1993 views|16 replies

28

Posts

0

Resources
The OP
 

Yesterday a friend asked me how to manage encryption for vehicle inspection equipment. Later I found out that it was for anti-piracy purposes. Someone... [Copy link]

 
 

Yesterday a friend asked me how to do encryption management on vehicle inspection equipment. Later I found out that it was for anti-piracy needs. Can anyone help guide me?

This post is from Domestic Chip Exchange

Latest reply

I just checked and it seems to be a domestic company. It looks like it has many product models and a wide range of interfaces. It should be good.  Details Published on 2021-7-5 08:35
 
 

2w

Posts

341

Resources
2
 

Tell me about that friend's problem.

How to perform encryption management on vehicle testing equipment?

This post is from Domestic Chip Exchange
 
 
 

53

Posts

0

Resources
3
 

Front row support observation and learning

This post is from Domestic Chip Exchange
 
 
 

33

Posts

0

Resources
4
 

The encryption chip algorithm is well transplanted and can effectively protect

This post is from Domestic Chip Exchange
 
 
 

旋转木偶 该用户已被删除
5
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

31

Posts

0

Resources
6
 
Posted by Rotating Puppet on 2021-7-1 10:43 Which company's product is this and what are the features of the solution?

CNLINKO's solutions are diverse and products are cost-effective

This post is from Domestic Chip Exchange
 
 
 

我心痛了 该用户已被删除
7
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

pinbo2008 该用户已被删除
8
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

nic_浩 该用户已被删除
9
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

33

Posts

0

Resources
10
 
nic_浩 posted on 2021-7-2 10:41 How is authentication implemented and what is the principle?

The usual practice is that the master sends data A, the encryption chip performs a preset operation on A, and returns B. The master determines whether B is the expected result.

This post is from Domestic Chip Exchange
 
 
 

28

Posts

0

Resources
11
 
It looks good, why do you say it's unsafe?
This post is from Domestic Chip Exchange
 
 
 

31

Posts

0

Resources
12
 

Think about it, the main control judges B. If the pirates find the judgment point of the main control and skip it directly, what will happen?

This post is from Domestic Chip Exchange
 
 
 

旋转木偶 该用户已被删除
13
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

我心痛了 该用户已被删除
14
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

pinbo2008 该用户已被删除
15
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

pinbo2008 该用户已被删除
16
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

nic_浩 该用户已被删除
17
 
提示: 作者被禁止或删除 内容自动屏蔽
 
 
 

Find a datasheet?

EEWorld Datasheet Technical Support

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
快速回复 返回顶部 Return list