CN117827510A - MCU chip software and hardware integrated anti-counterfeiting method - Google Patents

MCU chip software and hardware integrated anti-counterfeiting method Download PDF

Info

Publication number
CN117827510A
CN117827510A CN202311778320.5A CN202311778320A CN117827510A CN 117827510 A CN117827510 A CN 117827510A CN 202311778320 A CN202311778320 A CN 202311778320A CN 117827510 A CN117827510 A CN 117827510A
Authority
CN
China
Prior art keywords
data
server
mcu
information
time stamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311778320.5A
Other languages
Chinese (zh)
Inventor
曾波
石云波
要志礼
杨志明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Shujun Microelectronics Co ltd
Original Assignee
Chengdu Shujun Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Shujun Microelectronics Co ltd filed Critical Chengdu Shujun Microelectronics Co ltd
Priority to CN202311778320.5A priority Critical patent/CN117827510A/en
Publication of CN117827510A publication Critical patent/CN117827510A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

An MCU chip software and hardware integrated anti-counterfeiting method relates to a computer technology and an integrated circuit technology. The invention comprises the following steps: (1) The client software reads the ID data of the MCU, and attaches a using time stamp to obtain first data; (2) the client software transmitting the first data to the server; (3) The server reads the first data, obtains the ID and the using place time stamp, and records the ID information; (4) The server checks the ID, and if the ID passes, check passing information is returned to the client software; if not, returning rejection information to the client software or not returning; (5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated. The invention can effectively prevent the MCU processor from being counterfeited and pirated, ensure the safety and the legality of products and effectively avoid the inferior chips from being put into use.

Description

MCU chip software and hardware integrated anti-counterfeiting method
Technical Field
The present invention relates to computer technology and integrated circuit technology.
Background
MCU, the full name Micro Control Unit, namely microcontroller, can provide corresponding control action according to different user program designs, and is widely applied in fields such as industrial production, life and the like.
However, the conventional MCU (Microcontroller Unit) processor has the problems of counterfeiting, imitation and the like in application, and causes great hidden trouble to users.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an MCU anti-counterfeiting mechanism which can effectively prevent an illegal MCU from entering a terminal product using link.
The technical scheme adopted by the invention for solving the technical problems is that the MCU chip software and hardware integrated anti-counterfeiting method comprises the following steps:
(1) The client software reads the ID data of the MCU, and attaches a using time stamp to the ID data to obtain first data, wherein the ID data is solidified in the MCU slice;
(2) The client software transmits the first data to the server;
(3) The server reads the first data, obtains the ID and the using place time stamp, and records the ID information;
(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning;
(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
Further, in the step (1), the ID data is encryption information; in said step (3), the reading operation includes decryption.
Further, the step (1) includes:
the method comprises the steps that (1.1) client software reads the ID data of an MCU and compares the ID data with local input information in a client database, the comparison is carried out, the step (1.2) is carried out when the comparison is passed, and the step is terminated when the comparison is not passed; the client database stores the corresponding relation between MCU package information and ID information in an encryption mode;
(1.2) adding a using time stamp to ID data to obtain first data, wherein the ID data is solidified in an MCU slice;
in the step (4), the verification of the server includes inquiring the verification history of the ID, and if the number of times of verification exceeds a preset value, the verification is regarded as failed.
The invention can effectively prevent the MCU processor from being counterfeited and pirated, ensure the safety and the legality of products and effectively avoid the inferior chips from being put into use.
Drawings
Fig. 1 is a schematic diagram of the system architecture of the present invention.
Fig. 2 is a flow chart of the operation of the present invention.
Detailed Description
Example 1
Referring to fig. 1 and 2, the integrated anti-counterfeiting method for software and hardware of the mcu chip comprises the following steps:
(1) The client software reads the ID data of the MCU, and attaches a using time stamp to the ID data to obtain first data, wherein the ID data is encrypted ID data solidified in an MCU slice;
(2) The client software transmits the first data to the server;
(3) The server reads the first data, decrypts to obtain the ID and the time stamp of the use place, and records ID information;
(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning;
(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
Example 2
The embodiment comprises the following steps:
the method comprises the steps that (1.1) client software reads the ID data of an MCU and compares the ID data with local input information in a client database, the comparison is carried out, the step (1.2) is carried out when the comparison is passed, and the step is terminated when the comparison is not passed; the client database stores the corresponding relation between MCU package information and ID information in an encryption mode; the package information can be a serial number marked on the MCU chip shell or a batch number marked on the packaging box. The corresponding relation between the MCU package information and the ID information can be one of the following AB modes:
A. the split charging information of MCU when leaving factory, namely an on-chip ID of a packing box and each chip packed in the packing box;
B. the corresponding algorithm of the package information and the on-chip ID, for example, the specific field of the on-chip ID is converted into a first value, the characteristic field of the package information is also converted into a second value, and the specific relationship (including, modulo, etc.) between the first value and the second value. A simple example is that the converted on-chip ID is 24120, the package information is 24, and the package information matches the first three bits of the on-chip ID, and then the comparison passes.
(1.2) adding a using time stamp to ID data to obtain first data, wherein the ID data is solidified in an MCU slice;
(2) The client software transmits the first data to the server;
(3) The server reads the first data, decrypts to obtain the ID and the time stamp of the use place, and records ID information;
(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning; the verification of the server comprises inquiring the verification history of the ID, and if the verification times exceed a preset value, the verification is considered as failed.
(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
More specific working steps are as follows:
1. a unique identification code (ID) is added at a specified address in the nonvolatile memory bootROM of the MCU, which ID is written by the MCU manufacturer before shipment and is subsequently unalterable, each MCU chip ID being unique.
And 2, the MCU internal encryption circuit encrypts the ID to obtain a non-repeated specific sequence, and the non-repeated specific sequence can be read by client software (upper computer development software).
3. When the development software burns the program to the MCU, the development software can attach a time stamp to the encryption information according to the current time, and then the processed encryption information is transmitted to a manufacturer server.
4. After receiving the encrypted information transmitted by the development software, the manufacturer server decrypts the encrypted ID, judges the authenticity of the chip, and records the recent reading times of the ID. When the number of times of using the ID in a limited time exceeds a certain upper limit, the ID is suspected to be stolen, and the use of the ID is limited. Meanwhile, the manufacturer server checks whether the time stamp uploaded by the development software accords with the time similar to that of the server, so that the development software is prevented from being invaded. If the time difference exceeds the limit, the access is refused.
5. If the ID can be used, the vendor server returns an encrypted message with the current time to the development software.
6. After the development software decrypts the encrypted information, the timestamp is checked again, the timestamp of the returned information of the manufacturer server is compared with the timestamp attached by the development software, and if the time difference exceeds a certain limit, the use of the ID is limited.
7. After the steps are passed, the user can burn the program into the MCU.
MCU manufacturer can encrypt ID by encryption algorithm to generate random specific sequence, so as to ensure ID safety.
The invention adds a unique identification code (ID) in the nonvolatile memory of the MCU, the ID is written by a manufacturer before leaving the factory and can not be changed later, and each MCU chip ID is unique. Then, the MCU internal encryption circuit encrypts the ID and can be read by the development software of the upper computer. When the development software burns the program to the MCU, the development software can attach a time stamp to the encryption information according to the current time, and then the processed encryption information is transmitted to a manufacturer server. The manufacturer server decrypts the encrypted ID, judges the authenticity of the chip, and records the recent reading times of the ID. When the number of times of using the ID in a limited time exceeds a certain upper limit, the ID is suspected to be stolen, and the use of the ID is limited. If the ID can be used, the vendor server returns an encrypted message with the current time to the development software. After the development software detects that the manufacturer server decrypts the encrypted information, the timestamp of the returned information is compared with the timestamp attached to the development software, and if the time difference exceeds a certain limit, the use of the ID is limited.
If the MCU chip produced by the manufacturer is copied by hardware, the upper computer development software refuses to provide development application for the copied MCU chip because the copied chip has no legal identification code (ID). This is the first layer protection. If an illegal manufacturer intercepts the legal identification code (ID) of a legal chip by some method, it is difficult to obtain an apparatus and method for writing the legal identification code (ID) into a specified address in a corresponding bootROM. This is the second layer protection. If an illegal manufacturer intercepts legal identification codes (IDs) of a legal chip by a certain method, equipment and a method for writing the legal identification codes (IDs) into specified addresses in corresponding bootROMs are also cracked. The vendor's server will receive a message record that the same identification code (ID) was developed for multiple applications and the server will restrict the application of that identification code (ID). This is the third layer protection. If an illegal manufacturer intercepts legal identification codes (IDs) of a legal chip through a certain method, equipment and a method for writing the legal identification codes (IDs) into specified addresses in corresponding bootROMs are also cracked, even encrypted communication between development software and a legal server is simulated through a certain illegal means, the encrypted communication is extremely difficult to crack, and because the development software can attach a time stamp to the encrypted information according to the current time, the illegal means can intercept the encrypted information, and a great amount of time is required for storing and decrypting, so that the time stamp of information returned by the illegal means can be identified by the development software, and the information is judged to be illegal information, thereby refusing to provide development application for the identification codes (IDs). This is the fourth layer protection.
Through the heavy protection mechanism, imitation and piracy of the MCU chip can be effectively prevented.

Claims (4)

  1. The MCU chip software and hardware integrated anti-counterfeiting method is characterized by comprising the following steps of:
    (1) The client software reads the ID data of the MCU, and attaches a using time stamp to the ID data to obtain first data, wherein the ID data is solidified in the MCU slice;
    (2) The client software transmits the first data to the server;
    (3) The server reads the first data, obtains the ID and the using place time stamp, and records the ID information;
    (4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning;
    (5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
  2. 2. The integrated software and hardware anti-counterfeiting method for the MCU chip according to claim 1, wherein in the step (1), the ID data is encryption information; in said step (3), the reading operation includes decryption.
  3. 3. The integrated software and hardware anti-counterfeiting method for the MCU chip according to claim 1, wherein the step (1) comprises the following steps:
    the method comprises the steps that (1.1) client software reads the ID data of an MCU and compares the ID data with local input information in a client database, the comparison is carried out, the step (1.2) is carried out when the comparison is passed, and the step is terminated when the comparison is not passed; the client database stores the corresponding relation between MCU package information and ID information in an encryption mode;
    and (1.2) adding a using time stamp to the ID data to obtain first data, wherein the ID data is solidified in the MCU slice.
  4. 4. The method of claim 1, wherein in the step (4), the verification of the server includes checking a verification history of the ID, and if the number of times of verification exceeds a preset value, the verification is regarded as failed.
CN202311778320.5A 2023-12-22 2023-12-22 MCU chip software and hardware integrated anti-counterfeiting method Pending CN117827510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311778320.5A CN117827510A (en) 2023-12-22 2023-12-22 MCU chip software and hardware integrated anti-counterfeiting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311778320.5A CN117827510A (en) 2023-12-22 2023-12-22 MCU chip software and hardware integrated anti-counterfeiting method

Publications (1)

Publication Number Publication Date
CN117827510A true CN117827510A (en) 2024-04-05

Family

ID=90516502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311778320.5A Pending CN117827510A (en) 2023-12-22 2023-12-22 MCU chip software and hardware integrated anti-counterfeiting method

Country Status (1)

Country Link
CN (1) CN117827510A (en)

Similar Documents

Publication Publication Date Title
US7313828B2 (en) Method and apparatus for protecting software against unauthorized use
US7809948B2 (en) Cellular telephone device having authenticating capability
CN111680305B (en) Data processing method, device and equipment based on block chain
CN100421046C (en) Method and computing device that securely runs authorized software
US4747139A (en) Software security method and systems
EP1942430B1 (en) Token Passing Technique for Media Playback Devices
US7100048B1 (en) Encrypted internet and intranet communication device
US20060149683A1 (en) User terminal for receiving license
CN102799803A (en) Secure removable media and method for managing the same
Schneck Persistent access control to prevent piracy of digital information
CN101305333A (en) Tamper-resistant trusted virtual machine
MX2007014237A (en) Implementation of an integrity-protected secure storage.
US20060149972A1 (en) Method for realizing security storage and algorithm storage by means of semiconductor memory device
US8689009B2 (en) Authentication-secured access to a data carrier comprising a mass storage device and chip
US20070239617A1 (en) Method and apparatus for temporarily accessing content using temporary license
US7545934B2 (en) Security information packaging system, LSI, and security information packaging method
Nair et al. Enabling DRM-preserving digital content redistribution
CN1846399B (en) Digital content protection system and method
US20080000971A1 (en) Method for customizing customer identifier
CN103177739A (en) Information processing apparatus, information processing system, information storing device, and program
CN102222195A (en) E-book reading method and system
KR101744697B1 (en) Encoded Package Manufacturing and Transmission System for E-training Contents
CN1575474A (en) Consumer and revocation of their equipment
CN100464341C (en) Generation and management method for digital content use trace based on reliable computing technology
CN117827510A (en) MCU chip software and hardware integrated anti-counterfeiting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination