CN103294496B - Programming system - Google Patents

Programming system Download PDF

Info

Publication number
CN103294496B
CN103294496B CN201210049779.7A CN201210049779A CN103294496B CN 103294496 B CN103294496 B CN 103294496B CN 201210049779 A CN201210049779 A CN 201210049779A CN 103294496 B CN103294496 B CN 103294496B
Authority
CN
China
Prior art keywords
burning
encipheror
certification
eigenvalue
authentication seeds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210049779.7A
Other languages
Chinese (zh)
Other versions
CN103294496A (en
Inventor
陈晓晖
黄呈俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Winbond Electronics Corp
Original Assignee
Winbond Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Winbond Electronics Corp filed Critical Winbond Electronics Corp
Priority to CN201210049779.7A priority Critical patent/CN103294496B/en
Publication of CN103294496A publication Critical patent/CN103294496A/en
Application granted granted Critical
Publication of CN103294496B publication Critical patent/CN103294496B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of programming system, it includes a design end and a certification burning end.Design end is in order to send an encipheror.Certification burning end, according to encipheror, obtains an eigenvalue, and comparative feature value and an authentication seeds.If eigenvalue coupling authentication seeds, then encipheror is carried out a particular procedure, treat burning program in order to produce one, and according to a restrictive condition, will treat that burning program is burned onto in a chip.By the invention it is possible to the loss avoided the unlimited number of burning of burning person and bring to software provider.

Description

Programming system
Technical field
The present invention relates to a kind of burning device, can treat one that burning program burning is in a chip in particular to one Burning device.
Background technology
It is said that in general, to procedure code is inputted in chip, it is common that use a burning device.The provider of software is by soft Part hands to burning person, and order carries out burning action.The generally provider of software is to collect the charges according to burning number of times.But for not For the burning person of Xiao, it may lie about burning number of times, or steals software, thus results in the loss of software provider.
Summary of the invention
The present invention provides a kind of programming system, and it includes a design end and a certification burning end.Design end is in order to send One encipheror.Certification burning end, according to encipheror, obtains an eigenvalue, and comparative feature value and an authentication seeds.If it is special Value indicative coupling authentication seeds, then carry out a particular procedure to encipheror, treats burning program in order to produce one, and limits according to one Condition, will treat that burning program is burned onto in a chip.
By the present invention, when burning person takes this encipheror, need first according to this customizing messages, by a certification journey Sequence, can prove that its burning device used is legal, and namely software provider is approved, then further according to software One restrictive condition (such as burning number of times or time) of provider institute specification, carries out burning action.It can thus be avoided burning person without The loss limiting secondary burning and bring to software provider.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, not Constitute limitation of the invention.In the accompanying drawings:
Fig. 1 is the schematic diagram of the programming system of the present invention;
Fig. 2 is that the one of the certification burning end of the present invention may embodiment;
Fig. 3 is the process that the certification burning end of the present invention carries out burning;
Fig. 4 is another possible embodiment of the certification burning end of the present invention.
Drawing reference numeral:
100: programming system;110: design end;
120: certification burning end;121: chip;
131: encipheror;132,133: authentication seeds;
210: seed generator;220: control unit;
230: storage element;410: server;
420: burning device.
Detailed description of the invention
For the features and advantages of the present invention can be become apparent, cited below particularly go out preferred embodiment, and coordinate institute's accompanying drawing Formula, is described in detail below.
The present invention is applicable to a burning device, beats as long as an original program and a customizing messages are encrypted by the provider of software It is bundled into an encipheror.When burning person takes this encipheror, need first according to this customizing messages, by an authentication procedure, side Can prove that its burning device used is legal, namely software provider is approved, then provides further according to software One restrictive condition (such as burning number of times or time) of institute of side specification, carries out burning action.
Fig. 1 is the schematic diagram of the programming system of the present invention.In the present embodiment, programming system 100 includes a design end 110 And a certification burning end 120.Design end 110 sends an encipheror 131.For example, program designer is according to client's Demand, writes out an original program.In a possible embodiment, original program and a customizing messages are packaged in by program designer Together, and encrypt the result after packing, in order to produce encipheror 131.The present invention is not limiting as designing end 110 and sends encryption journey The method of sequence 131.In a possible embodiment, design end 110, by world-wide web, exports encipheror 131.
Owing to encipheror 131 has a customizing messages, therefore certification burning end 120 can obtain one according to encipheror 131 Eigenvalue.Eigenvalue and an authentication seeds are compared by certification burning end 120.If during eigenvalue coupling authentication seeds, certification is burnt Record end 120 carries out a particular procedure to encipheror 131, treats burning program in order to produce one, and according to a restrictive condition, will treat Burning program is burned onto in chip 121.
In a possible embodiment, restrictive condition is contained in customizing messages, and by set by design end 110, in order to advise The required condition observed during model certification burning end 120 burning/recording chip, when burning record number of times or the burning of card burning end 120 such as specification Between.
As a example by burning number of times, if the burning number of times preset is 1000 times (i.e. restrictive condition), then for identical encryption For program, certification burning end 120 only can carry out the burning action of 1000 times.When burning number of times is more than 1000 times, certification is burnt Record end 120 just cannot be by data recording in chip.
In the present embodiment, certification burning end 120 cannot change restrictive condition, unless certification burning end 120 receives newly Encipheror.After certification burning end 120 receives new encipheror, by according to new restrictive condition, carry out burning and move Make.For example, it is assumed that certification burning end 120 successively receives one first encipheror and one second encipheror, wherein First encipheror corresponds to the first restrictive condition (such as burning 1000 times), and the second encipheror corresponds to one second restrictive condition (such as burning 2000 times).
For the first encipheror, certification burning end 120 meets the burning action performing 1000 times together.For the second encryption journey Sequence, certification burning end 120 meets the burning action performing 2000 times together.But, the present invention does not limit certification burning end 120 burning The order of the first or second encipheror.In a possible embodiment, for same encipheror, certification burning end 120 Burning will not be carried out continuously.As long as the burning action of certification burning end 120 meets restrictive condition.
For example, certification burning end 120 may perform the burning action of 500 times, then pin first for the first encipheror To the second encipheror, performing the burning action of 2000 times, the most again for the first encipheror, the burning performing 500 times is moved Make.
As a example by recordable time, after certification burning end 120 receives new encipheror, by according to new restriction bar Part, carries out burning action.The present invention is not limiting as the kind of restrictive condition.In a possible embodiment, it is assumed that certification burning end 120 successively receive one first encipheror and one second encipheror, and wherein the first encipheror corresponds to the first restriction Condition (as burning can be carried out in a special time, such as certification burning end 120 can carry out burning action in 30 days), the second encryption Program corresponds to one second restrictive condition (as 60 days can carry out burning action), then certification burning end 120 will be according to first and Two restrictive conditions, carry out burning action.
In other embodiments, restrictive condition set by design end 110 also can include recordable time and burning number of times simultaneously, Such as can carry out the number of times of burning in a special time, such as 30 days certification burning ends 120, can to carry out burning 1000 inferior.
In the present embodiment, certification burning end 120 carries out a particular procedure to encipheror 131, waits to burn in order to produce one Record program.The present invention does not limit the kind of particular procedure.One may in embodiment, through particular procedure (at deciphering Reason) after, certification burning end 120 obtains an original program, and by this original program direct burning to chip 121.
In another embodiment, in addition to decryption processing, particular procedure has more encryption.In order to improve the peace of data Quan Xing, after decryption processing, this original program is encrypted by certification burning end 120 again, treats burning program in order to produce one, and To treat that burning program burning is in chip 121.
The present invention does not limit the encryption method that certification burning end 120 is used.The encryption that certification burning end 120 is used Method may be the same or different the encryption method used in design end 110.As long as the data that burning is in chip 121 are different from former Beginning program, just can reach the function of protection.
In a possible embodiment, the authentication seeds 132 that design end 110 is provided according to certification burning end 120, produce Encipheror 131.In other embodiments, design end 110 can produce an authentication seeds 133 voluntarily to certification burning end 120.Separately Outward, authentication seeds 133 produced by design end 110 may comprise or not comprise a restrictive condition.Will be described below producing certification The different embodiments of seed.
Fig. 2 is that the one of the certification burning end 120 of the present invention may embodiment.In the present embodiment, authentication seeds 132 is by recognizing Card burning end 120 is produced, and is supplied to design end 110.Design end 110 is after receiving authentication seeds 132, just by certification kind Son 132, one restrictive condition and an original program are packaged with, and encrypt the result after packing, in order to produce encipheror 131.In the present embodiment, authentication seeds 132 and restrictive condition can be described as a customizing messages.
In the present embodiment, certification burning end 120 includes that seed generator 210, control unit 220, stores list Unit 230 and a chip 121.Seed generator 210 is in order to produce authentication seeds 132.The present invention does not limit seed generator The kind of 210.As long as the device of authentication information can be provided, all can be as seed generator.In a possible embodiment, seed Generator 210 can be a random number generator.Random number generator produces different authentication seeds under different time.It addition, certification Seed 132, in addition to being supplied to design end 110, also can be stored in storage element 230.
Control unit 220 receives encipheror 131, and is stored in storage element 230 by encipheror 131.Control single Unit 220, according to encipheror 131, obtains an eigenvalue (or an identification code), and by stored by eigenvalue and storage element 230 Authentication seeds 132 is made comparisons.When eigenvalue coupling authentication seeds, control unit 220 carries out a specific place to encipheror 131 Reason, and according to a restrictive condition, treat that by one burning program is burned onto in chip 121.
In a possible embodiment, a restrictive condition is packed in encipheror 131 by design end, therefore, is carrying out After particular procedure, control unit 220 can get a restrictive condition and and treats burning program.Control unit 220 is further according to restriction Condition, treats that by one burning program is burned onto in chip 121
Fig. 3 is the process that the certification burning end 120 of the present invention carries out burning.First, it is loaded into one and treats burning program (step S310).The present invention does not limit the state treating burning program.For example, treat that burning program can be one to have encrypted or do not added Close procedure code.In a possible embodiment, available diffie-hellman graceful key exchange process (Diffie-Hellman key Exchange), burning program is treated in generation.
Then, a recording status (step S320) it is loaded into.In the present embodiment, this recording status is the shape of actual burn State, such as burning number of times or recordable time.Then judge that recording status has met a restrictive condition (step S330) the most then,.? In the present embodiment, restrictive condition is to preset burning number of times.
When actual burn number of times has reached default burning number of times, then stop burning (step S340).If actual burn number of times is not Reach default burning number of times, then continue burning/recording chip (step S350), and revise recording status (step S360).In an embodiment In, actual burn number of times will add 1.Then, store amended recording status (step S370), then perform step S320, in order to Again judge whether recording status meets restrictive condition.
In other embodiments, new treat burning program if being loaded into, then certification burning end 120 can first record the burning of last time State and old treat burning program, then carry out burning for the burning program newly treated, waits and new treats that burning program burning completes After, then capture the program state of last time, to carry out the old burning work treating burning program.
Fig. 4 is another possible embodiment of the certification burning end of the present invention.In the present embodiment, design end 110 is except adding Outside close program 131, more provide an authentication seeds 133 to certification burning end 120.In a possible embodiment, encipheror 131 wraps Containing an original program and a restrictive condition.In other embodiments, encipheror 131 only comprises an original program, and certification Seed 133 comprises a restrictive condition.For improving safety, in a possible embodiment, authentication seeds 133 is through encryption.
As it can be seen, certification burning end 120 includes a server (network server) 410 and a burning device 420.Server 410 receives authentication seeds 133.Burning device 420 processes encryption data 131, in order to obtain an eigenvalue, and root According to eigenvalue, link up with server 410.
May be in embodiment one, burning device 420, according to eigenvalue, sends a control command to server 410, in order to Whether burning device 420 is a specific burning device to make server 410 judge.In the present embodiment, server 410 is according to burning The control command that device 420 is sent, learns out this feature value, and by this feature value compared with authentication seeds 133, further according to Comparative result, restored burning device 420.Burning device 420, according to the reply result of server 410, decides whether to carry out burning Action.
For example, if eigenvalue coupling authentication seeds 133, then burning device 420 is according to the reply of server 410, right Encipheror 131 carries out a particular procedure, treats burning program in order to produce one.In a possible embodiment, encipheror 131 has There is a restrictive condition.Burning device 420, according to restrictive condition, will treat that burning program burning is in chip 121.
In other embodiments, restrictive condition is provided by server 410.For example, if eigenvalue mates certification kind Son 133, then server 410 is according to eigenvalue, replys a restrictive condition to burning device 420.It addition, after reply, server 410 delete authentication seeds 133, to avoid burning device 420 to repeat burning.
In the present embodiment, although burning device 420 receives encipheror 131, but (the most true before not yet obtaining certification Recognize whether an eigenvalue mates an authentication seeds), it is impossible to burning encipheror 131.On the contrary, at burning device 420 according to adding Close program 131 and obtain an eigenvalue, and when this feature value is mated with the authentication seeds 133 on server 410, burning fills Put 420 and could process encipheror 131, and according to a restrictive condition, carry out burning action.Therefore, encryption is obtained as burning person After program, need to be by specific burning device ability burning encipheror, the burning device only mated could be understood and burning Corresponding encipheror.
Unless otherwise defined, at this, all vocabulary (comprising technology and scientific terms) all belong in the technical field of the invention Tool usually intellectual is commonly understood by.Additionally, unless clear expression, vocabulary definition in general dictionary should be interpreted that and it In the article of correlative technology field, meaning is consistent, and should not be construed as perfect condition or the most formal voice.
Although the present invention is disclosed above with preferred embodiment, so it is not limited to the present invention, any affiliated technology Field has usually intellectual, without departing from the spirit and scope of the invention, when making a little change and retouching, therefore The protection domain of the present invention when depending on after attached the defined person of claim be as the criterion.

Claims (9)

1. a programming system, it is characterised in that including:
One design end, receives an authentication seeds, described authentication seeds, a restrictive condition and an original program is packaged in one Rise, and encrypt the result after packing, to produce an encipheror;And
One certification burning end, according to described encipheror, obtains an eigenvalue, and relatively described eigenvalue and described certification kind Son, if described eigenvalue mates described authentication seeds, then carries out a particular procedure to described encipheror, waits to burn in order to produce one Record program, and according to described restrictive condition, treat that burning program is burned onto in a chip by described, wherein said restrictive condition is limited Make described certification burning end by described number of times or the time treating that burning program is burned onto described chip;
Wherein, described particular procedure deciphers described encipheror, in order to produce an original program, re-encrypts described original program, Described in producing, treat that burning program, wherein said encipheror treat burning program described in being different from.
2. programming system as claimed in claim 1, it is characterised in that described certification burning end produces described authentication seeds to institute Stating design end, wherein said design end is encrypted and packs described authentication seeds, described restrictive condition and described original program, uses To produce described encipheror.
3. programming system as claimed in claim 2, it is characterised in that described certification burning end includes:
One seed generator, in order to produce described authentication seeds;
One storage element, in order to store described encipheror and described authentication seeds;And
One control unit, according to described encipheror, obtains described eigenvalue, and by described eigenvalue and described authentication seeds ratio Relatively, when described eigenvalue mates described authentication seeds, described control unit carries out described particular procedure to described encipheror, And according to described restrictive condition, treat that burning program is burned onto in described chip by described.
4. programming system as claimed in claim 3, it is characterised in that described seed generator is a random number generator.
5. programming system as claimed in claim 1, it is characterised in that described design end produces described authentication seeds, and by institute State authentication seeds and be sent to described certification burning end.
6. programming system as claimed in claim 5, it is characterised in that described certification burning end includes:
One server, receives described authentication seeds;And
One burning device, processes described encryption data, in order to obtain described eigenvalue, and according to described eigenvalue, with described clothes Business device is linked up, if described eigenvalue mates described authentication seeds, then described encipheror is carried out described particular procedure, uses Burning program is treated described in producing.
7. programming system as claimed in claim 6, it is characterised in that if described eigenvalue mates described authentication seeds, described Server is according to described eigenvalue, it is provided that described restrictive condition gives described burning device.
8. programming system as claimed in claim 6, it is characterised in that if described eigenvalue mates described authentication seeds, then burn Recording device processes described encipheror, treats burning program in order to learn described in described restrictive condition generation.
9. programming system as claimed in claim 6, it is characterised in that if described eigenvalue mates described authentication seeds, then institute State server and delete described authentication seeds.
CN201210049779.7A 2012-02-29 2012-02-29 Programming system Active CN103294496B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210049779.7A CN103294496B (en) 2012-02-29 2012-02-29 Programming system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210049779.7A CN103294496B (en) 2012-02-29 2012-02-29 Programming system

Publications (2)

Publication Number Publication Date
CN103294496A CN103294496A (en) 2013-09-11
CN103294496B true CN103294496B (en) 2016-12-14

Family

ID=49095435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210049779.7A Active CN103294496B (en) 2012-02-29 2012-02-29 Programming system

Country Status (1)

Country Link
CN (1) CN103294496B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683105A (en) * 2014-06-05 2015-06-03 深圳市迈斯威志科技有限公司 Remote encryption, decryption and writing processing method for MCU writer
CN104598285A (en) * 2015-02-11 2015-05-06 北京京东方多媒体科技有限公司 Burning method and burning system
CN106529309A (en) * 2016-09-19 2017-03-22 芯海科技(深圳)股份有限公司 Method for limiting programming number of programmer by encrypting programming file
CN107729723B (en) * 2017-11-08 2023-07-04 深圳市希顿科技有限公司 Integrated circuit program burning method and burning system
CN107783773B (en) * 2017-11-22 2021-01-12 广东乐心医疗电子股份有限公司 Firmware burning method and system
CN108513172A (en) * 2018-02-13 2018-09-07 广州视源电子科技股份有限公司 Data limit carving method, device, system and server, television set
CN109326032B (en) * 2018-10-14 2021-06-11 浙江鸿利锁业有限公司 Lock leasing method and leasing device applying same
CN109901851B (en) * 2019-02-28 2022-07-12 广州小鹏汽车科技有限公司 Firmware burning system and method
CN110489959B (en) * 2019-09-06 2022-04-26 珠海格力电器股份有限公司 Protection method, burning method and device for burning file, storage medium and equipment
CN117633733B (en) * 2024-01-25 2024-04-12 九音科技(南京)有限公司 Method for acquiring software by chip product, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175269A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and its method and device for system bootstrapping
CN101281478A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 Method adopting multiplexing technique to perform paralleling burning record
CN101281477A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 System adopting multiplexing technique to perform paralleling burning record

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175269A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and its method and device for system bootstrapping
CN101281478A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 Method adopting multiplexing technique to perform paralleling burning record
CN101281477A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 System adopting multiplexing technique to perform paralleling burning record

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CFP系列芯片的烧录器设计;朱同;《中国优秀硕士学位论文》;20080930;第15页 *
Fs88x6系列加密芯片烧录器的设计与实现;徐元哲;《中国优秀硕士学位论文》;20110131;第54页 *

Also Published As

Publication number Publication date
CN103294496A (en) 2013-09-11

Similar Documents

Publication Publication Date Title
CN103294496B (en) Programming system
CN109040090A (en) A kind of data ciphering method and device
CN110061840A (en) Data ciphering method, device, computer equipment and storage medium
CN103761456B (en) A kind of anti-method cracking of monolithic microcomputer kernel code
JP6137173B2 (en) Encrypted database system, client terminal and database server, combining method and program
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
CN107729723A (en) A kind of integrated circuit burning program method and programming system
CN102510378A (en) Method for logging in online game through mobile equipment
CN107995299A (en) The blind storage method of anti-access module leakage under a kind of cloud environment
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN105897737B (en) A kind of method of secure data exchange
CN109753770A (en) Determine method and device, method for burn-recording and device, the electronic equipment of burning data
KR102272928B1 (en) Operating method for machine learning model using encrypted data and apparatus based on machine learning model
CN109446757A (en) A method of for general MCU programmed protection
CN107534549A (en) Data character stream block encryption
CN113206741B (en) Anti-machine learning security authentication method and device based on strong PUF
JP6919973B2 (en) Computer-aided obfuscation of program code
CN105653932B (en) The method and apparatus of software upgrading verification
CN108268781A (en) The electronic component of electronic device, the method and encryption method for starting electronic device
CN107358067B (en) Method for realizing encryption and decryption by deriving SCK with L icense in dongle
TWI499929B (en) Programming system
JP6246516B2 (en) Information processing system
CN106571917A (en) IC card intelligent gas meter ESAM embedded safety management module
CN108629192A (en) A kind of authorization data processing method and processing device
CN106934259B (en) Method for producing information security device, production equipment and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant