CN108171523A - A kind of track of hardware method - Google Patents
A kind of track of hardware method Download PDFInfo
- Publication number
- CN108171523A CN108171523A CN201711465526.7A CN201711465526A CN108171523A CN 108171523 A CN108171523 A CN 108171523A CN 201711465526 A CN201711465526 A CN 201711465526A CN 108171523 A CN108171523 A CN 108171523A
- Authority
- CN
- China
- Prior art keywords
- sequence number
- hardware system
- ciphering sequence
- main website
- host computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of track of hardware method, this method includes:Before hardware system manufacture, hardware system obtains ciphering sequence number, and ciphering sequence number is stored into self-contained every sub- equipment, and wherein ciphering sequence number is corresponding with the user for buying hardware system;After hardware system dispatches from the factory and comes into operation, whether the ciphering sequence number stored in the self-contained every sub- equipment of hardware system detection is consistent, if so, hardware system normal operation, otherwise there are illegal modules in the sub- equipment of hardware system alarm.After hardware device comes into operation, whether there is same ciphering sequence number by each sub- equipment for detecting hardware system, it is capable of determining that whether each sub- equipment of hardware system belongs to same user, if not, then think there are user after hardware system is bought, hardware system is split into sub- equipment and situation about selling, and realize alarm, otherwise, then it is assumed that user has carried out normal use and sale after buying hardware system to the hardware system.
Description
Technical field
The present invention relates to hardware management technical field, more specifically to a kind of track of hardware method.
Background technology
Falsifying refers to allow without producer, and sale privately ships and resell on another market cargo to non-category product client, i.e., producer, which delivers, gives A visitors
The product effective sale at family is to B client.The generation essence of falsifying phenomenon is that the sale in enterprise's selling network is driven by interests, is made
The trans-regional sale of product sold to backspread, seriously compromises interests and the long term growth of enterprise;It is and more on the market
The falsifying of appearance is bought for A client and product is splitted into part and by parts business to other clients after product, for this falsifying,
There is an urgent need to a kind of effective hardware anti-channel conflict technical solutions for enterprise.
It is current this field skill in conclusion how to provide a kind of technical solution that can effectively realize hardware anti-channel conflict
Art personnel's urgent problem to be solved.
Invention content
The object of the present invention is to provide a kind of track of hardware methods, can effectively prevent the generation of hardware falsifying behavior.
To achieve these goals, the present invention provides following technical solution:
A kind of track of hardware method, including:
Before hardware system manufacture, the hardware system obtains ciphering sequence number, and by the ciphering sequence number store to
In self-contained every sub- equipment, wherein the ciphering sequence number is corresponding with the user for buying the hardware system;
After the hardware system dispatches from the factory and comes into operation, in the self-contained every sub- equipment of hardware system detection
Whether the ciphering sequence number of storage is consistent, if so, the hardware system normal operation, otherwise hardware system alarm is set
There are illegal modules in standby.
Preferably, the sub- equipment of the hardware system includes host computer, main website and slave station, and the hardware system obtains encryption
Sequence number simultaneously stores the ciphering sequence number into the host computer, including:
The host computer obtains ciphering sequence number and stores;
The hardware system stores the ciphering sequence number into self-contained main website and slave station and the hardware system
Whether the ciphering sequence number of the sub- equipment storage of self-contained every of system detection is consistent, includes:
The main website obtains the ciphering sequence number of the host computer storage, and whether judges the ciphering sequence number itself stored
For initial value, if it is initial value, store the ciphering sequence number of acquisition and return to the host computer and encrypt successful information,
If being not initial value, judge whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously,
The information of the host computer successful match is then returned to, if it is inconsistent, returning to the host computer matches unsuccessful letter
Breath;When the host computer receives matching unsuccessful information, it is illegal module to determine the main website;
If the ciphering sequence number that the main station judging goes out acquisition is consistent with the ciphering sequence number that itself is stored, by itself
The ciphering sequence number of storage is sent to the slave station, and the slave station judges whether the ciphering sequence number of itself storage is initial value,
If it is initial value, store the ciphering sequence number of acquisition and return to the main website and encrypt successful information, if not being first
Initial value then judges whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returning to institute
The information of main website successful match is stated, if it is inconsistent, returning to the main website matches unsuccessful information;The main website receives
To when matching unsuccessful information, it is illegal module to determine the slave station.
Preferably, the hardware system is alarmed in sub- equipment there are illegal module, including:
The host computer or the main website export the illegal module itself determined being capable of normal operation preset time
The prompt message of section, and control preset time period described in the illegal module normal operation.
Preferably, it after the host computer or the main website receive the information of successful match, further includes:
The information of successful match that the host computer or main website output receive, obtains for user.
Preferably, the host computer obtains ciphering sequence number and stores, including:
The host computer obtains ciphering sequence number and stores, and the ciphering sequence number is to item sequence using preset algorithm
It number is encrypted, the item sequence number is corresponding with the user for buying the hardware system.
Preferably, it further includes:
It is needed replacing if the main website of the hardware system after dispatching from the factory and coming into operation breaks down, new main website is dispatching from the factory
It is preceding to obtain ciphering sequence number corresponding with the hardware system and store.
Preferably, it further includes:
It needs repairing if the main website of the hardware system breaks down, whether the main station judging itself, which is stored with, adds
Close sequence number, if it is, determining that itself is encrypted, if it is not, then obtaining ciphering sequence corresponding with the hardware system
Number and store.
Preferably, it further includes:
It needs replacing or repairs if the slave station of the hardware system breaks down, new slave station or repaired
Slave station judges whether itself is stored with ciphering sequence number, if it is, determining that itself is encrypted, if it is not, then described in obtaining
The ciphering sequence number of main website and storage.
The present invention provides a kind of track of hardware method, this method includes:Before hardware system manufacture, the hardware system
Ciphering sequence number is obtained, and the ciphering sequence number is stored into self-contained every sub- equipment, wherein the encryption sequence
Row number is corresponding with the user for buying the hardware system;After the hardware system dispatches from the factory and comes into operation, the hardware system
Whether the ciphering sequence number stored in the self-contained every sub- equipment of system detection is consistent, if so, the hardware system is normal
Operation, otherwise there are illegal modules in the sub- equipment of the hardware system alarm.In technical solution disclosed in the present application, in hardware system
Hardware system before dispatching from the factory of uniting is self-contained each sub- equipment encryption, corresponding with buying the user of hardware system will be added
Close sequence number is stored into each sub- equipment, as a result, after hardware device comes into operation, by each height for detecting hardware system
Whether equipment has same ciphering sequence number, is capable of determining that whether each sub- equipment of hardware system belongs to same user,
If it is not, then thinking after having purchased hardware system there are user, hardware system is split into sub- equipment and situation about selling, it is no
Then, then it is assumed that user has carried out normal use and sale after buying hardware system to the hardware system, so as to pass through above-mentioned side
Formula effectively identifies that product is splitted into part and the behavior sold, and then hardware is effectively prevent to alter by user with the presence or absence of after purchase product
The generation of goods behavior.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of track of hardware method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of main website encryption and detection process in a kind of track of hardware method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of slave station encryption and detection process in a kind of track of hardware method provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, it illustrates a kind of flow chart of track of hardware method provided in an embodiment of the present invention, can wrap
It includes:
S11:Before hardware system manufacture, hardware system obtains ciphering sequence number, and ciphering sequence number is stored to itself
Comprising every sub- equipment in, wherein ciphering sequence number is corresponding with the user of purchase hardware system.
Wherein, hardware system can be DCS (Distributed Control System, distribution comprising I/O module
Control system), DCS is a kind of novel computer control system for centralized control system, and basic thought is
Decentralised control, centralized operation, differentiated control, configuration are flexibly and configuration is convenient, corresponding, and DP can be included in hardware system
(high-speed field bus) master station (DP master stations are referred to as master station), DP slave stations (DP slave stations are referred to as slave station) and host computer, certainly also
Other hardware systems can be chosen according to actual needs, within protection scope of the present invention;User is then purchase hardware system
The user of system, a user can correspond to multiple ciphering sequence numbers in the application, but a ciphering sequence number can only correspond to one
A user;Before hardware system manufacture, hardware system is self-contained each height using ciphering sequence number corresponding to the user
Equipment is encrypted, will the ciphering sequence number store in the every sub- equipment included to hardware system, it is corresponding to the user with this
Ciphering sequence number realizes the binding of user and hardware system;Therefore, the hardware used can be detected during later stage use
Whether each sub- equipment has whether same ciphering sequence number namely each sub- equipment should belong to same user in system.
S12:After hardware system dispatches from the factory and comes into operation, stored in the self-contained every sub- equipment of hardware system detection
Ciphering sequence number it is whether consistent, if so, the hardware system normal operation, otherwise the hardware system is alarmed in sub- equipment
There are illegal modules.
After hardware system dispatches from the factory and comes into operation, hardware system can detect whether self-contained each sub- equipment deposits
Identical ciphering sequence number is contained, since ciphering sequence number is corresponding with the user for buying hardware system, so if above-mentioned sentence
Disconnected result is yes, then illustrates that each sub- equipment belongs to same user in the hardware system, otherwise, then illustrate that the hardware system is not belonging to
Same user thinks the son that after hardware system is bought, the hardware system of purchase is split there are user in this case
Device sales have given other users, and the sub- equipment of the different user of purchase is pieced together to have obtained new hardware system by other users,
Determine that there are illegal modules in hardware system, described in background technology alter occur so as to recognise that there are users at this time
Goods behavior.In case of the falsifying behavior in technology after all wherein in the application, then corresponding hardware system manufacture is preceding and goes out
The sub- equipment included after is different.In addition the mode in the sub- equipment of hardware system alarm there are illegal module can be according to reality
Border is set, such as can directly display or be sent to designated terminal by corresponding warning message, in the present invention
Protection domain within so that user can know the presence of illegal module, and then take corresponding remedial measure etc..
In technical solution disclosed in the present application, hardware system is set for self-contained each height before hardware system manufacture
Standby encryption, will ciphering sequence number corresponding with buying the user of hardware system store into each sub- equipment, as a result, in hardware
After equipment investment use, whether there is same ciphering sequence number by each sub- equipment for detecting hardware system, can determine
Whether each sub- equipment for going out hardware system belongs to same user, if it is not, then thinking that there are users to have purchased hardware system
Afterwards, hardware system is split into sub- equipment and situation about selling, and realizes corresponding alarm, otherwise, then it is assumed that user's purchase is hard
Normal use and sale are carried out to the hardware system after part system, so as to which effectively whether identification user deposits through the above way
Product is splitted into part and the behavior sold after product is bought, and then effectively prevent the generation of hardware falsifying behavior.
In addition technical solution hardware system disclosed in the present application is detected whether automatically there are falsifying, do not need to special messenger for a long time with
Track and acquisition sales information, so as to greatly reduce cost of labor;And the application is developed based on data encryption technology,
Have the characteristics that with strong points, short implementation cycle, software requirement are simple, easy to operate, be the head that enterprise solves the problems, such as anti-channel conflict
Choosing.
A kind of track of hardware method provided in an embodiment of the present invention, the sub- equipment of hardware system can include host computer, master
It stands and slave station, hardware system obtains ciphering sequence number and store ciphering sequence number into host computer, can include:
Host computer obtains ciphering sequence number and stores;
Hardware system stores ciphering sequence number into self-contained main website and slave station and hardware system detects itself packet
Whether the ciphering sequence number of every sub- equipment storage contained is consistent, the two steps may each comprise:
Main website obtains the ciphering sequence number of host computer storage, and judges whether the ciphering sequence number that itself is stored is initial
Value if it is initial value, stores the ciphering sequence number of acquisition and returns to host computer and encrypt successful information, if not being first
Initial value then judges whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returned to
The information of position machine successful match, if it is inconsistent, returning to host computer matches unsuccessful information;Host computer receives matching
During unsuccessful information, it is illegal module to determine main website;
If the ciphering sequence number that main station judging goes out acquisition is consistent with the ciphering sequence number that itself is stored, itself is stored
Ciphering sequence number be sent to slave station, slave station judges whether the ciphering sequence number of itself storage is initial value, if it is initial value,
It then stores the ciphering sequence number of acquisition and returns to main website and encrypt successful information, if being not initial value, judge what is obtained
Whether ciphering sequence number and the ciphering sequence number itself stored are consistent, if unanimously, returning to the information of main website successful match,
If it is inconsistent, returning to main website matches unsuccessful information;When main website receives matching unsuccessful information, slave station is determined
For illegal module.
Wherein, the specific value of initial value can be set according to actual needs, and such as 0.Hardware system include host computer,
, can be by manually by ciphering sequence number burning into software security dog when main website and slave station, and software security dog is inserted into PC
Machine, the host computer in PC machine reads ciphering sequence number and stores, so as to quickly realize host computer in this way
Encryption.It should be noted that the ciphering process of main website in hardware system and slave station and to each in hardware system in the application
The detection process of sub- equipment can be identical namely be realized according to aforesaid way provided in this embodiment, it is achieved thereby that effectively adding
Close and detection;In addition host computer obtain ciphering sequence number, main website and the encryption of slave station and the detection of each sub- equipment can be
What hardware system was realized automatically after the power is turned on.
Specifically, the flow chart of main website encryption and detection process can be with as shown in Fig. 2, wherein, main website be if it is determined that certainly
Body ciphering sequence number is initial value, then illustrates main website also unencryption, store the ciphering sequence number obtained by host computer at this time with reality
Itself existing automatic encryption, if the ciphering sequence number of main website storage is not initial value and the ciphering sequence number with being obtained by host computer
Unanimously, then it is legal module to illustrate that the main website belongs to the hardware system of same user's purchase namely the main website with host computer, if
Main website storage ciphering sequence number not for initial value and the ciphering sequence number with being obtained by host computer it is inconsistent, then illustrate main website with
It is illegal module that host computer, which is not belonging to the hardware system of same user's purchase namely the main website, so as to realize adding for main website automatically
Close and detection.Host computer is configuration, monitoring and data storage in the effect of DCS system.
Slave station is encrypted and the flow chart of detection process can be with as shown in figure 3, wherein, slave station be if it is determined that self-encryption sequence
Number for initial value, then illustrate slave station also unencryption, store the ciphering sequence number obtained by main website at this time and added automatically with realizing itself
It is close, if the ciphering sequence number of slave station storage is not initial value and the ciphering sequence number with being obtained by main website is consistent, illustrate this
It is legal module that slave station belongs to the hardware system of same user's purchase namely the slave station with main website, if the encryption of slave station storage
Sequence number is not initial value and the ciphering sequence number with being obtained by main website is inconsistent, then illustrates that slave station is not belonging to same use with main website
The hardware system namely the slave station of family purchase are illegal module, so as to realize the encryption and detection of slave station automatically.Need what is illustrated
That the ciphering sequence number that itself is stored can be handed down to slave station by main website in DP initial phases, specifically, main website to from
When station sets slave station parameter after being diagnosed, the arrange parameter data sent to slave station can include systematic parameter and user makes by oneself
Adopted two parts of parameter, wherein User Defined parameter include ciphering sequence number, and the length of arrange parameter data is by systematic parameter, use
The length number (2 bytes of acquiescence) of family custom parameter determines that total length is not more than 244 bytes;It is otherwise determined that slave station and main website deposit
The communication between main website and slave station can be realized after the ciphering sequence number of storage is consistent.
A kind of track of hardware method provided in an embodiment of the present invention, the hardware system is alarmed in sub- equipment, and there are illegal moulds
Block can include:
Host computer or main website export the prompt message that the illegal module itself determined is capable of normal operation preset time period,
And control illegal module normal operation preset time period.
Wherein preset time period can be set according to actual needs, in order to avoid causing harmful effect to user, this
It can allow illegal module normal operation preset time period in application after illegal module is determined, therefore illegal mould can be exported
Block is capable of the prompt message of normal operation preset time period, user to be reminded to replace illegal module in time.Specifically, Ke Yishi
Above-mentioned prompt message is shown by man-machine interface.It meanwhile then cannot be normal again after illegal module operation preset time period
It works, specification user purchases genuine equipment by usual channel in this approach, protects the legitimate rights and interests of producer.
A kind of track of hardware method provided in an embodiment of the present invention, host computer or main website receive the information of successful match
Afterwards, it further includes:
The information of successful match that host computer or main website output receive, obtains for user.
Facilitate user's knowing for testing result as a result, facilitate user for the safe to use of hardware system, it is specific next
It says, can be that the information of successful match is shown by man-machine interface.
A kind of track of hardware method provided in an embodiment of the present invention, host computer obtain ciphering sequence number and store, including:
Host computer obtains ciphering sequence number and stores, and ciphering sequence number is adds item sequence number using preset algorithm
Close to obtain, item sequence number is corresponding with the user for buying hardware system.
It should be noted that item sequence number can be SN sequence numbers (SerialNumber, SN code), the buying with user
Corresponding sequence number of information etc., a user can correspond to multiple item sequences number, but an item sequence number can only correspond to one
A user;And predetermined encryption algorithm can be any particular algorithms that hash algorithm etc. is chosen according to actual needs, utilize predetermined encryption
Algorithm is encrypted unique number to obtain ciphering sequence number, wherein " ciphering sequence number " is black box, can only pass through Encryption Algorithm
Generation, therefore this mode further improves the detection accuracy of hardware system.
Furthermore it is possible to the fixed memory block storage ciphering sequence number of setting one inside every sub- equipment, can be referred to as
Memory block is encrypted, encryption memory block power down is kept, and size covers the maximum length of ciphering sequence number, so as to real in this way
The encryption of existing sub- equipment.
A kind of track of hardware method provided in an embodiment of the present invention, can also include:
It is needed replacing if the main website of the hardware system after dispatching from the factory and coming into operation breaks down, new main website is dispatching from the factory
It is preceding to obtain ciphering sequence number corresponding with hardware system and store.
If the main website of hardware system needs replacing, need to be that this is new under extraneous trigger before new main website manufacture
Main website is encrypted, i.e., main website obtains ciphering sequence number and stores, further to avoid the generation of falsifying behavior.Encrypt it twice
Between time interval may be more remote, it is therefore desirable to producer carries out strict control to previous data.
A kind of track of hardware method provided in an embodiment of the present invention, can also include:
It needs repairing if the main website of hardware system breaks down, whether main station judging itself is stored with ciphering sequence
Number, if it is, determining that itself is encrypted, if it is not, then obtaining ciphering sequence number corresponding with hardware system and storing.
It needs repairing if main website breaks down, main website can first judge whether the memory block (Flash) of itself has more
Change and wipe, if it is not, illustrate that main website is also stored with corresponding ciphering sequence number, only need to repair main website at this time and
Otherwise return then illustrates that main website is not stored with corresponding ciphering sequence number, needs to repair main website at this time and return
It is encrypted before returning for it, so as to further ensure effective realization of track of hardware.
A kind of track of hardware method provided in an embodiment of the present invention, can also include:
It needs replacing or repairs if the slave station of hardware system breaks down, new slave station or the slave station repaired
Judge whether itself is stored with ciphering sequence number, if it is, determining that itself is encrypted, if it is not, then obtaining adding for main website
Close sequence number simultaneously stores.
It needs replacing or repairs if slave station breaks down, new slave station can be bought by user or by user couple
Slave station repairs and then obtains the slave station repaired, and corresponding user adds in firmly by new slave station or the slave station repaired
After in part system, new slave station or the slave station repaired realize self-encryption in the manner described above, so as to further ensure
The encrypted integrality of hardware system.
In above-mentioned technical proposal provided in an embodiment of the present invention with to correspond to technical solution realization principle in the prior art consistent
Part and unspecified, in order to avoid excessively repeat.
The foregoing description of the disclosed embodiments enables those skilled in the art to realize or use the present invention.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited
The embodiments shown herein is formed on, and is to fit to consistent with the principles and novel features disclosed herein most wide
Range.
Claims (8)
- A kind of 1. track of hardware method, which is characterized in that including:Before hardware system manufacture, the hardware system obtains ciphering sequence number, and the ciphering sequence number is stored to itself Comprising every sub- equipment in, wherein the ciphering sequence number is corresponding with the user of the purchase hardware system;After the hardware system dispatches from the factory and comes into operation, stored in the self-contained every sub- equipment of hardware system detection Ciphering sequence number it is whether consistent, if so, the hardware system normal operation, otherwise the hardware system is alarmed in sub- equipment There are illegal modules.
- 2. according to the method described in claim 1, it is characterized in that, the sub- equipment of the hardware system includes host computer, main website And slave station, the hardware system obtain ciphering sequence number and store the ciphering sequence number into the host computer, including:The host computer obtains ciphering sequence number and stores;The hardware system stores the ciphering sequence number into self-contained main website and slave station and the hardware system is examined Whether the ciphering sequence number for surveying self-contained every sub- equipment storage is consistent, includes:The main website obtains the ciphering sequence number of the host computer storage, and judges whether the ciphering sequence number itself stored is just Initial value if it is initial value, stores the ciphering sequence number of acquisition and returns to the host computer and encrypt successful information, if It is not initial value, then judges whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returned Back to the information of the host computer successful match, if it is inconsistent, returning to the host computer matches unsuccessful information;Institute State host computer receive match unsuccessful information when, determine the main website be illegal module;If the ciphering sequence number that the main station judging goes out acquisition is consistent with the ciphering sequence number that itself is stored, itself is stored Ciphering sequence number be sent to the slave station, the slave station judges whether the ciphering sequence number of itself storage is initial value, if For initial value, then store the ciphering sequence number of acquisition and return to the main website and encrypt successful information, if being not initial value, Then judge whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returning to the master The information for successful match of standing, if it is inconsistent, returning to the main website matches unsuccessful information;The main website receives During with unsuccessful information, it is illegal module to determine the slave station.
- 3. according to the method described in claim 2, there are illegal moulds in sub- equipment it is characterized in that, the hardware system is alarmed Block, including:The host computer or the main website export the illegal module itself determined and are capable of normal operation preset time period Prompt message, and control preset time period described in the illegal module normal operation.
- 4. according to the method described in claim 2, it is characterized in that, the host computer or the main website receive successful match After information, further include:The information of successful match that the host computer or main website output receive, obtains for user.
- 5. according to the method described in claim 2, it is characterized in that, the host computer obtains ciphering sequence number and stores, including:The host computer obtains ciphering sequence number and simultaneously stores, the ciphering sequence number be using preset algorithm to item sequence number into Row encryption obtains, and the item sequence number is corresponding with the user for buying the hardware system.
- 6. it according to the method described in claim 2, it is characterized in that, further includes:It is needed replacing if the main website of the hardware system after dispatching from the factory and coming into operation breaks down, new main website is obtained before manufacture It takes ciphering sequence number corresponding with the hardware system and stores.
- 7. it according to the method described in claim 2, it is characterized in that, further includes:It needs repairing if the main website of the hardware system breaks down, whether the main station judging itself is stored with encryption sequence Row number, if it is, determining that itself is encrypted, if it is not, then obtaining ciphering sequence number corresponding with the hardware system simultaneously Storage.
- 8. it according to the method described in claim 2, it is characterized in that, further includes:It needs replacing or repairs if the slave station of the hardware system breaks down, new slave station or the slave station repaired Judge whether itself is stored with ciphering sequence number, if it is, determining that itself is encrypted, if it is not, then obtaining the main website Ciphering sequence number and storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711465526.7A CN108171523B (en) | 2017-12-28 | 2017-12-28 | Hardware tracking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711465526.7A CN108171523B (en) | 2017-12-28 | 2017-12-28 | Hardware tracking method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108171523A true CN108171523A (en) | 2018-06-15 |
CN108171523B CN108171523B (en) | 2021-03-23 |
Family
ID=62519358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711465526.7A Active CN108171523B (en) | 2017-12-28 | 2017-12-28 | Hardware tracking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108171523B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110490338A (en) * | 2019-08-19 | 2019-11-22 | 蘑菇物联技术(深圳)有限公司 | A kind of electromechanical equipment genuine part method of calibration based on cloud computing |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1412728A (en) * | 2001-10-11 | 2003-04-23 | 黄涛 | Electronic digital code antifalse technique of electromechanical products and its application system |
CN101009555A (en) * | 2006-12-29 | 2007-08-01 | 北京飞天诚信科技有限公司 | An intelligent secret key device and the method for information interaction with the host |
CN101399670A (en) * | 2007-09-28 | 2009-04-01 | 东芝解决方案株式会社 | Encryption module distribution system and device |
CN102289630A (en) * | 2011-07-29 | 2011-12-21 | 天津同阳科技发展有限公司 | Copyright protection method for continuous emission monitoring system (CEMS) |
CN103136454A (en) * | 2011-11-25 | 2013-06-05 | 北京泛华恒兴科技有限公司 | Encryption device and encryption method |
US20130301829A1 (en) * | 2012-05-10 | 2013-11-14 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Electronic key registration system |
US20150263856A1 (en) * | 2014-03-11 | 2015-09-17 | GM Global Technology Operations LLC | Password encryption for controlling access to electronic control units |
CN105321084A (en) * | 2014-06-11 | 2016-02-10 | 珠海格力电器股份有限公司 | Anti-transregional-sales operation control method for household appliance and household appliance system |
CN106341223A (en) * | 2016-08-15 | 2017-01-18 | 索尔思光电(成都)有限公司 | Hardware encryption method and hardware anti-counterfeiting identification method and device |
CN107368760A (en) * | 2017-08-03 | 2017-11-21 | 北京奇安信科技有限公司 | A kind of electronic equipment condition processing method and device |
-
2017
- 2017-12-28 CN CN201711465526.7A patent/CN108171523B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1412728A (en) * | 2001-10-11 | 2003-04-23 | 黄涛 | Electronic digital code antifalse technique of electromechanical products and its application system |
CN101009555A (en) * | 2006-12-29 | 2007-08-01 | 北京飞天诚信科技有限公司 | An intelligent secret key device and the method for information interaction with the host |
CN101399670A (en) * | 2007-09-28 | 2009-04-01 | 东芝解决方案株式会社 | Encryption module distribution system and device |
CN102289630A (en) * | 2011-07-29 | 2011-12-21 | 天津同阳科技发展有限公司 | Copyright protection method for continuous emission monitoring system (CEMS) |
CN103136454A (en) * | 2011-11-25 | 2013-06-05 | 北京泛华恒兴科技有限公司 | Encryption device and encryption method |
US20130301829A1 (en) * | 2012-05-10 | 2013-11-14 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Electronic key registration system |
US20150263856A1 (en) * | 2014-03-11 | 2015-09-17 | GM Global Technology Operations LLC | Password encryption for controlling access to electronic control units |
CN105321084A (en) * | 2014-06-11 | 2016-02-10 | 珠海格力电器股份有限公司 | Anti-transregional-sales operation control method for household appliance and household appliance system |
CN106341223A (en) * | 2016-08-15 | 2017-01-18 | 索尔思光电(成都)有限公司 | Hardware encryption method and hardware anti-counterfeiting identification method and device |
CN107368760A (en) * | 2017-08-03 | 2017-11-21 | 北京奇安信科技有限公司 | A kind of electronic equipment condition processing method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110490338A (en) * | 2019-08-19 | 2019-11-22 | 蘑菇物联技术(深圳)有限公司 | A kind of electromechanical equipment genuine part method of calibration based on cloud computing |
Also Published As
Publication number | Publication date |
---|---|
CN108171523B (en) | 2021-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111062730B (en) | Pork information management method and system based on Internet of things and blockchain | |
CN104599091B (en) | A kind of automation cigarette retailing system and retail method | |
CN108182479A (en) | Equipment point-detecting method, device and server | |
CN105956865A (en) | Electronic warranty card generating method, server, query method and device | |
CN104809616A (en) | Method and system for preventing selling beyond agreed areas | |
CN108268980A (en) | The method and system of repair shop's intelligent predicting accessory demand | |
CN112699987B (en) | Method and system for monitoring work task by using lock | |
CN106327206A (en) | Genuine product certification means and system | |
CN107302586A (en) | A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing | |
CN104951952A (en) | Certified product Internet of things cloud management authentication system for brand products | |
CN107135229A (en) | Intelligent home information safe verification method, device, equipment and system | |
CN107368760A (en) | A kind of electronic equipment condition processing method and device | |
CN110569993A (en) | Intelligent maintenance and maintenance system based on big data | |
CN108171523A (en) | A kind of track of hardware method | |
CN113708940B (en) | Container lock data processing method, related equipment and storage medium | |
CN115345444A (en) | Information tracing method and device based on carrier | |
CN109583646B (en) | Full life cycle cooperative system of product based on SDM | |
CN108269059A (en) | A kind of data management system | |
CN102928059B (en) | Method and system for performing anti-cheating supervision and detection on electronic price computing scales through handheld examination equipment | |
CN106504007A (en) | A kind of commodity counterfeit prevention management system based on NFC electronic tags | |
CN109635773A (en) | Intellectual property data analysis module, right-safeguarding management system and management method | |
CN109087006B (en) | Method and device for processing power equipment monitoring information | |
CN107944950A (en) | The method and apparatus of order data processing, computer equipment, readable storage medium storing program for executing | |
CN108121662A (en) | The collocation method and its device of test equipment | |
WO2021124878A1 (en) | Information processing method, information processing device, information processing program, and history reference program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |