CN105224829B - Embedded system and content protecting method - Google Patents

Embedded system and content protecting method Download PDF

Info

Publication number
CN105224829B
CN105224829B CN201410259364.1A CN201410259364A CN105224829B CN 105224829 B CN105224829 B CN 105224829B CN 201410259364 A CN201410259364 A CN 201410259364A CN 105224829 B CN105224829 B CN 105224829B
Authority
CN
China
Prior art keywords
key
embedded system
content protecting
function
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410259364.1A
Other languages
Chinese (zh)
Other versions
CN105224829A (en
Inventor
谢思谦
阮腾辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weintek Labs Inc
Original Assignee
Weintek Labs Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weintek Labs Inc filed Critical Weintek Labs Inc
Priority to CN201410259364.1A priority Critical patent/CN105224829B/en
Publication of CN105224829A publication Critical patent/CN105224829A/en
Application granted granted Critical
Publication of CN105224829B publication Critical patent/CN105224829B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a kind of embedded system for having content protecting ability, comprising safety integrated circuit, provided with identification key storage device, to store identification key;And system and device, provided with system key storage device, to stocking system key.System key is to be performed mathematical calculations by identification key and obtained with function array.When embedded system wants startup function, identification key is performed mathematical calculations with system key, thus obtains function array, starts the required function according to this.

Description

Embedded system and content protecting method
Technical field
The present invention is to be related to a kind of content protecting mechanism, more particularly to a kind of software protection framework of embedded system.
Background technology
Because the cost of software development is generally large in hardware, it is therefore desirable to software is protected using appropriate mechanism, with Software is reduced to be illegally used or replicate.Figure 1A shows a kind of traditional software protection, for certain software function (or version Originally) A has pass code A corresponding to one.When pass code A is confirmed to be effective, software function A could be started.Work as software upgrading For function B when, as shown in Figure 1B, then need it is another corresponding to new pass code B could start software function B.User must will be System sends factory back to be replaced by new pass code B, therefore causes the increase of cost and the inconvenience of user.
In order to improve among above-mentioned traditional software protection mechanism (Figure 1A, Figure 1B), user need to send system back to factory It is not convenient, therefore have the proposition of another software protection, as illustrated in fig. 2.In such a software protection, user is only Using single pass code C, different software functions stores different corresponding codes.If being software function C1 in system, when logical When row code C is confirmed to be effective, i.e., it can start software function C1;If it is software function C2 in system, when pass code C is identified For it is effective when, i.e., can start software function C2.For the software protection shown in Fig. 2, Software pirates (that is, it is illegal Purchase upgrading software function C2 person) it is easy to illegally use soft by replicating software function C2 and coordinating original pass code C Part function C2.
In view of traditional software protection mechanism can not effectively prevent software to be illegally used or replicate, therefore it is a kind of to need proposition badly Novel software protection, the shortcomings that to improve traditional software protection mechanism.
The problem of existing in view of above-mentioned existing software protection, the present inventor are based on being engaged in such product design system Abundant for many years practical experience and professional knowledge are made, and coordinates the utilization of scientific principle, is actively subject to research and innovation, to found one kind New embedded system and content protecting method, general existing software protection can be improved, it is had more practicality. By constantly research, design, and after studying sample repeatedly and improving, this hair having practical value is created finally It is bright.
The content of the invention
In view of above-mentioned, it is a primary object of the present invention to, the problem of overcoming existing software protection to exist, and propose A kind of embedded system for having content protecting ability, technical problem to be solved is to prevent content to be stolen.
The object of the invention to solve the technical problems is realized using following technical scheme.Itd is proposed according to the present invention A kind of tool content protecting ability embedded system, include safety integrated circuit and system and device.Safety integrated circuit is provided with Key storage device is identified, to store identification key.System and device is provided with system key storage device, to stocking system key.Wherein System key is performed mathematical calculations by identification key and obtained with function array, and it is required that the function array represents embedded system One or more functions.When embedded system will start the function, identification key and system key are subjected to another secondary mathematical operation, Function array thus is obtained, starts the required function according to this.
The object of the invention to solve the technical problems can be also applied to the following technical measures to achieve further.
The embedded system of foregoing tool content protecting ability, wherein the identification key storage device include the read-only storage of light shield Device or single programmable internal memory.
The embedded system of foregoing tool content protecting ability, wherein system key storage device include flash memory or electronics and can smeared Except can program read-only memory.
The embedded system of foregoing tool content protecting ability, the wherein content include software.
The embedded system of foregoing tool content protecting ability, wherein in order to obtain the mathematical operation that the system key is carried out And another secondary mathematical operation carried out to obtain the function array includes cryptographic calculation.
The embedded system of foregoing tool content protecting ability, the wherein function array representation is binary numeral, and with Bit position represents the validity of the function.
The embedded system of foregoing tool content protecting ability, is further included:The embedded system checks the integrated electricity of the safety Road whether there is.
The embedded system of foregoing tool content protecting ability, wherein another time carried out to obtain the function array The step of mathematical operation, further includes:The function of inspecting obtained by another secondary mathematical operation carried out to obtain the function array Whether array is correct.
The embedded system of foregoing tool content protecting ability, wherein the identification key of different embedded systems is different from each other, And system key is also different from each other.
The embedded system of foregoing tool content protecting ability, wherein the identification key of same embedded system is to fix not Become, and its system key can be because changing after software upgrading.
The object of the invention to solve the technical problems is also realized using following technical scheme.According to proposed by the present invention A kind of content protecting method of embedded system, comprising:Identification key is performed mathematical calculations to obtain system key with function array, The function array represents one or more required functions of the embedded system;The identification key is stored in safety integrated circuit; The system key is stored in system and device;And when the embedded system will start the function, by the identification key and the system Key carries out another secondary mathematical operation, thus obtains the function array, starts the required function according to this.
The object of the invention to solve the technical problems can be also applied to the following technical measures to achieve further.
The content protecting method of foregoing embedded system, wherein the identification key are stored in light shield read-only storage or single Programmable internal memory.
The content protecting method of foregoing embedded system, the wherein system key are stored in flash memory or electronics can erase can journey Sequence read-only storage.
The content protecting method of foregoing embedded system, the wherein content include software.
The content protecting method of foregoing embedded system, wherein in order to obtain mathematical operation that the system key carried out and Another secondary mathematical operation carried out to obtain the function array includes cryptographic calculation.
The content protecting method of foregoing embedded system, wherein the function array representation are binary numeral, and with position The validity of function described in first positional representation.
The content protecting method of foregoing embedded system, is further included:The embedded system checks the safety integrated circuit It whether there is.
The content protecting method of foregoing embedded system, wherein another number carried out to obtain the function array The step of student movement is calculated further includes:The function number inspected obtained by another secondary mathematical operation carried out to obtain the function array Whether group is correct.
The content protecting method of foregoing embedded system, wherein the identification key of different embedded systems is different from each other, and System key is also different from each other.
The content protecting method of foregoing embedded system, wherein the identification key of same embedded system is to immobilize, And its system key can be because changing after software upgrading.
The present invention has clear advantage and beneficial effect compared with prior art.By above-mentioned technical proposal, the present invention Embedded system and content protecting method at least have following advantages and beneficial effect:The present invention enters identification key with function array Row mathematical operation is to obtain system key.When embedded system wants startup function, identification key is performed mathematical calculations with system key Function array is can obtain, starts the required function of user according to this.Due to storing different knowledges in different embedded systems Other key and system key, thus content can be prevented to be stolen.In addition, when being upgraded, user need not change identification key And the function after upgrading can be used directly.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow the above and other objects, features and advantages of the present invention can Become apparent, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, describe in detail as follows.
Brief description of the drawings
Figure 1A and Figure 1B shows a kind of traditional software protection.
Another traditional software protection of Fig. 2 displays.
Fig. 3 A show the system block diagram of the embedded system of the embodiment of the present invention.
Fig. 3 B are illustrated in Fig. 3 A identification key storage device and store identification key, and are stored in system key storage device There is system key.
The corresponding relation of Fig. 3 C displays identification key and system key.
Fig. 4 shows the flow chart of the content protecting method of the embedded system of the embodiment of the present invention.
Fig. 5 illustrates the system block diagram of the embedded system of three users respectively.
Fig. 6 illustrates the system block diagram of the embedded system applied to software upgrading of the present embodiment.
【Main element symbol description】
300:Embedded system 300X:Embedded system
300Y:Embedded system 300Z:Embedded system
31:Safety integrated circuit 311:Identify key storage device
32:System and device 321:System key storage device
41:Safety integrated circuit whether there is 42:Mathematical operation
43:Operation result whether correct 44:Judge the function of software
Embodiment
Further to illustrate the present invention to reach the technological means and effect that predetermined goal of the invention is taken, below in conjunction with Accompanying drawing and preferred embodiment, to according to embedded system proposed by the present invention and content protecting method its embodiment, side Method, feature and its effect, describe in detail as after.
Fig. 3 A show the system block diagram of embedded (embedded) system 300 of the embodiment of the present invention, and it has protection The ability of content (such as software).In the present embodiment, embedded system 300 mainly includes safety integrated circuit (security IC) 31 with system and device 32.Although the safety integrated circuit 31 and system and device 32 shown in Fig. 3 A are what is separated, however, its It may be integrally incorporated to together.
Safety integrated circuit 31 includes identification key (ID key) storage device 311, to store identification key.System and device 32 include system key (system key) storage device 321, and to stocking system key, it is corresponding to identification key.In this implementation In example, light shield read-only storage (Mask ROM) can be used to implement for identification key storage device 311, or use single programmable (one time programming, OTP) internal memory is implemented.Flash memory (flash) or electronics can be used in system key storage device 321 Can erase can program read-only memory (EEPROM) implement.
Fig. 3 B, which are illustrated in identification key storage device 311, stores identification key A, and is stored up in system key storage device 321 There is system key B.The identification key A and system key B of the present embodiment have corresponding relation, and still, in general, both contents are Different.Fig. 3 C displays identification key A and system key B corresponding relation.In details of the words, according to user it is required one or more Function F0, F1, F2 ... Fn, thus assign and obtain function array (function array), binary numeral can be used to carry out table for it Show.If for example, customer requirement function F0, F1 and F4, the value of function array is represented by 00 ..., and 0010011 (position 0,1,4 is " 1 ", and other positions are " 0 ").In other words, function array representation is binary numeral, and represents the function with bit position Validity.Function array and identification key A are performed mathematical calculations, such as encryption (encryption) computing, thus be Unite key B.When embedded system 300 will start software function, identification key A and system key B is performed mathematical calculations, such as encrypts Computing, thus function array can be obtained, start one or more required software functions of user according to this.
Fig. 4 shows the flow chart of the content protecting method of the embedded system 300 of the embodiment of the present invention.System and device 32 exists Before performing software, check that safety integrated circuit 31 whether there is in step 41.If it is present into step 42, calculation is used Method (algorithm), such as AES, identification key A and system key B is performed mathematical calculations.Then, in step 43, inspect Whether mathematical operation result (that is, function array) is correct.For example, inspect Cyclical Redundancy Check code (cyclic Redundancy check, CRC)) whether it is correct.If correct, then into step 44, transported according to (step 42) mathematics Calculate result, with judge user's demand for any or various software function.For example, if number obtained by step 42 The binary numeral for learning operation result be expressed as " 00 ... 0010011 ", be " 1 " through inspecting its position 0,1,4, thus learn demand Software function is F0, F1 and F4.
Fig. 5 illustrates three users X, Y, Z embedded system 300X, 300Y, 300Z system block diagram respectively.At this In individual example, user X identification key storage device 311 stores identification key A1, and system key storage device 321 then stores Corresponding system key B1.User Y identification key storage device 311 stores identification key A2, and system key storage device 321 then stores up There is corresponding system key B2.User Z identification key storage device 311, which stores, identifies key A3, and system key storage device 321 Then store corresponding system key B3.In general, identify that key A1, A2, A3 is different from each other, and system key B1, B2, B3 are also each other It is different.Embodiment according to Fig. 5, due to storing different knowledges in different embedded system 300X, 300Y, 300Z Other key and system key, therefore Software pirates can not be by replicating other people system key or software function and unauthorized use of software.
Fig. 6 illustrates the system block diagram of the embedded system 300 applied to software upgrading of the present embodiment.In this example In, software function FI corresponding system key is B1, and the corresponding system key of the software function FII after upgrading is B2.When user closes After method upgrading, its system key storage device 321 will be changed to stocking system key B2, but identify that key storage device 311 still stores Identification key A1 originally.
According to embodiment illustrated in fig. 6, when carrying out software upgrading, user need not change identification key (that is, it is not necessary to will Embedded system 300 sends factory back to replace safety integrated circuit 31), and the software function after upgrading can be used directly.In addition, As previously described, because different embedded systems stores different identification key and system key, therefore Software pirates (that is, Illegal purchase upgrading software function person) it is not easy by duplication and ripping software easily.
The above described is only a preferred embodiment of the present invention, any formal limitation not is made to the present invention, though So the present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any to be familiar with this professional technology people Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification For the equivalent embodiment of equivalent variations, as long as being the content without departing from technical solution of the present invention, the technical spirit according to the present invention Any simple modification, equivalent change and modification made to above example, in the range of still falling within technical solution of the present invention.

Claims (20)

1. a kind of embedded system for having content protecting ability, it is characterised in that include:
Safety integrated circuit, provided with identification key storage device, to store identification key;And
System and device, provided with system key storage device, to stocking system key;
Wherein the system key is to be performed mathematical calculations by the identification key and obtained with function array, and the function array represents the insertion One or more required functions of formula system;
When the embedded system will start the function, the identification key and the system key are subjected to another secondary mathematical operation, because And the function array is obtained, start the required function according to this.
2. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein the identification key stores up Cryopreservation device includes light shield read-only storage or single programmable internal memory.
3. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein system key stores Device can erase comprising flash memory or electronics can program read-only memory.
4. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein the content includes Software.
5. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein in order to be somebody's turn to do Mathematical operation that system key is carried out and another secondary mathematical operation carried out to obtain the function array include cryptographic calculation.
6. the embedded system of tool content protecting ability according to claim 1, it is characterised in that the wherein function array Binary numeral is expressed as, and the validity of the function is represented with bit position.
7. the embedded system of tool content protecting ability according to claim 1, it is characterised in that further include:
The embedded system checks that the safety integrated circuit whether there is.
8. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein in order to be somebody's turn to do Function array and further include the step of another secondary mathematical operation carried out:
Whether the function array inspected obtained by another secondary mathematical operation carried out to obtain the function array is correct.
9. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein different embedded The identification key of system is different from each other, and system key is also different from each other.
10. the embedded system of tool content protecting ability according to claim 1, it is characterised in that wherein same embedded The identification key of system is immobilizes, and its system key can be because changing after software upgrading.
11. a kind of content protecting method of embedded system, it is characterised in that include:
Identification key is performed mathematical calculations to obtain system key with function array, the function array is represented needed for the embedded system One or more functions of asking;
The identification key is stored in safety integrated circuit;
The system key is stored in system and device;And
When the embedded system will start the function, the identification key and the system key are subjected to another secondary mathematical operation, because And the function array is obtained, start the required function according to this.
12. the content protecting method of embedded system according to claim 11, it is characterised in that wherein the identification key stores up It is stored in light shield read-only storage or single programmable internal memory.
13. the content protecting method of embedded system according to claim 11, it is characterised in that wherein the system key stores up Be stored in flash memory or electronics can erase can program read-only memory.
14. the content protecting method of embedded system according to claim 11, it is characterised in that wherein the content includes Software.
15. the content protecting method of embedded system according to claim 11, it is characterised in that wherein in order to be somebody's turn to do Mathematical operation that system key is carried out and another secondary mathematical operation carried out to obtain the function array include cryptographic calculation.
16. the content protecting method of embedded system according to claim 11, it is characterised in that the wherein function array Binary numeral is expressed as, and the validity of the function is represented with bit position.
17. the content protecting method of embedded system according to claim 11, it is characterised in that further include:
The embedded system checks that the safety integrated circuit whether there is.
18. the content protecting method of embedded system according to claim 11, it is characterised in that wherein in order to be somebody's turn to do Function array and further include the step of another secondary mathematical operation carried out:
Whether the function array inspected obtained by another secondary mathematical operation carried out to obtain the function array is correct.
19. the content protecting method of embedded system according to claim 11, it is characterised in that wherein different embedded The identification key of system is different from each other, and system key is also different from each other.
20. the content protecting method of embedded system according to claim 11, it is characterised in that wherein same embedded The identification key of system is immobilizes, and its system key can be because changing after software upgrading.
CN201410259364.1A 2014-06-11 2014-06-11 Embedded system and content protecting method Expired - Fee Related CN105224829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410259364.1A CN105224829B (en) 2014-06-11 2014-06-11 Embedded system and content protecting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410259364.1A CN105224829B (en) 2014-06-11 2014-06-11 Embedded system and content protecting method

Publications (2)

Publication Number Publication Date
CN105224829A CN105224829A (en) 2016-01-06
CN105224829B true CN105224829B (en) 2017-12-08

Family

ID=54993794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410259364.1A Expired - Fee Related CN105224829B (en) 2014-06-11 2014-06-11 Embedded system and content protecting method

Country Status (1)

Country Link
CN (1) CN105224829B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1103728A (en) * 1994-05-03 1995-06-14 陈龙森 Enciphering protection method and apparatus for software of computer
US6587842B1 (en) * 1999-10-01 2003-07-01 Keith Watts Software-based protection system for software products distributed on copyable media, or downloaded over a communications link
CN1561026A (en) * 2004-02-20 2005-01-05 胡祥义 Method for preventing pirate based on ciphered algorithmic technique
CN1987882A (en) * 2005-12-23 2007-06-27 联想(北京)有限公司 Software protecting method and system based on safety chip
CN102708310A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Registration code anti-piracy encryption method for computer software in batch production
EP2525301A1 (en) * 2011-05-19 2012-11-21 Thomson Licensing Syntax-preserving software protection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1103728A (en) * 1994-05-03 1995-06-14 陈龙森 Enciphering protection method and apparatus for software of computer
US6587842B1 (en) * 1999-10-01 2003-07-01 Keith Watts Software-based protection system for software products distributed on copyable media, or downloaded over a communications link
CN1561026A (en) * 2004-02-20 2005-01-05 胡祥义 Method for preventing pirate based on ciphered algorithmic technique
CN1987882A (en) * 2005-12-23 2007-06-27 联想(北京)有限公司 Software protecting method and system based on safety chip
EP2525301A1 (en) * 2011-05-19 2012-11-21 Thomson Licensing Syntax-preserving software protection
CN102708310A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Registration code anti-piracy encryption method for computer software in batch production

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于RSA数字签名的软件保护方案";周书锋,孙玉真;《计算机应用与软件》;20080331;第25卷(第3期);全文 *

Also Published As

Publication number Publication date
CN105224829A (en) 2016-01-06

Similar Documents

Publication Publication Date Title
CN104156642B (en) A kind of security password input system and method based on safe touch screen control chip
CN105683990B (en) Method and apparatus for protecting dynamic base
CN109313677B (en) Method and apparatus for dynamically executable verification
RU2017131519A (en) SYSTEMS AND METHODS OF SAFE HANDLING WITH BIOMETRIC DATA
CN103425909B (en) Control system, control device and program execution control method
RU2595967C2 (en) Method of operating tachograph and tachograph
EP2831800B1 (en) Method for protecting data
CN106326693A (en) Obfuscation method and obfuscation device for application program code
CN106953724A (en) The method of dynamic encryption formula fingerprint sensor and dynamic encryption finger print data
EP2728509A3 (en) Semiconductor Device and Encryption Key Writing Method
CN106503494A (en) A kind of firmware protection location and guard method with flash memory microcontroller on piece
US20110271350A1 (en) method for protecting software
CN109086578A (en) A kind of method that soft ware authorization uses, equipment and storage medium
US10430596B2 (en) Information processing method, terminal and nonvolatile machine-readable medium
CN109446757B (en) Method for protecting general MCU program
US20130117578A1 (en) Method for verifying a memory block of a nonvolatile memory
CN107784226A (en) The method and system that code is maliciously tampered are prevented using rivest, shamir, adelman
GB2600212A (en) Data privacy system
CN105740661B (en) A kind of method and apparatus for protecting application program
CN101888627B (en) Mobile terminal and system data protection method thereof
CN104281415A (en) Data processing method and device for air conditioner
CN105224829B (en) Embedded system and content protecting method
KR20150069844A (en) Method of Obfuscating Files Based on Advanced RISC Machine Processor
CN104504336A (en) Method and device for preventing embedded system from being maliciously debugged online
CN104462932A (en) Method for generating and verifying maintenance password of embedded device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171208

Termination date: 20190611

CF01 Termination of patent right due to non-payment of annual fee