CN103294496B - Programming system - Google Patents
Programming system Download PDFInfo
- Publication number
- CN103294496B CN103294496B CN201210049779.7A CN201210049779A CN103294496B CN 103294496 B CN103294496 B CN 103294496B CN 201210049779 A CN201210049779 A CN 201210049779A CN 103294496 B CN103294496 B CN 103294496B
- Authority
- CN
- China
- Prior art keywords
- burning
- encipheror
- certification
- eigenvalue
- authentication seeds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of programming system, it includes a design end and a certification burning end.Design end is in order to send an encipheror.Certification burning end, according to encipheror, obtains an eigenvalue, and comparative feature value and an authentication seeds.If eigenvalue coupling authentication seeds, then encipheror is carried out a particular procedure, treat burning program in order to produce one, and according to a restrictive condition, will treat that burning program is burned onto in a chip.By the invention it is possible to the loss avoided the unlimited number of burning of burning person and bring to software provider.
Description
Technical field
The present invention relates to a kind of burning device, can treat one that burning program burning is in a chip in particular to one
Burning device.
Background technology
It is said that in general, to procedure code is inputted in chip, it is common that use a burning device.The provider of software is by soft
Part hands to burning person, and order carries out burning action.The generally provider of software is to collect the charges according to burning number of times.But for not
For the burning person of Xiao, it may lie about burning number of times, or steals software, thus results in the loss of software provider.
Summary of the invention
The present invention provides a kind of programming system, and it includes a design end and a certification burning end.Design end is in order to send
One encipheror.Certification burning end, according to encipheror, obtains an eigenvalue, and comparative feature value and an authentication seeds.If it is special
Value indicative coupling authentication seeds, then carry out a particular procedure to encipheror, treats burning program in order to produce one, and limits according to one
Condition, will treat that burning program is burned onto in a chip.
By the present invention, when burning person takes this encipheror, need first according to this customizing messages, by a certification journey
Sequence, can prove that its burning device used is legal, and namely software provider is approved, then further according to software
One restrictive condition (such as burning number of times or time) of provider institute specification, carries out burning action.It can thus be avoided burning person without
The loss limiting secondary burning and bring to software provider.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, not
Constitute limitation of the invention.In the accompanying drawings:
Fig. 1 is the schematic diagram of the programming system of the present invention;
Fig. 2 is that the one of the certification burning end of the present invention may embodiment;
Fig. 3 is the process that the certification burning end of the present invention carries out burning;
Fig. 4 is another possible embodiment of the certification burning end of the present invention.
Drawing reference numeral:
100: programming system;110: design end;
120: certification burning end;121: chip;
131: encipheror;132,133: authentication seeds;
210: seed generator;220: control unit;
230: storage element;410: server;
420: burning device.
Detailed description of the invention
For the features and advantages of the present invention can be become apparent, cited below particularly go out preferred embodiment, and coordinate institute's accompanying drawing
Formula, is described in detail below.
The present invention is applicable to a burning device, beats as long as an original program and a customizing messages are encrypted by the provider of software
It is bundled into an encipheror.When burning person takes this encipheror, need first according to this customizing messages, by an authentication procedure, side
Can prove that its burning device used is legal, namely software provider is approved, then provides further according to software
One restrictive condition (such as burning number of times or time) of institute of side specification, carries out burning action.
Fig. 1 is the schematic diagram of the programming system of the present invention.In the present embodiment, programming system 100 includes a design end 110
And a certification burning end 120.Design end 110 sends an encipheror 131.For example, program designer is according to client's
Demand, writes out an original program.In a possible embodiment, original program and a customizing messages are packaged in by program designer
Together, and encrypt the result after packing, in order to produce encipheror 131.The present invention is not limiting as designing end 110 and sends encryption journey
The method of sequence 131.In a possible embodiment, design end 110, by world-wide web, exports encipheror 131.
Owing to encipheror 131 has a customizing messages, therefore certification burning end 120 can obtain one according to encipheror 131
Eigenvalue.Eigenvalue and an authentication seeds are compared by certification burning end 120.If during eigenvalue coupling authentication seeds, certification is burnt
Record end 120 carries out a particular procedure to encipheror 131, treats burning program in order to produce one, and according to a restrictive condition, will treat
Burning program is burned onto in chip 121.
In a possible embodiment, restrictive condition is contained in customizing messages, and by set by design end 110, in order to advise
The required condition observed during model certification burning end 120 burning/recording chip, when burning record number of times or the burning of card burning end 120 such as specification
Between.
As a example by burning number of times, if the burning number of times preset is 1000 times (i.e. restrictive condition), then for identical encryption
For program, certification burning end 120 only can carry out the burning action of 1000 times.When burning number of times is more than 1000 times, certification is burnt
Record end 120 just cannot be by data recording in chip.
In the present embodiment, certification burning end 120 cannot change restrictive condition, unless certification burning end 120 receives newly
Encipheror.After certification burning end 120 receives new encipheror, by according to new restrictive condition, carry out burning and move
Make.For example, it is assumed that certification burning end 120 successively receives one first encipheror and one second encipheror, wherein
First encipheror corresponds to the first restrictive condition (such as burning 1000 times), and the second encipheror corresponds to one second restrictive condition
(such as burning 2000 times).
For the first encipheror, certification burning end 120 meets the burning action performing 1000 times together.For the second encryption journey
Sequence, certification burning end 120 meets the burning action performing 2000 times together.But, the present invention does not limit certification burning end 120 burning
The order of the first or second encipheror.In a possible embodiment, for same encipheror, certification burning end 120
Burning will not be carried out continuously.As long as the burning action of certification burning end 120 meets restrictive condition.
For example, certification burning end 120 may perform the burning action of 500 times, then pin first for the first encipheror
To the second encipheror, performing the burning action of 2000 times, the most again for the first encipheror, the burning performing 500 times is moved
Make.
As a example by recordable time, after certification burning end 120 receives new encipheror, by according to new restriction bar
Part, carries out burning action.The present invention is not limiting as the kind of restrictive condition.In a possible embodiment, it is assumed that certification burning end
120 successively receive one first encipheror and one second encipheror, and wherein the first encipheror corresponds to the first restriction
Condition (as burning can be carried out in a special time, such as certification burning end 120 can carry out burning action in 30 days), the second encryption
Program corresponds to one second restrictive condition (as 60 days can carry out burning action), then certification burning end 120 will be according to first and
Two restrictive conditions, carry out burning action.
In other embodiments, restrictive condition set by design end 110 also can include recordable time and burning number of times simultaneously,
Such as can carry out the number of times of burning in a special time, such as 30 days certification burning ends 120, can to carry out burning 1000 inferior.
In the present embodiment, certification burning end 120 carries out a particular procedure to encipheror 131, waits to burn in order to produce one
Record program.The present invention does not limit the kind of particular procedure.One may in embodiment, through particular procedure (at deciphering
Reason) after, certification burning end 120 obtains an original program, and by this original program direct burning to chip 121.
In another embodiment, in addition to decryption processing, particular procedure has more encryption.In order to improve the peace of data
Quan Xing, after decryption processing, this original program is encrypted by certification burning end 120 again, treats burning program in order to produce one, and
To treat that burning program burning is in chip 121.
The present invention does not limit the encryption method that certification burning end 120 is used.The encryption that certification burning end 120 is used
Method may be the same or different the encryption method used in design end 110.As long as the data that burning is in chip 121 are different from former
Beginning program, just can reach the function of protection.
In a possible embodiment, the authentication seeds 132 that design end 110 is provided according to certification burning end 120, produce
Encipheror 131.In other embodiments, design end 110 can produce an authentication seeds 133 voluntarily to certification burning end 120.Separately
Outward, authentication seeds 133 produced by design end 110 may comprise or not comprise a restrictive condition.Will be described below producing certification
The different embodiments of seed.
Fig. 2 is that the one of the certification burning end 120 of the present invention may embodiment.In the present embodiment, authentication seeds 132 is by recognizing
Card burning end 120 is produced, and is supplied to design end 110.Design end 110 is after receiving authentication seeds 132, just by certification kind
Son 132, one restrictive condition and an original program are packaged with, and encrypt the result after packing, in order to produce encipheror
131.In the present embodiment, authentication seeds 132 and restrictive condition can be described as a customizing messages.
In the present embodiment, certification burning end 120 includes that seed generator 210, control unit 220, stores list
Unit 230 and a chip 121.Seed generator 210 is in order to produce authentication seeds 132.The present invention does not limit seed generator
The kind of 210.As long as the device of authentication information can be provided, all can be as seed generator.In a possible embodiment, seed
Generator 210 can be a random number generator.Random number generator produces different authentication seeds under different time.It addition, certification
Seed 132, in addition to being supplied to design end 110, also can be stored in storage element 230.
Control unit 220 receives encipheror 131, and is stored in storage element 230 by encipheror 131.Control single
Unit 220, according to encipheror 131, obtains an eigenvalue (or an identification code), and by stored by eigenvalue and storage element 230
Authentication seeds 132 is made comparisons.When eigenvalue coupling authentication seeds, control unit 220 carries out a specific place to encipheror 131
Reason, and according to a restrictive condition, treat that by one burning program is burned onto in chip 121.
In a possible embodiment, a restrictive condition is packed in encipheror 131 by design end, therefore, is carrying out
After particular procedure, control unit 220 can get a restrictive condition and and treats burning program.Control unit 220 is further according to restriction
Condition, treats that by one burning program is burned onto in chip 121
Fig. 3 is the process that the certification burning end 120 of the present invention carries out burning.First, it is loaded into one and treats burning program (step
S310).The present invention does not limit the state treating burning program.For example, treat that burning program can be one to have encrypted or do not added
Close procedure code.In a possible embodiment, available diffie-hellman graceful key exchange process (Diffie-Hellman key
Exchange), burning program is treated in generation.
Then, a recording status (step S320) it is loaded into.In the present embodiment, this recording status is the shape of actual burn
State, such as burning number of times or recordable time.Then judge that recording status has met a restrictive condition (step S330) the most then,.?
In the present embodiment, restrictive condition is to preset burning number of times.
When actual burn number of times has reached default burning number of times, then stop burning (step S340).If actual burn number of times is not
Reach default burning number of times, then continue burning/recording chip (step S350), and revise recording status (step S360).In an embodiment
In, actual burn number of times will add 1.Then, store amended recording status (step S370), then perform step S320, in order to
Again judge whether recording status meets restrictive condition.
In other embodiments, new treat burning program if being loaded into, then certification burning end 120 can first record the burning of last time
State and old treat burning program, then carry out burning for the burning program newly treated, waits and new treats that burning program burning completes
After, then capture the program state of last time, to carry out the old burning work treating burning program.
Fig. 4 is another possible embodiment of the certification burning end of the present invention.In the present embodiment, design end 110 is except adding
Outside close program 131, more provide an authentication seeds 133 to certification burning end 120.In a possible embodiment, encipheror 131 wraps
Containing an original program and a restrictive condition.In other embodiments, encipheror 131 only comprises an original program, and certification
Seed 133 comprises a restrictive condition.For improving safety, in a possible embodiment, authentication seeds 133 is through encryption.
As it can be seen, certification burning end 120 includes a server (network server) 410 and a burning device
420.Server 410 receives authentication seeds 133.Burning device 420 processes encryption data 131, in order to obtain an eigenvalue, and root
According to eigenvalue, link up with server 410.
May be in embodiment one, burning device 420, according to eigenvalue, sends a control command to server 410, in order to
Whether burning device 420 is a specific burning device to make server 410 judge.In the present embodiment, server 410 is according to burning
The control command that device 420 is sent, learns out this feature value, and by this feature value compared with authentication seeds 133, further according to
Comparative result, restored burning device 420.Burning device 420, according to the reply result of server 410, decides whether to carry out burning
Action.
For example, if eigenvalue coupling authentication seeds 133, then burning device 420 is according to the reply of server 410, right
Encipheror 131 carries out a particular procedure, treats burning program in order to produce one.In a possible embodiment, encipheror 131 has
There is a restrictive condition.Burning device 420, according to restrictive condition, will treat that burning program burning is in chip 121.
In other embodiments, restrictive condition is provided by server 410.For example, if eigenvalue mates certification kind
Son 133, then server 410 is according to eigenvalue, replys a restrictive condition to burning device 420.It addition, after reply, server
410 delete authentication seeds 133, to avoid burning device 420 to repeat burning.
In the present embodiment, although burning device 420 receives encipheror 131, but (the most true before not yet obtaining certification
Recognize whether an eigenvalue mates an authentication seeds), it is impossible to burning encipheror 131.On the contrary, at burning device 420 according to adding
Close program 131 and obtain an eigenvalue, and when this feature value is mated with the authentication seeds 133 on server 410, burning fills
Put 420 and could process encipheror 131, and according to a restrictive condition, carry out burning action.Therefore, encryption is obtained as burning person
After program, need to be by specific burning device ability burning encipheror, the burning device only mated could be understood and burning
Corresponding encipheror.
Unless otherwise defined, at this, all vocabulary (comprising technology and scientific terms) all belong in the technical field of the invention
Tool usually intellectual is commonly understood by.Additionally, unless clear expression, vocabulary definition in general dictionary should be interpreted that and it
In the article of correlative technology field, meaning is consistent, and should not be construed as perfect condition or the most formal voice.
Although the present invention is disclosed above with preferred embodiment, so it is not limited to the present invention, any affiliated technology
Field has usually intellectual, without departing from the spirit and scope of the invention, when making a little change and retouching, therefore
The protection domain of the present invention when depending on after attached the defined person of claim be as the criterion.
Claims (9)
1. a programming system, it is characterised in that including:
One design end, receives an authentication seeds, described authentication seeds, a restrictive condition and an original program is packaged in one
Rise, and encrypt the result after packing, to produce an encipheror;And
One certification burning end, according to described encipheror, obtains an eigenvalue, and relatively described eigenvalue and described certification kind
Son, if described eigenvalue mates described authentication seeds, then carries out a particular procedure to described encipheror, waits to burn in order to produce one
Record program, and according to described restrictive condition, treat that burning program is burned onto in a chip by described, wherein said restrictive condition is limited
Make described certification burning end by described number of times or the time treating that burning program is burned onto described chip;
Wherein, described particular procedure deciphers described encipheror, in order to produce an original program, re-encrypts described original program,
Described in producing, treat that burning program, wherein said encipheror treat burning program described in being different from.
2. programming system as claimed in claim 1, it is characterised in that described certification burning end produces described authentication seeds to institute
Stating design end, wherein said design end is encrypted and packs described authentication seeds, described restrictive condition and described original program, uses
To produce described encipheror.
3. programming system as claimed in claim 2, it is characterised in that described certification burning end includes:
One seed generator, in order to produce described authentication seeds;
One storage element, in order to store described encipheror and described authentication seeds;And
One control unit, according to described encipheror, obtains described eigenvalue, and by described eigenvalue and described authentication seeds ratio
Relatively, when described eigenvalue mates described authentication seeds, described control unit carries out described particular procedure to described encipheror,
And according to described restrictive condition, treat that burning program is burned onto in described chip by described.
4. programming system as claimed in claim 3, it is characterised in that described seed generator is a random number generator.
5. programming system as claimed in claim 1, it is characterised in that described design end produces described authentication seeds, and by institute
State authentication seeds and be sent to described certification burning end.
6. programming system as claimed in claim 5, it is characterised in that described certification burning end includes:
One server, receives described authentication seeds;And
One burning device, processes described encryption data, in order to obtain described eigenvalue, and according to described eigenvalue, with described clothes
Business device is linked up, if described eigenvalue mates described authentication seeds, then described encipheror is carried out described particular procedure, uses
Burning program is treated described in producing.
7. programming system as claimed in claim 6, it is characterised in that if described eigenvalue mates described authentication seeds, described
Server is according to described eigenvalue, it is provided that described restrictive condition gives described burning device.
8. programming system as claimed in claim 6, it is characterised in that if described eigenvalue mates described authentication seeds, then burn
Recording device processes described encipheror, treats burning program in order to learn described in described restrictive condition generation.
9. programming system as claimed in claim 6, it is characterised in that if described eigenvalue mates described authentication seeds, then institute
State server and delete described authentication seeds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210049779.7A CN103294496B (en) | 2012-02-29 | 2012-02-29 | Programming system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210049779.7A CN103294496B (en) | 2012-02-29 | 2012-02-29 | Programming system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103294496A CN103294496A (en) | 2013-09-11 |
CN103294496B true CN103294496B (en) | 2016-12-14 |
Family
ID=49095435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210049779.7A Active CN103294496B (en) | 2012-02-29 | 2012-02-29 | Programming system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103294496B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683105A (en) * | 2014-06-05 | 2015-06-03 | 深圳市迈斯威志科技有限公司 | Remote encryption, decryption and writing processing method for MCU writer |
CN104598285A (en) * | 2015-02-11 | 2015-05-06 | 北京京东方多媒体科技有限公司 | Burning method and burning system |
CN106529309A (en) * | 2016-09-19 | 2017-03-22 | 芯海科技(深圳)股份有限公司 | Method for limiting programming number of programmer by encrypting programming file |
CN107729723B (en) * | 2017-11-08 | 2023-07-04 | 深圳市希顿科技有限公司 | Integrated circuit program burning method and burning system |
CN107783773B (en) * | 2017-11-22 | 2021-01-12 | 广东乐心医疗电子股份有限公司 | Firmware burning method and system |
CN108513172A (en) * | 2018-02-13 | 2018-09-07 | 广州视源电子科技股份有限公司 | Data limit carving method, device, system and server, television set |
CN109326032B (en) * | 2018-10-14 | 2021-06-11 | 浙江鸿利锁业有限公司 | Lock leasing method and leasing device applying same |
CN109901851B (en) * | 2019-02-28 | 2022-07-12 | 广州小鹏汽车科技有限公司 | Firmware burning system and method |
CN110489959B (en) * | 2019-09-06 | 2022-04-26 | 珠海格力电器股份有限公司 | Protection method, burning method and device for burning file, storage medium and equipment |
CN117633733B (en) * | 2024-01-25 | 2024-04-12 | 九音科技(南京)有限公司 | Method for acquiring software by chip product, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175269A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Communication terminal and its method and device for system bootstrapping |
CN101281478A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | Method adopting multiplexing technique to perform paralleling burning record |
CN101281477A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | System adopting multiplexing technique to perform paralleling burning record |
-
2012
- 2012-02-29 CN CN201210049779.7A patent/CN103294496B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175269A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Communication terminal and its method and device for system bootstrapping |
CN101281478A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | Method adopting multiplexing technique to perform paralleling burning record |
CN101281477A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | System adopting multiplexing technique to perform paralleling burning record |
Non-Patent Citations (2)
Title |
---|
CFP系列芯片的烧录器设计;朱同;《中国优秀硕士学位论文》;20080930;第15页 * |
Fs88x6系列加密芯片烧录器的设计与实现;徐元哲;《中国优秀硕士学位论文》;20110131;第54页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103294496A (en) | 2013-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103294496B (en) | Programming system | |
CN109040090A (en) | A kind of data ciphering method and device | |
CN110061840A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN103761456B (en) | A kind of anti-method cracking of monolithic microcomputer kernel code | |
JP6137173B2 (en) | Encrypted database system, client terminal and database server, combining method and program | |
CN102138300A (en) | Message authentication code pre-computation with applications to secure memory | |
CN107729723A (en) | A kind of integrated circuit burning program method and programming system | |
CN102510378A (en) | Method for logging in online game through mobile equipment | |
CN107995299A (en) | The blind storage method of anti-access module leakage under a kind of cloud environment | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
CN105897737B (en) | A kind of method of secure data exchange | |
CN109753770A (en) | Determine method and device, method for burn-recording and device, the electronic equipment of burning data | |
KR102272928B1 (en) | Operating method for machine learning model using encrypted data and apparatus based on machine learning model | |
CN109446757A (en) | A method of for general MCU programmed protection | |
CN107534549A (en) | Data character stream block encryption | |
CN113206741B (en) | Anti-machine learning security authentication method and device based on strong PUF | |
JP6919973B2 (en) | Computer-aided obfuscation of program code | |
CN105653932B (en) | The method and apparatus of software upgrading verification | |
CN108268781A (en) | The electronic component of electronic device, the method and encryption method for starting electronic device | |
CN107358067B (en) | Method for realizing encryption and decryption by deriving SCK with L icense in dongle | |
TWI499929B (en) | Programming system | |
JP6246516B2 (en) | Information processing system | |
CN106571917A (en) | IC card intelligent gas meter ESAM embedded safety management module | |
CN108629192A (en) | A kind of authorization data processing method and processing device | |
CN106934259B (en) | Method for producing information security device, production equipment and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |