CN105205357B - A kind of the software code theft preventing method and device of embedded system - Google Patents

A kind of the software code theft preventing method and device of embedded system Download PDF

Info

Publication number
CN105205357B
CN105205357B CN201510607321.2A CN201510607321A CN105205357B CN 105205357 B CN105205357 B CN 105205357B CN 201510607321 A CN201510607321 A CN 201510607321A CN 105205357 B CN105205357 B CN 105205357B
Authority
CN
China
Prior art keywords
code
embedded system
read
memory
bottom layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510607321.2A
Other languages
Chinese (zh)
Other versions
CN105205357A (en
Inventor
裴志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huzhou Yinglie Intellectual Property Operation Co ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510607321.2A priority Critical patent/CN105205357B/en
Publication of CN105205357A publication Critical patent/CN105205357A/en
Priority to PCT/CN2016/097747 priority patent/WO2017050110A1/en
Application granted granted Critical
Publication of CN105205357B publication Critical patent/CN105205357B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Abstract

The invention discloses a kind of software code theft preventing methods of embedded system, including:Embedded system is subjected to electric initialization, reads the bottom layer driving code in flash memory;An external peripheral memory in embedded systems;The default section electricity of bottom layer driving code is transplanted in peripheral memory, and the corresponding code of default section is deleted in a flash memory;Default section electricity is transplanted in peripheral memory, will not be stolen to preset section when bottom layer driving code is stolen;And embedded system is restarted.Theft preventing method provided by the invention uses the ingenious combination of software and hardware, bottom layer driving code is split into two parts to store, the traditional design scheme for overturning the only embedded system there are one external FLASH, the area that occupies PCB is small, low in energy consumption, single channel power supply power supply is without powering on timing requirements;Meanwhile ensureing that two embedded products for possessing identical data link layer address cannot establish communication, further reinforce anti-theft feature.

Description

A kind of the software code theft preventing method and device of embedded system
Technical field
The present invention relates to the software code theft preventing methods of embedded system technology field more particularly to a kind of embedded system And device.
Background technology
The many producers of Communications Market are in order to reduce R&D costs, through frequently with production board is bought in the market, being copied by PCB Plate, then the mode of software decompilation is carried out to plagiarize the product of other companies, serious damage is by the interests of the company of plagiarism.
Software product is copied in order to prevent, and conventional antitheft processing mode has three classes:Software cryptography, adds hardware encryption Close chip encryption.Need during software cryptography processing mode to consume must central processing unit process resource, hardware encryption Processing mode confidentiality is not fine, and encryption chip encryption mode cost is higher and encryption chip is not easy volume production control.
The producer having in existing market uses by increasing a FPGA on central processing unit and flash memory (FLASH) bus The mode of encryption system come realize entire embedded system encryption operation.All programs are being transported in this encryption design It is both needed to the operation of encipheror in capable process, when product is in accident power-off, the encipheror run in product is not added Close completion, being likely to result in product cannot be again started up.Meanwhile, PCB area occupied higher using FPGA encryption system costs Greatly, it needs multiple power supplies and has electrifying timing sequence requirement, power consumption is high.
Invention content
It is a primary object of the present invention to solve processing antitheft to software code in the prior art, encryption information ratio is designed The problem of more complex and pure software encryption information is easy to be cracked.
To achieve the above object, the software code theft preventing method and device of a kind of embedded system provided by the invention.
The software code theft preventing method of embedded system provided by the present invention, includes the following steps:
The embedded system is subjected to electric initialization, reads the bottom layer driving code in flash memory;
An external peripheral memory in the embedded system;
The default section electricity of the bottom layer driving code is transplanted in the peripheral memory, and the default section is corresponded to Code deleted in the flash memory;The default section electricity is transplanted in the peripheral memory, is driven to work as the bottom Dynamic code when being stolen the default section will not be stolen;And
The embedded system is restarted.
Further, the method further includes:Described in data-link layer address write-in by each embedded circuit board In peripheral memory, connected with ensuring to have two embedded circuit boards of the identical data-link layer address cannot establish communication It connects.
Further, described to restart the embedded system, specifically include step:
Read the bottom layer driving code after electromigration is planted in the flash memory;Read electromigration in the peripheral memory plant it is default Section code;Read the kernel code and application code in the flash memory.
Further, the default section code for reading electromigration plant in the peripheral memory is by software interface function It completes;The kernel code read in the flash memory and application code are completed by software interface return function 's.
Further, the peripheral memory is Electrically Erasable Programmable Read-Only Memory.
Further, the present invention also provides a kind of software code anti-theft device of embedded system, described device includes: System starting module, peripheral memory, code migrating module and system reboot module;
The system starting module, for the embedded system to be carried out electric initialization, the bottom read in flash memory drives Dynamic code;
The peripheral memory is placed outside in the embedded system;
The code migrating module, for the default section electricity of the bottom layer driving code to be transplanted to the peripheral memory In, and the corresponding code of the default section is deleted in the flash memory;The default section electricity is transplanted to the peripheral hardware storage In device, to when the bottom layer driving code is stolen the default section will not be stolen;
The system reboot module, for restarting the embedded system.
Further, the peripheral memory is also stored with the data-link layer address of each embedded circuit board, with Ensure that there are two embedded circuit boards of the identical data-link layer address cannot establish communication connection.
Further, the system reboot module is specifically used for:
Read the bottom layer driving code after electromigration is planted in the flash memory;Read electromigration in the peripheral memory plant it is default Section code;Read the kernel code and application code in the flash memory.
Further, in the system reboot module, the default section code that electromigration is planted in the peripheral memory is read It is completed by software interface function;The kernel code and application code read in the flash memory is connect by software Mouth return function is completed.
Further, the peripheral memory is Electrically Erasable Programmable Read-Only Memory.
The software code theft preventing method of embedded system provided by the invention uses the ingenious combination of software and hardware, only needs Increase a low cost, the Electrically Erasable Programmable Read-Only Memory of low capacity (EEPROM) in embedded systems, bottom is driven Dynamic code splits into two parts and is stored, and overturns the traditional design scheme of the only embedded system there are one external FLASH, only It steals the code in FLASH and can not complete system and normally start, and compared to the antitheft scheme sheet for using FPGA in background technology Scheme occupy PCB area is small, low in energy consumption, single channel power supply power supply is without powering on timing requirements;Meanwhile the production of embedded system is certainly Dynamicization is tested, and different data-link layer address will be written in each embedded circuit board, and theft preventing method provided by the invention will Data-link layer address is written in EEPROM, ensures that two embedded products for possessing identical data link layer address have punching It is prominent, communication cannot be established, the anti-theft feature of software code is further strengthened.
Description of the drawings
Fig. 1 is the step flow chart of the software code theft preventing method of embedded system provided in an embodiment of the present invention.
Fig. 2 is hard ware & soft ware design provided in an embodiment of the present invention and production automation test flow chart.
Fig. 3 is the flow chart that preliminary anti-theft feature is carried out using theft preventing method provided in an embodiment of the present invention.
Fig. 4 is the flow chart for using theft preventing method provided in an embodiment of the present invention reinforce anti-theft feature.
Fig. 5 is the structure diagram of the software code anti-theft device of embedded system provided in an embodiment of the present invention.
Realization, functional characteristics and the advantage of the present invention will be described further with reference to attached drawing in conjunction with the embodiments.
Specific implementation mode
Below in conjunction with Figure of description, preferred embodiment of the present invention will be described, it should be understood that described herein Preferred embodiment only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention, and in the absence of conflict, this hair The feature in embodiment and embodiment in bright can be combined with each other.
To achieve the above object, the software code theft preventing method and device of a kind of embedded system provided by the invention.
As shown in Figure 1, the step flow chart of the software code theft preventing method for embedded system provided in an embodiment of the present invention. The software code theft preventing method of embedded system provided by the present invention, includes the following steps:
S101:Embedded system is subjected to electric initialization, reads the bottom layer driving code in FLASH;
S102:An external peripheral memory in embedded systems;Wherein, peripheral memory provided in an embodiment of the present invention For EEPROM (Electrically Erasable Programmable Read-Only Memory), EEPROM has many advantages, such as low cost, low capacity, plug and play.
S103:The default section electricity of bottom layer driving code is transplanted in EEPROM, and the corresponding code of default section is existed It is deleted in FLASH;Default section code electricity is transplanted in EEPROM, it will not to preset section when bottom layer driving code is stolen It is stolen, plays preliminary anti-theft feature;Wherein, the default segment length of bottom layer driving code does not require, and is subject to practical operation, The embodiment of the present invention is intended to bottom layer driving code being different from traditional scheme to be only put into FLASH and store, but is divided into two parts point It is not stored in FLASH and EEPROM, therefore default segment length is not the emphasis of the embodiment of the present invention, therefore does not go to live in the household of one's in-laws on getting married herein It states.And
S104:Embedded system is restarted.
Further, step S104 restarts embedded system, specifically includes step:
After completing step S103, start to read the bottom layer driving code remained after electromigration plant in FLASH;Then Read the default section code planted by electromigration in EEPROM;Read after the completion of go to continue read FLASH in kernel code and Application code, and then entire embedded system carries out normal operating condition.
Further, the operation for the default section code that electromigration is planted in above-mentioned reading EEPROM is complete by software interface function At;Kernel code and application code in above-mentioned reading FLASH are completed by software interface return function.
Further, the method further includes:When embedded system carries out production automation test, each is embedded in In data-link layer address (MAC Address) the write-in EEPROM of formula circuit board, to ensure that there is identical data link layer address Two embedded circuit boards cannot establish communication connection, play further anti-theft feature.Even if the embedded system of same platform, Also it can not carry out by way of changing MAC Address stealing code in former FLASH and carry out production shipment, because this programme MAC Address is not placed in FLASH.Production automation test is different from the conventional scheme being placed on MAC Address in FLASH, changes It is placed in EEPROM at by MAC Address.When our FLASH and EEPROM codes of i.e. convenient certain people's unauthorized thefts, still without Method volume production shipment so that unauthorized theft person can not judge MAC Address is according to which kind of writing mode, which kind of storage.Cause This, the more traditional software code of this antitheft scheme is antitheft more preferably effect.
Further, as shown in Fig. 2, being tested for hard ware & soft ware design provided in an embodiment of the present invention and production automation Flow chart.The software code that the mode that software, hardware are dexterously combined by the embodiment of the present invention carries out embedded system is antitheft, The specific steps are:
S201:Embedded system first powers on initialization, reads the bottom layer driving code in FLASH;
S202:Embedded system bottom starts successfully, and the part drive code set in FLASH is transplanted to external EEPROM In, and the code deletion that will be transplanted in FLASH;
S203:It is restarted after the transplanting of embedded system completion code, starts to read the reservation bottom layer driving generation in FLASH Code then reads the code that transplanting is first powered in EEPROM;
S204:Embedded system successfully reads the code of EEPROM transplanting, goes to the kernel code read in FLASH and answers With program code, entire embedded system normal operation;
S205:The production automation of embedded system is tested, and different data link layers will be written in each embedded PCB Data-link layer address is written in EEPROM, does not have conflict, however possess two of identical data link layer address by address Embedded product cannot establish communication, have conflict.
Further, as shown in figure 3, to carry out preliminary anti-theft feature using theft preventing method provided in an embodiment of the present invention Flow chart.If Embedded System Code is stolen, theft preventing method provided in an embodiment of the present invention carries out preliminary anti-theft feature The specific steps are:
S301:Embedded System Code is stolen, and the code in FLASH on reading circuit plate is simultaneously burnt to new circuit In plate;
S302:New circuit board power-up initializing, the bottom read in FLASH lack drive code set;
S303:New circuit board power-up initializing failure, system are suspended.
And then demonstrate and bottom layer driving code is split into two parts store, overturn only that there are one external FLASH's The traditional design scheme of embedded system, only steals the code in FLASH and can not complete system and normally start, and compares background In technology using antitheft scheme this programme of FPGA occupy PCB area is small, low in energy consumption, single channel power supply power supply is wanted without electrifying timing sequence It asks.
Further, as shown in figure 4, to carry out reinforcing anti-theft feature using theft preventing method provided in an embodiment of the present invention Flow chart.If Embedded System Code is stolen, theft preventing method provided in an embodiment of the present invention carries out reinforcing anti-theft feature The specific steps are:
S401:Embedded System Code is stolen, and the code in FLASH and EEPROM on reading circuit plate is simultaneously burnt respectively It records in new circuit board;
S402:New circuit board power-up initializing starts normally, but two embedded circuit boards cannot communicate;
S403:New circuit board has identical data-link layer address, but communication still fails.
And then the production automation test of embedded system is demonstrated, different numbers will be written in each embedded circuit board According to link layer address, data-link layer address is written in EEPROM theft preventing method provided by the invention, and guarantee possesses identical number Conflict is had according to two embedded products of link layer address, communication cannot be established, further strengthens the anti-of software code Steal function
Further, as shown in figure 5, being the software code anti-theft device of embedded system provided in an embodiment of the present invention Structure diagram.The software code anti-theft device of embedded system includes:System starting module 501, peripheral memory 502, code Transplant module 503 and system reboot module 504;
System starting module 501 reads the bottom layer driving generation in FLASH for embedded system to be carried out electric initialization Code;
Peripheral memory 502 uses EEPROM, is different from the only plug-in FLASH of traditional embedded system, but peripheral hardware Memory 502 and FLASH stores software code jointly;
Code migrating module 503, for the default section electricity of bottom layer driving code to be transplanted in peripheral memory 502, and The corresponding code of default section is deleted in the corresponding positions FLASH;
System reboot module 504, for restarting embedded system.
Further, system reboot module 504 is specifically used for:Start to read remaining after electromigration is planted in FLASH Bottom layer driving code;Then the default section code planted by electromigration in EEPROM is read;It is gone to after the completion of reading and continues to read FLASH In kernel code and application code, and then entire embedded system carries out normal operating condition.
Further, in system reboot module 504, the operation for the default section code that electromigration is planted in above-mentioned reading EEPROM It is completed by software interface function;Kernel code and application code in above-mentioned reading FLASH are to pass through software What interface return function was completed.
Further, when embedded system carries out production automation test, peripheral memory 502 is also stored with each The data-link layer address of embedded circuit board, to ensure to have two embedded circuit boards of identical data link layer address not Communication connection can be established.Even if the embedded system of same platform, it can not also pass through the side of change MAC Address in former FLASH Formula, which carries out stealing code, carries out production shipment, because the MAC Address of this programme is not placed in FLASH.Production automation test has Not in the conventional scheme being placed on MAC Address in FLASH, make into MAC Address being placed in EEPROM.I.e. convenient certain people are non- It, still can not volume production shipment so that unauthorized theft person is with can not judging MAC when method steals our FLASH and EEPROM codes Location is according to which kind of writing mode, which kind of storage.Therefore, the more traditional software code of this antitheft scheme is antitheft has more preferably Effect.
It is required in burning code to FLASH before being typically embedded into the production of formula system, patch and plug-in unit etc. have produced It is powered on after, embedded system can be run according to the program in machine code in FLASH at this time, and the different MAC of burning before shipment Address, to ensure that each product can mutual normal communication.And the present invention is by the way of the ingenious combination of hardware and software, Hardware is to use two memory device store codes, and during only needing single of burning storage, reduce production burning and be operated in Increase a low capacity EEPROM in former embedded system standard configurations, for storing code to be transplanted and data link Location, i.e. MAC Address;It, also can not be in former FLASH by way of changing MAC Address even if the embedded system of same platform It carries out stealing code and carries out production shipment, because the MAC Address of this programme is not placed in FLASH.Software is directed to theft-prevention applications, into Row part bottom layer driving code migrating, and by the bottom code of the external EEPROM of software interface function reading, after the completion, then lead to Software interface return function is crossed, kernel code and application software code in FLASH are then loaded, is then completed entire embedded Formula system normal operation.
The software code theft preventing method of embedded system provided by the invention uses the ingenious combination of software and hardware, only needs In embedded systems increase a low cost, low capacity (EEPROM), by bottom layer driving code split into two parts carry out The traditional design scheme of the only embedded system there are one external FLASH is overturned in storage, only steals code in FLASH not It can complete system normally to start, and the small, work(compared to the area using antitheft scheme this programme of FPGA occupancy PCB in background technology Low, single channel power supply power supply is consumed without powering on timing requirements;Meanwhile the production automation test of embedded system, each is embedded Different data-link layer address will be written in circuit board, and data-link layer address is written theft preventing method provided by the invention In EEPROM, ensures that two embedded products for possessing identical data link layer address have conflict, communication cannot be established, into one Strengthen to step the anti-theft feature of software code.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (4)

1. a kind of software code theft preventing method of embedded system, which is characterized in that the described method comprises the following steps:
The embedded system is subjected to electric initialization, reads the bottom layer driving code in flash memory;
An external peripheral memory in the embedded system;
The default section electricity of the bottom layer driving code is transplanted in the peripheral memory, and by the default section corresponding generation Code is deleted in the flash memory;
The default section electricity is transplanted in the peripheral memory, to described pre- when the bottom layer driving code is stolen If section will not be stolen;And the data-link layer address of each embedded circuit board is written in the peripheral memory, To ensure to have two embedded circuit boards of the identical data-link layer address cannot establish communication connection;
The embedded system is restarted, step is specifically included:
Read the bottom layer driving code after electromigration is planted in the flash memory;Read the default section generation that electromigration is planted in the peripheral memory Code;Read the kernel code and application code in the flash memory, wherein described to read electromigration in the peripheral memory The default section code planted is completed by software interface function;The kernel code read in the flash memory and apply journey Sequence code is completed by software interface return function.
2. the method as described in claim 1, which is characterized in that the peripheral memory is the read-only storage of electric erazable programmable Device.
3. a kind of software code anti-theft device of embedded system, which is characterized in that described device includes:System starting module, Peripheral memory, code migrating module and system reboot module;
The system starting module reads the bottom layer driving generation in flash memory for the embedded system to be carried out electric initialization Code;
The peripheral memory is placed outside in the embedded system;
The code migrating module, for the default section electricity of the bottom layer driving code to be transplanted in the peripheral memory, And the corresponding code of the default section is deleted in the flash memory;The default section electricity is transplanted to the peripheral memory In, to when the bottom layer driving code is stolen the default section will not be stolen, by each embedded circuit board Data-link layer address is written in the peripheral memory, to ensure two insertions with the identical data-link layer address Formula circuit board cannot establish communication connection;
The system reboot module is specifically used for for restarting the embedded system:
Read the bottom layer driving code after electromigration is planted in the flash memory;Read the default section generation that electromigration is planted in the peripheral memory Code;Read the kernel code and application code in the flash memory, wherein read what electromigration in the peripheral memory was planted Default section code is completed by software interface function;The kernel code and application code read in the flash memory be It is completed by software interface return function.
4. device as claimed in claim 3, which is characterized in that the peripheral memory is the read-only storage of electric erazable programmable Device.
CN201510607321.2A 2015-09-22 2015-09-22 A kind of the software code theft preventing method and device of embedded system Active CN105205357B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510607321.2A CN105205357B (en) 2015-09-22 2015-09-22 A kind of the software code theft preventing method and device of embedded system
PCT/CN2016/097747 WO2017050110A1 (en) 2015-09-22 2016-08-31 Software code anti-theft method for embedded system, and device for same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510607321.2A CN105205357B (en) 2015-09-22 2015-09-22 A kind of the software code theft preventing method and device of embedded system

Publications (2)

Publication Number Publication Date
CN105205357A CN105205357A (en) 2015-12-30
CN105205357B true CN105205357B (en) 2018-07-31

Family

ID=54953033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510607321.2A Active CN105205357B (en) 2015-09-22 2015-09-22 A kind of the software code theft preventing method and device of embedded system

Country Status (2)

Country Link
CN (1) CN105205357B (en)
WO (1) WO2017050110A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205357B (en) * 2015-09-22 2018-07-31 上海斐讯数据通信技术有限公司 A kind of the software code theft preventing method and device of embedded system
CN111240726B (en) * 2018-11-29 2024-02-20 株洲中车时代电气股份有限公司 Embedded data processing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635019A (en) * 2009-08-25 2010-01-27 中国华录集团有限公司 Encryption system of embedded type software program based on safe MCU
CN103020495A (en) * 2012-12-17 2013-04-03 马驹 Embedded-type software anti-piracy encryption method
CN103106091A (en) * 2013-01-31 2013-05-15 深圳市开立科技有限公司 Start-up system and method of operating system based on removable storage media

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6871192B2 (en) * 2001-12-20 2005-03-22 Pace Anti-Piracy System and method for preventing unauthorized use of protected software utilizing a portable security device
US20080212419A1 (en) * 2004-08-11 2008-09-04 Intelligentdisc, Inc. Disk Contents Management Method and Disk
CN101038615A (en) * 2007-03-12 2007-09-19 吴晓栋 Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection
CN102982264B (en) * 2012-12-24 2017-06-16 上海斐讯数据通信技术有限公司 A kind of embedded device method for protecting software
CN105205357B (en) * 2015-09-22 2018-07-31 上海斐讯数据通信技术有限公司 A kind of the software code theft preventing method and device of embedded system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635019A (en) * 2009-08-25 2010-01-27 中国华录集团有限公司 Encryption system of embedded type software program based on safe MCU
CN103020495A (en) * 2012-12-17 2013-04-03 马驹 Embedded-type software anti-piracy encryption method
CN103106091A (en) * 2013-01-31 2013-05-15 深圳市开立科技有限公司 Start-up system and method of operating system based on removable storage media

Also Published As

Publication number Publication date
WO2017050110A1 (en) 2017-03-30
CN105205357A (en) 2015-12-30

Similar Documents

Publication Publication Date Title
US8972633B2 (en) Apparatus with a memory controller configured to control access to randomly accessible non-volatile memory
US8370548B2 (en) Methods of assembly of a computer system with randomly accessible non-volatile memory
CN104424044A (en) Server system
CN102360298A (en) Software upgrading method of terminal equipment
CN104423993B (en) The update method of vehicle electronics software, more new terminal and automobile electronic system
CN105205357B (en) A kind of the software code theft preventing method and device of embedded system
CN104899091A (en) Multi-operating system switching method of intelligent embedded equipment
CN102075710B (en) Starting operation method for television and television
CN104636165A (en) Mobile device starting method and device
CN102693144A (en) Method for upgrading capacitive screen firmware used for Android mobile terminal
JP5191562B1 (en) Electronic equipment system
CN103425591A (en) Non-volatile memory apparatus capable of extending lifetime of storage space
CN103150184A (en) Method for operating flash memory and system chip
US20070119953A1 (en) Portable device and method for setting a hardware identity code corresponding to the portable device
CN102508676A (en) Startup method and device of embedded system
CN103853638A (en) Method for refreshing firmware and electronic equipment
CN104158709A (en) Optical module identification method and port extender
US10007529B2 (en) Data terminal running mode switching method, device, and data terminal
CN101867697A (en) Set-top box system for realizing plugging and playing by utilizing network and method thereof
CN109710292B (en) Mobile terminal machine brushing control processing method, mobile terminal and storage medium
CN116719724A (en) eMMC multi-platform testing method and device and electronic equipment
CN114237506B (en) Method for storing and reading/writing EMMC data
CN104834875A (en) Computer secondary mainboard system for physical isolation for information security and isolation method
CN105335241A (en) Information processing method and electronic equipment
CN108121562B (en) Firmware version switching method, electronic device and BIOS chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201116

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201217

Address after: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210308

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A software code anti-theft method and device for embedded system

Effective date of registration: 20230111

Granted publication date: 20180731

Pledgee: Huzhou Wuxing Rural Commercial Bank Co.,Ltd. high tech Zone Green sub branch

Pledgor: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Registration number: Y2023330000072

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231205

Granted publication date: 20180731

Pledgee: Huzhou Wuxing Rural Commercial Bank Co.,Ltd. high tech Zone Green sub branch

Pledgor: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Registration number: Y2023330000072