TW201508541A - Protection system and method with smartcard device - Google Patents
Protection system and method with smartcard device Download PDFInfo
- Publication number
- TW201508541A TW201508541A TW102129963A TW102129963A TW201508541A TW 201508541 A TW201508541 A TW 201508541A TW 102129963 A TW102129963 A TW 102129963A TW 102129963 A TW102129963 A TW 102129963A TW 201508541 A TW201508541 A TW 201508541A
- Authority
- TW
- Taiwan
- Prior art keywords
- smart card
- processor
- card chip
- verification
- chip
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
本發明係一種保護系統及方法用於裝置的防偽、反盜版上。裝置開發上需耗費人力、時間、金錢在於硬體研發、處理器內之軟體開發等,若電路設計圖、處理器內之軟體二進位檔遭不正當管道散佈出去,會使開發設計付諸於流水。往往會在處理器內之軟體及硬體設計上製作防偽設計,以避免大量的心血遭人盜用。 The invention is a protection system and method for anti-counterfeiting and anti-piracy of a device. The development of the device requires labor, time and money in hardware development, software development in the processor, etc. If the circuit design diagram and the software binary file in the processor are scattered by the improper pipeline, the development design will be put into use. running water. Anti-counterfeiting designs are often made on the software and hardware design of the processor to avoid a lot of misappropriation.
一般在大量製造上會採取處理器預載軟體方式,再由工廠製造電路板、組裝硬體裝置完成後,需經過特定的電腦及管控軟體對裝置燒錄授權到裝置的特定區域,如裝置內的可儲存式記憶體中;授權可為特定的序號或密碼。而由於此特定的電腦及管控軟體不能任意放置,需在特定的控管區域中進行,因此易造成工廠上的管理不易,裝置需在組裝完成後移動到控管區域進行燒錄序號,再回到工廠進行最後的包裝,造成量產時程拉長,降低產能。 Generally, in a large number of manufacturing, the processor preloading software mode is adopted, and after the factory manufactures the circuit board and the assembled hardware device, the specific computer and the control software are required to authorize the device to the specific area of the device, such as the device. In storable memory; authorization can be a specific serial number or password. Since this particular computer and control software cannot be placed arbitrarily, it needs to be carried out in a specific control area, so it is easy to cause management on the factory. The device needs to be moved to the control area after the assembly is completed to burn the serial number. The final packaging at the factory will cause the production time to be lengthened and the production capacity reduced.
而先前技術有提出將部分程式碼放置於智慧卡中,再由特定指令向智慧卡取回該部分程式碼,來達到保護軟體的效果。由於存取智慧卡的速度遠比存取處理器記憶體來的 慢,若以效率的角度來看,會拖慢系統執行效率;而惡意使用者也可透過放置惡意程式於智慧卡的方式,來執行不正當程式碼,安全性備受爭議。 However, the prior art has proposed to place part of the code in the smart card, and then retrieve the part of the code from the smart card by a specific instruction to achieve the effect of protecting the software. Because accessing smart cards is much faster than accessing processor memory Slow, if it is an efficiency point of view, it will slow down the system execution efficiency; and malicious users can also execute malicious code by placing malicious programs on the smart card, and the security is highly controversial.
有鑑於上述問題,本發明結合一智慧卡晶片於裝置中,透過處理器與智慧卡晶片互相驗證對方訊息來檢查授權,訊息量少,因此效率較高,且處理器不會執行來自智慧卡晶片之指令,無安全問題;製造上只需控管該智慧卡晶片數量,便能做完授權動作,無須再將半成品移至控管區域授權,因此可加速生產速度,以及達到保障裝置智慧財產權的效果。 In view of the above problems, the present invention combines a smart card chip in the device, checks the authorization by verifying the other party's message through the processor and the smart card chip, and the amount of information is small, so the efficiency is high, and the processor does not execute the chip from the smart card. The instruction has no security problem; it only needs to control the number of smart card chips in manufacturing, and can complete the authorization action, no need to move the semi-finished products to the control area authorization, thus speeding up the production speed and achieving the intellectual property rights of the device. effect.
本發明揭示一種利用智慧卡晶片來達到保護裝置之系統及方法,藉由智慧卡晶片提供的安全性及唯一性,以及操作上時間的不可預期性,來驗證產品的授權。 The present invention discloses a system and method for implementing a protection device using a smart card chip, which verifies the authorization of the product by the security and uniqueness provided by the smart card chip and the unpredictability of the operation time.
為達到此目的,此發明之系統須包括一智慧卡晶片、一處理器以及與使用者互動之介面。 To achieve this, the system of the invention must include a smart card chip, a processor, and an interface for interacting with the user.
於開發階段時需先設計一驗證程序,其驗證程序能利用一特定密鑰組合、一特定字串以及一隨機字串來產生一驗證結果,並將此驗證程序分別放置於智慧卡晶片以及處理器內之軟體中。 In the development stage, a verification program needs to be designed, and the verification program can generate a verification result by using a specific key combination, a specific string and a random string, and place the verification program on the smart card chip and process respectively. In the software inside the device.
於智慧卡晶片中安裝具有該驗證程序的應用,並將此應用個人化(Personalization)之後來產生唯一性資料,其中個人化的資訊包含固定的加密密鑰組合以及一公開唯一資料,用以區別每一智慧卡晶片,而此時該智慧卡晶片則視為一個單位量的授權,並將此智慧卡晶片置於裝置中。 An application having the verification program is installed in the smart card chip, and the application is personalized to generate unique data, wherein the personalized information includes a fixed encryption key combination and a publicly unique data to distinguish Each smart card chip, while the smart card chip is considered a unit amount of authorization, and the smart card chip is placed in the device.
智慧卡裝置處理器軟體在此驗證程序已具有與該智慧卡晶片相同之密鑰組合,在使用者操作裝置時會觸發此驗證程序啟動,便向智慧卡晶片要此公開唯一資料,之後並產生一隨機字串以及該隨機字串驗證結果,傳給智慧卡晶片,等待智慧卡晶片驗證此結果後,智慧卡晶片則會再產生另一字串並利用公開唯一資料及該字串產生另一驗證結果回傳給處理器,處理器驗證此驗證結果之後,若為正確,則確認該裝置具有正確授權,便可以繼續正確處理使用者觸發之行為;若此智慧卡晶片為仿製智慧卡晶片,處理器內之軟體驗證該資料會失敗,則終止使用者欲使用之功能,來保障智慧財產權不被盜用。 The smart card device processor software has the same key combination as the smart card chip, and when the user operates the device, the verification program is triggered to start, and the smart card chip is required to disclose the unique data, and then generate A random string and the random string verification result are transmitted to the smart card chip, and after waiting for the smart card chip to verify the result, the smart card chip generates another string and uses the publicly unique data and the string to generate another The verification result is sent back to the processor. After the processor verifies the verification result, if it is correct, it confirms that the device has the correct authorization, and can continue to correctly handle the user-triggered behavior; if the smart card chip is a fake smart card chip, If the software in the processor verifies that the data will fail, the function that the user wants to use is terminated to ensure that the intellectual property rights are not stolen.
一種具有智慧卡裝置之保護系統,係包含:一智慧卡晶片,係為加解密以及儲存資料,並產生唯一性資料、密鑰組合、及驗證程序;一處理器,係具有程式化之能力,並與該智慧卡晶片通訊連接;以及一操作介面,係透過該操作介面來操作該智慧卡裝置,操作時會使該處理器與該智慧卡晶片通訊連接。 A protection system with a smart card device, comprising: a smart card chip for encrypting and decrypting and storing data, and generating unique data, a key combination, and a verification program; and a processor having a stylized capability. And communicating with the smart card chip; and an operation interface, the smart card device is operated through the operation interface, and the processor is communicatively connected to the smart card chip during operation.
其中該唯一性資料係為個人化資料,該驗證程序係利用識別該唯一性資料,並由該處理器帶入之參數產生一特定驗證結果,該處理器係取得該智慧卡晶片公開唯一資料,並利用該公開唯一資料及一參數產生一特定驗證結果,並將該驗證結果傳送到該智慧卡晶片,該處理器係為比對驗證演算法之驗證結果與該智慧卡晶片產生之驗證結果,來決定該智慧卡裝置使用之權利,該處理器在該操作介面觸發下,會執行驗證程序。 The unique data is personalized data, and the verification program generates a specific verification result by using the unique data, and the parameter brought by the processor, the processor obtains the unique information of the smart card chip. And generating a specific verification result by using the publicly available unique data and a parameter, and transmitting the verification result to the smart card chip, where the processor is a verification result of the verification verification algorithm and the verification result generated by the smart card chip, To determine the right to use the smart card device, the processor will execute the verification process triggered by the operation interface.
一種具有智慧卡裝置之保護方法,其中在於由處 理器要求智慧卡晶片之公開唯一資料,並藉由一密鑰加密驗證程序與該公開唯一資料來產生一驗證結果,確定裝置授權,其步驟係包括:該處理器要求該智慧卡晶片之公開唯一資料;該處理器取得該智慧卡晶片之公開唯一資料之後,利用該處理器內之軟體中的密鑰及驗證程序產生驗證資料,傳送到智慧卡晶片;該智慧卡晶片以該密鑰驗證該驗證結果後,產生另一驗證結果,回傳給該處理器;該處理器驗證該智慧卡晶片之該驗證結果,其正確性將決定該智慧卡裝置之使用權。 A method for protecting a smart card device, which is The processor requests the publicly unique information of the smart card chip, and generates a verification result by using a key encryption verification program and the publicly unique data to determine the device authorization, and the steps include: the processor requests the disclosure of the smart card chip The unique data; after the processor obtains the publicly unique information of the smart card chip, the verification data is generated by using the key and the verification program in the software in the processor, and transmitted to the smart card chip; the smart card chip is verified by the key After the verification result, another verification result is generated and returned to the processor; the processor verifies the verification result of the smart card chip, and the correctness thereof determines the usage right of the smart card device.
其中該處理器係具一演算法,並藉由該智慧卡晶片公開資料與特定參數產生一特定結果,該處理器與該智慧卡晶片之演算法若為不相同,但相互驗證彼此之產生結果,該處理器與該智慧卡晶片係具有相同密鑰組合,該公開唯一資料係為個人化資料,且亦為智慧卡晶片本身之晶片序列號,或者為開發商自行加入之個人化序列號。 The processor has an algorithm and generates a specific result by using the smart card chip to disclose data and specific parameters, and the algorithm of the processor and the smart card chip are different, but mutually verify each other. The processor and the smart card chip have the same key combination, and the disclosed unique data is personalized data, and is also the chip serial number of the smart card chip itself, or a personalized serial number added by the developer.
本發明為具有智慧卡裝置之保護系統和方法,與時下使用技術相互比較,更具備下列優點: The invention is a protection system and method with a smart card device, and compares with the current use technology, and has the following advantages:
1.不易偽造,智慧卡晶片能保障其具有的唯一性及安全性,無法取得智慧卡晶片所儲存之內容,必須破解其驗證方式。 1. It is not easy to forge. The smart card chip can guarantee its uniqueness and security. It cannot obtain the content stored in the smart card chip, and must verify its verification method.
2.透過使用者操作的隨機性或是定時產生動態驗證,防止預先錄製驗證訊息於仿製智慧卡晶片上。 2. Dynamic verification by user randomness or timing to prevent pre-recorded verification messages on the fake smart card chip.
3.簡化生產流程,可事先準備好足夠授權數量的智慧卡晶片,不需要額外透過特定軟體對產品裝置進行序號燒錄。 3. Simplify the production process, and prepare a sufficient number of smart card chips in advance, without the need to additionally serialize the product devices through specific software.
4.授權方式為實體授權,若授權額度過量,可立即回收,授權數量可簡化清點,易於管理。 4. The authorization method is entity authorization. If the authorization amount is excessive, it can be immediately recovered. The authorized quantity can simplify the inventory and is easy to manage.
1‧‧‧智慧卡晶片 1‧‧‧Smart Card Wafer
11‧‧‧驗證程序 11‧‧‧Verification procedure
12‧‧‧個人化資料 12‧‧‧ Personalized information
2‧‧‧智慧卡裝置電路架構意識圖 2‧‧‧Smart card device circuit architecture awareness map
21‧‧‧處理器 21‧‧‧ Processor
22‧‧‧智慧卡晶片 22‧‧‧Smart Card Wafer
23‧‧‧實體通訊介面 23‧‧‧Communication interface
24‧‧‧周邊電路 24‧‧‧ peripheral circuits
25‧‧‧實體控制介面 25‧‧‧ entity control interface
31‧‧‧操作觸發 31‧‧‧Operation trigger
32‧‧‧要求裝置功能 32‧‧‧Requires device function
33‧‧‧檢查硬體授權 33‧‧‧Check hardware authorization
34‧‧‧使用周邊 34‧‧‧Use the surrounding
35‧‧‧終止使用 35‧‧‧End of use
36‧‧‧定時程序 36‧‧‧Timed procedures
41~51‧‧‧驗證程序流程 41~51‧‧‧Verification procedure
請參閱有關本發明之詳細說明及其附圖,將可進一步瞭解本發明之技術內容及其目的功效;有關附圖為:圖1為本發明之智慧卡晶片內部軟體架構圖;圖2為本發明之智慧卡裝置電路架構意識圖;圖3為本發明之智慧卡裝置操作流程圖;以及圖4為本發明之驗證程序流程圖。 The technical content of the present invention and the purpose of the present invention will be further understood by referring to the detailed description of the present invention and the accompanying drawings. FIG. 1 is a schematic diagram of the internal software architecture of the smart card chip of the present invention; The invention relates to a smart card device circuit architecture awareness diagram; FIG. 3 is a flow chart of the operation of the smart card device of the present invention; and FIG. 4 is a flow chart of the verification program of the present invention.
請參閱圖1,智慧卡晶片1視為一載體,其包含一驗證程序11,及一唯一識別個人化資料12,識別個人化資料12的公開唯一資料及驗證帶入的參數,用一把特定密鑰與驗證程序11來產生獨特的驗證結果。 Referring to FIG. 1, the smart card chip 1 is regarded as a carrier, and includes a verification program 11, and a unique identification data, a publicly-identified data identifying the personalized data 12, and a parameter for verifying the input. The key and verification program 11 produces unique verification results.
圖2為智慧卡裝置電路架構意識圖2,處理器21與該授權智慧卡晶片22利用實體通訊介面23來通訊驗證,而處理器21內部軟體也具有驗證機制來驗證該加密演算結果,結果正確與否,將決定是否能夠使用周邊電路24;若驗證結果錯誤,處理器會利用實體控制介面25來禁止存取24。 2 is a smart card device circuit architecture awareness diagram 2, the processor 21 and the authorized smart card chip 22 use the physical communication interface 23 for communication verification, and the processor 21 internal software also has a verification mechanism to verify the encryption calculation result, the result is correct Whether or not the peripheral circuit 24 can be used is determined; if the verification result is incorrect, the processor uses the physical control interface 25 to disable access 24.
圖3為智慧卡裝置操作流程圖,智慧卡裝置在啟動之後,若接收到操作觸發31時,處理器會要求智慧卡裝置功能32,此時處理器內部軟體便會命令處理器與智慧卡晶片通訊,進行驗證檢查硬體授權33,若為已授權裝置,則依照使用者操作之行為來使用周邊34;否則會讓裝置終止使用35。處理器內之軟體內部也能透過一定時程序36來存取周邊,則會在設定的時間控制周邊,此時也會檢查硬體授權33。由於由使用者操作31來觸發,會具有時間上的差異,便能產生動 態驗證,來避免仿冒授權。 3 is a flow chart of the operation of the smart card device. After the smart card device is started, if the operation trigger 31 is received, the processor will request the smart card device function 32, and the internal software of the processor will command the processor and the smart card chip. Communication, verification verification hardware authorization 33, if it is an authorized device, the peripheral 34 is used according to the user's operation; otherwise, the device is terminated. The software inside the processor can also access the periphery through the time program 36, and the periphery will be controlled at the set time. At this time, the hardware authorization 33 is also checked. Since it is triggered by the user operation 31, there will be a difference in time, and it can be generated. State verification to avoid phishing authorization.
圖4為驗證程序流程圖,處理器41內之軟體中已事先具有一用於驗證之密鑰組合,以及產生驗證結果之驗證程序42;智慧卡晶片43則事先安裝一與處理器內之軟體中相同之密鑰組合、驗證程序、以及唯一識別個人化資料44。處理器41在驗證程序開始時,會向智慧卡晶片要求公開唯一資料45,待智慧卡晶片43回傳該公開唯一資料46後,由處理器41內部的密鑰及驗證程序產生驗證結果47,並將驗證結果48傳送給智慧卡晶片43;智慧卡晶片43以驗證處理器結果產生回傳資料49後,產生另一筆驗證結果50,回傳給處理器41;處理器41驗證智慧卡晶片43資料後,若正確,則確認授權51使用者命令;其他狀況則中斷處理命令,來達成保護裝置之功效。 4 is a flow chart of the verification program. The software in the processor 41 has a key combination for verification and a verification program 42 for generating verification results. The smart card chip 43 is pre-installed with a software in the processor. The same key combination, verification procedure, and unique identification of personalization data 44. When the verification program starts, the processor 41 requests the smart card chip to disclose the unique data 45. After the smart card chip 43 returns the public unique data 46, the verification result 47 is generated by the internal key of the processor 41 and the verification program. The verification result 48 is transmitted to the smart card chip 43; after the smart card chip 43 generates the return data 49 by verifying the processor result, another verification result 50 is generated and transmitted back to the processor 41; the processor 41 verifies the smart card chip 43. After the data, if it is correct, it confirms that the user command is authorized 51; in other cases, the processing command is interrupted to achieve the effect of the protection device.
上列詳細說明乃針對本發明之一可行實施例進行具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the present invention is intended to be illustrative of a preferred embodiment of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.
綜上所述,本案不僅於技術思想上確屬創新,並具備習用之傳統方法所不及之上述多項功效,已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of technical thinking, but also has many of the above-mentioned functions that are not in the traditional methods of the past. It has fully complied with the statutory invention patent requirements of novelty and progressiveness, and applied for it according to law. Approved this invention patent application, in order to invent invention, to the sense of virtue.
2‧‧‧智慧卡裝置電路架構意識圖 2‧‧‧Smart card device circuit architecture awareness map
21‧‧‧處理器 21‧‧‧ Processor
22‧‧‧智慧卡晶片 22‧‧‧Smart Card Wafer
23‧‧‧實體通訊介面 23‧‧‧Communication interface
24‧‧‧周邊電路 24‧‧‧ peripheral circuits
25‧‧‧實體控制介面 25‧‧‧ entity control interface
Claims (11)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW102129963A TW201508541A (en) | 2013-08-22 | 2013-08-22 | Protection system and method with smartcard device |
| CN201410211894.9A CN104008352A (en) | 2013-08-22 | 2014-05-19 | Protection system and method with smart card device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW102129963A TW201508541A (en) | 2013-08-22 | 2013-08-22 | Protection system and method with smartcard device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW201508541A true TW201508541A (en) | 2015-03-01 |
Family
ID=51369002
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW102129963A TW201508541A (en) | 2013-08-22 | 2013-08-22 | Protection system and method with smartcard device |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN104008352A (en) |
| TW (1) | TW201508541A (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201702918A (en) * | 2015-07-09 | 2017-01-16 | Chunghwa Telecom Co Ltd | System and method for smart card firmware authorization wherein the smart card may control the firmware authorization number |
| CN107766717B (en) * | 2016-08-17 | 2020-04-14 | 中国移动通信有限公司研究院 | An access control method, device and system |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8156322B2 (en) * | 2007-11-12 | 2012-04-10 | Micron Technology, Inc. | Critical security parameter generation and exchange system and method for smart-card memory modules |
| CN101499142B (en) * | 2008-12-29 | 2012-05-02 | 北京握奇数据系统有限公司 | Double-interface smart card and method for processing application instruction thereof |
| CN202004846U (en) * | 2011-04-02 | 2011-10-05 | 信雅达系统工程股份有限公司 | Cellphone shield capable of protecting mobile payment security |
-
2013
- 2013-08-22 TW TW102129963A patent/TW201508541A/en unknown
-
2014
- 2014-05-19 CN CN201410211894.9A patent/CN104008352A/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| CN104008352A (en) | 2014-08-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI724683B (en) | Computer-implemented method for managing user key pairs, system for managing user key pairs, and apparatus for managing user key pairs | |
| JP7007398B2 (en) | Methods and equipment for processing transaction requests | |
| JP6985011B2 (en) | Equipment and methods for ensuring access protection schemes | |
| US20020083318A1 (en) | Method and system for software integrity control using secure hardware assist | |
| KR20170095161A (en) | Secure system on chip | |
| CN103366103B (en) | The application program encryption protecting method of card reader | |
| CN111723383A (en) | Data storage, verification method and device | |
| US11163859B2 (en) | Content protection via online servers and code execution in a secure operating system | |
| CN110222531A (en) | A kind of method, system and equipment accessing database | |
| CN103198247B (en) | A kind of computer safety protective method and system | |
| TW201530344A (en) | Application program access protection method and application program access protection device | |
| CN109086578A (en) | A kind of method that soft ware authorization uses, equipment and storage medium | |
| CN107958141A (en) | A kind of method for protecting software based on chip ID number | |
| US7624442B2 (en) | Memory security device for flexible software environment | |
| US11308238B2 (en) | Server and method for identifying integrity of application | |
| KR20160065261A (en) | System for preventing forgery of application and method therefor | |
| TW201508541A (en) | Protection system and method with smartcard device | |
| KR102102179B1 (en) | Embedded system, authentication system comprising the same, method of authenticating the system | |
| CN119808083B (en) | RSIC-V CPU safety chip based on authority management | |
| CN103838997A (en) | Single-chip microcomputer password verification method and device | |
| CN103105783B (en) | embedded element and control method | |
| KR20150072007A (en) | Method for accessing temper-proof device and apparatus enabling of the method | |
| CN105989490B (en) | Electronic device and fingerprint recognition control method | |
| EP2735992B1 (en) | Software identification | |
| CN114816549B (en) | Method and system for protecting bootloader and environment variable thereof |