CN117827510A - MCU chip software and hardware integrated anti-counterfeiting method - Google Patents
MCU chip software and hardware integrated anti-counterfeiting method Download PDFInfo
- Publication number
- CN117827510A CN117827510A CN202311778320.5A CN202311778320A CN117827510A CN 117827510 A CN117827510 A CN 117827510A CN 202311778320 A CN202311778320 A CN 202311778320A CN 117827510 A CN117827510 A CN 117827510A
- Authority
- CN
- China
- Prior art keywords
- data
- server
- mcu
- information
- time stamp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000012795 verification Methods 0.000 claims abstract description 17
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000009776 industrial production Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
An MCU chip software and hardware integrated anti-counterfeiting method relates to a computer technology and an integrated circuit technology. The invention comprises the following steps: (1) The client software reads the ID data of the MCU, and attaches a using time stamp to obtain first data; (2) the client software transmitting the first data to the server; (3) The server reads the first data, obtains the ID and the using place time stamp, and records the ID information; (4) The server checks the ID, and if the ID passes, check passing information is returned to the client software; if not, returning rejection information to the client software or not returning; (5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated. The invention can effectively prevent the MCU processor from being counterfeited and pirated, ensure the safety and the legality of products and effectively avoid the inferior chips from being put into use.
Description
Technical Field
The present invention relates to computer technology and integrated circuit technology.
Background
MCU, the full name Micro Control Unit, namely microcontroller, can provide corresponding control action according to different user program designs, and is widely applied in fields such as industrial production, life and the like.
However, the conventional MCU (Microcontroller Unit) processor has the problems of counterfeiting, imitation and the like in application, and causes great hidden trouble to users.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an MCU anti-counterfeiting mechanism which can effectively prevent an illegal MCU from entering a terminal product using link.
The technical scheme adopted by the invention for solving the technical problems is that the MCU chip software and hardware integrated anti-counterfeiting method comprises the following steps:
(1) The client software reads the ID data of the MCU, and attaches a using time stamp to the ID data to obtain first data, wherein the ID data is solidified in the MCU slice;
(2) The client software transmits the first data to the server;
(3) The server reads the first data, obtains the ID and the using place time stamp, and records the ID information;
(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning;
(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
Further, in the step (1), the ID data is encryption information; in said step (3), the reading operation includes decryption.
Further, the step (1) includes:
the method comprises the steps that (1.1) client software reads the ID data of an MCU and compares the ID data with local input information in a client database, the comparison is carried out, the step (1.2) is carried out when the comparison is passed, and the step is terminated when the comparison is not passed; the client database stores the corresponding relation between MCU package information and ID information in an encryption mode;
(1.2) adding a using time stamp to ID data to obtain first data, wherein the ID data is solidified in an MCU slice;
in the step (4), the verification of the server includes inquiring the verification history of the ID, and if the number of times of verification exceeds a preset value, the verification is regarded as failed.
The invention can effectively prevent the MCU processor from being counterfeited and pirated, ensure the safety and the legality of products and effectively avoid the inferior chips from being put into use.
Drawings
Fig. 1 is a schematic diagram of the system architecture of the present invention.
Fig. 2 is a flow chart of the operation of the present invention.
Detailed Description
Example 1
Referring to fig. 1 and 2, the integrated anti-counterfeiting method for software and hardware of the mcu chip comprises the following steps:
(1) The client software reads the ID data of the MCU, and attaches a using time stamp to the ID data to obtain first data, wherein the ID data is encrypted ID data solidified in an MCU slice;
(2) The client software transmits the first data to the server;
(3) The server reads the first data, decrypts to obtain the ID and the time stamp of the use place, and records ID information;
(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning;
(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
Example 2
The embodiment comprises the following steps:
the method comprises the steps that (1.1) client software reads the ID data of an MCU and compares the ID data with local input information in a client database, the comparison is carried out, the step (1.2) is carried out when the comparison is passed, and the step is terminated when the comparison is not passed; the client database stores the corresponding relation between MCU package information and ID information in an encryption mode; the package information can be a serial number marked on the MCU chip shell or a batch number marked on the packaging box. The corresponding relation between the MCU package information and the ID information can be one of the following AB modes:
A. the split charging information of MCU when leaving factory, namely an on-chip ID of a packing box and each chip packed in the packing box;
B. the corresponding algorithm of the package information and the on-chip ID, for example, the specific field of the on-chip ID is converted into a first value, the characteristic field of the package information is also converted into a second value, and the specific relationship (including, modulo, etc.) between the first value and the second value. A simple example is that the converted on-chip ID is 24120, the package information is 24, and the package information matches the first three bits of the on-chip ID, and then the comparison passes.
(1.2) adding a using time stamp to ID data to obtain first data, wherein the ID data is solidified in an MCU slice;
(2) The client software transmits the first data to the server;
(3) The server reads the first data, decrypts to obtain the ID and the time stamp of the use place, and records ID information;
(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning; the verification of the server comprises inquiring the verification history of the ID, and if the verification times exceed a preset value, the verification is considered as failed.
(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
More specific working steps are as follows:
1. a unique identification code (ID) is added at a specified address in the nonvolatile memory bootROM of the MCU, which ID is written by the MCU manufacturer before shipment and is subsequently unalterable, each MCU chip ID being unique.
And 2, the MCU internal encryption circuit encrypts the ID to obtain a non-repeated specific sequence, and the non-repeated specific sequence can be read by client software (upper computer development software).
3. When the development software burns the program to the MCU, the development software can attach a time stamp to the encryption information according to the current time, and then the processed encryption information is transmitted to a manufacturer server.
4. After receiving the encrypted information transmitted by the development software, the manufacturer server decrypts the encrypted ID, judges the authenticity of the chip, and records the recent reading times of the ID. When the number of times of using the ID in a limited time exceeds a certain upper limit, the ID is suspected to be stolen, and the use of the ID is limited. Meanwhile, the manufacturer server checks whether the time stamp uploaded by the development software accords with the time similar to that of the server, so that the development software is prevented from being invaded. If the time difference exceeds the limit, the access is refused.
5. If the ID can be used, the vendor server returns an encrypted message with the current time to the development software.
6. After the development software decrypts the encrypted information, the timestamp is checked again, the timestamp of the returned information of the manufacturer server is compared with the timestamp attached by the development software, and if the time difference exceeds a certain limit, the use of the ID is limited.
7. After the steps are passed, the user can burn the program into the MCU.
MCU manufacturer can encrypt ID by encryption algorithm to generate random specific sequence, so as to ensure ID safety.
The invention adds a unique identification code (ID) in the nonvolatile memory of the MCU, the ID is written by a manufacturer before leaving the factory and can not be changed later, and each MCU chip ID is unique. Then, the MCU internal encryption circuit encrypts the ID and can be read by the development software of the upper computer. When the development software burns the program to the MCU, the development software can attach a time stamp to the encryption information according to the current time, and then the processed encryption information is transmitted to a manufacturer server. The manufacturer server decrypts the encrypted ID, judges the authenticity of the chip, and records the recent reading times of the ID. When the number of times of using the ID in a limited time exceeds a certain upper limit, the ID is suspected to be stolen, and the use of the ID is limited. If the ID can be used, the vendor server returns an encrypted message with the current time to the development software. After the development software detects that the manufacturer server decrypts the encrypted information, the timestamp of the returned information is compared with the timestamp attached to the development software, and if the time difference exceeds a certain limit, the use of the ID is limited.
If the MCU chip produced by the manufacturer is copied by hardware, the upper computer development software refuses to provide development application for the copied MCU chip because the copied chip has no legal identification code (ID). This is the first layer protection. If an illegal manufacturer intercepts the legal identification code (ID) of a legal chip by some method, it is difficult to obtain an apparatus and method for writing the legal identification code (ID) into a specified address in a corresponding bootROM. This is the second layer protection. If an illegal manufacturer intercepts legal identification codes (IDs) of a legal chip by a certain method, equipment and a method for writing the legal identification codes (IDs) into specified addresses in corresponding bootROMs are also cracked. The vendor's server will receive a message record that the same identification code (ID) was developed for multiple applications and the server will restrict the application of that identification code (ID). This is the third layer protection. If an illegal manufacturer intercepts legal identification codes (IDs) of a legal chip through a certain method, equipment and a method for writing the legal identification codes (IDs) into specified addresses in corresponding bootROMs are also cracked, even encrypted communication between development software and a legal server is simulated through a certain illegal means, the encrypted communication is extremely difficult to crack, and because the development software can attach a time stamp to the encrypted information according to the current time, the illegal means can intercept the encrypted information, and a great amount of time is required for storing and decrypting, so that the time stamp of information returned by the illegal means can be identified by the development software, and the information is judged to be illegal information, thereby refusing to provide development application for the identification codes (IDs). This is the fourth layer protection.
Through the heavy protection mechanism, imitation and piracy of the MCU chip can be effectively prevented.
Claims (4)
- The MCU chip software and hardware integrated anti-counterfeiting method is characterized by comprising the following steps of:(1) The client software reads the ID data of the MCU, and attaches a using time stamp to the ID data to obtain first data, wherein the ID data is solidified in the MCU slice;(2) The client software transmits the first data to the server;(3) The server reads the first data, obtains the ID and the using place time stamp, and records the ID information;(4) The server checks the ID, and if the ID passes, check passing information is returned to the client software, wherein the check passing information comprises a server time stamp; if not, returning rejection information to the client software or not returning;(5) After receiving the server verification passing information, the client software extracts the server time stamp and compares the server time stamp with the using place time, if the time difference is within a preset range, the MCU operation permission is opened, and if the time difference exceeds the preset range, the operation is terminated.
- 2. The integrated software and hardware anti-counterfeiting method for the MCU chip according to claim 1, wherein in the step (1), the ID data is encryption information; in said step (3), the reading operation includes decryption.
- 3. The integrated software and hardware anti-counterfeiting method for the MCU chip according to claim 1, wherein the step (1) comprises the following steps:the method comprises the steps that (1.1) client software reads the ID data of an MCU and compares the ID data with local input information in a client database, the comparison is carried out, the step (1.2) is carried out when the comparison is passed, and the step is terminated when the comparison is not passed; the client database stores the corresponding relation between MCU package information and ID information in an encryption mode;and (1.2) adding a using time stamp to the ID data to obtain first data, wherein the ID data is solidified in the MCU slice.
- 4. The method of claim 1, wherein in the step (4), the verification of the server includes checking a verification history of the ID, and if the number of times of verification exceeds a preset value, the verification is regarded as failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311778320.5A CN117827510A (en) | 2023-12-22 | 2023-12-22 | MCU chip software and hardware integrated anti-counterfeiting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311778320.5A CN117827510A (en) | 2023-12-22 | 2023-12-22 | MCU chip software and hardware integrated anti-counterfeiting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117827510A true CN117827510A (en) | 2024-04-05 |
Family
ID=90516502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311778320.5A Pending CN117827510A (en) | 2023-12-22 | 2023-12-22 | MCU chip software and hardware integrated anti-counterfeiting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117827510A (en) |
-
2023
- 2023-12-22 CN CN202311778320.5A patent/CN117827510A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7313828B2 (en) | Method and apparatus for protecting software against unauthorized use | |
US7809948B2 (en) | Cellular telephone device having authenticating capability | |
CN111680305B (en) | Data processing method, device and equipment based on block chain | |
CN100421046C (en) | Method and computing device that securely runs authorized software | |
US4747139A (en) | Software security method and systems | |
EP1942430B1 (en) | Token Passing Technique for Media Playback Devices | |
US7100048B1 (en) | Encrypted internet and intranet communication device | |
US20060149683A1 (en) | User terminal for receiving license | |
CN102799803A (en) | Secure removable media and method for managing the same | |
Schneck | Persistent access control to prevent piracy of digital information | |
CN101305333A (en) | Tamper-resistant trusted virtual machine | |
MX2007014237A (en) | Implementation of an integrity-protected secure storage. | |
US20060149972A1 (en) | Method for realizing security storage and algorithm storage by means of semiconductor memory device | |
US8689009B2 (en) | Authentication-secured access to a data carrier comprising a mass storage device and chip | |
US20070239617A1 (en) | Method and apparatus for temporarily accessing content using temporary license | |
US7545934B2 (en) | Security information packaging system, LSI, and security information packaging method | |
Nair et al. | Enabling DRM-preserving digital content redistribution | |
CN1846399B (en) | Digital content protection system and method | |
US20080000971A1 (en) | Method for customizing customer identifier | |
CN103177739A (en) | Information processing apparatus, information processing system, information storing device, and program | |
CN102222195A (en) | E-book reading method and system | |
KR101744697B1 (en) | Encoded Package Manufacturing and Transmission System for E-training Contents | |
CN1575474A (en) | Consumer and revocation of their equipment | |
CN100464341C (en) | Generation and management method for digital content use trace based on reliable computing technology | |
CN117827510A (en) | MCU chip software and hardware integrated anti-counterfeiting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |