CN102880838A - Method and device for detecting electronic equipment - Google Patents
Method and device for detecting electronic equipment Download PDFInfo
- Publication number
- CN102880838A CN102880838A CN2012103235724A CN201210323572A CN102880838A CN 102880838 A CN102880838 A CN 102880838A CN 2012103235724 A CN2012103235724 A CN 2012103235724A CN 201210323572 A CN201210323572 A CN 201210323572A CN 102880838 A CN102880838 A CN 102880838A
- Authority
- CN
- China
- Prior art keywords
- target electronic
- electronic device
- program code
- electronic equipment
- test value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a method for detecting electronic equipment. The method comprises the following steps: receiving a procedure code check value sent by a target electronic equipment; comparing the procedure code check value with record information pre-stored in a database; and affirming validity of the target electronic equipment according to a comparison result. The invention also discloses a device for detecting the electronic equipment. The method provided by the invention, which comprises the following steps that receiving the procedure code check value sent by the target electronic equipment, comparing the procedure code check value with the record information pre-stored in the database and affirming the validity of the target electronic equipment according to the comparison result, has a beneficial effect of simply and rapidly affirming the validity of the electronic equipment and improves the security of the electronic equipment.
Description
Technical field
The present invention relates to electronic equipment detection technique field, relate in particular to a kind of detection method and device of electronic equipment.
Background technology
At present, embedded system is widely used in the various electronic equipments.Embedded system in the embedded system of portions of electronics equipment, particularly instrument and meter series products owing to possess legal function of measuring, need to prevent that the program code in the internal controller from illegally being distorted.In the prior art, the legitimacy of electronic equipment detected not yet propose comparatively simple and easy, convenient, general detection method.
Summary of the invention
Fundamental purpose of the present invention provides a kind of detection method and device of electronic equipment, is intended to realize the detection to the electronic equipment legitimacy.
The invention discloses a kind of detection method of electronic equipment, may further comprise the steps:
The program code proof test value that the receiving target electronic equipment sends;
The record information that prestores in described program code proof test value and the database is compared, according to comparison result, confirm the legitimacy of described target electronic device.
Preferably, also comprise step before the step of the program code proof test value of described receiving target electronic equipment transmission:
Send check command to described target electronic device by communication interface.
Preferably, described by also comprising step before the step of communication interface transmission check command to described target electronic device:
The described program code proof test value of target electronic device is put on record in database.
Preferably, described according to comparison result, confirm that the step of the legitimacy of described target electronic device comprises:
If comparison result is consistent, confirm that then described target electronic device is legal;
If comparison result is inconsistent, confirm that then described target electronic device is illegal.
Preferably, described record information comprises described program code proof test value and/or described target electronic device identity code ID number, perhaps other characteristic informations of described target electronic device.
The present invention also discloses a kind of pick-up unit of electronic equipment, comprising:
Information receiving module is used for the program code proof test value that the receiving target electronic equipment sends;
The legitimacy correction verification module is used for the record information that described program code proof test value and database prestore is compared, and according to comparison result, confirms the legitimacy of described target electronic device.
Preferably, the pick-up unit of described electronic equipment also comprises:
The order sending module is used for sending check command to described target electronic device by communication interface.
Preferably, the pick-up unit of described electronic equipment also comprises:
The information module of putting on record is used for the described program code proof test value of target electronic device is put on record to database.
Preferably, described legitimacy correction verification module specifically is used for:
If comparison result is consistent, confirm that then described target electronic device is legal;
If comparison result is inconsistent, confirm that then described target electronic device is illegal.
Preferably, described record information comprises described program code proof test value and/or described target electronic device ID number, perhaps other characteristic informations of described target electronic device.
The program code proof test value that the present invention sends by the receiving target electronic equipment, the record information that prestores in described program code proof test value and the database is compared, according to comparison result, confirm the method for the legitimacy of described target electronic device, have the beneficial effect of confirming quickly and easily electronic equipment legitimacy and uniqueness, improved the security of electronic equipment.
Description of drawings
Fig. 1 is the detection method one example structure figure of electronic equipment of the present invention;
Fig. 2 is target electronic device one example structure figure of the present invention;
Fig. 3 is checkout equipment one example structure figure of the present invention;
Fig. 4 is the detection method first embodiment schematic flow sheet of electronic equipment of the present invention;
Fig. 5 is the detection method second embodiment schematic flow sheet of electronic equipment of the present invention;
Fig. 6 is detection method the 3rd embodiment schematic flow sheet of electronic equipment of the present invention;
Fig. 7 is the pick-up unit first example structure synoptic diagram of electronic equipment of the present invention;
Fig. 8 is the pick-up unit second example structure synoptic diagram of electronic equipment of the present invention;
Fig. 9 is pick-up unit the 3rd example structure synoptic diagram of electronic equipment of the present invention.
The realization of the object of the invention, functional characteristics and advantage are described further with reference to accompanying drawing in connection with embodiment.
Embodiment
Further specify technical scheme of the present invention below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
With reference to Fig. 1, Fig. 1 is the detection method one example structure figure of electronic equipment of the present invention; As shown in Figure 1, the detection method of electronic equipment of the present invention is that checkout equipment communicates by coded communication interface and target electronic device, and legitimacy and the uniqueness of target device detected.Particularly, in a preferred embodiment, the structural drawing of described target device please refer to Fig. 2, and Fig. 2 is target electronic device one example structure figure of the present invention; The structural drawing of described checkout equipment please refer to Fig. 3, and Fig. 3 is checkout equipment one example structure figure of the present invention; As shown in Figure 2, target electronic device comprises that controller, program code proof test value produce logic and coded communication logic, program code and other functional modules; As shown in Figure 3, checkout equipment comprises the coded communication logic that communicates with target electronic device, program code proof test value filing database, man-machine interface and the communication interface etc. of target electronic device.In a preferred embodiment, the man-machine interface of described pick-up unit comprises operation keyboard and display screen; Especially, if described display screen has touch control function, then do not need independent operation keyboard.
Based on the concise and to the point description of above-mentioned detection device and target electronic device composition, with reference to Fig. 4, Fig. 4 is the detection method first embodiment schematic flow sheet of electronic equipment of the present invention; As shown in Figure 4, the detection method of electronic equipment of the present invention specifically may further comprise the steps:
The program code proof test value that step S01, receiving target electronic equipment send;
In a preferred embodiment, when target electronic device and pick-up unit set up communicate by letter after, target electronic device is come the legitimacy of verification self whereby namely to pick-up unit transmission program code proof test value; Perhaps, after pick-up unit transmission check command is to target electronic device, target electronic device is according to this check command, sends the program code proof test value of self program code, and this moment, pick-up unit received the program code proof test value that this target electronic device sends according to check command.The program code proof test value of target electronic device can be CRC(Cyclic Redundancy Check, CRC) value or other operational method carry out the proof test value that computing produces to program code, such as XOR etc.
Step S02, the record information that prestores in described program code proof test value and the database is compared, according to comparison result, confirm the legitimacy of described target electronic device.
Record information pre-stored in the program code proof test value that pick-up unit sends target electronic device and its data storehouse is compared, and according to comparison result, confirms the legitimacy of described target electronic device; Particularly, if comparison result is consistent, confirm that then described target electronic device is legal; If comparison result is inconsistent, confirm that then described target electronic device is illegal.In a preferred embodiment, described record information is except the program code proof test value that comprises described target electronic device, global unique ID(Identity that can also comprise this target electronic device, identity) number and other characteristic informations, such as unique electronic tag of sign target electronic device etc.In a preferred embodiment, pick-up unit by self display screen with comparison result shows out.
The program code proof test value that present embodiment sends by the receiving target electronic equipment, the record information that prestores in described program code proof test value and the database is compared, according to comparison result, confirm the method for the legitimacy of described target electronic device, have the beneficial effect of confirming quickly and easily electronic equipment legitimacy and uniqueness, improved the security of electronic equipment.
With reference to Fig. 5, Fig. 5 is the detection method second embodiment schematic flow sheet of electronic equipment of the present invention; The difference of present embodiment and the first embodiment is only to have increased step S03; Present embodiment only is described specifically step S03, and other related steps of the detection method of electronic equipment of the present invention please refer to the specific descriptions of related embodiment, do not repeat them here.
As shown in Figure 5, the detection method of electronic equipment of the present invention also comprised step before the step of the program code proof test value that step S01, receiving target electronic equipment send:
Step S03, send check command to described target electronic device by communication interface;
When detecting beginning, pick-up unit sends check command to target electronic device by communication interface; Described communication interface can be wired or wireless various interface, SPI(Serial Peripheral Interface for example, Serial Peripheral Interface (SPI)), USB(Universal Serial Bus, USB (universal serial bus)), UART(Universal Asynchronous Receiver Transmitter, asynchronous serial port), WIFI(Wireless Fidelity, WLAN (wireless local area network)), bluetooth or privately owned wireless communication protocol etc., as long as pick-up unit and target electronic device can realize information mutual communication.In a preferred embodiment, described communication interface can be an interface with the unification of coded communication interface, perhaps by man-machine interface input target electronic device information, then can save this database download communication interface.
In a preferred embodiment, described communication interface is the communication interface through encrypting, encryption method can be DES(Data Encryption Standard, data encryption standards), AES(Advanced Encryption Standard, Advanced Encryption Standard), RSA(Ron Rivest, Adi Shamir, Len Adleman, a kind of asymmetric cryptographic algorithm), ECC(Elliptic Curves Cryptography, elliptic curve cipher coding theory) public algorithm or the privately owned cryptographic algorithm such as, present embodiment does not impose any restrictions this.
The present embodiment pick-up unit sends check command to the method for target electronic device by communication interface, and having checkout equipment can according to actual needs, require target electronic device to carry out the beneficial effect of verification.
With reference to Fig. 6, Fig. 6 is detection method the 3rd embodiment schematic flow sheet of electronic equipment of the present invention; The difference of present embodiment and the second embodiment is only to have increased step S04; Present embodiment is only done specific descriptions to step S04, and other related steps of the detection method of electronic equipment of the present invention please refer to the specific descriptions of related embodiment, do not repeat them here.
As shown in Figure 6, the detection method of electronic equipment of the present invention sends check command and also comprises step before to the step of described target electronic device at step S03, by communication interface:
Step S04, the described program code proof test value of target electronic device is put on record in database.
Target electronic device need to provide to pick-up unit the program code proof test value of self when dispatching from the factory; The program code proof test value that checkout equipment provides target electronic device stores in its data storehouse, for follow-up legitimacy to this target electronic device and uniqueness verification ready.
The method of present embodiment by in advance the program code proof test value of target electronic device being put on record in database is the follow-up important prerequisite that the target electronic device legitimacy is confirmed of carrying out.
With reference to Fig. 7, Fig. 7 is the pick-up unit first example structure synoptic diagram of electronic equipment of the present invention; Based on the described embodiment of Fig. 3, as shown in Figure 7, the pick-up unit of electronic equipment of the present invention specifically comprises:
In a preferred embodiment, when target electronic device and pick-up unit set up communicate by letter after, target electronic device is come the legitimacy of verification self whereby namely to pick-up unit transmission program code proof test value; Perhaps, after pick-up unit transmission check command is to target electronic device, target electronic device is according to this check command, sends the program code proof test value of self program code, and this moment, information receiving module 01 received the program code proof test value that this target electronic device sends according to check command.The program code proof test value of target electronic device can also can carry out the proof test value that computing produces to program code for other operational method for the CRC check value, such as XOR etc.
Legitimacy correction verification module 02 is used for the record information that described program code proof test value and database prestore is compared, and according to comparison result, confirms the legitimacy of described target electronic device.
Record information pre-stored in the program code proof test value of the target electronic device that legitimacy correction verification module 02 receives information receiving module 01 and its data storehouse is compared, and according to comparison result, confirms the legitimacy of described target electronic device; Particularly, if comparison result is consistent, 02 of legitimacy correction verification module confirms that described target electronic device is legal; If comparison result is inconsistent, 02 of legitimacy correction verification module confirms that described target electronic device is illegal.In a preferred embodiment, described record information is except the program code proof test value that comprises described target electronic device, global unique ID number and other characteristic informations that can also comprise this target electronic device are such as unique electronic tag etc. of sign target electronic device.In a preferred embodiment, legitimacy correction verification module 02 by display screen with comparison result shows out.
The program code proof test value that present embodiment sends by the receiving target electronic equipment, the record information that prestores in described program code proof test value and the database is compared, according to comparison result, confirm the legitimacy of described target electronic device, have the beneficial effect of confirming quickly and easily electronic equipment legitimacy and uniqueness, improved the security of electronic equipment.
With reference to Fig. 8, Fig. 8 is the pick-up unit second example structure synoptic diagram of electronic equipment of the present invention; The difference of present embodiment and the first embodiment is only to have increased order sending module 03; Present embodiment only is described specifically order sending module 03, and other related modules of the pick-up unit of electronic equipment of the present invention please refer to the specific descriptions of related embodiment, do not repeat them here.
As shown in Figure 8, the pick-up unit of electronic equipment of the present invention also comprises:
When detecting beginning, the order sending module 03 of pick-up unit sends check command to target electronic device by communication interface; Described communication interface can be wired or wireless various interface, and such as SPI, USB, UART, WIFI, bluetooth or privately owned wireless communication protocol etc. is as long as pick-up unit and target electronic device can realize information mutual communication.In a preferred embodiment, described communication interface can be an interface with the unification of coded communication interface, perhaps by man-machine interface input target electronic device information, then can save this database download communication interface.
In a preferred embodiment, described communication interface is that encryption method can be public algorithm or the privately owned cryptographic algorithm such as DES, AES, RSA, ECC through the communication interface of encrypting, and present embodiment does not impose any restrictions this.
The present embodiment pick-up unit sends check command to target electronic device by communication interface, and having checkout equipment can according to actual needs, require target electronic device to carry out the beneficial effect of verification.
With reference to Fig. 9, Fig. 9 is pick-up unit the 3rd example structure synoptic diagram of electronic equipment of the present invention.The difference of present embodiment and the second embodiment is, the information that only the increased module 04 of putting on record; Present embodiment only is described specifically the information module 04 of putting on record, and other related modules of the pick-up unit of electronic equipment of the present invention please refer to the specific descriptions of related embodiment, do not repeat them here.
As shown in Figure 9, the pick-up unit of electronic equipment of the present invention also comprises:
The information module 04 of putting on record is used for the described program code proof test value of target electronic device is put on record to database.
Target electronic device need to provide to pick-up unit the program code proof test value of self when dispatching from the factory; The information of the checkout equipment program code proof test value that module 04 provides target electronic device of putting on record stores in its data storehouse, for follow-up legitimacy to this target electronic device ready.
Present embodiment is the follow-up important prerequisite that the target electronic device legitimacy is confirmed of carrying out by in advance the program code proof test value of target electronic device being put on record in database.
The above only is the preferred embodiments of the present invention; be not so limit its claim; every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to do; directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.
Claims (10)
1. the detection method of an electronic equipment is characterized in that, may further comprise the steps:
The program code proof test value that the receiving target electronic equipment sends;
The record information that prestores in described program code proof test value and the database is compared, according to comparison result, confirm the legitimacy of described target electronic device.
2. the method for claim 1 is characterized in that, also comprises step before the step of the program code proof test value that described receiving target electronic equipment sends:
Send check command to described target electronic device by communication interface.
3. method as claimed in claim 2 is characterized in that, and is described by also comprising step before the step of communication interface transmission check command to described target electronic device:
The described program code proof test value of described target electronic device is put on record in database.
4. such as each described method of claims 1 to 3, it is characterized in that, described according to comparison result, confirm that the step of the legitimacy of described target electronic device comprises:
If comparison result is consistent, confirm that then described target electronic device is legal;
If comparison result is inconsistent, confirm that then described target electronic device is illegal.
5. the method for claim 1 is characterized in that, described record information comprises described program code proof test value and/or described target electronic device identity code ID number, perhaps other characteristic informations of described target electronic device.
6. the pick-up unit of an electronic equipment is characterized in that, comprising:
Information receiving module is used for the program code proof test value that the receiving target electronic equipment sends;
The legitimacy correction verification module is used for the record information that described program code proof test value and database prestore is compared, and according to comparison result, confirms the legitimacy of described target electronic device.
7. pick-up unit as claimed in claim 6 is characterized in that, also comprises:
The order sending module is used for sending check command to described target electronic device by communication interface.
8. device as claimed in claim 7 is characterized in that, also comprises:
The information module of putting on record is used for the described program code proof test value of described target electronic device is put on record to database.
9. such as each described device of claim 6 to 8, it is characterized in that described legitimacy correction verification module specifically is used for:
If comparison result is consistent, confirm that then described target electronic device is legal;
If comparison result is inconsistent, confirm that then described target electronic device is illegal.
10. device as claimed in claim 6 is characterized in that, described record information comprises described program code proof test value and/or described target electronic device ID number, perhaps other characteristic informations of described target electronic device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103235724A CN102880838A (en) | 2012-09-04 | 2012-09-04 | Method and device for detecting electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103235724A CN102880838A (en) | 2012-09-04 | 2012-09-04 | Method and device for detecting electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102880838A true CN102880838A (en) | 2013-01-16 |
Family
ID=47482157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012103235724A Pending CN102880838A (en) | 2012-09-04 | 2012-09-04 | Method and device for detecting electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102880838A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103413087A (en) * | 2013-08-20 | 2013-11-27 | 杭州华三通信技术有限公司 | Optical module, equipment employing optical module and verification method |
CN104537299A (en) * | 2014-12-10 | 2015-04-22 | 深圳先进技术研究院 | Method and system for detecting electronic device, and related apparatuses |
CN104881597A (en) * | 2015-04-27 | 2015-09-02 | 深圳市海浦蒙特科技有限公司 | Frequency converter and user password encryption method thereof |
CN109150813A (en) * | 2017-06-27 | 2019-01-04 | 武汉海康存储技术有限公司 | A kind of verification method and device of equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1235743A (en) * | 1996-09-05 | 1999-11-17 | 艾利森公司 | System for preventing electronic memory tampering |
CN1926518A (en) * | 2004-03-01 | 2007-03-07 | 飞思卡尔半导体公司 | Autonomous memory checker for runtime security assurance and method therefore |
CN101673250A (en) * | 2009-09-18 | 2010-03-17 | 中兴通讯股份有限公司 | Method and device for protecting codes or data in mobile phone memory |
CN101841812A (en) * | 2009-03-18 | 2010-09-22 | 华为终端有限公司 | Terminal legality verifying method and device and communication system |
-
2012
- 2012-09-04 CN CN2012103235724A patent/CN102880838A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1235743A (en) * | 1996-09-05 | 1999-11-17 | 艾利森公司 | System for preventing electronic memory tampering |
CN1926518A (en) * | 2004-03-01 | 2007-03-07 | 飞思卡尔半导体公司 | Autonomous memory checker for runtime security assurance and method therefore |
CN101841812A (en) * | 2009-03-18 | 2010-09-22 | 华为终端有限公司 | Terminal legality verifying method and device and communication system |
CN101673250A (en) * | 2009-09-18 | 2010-03-17 | 中兴通讯股份有限公司 | Method and device for protecting codes or data in mobile phone memory |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103413087A (en) * | 2013-08-20 | 2013-11-27 | 杭州华三通信技术有限公司 | Optical module, equipment employing optical module and verification method |
CN104537299A (en) * | 2014-12-10 | 2015-04-22 | 深圳先进技术研究院 | Method and system for detecting electronic device, and related apparatuses |
CN104537299B (en) * | 2014-12-10 | 2017-10-24 | 深圳先进技术研究院 | A kind of electronic equipment detection method and its system, relevant device |
CN104881597A (en) * | 2015-04-27 | 2015-09-02 | 深圳市海浦蒙特科技有限公司 | Frequency converter and user password encryption method thereof |
CN104881597B (en) * | 2015-04-27 | 2018-09-25 | 深圳市海浦蒙特科技有限公司 | Frequency converter and its user password encryption method |
CN109150813A (en) * | 2017-06-27 | 2019-01-04 | 武汉海康存储技术有限公司 | A kind of verification method and device of equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9705679B2 (en) | Data authentication device and data authentication method | |
US9628278B2 (en) | Method for the secure unindirectional transmission of signals | |
US9118643B2 (en) | Authentication and data integrity protection of token | |
EP2961094A1 (en) | System and method for generating a random number | |
CN108173659B (en) | Certificate management method and system based on UKEY equipment and terminal equipment | |
US10404717B2 (en) | Method and device for the protection of data integrity through an embedded system having a main processor core and a security hardware module | |
MX2009007995A (en) | Method and apparatus for securing location information and access control using the location information. | |
US10547451B2 (en) | Method and device for authentication | |
CN104050431A (en) | Self-signing method and self-signing device for RFID chips | |
CN103701598A (en) | SM2 signature algorithm-based double-check signature method and digital signature equipment | |
CN113709115B (en) | Authentication method and device | |
US10389702B2 (en) | Entity authentication method and device with Elliptic Curve Diffie Hellman (ECDH) key exchange capability | |
CN102880838A (en) | Method and device for detecting electronic equipment | |
US20180035293A1 (en) | Authenticating a device utilizing a secure display | |
CN106161472A (en) | A kind of method of data encryption, Apparatus and system | |
GB2560047A (en) | Electronic device verification | |
CN107332833B (en) | Verification method and device | |
CN104252669A (en) | Signing validation method and device | |
EP2701101A1 (en) | Information processing device and information processing method | |
WO2022192725A8 (en) | Authenticated modification of blockchain-based data | |
CN105007162A (en) | Trusted electronic signature system and electronic signature method | |
KR20170080576A (en) | Authentication system and method | |
CN108243402B (en) | Method and device for reading and writing smart card | |
CN104424453A (en) | System and method for verifying non-contact inductive label | |
US11736301B2 (en) | Method, system, transmitter, and receiver for authenticating a transmitter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130116 |