CN105224829B - Embedded system and content protecting method - Google Patents
Embedded system and content protecting method Download PDFInfo
- Publication number
- CN105224829B CN105224829B CN201410259364.1A CN201410259364A CN105224829B CN 105224829 B CN105224829 B CN 105224829B CN 201410259364 A CN201410259364 A CN 201410259364A CN 105224829 B CN105224829 B CN 105224829B
- Authority
- CN
- China
- Prior art keywords
- key
- embedded system
- content protecting
- function
- embedded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a kind of embedded system for having content protecting ability, comprising safety integrated circuit, provided with identification key storage device, to store identification key;And system and device, provided with system key storage device, to stocking system key.System key is to be performed mathematical calculations by identification key and obtained with function array.When embedded system wants startup function, identification key is performed mathematical calculations with system key, thus obtains function array, starts the required function according to this.
Description
Technical field
The present invention is to be related to a kind of content protecting mechanism, more particularly to a kind of software protection framework of embedded system.
Background technology
Because the cost of software development is generally large in hardware, it is therefore desirable to software is protected using appropriate mechanism, with
Software is reduced to be illegally used or replicate.Figure 1A shows a kind of traditional software protection, for certain software function (or version
Originally) A has pass code A corresponding to one.When pass code A is confirmed to be effective, software function A could be started.Work as software upgrading
For function B when, as shown in Figure 1B, then need it is another corresponding to new pass code B could start software function B.User must will be
System sends factory back to be replaced by new pass code B, therefore causes the increase of cost and the inconvenience of user.
In order to improve among above-mentioned traditional software protection mechanism (Figure 1A, Figure 1B), user need to send system back to factory
It is not convenient, therefore have the proposition of another software protection, as illustrated in fig. 2.In such a software protection, user is only
Using single pass code C, different software functions stores different corresponding codes.If being software function C1 in system, when logical
When row code C is confirmed to be effective, i.e., it can start software function C1;If it is software function C2 in system, when pass code C is identified
For it is effective when, i.e., can start software function C2.For the software protection shown in Fig. 2, Software pirates (that is, it is illegal
Purchase upgrading software function C2 person) it is easy to illegally use soft by replicating software function C2 and coordinating original pass code C
Part function C2.
In view of traditional software protection mechanism can not effectively prevent software to be illegally used or replicate, therefore it is a kind of to need proposition badly
Novel software protection, the shortcomings that to improve traditional software protection mechanism.
The problem of existing in view of above-mentioned existing software protection, the present inventor are based on being engaged in such product design system
Abundant for many years practical experience and professional knowledge are made, and coordinates the utilization of scientific principle, is actively subject to research and innovation, to found one kind
New embedded system and content protecting method, general existing software protection can be improved, it is had more practicality.
By constantly research, design, and after studying sample repeatedly and improving, this hair having practical value is created finally
It is bright.
The content of the invention
In view of above-mentioned, it is a primary object of the present invention to, the problem of overcoming existing software protection to exist, and propose
A kind of embedded system for having content protecting ability, technical problem to be solved is to prevent content to be stolen.
The object of the invention to solve the technical problems is realized using following technical scheme.Itd is proposed according to the present invention
A kind of tool content protecting ability embedded system, include safety integrated circuit and system and device.Safety integrated circuit is provided with
Key storage device is identified, to store identification key.System and device is provided with system key storage device, to stocking system key.Wherein
System key is performed mathematical calculations by identification key and obtained with function array, and it is required that the function array represents embedded system
One or more functions.When embedded system will start the function, identification key and system key are subjected to another secondary mathematical operation,
Function array thus is obtained, starts the required function according to this.
The object of the invention to solve the technical problems can be also applied to the following technical measures to achieve further.
The embedded system of foregoing tool content protecting ability, wherein the identification key storage device include the read-only storage of light shield
Device or single programmable internal memory.
The embedded system of foregoing tool content protecting ability, wherein system key storage device include flash memory or electronics and can smeared
Except can program read-only memory.
The embedded system of foregoing tool content protecting ability, the wherein content include software.
The embedded system of foregoing tool content protecting ability, wherein in order to obtain the mathematical operation that the system key is carried out
And another secondary mathematical operation carried out to obtain the function array includes cryptographic calculation.
The embedded system of foregoing tool content protecting ability, the wherein function array representation is binary numeral, and with
Bit position represents the validity of the function.
The embedded system of foregoing tool content protecting ability, is further included:The embedded system checks the integrated electricity of the safety
Road whether there is.
The embedded system of foregoing tool content protecting ability, wherein another time carried out to obtain the function array
The step of mathematical operation, further includes:The function of inspecting obtained by another secondary mathematical operation carried out to obtain the function array
Whether array is correct.
The embedded system of foregoing tool content protecting ability, wherein the identification key of different embedded systems is different from each other,
And system key is also different from each other.
The embedded system of foregoing tool content protecting ability, wherein the identification key of same embedded system is to fix not
Become, and its system key can be because changing after software upgrading.
The object of the invention to solve the technical problems is also realized using following technical scheme.According to proposed by the present invention
A kind of content protecting method of embedded system, comprising:Identification key is performed mathematical calculations to obtain system key with function array,
The function array represents one or more required functions of the embedded system;The identification key is stored in safety integrated circuit;
The system key is stored in system and device;And when the embedded system will start the function, by the identification key and the system
Key carries out another secondary mathematical operation, thus obtains the function array, starts the required function according to this.
The object of the invention to solve the technical problems can be also applied to the following technical measures to achieve further.
The content protecting method of foregoing embedded system, wherein the identification key are stored in light shield read-only storage or single
Programmable internal memory.
The content protecting method of foregoing embedded system, the wherein system key are stored in flash memory or electronics can erase can journey
Sequence read-only storage.
The content protecting method of foregoing embedded system, the wherein content include software.
The content protecting method of foregoing embedded system, wherein in order to obtain mathematical operation that the system key carried out and
Another secondary mathematical operation carried out to obtain the function array includes cryptographic calculation.
The content protecting method of foregoing embedded system, wherein the function array representation are binary numeral, and with position
The validity of function described in first positional representation.
The content protecting method of foregoing embedded system, is further included:The embedded system checks the safety integrated circuit
It whether there is.
The content protecting method of foregoing embedded system, wherein another number carried out to obtain the function array
The step of student movement is calculated further includes:The function number inspected obtained by another secondary mathematical operation carried out to obtain the function array
Whether group is correct.
The content protecting method of foregoing embedded system, wherein the identification key of different embedded systems is different from each other, and
System key is also different from each other.
The content protecting method of foregoing embedded system, wherein the identification key of same embedded system is to immobilize,
And its system key can be because changing after software upgrading.
The present invention has clear advantage and beneficial effect compared with prior art.By above-mentioned technical proposal, the present invention
Embedded system and content protecting method at least have following advantages and beneficial effect:The present invention enters identification key with function array
Row mathematical operation is to obtain system key.When embedded system wants startup function, identification key is performed mathematical calculations with system key
Function array is can obtain, starts the required function of user according to this.Due to storing different knowledges in different embedded systems
Other key and system key, thus content can be prevented to be stolen.In addition, when being upgraded, user need not change identification key
And the function after upgrading can be used directly.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow the above and other objects, features and advantages of the present invention can
Become apparent, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, describe in detail as follows.
Brief description of the drawings
Figure 1A and Figure 1B shows a kind of traditional software protection.
Another traditional software protection of Fig. 2 displays.
Fig. 3 A show the system block diagram of the embedded system of the embodiment of the present invention.
Fig. 3 B are illustrated in Fig. 3 A identification key storage device and store identification key, and are stored in system key storage device
There is system key.
The corresponding relation of Fig. 3 C displays identification key and system key.
Fig. 4 shows the flow chart of the content protecting method of the embedded system of the embodiment of the present invention.
Fig. 5 illustrates the system block diagram of the embedded system of three users respectively.
Fig. 6 illustrates the system block diagram of the embedded system applied to software upgrading of the present embodiment.
【Main element symbol description】
300:Embedded system 300X:Embedded system
300Y:Embedded system 300Z:Embedded system
31:Safety integrated circuit 311:Identify key storage device
32:System and device 321:System key storage device
41:Safety integrated circuit whether there is 42:Mathematical operation
43:Operation result whether correct 44:Judge the function of software
Embodiment
Further to illustrate the present invention to reach the technological means and effect that predetermined goal of the invention is taken, below in conjunction with
Accompanying drawing and preferred embodiment, to according to embedded system proposed by the present invention and content protecting method its embodiment, side
Method, feature and its effect, describe in detail as after.
Fig. 3 A show the system block diagram of embedded (embedded) system 300 of the embodiment of the present invention, and it has protection
The ability of content (such as software).In the present embodiment, embedded system 300 mainly includes safety integrated circuit (security
IC) 31 with system and device 32.Although the safety integrated circuit 31 and system and device 32 shown in Fig. 3 A are what is separated, however, its
It may be integrally incorporated to together.
Safety integrated circuit 31 includes identification key (ID key) storage device 311, to store identification key.System and device
32 include system key (system key) storage device 321, and to stocking system key, it is corresponding to identification key.In this implementation
In example, light shield read-only storage (Mask ROM) can be used to implement for identification key storage device 311, or use single programmable
(one time programming, OTP) internal memory is implemented.Flash memory (flash) or electronics can be used in system key storage device 321
Can erase can program read-only memory (EEPROM) implement.
Fig. 3 B, which are illustrated in identification key storage device 311, stores identification key A, and is stored up in system key storage device 321
There is system key B.The identification key A and system key B of the present embodiment have corresponding relation, and still, in general, both contents are
Different.Fig. 3 C displays identification key A and system key B corresponding relation.In details of the words, according to user it is required one or more
Function F0, F1, F2 ... Fn, thus assign and obtain function array (function array), binary numeral can be used to carry out table for it
Show.If for example, customer requirement function F0, F1 and F4, the value of function array is represented by 00 ..., and 0010011 (position 0,1,4 is
" 1 ", and other positions are " 0 ").In other words, function array representation is binary numeral, and represents the function with bit position
Validity.Function array and identification key A are performed mathematical calculations, such as encryption (encryption) computing, thus be
Unite key B.When embedded system 300 will start software function, identification key A and system key B is performed mathematical calculations, such as encrypts
Computing, thus function array can be obtained, start one or more required software functions of user according to this.
Fig. 4 shows the flow chart of the content protecting method of the embedded system 300 of the embodiment of the present invention.System and device 32 exists
Before performing software, check that safety integrated circuit 31 whether there is in step 41.If it is present into step 42, calculation is used
Method (algorithm), such as AES, identification key A and system key B is performed mathematical calculations.Then, in step 43, inspect
Whether mathematical operation result (that is, function array) is correct.For example, inspect Cyclical Redundancy Check code (cyclic
Redundancy check, CRC)) whether it is correct.If correct, then into step 44, transported according to (step 42) mathematics
Calculate result, with judge user's demand for any or various software function.For example, if number obtained by step 42
The binary numeral for learning operation result be expressed as " 00 ... 0010011 ", be " 1 " through inspecting its position 0,1,4, thus learn demand
Software function is F0, F1 and F4.
Fig. 5 illustrates three users X, Y, Z embedded system 300X, 300Y, 300Z system block diagram respectively.At this
In individual example, user X identification key storage device 311 stores identification key A1, and system key storage device 321 then stores
Corresponding system key B1.User Y identification key storage device 311 stores identification key A2, and system key storage device 321 then stores up
There is corresponding system key B2.User Z identification key storage device 311, which stores, identifies key A3, and system key storage device 321
Then store corresponding system key B3.In general, identify that key A1, A2, A3 is different from each other, and system key B1, B2, B3 are also each other
It is different.Embodiment according to Fig. 5, due to storing different knowledges in different embedded system 300X, 300Y, 300Z
Other key and system key, therefore Software pirates can not be by replicating other people system key or software function and unauthorized use of software.
Fig. 6 illustrates the system block diagram of the embedded system 300 applied to software upgrading of the present embodiment.In this example
In, software function FI corresponding system key is B1, and the corresponding system key of the software function FII after upgrading is B2.When user closes
After method upgrading, its system key storage device 321 will be changed to stocking system key B2, but identify that key storage device 311 still stores
Identification key A1 originally.
According to embodiment illustrated in fig. 6, when carrying out software upgrading, user need not change identification key (that is, it is not necessary to will
Embedded system 300 sends factory back to replace safety integrated circuit 31), and the software function after upgrading can be used directly.In addition,
As previously described, because different embedded systems stores different identification key and system key, therefore Software pirates (that is,
Illegal purchase upgrading software function person) it is not easy by duplication and ripping software easily.
The above described is only a preferred embodiment of the present invention, any formal limitation not is made to the present invention, though
So the present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any to be familiar with this professional technology people
Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification
For the equivalent embodiment of equivalent variations, as long as being the content without departing from technical solution of the present invention, the technical spirit according to the present invention
Any simple modification, equivalent change and modification made to above example, in the range of still falling within technical solution of the present invention.
Claims (20)
1. a kind of embedded system for having content protecting ability, it is characterised in that include:
Safety integrated circuit, provided with identification key storage device, to store identification key;And
System and device, provided with system key storage device, to stocking system key;
Wherein the system key is to be performed mathematical calculations by the identification key and obtained with function array, and the function array represents the insertion
One or more required functions of formula system;
When the embedded system will start the function, the identification key and the system key are subjected to another secondary mathematical operation, because
And the function array is obtained, start the required function according to this.
2. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein the identification key stores up
Cryopreservation device includes light shield read-only storage or single programmable internal memory.
3. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein system key stores
Device can erase comprising flash memory or electronics can program read-only memory.
4. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein the content includes
Software.
5. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein in order to be somebody's turn to do
Mathematical operation that system key is carried out and another secondary mathematical operation carried out to obtain the function array include cryptographic calculation.
6. the embedded system of tool content protecting ability according to claim 1, it is characterised in that the wherein function array
Binary numeral is expressed as, and the validity of the function is represented with bit position.
7. the embedded system of tool content protecting ability according to claim 1, it is characterised in that further include:
The embedded system checks that the safety integrated circuit whether there is.
8. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein in order to be somebody's turn to do
Function array and further include the step of another secondary mathematical operation carried out:
Whether the function array inspected obtained by another secondary mathematical operation carried out to obtain the function array is correct.
9. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein different embedded
The identification key of system is different from each other, and system key is also different from each other.
10. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein same embedded
The identification key of system is immobilizes, and its system key can be because changing after software upgrading.
11. a kind of content protecting method of embedded system, it is characterised in that include:
Identification key is performed mathematical calculations to obtain system key with function array, the function array is represented needed for the embedded system
One or more functions of asking;
The identification key is stored in safety integrated circuit;
The system key is stored in system and device;And
When the embedded system will start the function, the identification key and the system key are subjected to another secondary mathematical operation, because
And the function array is obtained, start the required function according to this.
12. the content protecting method of embedded system according to claim 11, it is characterised in that wherein the identification key stores up
It is stored in light shield read-only storage or single programmable internal memory.
13. the content protecting method of embedded system according to claim 11, it is characterised in that wherein the system key stores up
Be stored in flash memory or electronics can erase can program read-only memory.
14. the content protecting method of embedded system according to claim 11, it is characterised in that wherein the content includes
Software.
15. the content protecting method of embedded system according to claim 11, it is characterised in that wherein in order to be somebody's turn to do
Mathematical operation that system key is carried out and another secondary mathematical operation carried out to obtain the function array include cryptographic calculation.
16. the content protecting method of embedded system according to claim 11, it is characterised in that the wherein function array
Binary numeral is expressed as, and the validity of the function is represented with bit position.
17. the content protecting method of embedded system according to claim 11, it is characterised in that further include:
The embedded system checks that the safety integrated circuit whether there is.
18. the content protecting method of embedded system according to claim 11, it is characterised in that wherein in order to be somebody's turn to do
Function array and further include the step of another secondary mathematical operation carried out:
Whether the function array inspected obtained by another secondary mathematical operation carried out to obtain the function array is correct.
19. the content protecting method of embedded system according to claim 11, it is characterised in that wherein different embedded
The identification key of system is different from each other, and system key is also different from each other.
20. the content protecting method of embedded system according to claim 11, it is characterised in that wherein same embedded
The identification key of system is immobilizes, and its system key can be because changing after software upgrading.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410259364.1A CN105224829B (en) | 2014-06-11 | 2014-06-11 | Embedded system and content protecting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410259364.1A CN105224829B (en) | 2014-06-11 | 2014-06-11 | Embedded system and content protecting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105224829A CN105224829A (en) | 2016-01-06 |
CN105224829B true CN105224829B (en) | 2017-12-08 |
Family
ID=54993794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410259364.1A Expired - Fee Related CN105224829B (en) | 2014-06-11 | 2014-06-11 | Embedded system and content protecting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105224829B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1103728A (en) * | 1994-05-03 | 1995-06-14 | 陈龙森 | Enciphering protection method and apparatus for software of computer |
US6587842B1 (en) * | 1999-10-01 | 2003-07-01 | Keith Watts | Software-based protection system for software products distributed on copyable media, or downloaded over a communications link |
CN1561026A (en) * | 2004-02-20 | 2005-01-05 | 胡祥义 | Method for preventing pirate based on ciphered algorithmic technique |
CN1987882A (en) * | 2005-12-23 | 2007-06-27 | 联想(北京)有限公司 | Software protecting method and system based on safety chip |
CN102708310A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Registration code anti-piracy encryption method for computer software in batch production |
EP2525301A1 (en) * | 2011-05-19 | 2012-11-21 | Thomson Licensing | Syntax-preserving software protection |
-
2014
- 2014-06-11 CN CN201410259364.1A patent/CN105224829B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1103728A (en) * | 1994-05-03 | 1995-06-14 | 陈龙森 | Enciphering protection method and apparatus for software of computer |
US6587842B1 (en) * | 1999-10-01 | 2003-07-01 | Keith Watts | Software-based protection system for software products distributed on copyable media, or downloaded over a communications link |
CN1561026A (en) * | 2004-02-20 | 2005-01-05 | 胡祥义 | Method for preventing pirate based on ciphered algorithmic technique |
CN1987882A (en) * | 2005-12-23 | 2007-06-27 | 联想(北京)有限公司 | Software protecting method and system based on safety chip |
EP2525301A1 (en) * | 2011-05-19 | 2012-11-21 | Thomson Licensing | Syntax-preserving software protection |
CN102708310A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Registration code anti-piracy encryption method for computer software in batch production |
Non-Patent Citations (1)
Title |
---|
"基于RSA数字签名的软件保护方案";周书锋,孙玉真;《计算机应用与软件》;20080331;第25卷(第3期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN105224829A (en) | 2016-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104156642B (en) | A kind of security password input system and method based on safe touch screen control chip | |
CN105683990B (en) | Method and apparatus for protecting dynamic base | |
CN109313677B (en) | Method and apparatus for dynamically executable verification | |
RU2017131519A (en) | SYSTEMS AND METHODS OF SAFE HANDLING WITH BIOMETRIC DATA | |
CN103425909B (en) | Control system, control device and program execution control method | |
RU2595967C2 (en) | Method of operating tachograph and tachograph | |
EP2831800B1 (en) | Method for protecting data | |
CN106326693A (en) | Obfuscation method and obfuscation device for application program code | |
CN106953724A (en) | The method of dynamic encryption formula fingerprint sensor and dynamic encryption finger print data | |
EP2728509A3 (en) | Semiconductor Device and Encryption Key Writing Method | |
CN106503494A (en) | A kind of firmware protection location and guard method with flash memory microcontroller on piece | |
US20110271350A1 (en) | method for protecting software | |
CN109086578A (en) | A kind of method that soft ware authorization uses, equipment and storage medium | |
US10430596B2 (en) | Information processing method, terminal and nonvolatile machine-readable medium | |
CN109446757B (en) | Method for protecting general MCU program | |
US20130117578A1 (en) | Method for verifying a memory block of a nonvolatile memory | |
CN107784226A (en) | The method and system that code is maliciously tampered are prevented using rivest, shamir, adelman | |
GB2600212A (en) | Data privacy system | |
CN105740661B (en) | A kind of method and apparatus for protecting application program | |
CN101888627B (en) | Mobile terminal and system data protection method thereof | |
CN104281415A (en) | Data processing method and device for air conditioner | |
CN105224829B (en) | Embedded system and content protecting method | |
KR20150069844A (en) | Method of Obfuscating Files Based on Advanced RISC Machine Processor | |
CN104504336A (en) | Method and device for preventing embedded system from being maliciously debugged online | |
CN104462932A (en) | Method for generating and verifying maintenance password of embedded device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171208 Termination date: 20190611 |
|
CF01 | Termination of patent right due to non-payment of annual fee |