WO2018045981A1 - Anti-counterfeit apparatus for built-in software of electronic device and method therefor - Google Patents

Anti-counterfeit apparatus for built-in software of electronic device and method therefor Download PDF

Info

Publication number
WO2018045981A1
WO2018045981A1 PCT/CN2017/100890 CN2017100890W WO2018045981A1 WO 2018045981 A1 WO2018045981 A1 WO 2018045981A1 CN 2017100890 W CN2017100890 W CN 2017100890W WO 2018045981 A1 WO2018045981 A1 WO 2018045981A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
detection signal
protective cover
core board
flash
Prior art date
Application number
PCT/CN2017/100890
Other languages
French (fr)
Chinese (zh)
Inventor
洪德胜
Original Assignee
深圳创维数字技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳创维数字技术有限公司 filed Critical 深圳创维数字技术有限公司
Publication of WO2018045981A1 publication Critical patent/WO2018045981A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44236Monitoring of piracy processes or activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB

Definitions

  • the present disclosure relates to the field of electronic technology, for example, to an anti-piracy device and a method thereof for electronic software built-in software.
  • set-top box terminals With the rapid development of Internet technology and the increasing intelligence of set-top box terminals, the content and functions carried by the set-top box terminals have increased. Users can not only watch the beautiful program content through the set-top box terminal, but also realize the functions of browsing webpage, search query, game entertainment, social interaction and online shopping.
  • FLASH flash memory
  • the commonly used anti-theft measure is to customize the chip identification number (CHIP ID) with a third-party chip manufacturer, which is only known by the set-top box manufacturer, thereby achieving confidentiality. Or by software encryption with third-party chip manufacturers.
  • these anti-theft measures are dependent on third-party chip manufacturers. If you can't determine the size of the market, you can find a custom chip for a third-party chip manufacturer. The feasibility is not high and the cost is not easy to control.
  • the encryption of third-party chip vendors is at risk of being compromised and may be cracked by third parties.
  • the present disclosure provides an anti-piracy device and a method thereof for the built-in software of the electronic device, which can solve the problem that the built-in software of the electronic device is easily stolen by others in the related art.
  • the present disclosure provides an anti-piracy device of an electronic device built-in software, the device being disposed on a whole circuit board of the electronic device, the device comprising:
  • a first detecting module is disposed in the protective cover, the first detecting module is configured to detect whether the protective cover is detached, and output a first detection signal;
  • the core board being electrically connected to the first detecting module, the software being stored in the core board, the core board being disposed according to the first detection signal, Recognizing that the software is erased when the protective cover is removed;
  • a battery configured to power the first detection module and the core board.
  • the electronic device further includes an outer casing covering the whole circuit board, and the device further includes:
  • a second detecting module disposed in the housing, the second detecting module configured to detect whether the outer casing is detached, and outputting a second detection signal
  • the core board is further configured to perform the step of erasing the software when the outer casing is also detached according to the second detection signal;
  • the battery is also configured to power the second detection module.
  • the first detecting module comprises a first light sensor
  • the setting is to detect whether the protective cover is detached
  • the step of outputting the first detecting signal comprises: the first light sensor is set to be The first illumination intensity on the core board is sampled, and a first detection signal corresponding to the first illumination intensity is output;
  • the second detecting module includes a second light sensor, and the step of detecting whether the outer casing is detached and outputting the second detecting signal comprises: the second light sensor is configured to: the whole circuit board The second illumination intensity is sampled, and a second detection signal corresponding to the second illumination intensity is output.
  • the protective cover is an opaque metal protective cover.
  • the core board comprises a central processing unit CPU and a flash memory FLASH;
  • the CPU is configured to compare the voltage values of the second detection signal and the first detection signal with a preset threshold to identify a disassembly state of the outer casing and the protective cover, in the first detection When the voltage values of the signal and the second detection signal are both greater than or equal to the threshold, the software in the FLASH is erased.
  • the core board includes a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored on the core board, and the software is stored in the The FLASH in the FLASH editing device is configured;
  • the setting is, according to the first detection signal, identifying that the protective cover is removed.
  • the step of erasing the software by the software includes: comparing, by the CPU, the voltage value of the first detection signal with a first preset voltage threshold to obtain a first comparison result, the CPU identifying, according to the first comparison result, When the protective cover is detached, the FLASH editing device is controlled to delete the software stored in the FALSH.
  • the core board includes a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored on the core board, and the software is stored in the The FLASH in the FLASH editing device is configured;
  • the step of performing erasing of the software when the outer casing is also disassembled according to the second detection signal includes: the CPU is configured to compare a voltage value of the second detection signal with a second pre- And comparing the voltage thresholds to obtain a second comparison result, the CPU, according to the second comparison result, identifying that the outer casing is also detached, and then controlling the FLASH editing device to delete the stored in the FALSH. software.
  • the battery is disposed within the protective cover.
  • the electronic device is a set top box.
  • the present disclosure provides an anti-piracy method for an electronic device built-in software, the electronic device including a complete circuit board, a protective cover, a first detecting module disposed in the protective cover, disposed in the protective cover, and the The first detecting module is electrically connected and stores a core board of the software, and a battery for powering the first detecting module and the core board, and the method includes:
  • the first detecting module detects whether the protective cover is detached, and outputs a first detection signal
  • the core board recognizes that the protection cover is detached, and the software is erased.
  • the electronic device further includes a casing covering the whole circuit board and a second detecting module, wherein the second detecting module is disposed in the casing, and the battery is further configured to provide the second detecting The module is powered, and the method further includes:
  • the method further includes: the second detecting module detecting whether the outer casing is disassembled, and outputting a second detection signal;
  • the core board performs the step of erasing the software when it is recognized that the outer casing is also detached according to the second detection signal.
  • the step of detecting, by the second detecting module, whether the outer casing is disassembled, and outputting the second detection signal comprises:
  • the second detecting module samples a second illumination intensity on the whole circuit board and outputs a second detection signal corresponding to the second illumination intensity
  • the step of detecting, by the first detecting module, whether the protective cover is removed, and outputting the first detection signal comprises:
  • the first detecting module samples the first illumination intensity on the core board, and outputs a first detection signal corresponding to the first illumination intensity.
  • the core board further includes a central processing unit CPU and a flash memory
  • the method further includes:
  • the step of erasing the software when the protection cover is removed according to the first detection signal comprises:
  • the CPU compares the voltage value of the first detection signal with a first preset threshold to obtain a first comparison result
  • the CPU identifies, according to the first comparison result, that the software stored in the flash memory FLASH is erased when the protective cover is detached.
  • the core board further includes a central processing unit CPU and a flash memory
  • the method further includes:
  • the step of the core board performing the erasing of the software when the core board identifies that the outer casing is also detached according to the second detection signal includes:
  • the CPU compares the second detection signal with a second preset threshold to obtain a second comparison result
  • the CPU performs the step of erasing the software when it is recognized that the outer casing is also removed according to the second comparison result.
  • the battery is disposed within the protective cover.
  • the electronic device is a set top box.
  • the present disclosure provides an anti-piracy device for an electronic device built-in software, and a method thereof, the software anti-piracy device includes a protective cover, a core plate disposed in the protective cover, and is disposed in the protective cover for detecting whether the protective cover is removed and a first detecting module for outputting a first detecting signal; a battery for supplying power to the core board and the first detecting module; and the core board is configured to erase the built-in software program when the protective cover is removed according to the first detecting signal, thereby avoiding The program is stolen; and it does not rely on third-party chip manufacturers, and there is no risk of program leakage; thus solving the problem that the built-in software of the set-top box core board in the related art is easily stolen by others.
  • 1A is a structural block diagram of an anti-piracy device of a built-in software of an electronic device according to the embodiment
  • FIG. 1B is a structural block diagram of another anti-piracy device of the built-in software of the electronic device according to the embodiment.
  • FIG. 2 is a structural block diagram of another anti-piracy device of the built-in software of the electronic device provided by the embodiment;
  • FIG. 3 is a structural block diagram of another anti-piracy device of the built-in software of the electronic device provided by the embodiment;
  • FIG. 4 is a structural block diagram of another anti-piracy device of the built-in software of the electronic device provided by the embodiment.
  • FIG. 5 is a schematic flowchart of an anti-piracy method of a built-in software of an electronic device according to the embodiment
  • FIG. 6 is a schematic flow chart of another anti-piracy method of the built-in software of the electronic device provided by the embodiment.
  • Figure 7 is a schematic diagram showing the refinement steps of step 100 in Figure 6;
  • FIG. 8 is a schematic diagram of the refinement step of step 200 in FIG. 6.
  • the embodiment provides an anti-piracy device for the built-in software of an electronic device.
  • the anti-piracy device is disposed on a whole circuit board of the electronic device, and the device includes: a protective cover 10; and a first detecting module 40.
  • the first detecting module 40 is configured to detect whether the protective cover 10 is detached and output a first detection signal; the core board 20 is disposed in the protective cover 10, and the core board 20 and the first detecting module 40 are electrically connected.
  • the above software is stored in the core board 20, the core board 20 is arranged to recognize that the software is erased when the protective cover 10 is detached according to the first detection signal; and the battery 50 is set to give the first detection Module 40 and core board 20 are powered.
  • the core board 20 recognizes that the built-in software program is erased when the protective cover 10 is detached according to the first detection signal, thereby avoiding theft of the program; and does not rely on the third-party chip manufacturer, and there is no risk of program leakage; thereby solving the core of the set-top box in the related art.
  • the built-in software of the board is easy to be stolen by others.
  • the embodiment provides another anti-piracy device for the built-in software of the electronic device.
  • the anti-piracy device is disposed on the whole circuit board 60 of the electronic device.
  • the software anti-piracy device includes a protective cover 10 disposed on the The core board 20 in the protective cover 10 is disposed to detect whether the electronic device housing is detached and output a second detection signal, and is disposed in the protective cover 10 for detecting whether the protective cover 10 is detached and outputting the first A first detecting module 40 for detecting signals, and a battery 50 for supplying power to the core board 20, the second detecting module 30, and the first detecting module 40.
  • the core board 20 is based on the first detection signal When the second detection signal recognizes that both the outer casing and the protective cover 10 are detached, the built-in software is erased.
  • the second detecting module 30 is an optional module in the electronic device.
  • the core board 20 may be provided with a CPU, a double rate synchronous dynamic random access memory (DDR) and a flash memory FLASH, wherein the software is stored in the FLASH.
  • the CPU is configured to compare the voltage values of the first detection signal and the second detection signal with a preset threshold to identify the disassembly state of the outer casing and the protective cover 10, and when at least the protective cover is removed The program in FLASH is erased.
  • the second detecting module 30 and the first detecting module 40 use an optical detecting manner to detect whether the outer casing and the protective cover 10 are detached.
  • the whole circuit board 60 is installed inside the electronic device, and the natural light is not received under the shielding of the outer casing. If someone wants to pirate software (mainly referred to as a software program in the core board 20), the outer casing will be removed to expose the entire circuit board 60 to light.
  • the protective cover 10 is not disposed outside the core board 20, and the software program in the FLASH can be directly read to perform pirate imitation.
  • the second detecting module 30 detects light, it is determined that the outer casing is detached.
  • the core panel 20 is surrounded by the addition of a protective cover 10, and the core panel 20 is still not exposed to light after the outer casing is detached. If the software program is to be stolen, the protective cover 10 outside the core board 20 is removed to expose it to light. To this end, the first detecting module 40 can determine whether the protective cover 10 is detached to identify whether the built-in software program of the core board 20 is stolen.
  • the protective cover 10 may be an opaque metal protective cover, such as a ferrous metal protective cover, and the CPU, the first detecting module 40, the FLASH, and the DDR may all be covered in the protective cover to isolate the light even if the outer casing is Disassembly does not expose the FLASH to light.
  • the first detecting module 40 and the second detecting module 30 respectively include a first photo sensor 401 and a second photo sensor 301.
  • the second photosensor 301 samples the second illumination intensity on the entire circuit board 60 and outputs a second detection signal having a corresponding level.
  • the first photosensor 401 samples the first illumination intensity at the location of the FLASH and outputs a first detection signal having a corresponding level.
  • the photoresistor in the photosensor will return a corresponding resistance value with the light intensity.
  • the resistance value of the light change can be converted into a voltage that varies with light.
  • the light intensity is proportional to the voltage.
  • the voltage value is recorded as the first voltage V1
  • the voltage obtained when the light intensity is high is recorded as the second voltage V2.
  • the threshold can be set to (V2+V1)/2, which is set at the factory.
  • the CPU first determines whether the voltage value of the second detection signal is less than a threshold value: if it is normal operation; when the voltage value of the second detection signal is greater than or equal to the threshold value, it indicates that the set-top box casing is removed. Send notification information to the server.
  • the set-top box has a corresponding networking module, through which the CPU can read the Media Access Control (MAC) address and identity (ID) number of the set-top box (the MAC address and ID number of each set-top box are unique).
  • MAC Media Access Control
  • ID identity
  • the set-top box When the set-top box is sold, it will record which MAC addresses and ID number of set-top boxes are purchased by the purchaser, and upload to the set-top box company's back-end network server through the network to track which purchaser's purchased set-top box's casing is removed. Then, the CPU determines whether the voltage value of the first detection signal is less than the threshold value: if not, the processing is not processed; when the voltage value of the first detection signal is greater than or equal to the threshold value, it can be recognized that the protective cover 10 is removed, and the built-in software program in the FLASH is performed. Erase.
  • the software program in the FLASH of the electronic device is erased.
  • the software program of the memory that needs to be protected may also be erased, and the memory needs to be disposed in the protective cover 10, and correspondingly, the second light sensor 301 that detects whether the outer casing is detached and the detection memory are exposed.
  • First light sensor 401 under light.
  • the battery 50 is configured to prevent the pirate personnel from operating the second photosensor 301 and the first photosensor 401 in order to prevent the pirate from powering off the CPU so that the FLASH cannot be erased.
  • the battery 50 may be disposed within the protective cover 10. Referring to Figure 3, a battery 50 is disposed within the protective cover 10 to prevent pirates from removing the battery 50 so that the FLASH built-in software cannot be erased.
  • the appearance of the light sensor can be adjusted, such as disguised as a capacitor or a chip.
  • the programs in the FLASH can be erased before the pirates find out, so that the pirates can find remedial measures (such as reading the program in a darker light).
  • the second detecting module 30 and the first detecting module 40 may also detect whether the electronic device housing and the protective cover 10 are removed by other means. If a lead wire is placed on the outer casing and the protective cover 10 When the ground of the circuit board and the CPU are connected, the lead always outputs a low level to the CPU, and the CPU determines that the outer casing and the protective cover 10 are not disassembled according to the low level.
  • the length of the lead wire is as short and fragile as possible so that the outer casing and the protective cover 10 can be broken when opened, and broken when removed. When the lead is disconnected, no voltage is output to the CPU, and the CPU judges that the lead is floating and the identification is removed. This embodiment does not limit the disassembly detection method.
  • the core board 20 includes a central processing unit CPU and a flash FLASH editing apparatus
  • the FLASH editing apparatus is connected to the CPU, and the software is stored in a configuration configured for the FLASH editing apparatus.
  • the software is stored in a configuration configured for the FLASH editing apparatus.
  • the CPU compares the voltage value of the first detection signal with a first preset voltage threshold to obtain a first comparison result, and the CPU identifies, according to the first comparison result, that the protective cover 10 is removed And controlling the FLASH editing device to delete the software stored in the FALSH.
  • the core board 20 includes a central processing unit CPU and a flash FLASH editing apparatus
  • the FLASH editing apparatus is connected to the CPU, and the software is stored in a configuration configured for the FLASH editing apparatus.
  • FLASH In FLASH;
  • the CPU compares the voltage value of the second detection signal with a second preset voltage threshold to obtain a second comparison result, and the CPU identifies, according to the second comparison result, that the outer casing is also disassembled.
  • the FLASH editing device is controlled to delete the software stored in the FALSH.
  • the first preset voltage threshold and the second preset voltage threshold may be the same.
  • the above electronic device may be a set top box.
  • the anti-piracy device of the built-in software of the electronic device determines whether the outer casing and the protective cover 10 are removed by the detecting module, and the FLASH built-in software is erased when both are disassembled to prevent the internal software program from being leaked, and the structure is simple. Low cost and anti-software program piracy effect; almost no dependence on third-party chip manufacturers, strong portability, easy to transplant and maintain, easy to secondary development.
  • the present disclosure also provides an anti-piracy method for an electronic device built-in software, the electronic device including a whole circuit board, a protective cover, a first detecting module disposed in the protective cover, and a protective cover disposed therein
  • the first detection module is electrically connected and stores a core board of the software, and a battery for powering the first detection module and the core board.
  • the anti-piracy method includes the following steps:
  • Step 101 The first detecting module detects whether the protective cover is disassembled and outputs a first detection signal.
  • Step 102 The core board identifies, according to the first detection signal, that the protective cover is removed, the software is Erase.
  • the core board When the core board recognizes that the protective cover is removed by the first detecting module, the built-in software program of the core board is erased to prevent the internal software program from being leaked, the structure is simple, the cost is low, and the anti-software program piracy effect is good; The manufacturer has almost no dependencies, is highly portable, easy to port and maintain, and easy to redevelop.
  • the present disclosure further provides a software anti-piracy method for an electronic device.
  • the electronic device further includes a casing covering the whole circuit board and a second detecting module, where the second detecting module is configured.
  • the battery is further configured to supply power to the second detection module.
  • the anti-piracy method includes the following steps:
  • Step 100 The second detecting module detects whether the outer casing is disassembled and outputs a second detection signal, and the first detecting module detects whether the protective cover is disassembled and outputs a first detection signal.
  • Step 200 The core board detects that both the outer casing and the protective cover are removed according to the second detection signal and the first detection signal, and erases the built-in software program.
  • the second detecting module and the first detecting module adopting a light sensor, and the step 100 includes:
  • Step 110 The second detecting module samples the illumination intensity on the whole circuit board and outputs a corresponding second detection signal.
  • Step 120 The first detecting module samples the illumination intensity on the core board and outputs a corresponding first detection signal.
  • the core board can determine the disassembly state of the protective cover and the outer casing according to the first detection signal and the second detection signal.
  • the core board further includes a central processing unit CPU and a flash memory
  • the step 200 includes:
  • Step 210 The CPU on the core board compares the voltage values of the first detection signal and the second detection signal with a preset threshold.
  • the CPU on the core board first determines whether the voltage value of the second detection signal is less than a threshold value: if it is normal operation; if the voltage value of the second detection signal is greater than or equal to the threshold value, it is recognized that the outer casing is removed, and the notification information is sent to the server. .
  • the CPU determines whether the voltage value of the first detection signal is less than a threshold value: if not, the processing is not performed. If the voltage value of the first detection signal is greater than or equal to the threshold value, step 220 is performed.
  • Step 220 When the voltage values of the second detection signal and the first detection signal are both greater than or equal to the threshold, the software program in the FLASH on the core board is erased.
  • the core board further includes a central processing unit CPU and a flash memory FLASH
  • the step 20 includes: the CPU compares the voltage value of the first detection signal with the first preset threshold to obtain a first comparison result;
  • the first comparison result identifies that the software stored in the flash memory FLASH is erased when the protective cover is removed.
  • the core board further includes a central processing unit CPU and a flash memory FLASH
  • the step 200 includes: the CPU compares the voltage value of the first detection signal with the first preset threshold to obtain a first comparison result; the CPU will be the second The detection signal is compared with the second preset threshold to obtain a second comparison result; the CPU recognizes that both the protective cover and the outer casing are removed according to the first and second comparison results, and then the software is erased.
  • the battery is disposed within the protective cover.
  • the electronic device may be a set top box.
  • the anti-piracy method of the built-in software of the electronic device provided by the embodiment, when the detection module detects that the outer casing is removed and the FLASH is exposed, the software program of the FLASH is erased to prevent the software program from being stolen;
  • the method has no dependence on third-party chip manufacturers, can be easily and quickly transplanted to other chip platforms, has no risk of program leakage; is easy to implement and low in cost, and has good software anti-theft effect.
  • the present disclosure provides an anti-piracy device and a method thereof for electronic device built-in software, which can automatically erase a software program in a FLASH when detecting that the protective cover is disassembled to cause FLASH exposure, thereby preventing the software program from being stolen, and to a third party.
  • the chip manufacturer has no dependence and no risk of program leakage.

Abstract

An anti-counterfeit apparatus for built-in software of an electronic device and a method therefor. The software anti-counterfeit apparatus is provided on a whole machine circuit board of the electronic device, and the apparatus comprises: a protective cover; a first detection module provided within the protective cover, configured to detect whether the protective cover has been disassembled and output a first detection signal; a core board provided within the protective cover, the core board being electrically connected to the first detection module, the software being stored in the core board, the core board being configured to erase the software when it is recognized that the protection cover has been disassembled according to the first detection signal; and a battery configured to supply power to the first detection module and the core board.

Description

电子设备内置软件的防盗版装置及其方法Anti-theft device and method for electronic device built-in software 技术领域Technical field
本公开涉及电子技术领域,例如涉及一种电子设备内置软件的防盗版装置及其方法。The present disclosure relates to the field of electronic technology, for example, to an anti-piracy device and a method thereof for electronic software built-in software.
背景技术Background technique
随着互联网技术的快速发展和机顶盒终端设备的日趋智能化,机顶盒终端所承载的内容和功能随之增多。用户通过机顶盒终端不仅能收看精彩的节目内容,还可以实现浏览网页、搜索查询、游戏娱乐、社交互动以及网上购物等功能。With the rapid development of Internet technology and the increasing intelligence of set-top box terminals, the content and functions carried by the set-top box terminals have increased. Users can not only watch the wonderful program content through the set-top box terminal, but also realize the functions of browsing webpage, search query, game entertainment, social interaction and online shopping.
通常一种新电子产品推出后,在市面上都会出现抄袭,通常是对存储器内的可执行程序进行读取复制。对于机顶盒产品来说,可执行程序一般存放在闪存(FLASH)里。由于FLASH是可以直接脱离中央处理器(Central Processing Unit,CPU)的,其内部的程序可以通过其它设备直接读取出来。为了预防盗版软件,则须对FLASH进行相应的防盗措施。Usually, after a new electronic product is launched, plagiarism will occur on the market, usually by reading and copying executable programs in the memory. For set-top box products, executable programs are typically stored in flash memory (FLASH). Since FLASH can be directly separated from the Central Processing Unit (CPU), its internal programs can be directly read by other devices. In order to prevent pirated software, the corresponding anti-theft measures must be applied to FLASH.
通常采用的防盗措施是通过与第三方芯片厂商定制芯片识别号(CHIP ID),该CHIP ID仅被机顶盒厂商知悉,从而实现保密。或者通过与第三方芯片厂家协调进行软件加密。但是这些防盗措施都对第三方芯片厂商有依赖性,在不能确定市场销售量大小的情况下找第三方芯片厂商定制芯片,可行性不高且成本不易控制。而且第三方芯片厂商的加密存在泄密的风险,可能被第三方破解。The commonly used anti-theft measure is to customize the chip identification number (CHIP ID) with a third-party chip manufacturer, which is only known by the set-top box manufacturer, thereby achieving confidentiality. Or by software encryption with third-party chip manufacturers. However, these anti-theft measures are dependent on third-party chip manufacturers. If you can't determine the size of the market, you can find a custom chip for a third-party chip manufacturer. The feasibility is not high and the cost is not easy to control. Moreover, the encryption of third-party chip vendors is at risk of being compromised and may be cracked by third parties.
因此,相关技术中的机顶盒还有待于改进和发展。Therefore, the set top box in the related art has yet to be improved and developed.
发明内容Summary of the invention
鉴于上述相关技术的不足之处,本公开提供一种电子设备内置软件的防盗版装置及其方法,可以解决相关技术中电子设备的内置软件易被他人盗取的问题。In view of the deficiencies of the related art, the present disclosure provides an anti-piracy device and a method thereof for the built-in software of the electronic device, which can solve the problem that the built-in software of the electronic device is easily stolen by others in the related art.
本公开提供一种电子设备内置软件的防盗版装置,所述装置设置在所述电子设备的整机电路板上,所述装置包括:The present disclosure provides an anti-piracy device of an electronic device built-in software, the device being disposed on a whole circuit board of the electronic device, the device comprising:
保护罩; Protective cover
第一检测模块,设置在所述保护罩内,所述第一检测模块设置为检测所述保护罩是否被拆卸,并输出第一检测信号;a first detecting module is disposed in the protective cover, the first detecting module is configured to detect whether the protective cover is detached, and output a first detection signal;
核心板,设置在所述保护罩内,所述核心板与所述第一检测模块电连接,所述软件存储在所述核心板中,所述核心板设置为根据所述第一检测信号,识别出所述保护罩被拆卸时,对所述软件进行擦除;以及a core board disposed in the protective cover, the core board being electrically connected to the first detecting module, the software being stored in the core board, the core board being disposed according to the first detection signal, Recognizing that the software is erased when the protective cover is removed;
电池,设置为给所述第一检测模块和所述核心板供电。a battery configured to power the first detection module and the core board.
可选地,其中,所述电子设备还包括覆盖所述整机电路板的外壳,所述装置还包括:Optionally, the electronic device further includes an outer casing covering the whole circuit board, and the device further includes:
第二检测模块,设置在所述外壳内,所述第二检测模块设置为检测所述外壳是否被拆卸,并输出第二检测信号;a second detecting module disposed in the housing, the second detecting module configured to detect whether the outer casing is detached, and outputting a second detection signal;
所述核心板还设置为根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行所述对所述软件进行擦除的步骤;The core board is further configured to perform the step of erasing the software when the outer casing is also detached according to the second detection signal;
所述电池还设置为给所述第二检测模块供电。The battery is also configured to power the second detection module.
可选地,其中,所述第一检测模块包括第一光传感器,所述设置为检测所述保护罩是否被拆卸,并输出第一检测信号的步骤包括:所述第一光传感器设置为对所述核心板上的第一光照强度进行采样,并输出与所述第一光照强度对应的第一检测信号;Optionally, wherein the first detecting module comprises a first light sensor, the setting is to detect whether the protective cover is detached, and the step of outputting the first detecting signal comprises: the first light sensor is set to be The first illumination intensity on the core board is sampled, and a first detection signal corresponding to the first illumination intensity is output;
所述第二检测模块包括第二光传感器,所述设置为检测所述外壳是否被拆卸,并输出第二检测信号的步骤包括:所述第二光传感器设置为:对所述整机电路板上的第二光照强度进行采样,并输出与所述第二光照强度对应的第二检测信号。The second detecting module includes a second light sensor, and the step of detecting whether the outer casing is detached and outputting the second detecting signal comprises: the second light sensor is configured to: the whole circuit board The second illumination intensity is sampled, and a second detection signal corresponding to the second illumination intensity is output.
可选地,其中,所述保护罩为不透明金属保护罩。Optionally, wherein the protective cover is an opaque metal protective cover.
可选地,其中,所述核心板包括中央处理器CPU和闪存FLASH;Optionally, wherein the core board comprises a central processing unit CPU and a flash memory FLASH;
所述CPU设置为将所述第二检测信号和所述第一检测信号的电压值与预设的阈值进行比较,以识别所述外壳和所述保护罩的拆卸状态,在所述第一检测信号和所述第二检测信号的电压值均大于或等于所述阈值时,对所述FLASH内的所述软件进行擦除。The CPU is configured to compare the voltage values of the second detection signal and the first detection signal with a preset threshold to identify a disassembly state of the outer casing and the protective cover, in the first detection When the voltage values of the signal and the second detection signal are both greater than or equal to the threshold, the software in the FLASH is erased.
可选地,其中,所述核心板包括中央处理器CPU和闪存FLASH编辑装置,所述FLASH编辑装置与所述CPU连接,所述软件存储在所述核心板上包括:所述软件存储在为所述FLASH编辑装置配置的FLASH中;Optionally, the core board includes a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored on the core board, and the software is stored in the The FLASH in the FLASH editing device is configured;
所述设置为根据所述第一检测信号,识别出所述保护罩被拆卸时,对所述 软件进行擦除的步骤包括:所述CPU将所述第一检测信号的电压值与第一预设电压阈值进行比较,得到第一比较结果,所述CPU根据所述第一比较结果,识别出所述保护罩被拆卸时,控制所述FLASH编辑装置删除存储在所述FALSH中的所述软件。The setting is, according to the first detection signal, identifying that the protective cover is removed, The step of erasing the software by the software includes: comparing, by the CPU, the voltage value of the first detection signal with a first preset voltage threshold to obtain a first comparison result, the CPU identifying, according to the first comparison result, When the protective cover is detached, the FLASH editing device is controlled to delete the software stored in the FALSH.
可选地,其中,所述核心板包括中央处理器CPU和闪存FLASH编辑装置,所述FLASH编辑装置与所述CPU连接,所述软件存储在所述核心板上包括:所述软件存储在为所述FLASH编辑装置配置的FLASH中;Optionally, the core board includes a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored on the core board, and the software is stored in the The FLASH in the FLASH editing device is configured;
所述根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行对所述软件进行擦除的步骤包括:所述CPU将所述第二检测信号的电压值与第二预设电压阈值进行比较,得到第二比较结果,所述CPU根据所述第二比较结果,识别出所述外壳也被拆卸时,才控制所述FLASH编辑装置删除存储在所述FALSH中的所述软件。The step of performing erasing of the software when the outer casing is also disassembled according to the second detection signal includes: the CPU is configured to compare a voltage value of the second detection signal with a second pre- And comparing the voltage thresholds to obtain a second comparison result, the CPU, according to the second comparison result, identifying that the outer casing is also detached, and then controlling the FLASH editing device to delete the stored in the FALSH. software.
可选地,所述电池设置在所述保护罩内。Optionally, the battery is disposed within the protective cover.
可选地,所述电子设备为机顶盒。Optionally, the electronic device is a set top box.
本公开提供一种电子设备内置软件的防盗版方法,所述电子设备包括整机电路板、保护罩、设置在所述保护罩内的第一检测模块、设置在所述保护罩内与所述第一检测模块电连接且存储有所述软件的核心板,和为给所述第一检测模块和所述核心板供电的电池,所述方法包括:The present disclosure provides an anti-piracy method for an electronic device built-in software, the electronic device including a complete circuit board, a protective cover, a first detecting module disposed in the protective cover, disposed in the protective cover, and the The first detecting module is electrically connected and stores a core board of the software, and a battery for powering the first detecting module and the core board, and the method includes:
所述第一检测模块检测所述保护罩是否被拆卸,并输出第一检测信号;以及The first detecting module detects whether the protective cover is detached, and outputs a first detection signal;
所述核心板根据所述第一检测信号,识别出所述保护罩均被拆卸时,对所述软件进行擦除。The core board, according to the first detection signal, recognizes that the protection cover is detached, and the software is erased.
可选地,所述电子设备还包括覆盖所述整机电路板的外壳以及第二检测模块,所述第二检测模块设置在所述外壳内,所述电池还设置为给所述第二检测模块供电,所述方法还包括:Optionally, the electronic device further includes a casing covering the whole circuit board and a second detecting module, wherein the second detecting module is disposed in the casing, and the battery is further configured to provide the second detecting The module is powered, and the method further includes:
在所述对所述软件进行擦除的步骤之前,还包括:所述第二检测模块检测所述外壳是否被拆卸,并输出第二检测信号;Before the step of erasing the software, the method further includes: the second detecting module detecting whether the outer casing is disassembled, and outputting a second detection signal;
所述核心板根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行对所述软件进行擦除的步骤。The core board performs the step of erasing the software when it is recognized that the outer casing is also detached according to the second detection signal.
可选地,其中,所述第二检测模块检测所述外壳是否被拆卸,并输出第二检测信号的步骤包括: Optionally, the step of detecting, by the second detecting module, whether the outer casing is disassembled, and outputting the second detection signal comprises:
所述第二检测模块对所述整机电路板上的第二光照强度进行采样并输出与所述第二光照强度对应的第二检测信号;The second detecting module samples a second illumination intensity on the whole circuit board and outputs a second detection signal corresponding to the second illumination intensity;
所述第一检测模块检测所述保护罩是否被拆卸,并输出第一检测信号的步骤包括:The step of detecting, by the first detecting module, whether the protective cover is removed, and outputting the first detection signal comprises:
所述第一检测模块对所述核心板上的第一光照强度进行采样,并输出与所述第一光照强度对应的第一检测信号。The first detecting module samples the first illumination intensity on the core board, and outputs a first detection signal corresponding to the first illumination intensity.
可选地,其中,所述核心板还包括中央处理器CPU和闪存FLASH,所述方法还包括:Optionally, the core board further includes a central processing unit CPU and a flash memory, and the method further includes:
所述根据所述第一检测信号识别出所述保护罩被拆卸时,对所述软件进行擦除的步骤包括:The step of erasing the software when the protection cover is removed according to the first detection signal comprises:
所述CPU将所述第一检测信号的电压值与第一预设阈值进行比较,得到第一比较结果;The CPU compares the voltage value of the first detection signal with a first preset threshold to obtain a first comparison result;
所述CPU根据所述第一比较结果,识别出所述保护罩被拆卸时,对所述闪存FLASH内存储的所述软件进行擦除。The CPU identifies, according to the first comparison result, that the software stored in the flash memory FLASH is erased when the protective cover is detached.
可选地,其中,所述核心板还包括中央处理器CPU和闪存FLASH,所述方法还包括:Optionally, the core board further includes a central processing unit CPU and a flash memory, and the method further includes:
所述核心板根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行对所述软件进行擦除的步骤包括:The step of the core board performing the erasing of the software when the core board identifies that the outer casing is also detached according to the second detection signal includes:
所述CPU将所述第二检测信号与第二预设阈值进行比较,得到第二比较结果;The CPU compares the second detection signal with a second preset threshold to obtain a second comparison result;
所述CPU根据所述第二比较结果,识别出所述外壳也被拆卸掉时,才执行对所述软件进行擦除的步骤。The CPU performs the step of erasing the software when it is recognized that the outer casing is also removed according to the second comparison result.
可选地,所述电池设置在所述保护罩内。Optionally, the battery is disposed within the protective cover.
可选地,所述电子设备为机顶盒。Optionally, the electronic device is a set top box.
本公开提供的一种电子设备内置软件的防盗版装置及其方法,该软件防盗版装置包括保护罩,设置在保护罩内的核心板;设置在保护罩内用于检测保护罩是否被拆卸并输出第一检测信号的第一检测模块;用于对核心板、和第一检测模块供电的电池;所述核心板根据第一检测信号识别保护罩被拆卸时对内置软件程序进行擦除,避免程序被盗;且不依赖第三方芯片厂商,无程序泄露的风险;从而解决了相关技术中机顶盒核心板的内置软件易被他人盗取的问题。 The present disclosure provides an anti-piracy device for an electronic device built-in software, and a method thereof, the software anti-piracy device includes a protective cover, a core plate disposed in the protective cover, and is disposed in the protective cover for detecting whether the protective cover is removed and a first detecting module for outputting a first detecting signal; a battery for supplying power to the core board and the first detecting module; and the core board is configured to erase the built-in software program when the protective cover is removed according to the first detecting signal, thereby avoiding The program is stolen; and it does not rely on third-party chip manufacturers, and there is no risk of program leakage; thus solving the problem that the built-in software of the set-top box core board in the related art is easily stolen by others.
附图说明DRAWINGS
图1A是本实施例提供的一种电子设备内置软件的防盗版装置的结构框图;1A is a structural block diagram of an anti-piracy device of a built-in software of an electronic device according to the embodiment;
图1B是本实施例提供的又一种电子设备内置软件的防盗版装置的结构框图;FIG. 1B is a structural block diagram of another anti-piracy device of the built-in software of the electronic device according to the embodiment; FIG.
图2是本实施例提供的又一种电子设备内置软件的防盗版装置的结构框图;2 is a structural block diagram of another anti-piracy device of the built-in software of the electronic device provided by the embodiment;
图3是本实施例提供的又一种电子设备内置软件的防盗版装置的结构框图;3 is a structural block diagram of another anti-piracy device of the built-in software of the electronic device provided by the embodiment;
图4是本实施例提供的又一种电子设备内置软件的防盗版装置的结构框图;4 is a structural block diagram of another anti-piracy device of the built-in software of the electronic device provided by the embodiment;
图5是本实施例提供的一种电子设备内置软件的防盗版方法流程示意图;FIG. 5 is a schematic flowchart of an anti-piracy method of a built-in software of an electronic device according to the embodiment; FIG.
图6是本实施例提供的又一种电子设备内置软件的防盗版方法流程示意图;6 is a schematic flow chart of another anti-piracy method of the built-in software of the electronic device provided by the embodiment;
图7是图6中步骤100的细化步骤示意图;Figure 7 is a schematic diagram showing the refinement steps of step 100 in Figure 6;
图8是图6中步骤200的细化步骤示意图。FIG. 8 is a schematic diagram of the refinement step of step 200 in FIG. 6.
具体实施方式detailed description
请参考图1A,本实施例提供一种电子设备内置软件的防盗版装置,该软件防盗版装置设置在电子设备的整机电路板上,该装置包括:保护罩10;第一检测模块40,设置在保护罩10内,第一检测模块40设置为检测保护罩10是否被拆卸,并输出第一检测信号;核心板20,设置在保护罩10内,核心板20与第一检测模块40电连接,上述软件存储在核心板20中,核心板20设置为根据上述第一检测信号,识别出保护罩10被拆卸时,对所述软件进行擦除;以及电池50,设置为给第一检测模块40和核心板20供电。核心板20根据第一检测信号识别保护罩10被拆卸时对内置软件程序进行擦除,避免程序被盗;且不依赖第三方芯片厂商,无程序泄露的风险;从而解决了相关技术中机顶盒核心板的内置软件易被他人盗取的问题。Referring to FIG. 1A, the embodiment provides an anti-piracy device for the built-in software of an electronic device. The anti-piracy device is disposed on a whole circuit board of the electronic device, and the device includes: a protective cover 10; and a first detecting module 40. The first detecting module 40 is configured to detect whether the protective cover 10 is detached and output a first detection signal; the core board 20 is disposed in the protective cover 10, and the core board 20 and the first detecting module 40 are electrically connected. Connected, the above software is stored in the core board 20, the core board 20 is arranged to recognize that the software is erased when the protective cover 10 is detached according to the first detection signal; and the battery 50 is set to give the first detection Module 40 and core board 20 are powered. The core board 20 recognizes that the built-in software program is erased when the protective cover 10 is detached according to the first detection signal, thereby avoiding theft of the program; and does not rely on the third-party chip manufacturer, and there is no risk of program leakage; thereby solving the core of the set-top box in the related art. The built-in software of the board is easy to be stolen by others.
参考图1B,本实施例提供又一种电子设备内置软件的防盗版装置,该软件防盗版装置设置在电子设备的整机电路板60上,该软件防盗版装置包括一保护罩10,设置在保护罩10内的核心板20,设置为检测电子设备外壳是否被拆卸并输出第二检测信号的第二检测模块30,设置在保护罩10内用于检测保护罩10是否被拆卸,并输出第一检测信号的第一检测模块40;用于对核心板20、第二检测模块30和第一检测模块40供电的电池50。核心板20根据第一检测信号 和第二检测信号识别出外壳和保护罩10均被拆卸时,对内置软件进行擦除。其中,第二检测模块30为该电子设备中可选的模块。Referring to FIG. 1B, the embodiment provides another anti-piracy device for the built-in software of the electronic device. The anti-piracy device is disposed on the whole circuit board 60 of the electronic device. The software anti-piracy device includes a protective cover 10 disposed on the The core board 20 in the protective cover 10 is disposed to detect whether the electronic device housing is detached and output a second detection signal, and is disposed in the protective cover 10 for detecting whether the protective cover 10 is detached and outputting the first A first detecting module 40 for detecting signals, and a battery 50 for supplying power to the core board 20, the second detecting module 30, and the first detecting module 40. The core board 20 is based on the first detection signal When the second detection signal recognizes that both the outer casing and the protective cover 10 are detached, the built-in software is erased. The second detecting module 30 is an optional module in the electronic device.
所述核心板20上可以设置有CPU、双倍速率同步动态随机存储器(Double Data Rate,DDR)和闪存FLASH,其中FLASH内存储有上述软件。在本实施例中,CPU设置为将第一检测信号和第二检测信号的电压值与预设的阈值进行比较来识别外壳和保护罩10的拆卸状态,并在至少有保护罩被拆卸时对FLASH内的程序进行擦除。The core board 20 may be provided with a CPU, a double rate synchronous dynamic random access memory (DDR) and a flash memory FLASH, wherein the software is stored in the FLASH. In this embodiment, the CPU is configured to compare the voltage values of the first detection signal and the second detection signal with a preset threshold to identify the disassembly state of the outer casing and the protective cover 10, and when at least the protective cover is removed The program in FLASH is erased.
在本实施例中,第二检测模块30和第一检测模块40采用光学检测方式来检测上述外壳和保护罩10是否被拆卸。通常整机电路板60装在电子设备内部,在外壳的遮挡下不会接受到自然光的照射。假如有人想盗版软件(主要指核心板20内的软件程序),则会将外壳拆卸使整机电路板60暴露在光线下。相关技术中核心板20外没有设置保护罩10,可直接读取FLASH内的软件程序从而进行盗版仿制。当第二检测模块30检测到有光线则判定外壳被拆卸。由于有时拆卸外壳可能是检修整机电路板60上的其他部件,不一定是读取FLASH内的软件程序。本实施例通过增加一保护罩10来包围核心板20,在外壳被拆卸后核心板20仍不会被光照射到。如果要盗读软件程序,则要拆卸核心板20外的保护罩10使其暴露在光照下。为此,通过第一检测模块40可以判断保护罩10是否被拆卸,来识别核心板20的内置软件程序是否被盗读。In this embodiment, the second detecting module 30 and the first detecting module 40 use an optical detecting manner to detect whether the outer casing and the protective cover 10 are detached. Usually, the whole circuit board 60 is installed inside the electronic device, and the natural light is not received under the shielding of the outer casing. If someone wants to pirate software (mainly referred to as a software program in the core board 20), the outer casing will be removed to expose the entire circuit board 60 to light. In the related art, the protective cover 10 is not disposed outside the core board 20, and the software program in the FLASH can be directly read to perform pirate imitation. When the second detecting module 30 detects light, it is determined that the outer casing is detached. Since sometimes disassembling the casing may be to repair other components on the complete circuit board 60, it is not necessary to read the software program in the FLASH. In this embodiment, the core panel 20 is surrounded by the addition of a protective cover 10, and the core panel 20 is still not exposed to light after the outer casing is detached. If the software program is to be stolen, the protective cover 10 outside the core board 20 is removed to expose it to light. To this end, the first detecting module 40 can determine whether the protective cover 10 is detached to identify whether the built-in software program of the core board 20 is stolen.
在本实施例中,所述保护罩10可以为不透明金属保护罩,例如黑色金属保护罩,可以将CPU、第一检测模块40、FLASH和DDR全部罩在保护罩里面以隔离光线,即使外壳被拆卸也不会使FLASH暴露在光线下。参考图2,第一检测模块40和第二检测模块30分别对应包括第一光传感器401和第二光传感器301。第二光传感器301对整机电路板60上的第二光照强度进行采样并输出具有对应电平的第二检测信号。第一光传感器401对FLASH所在位置的第一光照强度进行采样并输出具有对应电平的第一检测信号。In this embodiment, the protective cover 10 may be an opaque metal protective cover, such as a ferrous metal protective cover, and the CPU, the first detecting module 40, the FLASH, and the DDR may all be covered in the protective cover to isolate the light even if the outer casing is Disassembly does not expose the FLASH to light. Referring to FIG. 2, the first detecting module 40 and the second detecting module 30 respectively include a first photo sensor 401 and a second photo sensor 301. The second photosensor 301 samples the second illumination intensity on the entire circuit board 60 and outputs a second detection signal having a corresponding level. The first photosensor 401 samples the first illumination intensity at the location of the FLASH and outputs a first detection signal having a corresponding level.
在室内正常光的照射下,光传感器内的光敏电阻会随着光照强度返回一个对应的阻值,通过电阻分压法,可将该随光变化的阻值转化为随光变化的电压,其中光照强度与电压成正比。将光照强度较低情况下(如黑暗状态下)采得的 电压值记为第一电压V1,将光照强度较高情况下(如正常白天拆机室内中午的自然光)采得的电压记录为第二电压V2。阈值可以设置为(V2+V1)/2,在出厂时进行设定。当两个检测信号的电压值小于阈值时,表明外壳和保护罩10未被拆卸;当两个检测信号的电压值大于等于阈值时,表明外壳和保护罩10被拆卸掉。Under normal indoor illumination, the photoresistor in the photosensor will return a corresponding resistance value with the light intensity. Through the resistor divider method, the resistance value of the light change can be converted into a voltage that varies with light. The light intensity is proportional to the voltage. When the light intensity is low (such as in the dark state) The voltage value is recorded as the first voltage V1, and the voltage obtained when the light intensity is high (such as the natural light at noon in the normal daytime disassembly room) is recorded as the second voltage V2. The threshold can be set to (V2+V1)/2, which is set at the factory. When the voltage values of the two detection signals are less than the threshold value, it indicates that the outer casing and the protective cover 10 are not disassembled; when the voltage values of the two detection signals are greater than or equal to the threshold value, it indicates that the outer casing and the protective cover 10 are removed.
下面以电子设备为机顶盒进行举例说明,CPU先判断第二检测信号的电压值是否小于阈值:是则正常工作;当第二检测信号的电压值大于等于阈值时,则表明机顶盒外壳被拆卸掉,发送通知信息给服务器。机顶盒内有相应的联网模块,CPU通过该联网模块可以读取机顶盒的媒体访问控制(Media Access Control,MAC)地址和身份(Identity,ID)号(每个机顶盒的MAC地址和ID号是唯一,在机顶盒被卖出时会记录哪些购买商买了哪些MAC地址和ID号的机顶盒),通过网络上传到机顶盒公司的后台网络服务器,可跟踪是哪个购买商购买的机顶盒的外壳被拆卸。接着CPU判断第一检测信号的电压值是否小于阈值:是则不处理;在第一检测信号的电压值大于等于阈值时,则可以识别出保护罩10被拆卸,对FLASH内的内置软件程序进行擦除。The following is an example in which the electronic device is used as a set-top box. The CPU first determines whether the voltage value of the second detection signal is less than a threshold value: if it is normal operation; when the voltage value of the second detection signal is greater than or equal to the threshold value, it indicates that the set-top box casing is removed. Send notification information to the server. The set-top box has a corresponding networking module, through which the CPU can read the Media Access Control (MAC) address and identity (ID) number of the set-top box (the MAC address and ID number of each set-top box are unique). When the set-top box is sold, it will record which MAC addresses and ID number of set-top boxes are purchased by the purchaser, and upload to the set-top box company's back-end network server through the network to track which purchaser's purchased set-top box's casing is removed. Then, the CPU determines whether the voltage value of the first detection signal is less than the threshold value: if not, the processing is not processed; when the voltage value of the first detection signal is greater than or equal to the threshold value, it can be recognized that the protective cover 10 is removed, and the built-in software program in the FLASH is performed. Erase.
本实施例是对电子设备的FLASH内的软件程序进行擦除。在实施时,还可对其他需要进行保护的存储器的软件程序进行擦除,需将该存储器设置在保护罩10内,并对应设置检测外壳是否被拆卸的第二光传感器301和检测存储器是否暴露在光线下的第一光传感器401。电池50是为了防止盗版人员对CPU断电使其不能对FLASH进行擦除时,还能使第二光传感器301和第一光传感器401正常工作。可选地,电池50可以设置在保护罩10内。参考图3,电池50设置在保护罩10内,以防止盗版人员去除电池50使FLASH的内置软件不能被擦除。In this embodiment, the software program in the FLASH of the electronic device is erased. In implementation, the software program of the memory that needs to be protected may also be erased, and the memory needs to be disposed in the protective cover 10, and correspondingly, the second light sensor 301 that detects whether the outer casing is detached and the detection memory are exposed. First light sensor 401 under light. The battery 50 is configured to prevent the pirate personnel from operating the second photosensor 301 and the first photosensor 401 in order to prevent the pirate from powering off the CPU so that the FLASH cannot be erased. Alternatively, the battery 50 may be disposed within the protective cover 10. Referring to Figure 3, a battery 50 is disposed within the protective cover 10 to prevent pirates from removing the battery 50 so that the FLASH built-in software cannot be erased.
为了避免在外壳被拆卸后这两个光传感器被盗版人员发现,可对光传感器的外观进行调整,如伪装成电容或芯片的形状。这样就可以在盗版人员发现之前对FLASH内的程序进行擦除,以免盗版人员发现进行补救措施(如在较暗光下读取程序)。In order to avoid the two light sensors being discovered by pirates after the outer casing is removed, the appearance of the light sensor can be adjusted, such as disguised as a capacitor or a chip. In this way, the programs in the FLASH can be erased before the pirates find out, so that the pirates can find remedial measures (such as reading the program in a darker light).
在实施时,第二检测模块30和第一检测模块40还可以采用其他方式检测电子设备外壳和保护罩10是否被拆卸。如在外壳和保护罩10上设置一引线连 接整机电路板的地和CPU,则该引线一直输出低电平给CPU,CPU根据低电平判定外壳和保护罩10未被拆卸。引线的长度尽可能短且易断,以便外壳和保护罩10被打开时就能断掉,被拆卸时则会断掉。引线断开则无电压输出给CPU,CPU判断引线悬空则识别被拆卸。本实施例对拆卸检测方法不作限定。In implementation, the second detecting module 30 and the first detecting module 40 may also detect whether the electronic device housing and the protective cover 10 are removed by other means. If a lead wire is placed on the outer casing and the protective cover 10 When the ground of the circuit board and the CPU are connected, the lead always outputs a low level to the CPU, and the CPU determines that the outer casing and the protective cover 10 are not disassembled according to the low level. The length of the lead wire is as short and fragile as possible so that the outer casing and the protective cover 10 can be broken when opened, and broken when removed. When the lead is disconnected, no voltage is output to the CPU, and the CPU judges that the lead is floating and the identification is removed. This embodiment does not limit the disassembly detection method.
可选地,参考图4,其中,所述核心板20包括中央处理器CPU和闪存FLASH编辑装置,所述FLASH编辑装置与所述CPU连接,所述软件存储在为所述FLASH编辑装置配置的FLASH中。Optionally, referring to FIG. 4, wherein the core board 20 includes a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored in a configuration configured for the FLASH editing apparatus. In FLASH.
所述CPU将所述第一检测信号的电压值与第一预设电压阈值进行比较,得到第一比较结果,所述CPU根据所述第一比较结果,识别出所述保护罩10被拆卸时,控制所述FLASH编辑装置删除存储在所述FALSH中的所述软件。The CPU compares the voltage value of the first detection signal with a first preset voltage threshold to obtain a first comparison result, and the CPU identifies, according to the first comparison result, that the protective cover 10 is removed And controlling the FLASH editing device to delete the software stored in the FALSH.
可选地,参考图4,其中,所述核心板20包括中央处理器CPU和闪存FLASH编辑装置,所述FLASH编辑装置与所述CPU连接,所述软件存储在为所述FLASH编辑装置配置的FLASH中;Optionally, referring to FIG. 4, wherein the core board 20 includes a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored in a configuration configured for the FLASH editing apparatus. In FLASH;
所述CPU将所述第二检测信号的电压值与第二预设电压阈值进行比较,得到第二比较结果,所述CPU根据所述第二比较结果,识别出所述外壳也被拆卸时,才控制所述FLASH编辑装置删除存储在所述FALSH中的所述软件。其中,第一预设电压阈值与第二预设电压阈值可以相同。The CPU compares the voltage value of the second detection signal with a second preset voltage threshold to obtain a second comparison result, and the CPU identifies, according to the second comparison result, that the outer casing is also disassembled. The FLASH editing device is controlled to delete the software stored in the FALSH. The first preset voltage threshold and the second preset voltage threshold may be the same.
可选地,上述电子设备可以为机顶盒。Optionally, the above electronic device may be a set top box.
本实施例提供的电子设备内置软件的防盗版装置,通过检测模块判断外壳和保护罩10是否被拆卸,两者均被拆卸时对FLASH内置软件进行擦除,防止内部软件程序被泄露,结构简单、成本低且防软件程序盗版效果好;对第三方芯片厂商几乎没有依赖,可移植性强,易于移植与维护,易于二次开发。The anti-piracy device of the built-in software of the electronic device provided by the embodiment determines whether the outer casing and the protective cover 10 are removed by the detecting module, and the FLASH built-in software is erased when both are disassembled to prevent the internal software program from being leaked, and the structure is simple. Low cost and anti-software program piracy effect; almost no dependence on third-party chip manufacturers, strong portability, easy to transplant and maintain, easy to secondary development.
本公开还提供一种电子设备内置软件的防盗版方法,所述电子设备包括整机电路板、保护罩、设置在所述保护罩内的第一检测模块、设置在所述保护罩内与所述第一检测模块电连接且存储有所述软件的核心板,和为给所述第一检测模块和所述核心板供电的电池,如图5所示,所述防盗版方法包括以下步骤:The present disclosure also provides an anti-piracy method for an electronic device built-in software, the electronic device including a whole circuit board, a protective cover, a first detecting module disposed in the protective cover, and a protective cover disposed therein The first detection module is electrically connected and stores a core board of the software, and a battery for powering the first detection module and the core board. As shown in FIG. 5, the anti-piracy method includes the following steps:
步骤101、第一检测模块检测保护罩是否被拆卸并输出第一检测信号。Step 101: The first detecting module detects whether the protective cover is disassembled and outputs a first detection signal.
步骤102、核心板根据所述第一检测信号识别保护罩被拆卸时,对所述软件 进行擦除。Step 102: The core board identifies, according to the first detection signal, that the protective cover is removed, the software is Erase.
核心板通过第一检测模块识别出保护罩被拆卸时,对核心板的内置软件程序进行擦除,防止内部软件程序被泄露,结构简单、成本低且防软件程序盗版效果好;对第三方芯片厂商几乎没有依赖,可移植性强,易于移植与维护,易于二次开发。When the core board recognizes that the protective cover is removed by the first detecting module, the built-in software program of the core board is erased to prevent the internal software program from being leaked, the structure is simple, the cost is low, and the anti-software program piracy effect is good; The manufacturer has almost no dependencies, is highly portable, easy to port and maintain, and easy to redevelop.
本公开还提供一种电子设备的软件防盗版方法,在上述实施例的基础上,所述电子设备还包括覆盖所述整机电路板的外壳以及第二检测模块,所述第二检测模块设置在所述外壳内,所述电池还设置为给所述第二检测模块供电,如图6所示,所述防盗版方法包括以下步骤:The present disclosure further provides a software anti-piracy method for an electronic device. On the basis of the above embodiments, the electronic device further includes a casing covering the whole circuit board and a second detecting module, where the second detecting module is configured. Within the housing, the battery is further configured to supply power to the second detection module. As shown in FIG. 6, the anti-piracy method includes the following steps:
步骤100、第二检测模块检测外壳是否被拆卸并输出第二检测信号,第一检测模块检测保护罩是否被拆卸并输出第一检测信号。Step 100: The second detecting module detects whether the outer casing is disassembled and outputs a second detection signal, and the first detecting module detects whether the protective cover is disassembled and outputs a first detection signal.
步骤200、核心板根据第二检测信号和第一检测信号识别出外壳和保护罩均被拆卸时,对内置软件程序进行擦除。Step 200: The core board detects that both the outer casing and the protective cover are removed according to the second detection signal and the first detection signal, and erases the built-in software program.
可选的,本实施例中,参考图7,所述第二检测模块和第一检测模块采用光传感器,则步骤100包括:Optionally, in this embodiment, referring to FIG. 7, the second detecting module and the first detecting module adopting a light sensor, and the step 100 includes:
步骤110、第二检测模块对整机电路板上的光照强度进行采样并输出对应的第二检测信号。Step 110: The second detecting module samples the illumination intensity on the whole circuit board and outputs a corresponding second detection signal.
步骤120、第一检测模块是对核心板上的光照强度进行采样并输出对应的第一检测信号。Step 120: The first detecting module samples the illumination intensity on the core board and outputs a corresponding first detection signal.
获得检测信号后,上述核心板可根据第一检测信号和第二检测信号判断保护罩和外壳的拆卸状态。After the detection signal is obtained, the core board can determine the disassembly state of the protective cover and the outer casing according to the first detection signal and the second detection signal.
可选的,参考图8,所述核心板还包括中央处理器CPU和闪存FLASH,则所述步骤200包括:Optionally, referring to FIG. 8, the core board further includes a central processing unit CPU and a flash memory, and the step 200 includes:
步骤210、核心板上的CPU将第一检测信号和第二检测信号的电压值与预设的阈值进行比较。Step 210: The CPU on the core board compares the voltage values of the first detection signal and the second detection signal with a preset threshold.
核心板上的CPU先判断第二检测信号的电压值是否小于阈值:是则正常工作;在第二检测信号的电压值大于等于阈值的情况下,识别出外壳被拆卸掉,发送通知信息给服务器。 The CPU on the core board first determines whether the voltage value of the second detection signal is less than a threshold value: if it is normal operation; if the voltage value of the second detection signal is greater than or equal to the threshold value, it is recognized that the outer casing is removed, and the notification information is sent to the server. .
CPU接着判断第一检测信号的电压值是否小于阈值:是则不处理,在第一检测信号的电压值大于等于阈值的情况下,执行步骤220。The CPU then determines whether the voltage value of the first detection signal is less than a threshold value: if not, the processing is not performed. If the voltage value of the first detection signal is greater than or equal to the threshold value, step 220 is performed.
步骤220、当第二检测信号和第一检测信号的电压值均大于或等于阈值时,对核心板上的FLASH内的软件程序进行擦除。Step 220: When the voltage values of the second detection signal and the first detection signal are both greater than or equal to the threshold, the software program in the FLASH on the core board is erased.
可选地,其中,所述核心板还包括中央处理器CPU和闪存FLASH,步骤20包括:CPU将第一检测信号的电压值与第一预设阈值进行比较,得到第一比较结果;CPU根据第一比较结果,识别出保护罩被拆卸时,对闪存FLASH内存储的软件进行擦除。Optionally, the core board further includes a central processing unit CPU and a flash memory FLASH, and the step 20 includes: the CPU compares the voltage value of the first detection signal with the first preset threshold to obtain a first comparison result; The first comparison result identifies that the software stored in the flash memory FLASH is erased when the protective cover is removed.
可选的,其中,核心板还包括中央处理器CPU和闪存FLASH,步骤200包括:CPU将第一检测信号的电压值与第一预设阈值进行比较,得到第一比较结果;CPU将第二检测信号与第二预设阈值进行比较,得到第二比较结果;CPU根据第一和第二比较结果,识别出保护罩和外壳均被拆卸掉时,才对软件进行擦除。Optionally, the core board further includes a central processing unit CPU and a flash memory FLASH, and the step 200 includes: the CPU compares the voltage value of the first detection signal with the first preset threshold to obtain a first comparison result; the CPU will be the second The detection signal is compared with the second preset threshold to obtain a second comparison result; the CPU recognizes that both the protective cover and the outer casing are removed according to the first and second comparison results, and then the software is erased.
可选地,所述电池设置在所述保护罩内。可选地,所述电子设备可以为机顶盒。综上所述,本实施例所提供的一种电子设备内置软件的防盗版方法,通过检测模块检测外壳被拆卸掉且FLASH暴露时,对FLASH的软件程序进行擦除,避免软件程序被盗;该方法对第三方芯片厂商无任何依赖,可以方便快捷的移植到其它芯片平台,无程序泄露的风险;易于实现且成本低廉,具有良好的软件防盗效果。Optionally, the battery is disposed within the protective cover. Optionally, the electronic device may be a set top box. In summary, the anti-piracy method of the built-in software of the electronic device provided by the embodiment, when the detection module detects that the outer casing is removed and the FLASH is exposed, the software program of the FLASH is erased to prevent the software program from being stolen; The method has no dependence on third-party chip manufacturers, can be easily and quickly transplanted to other chip platforms, has no risk of program leakage; is easy to implement and low in cost, and has good software anti-theft effect.
工业实用性Industrial applicability
本公开提供一种电子设备内置软件的防盗版装置及其方法,可以在检测保护罩被拆卸导致FLASH暴露时,自动对FLASH内的软件程序进行擦除,避免软件程序被盗,且对第三方芯片厂商无任何依赖,无程序泄露的风险。 The present disclosure provides an anti-piracy device and a method thereof for electronic device built-in software, which can automatically erase a software program in a FLASH when detecting that the protective cover is disassembled to cause FLASH exposure, thereby preventing the software program from being stolen, and to a third party. The chip manufacturer has no dependence and no risk of program leakage.

Claims (16)

  1. 一种电子设备内置软件的防盗版装置,所述装置设置在所述电子设备的整机电路板上,所述装置包括:An anti-piracy device for embedding software in an electronic device, the device being disposed on a whole circuit board of the electronic device, the device comprising:
    保护罩;Protective cover
    第一检测模块,设置在所述保护罩内,所述第一检测模块设置为检测所述保护罩是否被拆卸,并输出第一检测信号;a first detecting module is disposed in the protective cover, the first detecting module is configured to detect whether the protective cover is detached, and output a first detection signal;
    核心板,设置在所述保护罩内,所述核心板与所述第一检测模块电连接,所述软件存储在所述核心板中,所述核心板设置为根据所述第一检测信号,识别出所述保护罩被拆卸时,对所述软件进行擦除;以及a core board disposed in the protective cover, the core board being electrically connected to the first detecting module, the software being stored in the core board, the core board being disposed according to the first detection signal, Recognizing that the software is erased when the protective cover is removed;
    电池,设置为给所述第一检测模块和所述核心板供电。a battery configured to power the first detection module and the core board.
  2. 根据权利要求1所述的装置,其中,所述电子设备还包括覆盖所述整机电路板的外壳,所述装置还包括:The apparatus of claim 1, wherein the electronic device further comprises a housing covering the entire circuit board, the apparatus further comprising:
    第二检测模块,设置在所述外壳内,所述第二检测模块设置为检测所述外壳是否被拆卸,并输出第二检测信号;a second detecting module disposed in the housing, the second detecting module configured to detect whether the outer casing is detached, and outputting a second detection signal;
    所述核心板还设置为根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行所述对所述软件进行擦除的步骤;The core board is further configured to perform the step of erasing the software when the outer casing is also detached according to the second detection signal;
    所述电池还设置为给所述第二检测模块供电。The battery is also configured to power the second detection module.
  3. 根据权利要求2所述的装置,其中,所述第一检测模块包括第一光传感器,所述设置为检测所述保护罩是否被拆卸,并输出第一检测信号的步骤包括:所述第一光传感器设置为对所述核心板上的第一光照强度进行采样,并输出与所述第一光照强度对应的第一检测信号;The apparatus according to claim 2, wherein said first detecting module comprises a first photo sensor, said step of detecting whether said protective cover is detached, and outputting said first detecting signal comprises: said first The light sensor is configured to sample the first illumination intensity on the core board, and output a first detection signal corresponding to the first illumination intensity;
    所述第二检测模块包括第二光传感器,所述设置为检测所述外壳是否被拆卸,并输出第二检测信号的步骤包括:所述第二光传感器设置为:对所述整机电路板上的第二光照强度进行采样,并输出与所述第二光照强度对应的第二检测信号。The second detecting module includes a second light sensor, and the step of detecting whether the outer casing is detached and outputting the second detecting signal comprises: the second light sensor is configured to: the whole circuit board The second illumination intensity is sampled, and a second detection signal corresponding to the second illumination intensity is output.
  4. 根据权利要求2所述的装置,其中,所述保护罩为不透明金属保护罩。The device of claim 2 wherein the protective cover is an opaque metal shield.
  5. 根据权利要求2所述的装置,其中,所述核心板包括中央处理器CPU和闪存FLASH;The apparatus of claim 2, wherein the core board comprises a central processing unit CPU and a flash memory FLASH;
    所述CPU设置为将所述第二检测信号和所述第一检测信号的电压值与预设的阈值进行比较,以识别所述外壳和所述保护罩的拆卸状态,在所述第一检测信号和所述第二检测信号的电压值均大于或等于所述阈值时,对所述FLASH内的所述软件进行擦除。 The CPU is configured to compare the voltage values of the second detection signal and the first detection signal with a preset threshold to identify a disassembly state of the outer casing and the protective cover, in the first detection When the voltage values of the signal and the second detection signal are both greater than or equal to the threshold, the software in the FLASH is erased.
  6. 根据权利要求1所述的装置,其中,所述核心板包括中央处理器CPU和闪存FLASH编辑装置,所述FLASH编辑装置与所述CPU连接,所述软件存储在所述核心板上包括:所述软件存储在为所述FLASH编辑装置配置的FLASH中;The apparatus according to claim 1, wherein the core board comprises a central processing unit CPU and a flash FLASH editing apparatus, the FLASH editing apparatus is connected to the CPU, and the software is stored on the core board and includes: The software is stored in the FLASH configured for the FLASH editing device;
    所述设置为根据所述第一检测信号,识别出所述保护罩被拆卸时,对所述软件进行擦除的步骤包括:所述CPU将所述第一检测信号的电压值与第一预设电压阈值进行比较,得到第一比较结果,所述CPU根据所述第一比较结果,识别出所述保护罩被拆卸时,控制所述FLASH编辑装置删除存储在所述FALSH中的所述软件。The step of detecting that the software is erased when the protective cover is removed according to the first detection signal includes: the CPU is to compare the voltage value of the first detection signal with the first pre- Comparing the voltage thresholds to obtain a first comparison result, the CPU, according to the first comparison result, identifying that the protection device is detached, controlling the FLASH editing device to delete the software stored in the FALSH .
  7. 根据权利要求2所述的装置,其中,所述核心板包括中央处理器CPU和闪存FLASH编辑装置,所述FLASH编辑装置与所述CPU连接,所述软件存储在所述核心板上包括:所述软件存储在为所述FLASH编辑装置配置的FLASH中;The apparatus according to claim 2, wherein said core board comprises a central processing unit CPU and a flash memory FLASH editing apparatus, said FLASH editing apparatus being connected to said CPU, said software being stored on said core board comprising: The software is stored in the FLASH configured for the FLASH editing device;
    所述根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行对所述软件进行擦除的步骤包括:所述CPU将所述第二检测信号的电压值与第二预设电压阈值进行比较,得到第二比较结果,所述CPU根据所述第二比较结果,识别出所述外壳也被拆卸时,才控制所述FLASH编辑装置删除存储在所述FALSH中的所述软件。The step of performing erasing of the software when the outer casing is also disassembled according to the second detection signal includes: the CPU is configured to compare a voltage value of the second detection signal with a second pre- And comparing the voltage thresholds to obtain a second comparison result, the CPU, according to the second comparison result, identifying that the outer casing is also detached, and then controlling the FLASH editing device to delete the stored in the FALSH. software.
  8. 根据权利要求1~7中任一所述的装置,所述电池设置在所述保护罩内。The apparatus according to any one of claims 1 to 7, wherein said battery is disposed in said protective cover.
  9. 根据权利要求8所述的装置,所述电子设备为机顶盒。The device of claim 8 wherein said electronic device is a set top box.
  10. 一种电子设备内置软件的防盗版方法,所述电子设备包括整机电路板、保护罩、设置在所述保护罩内的第一检测模块、设置在所述保护罩内与所述第一检测模块电连接且存储有所述软件的核心板,和为给所述第一检测模块和所述核心板供电的电池,所述方法包括:An anti-piracy method for an electronic device built-in software, the electronic device comprising a whole circuit board, a protective cover, a first detecting module disposed in the protective cover, disposed in the protective cover and the first detecting The module is electrically connected and stores a core board of the software, and a battery for powering the first detecting module and the core board, the method comprising:
    所述第一检测模块检测所述保护罩是否被拆卸,并输出第一检测信号;以及The first detecting module detects whether the protective cover is detached, and outputs a first detection signal;
    所述核心板根据所述第一检测信号,识别出所述保护罩均被拆卸时,对所述软件进行擦除。The core board, according to the first detection signal, recognizes that the protection cover is detached, and the software is erased.
  11. 根据权利要求10所述的方法,所述电子设备还包括覆盖所述整机电路板的外壳以及第二检测模块,所述第二检测模块设置在所述外壳内,所述电池还设置为给所述第二检测模块供电,所述方法还包括: The method of claim 10, the electronic device further comprising a housing covering the entire circuit board and a second detection module, the second detection module being disposed in the housing, the battery being further configured to The second detecting module supplies power, and the method further includes:
    在所述对所述软件进行擦除的步骤之前,还包括:所述第二检测模块检测所述外壳是否被拆卸,并输出第二检测信号;Before the step of erasing the software, the method further includes: the second detecting module detecting whether the outer casing is disassembled, and outputting a second detection signal;
    所述核心板根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行对所述软件进行擦除的步骤。The core board performs the step of erasing the software when it is recognized that the outer casing is also detached according to the second detection signal.
  12. 根据权利要求11所述的方法,其中,所述第二检测模块检测所述外壳是否被拆卸,并输出第二检测信号的步骤包括:The method according to claim 11, wherein the step of detecting whether the outer casing is detached by the second detecting module and outputting the second detection signal comprises:
    所述第二检测模块对所述整机电路板上的第二光照强度进行采样并输出与所述第二光照强度对应的第二检测信号;The second detecting module samples a second illumination intensity on the whole circuit board and outputs a second detection signal corresponding to the second illumination intensity;
    所述第一检测模块检测所述保护罩是否被拆卸,并输出第一检测信号的步骤包括:The step of detecting, by the first detecting module, whether the protective cover is removed, and outputting the first detection signal comprises:
    所述第一检测模块对所述核心板上的第一光照强度进行采样,并输出与所述第一光照强度对应的第一检测信号。The first detecting module samples the first illumination intensity on the core board, and outputs a first detection signal corresponding to the first illumination intensity.
  13. 根据权利要求10所述的方法,其中,所述核心板还包括中央处理器CPU和闪存FLASH,所述方法还包括:The method of claim 10, wherein the core board further comprises a central processing unit CPU and a flash memory FLASH, the method further comprising:
    所述根据所述第一检测信号识别出所述保护罩被拆卸时,对所述软件进行擦除的步骤包括:The step of erasing the software when the protection cover is removed according to the first detection signal comprises:
    所述CPU将所述第一检测信号的电压值与第一预设阈值进行比较,得到第一比较结果;The CPU compares the voltage value of the first detection signal with a first preset threshold to obtain a first comparison result;
    所述CPU根据所述第一比较结果,识别出所述保护罩被拆卸时,对所述闪存FLASH内存储的所述软件进行擦除。The CPU identifies, according to the first comparison result, that the software stored in the flash memory FLASH is erased when the protective cover is detached.
  14. 根据权利要求11所述的方法,其中,所述核心板还包括中央处理器CPU和闪存FLASH,所述方法还包括:The method of claim 11, wherein the core board further comprises a central processing unit CPU and a flash memory FLASH, the method further comprising:
    所述核心板根据所述第二检测信号,识别出所述外壳也被拆卸时,才执行对所述软件进行擦除的步骤包括:The step of the core board performing the erasing of the software when the core board identifies that the outer casing is also detached according to the second detection signal includes:
    所述CPU将所述第二检测信号与第二预设阈值进行比较,得到第二比较结果;The CPU compares the second detection signal with a second preset threshold to obtain a second comparison result;
    所述CPU根据所述第二比较结果,识别出所述外壳也被拆卸掉时,才执行对所述软件进行擦除的步骤。The CPU performs the step of erasing the software when it is recognized that the outer casing is also removed according to the second comparison result.
  15. 根据权利要求10~14中任一所述的方法,所述电池设置在所述保护罩内。The method according to any one of claims 10 to 14, wherein the battery is disposed within the protective cover.
  16. 根据权利要求15所述的装置,所述电子设备为机顶盒。 The device of claim 15 wherein said electronic device is a set top box.
PCT/CN2017/100890 2016-09-12 2017-09-07 Anti-counterfeit apparatus for built-in software of electronic device and method therefor WO2018045981A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610816805.2A CN106488315B (en) 2016-09-12 2016-09-12 A kind of software anti-pirate device and its method of set-top box
CN201610816805.2 2016-09-12

Publications (1)

Publication Number Publication Date
WO2018045981A1 true WO2018045981A1 (en) 2018-03-15

Family

ID=58273671

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100890 WO2018045981A1 (en) 2016-09-12 2017-09-07 Anti-counterfeit apparatus for built-in software of electronic device and method therefor

Country Status (2)

Country Link
CN (1) CN106488315B (en)
WO (1) WO2018045981A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113543547A (en) * 2021-07-12 2021-10-22 重庆昕晟环保科技有限公司 Secondary water supply is with preventing breaking down controller

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106488315B (en) * 2016-09-12 2019-09-10 深圳创维数字技术有限公司 A kind of software anti-pirate device and its method of set-top box
CN110337033B (en) * 2019-07-04 2021-05-18 深圳市魔乐视科技有限公司 Anti-piracy system of set top box

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201927122U (en) * 2010-12-24 2011-08-10 北大方正集团有限公司 Payment terminal
US20120131680A1 (en) * 2009-07-09 2012-05-24 Tsutomu Baba Detection method for detecting fraud
CN204334630U (en) * 2014-12-08 2015-05-13 成都三零凯天通信实业有限公司 A kind of cloud terminal box with safety function
CN106488315A (en) * 2016-09-12 2017-03-08 深圳创维数字技术有限公司 A kind of software anti-pirate device of Set Top Box and its method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724593B (en) * 2012-06-08 2015-05-06 深圳市九洲电器有限公司 Method for preventing pirating software of sample set top box and set top box
CN102968854A (en) * 2012-11-29 2013-03-13 长城信息产业股份有限公司 Uncovered data self-destruction device for safety payment terminal and method
CN103561321B (en) * 2013-10-15 2017-01-18 深圳创维数字技术有限公司 Method and device for preventing Android intelligent set top box from being abnormally upgraded
CN105490807A (en) * 2016-01-04 2016-04-13 成都卫士通信息产业股份有限公司 VPN device capable of destroying a key when a cover is opened

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120131680A1 (en) * 2009-07-09 2012-05-24 Tsutomu Baba Detection method for detecting fraud
CN201927122U (en) * 2010-12-24 2011-08-10 北大方正集团有限公司 Payment terminal
CN204334630U (en) * 2014-12-08 2015-05-13 成都三零凯天通信实业有限公司 A kind of cloud terminal box with safety function
CN106488315A (en) * 2016-09-12 2017-03-08 深圳创维数字技术有限公司 A kind of software anti-pirate device of Set Top Box and its method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113543547A (en) * 2021-07-12 2021-10-22 重庆昕晟环保科技有限公司 Secondary water supply is with preventing breaking down controller

Also Published As

Publication number Publication date
CN106488315A (en) 2017-03-08
CN106488315B (en) 2019-09-10

Similar Documents

Publication Publication Date Title
WO2018045981A1 (en) Anti-counterfeit apparatus for built-in software of electronic device and method therefor
US9842225B2 (en) Method and apparatus for controlling a browser
CN105550591A (en) Security protection device and method for user data in mobile terminal
RU2601841C2 (en) Mobile terminal detection method and mobile terminal
US9516056B2 (en) Detecting a malware process
JP2007502460A (en) Biometric parameter protection USB interface portable data storage device with USB interface accessible biometric processor
CN103872644A (en) Circuit protection method, device and terminal equipment
CN107526947A (en) A kind of embedded software active control method
CN106203125A (en) Operating system and safety detection method, safety detection device and terminal
WO2019196296A1 (en) Image control and camera application photography control method and apparatus, and electronic device
TW200725582A (en) Apparatus and method for preventing unauthorized copying
JP4931543B2 (en) Information device and computer program
TW201339990A (en) Data protecting system and protecting method
JP2002359617A (en) Image display device
TW201426394A (en) System and method of protecting electronic documents
CN103870765A (en) USB (Universal Serial Bus) security lock and method for protecting data by using USB security lock
CN113076563A (en) Flash content protection method and device
KR20210072609A (en) Service providing apparatus and method supporting high speed identification of photographic work based on deep learning
CN110837632A (en) Safety detection method, intelligent projector and related product
CN108804892A (en) Electronic device
TWI612440B (en) Information storage system with information security protection
CN104065855A (en) Camera device
TWI741122B (en) Electronic device, device and method for detecting a dismantling operation to the electronic device
JP2007175373A (en) Method for detecting opening/closing of lid in electronic apparatus, and lid fixing mechanism in electronic apparatus
CN110263521A (en) Login guard method and device, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17848154

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17848154

Country of ref document: EP

Kind code of ref document: A1