CN108171523A - A kind of track of hardware method - Google Patents

A kind of track of hardware method Download PDF

Info

Publication number
CN108171523A
CN108171523A CN201711465526.7A CN201711465526A CN108171523A CN 108171523 A CN108171523 A CN 108171523A CN 201711465526 A CN201711465526 A CN 201711465526A CN 108171523 A CN108171523 A CN 108171523A
Authority
CN
China
Prior art keywords
sequence number
hardware system
ciphering sequence
main website
host computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711465526.7A
Other languages
Chinese (zh)
Other versions
CN108171523B (en
Inventor
李宾
李蒙
周新辉
刘桐杰
康军凯
郑超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hollysys Automation Co Ltd
Original Assignee
Hangzhou Hollysys Automation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hollysys Automation Co Ltd filed Critical Hangzhou Hollysys Automation Co Ltd
Priority to CN201711465526.7A priority Critical patent/CN108171523B/en
Publication of CN108171523A publication Critical patent/CN108171523A/en
Application granted granted Critical
Publication of CN108171523B publication Critical patent/CN108171523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of track of hardware method, this method includes:Before hardware system manufacture, hardware system obtains ciphering sequence number, and ciphering sequence number is stored into self-contained every sub- equipment, and wherein ciphering sequence number is corresponding with the user for buying hardware system;After hardware system dispatches from the factory and comes into operation, whether the ciphering sequence number stored in the self-contained every sub- equipment of hardware system detection is consistent, if so, hardware system normal operation, otherwise there are illegal modules in the sub- equipment of hardware system alarm.After hardware device comes into operation, whether there is same ciphering sequence number by each sub- equipment for detecting hardware system, it is capable of determining that whether each sub- equipment of hardware system belongs to same user, if not, then think there are user after hardware system is bought, hardware system is split into sub- equipment and situation about selling, and realize alarm, otherwise, then it is assumed that user has carried out normal use and sale after buying hardware system to the hardware system.

Description

A kind of track of hardware method
Technical field
The present invention relates to hardware management technical field, more specifically to a kind of track of hardware method.
Background technology
Falsifying refers to allow without producer, and sale privately ships and resell on another market cargo to non-category product client, i.e., producer, which delivers, gives A visitors The product effective sale at family is to B client.The generation essence of falsifying phenomenon is that the sale in enterprise's selling network is driven by interests, is made The trans-regional sale of product sold to backspread, seriously compromises interests and the long term growth of enterprise;It is and more on the market The falsifying of appearance is bought for A client and product is splitted into part and by parts business to other clients after product, for this falsifying, There is an urgent need to a kind of effective hardware anti-channel conflict technical solutions for enterprise.
It is current this field skill in conclusion how to provide a kind of technical solution that can effectively realize hardware anti-channel conflict Art personnel's urgent problem to be solved.
Invention content
The object of the present invention is to provide a kind of track of hardware methods, can effectively prevent the generation of hardware falsifying behavior.
To achieve these goals, the present invention provides following technical solution:
A kind of track of hardware method, including:
Before hardware system manufacture, the hardware system obtains ciphering sequence number, and by the ciphering sequence number store to In self-contained every sub- equipment, wherein the ciphering sequence number is corresponding with the user for buying the hardware system;
After the hardware system dispatches from the factory and comes into operation, in the self-contained every sub- equipment of hardware system detection Whether the ciphering sequence number of storage is consistent, if so, the hardware system normal operation, otherwise hardware system alarm is set There are illegal modules in standby.
Preferably, the sub- equipment of the hardware system includes host computer, main website and slave station, and the hardware system obtains encryption Sequence number simultaneously stores the ciphering sequence number into the host computer, including:
The host computer obtains ciphering sequence number and stores;
The hardware system stores the ciphering sequence number into self-contained main website and slave station and the hardware system Whether the ciphering sequence number of the sub- equipment storage of self-contained every of system detection is consistent, includes:
The main website obtains the ciphering sequence number of the host computer storage, and whether judges the ciphering sequence number itself stored For initial value, if it is initial value, store the ciphering sequence number of acquisition and return to the host computer and encrypt successful information, If being not initial value, judge whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, The information of the host computer successful match is then returned to, if it is inconsistent, returning to the host computer matches unsuccessful letter Breath;When the host computer receives matching unsuccessful information, it is illegal module to determine the main website;
If the ciphering sequence number that the main station judging goes out acquisition is consistent with the ciphering sequence number that itself is stored, by itself The ciphering sequence number of storage is sent to the slave station, and the slave station judges whether the ciphering sequence number of itself storage is initial value, If it is initial value, store the ciphering sequence number of acquisition and return to the main website and encrypt successful information, if not being first Initial value then judges whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returning to institute The information of main website successful match is stated, if it is inconsistent, returning to the main website matches unsuccessful information;The main website receives To when matching unsuccessful information, it is illegal module to determine the slave station.
Preferably, the hardware system is alarmed in sub- equipment there are illegal module, including:
The host computer or the main website export the illegal module itself determined being capable of normal operation preset time The prompt message of section, and control preset time period described in the illegal module normal operation.
Preferably, it after the host computer or the main website receive the information of successful match, further includes:
The information of successful match that the host computer or main website output receive, obtains for user.
Preferably, the host computer obtains ciphering sequence number and stores, including:
The host computer obtains ciphering sequence number and stores, and the ciphering sequence number is to item sequence using preset algorithm It number is encrypted, the item sequence number is corresponding with the user for buying the hardware system.
Preferably, it further includes:
It is needed replacing if the main website of the hardware system after dispatching from the factory and coming into operation breaks down, new main website is dispatching from the factory It is preceding to obtain ciphering sequence number corresponding with the hardware system and store.
Preferably, it further includes:
It needs repairing if the main website of the hardware system breaks down, whether the main station judging itself, which is stored with, adds Close sequence number, if it is, determining that itself is encrypted, if it is not, then obtaining ciphering sequence corresponding with the hardware system Number and store.
Preferably, it further includes:
It needs replacing or repairs if the slave station of the hardware system breaks down, new slave station or repaired Slave station judges whether itself is stored with ciphering sequence number, if it is, determining that itself is encrypted, if it is not, then described in obtaining The ciphering sequence number of main website and storage.
The present invention provides a kind of track of hardware method, this method includes:Before hardware system manufacture, the hardware system Ciphering sequence number is obtained, and the ciphering sequence number is stored into self-contained every sub- equipment, wherein the encryption sequence Row number is corresponding with the user for buying the hardware system;After the hardware system dispatches from the factory and comes into operation, the hardware system Whether the ciphering sequence number stored in the self-contained every sub- equipment of system detection is consistent, if so, the hardware system is normal Operation, otherwise there are illegal modules in the sub- equipment of the hardware system alarm.In technical solution disclosed in the present application, in hardware system Hardware system before dispatching from the factory of uniting is self-contained each sub- equipment encryption, corresponding with buying the user of hardware system will be added Close sequence number is stored into each sub- equipment, as a result, after hardware device comes into operation, by each height for detecting hardware system Whether equipment has same ciphering sequence number, is capable of determining that whether each sub- equipment of hardware system belongs to same user, If it is not, then thinking after having purchased hardware system there are user, hardware system is split into sub- equipment and situation about selling, it is no Then, then it is assumed that user has carried out normal use and sale after buying hardware system to the hardware system, so as to pass through above-mentioned side Formula effectively identifies that product is splitted into part and the behavior sold, and then hardware is effectively prevent to alter by user with the presence or absence of after purchase product The generation of goods behavior.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of track of hardware method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of main website encryption and detection process in a kind of track of hardware method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of slave station encryption and detection process in a kind of track of hardware method provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, it illustrates a kind of flow chart of track of hardware method provided in an embodiment of the present invention, can wrap It includes:
S11:Before hardware system manufacture, hardware system obtains ciphering sequence number, and ciphering sequence number is stored to itself Comprising every sub- equipment in, wherein ciphering sequence number is corresponding with the user of purchase hardware system.
Wherein, hardware system can be DCS (Distributed Control System, distribution comprising I/O module Control system), DCS is a kind of novel computer control system for centralized control system, and basic thought is Decentralised control, centralized operation, differentiated control, configuration are flexibly and configuration is convenient, corresponding, and DP can be included in hardware system (high-speed field bus) master station (DP master stations are referred to as master station), DP slave stations (DP slave stations are referred to as slave station) and host computer, certainly also Other hardware systems can be chosen according to actual needs, within protection scope of the present invention;User is then purchase hardware system The user of system, a user can correspond to multiple ciphering sequence numbers in the application, but a ciphering sequence number can only correspond to one A user;Before hardware system manufacture, hardware system is self-contained each height using ciphering sequence number corresponding to the user Equipment is encrypted, will the ciphering sequence number store in the every sub- equipment included to hardware system, it is corresponding to the user with this Ciphering sequence number realizes the binding of user and hardware system;Therefore, the hardware used can be detected during later stage use Whether each sub- equipment has whether same ciphering sequence number namely each sub- equipment should belong to same user in system.
S12:After hardware system dispatches from the factory and comes into operation, stored in the self-contained every sub- equipment of hardware system detection Ciphering sequence number it is whether consistent, if so, the hardware system normal operation, otherwise the hardware system is alarmed in sub- equipment There are illegal modules.
After hardware system dispatches from the factory and comes into operation, hardware system can detect whether self-contained each sub- equipment deposits Identical ciphering sequence number is contained, since ciphering sequence number is corresponding with the user for buying hardware system, so if above-mentioned sentence Disconnected result is yes, then illustrates that each sub- equipment belongs to same user in the hardware system, otherwise, then illustrate that the hardware system is not belonging to Same user thinks the son that after hardware system is bought, the hardware system of purchase is split there are user in this case Device sales have given other users, and the sub- equipment of the different user of purchase is pieced together to have obtained new hardware system by other users, Determine that there are illegal modules in hardware system, described in background technology alter occur so as to recognise that there are users at this time Goods behavior.In case of the falsifying behavior in technology after all wherein in the application, then corresponding hardware system manufacture is preceding and goes out The sub- equipment included after is different.In addition the mode in the sub- equipment of hardware system alarm there are illegal module can be according to reality Border is set, such as can directly display or be sent to designated terminal by corresponding warning message, in the present invention Protection domain within so that user can know the presence of illegal module, and then take corresponding remedial measure etc..
In technical solution disclosed in the present application, hardware system is set for self-contained each height before hardware system manufacture Standby encryption, will ciphering sequence number corresponding with buying the user of hardware system store into each sub- equipment, as a result, in hardware After equipment investment use, whether there is same ciphering sequence number by each sub- equipment for detecting hardware system, can determine Whether each sub- equipment for going out hardware system belongs to same user, if it is not, then thinking that there are users to have purchased hardware system Afterwards, hardware system is split into sub- equipment and situation about selling, and realizes corresponding alarm, otherwise, then it is assumed that user's purchase is hard Normal use and sale are carried out to the hardware system after part system, so as to which effectively whether identification user deposits through the above way Product is splitted into part and the behavior sold after product is bought, and then effectively prevent the generation of hardware falsifying behavior.
In addition technical solution hardware system disclosed in the present application is detected whether automatically there are falsifying, do not need to special messenger for a long time with Track and acquisition sales information, so as to greatly reduce cost of labor;And the application is developed based on data encryption technology, Have the characteristics that with strong points, short implementation cycle, software requirement are simple, easy to operate, be the head that enterprise solves the problems, such as anti-channel conflict Choosing.
A kind of track of hardware method provided in an embodiment of the present invention, the sub- equipment of hardware system can include host computer, master It stands and slave station, hardware system obtains ciphering sequence number and store ciphering sequence number into host computer, can include:
Host computer obtains ciphering sequence number and stores;
Hardware system stores ciphering sequence number into self-contained main website and slave station and hardware system detects itself packet Whether the ciphering sequence number of every sub- equipment storage contained is consistent, the two steps may each comprise:
Main website obtains the ciphering sequence number of host computer storage, and judges whether the ciphering sequence number that itself is stored is initial Value if it is initial value, stores the ciphering sequence number of acquisition and returns to host computer and encrypt successful information, if not being first Initial value then judges whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returned to The information of position machine successful match, if it is inconsistent, returning to host computer matches unsuccessful information;Host computer receives matching During unsuccessful information, it is illegal module to determine main website;
If the ciphering sequence number that main station judging goes out acquisition is consistent with the ciphering sequence number that itself is stored, itself is stored Ciphering sequence number be sent to slave station, slave station judges whether the ciphering sequence number of itself storage is initial value, if it is initial value, It then stores the ciphering sequence number of acquisition and returns to main website and encrypt successful information, if being not initial value, judge what is obtained Whether ciphering sequence number and the ciphering sequence number itself stored are consistent, if unanimously, returning to the information of main website successful match, If it is inconsistent, returning to main website matches unsuccessful information;When main website receives matching unsuccessful information, slave station is determined For illegal module.
Wherein, the specific value of initial value can be set according to actual needs, and such as 0.Hardware system include host computer, , can be by manually by ciphering sequence number burning into software security dog when main website and slave station, and software security dog is inserted into PC Machine, the host computer in PC machine reads ciphering sequence number and stores, so as to quickly realize host computer in this way Encryption.It should be noted that the ciphering process of main website in hardware system and slave station and to each in hardware system in the application The detection process of sub- equipment can be identical namely be realized according to aforesaid way provided in this embodiment, it is achieved thereby that effectively adding Close and detection;In addition host computer obtain ciphering sequence number, main website and the encryption of slave station and the detection of each sub- equipment can be What hardware system was realized automatically after the power is turned on.
Specifically, the flow chart of main website encryption and detection process can be with as shown in Fig. 2, wherein, main website be if it is determined that certainly Body ciphering sequence number is initial value, then illustrates main website also unencryption, store the ciphering sequence number obtained by host computer at this time with reality Itself existing automatic encryption, if the ciphering sequence number of main website storage is not initial value and the ciphering sequence number with being obtained by host computer Unanimously, then it is legal module to illustrate that the main website belongs to the hardware system of same user's purchase namely the main website with host computer, if Main website storage ciphering sequence number not for initial value and the ciphering sequence number with being obtained by host computer it is inconsistent, then illustrate main website with It is illegal module that host computer, which is not belonging to the hardware system of same user's purchase namely the main website, so as to realize adding for main website automatically Close and detection.Host computer is configuration, monitoring and data storage in the effect of DCS system.
Slave station is encrypted and the flow chart of detection process can be with as shown in figure 3, wherein, slave station be if it is determined that self-encryption sequence Number for initial value, then illustrate slave station also unencryption, store the ciphering sequence number obtained by main website at this time and added automatically with realizing itself It is close, if the ciphering sequence number of slave station storage is not initial value and the ciphering sequence number with being obtained by main website is consistent, illustrate this It is legal module that slave station belongs to the hardware system of same user's purchase namely the slave station with main website, if the encryption of slave station storage Sequence number is not initial value and the ciphering sequence number with being obtained by main website is inconsistent, then illustrates that slave station is not belonging to same use with main website The hardware system namely the slave station of family purchase are illegal module, so as to realize the encryption and detection of slave station automatically.Need what is illustrated That the ciphering sequence number that itself is stored can be handed down to slave station by main website in DP initial phases, specifically, main website to from When station sets slave station parameter after being diagnosed, the arrange parameter data sent to slave station can include systematic parameter and user makes by oneself Adopted two parts of parameter, wherein User Defined parameter include ciphering sequence number, and the length of arrange parameter data is by systematic parameter, use The length number (2 bytes of acquiescence) of family custom parameter determines that total length is not more than 244 bytes;It is otherwise determined that slave station and main website deposit The communication between main website and slave station can be realized after the ciphering sequence number of storage is consistent.
A kind of track of hardware method provided in an embodiment of the present invention, the hardware system is alarmed in sub- equipment, and there are illegal moulds Block can include:
Host computer or main website export the prompt message that the illegal module itself determined is capable of normal operation preset time period, And control illegal module normal operation preset time period.
Wherein preset time period can be set according to actual needs, in order to avoid causing harmful effect to user, this It can allow illegal module normal operation preset time period in application after illegal module is determined, therefore illegal mould can be exported Block is capable of the prompt message of normal operation preset time period, user to be reminded to replace illegal module in time.Specifically, Ke Yishi Above-mentioned prompt message is shown by man-machine interface.It meanwhile then cannot be normal again after illegal module operation preset time period It works, specification user purchases genuine equipment by usual channel in this approach, protects the legitimate rights and interests of producer.
A kind of track of hardware method provided in an embodiment of the present invention, host computer or main website receive the information of successful match Afterwards, it further includes:
The information of successful match that host computer or main website output receive, obtains for user.
Facilitate user's knowing for testing result as a result, facilitate user for the safe to use of hardware system, it is specific next It says, can be that the information of successful match is shown by man-machine interface.
A kind of track of hardware method provided in an embodiment of the present invention, host computer obtain ciphering sequence number and store, including:
Host computer obtains ciphering sequence number and stores, and ciphering sequence number is adds item sequence number using preset algorithm Close to obtain, item sequence number is corresponding with the user for buying hardware system.
It should be noted that item sequence number can be SN sequence numbers (SerialNumber, SN code), the buying with user Corresponding sequence number of information etc., a user can correspond to multiple item sequences number, but an item sequence number can only correspond to one A user;And predetermined encryption algorithm can be any particular algorithms that hash algorithm etc. is chosen according to actual needs, utilize predetermined encryption Algorithm is encrypted unique number to obtain ciphering sequence number, wherein " ciphering sequence number " is black box, can only pass through Encryption Algorithm Generation, therefore this mode further improves the detection accuracy of hardware system.
Furthermore it is possible to the fixed memory block storage ciphering sequence number of setting one inside every sub- equipment, can be referred to as Memory block is encrypted, encryption memory block power down is kept, and size covers the maximum length of ciphering sequence number, so as to real in this way The encryption of existing sub- equipment.
A kind of track of hardware method provided in an embodiment of the present invention, can also include:
It is needed replacing if the main website of the hardware system after dispatching from the factory and coming into operation breaks down, new main website is dispatching from the factory It is preceding to obtain ciphering sequence number corresponding with hardware system and store.
If the main website of hardware system needs replacing, need to be that this is new under extraneous trigger before new main website manufacture Main website is encrypted, i.e., main website obtains ciphering sequence number and stores, further to avoid the generation of falsifying behavior.Encrypt it twice Between time interval may be more remote, it is therefore desirable to producer carries out strict control to previous data.
A kind of track of hardware method provided in an embodiment of the present invention, can also include:
It needs repairing if the main website of hardware system breaks down, whether main station judging itself is stored with ciphering sequence Number, if it is, determining that itself is encrypted, if it is not, then obtaining ciphering sequence number corresponding with hardware system and storing.
It needs repairing if main website breaks down, main website can first judge whether the memory block (Flash) of itself has more Change and wipe, if it is not, illustrate that main website is also stored with corresponding ciphering sequence number, only need to repair main website at this time and Otherwise return then illustrates that main website is not stored with corresponding ciphering sequence number, needs to repair main website at this time and return It is encrypted before returning for it, so as to further ensure effective realization of track of hardware.
A kind of track of hardware method provided in an embodiment of the present invention, can also include:
It needs replacing or repairs if the slave station of hardware system breaks down, new slave station or the slave station repaired Judge whether itself is stored with ciphering sequence number, if it is, determining that itself is encrypted, if it is not, then obtaining adding for main website Close sequence number simultaneously stores.
It needs replacing or repairs if slave station breaks down, new slave station can be bought by user or by user couple Slave station repairs and then obtains the slave station repaired, and corresponding user adds in firmly by new slave station or the slave station repaired After in part system, new slave station or the slave station repaired realize self-encryption in the manner described above, so as to further ensure The encrypted integrality of hardware system.
In above-mentioned technical proposal provided in an embodiment of the present invention with to correspond to technical solution realization principle in the prior art consistent Part and unspecified, in order to avoid excessively repeat.
The foregoing description of the disclosed embodiments enables those skilled in the art to realize or use the present invention.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited The embodiments shown herein is formed on, and is to fit to consistent with the principles and novel features disclosed herein most wide Range.

Claims (8)

  1. A kind of 1. track of hardware method, which is characterized in that including:
    Before hardware system manufacture, the hardware system obtains ciphering sequence number, and the ciphering sequence number is stored to itself Comprising every sub- equipment in, wherein the ciphering sequence number is corresponding with the user of the purchase hardware system;
    After the hardware system dispatches from the factory and comes into operation, stored in the self-contained every sub- equipment of hardware system detection Ciphering sequence number it is whether consistent, if so, the hardware system normal operation, otherwise the hardware system is alarmed in sub- equipment There are illegal modules.
  2. 2. according to the method described in claim 1, it is characterized in that, the sub- equipment of the hardware system includes host computer, main website And slave station, the hardware system obtain ciphering sequence number and store the ciphering sequence number into the host computer, including:
    The host computer obtains ciphering sequence number and stores;
    The hardware system stores the ciphering sequence number into self-contained main website and slave station and the hardware system is examined Whether the ciphering sequence number for surveying self-contained every sub- equipment storage is consistent, includes:
    The main website obtains the ciphering sequence number of the host computer storage, and judges whether the ciphering sequence number itself stored is just Initial value if it is initial value, stores the ciphering sequence number of acquisition and returns to the host computer and encrypt successful information, if It is not initial value, then judges whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returned Back to the information of the host computer successful match, if it is inconsistent, returning to the host computer matches unsuccessful information;Institute State host computer receive match unsuccessful information when, determine the main website be illegal module;
    If the ciphering sequence number that the main station judging goes out acquisition is consistent with the ciphering sequence number that itself is stored, itself is stored Ciphering sequence number be sent to the slave station, the slave station judges whether the ciphering sequence number of itself storage is initial value, if For initial value, then store the ciphering sequence number of acquisition and return to the main website and encrypt successful information, if being not initial value, Then judge whether the ciphering sequence number obtained and the ciphering sequence number itself stored are consistent, if unanimously, returning to the master The information for successful match of standing, if it is inconsistent, returning to the main website matches unsuccessful information;The main website receives During with unsuccessful information, it is illegal module to determine the slave station.
  3. 3. according to the method described in claim 2, there are illegal moulds in sub- equipment it is characterized in that, the hardware system is alarmed Block, including:
    The host computer or the main website export the illegal module itself determined and are capable of normal operation preset time period Prompt message, and control preset time period described in the illegal module normal operation.
  4. 4. according to the method described in claim 2, it is characterized in that, the host computer or the main website receive successful match After information, further include:
    The information of successful match that the host computer or main website output receive, obtains for user.
  5. 5. according to the method described in claim 2, it is characterized in that, the host computer obtains ciphering sequence number and stores, including:
    The host computer obtains ciphering sequence number and simultaneously stores, the ciphering sequence number be using preset algorithm to item sequence number into Row encryption obtains, and the item sequence number is corresponding with the user for buying the hardware system.
  6. 6. it according to the method described in claim 2, it is characterized in that, further includes:
    It is needed replacing if the main website of the hardware system after dispatching from the factory and coming into operation breaks down, new main website is obtained before manufacture It takes ciphering sequence number corresponding with the hardware system and stores.
  7. 7. it according to the method described in claim 2, it is characterized in that, further includes:
    It needs repairing if the main website of the hardware system breaks down, whether the main station judging itself is stored with encryption sequence Row number, if it is, determining that itself is encrypted, if it is not, then obtaining ciphering sequence number corresponding with the hardware system simultaneously Storage.
  8. 8. it according to the method described in claim 2, it is characterized in that, further includes:
    It needs replacing or repairs if the slave station of the hardware system breaks down, new slave station or the slave station repaired Judge whether itself is stored with ciphering sequence number, if it is, determining that itself is encrypted, if it is not, then obtaining the main website Ciphering sequence number and storage.
CN201711465526.7A 2017-12-28 2017-12-28 Hardware tracking method Active CN108171523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711465526.7A CN108171523B (en) 2017-12-28 2017-12-28 Hardware tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711465526.7A CN108171523B (en) 2017-12-28 2017-12-28 Hardware tracking method

Publications (2)

Publication Number Publication Date
CN108171523A true CN108171523A (en) 2018-06-15
CN108171523B CN108171523B (en) 2021-03-23

Family

ID=62519358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711465526.7A Active CN108171523B (en) 2017-12-28 2017-12-28 Hardware tracking method

Country Status (1)

Country Link
CN (1) CN108171523B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110490338A (en) * 2019-08-19 2019-11-22 蘑菇物联技术(深圳)有限公司 A kind of electromechanical equipment genuine part method of calibration based on cloud computing

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412728A (en) * 2001-10-11 2003-04-23 黄涛 Electronic digital code antifalse technique of electromechanical products and its application system
CN101009555A (en) * 2006-12-29 2007-08-01 北京飞天诚信科技有限公司 An intelligent secret key device and the method for information interaction with the host
CN101399670A (en) * 2007-09-28 2009-04-01 东芝解决方案株式会社 Encryption module distribution system and device
CN102289630A (en) * 2011-07-29 2011-12-21 天津同阳科技发展有限公司 Copyright protection method for continuous emission monitoring system (CEMS)
CN103136454A (en) * 2011-11-25 2013-06-05 北京泛华恒兴科技有限公司 Encryption device and encryption method
US20130301829A1 (en) * 2012-05-10 2013-11-14 Kabushiki Kaisha Tokai Rika Denki Seisakusho Electronic key registration system
US20150263856A1 (en) * 2014-03-11 2015-09-17 GM Global Technology Operations LLC Password encryption for controlling access to electronic control units
CN105321084A (en) * 2014-06-11 2016-02-10 珠海格力电器股份有限公司 Anti-transregional-sales operation control method for household appliance and household appliance system
CN106341223A (en) * 2016-08-15 2017-01-18 索尔思光电(成都)有限公司 Hardware encryption method and hardware anti-counterfeiting identification method and device
CN107368760A (en) * 2017-08-03 2017-11-21 北京奇安信科技有限公司 A kind of electronic equipment condition processing method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412728A (en) * 2001-10-11 2003-04-23 黄涛 Electronic digital code antifalse technique of electromechanical products and its application system
CN101009555A (en) * 2006-12-29 2007-08-01 北京飞天诚信科技有限公司 An intelligent secret key device and the method for information interaction with the host
CN101399670A (en) * 2007-09-28 2009-04-01 东芝解决方案株式会社 Encryption module distribution system and device
CN102289630A (en) * 2011-07-29 2011-12-21 天津同阳科技发展有限公司 Copyright protection method for continuous emission monitoring system (CEMS)
CN103136454A (en) * 2011-11-25 2013-06-05 北京泛华恒兴科技有限公司 Encryption device and encryption method
US20130301829A1 (en) * 2012-05-10 2013-11-14 Kabushiki Kaisha Tokai Rika Denki Seisakusho Electronic key registration system
US20150263856A1 (en) * 2014-03-11 2015-09-17 GM Global Technology Operations LLC Password encryption for controlling access to electronic control units
CN105321084A (en) * 2014-06-11 2016-02-10 珠海格力电器股份有限公司 Anti-transregional-sales operation control method for household appliance and household appliance system
CN106341223A (en) * 2016-08-15 2017-01-18 索尔思光电(成都)有限公司 Hardware encryption method and hardware anti-counterfeiting identification method and device
CN107368760A (en) * 2017-08-03 2017-11-21 北京奇安信科技有限公司 A kind of electronic equipment condition processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110490338A (en) * 2019-08-19 2019-11-22 蘑菇物联技术(深圳)有限公司 A kind of electromechanical equipment genuine part method of calibration based on cloud computing

Also Published As

Publication number Publication date
CN108171523B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
CN111062730B (en) Pork information management method and system based on Internet of things and blockchain
CN104599091B (en) A kind of automation cigarette retailing system and retail method
CN108182479A (en) Equipment point-detecting method, device and server
CN105956865A (en) Electronic warranty card generating method, server, query method and device
CN104809616A (en) Method and system for preventing selling beyond agreed areas
CN108268980A (en) The method and system of repair shop's intelligent predicting accessory demand
CN112699987B (en) Method and system for monitoring work task by using lock
CN106327206A (en) Genuine product certification means and system
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN104951952A (en) Certified product Internet of things cloud management authentication system for brand products
CN107135229A (en) Intelligent home information safe verification method, device, equipment and system
CN107368760A (en) A kind of electronic equipment condition processing method and device
CN110569993A (en) Intelligent maintenance and maintenance system based on big data
CN108171523A (en) A kind of track of hardware method
CN113708940B (en) Container lock data processing method, related equipment and storage medium
CN115345444A (en) Information tracing method and device based on carrier
CN109583646B (en) Full life cycle cooperative system of product based on SDM
CN108269059A (en) A kind of data management system
CN102928059B (en) Method and system for performing anti-cheating supervision and detection on electronic price computing scales through handheld examination equipment
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags
CN109635773A (en) Intellectual property data analysis module, right-safeguarding management system and management method
CN109087006B (en) Method and device for processing power equipment monitoring information
CN107944950A (en) The method and apparatus of order data processing, computer equipment, readable storage medium storing program for executing
CN108121662A (en) The collocation method and its device of test equipment
WO2021124878A1 (en) Information processing method, information processing device, information processing program, and history reference program

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant