CN105224829A - Embedded system and content protecting method - Google Patents

Embedded system and content protecting method Download PDF

Info

Publication number
CN105224829A
CN105224829A CN201410259364.1A CN201410259364A CN105224829A CN 105224829 A CN105224829 A CN 105224829A CN 201410259364 A CN201410259364 A CN 201410259364A CN 105224829 A CN105224829 A CN 105224829A
Authority
CN
China
Prior art keywords
key
content protecting
embedded
embedded system
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410259364.1A
Other languages
Chinese (zh)
Other versions
CN105224829B (en
Inventor
谢思谦
阮腾辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weintek Labs Inc
Original Assignee
Weintek Labs Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weintek Labs Inc filed Critical Weintek Labs Inc
Priority to CN201410259364.1A priority Critical patent/CN105224829B/en
Publication of CN105224829A publication Critical patent/CN105224829A/en
Application granted granted Critical
Publication of CN105224829B publication Critical patent/CN105224829B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a kind of embedded system of tool content protecting ability, comprise safety integrated circuit, be provided with and identify key storage device, in order to store identification key; And system and device, be provided with system key storage device, in order to stocking system key.System key is performed mathematical calculations by identification key and function array and obtained.When embedded system wants start-up performance, identification key and system key are performed mathematical calculations, thus obtain function array, start required described function according to this.

Description

Embedded system and content protecting method
Technical field
The present invention relates to a kind of content protect mechanisms, particularly relates to a kind of software protection framework of embedded system.
Background technology
Because the cost of software development is generally comparatively greater than hardware, therefore need to use suitable mechanism to carry out protection software, be illegally used to reduce software or copy.Figure 1A shows a kind of traditional software protection, certain software function (or version) A is had to the pass code A of a correspondence.When pass code A is confirmed to be effective, software function A could be started.When software upgrading is function B, as shown in Figure 1B, then the new pass code B of another correspondence is needed to start software function B.System must be sent back to factory to be replaced by new pass code B by user, therefore causes the increase of cost and the inconvenience of user.
In order to improve in the middle of above-mentioned traditional software protection mechanism (Figure 1A, Figure 1B), user need send system back to factory not convenient, therefore has the proposition of another kind of software protection, as illustrated in fig. 2.In this kind of software protection, user only uses single pass code C, and different software functions stores different corresponding codes.If be software function C1 in system, when pass code C is confirmed to be effective, namely software function C1 can be started; If be software function C2 in system, when pass code C is confirmed to be effective, namely software function C2 can be started.For the software protection shown in Fig. 2, Software pirates (that is, illegal purchase upgrade software function C2 person) be easy to by propagation software function C2 and coordinate original pass code C and illegal use software function C2.
In view of traditional software protection mechanism cannot effectively prevent software to be illegally used or copy, therefore need the software protection proposing a kind of novelty badly, to improve the shortcoming of traditional software protection mechanism.
Because above-mentioned existing software protection Problems existing; the present inventor is based on being engaged in the practical experience and professional knowledge that this type of product design manufacture enriches for many years; and coordinate the utilization of scientific principle; actively in addition research and innovation; to founding a kind of new embedded system and content protecting method; general existing software protection can be improved, make it have more practicality.Through constantly research, design, and through repeatedly studying sample and after improving, finally creating the present invention had practical value.
Summary of the invention
In view of above-mentioned, fundamental purpose of the present invention is, overcome existing software protection Problems existing, and propose a kind of embedded system of tool content protecting ability, technical matters to be solved prevents content stolen.
The object of the invention to solve the technical problems realizes by the following technical solutions.The embedded system of a kind of tool content protecting ability proposed according to the present invention, comprises safety integrated circuit and system and device.Safety integrated circuit is provided with and identifies key storage device, in order to store identification key.System and device is provided with system key storage device, in order to stocking system key.Wherein system key system is by identifying that key and function array perform mathematical calculations and obtain, and this function array represents embedded system one or more function required.When embedded system will start described function, identification key and system key are performed mathematical calculations, thus obtain function array, start required described function according to this.
The object of the invention to solve the technical problems also can be applied to the following technical measures to achieve further.
The embedded system of aforesaid tool content protecting ability, wherein this identification key storage device comprises light shield ROM (read-only memory) or single programmable internal memory.
The embedded system of aforesaid tool content protecting ability, wherein system key storage device comprise that flash memory or electronics can erase can program read-only memory.
The embedded system of aforesaid tool content protecting ability, wherein this content comprises software.
The embedded system of aforesaid tool content protecting ability, wherein this mathematical operation comprises cryptographic calculation.
The embedded system of aforesaid tool content protecting ability, wherein this function array representation is binary numeral, and represents the validity of described function with bit position.
The embedded system of aforesaid tool content protecting ability, more comprises: this embedded system checks whether this safety integrated circuit exists.
The embedded system of aforesaid tool content protecting ability, wherein this step performing mathematical calculations to obtain this function array more comprises: inspect whether the function array that this mathematical operation obtains is correct.
The embedded system of aforesaid tool content protecting ability, wherein the identification key of different embedded system is different from each other, and system key is also different from each other.
The embedded system of aforesaid tool content protecting ability, wherein the identification key of same embedded system is for immobilizing, and its system key can because changing after software upgrading.
The object of the invention to solve the technical problems also realizes by the following technical solutions.The content protecting method of a kind of embedded system proposed according to the present invention, comprise: identification key and function array are performed mathematical calculations to obtain system key, this function array represents this embedded system one or more function required; Store this identification key in safety integrated circuit; Store this system key in system and device; And when this embedded system will start described function, this identification key and this system key are performed mathematical calculations, thus obtain this function array, start required described function according to this.
The object of the invention to solve the technical problems also can be applied to the following technical measures to achieve further.
The content protecting method of aforesaid embedded system, wherein this identification key is stored in light shield ROM (read-only memory) or single programmable internal memory.
The content protecting method of aforesaid embedded system, wherein this system key be stored in that flash memory or electronics can erase can program read-only memory.
The content protecting method of aforesaid embedded system, wherein this content comprises software.
The content protecting method of aforesaid embedded system, wherein this mathematical operation comprises cryptographic calculation.
The content protecting method of aforesaid embedded system, wherein this function array representation is binary numeral, and represents the validity of described function with bit position.
The content protecting method of aforesaid embedded system, more comprises: this embedded system checks whether this safety integrated circuit exists.
The content protecting method of aforesaid embedded system, wherein this step performing mathematical calculations to obtain this function array more comprises: inspect whether the function array that this mathematical operation obtains is correct.
The content protecting method of aforesaid embedded system, wherein the identification key of different embedded system is different from each other, and system key is also different from each other.
The content protecting method of aforesaid embedded system, wherein the identification key of same embedded system is for immobilizing, and its system key can because changing after software upgrading.
The present invention compared with prior art has obvious advantage and beneficial effect.By technique scheme, embedded system of the present invention and content protecting method at least have following advantages and beneficial effect: identification key and function array perform mathematical calculations to obtain system key by the present invention.When embedded system wants start-up performance, identification key and system key are performed mathematical calculations and can obtain function array, start the required function of user according to this.Owing to storing different identification keys and system key in different embedded systems, content thus can be prevented stolen.In addition, when upgrading, user does not need to change and identifies key and directly can use the function after upgrading.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent to allow above and other object of the present invention, feature and advantage, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, be described in detail as follows.
Accompanying drawing explanation
Figure 1A and Figure 1B shows a kind of traditional software protection.
Fig. 2 shows another kind of traditional software protection.
Fig. 3 A shows the system block diagram of the embedded system of the embodiment of the present invention.
Store identification key in the identification key storage device that Fig. 3 B is illustrated in Fig. 3 A, and store system key in system key storage device.
The corresponding relation of Fig. 3 C Identification display key and system key.
Fig. 4 shows the process flow diagram of the content protecting method of the embedded system of the embodiment of the present invention.
Fig. 5 illustrates the system block diagram of the embedded system of three users respectively.
The embedded system that Fig. 6 illustrates the present embodiment is applied to the system block diagram of software upgrading.
[main element symbol description]
300: embedded system 300X: embedded system
300Y: embedded system 300Z: embedded system
31: safety integrated circuit 311: identify key storage device
32: system and device 321: system key storage device
41: whether safety integrated circuit exists 42: mathematical operation
43: operation result whether correct 44: the function judging software
Embodiment
For further setting forth the present invention for the technological means reaching predetermined goal of the invention and take and effect; below in conjunction with accompanying drawing and preferred embodiment; to the embedded system proposed according to the present invention and its embodiment of content protecting method, method, feature and effect thereof, be described in detail as follows.
Fig. 3 A shows the system block diagram of embedded (embedded) system 300 of the embodiment of the present invention, and it has the ability of protection content (such as software).In the present embodiment, embedded system 300 mainly comprises safety integrated circuit (securityIC) 31 and system and device 32.Although the safety integrated circuit 31 shown in Fig. 3 A is what separate with system and device 32, but it also can combine.
Safety integrated circuit 31 includes identification key (IDkey) storage device 311, in order to store identification key.System and device 32 includes system key (systemkey) storage device 321, and in order to stocking system key, it is corresponding to identification key.In the present embodiment, identify that key storage device 311 can use light shield ROM (read-only memory) (MaskROM) to implement, or use single programmable (onetimeprogramming, OTP) internal memory to implement.System key storage device 321 can use flash memory (flash) or electronics to erase and can implement by program read-only memory (EEPROM).
Fig. 3 B is illustrated in identification key storage device 311 to store and identifies key A, and stores system key B in system key storage device 321.Identification key A and the system key B of the present embodiment have corresponding relation, but in general, both contents are different.The corresponding relation of Fig. 3 C Identification display key A and system key B.In details of the words, according to user one or more function F0 required, F1, F2 ... Fn, thus assign and obtain function array (functionarray), it can use binary numeral to represent.Such as, if customer requirement function F0, F1 and F4, then the value of function array can be expressed as 00 ... 0010011 (position 0,1,4 is " 1 ", and other positions are " 0 ").In other words, function array representation is binary numeral, and represents the validity of described function with bit position.Function array and identification key A are performed mathematical calculations, such as, encrypts (encryption) computing, thus obtain system key B.When embedded system 300 will start software function, performed mathematical calculations by identification key A and system key B, such as cryptographic calculation, thus can obtain function array, starts user's one or more software function required according to this.
Fig. 4 shows the process flow diagram of the content protecting method of the embedded system 300 of the embodiment of the present invention.In step 41, system and device 32, before executive software, checks whether safety integrated circuit 31 exists.If existed, then enter step 42, use algorithm (algorithm), such as cryptographic algorithm, identification key A and system key B is performed mathematical calculations.Then, in step 43, inspect whether mathematical operation result (that is, function array) is correct.Such as, Cyclical Redundancy Check code (cyclicredundancycheck, CRC) is inspected) whether be correct.If be correct, then enter step 44, according to (step 42) mathematical operation result, with judge user's demand as any or various software function.For example, if the binary numeral of mathematical operation result that step 42 obtains is expressed as " 00 ... 0010011 ", being " 1 " through inspecting its position 0,1,4, thus learning that the software function of demand is F0, F1 and F4.
Fig. 5 illustrates the embedded system 300X of three users X, Y, Z, the system block diagram of 300Y, 300Z respectively.In this example, the identification key storage device 311 of user X stores and identifies key A1, and system key storage device 321 then stores corresponding system key B1.The identification key storage device 311 of user Y stores and identifies key A2, and system key storage device 321 then stores corresponding system key B2.The identification key storage device 311 of user Z stores and identifies key A3, and system key storage device 321 then stores corresponding system key B3.In general, identify that key A1, A2, A3 are different from each other, and system key B1, B2, B3 are also different from each other.Embodiment according to Fig. 5, owing to storing different identification keys and system key in different embedded system 300X, 300Y, 300Z, therefore Software pirates cannot by copying other people system key or software function and unauthorized use of software.
The embedded system 300 that Fig. 6 illustrates the present embodiment is applied to the system block diagram of software upgrading.In this example, the corresponding system key of software function FI is B1, and the corresponding system key of software function FII after upgrading is B2.When after the legal upgrading of user, its system key storage device 321 will change stocking system key B2 into, but identify that key storage device 311 still stores original identification key A1.
According to embodiment illustrated in fig. 6, when carrying out software upgrading, user does not need to change and identifies key (that is, do not need embedded system 300 to be sent back to factory to replace safety integrated circuit 31), and directly can use the software function after upgrading.In addition, as previously mentioned, because different embedded systems stores different identification keys and system key, therefore Software pirates (that is, illegal purchase upgrade software merit able one) to be not easy by copying ripping software easily.
The above, it is only preferred embodiment of the present invention, not any pro forma restriction is done to the present invention, although the present invention discloses as above with preferred embodiment, but and be not used to limit the present invention, any those skilled in the art, do not departing within the scope of technical solution of the present invention, make a little change when the technology contents of above-mentioned announcement can be utilized or be modified to the Equivalent embodiments of equivalent variations, in every case be the content not departing from technical solution of the present invention, according to any simple modification that technical spirit of the present invention is done above embodiment, equivalent variations and modification, all still belong in the scope of technical solution of the present invention.

Claims (20)

1. an embedded system for tool content protecting ability, is characterized in that comprising:
Safety integrated circuit, is provided with and identifies key storage device, in order to store identification key; And
System and device, is provided with system key storage device, in order to stocking system key;
Wherein this system key is performed mathematical calculations by this identification key and function array and obtained, and this function array represents this embedded system one or more function required;
When this embedded system will start described function, this identification key and this system key are performed mathematical calculations, thus obtain this function array, start required described function according to this.
2. the embedded system of tool content protecting ability according to claim 1, is characterized in that wherein this identification key storage device comprises light shield ROM (read-only memory) or single programmable internal memory.
3. the embedded system of tool content protecting ability according to claim 1, it is characterized in that wherein system key storage device comprise that flash memory or electronics can erase can program read-only memory.
4. the embedded system of tool content protecting ability according to claim 1, is characterized in that wherein this content comprises software.
5. the embedded system of tool content protecting ability according to claim 1, is characterized in that wherein this mathematical operation comprises cryptographic calculation.
6. the embedded system of tool content protecting ability according to claim 1, is characterized in that wherein this function array representation is binary numeral, and represents the validity of described function with bit position.
7. the embedded system of tool content protecting ability according to claim 1, is characterized in that more comprising:
This embedded system checks whether this safety integrated circuit exists.
8. the embedded system of tool content protecting ability according to claim 1, is characterized in that wherein this step performing mathematical calculations to obtain this function array more comprises:
Inspect whether the function array that this mathematical operation obtains is correct.
9. the embedded system of tool content protecting ability according to claim 1, it is characterized in that the identification key of wherein different embedded system is different from each other, and system key is also different from each other.
10. the embedded system of tool content protecting ability according to claim 1, it is characterized in that the identification key of wherein same embedded system is for immobilizing, and its system key can because changing after software upgrading.
The content protecting method of 11. 1 kinds of embedded systems, is characterized in that comprising:
Identification key and function array are performed mathematical calculations to obtain system key, this function array represents this embedded system one or more function required;
Store this identification key in safety integrated circuit;
Store this system key in system and device; And
When this embedded system will start described function, this identification key and this system key are performed mathematical calculations, thus obtain this function array, start required described function according to this.
The content protecting method of 12. embedded systems according to claim 11, is characterized in that wherein this identification key is stored in light shield ROM (read-only memory) or single programmable internal memory.
The content protecting method of 13. embedded systems according to claim 11, it is characterized in that wherein this system key be stored in that flash memory or electronics can erase can program read-only memory.
The content protecting method of 14. embedded systems according to claim 11, is characterized in that wherein this content comprises software.
The content protecting method of 15. embedded systems according to claim 11, is characterized in that wherein this mathematical operation comprises cryptographic calculation.
The content protecting method of 16. embedded systems according to claim 11, is characterized in that wherein this function array representation is binary numeral, and represents the validity of described function with bit position.
The content protecting method of 17. embedded systems according to claim 11, is characterized in that more comprising:
This embedded system checks whether this safety integrated circuit exists.
The content protecting method of 18. embedded systems according to claim 11, is characterized in that wherein this step performing mathematical calculations to obtain this function array more comprises:
Inspect whether the function array that this mathematical operation obtains is correct.
The content protecting method of 19. embedded systems according to claim 11, it is characterized in that the identification key of wherein different embedded system is different from each other, and system key is also different from each other.
The content protecting method of 20. embedded systems according to claim 11, it is characterized in that the identification key of wherein same embedded system is for immobilizing, and its system key can because changing after software upgrading.
CN201410259364.1A 2014-06-11 2014-06-11 Embedded system and content protecting method Expired - Fee Related CN105224829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410259364.1A CN105224829B (en) 2014-06-11 2014-06-11 Embedded system and content protecting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410259364.1A CN105224829B (en) 2014-06-11 2014-06-11 Embedded system and content protecting method

Publications (2)

Publication Number Publication Date
CN105224829A true CN105224829A (en) 2016-01-06
CN105224829B CN105224829B (en) 2017-12-08

Family

ID=54993794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410259364.1A Expired - Fee Related CN105224829B (en) 2014-06-11 2014-06-11 Embedded system and content protecting method

Country Status (1)

Country Link
CN (1) CN105224829B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1103728A (en) * 1994-05-03 1995-06-14 陈龙森 Enciphering protection method and apparatus for software of computer
US6587842B1 (en) * 1999-10-01 2003-07-01 Keith Watts Software-based protection system for software products distributed on copyable media, or downloaded over a communications link
CN1561026A (en) * 2004-02-20 2005-01-05 胡祥义 Method for preventing pirate based on ciphered algorithmic technique
CN1987882A (en) * 2005-12-23 2007-06-27 联想(北京)有限公司 Software protecting method and system based on safety chip
CN102708310A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Registration code anti-piracy encryption method for computer software in batch production
EP2525301A1 (en) * 2011-05-19 2012-11-21 Thomson Licensing Syntax-preserving software protection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1103728A (en) * 1994-05-03 1995-06-14 陈龙森 Enciphering protection method and apparatus for software of computer
US6587842B1 (en) * 1999-10-01 2003-07-01 Keith Watts Software-based protection system for software products distributed on copyable media, or downloaded over a communications link
CN1561026A (en) * 2004-02-20 2005-01-05 胡祥义 Method for preventing pirate based on ciphered algorithmic technique
CN1987882A (en) * 2005-12-23 2007-06-27 联想(北京)有限公司 Software protecting method and system based on safety chip
EP2525301A1 (en) * 2011-05-19 2012-11-21 Thomson Licensing Syntax-preserving software protection
CN102708310A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Registration code anti-piracy encryption method for computer software in batch production

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周书锋,孙玉真: ""基于RSA数字签名的软件保护方案"", 《计算机应用与软件》 *

Also Published As

Publication number Publication date
CN105224829B (en) 2017-12-08

Similar Documents

Publication Publication Date Title
AU2012337403B2 (en) Cryptographic system and methodology for securing software cryptography
CN105683990B (en) Method and apparatus for protecting dynamic base
CN103617382A (en) Privacy protection method and device
US8479017B2 (en) System and method for N-ary locality in a security co-processor
US20170289193A1 (en) Secure smart terminal and an information processing method
WO2016078130A1 (en) Dynamic loading method for preventing reverse of apk file
CN112257086B (en) User privacy data protection method and electronic equipment
CN103617401A (en) Method and device for protecting data files
CN102609665A (en) Method and device for signing user program and method and device for verifying signature of user program
CN104486355A (en) Method and device for preventing malicious manipulation of codes
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
WO2019062015A1 (en) Source code protection method, application server, and computer-readable storage medium
CN110210211A (en) A kind of method of data protection and calculate equipment
CN103971034A (en) Method and device for protecting Java software
CN104583961A (en) Software-based side-channel attack prevention
CN109598105B (en) Method and device for safely loading firmware by microcontroller, computer equipment and storage medium
US20170169196A1 (en) Device and method for executing protected ios software modules
CN108182358B (en) File protection method and device, computing equipment and computer storage medium
CN106789051A (en) A kind of method for protecting file, device and computing device
CN108021790B (en) File protection method and device, computing equipment and computer storage medium
CN111209572A (en) Encryption and decryption-based safe startup method and system for Linux system
CN110990848A (en) Sensitive word encryption method and device based on hive data warehouse and storage medium
CN105224829A (en) Embedded system and content protecting method
CN110619219B (en) Application program source code protection method and device, computer equipment and storage medium
WO2017092222A1 (en) Multi-inter-domain file storage method and apparatus, and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171208

Termination date: 20190611