CN111596929B - Burning method, device, system, equipment and medium - Google Patents

Burning method, device, system, equipment and medium Download PDF

Info

Publication number
CN111596929B
CN111596929B CN202010318801.8A CN202010318801A CN111596929B CN 111596929 B CN111596929 B CN 111596929B CN 202010318801 A CN202010318801 A CN 202010318801A CN 111596929 B CN111596929 B CN 111596929B
Authority
CN
China
Prior art keywords
chip
value
target
uid
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010318801.8A
Other languages
Chinese (zh)
Other versions
CN111596929A (en
Inventor
彭国辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chuangxin Workshop Technology Shenzhen Co ltd
Original Assignee
Chuangxin Workshop Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuangxin Workshop Technology Shenzhen Co ltd filed Critical Chuangxin Workshop Technology Shenzhen Co ltd
Priority to CN202010318801.8A priority Critical patent/CN111596929B/en
Publication of CN111596929A publication Critical patent/CN111596929A/en
Application granted granted Critical
Publication of CN111596929B publication Critical patent/CN111596929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention is suitable for the technical field of burning, and provides a burning method, a device, a system, equipment and a medium, wherein the method is applied to a burner and comprises the following steps: acquiring the UID value of the chip; transmitting the UID value of the chip to the authorization equipment so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value; receiving a target value sent by authorization equipment; and burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, reading the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware to operate, obtaining a comparison value, comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to run the target firmware, and otherwise, stopping running the target firmware. The invention effectively solves the technical problem that the copyright of the firmware cannot be effectively protected in the existing burning process.

Description

Burning method, device, system, equipment and medium
Technical Field
The invention belongs to the technical field of burning, and particularly relates to a burning method, a burning device, a burning system, burning equipment and burning medium.
Background
With the development of semiconductor technology, chips are increasingly used in various electronic products. The firmware that needs to be burned into the chip varies from application to application, requiring a significant amount of time and effort from the developer to develop the specific firmware. In the existing firmware burning process, in order to prevent the firmware from being illegally copied and stolen, when the burner burns the chip, the UID (Unique Identifier ) value of the chip is used as the input parameter of the chip UID binding algorithm to calculate to obtain a target value, then the firmware comprising the chip UID binding algorithm and the target value are both burnt into the chip, when the firmware in the chip operates, the UID value of the chip is used as the input parameter of the chip UID binding algorithm included in the firmware to calculate to obtain a comparison value, finally the comparison value is compared with the target value, if the two are consistent, the firmware continues to operate, otherwise, the firmware is terminated to operate.
However, in the firmware burning process, the burner is often directly contacted by a user, and the adopted chip UID binding algorithm is usually a fixed and public algorithm, and the used firmware still has the problems of being cracked, illegally copied and stolen for use, so that the copyright of the firmware cannot be effectively protected.
Disclosure of Invention
In view of the above, the embodiments of the present invention provide a recording method, apparatus, system, device and medium, so as to solve the problem in the prior art that the firmware copyright cannot be effectively protected in the recording process.
A first aspect of an embodiment of the present invention provides a recording method, applied to a burner, where the method includes:
acquiring the UID value of the chip;
transmitting the UID value of the chip to an authorization device so that the authorization device detects whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value;
receiving the target value sent by the authorization equipment;
and burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware to operate, obtaining a comparison value, comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to run the target firmware, and otherwise, stopping running the target firmware.
A second aspect of the embodiment of the present invention provides a burning method, applied to an authorization device, where the method includes:
Receiving a UID value of a chip sent by a burner;
detecting whether the chip is a target chip or not according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value;
the target value is sent to the burner so that the burner burns the target value to the chip, the target value is used for the chip to compare a comparison value with the target value, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware and operating, if the comparison value is consistent with the target value, the chip continues to run the target firmware, otherwise, the chip stops running the target firmware.
A third aspect of the embodiments of the present invention provides a recording apparatus configured to a burner, the apparatus including:
the acquisition module is used for acquiring the UID value of the chip;
the first sending module is used for sending the UID value of the chip to the authorization equipment so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to operate, and a target value is obtained;
The first receiving module is used for receiving the target value sent by the authorization equipment;
the burning module is used for burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of the preset binding algorithm included in the target firmware to operate, a comparison value is obtained, the comparison value is compared with the target value, if the comparison value is consistent with the target value, the target firmware is continuously run, and otherwise, the running of the target firmware is terminated.
A fourth aspect of the embodiment of the present invention provides a recording apparatus configured to an authorization device, the apparatus including:
the second receiving module is used for receiving the UID value of the chip sent by the burner;
the operation module is used for detecting whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to operate, and a target value is obtained;
the second sending module is used for sending the target value to the burner so that the burner burns the target value to the chip, the target value is used for comparing a comparison value with the target value by the chip, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware after operation, and if the comparison value is consistent with the target value, the chip continues to run the target firmware, otherwise, the chip stops running the target firmware.
A fifth aspect of the embodiment of the present invention provides a recording system, where the recording system includes an authorization device, a recorder and a chip, the authorization device is communicatively connected to the recorder, and the recorder is communicatively connected to the chip;
the burner is used for acquiring the UID value of the chip and sending the UID value of the chip to the authorization equipment;
the authorization equipment is used for receiving the UID value of the chip sent by the burner, detecting whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value; sending the target value to the burner;
the burner is further configured to receive the target value sent by the authorization device; burning the target firmware and the target value to the chip;
the chip is used for reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware to operate when the target firmware is operated, so as to obtain a comparison value; and comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to operate the target firmware, otherwise, stopping operating the target firmware.
A sixth aspect of the embodiments of the present invention provides a burning device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to the first or second aspect when executing the computer program.
A seventh aspect of the embodiments of the present invention provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method according to the first or second aspect.
According to the embodiment of the invention, the authorization device and the chip are respectively connected with the burner in a communication way, when the burner burns the chip, the authorization device detects whether the chip is the target chip according to the UID value of the chip, if so, the UID value of the chip is used as the input parameter of the preset binding algorithm to obtain the target value, the target firmware and the target value are burnt into the chip through the burner, when the target firmware is operated, the chip obtains the comparison value by using the UID value of the chip as the input parameter of the preset binding algorithm included in the target firmware, then the comparison value is compared with the target value, and whether the target firmware is operated continuously is judged according to the comparison result, so that the problems that in the prior art, the burner is directly contacted by a user, the adopted chip UID binding algorithm is fixed and disclosed, and the firmware can be illegally cracked, copied and stolen for use are solved, and the firmware copyright is effectively protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an implementation flow of a recording method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an implementation flow of another burning method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an implementation flow of another burning method according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of another implementation of the burning method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a recording device according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of another recording apparatus according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a burning system according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of another recording system according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a recording apparatus according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to illustrate the technical scheme of the invention, the following description is made by specific examples.
Fig. 1 is a schematic implementation flow chart of a recording method according to an embodiment of the present invention. The burning method is applied to a burner and comprises the following steps: s110 to S140.
S110, obtaining the UID value of the chip.
The UID is a unique identifier of the chip, and the chip has a corresponding UID value when leaving the factory and cannot be rewritten.
Specifically, when firmware burning is performed, the burner is in communication connection with the chip to obtain the UID value of the chip.
And S120, transmitting the UID value of the chip to the authorization equipment so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, and if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value.
The target chip refers to a chip with the UID value of the chip within the approval range of the authorization device. The preset binding algorithm is designed to calculate the UID value as an input parameter to obtain a target value. The existing binding algorithm is usually a fixed and source code disclosed algorithm, the preset binding algorithm can be adopted by the existing binding algorithm, the self-defined flexible design can be realized, and compared with the existing binding algorithm, the self-defined binding algorithm has higher safety due to the fact that the source code is not disclosed. The authorization equipment stores a preset binding algorithm, and the UID value is used as an input parameter to calculate by using the preset binding algorithm to obtain a target value. Specifically, the authorization device is a device capable of providing a computing service, and may be a server or a small storage device, such as a Ukey capable of being directly connected with the device or the device through a USB interface.
Specifically, the burner sends the obtained UID value of the chip to the authorization device, the authorization device stores a preset binding algorithm and the UID value approval range of the chip, after receiving the UID value of the chip, the authorization device detects whether the chip is a target chip according to the UID value of the chip and the UID value approval range of the chip, if so, the UID value of the chip is used as an input parameter of the preset binding algorithm to operate, and thus a target value is obtained.
The authorization device may also store the User ID value of the chip. The User ID value is used to distinguish different chip users and can be customized. If the chip is a target chip, the authorization equipment calculates the UID value of the chip and the User ID value of the chip as input parameters of a preset binding algorithm to obtain a target value. The UID value of the chip and the User ID value of the chip are used as input parameters of a preset binding algorithm, so that the flexibility of the preset binding algorithm is increased, the safety of the preset binding algorithm is higher, and the algorithm is effectively prevented from being illegally cracked.
S130, receiving a target value sent by the authorization equipment.
Specifically, the burner receives a target value sent by the authorization device, wherein the target value is obtained by the authorization device operating the UID value of the chip as an input parameter of a preset binding algorithm.
And S140, burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, reading the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware to operate, obtaining a comparison value, comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to run the target firmware, and otherwise, stopping running the target firmware.
The firmware is generated by compiling a source program, and the target firmware is firmware comprising a preset binding algorithm, and is generated by compiling the source program corresponding to the firmware after adding the preset binding algorithm. The target firmware sent to the chip by the burner can be obtained by the burner from a computer providing the target firmware.
Specifically, the burner burns the target firmware and the target value to the chip, so that when the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of a preset binding algorithm included in the target firmware to operate, and a comparison value is obtained. If the chip currently running the target firmware is the target chip, when the chip is burned with the firmware, not only the target firmware is burned with the chip, but also the target value is burned with the chip, the target value is obtained by operating the UID value of the chip as the input parameter of the preset binding algorithm, and the comparison value is compared with the target value, so that the comparison value and the target value are consistent, and the chip continuously runs the target firmware. If the chip currently running the target firmware is not the target chip, the UID value of the chip is not within the UID value approval range of the chip, for example, the target firmware and the target value are illegally burnt into the chip, when the chip runs the target firmware, the chip uses the UID value of the chip as the input parameter of the preset binding algorithm included in the target firmware, the obtained comparison value cannot be consistent with the target value, and the chip terminates the running of the target firmware.
According to the embodiment of the invention, the authorization device and the chip are respectively connected with the burner in a communication way, when the burner burns the chip, the authorization device detects whether the chip is the target chip according to the UID value of the chip, if so, the UID value of the chip is used as the input parameter of the preset binding algorithm to obtain the target value, the target firmware and the target value are burnt into the chip through the burner, when the target firmware is operated, the chip obtains the comparison value by using the UID value of the chip as the input parameter of the preset binding algorithm included in the target firmware, then the comparison value is compared with the target value, and whether the target firmware is operated continuously is judged according to the comparison result, so that the problems that in the prior art, the burner is directly contacted by a user, the adopted chip UID binding algorithm is fixed and disclosed, and the firmware can be illegally cracked, copied and stolen for use are solved, and the firmware copyright is effectively protected.
Fig. 2 is a schematic implementation flow chart of another burning method according to an embodiment of the present invention. The burning method comprises the following steps: s210 to S240.
S210, obtaining the UID value of the chip.
S220, sending the UID value of the chip to the authorization equipment through the client, so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, and if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value.
Specifically, the burner is in communication connection with the authorization device through the client, the burner obtains the UID value of the chip and then sends the UID value of the chip to the authorization device through the client, and if the authorization device detects that the chip is a target chip according to the UID value of the chip, the UID value of the chip is used as an input parameter of a preset binding algorithm to calculate so as to obtain a target value.
The authorization device may also store the User ID value of the chip. The User ID value is used to distinguish different chip users and can be customized. If the chip is a target chip, the authorization equipment calculates the UID value of the chip and the User ID value of the chip as input parameters of a preset binding algorithm to obtain a target value. The UID value of the chip and the User ID value of the chip are used as input parameters of a preset binding algorithm, so that the flexibility of the preset binding algorithm is increased, the safety of the preset binding algorithm is higher, and the algorithm is effectively prevented from being illegally cracked.
S230, receiving the target value sent by the authorization equipment through the client.
Specifically, the authorization device calculates a target value according to the UID value of the chip, sends the target value to the client, and the burner receives the target value through the client.
S240, burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of a preset binding algorithm included in the target firmware to operate, a comparison value is obtained, the comparison value is compared with the target value, if the comparison value is consistent with the target value, the target firmware is continuously run, and if the comparison value is not consistent with the target value, the running of the target firmware is terminated.
In the embodiment of the invention, the burner is in communication connection with the authorization equipment through the client, the burner is in communication connection with the chip, when the burner burns the chip, the UID value of the chip is obtained and is sent to the authorization equipment through the client, so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, if yes, the UID value of the chip is used as an input parameter of a preset binding algorithm to calculate and obtain a target value, the authorization equipment sends the target value to the burner through the client, the burner burns both the target firmware and the target value into the chip, so that the chip obtains a comparison value after calculating by taking the UID value of the burner as the input parameter of the preset binding algorithm included in the target firmware when the target firmware is operated, then the comparison value is compared with the target value, and whether the target firmware is continuously operated is judged according to the comparison result, the problem that in the prior art, the burner is directly contacted by a user, the adopted chip binding algorithm is fixed and disclosed, and the possibility of illegal cracking, copying and stealing the firmware is solved, and the firmware is effectively protected.
Fig. 3 is a schematic implementation flow chart of another burning method according to an embodiment of the present invention. The burning method is applied to the authorization equipment and comprises the following steps: s310 to S330.
S310, receiving the UID value of the chip sent by the burner.
Specifically, when firmware burning is performed, the burner acquires the UID value of the chip and sends the UID value to the authorization equipment, and the authorization equipment receives the UID value of the chip sent by the burner.
S320, detecting whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value.
The target chip refers to a chip with the UID value of the chip within the approval range of the authorization device. The preset binding algorithm is designed to calculate the UID value as an input parameter to obtain a target value. The existing binding algorithm is usually a fixed and source code disclosed algorithm, the preset binding algorithm can be adopted by the existing binding algorithm, the self-defined flexible design can be realized, and compared with the existing binding algorithm, the self-defined binding algorithm has higher safety due to the fact that the source code is not disclosed. The authorization equipment stores a preset binding algorithm, and the UID value is used as an input parameter to calculate by using the preset binding algorithm to obtain a target value. Specifically, the authorization device is a device capable of providing a computing service, and may be a server or a small storage device, such as a Ukey capable of being directly connected with the device or the device through a USB interface.
Specifically, the authorization device stores a preset binding algorithm and a UID value approval range of the chip, and after receiving the UID value of the chip, the authorization device detects whether the chip is a target chip according to the UID value of the chip and the UID value approval range of the chip, if so, the UID value of the chip is used as an input parameter of the preset binding algorithm to operate, so that a target value is obtained.
The authorization device may also store the User ID value of the chip. The User ID value is used to distinguish different chip users and can be customized. If the chip is a target chip, the authorization equipment calculates the UID value of the chip and the User ID value of the chip as input parameters of a preset binding algorithm to obtain a target value. The UID value of the chip and the User ID value of the chip are used as input parameters of a preset binding algorithm, so that the flexibility of the preset binding algorithm is increased, the safety of the preset binding algorithm is higher, and the algorithm is effectively prevented from being illegally cracked. The custom preset binding algorithm may be designed based on a random matrix in combination with a basic algorithm. The basic algorithm may be addition, subtraction, multiplication, bitwise and, bitwise or, bitwise exclusive or, etc. Specific examples of operations are as follows:
Target=UID[a]|UID[b]|UserID[c]^UID[d];
the UID and the userID are one-dimensional arrays, the lengths are M, N, a and b take integer values in [0, M-1] randomly, and c and d take integer values in [0, N-1] randomly. Target refers to a Target value, which may be a number or an array. When the target value is required to be an array, different algorithms can be adopted to obtain the target value through multiple times of operation.
In the above embodiment, the UID value of the chip and the User ID value of the chip are both used as input parameters of a preset binding algorithm to obtain the target value after operation. Because the User ID value is self-defined and has uncertainty, and the preset binding algorithm is designed based on a random matrix combined with different basic algorithms, the numerical values corresponding to specific bits of the UID and the User ID are randomly taken as input when the target value is calculated, so that the safety of the preset binding algorithm is improved, the analysis difficulty of a malicious User on the preset binding algorithm is increased, and the algorithm is effectively prevented from being illegally cracked.
S330, sending a target value to the burner so that the burner burns the target value to the chip, wherein the target value is used for the chip to compare the comparison value with the target value, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware and operating, if the comparison value is consistent with the target value, the chip continues to run the target firmware, otherwise, the chip stops running the target firmware.
The firmware is generated by compiling a source program, and the target firmware is firmware comprising a preset binding algorithm, and is generated by compiling the source program corresponding to the firmware after adding the preset binding algorithm. The target firmware sent to the chip by the burner can be obtained by the burner from a computer providing the target firmware.
Specifically, the authorization device sends the target value to the burner, and the burner burns the target firmware and the target value to the chip after receiving the target value. When the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of a preset binding algorithm included in the target firmware to operate, and a comparison value is obtained. If the chip currently running the target firmware is the target chip, when the chip is burned with the firmware, not only the target firmware is burned with the chip, but also the target value is burned with the chip, the target value is obtained by operating the UID value of the chip as the input parameter of the preset binding algorithm, and the comparison value is compared with the target value, so that the comparison value and the target value are consistent, and the chip continuously runs the target firmware. If the chip currently running the target firmware is not the target chip, the UID value of the chip is not within the UID value approval range of the chip, for example, the target firmware and the target value are illegally burnt into the chip, when the chip runs the target firmware, the chip uses the UID value of the chip as the input parameter of the preset binding algorithm included in the target firmware, the obtained comparison value cannot be consistent with the target value, and the chip terminates the running of the target firmware.
According to the embodiment of the invention, the authorization device and the chip are respectively connected with the burner in a communication way, when the burner burns the chip, the authorization device detects whether the chip is the target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to obtain the target value and is sent to the burner, the burner burns both the target firmware and the target value into the chip, so that when the chip runs the target firmware, the chip obtains a comparison value after the operation by taking the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware, then the comparison value is compared with the target value, and whether the target firmware is continuously run is judged according to the comparison result, thereby ingeniously solving the problems that in the prior art, the burner is directly contacted by a user, the adopted chip UID binding algorithm is fixed and disclosed, and the firmware is possibly illegally cracked, copied and stolen for utilization, and copyrights are effectively protected.
Fig. 4 is a schematic implementation flow chart of another burning method according to an embodiment of the present invention. The burning method comprises the following steps: s410 to S430.
S410, receiving the UID value of the chip sent by the burner through the client.
Specifically, when the firmware is burned on the chip, the authorization device is in communication connection with the burner through the client, the burner is in communication connection with the chip, the burner acquires the UID value of the chip and then sends the UID value to the client, and the authorization device receives the UID value of the chip sent by the burner through the client.
S420, detecting whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value.
The authorization device may also store the User ID value of the chip. The User ID value is used to distinguish different chip users and can be customized. If the chip is a target chip, the authorization equipment calculates the UID value of the chip and the User ID value of the chip as input parameters of a preset binding algorithm to obtain a target value. The UID value of the chip and the User ID value of the chip are used as input parameters of a preset binding algorithm, so that the flexibility of the preset binding algorithm is increased, the safety of the preset binding algorithm is higher, and the algorithm is effectively prevented from being illegally cracked.
S430, sending a target value to the burner through the client, so that the burner burns the target value to the chip, wherein the target value is used for comparing a comparison value with the target value through the chip, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware and performing operation, if the comparison value is consistent with the target value, the chip continues to run the target firmware, and otherwise, the chip stops running the target firmware.
Specifically, the authorization device calculates a target value according to the UID value of the chip, and then sends the target value to the burner through the client. When the burner burns the chip, the target firmware and the target value are both burnt to the chip. When the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of a preset binding algorithm included in the target firmware to operate, a comparison value is obtained, the comparison value is compared with a target value, if the comparison value is consistent with the target value, the chip continues to run the target firmware, and otherwise, the chip stops running the target firmware.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present invention.
Fig. 5 is a schematic diagram of a recording device according to an embodiment of the present invention. The burning device is configured on a burning device and comprises: the device comprises an acquisition module 510, a first sending module 520, a first receiving module 530 and a burning module 540.
The acquiring module 510 is configured to acquire a UID value of the chip;
the first sending module 520 is configured to send the UID value of the chip to the authorization device, so that the authorization device detects whether the chip is a target chip according to the UID value of the chip, if yes, the UID value of the chip is used as an input parameter of a preset binding algorithm to perform operation, and a target value is obtained;
A first receiving module 530, configured to receive a target value sent by an authorization device;
the burning module 540 is configured to burn the target firmware and the target value to the chip, so that when the chip runs the target firmware, the chip reads the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware to perform operation, obtain a comparison value, compare the comparison value with the target value, and if the comparison value is consistent with the target value, continue to run the target firmware, otherwise terminate running the target firmware.
The recording device can execute the recording method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method. Technical details not described in detail in this embodiment can be referred to the recording method provided in any embodiment of the present invention.
Fig. 6 is a schematic diagram of another recording apparatus according to an embodiment of the present invention. The burning device is configured in the authorization equipment and comprises: the second receiving module 610, the computing module 620, and the second transmitting module 630.
The second receiving module 610 is configured to receive the UID value of the chip sent by the burner;
the operation module 620 is configured to detect whether the chip is a target chip according to the UID value of the chip, and if so, perform an operation with the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value;
The second sending module 630 is configured to send a target value to the burner, so that the burner burns the target value to the chip, the target value is used for the chip to compare the comparison value with the target value, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware, if the comparison value is consistent with the target value, the chip continues to run the target firmware, and otherwise, the chip terminates to run the target firmware.
The recording device can execute the recording method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method. Technical details not described in detail in this embodiment can be referred to the recording method provided in any embodiment of the present invention.
Fig. 7 is a schematic diagram of a recording system according to an embodiment of the present invention. The burning system comprises: the authorization device 710, the burner 720 and the chip 730, wherein the authorization device 710 is in communication connection with the burner 720, and the burner 720 is in communication connection with the chip 730.
The communication connection in the embodiment of the invention can be wired connection or wireless connection. The wired communication connection includes Internet communication, power line communication, and the like. The wireless communication connection may include WIFI communication, bluetooth communication, zigBee communication, 2G, 3G, 4G, 5G, and LPWAN cellular communication.
The burner 720 is configured to obtain the UID value of the chip 730, and send the UID value of the chip 730 to the authorization device 710;
the authorization device 710 is configured to receive the UID value of the chip 730 sent by the burner 720, detect whether the chip 730 is a target chip according to the UID value of the chip 730, if yes, operate the UID value of the chip 730 as an input parameter of a preset binding algorithm to obtain a target value, and send the target value to the burner 720;
the authorization device 710 is a device capable of providing a computing service, and may be a server or a small storage device, for example, a Ukey capable of being directly connected to a device or a device through a USB interface. The target chip refers to a chip whose UID value of the chip 730 is within the approval range of the authorizing device 710. The preset binding algorithm is designed to calculate the UID value as an input parameter to obtain a target value. The authorizing device 710 has stored therein a preset binding algorithm.
The User ID value of the chip 730 may also be stored in the authorizing device 710. The User ID value is used to distinguish different chip users and can be customized. If the chip 730 is the target chip, the authorization device 710 performs an operation with the UID value of the chip 730 and the User ID value of the chip 730 as input parameters of a preset binding algorithm, to obtain a target value. The UID value of the chip and the User ID value of the chip are used as input parameters of a preset binding algorithm, so that the flexibility of the preset binding algorithm is increased, the safety of the preset binding algorithm is higher, and the algorithm is effectively prevented from being illegally cracked.
The existing binding algorithm is usually a fixed and source code disclosed algorithm, the preset binding algorithm can be adopted by the existing binding algorithm, and can be designed flexibly by self-definition.
The burner 720 is further configured to receive the target value sent by the authorization device 710, and burn the target firmware and the target value to the chip 730;
the target firmware is firmware comprising a preset binding algorithm, and is compiled and generated after the preset binding algorithm is added to a source program corresponding to the firmware. The target firmware sent by the burner 720 to the chip 730 may be obtained by the burner 720 from a computer providing the target firmware.
The chip 730 is configured to, when running the target firmware, read the UID value of the chip 730 as an input parameter of a preset binding algorithm included in the target firmware, and perform an operation to obtain a comparison value; and comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to operate the target firmware, otherwise, terminating to operate the target firmware.
Specifically, if the chip 730 currently running the target firmware is the target chip, when the chip 730 is burned, not only the target firmware is burned into the chip 730, but also the target value is burned into the chip 730, the target value is also obtained by operating the UID value of the chip 730 as the input parameter of the preset binding algorithm, and the comparison value is compared with the target value, so that the comparison value and the target value are consistent, and the chip 730 continues to run the target firmware. If the chip 730 currently running the target firmware is not the target chip, the UID value of the chip 730 is not within the UID value approval range of the chip, for example, the target firmware and the target value are illegally burned into the chip 730, and when the chip 730 runs the target firmware, the control value obtained by operating the UID value of the chip 730 as the input parameter of the preset binding algorithm included in the target firmware cannot be consistent with the target value, and the chip 730 terminates running the target firmware.
According to the embodiment of the invention, the authorization device and the chip are respectively connected with the burner in a communication way, when the burner burns the chip, the authorization device detects whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to obtain a target value, the target firmware and the target value are burnt into the chip through the burner, so that when the chip operates the target firmware, the chip obtains a comparison value by using the UID value of the chip as the input parameter of the preset binding algorithm included in the target firmware, then the comparison value is compared with the target value, and whether the target firmware is continuously operated is judged according to a comparison result. In the embodiment of the invention, when the chip is burnt, the authorization equipment utilizes the UID value of the chip to operate the preset binding algorithm, and the preset binding algorithm which is flexibly designed by self definition can be adopted, so that the problems that in the prior art, the burner is directly contacted by a user, the adopted chip UID binding algorithm is fixed and disclosed, and the firmware is possibly illegally cracked, copied and stolen are solved, and the firmware copyright is effectively protected.
Fig. 8 is a schematic diagram of another recording system according to an embodiment of the present invention. The burning system comprises: the authorization device 710, the burner 720, the chip 730, and the client 740 in the above embodiments, the authorization device 710 is communicatively connected to the burner 720 through the client 740, and the burner 720 is communicatively connected to the chip 730.
In an embodiment of the present invention, the client 740 may be a desktop computer, a notebook computer, or a smart phone.
The burner 720 is configured to obtain the UID value of the chip 730, and send the UID value of the chip 730 to the authorization device 710;
the client 740 is configured to receive the UID value of the chip 730 sent by the burner 720, and send the UID value of the chip 730 to the authorization device 710;
the authorization device 710 is configured to receive the UID value of the chip 730 sent by the client 740, detect whether the chip 730 is a target chip according to the UID value of the chip 730, if yes, operate the UID value of the chip 730 as an input parameter of a preset binding algorithm to obtain a target value, and send the target value to the client 740;
the authorization device 710 is further configured to operate both the UID value of the chip 730 and the User ID value of the chip 730 as input parameters of a preset binding algorithm, so as to obtain a target value.
The client 740 is further configured to receive the target value sent by the authorization device 710, and send the target value to the burner 720;
the burner 720 is further configured to receive the target value sent by the client 740, and burn the target firmware and the target value to the chip 730;
the chip 730 is configured to, when running the target firmware, read the UID value of the chip 730 as an input parameter of a preset binding algorithm included in the target firmware, and perform an operation to obtain a comparison value; and comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to operate the target firmware, otherwise, terminating to operate the target firmware.
For details of the burning system, which are not described in detail in the present embodiment, reference may be made to the burning system provided in the above embodiment.
Fig. 9 is a schematic diagram of a recording apparatus according to an embodiment of the invention. As shown in fig. 9, the apparatus 10 of this embodiment includes: a processor 100, a memory 101, and a computer program 102 stored in the memory 101 and executable on the processor 100. The steps of the above-mentioned embodiments of the burning method are implemented when the processor 100 executes the computer program 102, for example, steps S110 to S140 shown in fig. 1; as also shown in steps S210 to S240 of fig. 2. Alternatively, the processor 100, when executing the computer program 102, performs the functions of the modules/units of the apparatus embodiments described above, such as the functions of the modules 510-540 shown in fig. 5; as also shown in fig. 6, the functions of blocks 610 through 630.
By way of example, computer program 102 may be partitioned into one or more modules/units that are stored in memory 101 and executed by processor 100 to accomplish the present invention. One or more of the modules/units may be a series of computer program instruction segments capable of performing a specific function for describing the execution of the computer program 102 in the burning device 10.
For example, the computer program 102 may be divided into an acquisition module, a first transmission module, a first reception module, and a burning module (a module in the virtual device), each of which specifically functions as follows:
the acquisition module is used for acquiring the UID value of the chip;
the first sending module is used for sending the UID value of the chip to the authorization equipment so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to operate, and a target value is obtained;
the first receiving module is used for receiving the target value sent by the authorization equipment;
the burning module is used for burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of a preset binding algorithm included in the target firmware to operate, a comparison value is obtained, the comparison value is compared with the target value, if the comparison value is consistent with the target value, the target firmware is continuously run, and if the comparison value is not consistent with the target value, the running of the target firmware is terminated.
As another example, the computer program 102 may be divided into a second receiving module, an operation module, and a second transmitting module (a module in the virtual device), each of which specifically functions as follows:
the second receiving module is used for receiving the UID value of the chip sent by the burner;
The operation module is used for detecting whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to operate so as to obtain a target value;
the second sending module is used for sending a target value to the burner so that the burner burns the target value to the chip, the target value is used for the chip to compare the comparison value with the target value, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of a preset binding algorithm included in the target firmware and operating, if the comparison value is consistent with the target value, the chip continues to run the target firmware, otherwise, the chip stops running the target firmware.
The recording device 10 may be a desktop computer, a notebook computer, a palm computer, a cloud server, or the like. The burning device 10 may include, but is not limited to, a processor 100, a memory 101. It will be appreciated by those skilled in the art that fig. 9 is merely an example of the burning device 10 and is not limiting of the burning device 10, and may include more or fewer components than shown, or may combine certain components, or different components, e.g., the burning device 10 may also include input and output devices, network access devices, buses, etc.
The processor 100 may be a CPU, but may also be other general purpose processors, DSPs, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), field programmable gate arrays (Field-Programmable Gate Array, FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 101 may be an internal storage unit of the recording device 10, such as a hard disk or a memory of the recording device 10. The memory 101 may also be an external storage device of the recording device 10, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card, or the like, which are provided on the recording device 10. Further, the memory 101 may also include both an internal storage unit and an external storage device of the recording device 10. The memory 101 is used to store computer programs and other programs and data required by the burning device 10. The memory 101 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other manners. For example, the apparatus/terminal device embodiments described above are merely illustrative, e.g., the division of modules or units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the steps of each method embodiment described above may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the content of the computer readable medium can be appropriately increased or decreased according to the requirements of the jurisdiction's jurisdiction and the patent practice, for example, in some jurisdictions, the computer readable medium does not include electrical carrier signals and telecommunication signals according to the jurisdiction and the patent practice.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.

Claims (10)

1. A burning method applied to a burner, the method comprising:
acquiring a UID value of a chip, wherein the UID value is a unique identifier of the chip and cannot be rewritten;
transmitting the UID value of the chip to an authorization device so that the authorization device detects whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value;
receiving the target value sent by the authorization equipment;
and burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware to operate, obtaining a comparison value, comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to run the target firmware, and otherwise, stopping running the target firmware.
2. The method of claim 1, wherein the method further comprises:
sending the UID value of the chip to the authorization equipment through a client;
and receiving the target value sent by the authorization equipment through the client.
3. A burning method applied to an authorization device, the method comprising:
receiving a UID value of a chip sent by a burner, wherein the UID value is a unique identifier of the chip and cannot be rewritten;
detecting whether the chip is a target chip or not according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value;
the target value is sent to the burner so that the burner burns the target value to the chip, the target value is used for the chip to compare a comparison value with the target value, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware and operating, if the comparison value is consistent with the target value, the chip continues to run the target firmware, otherwise, the chip stops running the target firmware.
4. A method as claimed in claim 3, wherein the method further comprises:
receiving the UID value of the chip sent by the burner through a client;
and sending the target value to the burner through the client.
5. A burning apparatus configured in a burner, the apparatus comprising:
the acquisition module is used for acquiring the UID value of the chip, wherein the UID value is a unique identifier of the chip and cannot be rewritten;
the first sending module is used for sending the UID value of the chip to the authorization equipment so that the authorization equipment detects whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to operate, and a target value is obtained;
the first receiving module is used for receiving the target value sent by the authorization equipment;
the burning module is used for burning the target firmware and the target value to the chip, so that when the chip runs the target firmware, the UID value of the chip is read and used as an input parameter of the preset binding algorithm included in the target firmware to operate, a comparison value is obtained, the comparison value is compared with the target value, if the comparison value is consistent with the target value, the target firmware is continuously run, and otherwise, the running of the target firmware is terminated.
6. A burning apparatus configured in an authorization device, the apparatus comprising:
the second receiving module is used for receiving the UID value of the chip sent by the burner, wherein the UID value is a unique identifier of the chip and cannot be rewritten;
the operation module is used for detecting whether the chip is a target chip according to the UID value of the chip, if so, the UID value of the chip is used as an input parameter of a preset binding algorithm to operate, and a target value is obtained;
the second sending module is used for sending the target value to the burner so that the burner burns the target value to the chip, the target value is used for comparing a comparison value with the target value by the chip, when the chip runs the target firmware burnt by the burner, the comparison value is obtained by reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware after operation, and if the comparison value is consistent with the target value, the chip continues to run the target firmware, otherwise, the chip stops running the target firmware.
7. The burning system is characterized by comprising an authorization device, a burner and a chip, wherein the authorization device is in communication connection with the burner, and the burner is in communication connection with the chip;
The burner is used for acquiring the UID value of the chip and sending the UID value of the chip to the authorization equipment, wherein the UID value is a unique identifier of the chip and cannot be rewritten;
the authorization equipment is used for receiving the UID value of the chip sent by the burner, detecting whether the chip is a target chip according to the UID value of the chip, if so, calculating the UID value of the chip as an input parameter of a preset binding algorithm to obtain a target value; sending the target value to the burner;
the burner is further configured to receive the target value sent by the authorization device; burning the target firmware and the target value to the chip;
the chip is used for reading the UID value of the chip as an input parameter of the preset binding algorithm included in the target firmware to operate when the target firmware is operated, so as to obtain a comparison value; and comparing the comparison value with the target value, if the comparison value is consistent with the target value, continuing to operate the target firmware, otherwise, stopping operating the target firmware.
8. The burning system of claim 7, further comprising a client through which the authorization device is communicatively connected to the burner;
The client is used for receiving the UID value of the chip sent by the burner and sending the UID value of the chip to the authorization equipment;
the client is further configured to receive the target value sent by the authorization device, and send the target value to the burner.
9. A burning device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 4.
CN202010318801.8A 2020-04-21 2020-04-21 Burning method, device, system, equipment and medium Active CN111596929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010318801.8A CN111596929B (en) 2020-04-21 2020-04-21 Burning method, device, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010318801.8A CN111596929B (en) 2020-04-21 2020-04-21 Burning method, device, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN111596929A CN111596929A (en) 2020-08-28
CN111596929B true CN111596929B (en) 2023-12-01

Family

ID=72190310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010318801.8A Active CN111596929B (en) 2020-04-21 2020-04-21 Burning method, device, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN111596929B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113442594A (en) * 2021-06-24 2021-09-28 广州众诺电子技术有限公司 Wireless connection equipment, consumable box, method for upgrading consumable chip data and terminal
CN117075924B (en) * 2023-08-15 2024-03-19 杭州凡诺电子有限公司 Chip ID processing method and electronic equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8332931B1 (en) * 2008-09-04 2012-12-11 Marvell International Ltd. Processing commands according to authorization
CN103559099A (en) * 2013-10-31 2014-02-05 惠州市蓝微电子有限公司 Chip burning checking method
CN107948183A (en) * 2017-12-06 2018-04-20 深圳数字电视国家工程实验室股份有限公司 A kind of method for distributing key and system suitable for Internet of Things
CN109101270A (en) * 2018-08-31 2018-12-28 郑州云海信息技术有限公司 Firmware version inspection method and device, storage medium and electronic equipment
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment
CN110597523A (en) * 2019-08-08 2019-12-20 深圳优地科技有限公司 Board card firmware burning method, device and system, board card and terminal equipment
CN110602140A (en) * 2019-09-29 2019-12-20 苏州思必驰信息科技有限公司 Encryption and decryption method and system for chip authorization
CN110719166A (en) * 2019-10-15 2020-01-21 深圳市元征科技股份有限公司 Chip burning method, chip burning device, chip burning system and storage medium
CN110928559A (en) * 2019-11-22 2020-03-27 深圳创维-Rgb电子有限公司 Data burning method and device, electronic equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8332931B1 (en) * 2008-09-04 2012-12-11 Marvell International Ltd. Processing commands according to authorization
CN103559099A (en) * 2013-10-31 2014-02-05 惠州市蓝微电子有限公司 Chip burning checking method
CN107948183A (en) * 2017-12-06 2018-04-20 深圳数字电视国家工程实验室股份有限公司 A kind of method for distributing key and system suitable for Internet of Things
CN109101270A (en) * 2018-08-31 2018-12-28 郑州云海信息技术有限公司 Firmware version inspection method and device, storage medium and electronic equipment
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN110597523A (en) * 2019-08-08 2019-12-20 深圳优地科技有限公司 Board card firmware burning method, device and system, board card and terminal equipment
CN110602140A (en) * 2019-09-29 2019-12-20 苏州思必驰信息科技有限公司 Encryption and decryption method and system for chip authorization
CN110719166A (en) * 2019-10-15 2020-01-21 深圳市元征科技股份有限公司 Chip burning method, chip burning device, chip burning system and storage medium
CN110928559A (en) * 2019-11-22 2020-03-27 深圳创维-Rgb电子有限公司 Data burning method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111596929A (en) 2020-08-28

Similar Documents

Publication Publication Date Title
CN109711168B (en) Behavior-based service identification method, behavior-based service identification device, behavior-based service identification equipment and readable storage medium
CN107395614B (en) Single sign-on method and system
CN111596929B (en) Burning method, device, system, equipment and medium
CN105701410B (en) The method, apparatus and system of information in a kind of acquisition source code
US11349651B2 (en) Measurement processing of high-speed cryptographic operation
CN112231702B (en) Application protection method, device, equipment and medium
US20100333207A1 (en) Systems and Methods for Auditing Software Usage Using a Covert Key
CN112996020B (en) Bluetooth-based automatic test method and device and Bluetooth test terminal
CN112001376B (en) Fingerprint identification method, device, equipment and storage medium based on open source component
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN114040411B (en) Equipment binding method and device, electronic equipment and storage medium
CN111046392A (en) BIOS (basic input output System) credibility measuring method and device and terminal equipment
CN111967016B (en) Dynamic monitoring method of baseboard management controller and baseboard management controller
US20160352522A1 (en) User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same
WO2024027301A1 (en) Encryption method for automobile diagnosis software
CN112069499A (en) Detection method, detection device, storage medium and electronic equipment
KR20150087363A (en) Firmware-implemented software licensing
CN108391281B (en) Bridging method of wireless network, terminal equipment and storage medium
CN107391970B (en) Function access control method and device in Flash application program
CN101290648B (en) Method for remotely verifying legal copy of software
CN112199673A (en) Method and device for detecting authority lifting behavior and readable storage medium
CN107295177B (en) Application disabling method and device and terminal equipment
CN112654964A (en) Brush machine control method, brush machine control device and terminal equipment
CN108256313A (en) A kind of right management method, system and device
CN112559981B (en) Software protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant