When do we need a microcontroller to decrypt it?
Do you know what an embedded device is? We do not explain on the definition, just a few simple examples we can know what exactly is an embedded device, for example, the mobile phone we use now is even one of that ...

2012-11-20

SCM Application Area Summary
图象 The system is measured with an image sensor measurement line. The serial port of the satellite TV simulates the application of SPI and I2C, such as the data transmission of radar recording. ⒊Cooperate directly with AD chip for various data sensors. ⒋Using MCU ...

2011-10-26

Why do you say when customers ask the price
This situation may exist, mainly due to the following reasons A: The customer's phone model is not reported correctly, for example, when a customer reports AT89C51RC as AT89C51, the price difference is about 10 times! B: Customer's order ...

2010-04-29

The chip model is worn out. Can I decrypt it? Price as
This situation is difficult to say. Customers need to mail or send the chip to us, and we can answer it after testing. Generally, we have successfully decrypted the chip, which can basically be decrypted. Currently we can judge the type through the programmer ...

2010-04-29

How many samples are provided after the MCU is decrypted?
In general, the number of samples we provide is the number of mother films provided by customers plus one, which means that if customers provide N pieces, we will provide N + 1 pieces. The reason for this number is as follows: A: Samples cost money, ...

2010-04-29

Can the mother film be returned to us after decryption?
Not in principle. Decrypt the single-chip microcomputer made by hardware, the chip is opened, and there are traces of our circuit modification. We don't want our technology leaked, so this method must not be returned to the master! For software ...

2010-04-29

How long does it take for IC to decrypt?
Generally, it only takes 10 to 50 minutes to decrypt the hardware. But we can't serve you so fast, because there is a cost problem, we generally have to wait for a batch to do DECAP and FIB together, so that ...

2010-04-29

Will the chip decryption fail?
It is possible, but it is like the possibility of accidents by air. At present, the latest encryption technology continues to appear, the chip burns out the data pins, the possibility of acid leakage in the process of decrypting and opening the cover, and the misoperation during the circuit modification process, etc ...

2010-04-29

Will the IC be damaged when the IC is decrypted?
At present, there are two methods for decryption of single-chip microcomputers. One is software-based, which is called non-intrusive attack. It requires some software, such as a homemade device similar to a programmer. encryption...

2010-04-29

Why do IC decrypts require a deposit?
Because we also have the cost of human and material resources when we do the decryption, and in some cases we need to rely on the equipment of other institutions (such as FIB equipment), but after some customers did the decryption, they found that the latest version of his product came out ...

2010-04-29

篇页次: 1 / 210篇/页首页上一页下一页 尾页转到: Total 12 Article Pages: 1/2 Page 10 Article / Page First Previous Next Last Go:

WeChat scan QR code consultation