CN111752200A - Program operating method, computer device, and readable storage medium - Google Patents
Program operating method, computer device, and readable storage medium Download PDFInfo
- Publication number
- CN111752200A CN111752200A CN202010650357.XA CN202010650357A CN111752200A CN 111752200 A CN111752200 A CN 111752200A CN 202010650357 A CN202010650357 A CN 202010650357A CN 111752200 A CN111752200 A CN 111752200A
- Authority
- CN
- China
- Prior art keywords
- chip
- identity
- program
- preset
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 33
- 230000007123 defense Effects 0.000 claims abstract description 18
- 230000015654 memory Effects 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 7
- 230000002159 abnormal effect Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0423—Input/output
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/25—Pc structure of the system
- G05B2219/25257—Microcontroller
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The application relates to the technical field of chips, and particularly discloses a program running method. The program running method comprises the steps of judging whether an encrypted flag bit exists in an on-chip FLASH area at the initialization stage of the program; when the encrypted flag bit exists in the on-chip FLASH region, reading encrypted information from the on-chip FLASH region, wherein the encrypted information comprises information obtained by encrypting the identity identifier of a preset chip; decrypting the encrypted information to obtain the identity of the preset chip; reading the identity of the current chip; and comparing the identity of the preset chip with the identity of the current chip, and executing a preset defense step when the identity of the preset chip is inconsistent with the identity of the current chip. Therefore, hackers or other technicians can be prevented from copying the program to a chip other than the preset chip for running, and the effect of preventing the program from being copied is achieved.
Description
Technical Field
The present invention relates to the field of chip technologies, and in particular, to a program running method, a computer device, and a readable storage medium.
Background
With the increasing maturity and development of the single chip microcomputer technology, due to the prominent effects of intelligence and convenience in use, the single chip microcomputer is favored by engineers and is widely applied to various product design occasions. With the increasing requirements of various fields on information security, the requirements of the encryption technology of the single chip microcomputer are more and more strong, and particularly, in the fields of commercial confidentiality and national security, how to prevent hackers or enemies from decoding the programs of the single chip microcomputer is a problem which must be concerned by technical personnel in the field.
In the prior art, the encryption of the single chip microcomputer usually uses the self-carried code locking encryption function of each series of MCU, the locking encryption mode is usually short in key length and simple in algorithm, and hackers or other technicians can break the encryption without special means.
Disclosure of Invention
In view of the above, it is necessary to provide a program running method, a computer device, and a readable storage medium for solving the problem that a program is easily copied.
A program execution method, the program being executed on a chip, the method comprising:
judging whether an encrypted flag bit exists in an on-chip FLASH area at the initialization stage of the program;
when the encrypted flag bit exists in the on-chip FLASH region, reading encrypted information from the on-chip FLASH region, wherein the encrypted information comprises information obtained by encrypting the identity identifier of a preset chip;
decrypting the encrypted information to obtain the identity of the preset chip;
reading the identity of the current chip;
and comparing the identity of the preset chip with the identity of the current chip, and executing a preset defense step when the identity of the preset chip is inconsistent with the identity of the current chip.
In one embodiment, the method further comprises:
controlling the program to run on the preset chip;
reading the identity of the preset chip at the initialization stage of the program;
encrypting the identity identification of the preset chip to obtain encryption information, and writing the encryption information into the on-chip FLASH area;
and writing the encrypted flag bit into the fixed address of the on-chip FLASH region.
In one embodiment, the step of determining whether the encrypted flag bit exists in the on-chip FLASH area at the initialization stage of the program includes:
accessing a fixed address of an on-chip FLASH region at the initialization stage of the program;
and judging whether the fixed address of the FLASH region on the chip has an encrypted flag bit.
In one embodiment, the step of comparing the identity of the preset chip with the identity of the current chip includes:
when the first comparison result does the identity of presetting the chip with the identity of current chip is different, the record is compared the failure number of times, and compares again, works as when comparing failure number of times more than or equal to and predetermine the threshold value, confirm the identity of presetting the chip with the identity of current chip is inconsistent.
In one embodiment, the preset defense step includes:
and controlling the equipment where the current chip is located to enter a downtime state.
In one embodiment, the preset defense step includes:
and starting a timer, and controlling the equipment where the current chip is located to enter an abnormal working state after the equipment works normally for a preset time.
In one embodiment, the preset defense step includes:
the program is cleared.
In one embodiment, the encryption information is obtained by encrypting the identity of the preset chip through a TEA secure encryption algorithm and/or an AES secure encryption algorithm.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the above method when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
According to the program running method, whether an encrypted flag bit exists in an on-chip FLASH area is judged in the initialization stage of program running, if the encrypted flag bit exists, encrypted information is read from the on-chip FLASH area and is decrypted, the decrypted information is compared with the read identity of the current chip, the encrypted information is obtained after the identity of the preset chip is encrypted, if the current chip is not the preset chip, the identity of the preset chip and the identity of the preset chip are different inevitably, at the moment, the comparison fails, and the preset defense step is executed, so that the program can be prevented from normally running on the current chip. Therefore, hackers or other technicians can be prevented from copying the program to a chip other than the preset chip for running, and the effect of preventing the program from being copied is achieved.
Drawings
Fig. 1 is a flowchart of a program running method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a program running method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Description of reference numerals:
10. an encryption module; 20. a communication module; 30. a decryption module; 40. and updating the module.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
In the prior art, the encryption of the program is generally realized through a code locking encryption function carried by a chip, but the locking encryption method has the advantages of short key length, simple algorithm and low difficulty of being cracked by other people. As long as other people obtain one or more same chips, the whole FLASH region containing the program can be completely copied, and then codes are written into the same chip, so that the phenomenon of copying is caused.
In order to solve the problem that the program is copied, an embodiment of the present application provides a program running method, where the program runs on a chip, and the program may be an APP program or the like. As shown in fig. 1, the program execution method includes the steps of:
step S20, during the initialization phase of the program, it is determined whether the on-chip FLASH area has an encrypted flag bit.
In this embodiment, during the program initialization stage, it is first determined whether an encrypted flag bit exists in the on-chip FLASH area. Specifically, the encrypted flag bit indicates that the program is encrypted, decryption operation needs to be performed before the program continues to run, the encrypted flag bit can be set at a fixed address of the on-chip FLASH before the chip is put into use formally, and in an initialization stage of the program, the fixed address of the on-chip FLASH is directly read to judge whether the encrypted flag bit exists; the encrypted flag bit can also be randomly set at any position of the on-chip FLASH area, and during the initialization stage of the program, the addresses of the on-chip FLASH area are read one by one, and whether the encrypted flag bit exists or not is judged. Of course, the setting position of the encrypted flag bit may also be set in other manners, which is not limited herein.
Here, if another person attempts to copy the program, the firmware of the entire FLASH area is generally copied to another chip, and since the encrypted flag bit is present in the FLASH area, the encrypted flag bit is also copied with the program. When someone tries to run the program on another chip, it should be able to read the encrypted flag bit in the on-chip FLASH area.
And step S30, when the encrypted flag bit exists in the on-chip FLASH area, reading the encrypted information from the on-chip FLASH area, wherein the encrypted information comprises the information obtained by encrypting the identity identifier of the preset chip.
When the encrypted flag bit exists in the FLASH region on the chip, the program can be normally operated only after the encrypted information is acquired and then decrypted. At this time, it is necessary to read the encryption information from the on-chip FLASH area, where the encryption information may be pre-stored at the fixed address of the on-chip FLASH area, and in step S30, the encryption information at the fixed address may be directly read; the encryption information can also be stored in any position of the on-chip FLASH area, as long as the encryption information is preset, and the specific position is not absolutely limited here. It should be noted that the encryption information is set in the on-chip FLASH area, as well as the encrypted flag bit, and when another person copies the entire FLASH area onto another chip, the encryption information in the FLASH area is also copied together.
Each chip has its unique identity, for example in the form of an ID value or a physical address. Before the chip is put into use, the identity mark of the chip can be obtained, the identity mark is encrypted to generate encryption information, and the encryption information of the identity mark is prestored in the on-chip FLASH area. That is, the on-chip FLASH area of each preset chip has unique encryption information corresponding to the chip.
And step S40, decrypting the encrypted information to obtain the identity of the preset chip. And after the encrypted information is obtained, decrypting the encrypted information to further obtain the identity of the preset chip.
And step S50, reading the identity of the current chip. As described above, each chip has a unique identity, which may be an ID value, a physical address, or an identity in other forms, that is, the identity of the current chip on which the program operates may be obtained.
It should be noted that the step of obtaining the identity of the current chip may be performed after the step of obtaining the encrypted information and decrypting the encrypted information to obtain the identity of the preset chip, or may be performed before the step of obtaining the identity of the preset chip, or both of them may be performed simultaneously, which does not affect the implementation of the scheme of the present application, and is covered in the protection scope of the present application.
And step S60, comparing the identity of the preset chip with the identity of the current chip, and executing a preset defense step when the identity of the preset chip is not consistent with the identity of the current chip.
When the identity of the preset chip and the identity of the current chip are obtained, the identity of the preset chip and the identity of the current chip can be compared. If the program is not copied and copied, the current chip is the preset chip, the identity identifications of the current chip and the preset chip are consistent, and the program can be controlled to continue to run. If the program is being copied to another chip by others to run, the identity of the current chip is necessarily different from the identity of the preset chip, and at this time, a preset defense step is taken to prevent the program from running normally on the current chip.
The preset defense steps are not unique and can be set according to actual requirements, and the problem search direction of a thief is confused, so that the plagiarism period of the thief is prolonged as much as possible, time is won for searching plagiarism products appearing in the market, normal operation of a program can be directly prevented, and the like.
According to the program running method, whether an encrypted flag bit exists in an on-chip FLASH area is judged in the initialization stage of program running, if the encrypted flag bit exists, encrypted information is read from the on-chip FLASH area and is decrypted, the decrypted information is compared with the read identity of the current chip, the encrypted information is obtained after the identity of the preset chip is encrypted, if the current chip is not the preset chip, the identity of the preset chip and the identity of the preset chip are different inevitably, at the moment, the comparison fails, and the preset defense step is executed, so that the program can be prevented from normally running on the current chip. Therefore, hackers or other technicians can be prevented from copying the program to a chip other than the preset chip for running, and the effect of preventing the program from being copied is achieved.
In one embodiment, as shown in fig. 2, the program running method provided in this embodiment further includes the following steps:
step S10, the control program runs on the default chip. Before the program is put into use, the control program is firstly run on a preset chip. The preset chip is a specified chip which needs to be encrypted.
Step S11, reading the id of the preset chip during the initialization phase of the program.
And step S12, encrypting the identity of the preset chip to obtain encryption information, and writing the encryption information into the on-chip FLASH area. Specifically, the encryption information may be written into a fixed address of the on-chip FLASH area, or may be written into an arbitrary position of the on-chip FLASH area. In this embodiment, the encryption information is preferably written into the fixed address of the on-chip FLASH area, so that the encryption information is directly read from the fixed address every time the program is executed subsequently, and the operation speed is increased.
And step S13, writing the encrypted flag bit into the fixed address of the on-chip FLASH area.
After the encryption information is written, an encrypted flag bit is written in the fixed address of the FLASH area on the chip to identify that the encryption information is encrypted.
The above steps are performed before step S20.
In a preferred embodiment, before step S11, the method further includes a step of determining whether an encrypted flag bit exists at the fixed address of the on-chip FLASH area, and if the encrypted flag bit does not exist, it indicates that the FLASH area is not encrypted, and then step S11 is executed to finally write the encrypted flag bit. When the encrypted flag already exists, it indicates that the flag is already encrypted, and the steps S11-S13 do not need to be executed again. Therefore, on one hand, the phenomenon of repeated encryption can be avoided, on the other hand, each chip can be ensured to be encrypted, and each chip is ensured to have unique encryption information and encryption flag bits.
In one embodiment, the step S20 of determining whether the encrypted flag bit exists in the on-chip FLASH area in the initialization stage of the program includes the following steps:
step S201, accessing a fixed address of an on-chip FLASH area in the initialization stage of a program;
step S202, judging whether the fixed address of the on-chip FLASH area has an encrypted flag bit.
Namely, the encrypted flag bit is set in the fixed address of the on-chip FLASH region, the fixed address can be directly accessed in the initialization stage of the program, and whether the encrypted flag bit exists at the fixed address or not is judged, so that the operation time is saved.
In one embodiment, the step S60 of comparing the identity of the preset chip with the identity of the current chip includes the following steps:
and when the primary comparison result shows that the identity of the preset chip is different from the identity of the current chip, recording the comparison failure times, performing re-comparison, and when the comparison failure times are greater than or equal to a preset threshold value, determining that the identity of the preset chip is inconsistent with the identity of the current chip.
Specifically, if the initial comparison result is inconsistent, the preset defense step is not directly executed, but a certain fault-tolerant number is reserved, the encrypted information is read again, the encrypted information is decrypted and then compared again, if the number of times of continuous comparison failure is greater than or equal to the preset threshold value, the fact that the identity of the preset chip is inconsistent with the identity of the current chip can be determined, namely, the program is determined to be copied and copied, and the preset defense step is executed. The preset threshold is not unique and is set according to actual requirements, for example, 5 times, 6 times, 7 times and the like, and is not limited herein.
Therefore, the influence of misjudgment on the normal operation of the program on the preset chip can be avoided.
In one embodiment, the preset defense step includes: and controlling the equipment where the current chip is positioned to enter a downtime state.
As an alternative embodiment, the preset defensive step includes; and starting a timer, and controlling the equipment where the current chip is located to enter an abnormal working state after the equipment works normally for a preset time.
As another alternative, the preset defensive step includes: and (5) clearing the program.
The downtime state refers to a state that the initialization fails and the equipment cannot be normally started; the control equipment enters the abnormal working state after working for the preset time length in the normal way, specifically, after the equipment works for the preset time length in the normal way, a program automatically modifies certain key system parameters to enable the corresponding functions of the system to be limited or out of order, and the purpose is to confuse the problem searching direction of a thief so as to prolong the plagiarism period of the thief as much as possible and strive for time for finding plagiarism products in the market. The clearing program is a program self-destruction program, and the programs in the FLASH area are all erased, so that the system cannot run.
In practical application, other defense steps can be set according to actual requirements.
In one embodiment, the encryption information is obtained by encrypting the id of the preset chip through a TEA secure encryption algorithm and/or an AES secure encryption algorithm. The TEA secure encryption algorithm and the AES secure encryption algorithm are high in safety and efficiency, occupy a small storage space and are suitable for encrypting the identity of the preset chip in the embodiment.
The embodiment of the present application provides a computer device, as shown in fig. 3, including a memory 200 and a processor 300, where the memory 200 and the processor 300 are communicatively connected to each other, and may be connected by a bus or in other manners, and fig. 3 takes the example of connection by a bus as an example.
The memory 200, which is a non-transitory computer readable storage medium, can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions corresponding to the program execution method in the embodiment of the present invention. The processor 300 executes various functional applications and data processing of the processor 300, i.e., a program execution method, by executing non-transitory software programs, instructions, and modules stored in the memory 200.
The memory 200 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor 300, and the like. Further, the memory 200 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 200 optionally includes memory located remotely from processor 300, which may be connected to the processor via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A program execution method, wherein the program is executed on a chip, the method comprising:
judging whether an encrypted flag bit exists in an on-chip FLASH area at the initialization stage of the program;
when the encrypted flag bit exists in the on-chip FLASH region, reading encrypted information from the on-chip FLASH region, wherein the encrypted information comprises information obtained by encrypting the identity identifier of a preset chip;
decrypting the encrypted information to obtain the identity of the preset chip;
reading the identity of the current chip;
and comparing the identity of the preset chip with the identity of the current chip, and executing a preset defense step when the identity of the preset chip is inconsistent with the identity of the current chip.
2. The program execution method according to claim 1, further comprising:
controlling the program to run on the preset chip;
reading the identity of the preset chip at the initialization stage of the program;
encrypting the identity identification of the preset chip to obtain encryption information, and writing the encryption information into the on-chip FLASH area;
and writing the encrypted flag bit into the fixed address of the on-chip FLASH region.
3. The program operating method according to claim 2, wherein the step of determining whether the encrypted flag bit exists in the on-chip FLASH area at the initialization stage of the program comprises:
accessing a fixed address of an on-chip FLASH region at the initialization stage of the program;
and judging whether the fixed address of the FLASH region on the chip has an encrypted flag bit.
4. The program operating method according to claim 1, wherein the step of comparing the identity of the preset chip with the identity of the current chip comprises:
when the first comparison result does the identity of presetting the chip with the identity of current chip is different, the record is compared the failure number of times, and compares again, works as when comparing failure number of times more than or equal to and predetermine the threshold value, confirm the identity of presetting the chip with the identity of current chip is inconsistent.
5. The program execution method according to claim 1, wherein the preset defense step includes:
and controlling the equipment where the current chip is located to enter a downtime state.
6. The program execution method according to claim 1, wherein the preset defense step includes: and starting a timer, and controlling the equipment where the current chip is located to enter an abnormal working state after the equipment works normally for a preset time.
7. The program execution method according to claim 1, wherein the preset defense step includes: the program is cleared.
8. The program running method according to claim 1, wherein the encryption information is information obtained by encrypting the id of the preset chip by a TEA security encryption algorithm and/or an AES security encryption algorithm.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 8 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010650357.XA CN111752200A (en) | 2020-07-08 | 2020-07-08 | Program operating method, computer device, and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010650357.XA CN111752200A (en) | 2020-07-08 | 2020-07-08 | Program operating method, computer device, and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111752200A true CN111752200A (en) | 2020-10-09 |
Family
ID=72680187
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010650357.XA Pending CN111752200A (en) | 2020-07-08 | 2020-07-08 | Program operating method, computer device, and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111752200A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231728A (en) * | 2020-10-20 | 2021-01-15 | 深圳市泰祺科技有限公司 | Design method, device and equipment for anti-cracking chip and storage medium |
CN112632482A (en) * | 2020-12-18 | 2021-04-09 | 珠海极海半导体有限公司 | Target application running method and device and storage medium |
CN114969677A (en) * | 2022-06-10 | 2022-08-30 | 上海领存信息技术有限公司 | Firmware operation control method, device and medium based on MCU chip GUID |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1517890A (en) * | 2003-01-21 | 2004-08-04 | 株式会社东芝 | Storage device and apparatus and method for writing data |
CN1553729A (en) * | 2003-05-27 | 2004-12-08 | ����������ͨѶ�ɷ�����˾�Ͼ��ֹ� | Protection of authentication information of PHS mobile telephone |
CN1553728A (en) * | 2003-05-27 | 2004-12-08 | ����������ͨѶ�ɷ�����˾�Ͼ��ֹ� | Protection of authentication information of PHS mobile telephone |
JP2009064462A (en) * | 2008-10-27 | 2009-03-26 | Toshiba Corp | Microprocessor |
CN101710307A (en) * | 2009-10-16 | 2010-05-19 | 上海闻泰电子科技有限公司 | Method for protecting data security of digital equipment |
CN110807177A (en) * | 2019-11-06 | 2020-02-18 | 南京法艾博光电科技有限公司 | Reverse engineering defense device and method |
CN111026419A (en) * | 2019-11-08 | 2020-04-17 | 深圳市有方科技股份有限公司 | Application program upgrading method, device and system of single chip microcomputer |
CN111191196A (en) * | 2020-01-02 | 2020-05-22 | 日立楼宇技术(广州)有限公司 | Embedded program running method and device, computer equipment and storage medium |
-
2020
- 2020-07-08 CN CN202010650357.XA patent/CN111752200A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1517890A (en) * | 2003-01-21 | 2004-08-04 | 株式会社东芝 | Storage device and apparatus and method for writing data |
CN1553729A (en) * | 2003-05-27 | 2004-12-08 | ����������ͨѶ�ɷ�����˾�Ͼ��ֹ� | Protection of authentication information of PHS mobile telephone |
CN1553728A (en) * | 2003-05-27 | 2004-12-08 | ����������ͨѶ�ɷ�����˾�Ͼ��ֹ� | Protection of authentication information of PHS mobile telephone |
JP2009064462A (en) * | 2008-10-27 | 2009-03-26 | Toshiba Corp | Microprocessor |
CN101710307A (en) * | 2009-10-16 | 2010-05-19 | 上海闻泰电子科技有限公司 | Method for protecting data security of digital equipment |
CN110807177A (en) * | 2019-11-06 | 2020-02-18 | 南京法艾博光电科技有限公司 | Reverse engineering defense device and method |
CN111026419A (en) * | 2019-11-08 | 2020-04-17 | 深圳市有方科技股份有限公司 | Application program upgrading method, device and system of single chip microcomputer |
CN111191196A (en) * | 2020-01-02 | 2020-05-22 | 日立楼宇技术(广州)有限公司 | Embedded program running method and device, computer equipment and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231728A (en) * | 2020-10-20 | 2021-01-15 | 深圳市泰祺科技有限公司 | Design method, device and equipment for anti-cracking chip and storage medium |
CN112632482A (en) * | 2020-12-18 | 2021-04-09 | 珠海极海半导体有限公司 | Target application running method and device and storage medium |
CN114969677A (en) * | 2022-06-10 | 2022-08-30 | 上海领存信息技术有限公司 | Firmware operation control method, device and medium based on MCU chip GUID |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10719606B2 (en) | Security processor for an embedded system | |
CN100437502C (en) | Safety chip based virus prevention method | |
US11003781B2 (en) | Root key processing method and associated device | |
JP4980464B2 (en) | Logical device with write protected memory management unit register | |
US9514305B2 (en) | Code pointer authentication for hardware flow control | |
KR102719427B1 (en) | Secure verification of firmware | |
CN111752200A (en) | Program operating method, computer device, and readable storage medium | |
US20170255384A1 (en) | Efficient secure boot carried out in information processing apparatus | |
KR100654446B1 (en) | Apparatus and method for Secure booting | |
TW201500960A (en) | Detection of secure variable alteration in a computing device equipped with unified extensible firmware interface (UEFI)-compliant firmware | |
US10885196B2 (en) | Executing protected code | |
US9262631B2 (en) | Embedded device and control method thereof | |
US20160335433A1 (en) | Intrusion detection system in a device comprising a first operating system and a second operating system | |
US11347858B2 (en) | System and method to inhibit firmware downgrade | |
CN113672878A (en) | System and method for preventing rollback attack | |
CN110727940A (en) | Electronic equipment password management method, device, equipment and storage medium | |
CN111291425B (en) | Chip protection method and device, storage medium and vehicle-mounted chip | |
CN114547618A (en) | Safe starting method and device based on Linux system, electronic equipment and storage medium | |
JP6622360B2 (en) | Information processing device | |
US20070061879A1 (en) | System and method for managing information handling system hard disk drive password protection | |
US11010312B2 (en) | Security system and method of stored data | |
CN110781527B (en) | Control register protection method and device | |
US11113399B2 (en) | Electronic apparatus and control method of electronic apparatus | |
CN108228219B (en) | Method and device for verifying BIOS validity during in-band refreshing of BIOS | |
CN109583196B (en) | Key generation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |