of single-chip microcomputer, antenna, RFID module, outside FLASH storer and encryption chip, for convenience of explanation, the inside FLASH storer of single-chip microcomputer and outside FLASH storer is referred to as to the FLASH storer.Card reader, when dispatching from the factory, is burned onto application program (App, Application) in the FLASH storer by manufacturer.
Card reader is for reading the equipment of IC-card data, utilize the built-in application program of card reader to be examined and made cuts or to supplement with money the stored value card in IC-card, therefore, must application programs be encrypted, prevent that lawless person's application programs from carrying out bootlegging and modification.Yet current encryption method is to complete by encryption chip is set, and has so just increased the cost of equipment, nor is beneficial to the exploitation of embedded device.
Summary of the invention
The object of the invention is to propose a kind of application program encryption protecting method of card reader, it adopts the mode of soft encryption, solves the high problem of equipment cost.
In order to achieve the above object, the technical solution adopted in the present invention is as follows:
The application program encryption protecting method of card reader, it comprises the following steps:
(1) initialization card reader step, it comprises following sub-step:
1a, host computer write application program to the FLASH storer of initialized card reader;
1b, application program are according to the chip unique identifying number of single-chip microcomputer and utilize algorithm to generate random number, application program is according to chip unique identifying number and the described random number of single-chip microcomputer and utilize algorithm to generate identifying code Cc, and identifying code Cc and random number are stored in the FLASH storer;
1c, application program are according to described random number and utilize algorithm to generate identifying code Ca, and the Bootloader in the FLASH storer is according to described random number and utilize algorithm to generate identifying code Cb,, identifying code Ca and identifying code Cb are stored in the FLASH storer;
(2) the application program verification step of the card reader after initialization, it comprises following sub-step:
Card reader electrifying startup after 2a, initialization;
2b, application program load identifying code Cc, read the chip unique identifying number of random number in the FLASH storer and single-chip microcomputer and utilize algorithm to generate identifying code Cc ', judge whether identifying code Cc ' equals identifying code Cc, if not, perform step 2c, if perform step 2d;
2c, wipe application program, and restart and return to initialization card reader step;
2d, Bootloader load identifying code Ca, read the random number in the FLASH storer and utilize algorithm to generate identifying code Ca ', judge whether identifying code Ca ' equals identifying code Ca, if not, perform step 2c, if perform step 2e;
2e, application program load identifying code Cb, read the random number in the FLASH storer and utilize algorithm to generate identifying code Cb ', judge whether identifying code Cb ' equals identifying code Cb, if not, perform step 2c, if perform step 2f;
2f, run application.
Preferably, between step 2e and step 2f, also have the following steps:
Application program loads identifying code Ca, reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Ca ', judges whether identifying code Ca ' equals identifying code Ca, if not, use identifying code Ca ' to replace identifying code Ca, then just perform step 2f, if directly perform step 2f.
Preferably, this application program encryption protecting method also comprises:
(3) the application program updating step of the card reader after initialization, it comprises following sub-step:
Card reader after 3a, initialization receives the upgrade of host computer;
3b, host computer are upgraded to the application program in the FLASH storer of the card reader after initialization;
Application program after 3c, renewal generates new random number and identifying code Cc, and the random number in the FLASH storer and identifying code Cc are upgraded;
Application program after 3d, renewal is upgraded the identifying code Ca in the FLASH storer, and Bootloader is upgraded the identifying code Cb in the FLASH storer.Further preferred, between step 3a and step 3b, also have the following steps: host computer sends verify data to the card reader after initialization, and card reader is authenticated verify data, and authentication, by the rear step 3b that just carries out, authenticates not by exiting.
Preferably, the generative process of identifying code Ca and identifying code Ca ' is as follows:
Obtaining offset address from random number is the data R1 of 32 bytes of 0 beginning;
Carry out by front 16 bytes and rear 16 bytes of data R1 the ciphertext R2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext R2 is carried out to the ciphertext R3 that block encryption algorithm obtains 16 bytes, described ciphertext R3 is identifying code Ca or identifying code Ca '.
Preferably, the generative process of identifying code Cb and identifying code Cb ' is as follows:
Obtaining offset address from random number is the data K1 of 32 bytes of 32 beginnings;
Carry out by front 16 bytes and rear 16 bytes of data K1 the ciphertext K2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext K2 is carried out to the ciphertext K3 that block encryption algorithm obtains 16 bytes, described ciphertext K3 is identifying code Cb or identifying code Cb '.
Preferably, the generative process of identifying code Cc and identifying code Cc ' is as follows:
Obtaining offset address from random number is the data L1 of 32 bytes of 64 beginnings;
Read the chip unique identifying number CID of single-chip microcomputer, and carry out position, end filling algorithm by front 4 bytes of data L1, obtain data L2;
Carry out by front 16 bytes and rear 16 bytes of data L1 the ciphertext L3 that block encryption algorithm obtains 16 bytes;
With ciphertext L3, data L2 is carried out to the ciphertext L4 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext L4 is carried out to the ciphertext L5 that block encryption algorithm obtains 16 bytes, described ciphertext L5 is identifying code Cc or identifying code Cc ';
Wherein, key K ey solidifies in the FLASH storer.
Preferably, the generative process of random number is as follows:
Read the chip unique identifying number;
That utilizes single-chip microcomputer chooses the data A1 of 12 bytes in the chip unique identifying number from tape function;
Utilize single-chip microcomputer from tape function, in data A1, carry out choose for 6 times, obtain the data A2 of 272 bytes;
The data of 256 bytes of data intercept A2 front obtain random number.
Wherein, single-chip microcomputer is srand function or rand function from tape function.The unique read-only sequence number that the chip unique identifying number of single-chip microcomputer is 96bit.
The present invention has following beneficial effect:
1, the checking of App to Bootloader, for verifying the legitimacy of bootloader, be verified and carry out App, otherwise self-destruction App can prevent from illegally obtaining the App test illegal for other or production;
2, the checking of App to the chip unique identifying number CID of single-chip microcomputer, for binding App and corresponding chip, even the illegal copies chip content to another chip, App also can't normally move;
3, the checking of Bootloader to App, for verifying the legitimacy of App, prevent from downloading and the illegal App that upgrades.
The accompanying drawing explanation
The logical partition schematic diagram of the FLASH storer that Fig. 1 is preferred embodiment of the present invention;
The process flow diagram that Fig. 2 is preferred embodiment of the present invention;
The particular flow sheet of the step S1 that Fig. 3 is Fig. 2;
The particular flow sheet that in the step S102 that Fig. 4 is Fig. 3, random number generates;
The particular flow sheet of the step S2 that Fig. 5 is Fig. 3;
The sub-process figure of the step S203 that Fig. 6 is Fig. 5;
The sub-process figure of the step S209 that Fig. 7 is Fig. 5;
The sub-process figure of the step S212 that Fig. 8 is Fig. 5;
The particular flow sheet of the step S3 that Fig. 9 is Fig. 3.
Embodiment
Below, by reference to the accompanying drawings and embodiment, the present invention is described further.
As shown in Figure 1, the logical partition of the FLASH storer of card reader is same as the prior art, and boot section, systematic parameter district and application area are arranged.Bootloader is stored in boot section, and M, random number, Ca, Cb, Cc are stored in the systematic parameter district, and App is stored in application area.
In order to narrate aspect, first the noun the present invention relates to is made an explanation.
Bootloader: Bootloader;
App:Application, application program;
CID:ChipIndentify, the chip unique identifying number, be the unique read-only sequence number of 96bit;
M: start-up code is variable, for identifying program operating mode, three kinds of operational modes is arranged, and is respectively the App operational mode, upgrading downloading mode and the downloading mode that dispatches from the factory;
The Ca:App identifying code, the particular data that App generates according to algorithm, for verifying the legitimacy of App;
The Cb:Bootloader identifying code, the particular data that Bootloader generates according to algorithm, for verifying the legitimacy of Bootloader;
The Cc:CID identifying code, the particular data generated according to the chip unique identifying number, for verifying the uniqueness of App and chip;
Random number, utilize the data that generate from tape function of single-chip microcomputer, and after regenerating, each identifying code need upgrade simultaneously at every turn;
TEA:Tiny Encryption Algorithm, block encryption algorithm, the present invention in use, has increased filling algorithm and the algorithm that interweaves, and has strengthened the security of algorithm;
Key: the data encrypting and deciphering key, while dispatching from the factory, be solidificated in the FLASH storer, whenever all can not be read out.
The inside FLASH address assignment of single-chip microcomputer:
Chip content FLASH space is 256K altogether, and the physical address start address is 0x08000000;
1) offset address 0x00000000-0x00002FFF is boot section, altogether 12K;
2) offset address 0x00003000-0x00003FFF is the systematic parameter district, altogether 4K;
3) offset address 0x00004000-0x0003FFFF is application area, altogether 240K.
It should be noted that, when inner FLASH storage application district insufficient space, substituted by outside FLASH storer.
As shown in Fig. 2 to Fig. 9, a kind of application program encryption protecting method of card reader, it comprises the following steps:
Step S1: initialization card reader step, this step, when card reader is dispatched from the factory, is completed by manufacturer, after the first electrifying startup of card reader, according to start-up code M, enters the downloading mode that dispatches from the factory, and it comprises following concrete steps:
Step S101: host computer writes App to the FLASH storer of initialized card reader;
Step S102:App is according to the chip unique identifying number CID of single-chip microcomputer and utilize algorithm to generate random number, App is according to chip unique identifying number CID and the described random number of single-chip microcomputer and utilize algorithm to generate identifying code Cc, and identifying code Cc and random number are stored in the FLASH storer;
Wherein, the generative process of random number is as follows:
Step S1021: read the chip unique identifying number;
Step S1022: that utilizes single-chip microcomputer chooses the data A1 of 12 bytes in the chip unique identifying number from tape function, single-chip microcomputer from tape function, be srand function or rand function;
Step S1023: utilize single-chip microcomputer from tape function, in data A1, carry out choose for 6 times, obtain the data A2 of 272 bytes;
Step S1024: the data of 256 bytes of data intercept A2 front obtain random number;
Step S103:App is according to described random number and utilize algorithm to generate identifying code Ca, Bootloader is according to described random number and utilize algorithm to generate identifying code Cb, identifying code Ca and identifying code Cb are stored in the FLASH storer, and start-up code M is set to the App operational mode.
After step S1 completes, just can carry out step S2 or step S3.
Step S2: the application program verification step of the card reader after initialization, App must could move by checking, and it comprises following concrete steps:
Step S201: the card reader electrifying startup after initialization enters the App operational mode according to start-up code M;
Step S202:App loads identifying code Cc;
Step S203:App reads the chip unique identifying number CID of random number in the FLASH storer and single-chip microcomputer and utilizes algorithm to generate identifying code Cc ';
Wherein, the generative process of identifying code Cc ' is as follows:
Step S2031: obtaining offset address from random number is the data L1 of 32 bytes of 64 beginnings;
Step S2032: read the chip unique identifying number CID of single-chip microcomputer, and carry out position, end filling algorithm by front 4 bytes of data L1, obtain data L2;
Step S2033: by front 16 bytes and rear 16 bytes of data L1, carry out the ciphertext L3 that block encryption algorithm obtains 16 bytes;
Step S2034: data L2 is carried out to the ciphertext L4 that block encryption algorithm obtains 16 bytes with ciphertext L3;
Step S2035: with key K ey, ciphertext L4 is carried out to the ciphertext L5 that block encryption algorithm obtains 16 bytes, described ciphertext L5 is identifying code Cc or identifying code Cc ';
Step S204: judge whether identifying code Cc ' equals identifying code Cc, if not, perform step S206, if perform step S208;
Step S206: wipe App;
Step S207: restart and return to step S1;
Step S208:Bootloader loads identifying code Ca;
Step S209:Bootloader reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Ca ';
Wherein, the generative process of identifying code Ca ' is:
Step S2091: obtaining offset address from random number is the data R1 of 32 bytes of 0 beginning;
Step S2092: by front 16 bytes and rear 16 bytes of data R1, carry out the ciphertext R2 that block encryption algorithm obtains 16 bytes;
Step S2093: with key K ey, ciphertext R2 is carried out to the ciphertext R3 that block encryption algorithm obtains 16 bytes, described ciphertext R3 is: identifying code Ca ';
Step S210: judge whether identifying code Ca ' equals identifying code Ca, if not, perform step S206, if perform step S211;
Step S211:App loads identifying code Cb;
Step S212:App reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Cb ';
Wherein, the generative process of identifying code Cb ' is:
Step S2121: obtaining offset address from random number is the data K1 of 32 bytes of 32 beginnings;
Step S2122: by front 16 bytes and rear 16 bytes of data K1, carry out the ciphertext K2 that block encryption algorithm obtains 16 bytes;
Step S2123: with key K ey, ciphertext K2 is carried out to the ciphertext K3 that block encryption algorithm obtains 16 bytes, described ciphertext K3 is identifying code Cb ';
Step S213: judge whether identifying code Cb ' equals identifying code Cb, if not, perform step S206, if perform step S214;
Step S214:App loads identifying code Ca;
Step S215: read the random number in the FLASH storer and utilize algorithm to generate identifying code Ca ', judge whether identifying code Ca ' equals identifying code Ca, if not, perform step S216, if perform step S217;
Step S216: use identifying code Ca ' to replace identifying code Ca, then perform step S217;
Step S217: operation App.
When needs upgrading App, enter step S3.
Step S3: the application program updating step of the card reader after initialization, it comprises following concrete steps:
Step S301: the card reader after initialization receives the upgrade of host computer, and host computer and card reader communicate, and start-up code M is set to the downloading mode of upgrading;
Step S302: host computer sends verify data to the card reader after initialization, described verify data has identification number, and card reader is authenticated verify data, identification number is identified, authentication is by rear just execution step S303, and authentication is not by performing step S306;
Step S303: host computer is upgraded to the App in the FLASH storer of the card reader after initialization;
Step S304: the application program after renewal generates new random number and identifying code Cc, and the random number in the FLASH storer and identifying code Cc are upgraded;
Step S305: the application program after renewal is upgraded the identifying code Ca in the FLASH storer, and Bootloader is upgraded the identifying code Cb in the FLASH storer;
Step S306: upgrading finishes, and start-up code M is set to the App operational mode, returns to step S2.
It should be noted that, the generative process of the identifying code Ca of the present embodiment is the same with the generative process of identifying code Ca ', and the generative process of identifying code Cb is the same with the generative process of identifying code Cb ', and the generative process of identifying code Cc is the same with the generative process of identifying code Cc '.
From above-mentioned flow process, the present invention has the triple-authentication flow process, has guaranteed the encryption of App:
1, the checking of App to Bootloader, for verifying the legitimacy of bootloader, be verified and carry out App, otherwise self-destruction App can prevent from illegally obtaining the App test illegal for other or production;
2, the checking of App to the chip unique identifying number CID of single-chip microcomputer, for binding App and corresponding chip, even the illegal copies chip content to another chip, App also can't normally move;
3, the checking of Bootloader to App, for verifying the legitimacy of App, prevent from downloading and the illegal App that upgrades.
For a person skilled in the art, can make other various corresponding changes and distortion according to technical scheme described above and design, and these all changes and the distortion all should belong to the protection domain of the claims in the present invention within.
Claims (10)
1. the application program encryption protecting method of card reader, is characterized in that, comprises the following steps:
Initialization card reader step, it comprises following sub-step:
1a, host computer write application program to the FLASH storer of initialized card reader;
1b, application program are according to the chip unique identifying number of single-chip microcomputer and utilize algorithm to generate random number, application program is according to chip unique identifying number and the described random number of single-chip microcomputer and utilize algorithm to generate identifying code Cc, and identifying code Cc and random number are stored in the FLASH storer;
1c, application program are according to described random number and utilize algorithm to generate identifying code Ca, and the Bootloader in the FLASH storer is according to described random number and utilize algorithm to generate identifying code Cb,, identifying code Ca and identifying code Cb are stored in the FLASH storer;
The application program verification step of the card reader after initialization, it comprises following sub-step:
Card reader electrifying startup after 2a, initialization;
2b, application program load identifying code Cc, read the chip unique identifying number of random number in the FLASH storer and single-chip microcomputer and utilize algorithm to generate identifying code Cc ', judge whether identifying code Cc ' equals identifying code Cc, if not, perform step 2c, if perform step 2d;
2c, wipe application program, and restart and return to initialization card reader step;
2d, Bootloader load identifying code Ca, read the random number in the FLASH storer and utilize algorithm to generate identifying code Ca ', judge whether identifying code Ca ' equals identifying code Ca, if not, perform step 2c, if perform step 2e;
2e, application program load identifying code Cb, read the random number in the FLASH storer and utilize algorithm to generate identifying code Cb ', judge whether identifying code Cb ' equals identifying code Cb, if not, perform step 2c, if perform step 2f;
2f, run application.
2. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, between step 2e and step 2f, also has the following steps:
Application program loads identifying code Ca, reads the random number in the FLASH storer and utilizes algorithm to generate identifying code Ca ', judges whether identifying code Ca ' equals identifying code Ca, if not, use identifying code Ca ' to replace identifying code Ca, then just perform step 2f, if directly perform step 2f.
3. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, also comprises:
The application program updating step of the card reader after initialization, it comprises following sub-step:
Card reader after 3a, initialization receives the upgrade of host computer;
3b, host computer are upgraded to the application program in the FLASH storer of the card reader after initialization;
Application program after 3c, renewal generates new random number and identifying code Cc, and the random number in the FLASH storer and identifying code Cc are upgraded;
Application program after 3d, renewal is upgraded the identifying code Ca in the FLASH storer, and Bootloader is upgraded the identifying code Cb in the FLASH storer.
4. the application program encryption protecting method of card reader as claimed in claim 3; it is characterized in that; between step 3a and step 3b, also have the following steps: host computer sends verify data to the card reader after initialization; card reader is authenticated verify data; authentication is by the rear step 3b that just carries out, and authentication is not by exiting.
5. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of identifying code Ca and identifying code Ca ' is as follows:
Obtaining offset address from random number is the data R1 of 32 bytes of 0 beginning;
Carry out by front 16 bytes and rear 16 bytes of data R1 the ciphertext R2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext R2 is carried out to the ciphertext R3 that block encryption algorithm obtains 16 bytes, described ciphertext R3 is identifying code Ca or identifying code Ca ';
Wherein, key K ey solidifies in the FLASH storer.
6. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of identifying code Cb and identifying code Cb ' is as follows:
Obtaining offset address from random number is the data K1 of 32 bytes of 32 beginnings;
Carry out by front 16 bytes and rear 16 bytes of data K1 the ciphertext K2 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext K2 is carried out to the ciphertext K3 that block encryption algorithm obtains 16 bytes, described ciphertext K3 is identifying code Cb or identifying code Cb ';
Wherein, key K ey solidifies in the FLASH storer.
7. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of identifying code Cc and identifying code Cc ' is as follows:
Obtaining offset address from random number is the data L1 of 32 bytes of 64 beginnings;
Read the chip unique identifying number CID of single-chip microcomputer, and carry out position, end filling algorithm by front 4 bytes of data L1, obtain data L2;
Carry out by front 16 bytes and rear 16 bytes of data L1 the ciphertext L3 that block encryption algorithm obtains 16 bytes;
With ciphertext L3, data L2 is carried out to the ciphertext L4 that block encryption algorithm obtains 16 bytes;
With key K ey, ciphertext L4 is carried out to the ciphertext L5 that block encryption algorithm obtains 16 bytes, described ciphertext L5 is identifying code Cc or identifying code Cc ';
Wherein, key K ey solidifies in the FLASH storer.
8. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the generative process of random number is as follows:
Read the chip unique identifying number;
That utilizes single-chip microcomputer chooses the data A1 of 12 bytes in the chip unique identifying number from tape function;
Utilize single-chip microcomputer from tape function, in data A1, carry out choose for 6 times, obtain the data A2 of 272 bytes;
The data of 256 bytes of data intercept A2 front obtain random number.
9. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, single-chip microcomputer from tape function, be srand function or rand function.
10. the application program encryption protecting method of card reader as claimed in claim 1, is characterized in that, the unique read-only sequence number that the chip unique identifying number of single-chip microcomputer is 96bit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310234171.6A CN103366103B (en) | 2013-06-13 | 2013-06-13 | The application program encryption protecting method of card reader |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310234171.6A CN103366103B (en) | 2013-06-13 | 2013-06-13 | The application program encryption protecting method of card reader |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103366103A true CN103366103A (en) | 2013-10-23 |
CN103366103B CN103366103B (en) | 2016-02-10 |
Family
ID=49367428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310234171.6A Active CN103366103B (en) | 2013-06-13 | 2013-06-13 | The application program encryption protecting method of card reader |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103366103B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069350A (en) * | 2015-08-24 | 2015-11-18 | 上海繁易电子科技有限公司 | Encryption method and apparatus for embedded operating system |
CN106055932A (en) * | 2016-05-26 | 2016-10-26 | 东莞博力威电池有限公司 | MCU program anti-plagiarizing method and system with Boost loader function |
CN106529223A (en) * | 2016-12-15 | 2017-03-22 | 重庆兆洲科技发展有限公司 | Microcontroller unit and control method thereof |
CN106779682A (en) * | 2016-11-30 | 2017-05-31 | 深圳航信德诚科技有限公司 | The intelligent SD card and its method of mobile payment of a kind of mobile payment |
CN107832588A (en) * | 2017-11-17 | 2018-03-23 | 珠海市多泰吉智能技术有限公司 | A kind of anti-method and apparatus and computer-readable storage medium divulged a secret of Flash |
CN107958141A (en) * | 2017-11-15 | 2018-04-24 | 广西师范大学 | A kind of method for protecting software based on chip ID number |
CN109462477A (en) * | 2018-12-28 | 2019-03-12 | 芯海科技(深圳)股份有限公司 | Whitepack encryption method based on Internet of Things embedded device |
CN110249299A (en) * | 2017-12-13 | 2019-09-17 | 深圳市汇顶科技股份有限公司 | Generate method, chip and the electronic equipment of random number |
CN111159711A (en) * | 2019-12-06 | 2020-05-15 | 珠海慧联科技有限公司 | Method and system for preventing goods from being mixed |
CN111159722A (en) * | 2019-11-06 | 2020-05-15 | 武汉迈威通信股份有限公司 | Encryption method of chip system based on single chip microcomputer and encryption chip system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818923A (en) * | 2006-03-17 | 2006-08-16 | 清华大学 | Enciphering authentication for radio-frequency recognition system |
CN1932835A (en) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
CN101183416A (en) * | 2007-12-10 | 2008-05-21 | 东信和平智能卡股份有限公司 | Software protection method and system thereof |
US20080148393A1 (en) * | 2006-12-15 | 2008-06-19 | Barry Myron Wendt | Neural authenticator and method |
CN201126577Y (en) * | 2007-11-06 | 2008-10-01 | 吴荣洲 | Card reader with identifiable function |
CN102013001A (en) * | 2010-12-06 | 2011-04-13 | 苏州国芯科技有限公司 | Card reader with authentication function and authentication method thereof |
-
2013
- 2013-06-13 CN CN201310234171.6A patent/CN103366103B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818923A (en) * | 2006-03-17 | 2006-08-16 | 清华大学 | Enciphering authentication for radio-frequency recognition system |
CN1932835A (en) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
US20080148393A1 (en) * | 2006-12-15 | 2008-06-19 | Barry Myron Wendt | Neural authenticator and method |
CN201126577Y (en) * | 2007-11-06 | 2008-10-01 | 吴荣洲 | Card reader with identifiable function |
CN101183416A (en) * | 2007-12-10 | 2008-05-21 | 东信和平智能卡股份有限公司 | Software protection method and system thereof |
CN102013001A (en) * | 2010-12-06 | 2011-04-13 | 苏州国芯科技有限公司 | Card reader with authentication function and authentication method thereof |
Non-Patent Citations (2)
Title |
---|
於辉等: "基于TMS320VC5410的DES加密系统设计", 《电子设计工程》, 30 September 2010 (2010-09-30) * |
潘学海: "基于MSP430射频IC卡读写系统研究", 《煤炭技术》, 31 January 2012 (2012-01-31) * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069350A (en) * | 2015-08-24 | 2015-11-18 | 上海繁易电子科技有限公司 | Encryption method and apparatus for embedded operating system |
CN106055932A (en) * | 2016-05-26 | 2016-10-26 | 东莞博力威电池有限公司 | MCU program anti-plagiarizing method and system with Boost loader function |
CN106779682A (en) * | 2016-11-30 | 2017-05-31 | 深圳航信德诚科技有限公司 | The intelligent SD card and its method of mobile payment of a kind of mobile payment |
CN106529223A (en) * | 2016-12-15 | 2017-03-22 | 重庆兆洲科技发展有限公司 | Microcontroller unit and control method thereof |
CN107958141A (en) * | 2017-11-15 | 2018-04-24 | 广西师范大学 | A kind of method for protecting software based on chip ID number |
CN107832588A (en) * | 2017-11-17 | 2018-03-23 | 珠海市多泰吉智能技术有限公司 | A kind of anti-method and apparatus and computer-readable storage medium divulged a secret of Flash |
CN110249299A (en) * | 2017-12-13 | 2019-09-17 | 深圳市汇顶科技股份有限公司 | Generate method, chip and the electronic equipment of random number |
CN109462477A (en) * | 2018-12-28 | 2019-03-12 | 芯海科技(深圳)股份有限公司 | Whitepack encryption method based on Internet of Things embedded device |
CN109462477B (en) * | 2018-12-28 | 2021-05-25 | 芯海科技(深圳)股份有限公司 | White box encryption method based on Internet of things embedded equipment |
CN111159722A (en) * | 2019-11-06 | 2020-05-15 | 武汉迈威通信股份有限公司 | Encryption method of chip system based on single chip microcomputer and encryption chip system |
CN111159722B (en) * | 2019-11-06 | 2023-05-16 | 武汉迈威通信股份有限公司 | Encryption method of chip system based on single chip microcomputer and encryption chip system |
CN111159711A (en) * | 2019-12-06 | 2020-05-15 | 珠海慧联科技有限公司 | Method and system for preventing goods from being mixed |
Also Published As
Publication number | Publication date |
---|---|
CN103366103B (en) | 2016-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103366103B (en) | The application program encryption protecting method of card reader | |
US11861372B2 (en) | Integrity manifest certificate | |
EP2630606B1 (en) | Application usage policy enforcement | |
WO2009107349A1 (en) | Information processing device | |
CN107832589B (en) | Software copyright protection method and system | |
JP2007226839A (en) | Memory unit and system for storing data structure | |
EP2350982A1 (en) | Physical access control system with smartcard and methods of operating | |
US20090287917A1 (en) | Secure software distribution | |
CN111984962A (en) | Firmware security verification method and device | |
CN109086578A (en) | A kind of method that soft ware authorization uses, equipment and storage medium | |
EP2876593B1 (en) | Method of generating a structure and corresponding structure | |
CN111160879A (en) | Hardware wallet and security improving method and device thereof | |
CN111953634B (en) | Access control method and device for terminal equipment, computer equipment and storage medium | |
CN102238135A (en) | Security authentication server | |
CN112613011B (en) | USB flash disk system authentication method and device, electronic equipment and storage medium | |
CN102012978B (en) | Method and system for safely upgrading ISO (International Standard Code) file | |
JP3491273B2 (en) | Chip card and how to import information on it | |
CN112445705A (en) | Software running system, method, device, computer equipment and storage medium | |
CN102148054A (en) | Flash memory storage system, controller of flash memory storage system and data falsification preventing method | |
CN110688663A (en) | Execution command protection method and device, android device and storage medium | |
US20200012823A1 (en) | Secure storage system | |
TW201508541A (en) | Protection system and method with smartcard device | |
CN101620545A (en) | Method for safely upgrading application program on chip layer | |
CN201742426U (en) | Sim card safety certificate server | |
CN109344089B (en) | Method and device for operating norflash |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |