CN112948893A - Firmware encryption method based on batch hardware burning - Google Patents

Firmware encryption method based on batch hardware burning Download PDF

Info

Publication number
CN112948893A
CN112948893A CN202110422025.0A CN202110422025A CN112948893A CN 112948893 A CN112948893 A CN 112948893A CN 202110422025 A CN202110422025 A CN 202110422025A CN 112948893 A CN112948893 A CN 112948893A
Authority
CN
China
Prior art keywords
firmware
encryption
encrypted
hardware
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110422025.0A
Other languages
Chinese (zh)
Inventor
何松霖
高君效
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chipintelli Technology Co Ltd
Original Assignee
Chipintelli Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chipintelli Technology Co Ltd filed Critical Chipintelli Technology Co Ltd
Priority to CN202110422025.0A priority Critical patent/CN112948893A/en
Publication of CN112948893A publication Critical patent/CN112948893A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Abstract

A firmware encryption method based on batch hardware burning comprises hardware burning tool setting, an encryption process and a verification process; the hardware burning tool setting comprises: developing encryption algorithm software, wherein the encryption algorithm software comprises an object code selection module; inputting encryption algorithm software into a hardware burning tool, and setting object code definition information; the target code is any hardware identification code of the equipment to be encrypted; the encryption process comprises the following steps: after the encryption control unit acquires the object code definition information from the hardware burning tool, the encrypted equipment reads the object code of the encrypted equipment and sends the object code to the control unit; the control unit generates first firmware encryption data. The invention encrypts the unique target code as the equipment identification mark, thereby avoiding the possibility of repeated false making caused by copying the encrypted mark; the developer can design and encrypt the identification code by himself, and the confidentiality is high; the developed encryption algorithm is burnt in when the firmware is burnt, so that the production procedures are reduced, and the development efficiency is improved.

Description

Firmware encryption method based on batch hardware burning
Technical Field
The invention belongs to the technical field of software, and relates to an encryption technology; in particular to a firmware encryption method based on batch hardware burning.
Background
Consumer electronics generally have a significant development cost and are also available in a significant amount. Many electronic products are driven by chips, and the chips can realize the functions of special control and the like of equipment by operating program firmware. The firmware is generally stored in an eeprom chip of the electronic product device, and can be burned or upgraded by a user through a specific hardware burning tool, or the firmware stored in the eeprom chip can be read through the hardware burning tool. The development of the firmware needs cost, but if the developed firmware is not encrypted, a simulator can easily read the firmware through a tool and then directly copy the firmware, so that the rights and interests of the developer cannot be protected, and great market impact can be caused to the original developer, so that various firmware encryption protection technologies appear in the market. Even if the encrypted firmware is produced by plagiarism, the firmware cannot work normally when the encrypted firmware is replaced into other equipment, so that the purpose of preventing plagiarism is achieved.
The existing common firmware encryption method is as follows:
at present, a main control chip takes the encryption requirement into consideration, and a unique identification code is built in when the main control chip leaves a factory. The developer uses the unique identification code in the main control chip and adopts a preset encryption algorithm, firstly encrypts the unique identification code to obtain a ciphertext, then develops a decryption algorithm aiming at the encryption algorithm and the ciphertext into the firmware, so that the operation flow of the firmware program is changed into operation, firstly decrypts by using the decryption algorithm and the ciphertext, and compares the data obtained after decryption with the unique identification code read by the firmware in the main control chip, if the data is correct, the firmware program is continuously executed, and if the data is incorrect, the firmware program is not executed, and the equipment cannot normally work. The method adopts a special hardware burning tool, reads the unique identification code of each chip during production burning, encrypts the unique identification code and the encrypted firmware, and burns the encrypted text and the developed firmware into the electrically erasable memory chip of each corresponding device so as to ensure the uniqueness of the encrypted text. Because the unique identification codes of different main control chips are different, a plagiarizer cannot easily copy and produce by reading and copying even if using other main control chips of the same model, and the rights and interests of developers are protected.
In addition, because the main control chip is added with the unique identification code, the cost of the main control chip is increased, the main control chip of a plurality of consumer electronic products on the market does not have the unique identification code, and if the scheme of the products wants to encrypt the firmware, the firmware encryption can be realized by adding a special encryption chip in the scheme. The encryption chip is generally internally provided with an encryption algorithm, a hardware burning tool is required to assign different feature codes to different equipment when firmware is produced and burned into the encryption chip, the encryption chip is firstly called to be verified when the firmware runs, if the verification is passed, the functional program of the equipment is continuously executed, otherwise, the equipment is not executed, and the equipment cannot normally work. In the method, because the feature codes are mastered in the hands of developers and are encrypted, the plagiarizer cannot obtain the feature codes through a cracking way, and the protection effect is also achieved.
The above methods are currently used on a large scale in the market, but have some problems. At present, the electronic industry adopts a mode that scheme merchants develop and terminal brand customers process in a large quantity. Products developed by a solution maker are often popularized to a plurality of end brand customers. Different encryption protection levels and complexity required by different terminal brand clients are different, so different encryption algorithms are often adopted, the encryption algorithms are required to be fixed in the existing method when firmware is developed, so that firmware with the same specific control function often appears in the scheme vendor development process, only because the encryption algorithms are different, a plurality of versions appear, management is difficult, and the condition that the production of product equipment is influenced by wrong firmware is easily caused. Meanwhile, many consumption-level main control chips do not have unique identification codes, and if an encryption chip is adopted, the cost is increased, and the cost control of products is not facilitated.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention discloses a low-cost firmware encryption method convenient for customizing an encryption algorithm.
The invention relates to a firmware encryption method based on batch hardware burning, which comprises hardware burning tool setting, an encryption process and a verification process;
the hardware burning tool setting comprises:
s11, developing encryption algorithm software, wherein the encryption algorithm software comprises an object code selection module;
s12, inputting the encryption algorithm software into a hardware burning tool, and setting object code definition information;
the target code is any hardware identification code of the equipment to be encrypted;
s13, inputting the device firmware without encryption function into a hardware burning tool;
the encryption process comprises the following steps:
s21, connecting the hardware burning tool with the encrypted device;
s22, after acquiring the object code definition information from the hardware burning tool, the control unit of the hardware burning tool requests the encrypted device to read the object code, and the encrypted device reads the object code and sends the object code to the control unit;
s23, the control unit calls an encryption algorithm software from the hardware burning tool to encrypt the target code read from the encrypted equipment and generates first firmware encrypted data;
s24, the control unit loads the first firmware encryption data into the device firmware and transmits the first firmware encryption data and the encryption algorithm software to the encrypted device;
s25, the encrypted device writes the received first firmware encrypted data into the storage device;
the verification process comprises the following steps:
s31, the encrypted device reads the target code of the device, calls the encryption algorithm software pre-stored in the device to encrypt the unique target code, and generates second firmware encrypted data;
and S32, the encrypted equipment calls the first firmware encrypted data from the storage equipment, compares the first firmware encrypted data with the second firmware encrypted data, and judges the equipment to be legal if the comparison is successful if the first firmware encrypted data is completely consistent with the second firmware encrypted data.
Preferably: the encryption algorithm software exists in the form of a dynamically linked library or program binary file.
Preferably: the storage device of step S14 is an eeprom chip.
Preferably: the control unit and the encrypted equipment communicate through more than one serial bus of UART, USB, IIC and SPI.
Preferably, the hardware identification code is a feature code of the Flash memory.
The invention encrypts the unique target code as the equipment identification mark, thereby avoiding the possibility of repeated false making caused by copying the encrypted mark; the developer can design and develop an encryption algorithm by himself to encrypt the identification code, and the confidentiality is high; the developed encryption algorithm is burnt in when the firmware is burnt, so that the production procedures are reduced, and the development efficiency is improved.
Drawings
FIG. 1 is a diagram illustrating an embodiment of burning firmware in the present invention;
fig. 2 is a schematic diagram of an embodiment of a firmware encryption method according to the present invention.
Detailed Description
The following provides a more detailed description of the present invention.
The firmware encryption method based on batch hardware burning is characterized by comprising the following steps of (1) encrypting firmware based on batch hardware burning; setting a hardware burning tool, an encryption process and a verification process;
the hardware burning tool setting comprises:
s11, developing encryption algorithm software, wherein the encryption algorithm software comprises an object code selection module;
s12, inputting the encryption algorithm software into a hardware burning tool, and setting object code definition information;
the target code is any hardware identification code of the equipment to be encrypted;
s13, inputting the device firmware without encryption function into a hardware burning tool;
the encryption process comprises the following steps:
s21, connecting the hardware burning tool and the encryption control unit with the encrypted device;
s22, after acquiring the object code definition information from the hardware burning tool, the encryption control unit requests the encrypted device to read the object code, and the encrypted device reads the object code of itself and sends the object code to the control unit;
s23, the control unit calls an encryption algorithm software from the hardware burning tool to encrypt the target code read from the encrypted equipment and generates first firmware encrypted data;
s24, the control unit loads the first firmware encryption data into the device firmware and transmits the first firmware encryption data and the encryption algorithm software to the encrypted device;
s25, the encrypted device writes the received first firmware encrypted data into the storage device;
the verification process comprises the following steps:
s31, the encrypted device reads the target code of the device, calls the encryption algorithm software pre-stored in the device to encrypt the unique target code, and generates second firmware encrypted data;
and S32, the encrypted equipment calls the first firmware encrypted data from the storage equipment, compares the first firmware encrypted data with the second firmware encrypted data, and judges the equipment to be legal if the comparison is successful if the first firmware encrypted data is completely consistent with the second firmware encrypted data.
One embodiment of the whole encryption and decryption is shown in fig. 2.
The invention replaces the conventional common integral encryption firmware with equipment firmware without an encryption algorithm and encryption algorithm software which can be directly run on encrypted equipment, wherein the two parts of programs are stored in a hardware burning tool in advance, the programs are burnt into a memory in the equipment such as an electrically erasable memory chip through the hardware burning tool, and the equipment firmware without the encryption algorithm can dynamically load the encryption algorithm software to a fixed address of the memory and run when being started, thereby realizing the verification process of encryption.
The invention can also be used for controlling the hardware burning tool to specify the object code of the encryption algorithm software by a user, and the object code definition information of the encryption algorithm software is added into the equipment firmware by the hardware burning tool. The object code defined by the object code definition information can point to the unique identification code of the main control chip, and also can point to the unique feature codes of other devices such as a memory and the like, so that the encrypted object is expanded, and the encrypted object is not necessarily the unique identification code of the main control chip.
One practical procedure is as follows:
as shown in fig. 1, a user inputs a device firmware without an encryption algorithm and an encryption algorithm software that can be directly run on an encrypted device, which are developed in advance, into a hardware burning tool, configures the hardware burning tool, and can autonomously determine an object code of the encryption algorithm software and set object code definition information, such as a feature code pointing to a memory itself. After the hardware burning tool is started, the hardware burning tool automatically writes the encryption target identifier of the encryption algorithm software into the position corresponding to the firmware, and sends a service program to a main control chip in the device to be encrypted through the connection between the hardware burning tool and the device to be encrypted, wherein the service program is used for reading the encryption target.
The service program runs in an SRAM (static random access memory) in a main control chip of the equipment to be encrypted, encrypts a target identifier according to encryption algorithm software configured by a user, acquires a unique identifier code in the target, such as a feature code of a memory, and then sends the unique identifier code to a hardware burning tool;
calling encryption algorithm software by the hardware burning tool according to the unique identification code sent back by the service program, encrypting to generate first firmware encrypted data, and burning the first firmware encrypted data to a position corresponding to the equipment firmware;
the hardware burning tool burns the device firmware added with the encryption algorithm software and loaded with the first firmware encryption data into a memory of the device to be encrypted; and finishing the work of encrypting equipment firmware and burning.
In actual use of the encrypted device, the firmware verification process is as follows:
s31, the encrypted device reads the target code of the device, calls the encryption algorithm software pre-stored in the device to encrypt the unique target code, and generates second firmware encrypted data;
and S32, the encrypted equipment calls the first firmware encrypted data from the storage equipment, compares the first firmware encrypted data with the second firmware encrypted data, and judges the equipment to be legal if the comparison is successful if the first firmware encrypted data is completely consistent with the second firmware encrypted data.
By the method, the basic function firmware and the encryption algorithm are separated, so that a scheme manufacturer can only develop the basic function of the firmware without independently developing the encryption algorithm and considering the requirements of different terminal product manufacturers on encryption. After the firmware developed by the scheme manufacturer is sent to a terminal product manufacturer, the manufacturer in charge of production selects required encryption algorithm software by himself, and then carries out encryption and burning production of the firmware through a hardware burning tool, so that the problem that the existing encryption method is difficult to manage due to the fact that multiple versions are generated due to different requirements of the terminal product manufacturer is solved.
Meanwhile, the method can also specify an encrypted target code, the feature code built in the Flash memory for storing the firmware can be selected as the target code for encryption, most of the current Flash memories have the feature code, the feature code is unique, the encryption problem when the main control chip does not have the unique feature code can be solved, an additional encryption chip is not needed, a decryption step is not needed, and the scheme cost can be reduced.
The acquisition of the object code such as the feature code of the Flash memory can be read by accessing the Flash memory through the main control chip running service program of the encrypted device, so that the feature code of the Flash memory can be acquired and processed by the hardware burning tool through the service program running in the main control chip, the problem that the feature code on the main control chip can be encrypted only by communicating with the main control chip and acquiring the feature code in the main control chip in the traditional encryption method is solved, and the hardware burning tool and the device scheme hardware cost are not increased.
Through the appointed object code, the main control chip with the unique identification code can be compatible, or other devices with the unique identification code in the equipment to be encrypted are adopted, so that the compatibility is good.
In addition, when the firmware of the existing equipment is verified, the decryption library corresponding to the encryption library is usually called to decrypt the encrypted data of the first firmware, and an encryption code and a decryption code need to be prepared simultaneously.
One embodiment of the firmware encryption method of the present invention is shown in fig. 1.
The hardware burning tool is generally a server, a personal computer or an embedded programming hardware burning tool and other devices which store the encryption algorithm or can call the encryption algorithm through a network, and the hardware burning tool is communicated with each encrypted device and transmits data by using a serial bus.
The serial bus may be any serial communication bus for transmitting data between different devices, such as UART, USB, IIC, SPI, and other types of buses.
The encrypted equipment is an encrypted equipment unit with control and storage functions, realizes the encryption function by matching with the control unit and has an autonomous verification function. The embedded device product can be, for example, a voice television main control board, a voice air conditioner main control board, or a voice recognition chip CI1102 module board developed by the applicant.
The hardware burning tool is internally provided with control software, and can write a service program into a main control chip of the encrypted equipment through a serial bus, and directly write firmware into a memory of the encrypted equipment through the serial bus or indirectly write the firmware into the memory of the encrypted equipment through the main control chip of the encrypted equipment.
The object code is a non-modifiable code that is present in and bound to each encrypted device and is unique, i.e., the object code is not the same in any two devices of the same or different types.
In the invention, a developer can send the developed equipment firmware without the encryption algorithm to a manufacturer, the manufacturer producing the equipment to be encrypted can develop the encryption algorithm software which can directly run on the encrypted equipment by himself, when the firmware is burned, the equipment firmware and the encryption algorithm software are input into a hardware burning tool, the hardware burning tool is configured to designate an object code of the encryption algorithm software, such as a unique identification code pointing to a main control chip or a feature code of a Flash memory chip, then the equipment to be encrypted is connected to the hardware burning tool through a serial bus, and the hardware burning tool is started to execute the encryption burning work.
The specific implementation mode of the hardware burning tool before encryption is as follows:
step 1, equipment manufacturers develop own encryption algorithm software and compile the software into a dynamic link library or a program binary file;
step 2, the equipment manufacturer puts the dynamic link library or the program binary file into a hardware burning toolkit;
step 3, the equipment manufacturer provides the hardware burning toolkit and production data such as other equipment firmware and the like to a factory;
step 4, when a foundry uses a hardware burning tool to burn equipment firmware, setting object code definition information and selecting an encryption option, and designating a dynamic link library or a program binary file in a hardware burning tool package as an encryption tool; and simultaneously, inputting the device firmware without the encryption function into a hardware burning tool.
The invention encrypts the unique target code as the equipment identification mark, thereby avoiding the possibility of repeated false making caused by copying the encrypted mark; the developer can design and develop an encryption algorithm by himself to encrypt the identification code, and the confidentiality is high; the developed encryption algorithm is burnt in when the firmware is burnt, so that the production procedures are reduced, and the development efficiency is improved.
The foregoing is a description of preferred embodiments of the present invention, and the preferred embodiments in the preferred embodiments may be combined and combined in any combination, if not obviously contradictory or prerequisite to a certain preferred embodiment, and the specific parameters in the examples and the embodiments are only for the purpose of clearly illustrating the inventor's invention verification process and are not intended to limit the patent protection scope of the present invention, which is defined by the claims and the equivalent structural changes made by the content of the description of the present invention are also included in the protection scope of the present invention.

Claims (5)

1. A firmware encryption method based on batch hardware burning is characterized in that; setting a hardware burning tool, an encryption process and a verification process;
the hardware burning tool setting comprises:
s11, developing encryption algorithm software, wherein the encryption algorithm software comprises an object code selection module;
s12, inputting the encryption algorithm software into a hardware burning tool, and setting object code definition information;
the target code is any hardware identification code of the equipment to be encrypted;
s13, inputting the device firmware without encryption function into a hardware burning tool;
the encryption process comprises the following steps:
s21, connecting the hardware burning tool with the encrypted device;
s22, after acquiring the object code definition information from the hardware burning tool, the control unit of the hardware burning tool requests the encrypted device to read the object code, and the encrypted device reads the object code and sends the object code to the control unit;
s23, the control unit calls an encryption algorithm software from the hardware burning tool to encrypt the target code read from the encrypted equipment and generates first firmware encrypted data;
s24, the control unit loads the first firmware encryption data into the device firmware and transmits the first firmware encryption data and the encryption algorithm software to the encrypted device;
s25, the encrypted device writes the received first firmware encrypted data into the storage device;
the verification process comprises the following steps:
s31, the encrypted device reads the target code of the device, calls the encryption algorithm software pre-stored in the device to encrypt the unique target code, and generates second firmware encrypted data;
and S32, the encrypted equipment calls the first firmware encrypted data from the storage equipment, compares the first firmware encrypted data with the second firmware encrypted data, and judges the equipment to be legal if the comparison is successful if the first firmware encrypted data is completely consistent with the second firmware encrypted data.
2. The firmware encryption method that facilitates custom encryption algorithms of claim 1, wherein: the encryption algorithm software exists in the form of a dynamically linked library or program binary file.
3. The firmware encryption method that facilitates custom encryption algorithms of claim 1, wherein: the storage device of step S14 is an eeprom chip.
4. The firmware encryption method that facilitates custom encryption algorithms of claim 1, wherein: the control unit and the encrypted equipment communicate through more than one serial bus of UART, USB, IIC and SPI.
5. The firmware encryption method for facilitating custom encryption algorithm of claim 1, wherein the hardware identification code is a feature code of a Flash memory.
CN202110422025.0A 2021-04-20 2021-04-20 Firmware encryption method based on batch hardware burning Pending CN112948893A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110422025.0A CN112948893A (en) 2021-04-20 2021-04-20 Firmware encryption method based on batch hardware burning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110422025.0A CN112948893A (en) 2021-04-20 2021-04-20 Firmware encryption method based on batch hardware burning

Publications (1)

Publication Number Publication Date
CN112948893A true CN112948893A (en) 2021-06-11

Family

ID=76233000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110422025.0A Pending CN112948893A (en) 2021-04-20 2021-04-20 Firmware encryption method based on batch hardware burning

Country Status (1)

Country Link
CN (1) CN112948893A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115242492A (en) * 2022-07-19 2022-10-25 中国电信股份有限公司 Encryption method and device for firmware hard coding, electronic equipment and storage medium
CN116070293A (en) * 2023-03-09 2023-05-05 深圳市好盈科技股份有限公司 Processing method and device for firmware protection through chip encryption
CN116090031A (en) * 2023-03-08 2023-05-09 上海泰矽微电子有限公司 Firmware encryption method based on UUID of chip
CN116627456A (en) * 2023-05-15 2023-08-22 深圳市易优电气有限公司 Firmware upgrading system and method
WO2023230768A1 (en) * 2022-05-30 2023-12-07 北京小米移动软件有限公司 Battery encryption circuit, battery check method and apparatus, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080016395A1 (en) * 2006-07-14 2008-01-17 Marvell International Ltd. System-on-a-chip (SoC) test interface security
CN101968834A (en) * 2009-07-28 2011-02-09 上海移为通信技术有限公司 Encryption method and device for anti-copy plate of electronic product
CN104966003A (en) * 2015-06-12 2015-10-07 国电南京自动化股份有限公司 Encryption and verification method for embedded equipment
CN105069350A (en) * 2015-08-24 2015-11-18 上海繁易电子科技有限公司 Encryption method and apparatus for embedded operating system
CN109684789A (en) * 2018-11-19 2019-04-26 日立楼宇技术(广州)有限公司 The method, apparatus and computer equipment of Software security protection in embedded product

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080016395A1 (en) * 2006-07-14 2008-01-17 Marvell International Ltd. System-on-a-chip (SoC) test interface security
CN101968834A (en) * 2009-07-28 2011-02-09 上海移为通信技术有限公司 Encryption method and device for anti-copy plate of electronic product
CN104966003A (en) * 2015-06-12 2015-10-07 国电南京自动化股份有限公司 Encryption and verification method for embedded equipment
CN105069350A (en) * 2015-08-24 2015-11-18 上海繁易电子科技有限公司 Encryption method and apparatus for embedded operating system
CN109684789A (en) * 2018-11-19 2019-04-26 日立楼宇技术(广州)有限公司 The method, apparatus and computer equipment of Software security protection in embedded product

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023230768A1 (en) * 2022-05-30 2023-12-07 北京小米移动软件有限公司 Battery encryption circuit, battery check method and apparatus, device and storage medium
CN115242492A (en) * 2022-07-19 2022-10-25 中国电信股份有限公司 Encryption method and device for firmware hard coding, electronic equipment and storage medium
CN115242492B (en) * 2022-07-19 2024-01-30 中国电信股份有限公司 Firmware hard-coded encryption method, device, electronic equipment and storage medium
CN116090031A (en) * 2023-03-08 2023-05-09 上海泰矽微电子有限公司 Firmware encryption method based on UUID of chip
CN116070293A (en) * 2023-03-09 2023-05-05 深圳市好盈科技股份有限公司 Processing method and device for firmware protection through chip encryption
CN116627456A (en) * 2023-05-15 2023-08-22 深圳市易优电气有限公司 Firmware upgrading system and method

Similar Documents

Publication Publication Date Title
CN112948893A (en) Firmware encryption method based on batch hardware burning
CN100495420C (en) Portable date storing device
JP2007257635A (en) Device and method for controlling usage of memory card
US10268845B2 (en) Securing of the loading of data into a nonvolatile memory of a secure element
US7797504B2 (en) Device for processing information based on stored identifiers and a working method therof.
WO2003021403A1 (en) Method to protect software against unauthorized use
KR102007532B1 (en) Hardware security module with means to selectively activate or inhibit debugging and corresponding debugging method
KR101950512B1 (en) Hardware security module and method for processing therein
CN111596938A (en) Embedded equipment firmware safety upgrading method, system, terminal and storage medium
US7174465B2 (en) Secure method for system attribute modification
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
CN110471675B (en) Program burning method, system, device and computer readable storage medium
JP4236830B2 (en) Storage device with upload function
US9875048B2 (en) Solid state memory unit and method for protecting a memory including verification of a sequence of requests for access to physical blocks
CN107609415A (en) A kind of equipment Serial Number write protection method
JP6503560B2 (en) INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
JP6393171B2 (en) Information processing terminal and control program for information processing terminal
CN115729568A (en) Program burning protection method and device, burner and board card
CN114491589A (en) Chip encryption method and device and chip verification method and device
US20090187898A1 (en) Method for securely updating an autorun program and portable electronic entity executing it
CN113704773A (en) Relay protection safety chip operating system and communication method thereof
CN102098568B (en) Television data cloning method
CN101706726A (en) Method and system for upgrading information terminal
JP7211472B2 (en) Data writing method
CN108882217A (en) A kind of method and its bluetooth equipment of batch write-in Bluetooth MAC address

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210611

RJ01 Rejection of invention patent application after publication