CN103761490A - Parameter limiting terminal - Google Patents
Parameter limiting terminal Download PDFInfo
- Publication number
- CN103761490A CN103761490A CN201310728620.2A CN201310728620A CN103761490A CN 103761490 A CN103761490 A CN 103761490A CN 201310728620 A CN201310728620 A CN 201310728620A CN 103761490 A CN103761490 A CN 103761490A
- Authority
- CN
- China
- Prior art keywords
- parameter
- data
- terminal
- cpu
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Disclosed is a parameter limiting terminal. The parameter limiting terminal comprises an embedded central processing unit (CPU) and a parameter limiting processing device, and the CPU comprises an application device and a data storage device. The parameter limiting terminal is characterized in that the parameter limiting processing device comprises a device 1, a device 2 and a device 3 which are connected in sequence, the device 1 is used for updating a condition threshold of operation parameters, the device 2 is used for receiving application data, and the device 3 is used for analyzing and receiving specific data in the application data, and carrying out normal operation only when the operation parameters of the specific data conform to the condition threshold.
Description
Technical field
The present invention relates to computer technology, specifically a kind of parameter limit terminal.
Background technology
It is serious problems of puzzlement research and development of products enterprise that terminal device is illegally copied by other people, in order to prevent terminal device, illegally copied problem, be generally the encryption chip that increases CPU in terminal device at present, but this method need increase higher element expense and security and not high flexibly.
Summary of the invention
The object of the invention is to overcome the deficiency of prior art scheme, and propose a kind of parameter limit terminal.
The said terminal device operation parameter of this instructions comprises application content data or the workload data of time data or printing.
Parameter authentication terminal is preset when operation parameter reaches restrictive condition cisco unity malfunction, only in operation parameter, obtain the basis that the normal program of working of the rear described parameter authentication terminal ability of correction is the technical program, and the each terminal of its correction parameter is not identical.
For reaching the object of the invention, adopt following technical scheme: a kind of parameter limit terminal method, a kind of parameter limit terminal is provided, it is characterized in that:
Parameter authentication terminal is preset when operation parameter reaches condition thresholding cisco unity malfunction, only condition thresholding obtain correct after the program that could normally work of described parameter authentication terminal;
Parameter authentication terminal is constantly collected and is checked described operation parameter again, when the operation parameter of described particular data
During eligible thresholding, just carry out normal work;
Described parameter authentication terminal is accepted the modification of operation parameter, and the operation parameter of upgrading is authenticated.
The poly-explanation 1 of step: parameter authentication terminal is preset when operation parameter reaches condition thresholding cisco unity malfunction, only operation parameter obtain correct after the program that could normally work of described parameter authentication terminal; Normally relevant with the time parameter of operation parameter storing, or the password relevant with the time, or the parameter relevant with the application content data of printing or workload data.Described operation parameter is to receive print data or the machine clock data of printing communication interface, or the machine application content data or workload data; For example setting operation parameter is to make time data can not be greater than 2013()-05(the month)-17(day) during-10()-30(divides), when receiving time data in application content data and be greater than 2013-05-17-10-30 described in terminal device do not carry out printing or other application operating; For example set operation parameter and be the text strings that makes application content data can not have " all correctly completing ", when receiving the text strings that has " all correctly completing " in application content data described in terminal device do not carry out printing or other application operating; For example establish again operation parameter and be the workload counter data value that page prints and can not be greater than 10,000 pages, when the workload data counter value of printing when page is greater than 10,000 described in terminal device do not carry out printing or other application operating; These specific limit functions are realized by CPU application software.When the follow procedure method of making an appointment changes above-mentioned setting operation parameter into 2018()-05(the month)-17(day) during-10()-30(divides) after, this terminal can have been worked again the longer time.
The poly-explanation 2 of step: described parameter authentication terminal is constantly collected and checked described operation parameter again, i.e. cumulative sum note
The operation parameter that record occurs could normally be worked when the eligible thresholding of operation parameter of described particular data.
The poly-explanation 3 of step: the modification that described parameter authentication terminal is accepted operation parameter stores, so that legal terminal is obtaining after correct operation parameter is upgraded and can normally work down; But described parameter authentication terminal can be entered deciphering and authentication processing to the operation parameter of upgrading, and prevents from illegally upgrading operation parameter.
See Fig. 1, a kind of parameter limit terminal, comprises embedded type CPU, and described CPU comprises application apparatus and parameter limit treating apparatus, it is characterized in that described parameter limit treating apparatus also comprise again be in order connected as lower device:
For upgrading the device 1 of operation parameter condition thresholding;
For receiving the device 2 of application data;
For analyzing the particular data that receives described application data, when the operation parameter symbol of described particular data
While closing condition thresholding, just carry out the device 3 of normal work.
The machine application apparatus is the special function being realized by CPU software, for example printer function, cashing machine function, Presentation Function etc.Described application data is for example the content-data of printing or the content-data of demonstration etc.
Described application apparatus comprises printing equipment or display device or communication interface or key board unit.
Device 1 explanation: upgrade normally relevant with the time operation parameter of operation parameter condition thresholding, or the operation parameter relevant with the application content data of printing or workload data, and the operation parameter of encryption can be decrypted and authenticate.
Device 2 explanations: for example receive print data or the machine clock data of printing communication interface, or the machine application content data or workload data.
Device 3 explanations: for example setting operation parameter is to make time data can not be greater than 2013()-05(the month)-17(day) during-10()-30(divides), when receiving time data in application content data and be greater than 2013-05-17-10-30 described in terminal device do not carry out printing or other application operating; For example set operation parameter and be the text strings that makes application content data can not have " all correctly completing ", when receiving the text strings that has " all correctly completing " in application content data described in terminal device do not carry out printing or other application operating; For example establish again limiting parameter and be the workload counter data value that page prints and can not be greater than 10,000 pages, when the workload data counter value of printing when page is greater than 10,000 described in terminal device do not carry out printing or other application operating; These specific limit functions are realized by CPU application software.When the follow procedure method of making an appointment changes above-mentioned setting operation parameter into 2018()-05(the month)-17(day) during-10()-30(divides) after, this terminal can have been worked again the longer time.
See Fig. 1, a kind of parameter limit terminal, comprises embedded type CPU, and described CPU comprises the machine application apparatus and parameter limit treating apparatus, it is characterized in that described parameter limit treating apparatus also comprises again the functional module being connected in order:
For upgrading the functional module 1 of operation parameter condition thresholding;
For receiving the functional module 2 of application data;
For analyzing the particular data that receives described application data, when the operation parameter symbol of described particular data
While closing condition thresholding, just carry out the functional module 3 of normal work.
The functional module 1-3 explanation that the parameter limit treating apparatus of described a kind of parameter limit terminal comprises is identical with the device 1-3 explanation of above-mentioned parameter limiting terminal.
Above-mentioned parameter restriction treating apparatus is realized by described cpu system program, and software flow is shown in Fig. 2.
The present invention compared with prior art, has following advantage and effect: the illegal use problem that has solved imitated terminal with low cost.
accompanying drawing explanation:
Fig. 1 is the structural representation of parameter limit terminal;
Fig. 2 is the software flow pattern of the parameter limit treating apparatus of parameter limit terminal.
embodiment:
The invention will be further described below:
The technical program makes the operation parameter of every parameter limit terminal encryption different and relevant with the ID of described CPU, can not use the operation parameter with an encryption in multiple terminals.Because legal terminal device can normally be worked after the time restriction parameter that has comprised legal encryption, and although imitated terminal device has copied whole programs of legal terminal equipment, but illegal terminal equipment is not because there is no the time restriction parameter modification data of the encryption of legal coupling, reaching time restriction condition, can not normally use, so imitated terminal can not be used for a long time, thereby prevented that the continuation of imitated terminal device from being used; And legal parameters limiting terminal is due to can time update time restriction parameter, so can use for a long time.
For the operation parameter of the technical program, can be the relevant time parameter of the ID with CPU of encrypting, make it to be difficult for being cracked.
Described a kind of parameter limit terminal method, is characterized in that described limiting parameter is the parameter of encrypting, and relevant with the ID of CPU.
Described a kind of parameter limit terminal method, is characterized in that described limiting parameter is the time restriction parameter of encrypting, and relevant with the ID of CPU.
Described a kind of parameter limit terminal, is characterized in that described limiting parameter is the time restriction parameter of encrypting, and relevant with the ID of CPU.
Described a kind of parameter limit terminal, is characterized in that described limiting parameter keyboard modifies or add.
Described a kind of parameter limit terminal, is characterized in that described limiting parameter is upgraded by the communication interface data command receiving.
Described terminal device communication interface is serial ports (containing USB) or parallel port.
Claims (5)
1. a parameter limit terminal, comprises embedded type CPU, and described CPU comprises application apparatus and parameter limit treating apparatus, it is characterized in that described parameter limit treating apparatus also comprise again be in order connected as lower device:
For upgrading the device 1 of operation parameter condition thresholding;
For receiving the device 2 of application data;
For analyzing the particular data that receives described application data, when the operation parameter of described particular data meets
During condition thresholding, just carry out the device 3 of normal work.
2. a parameter limit terminal, comprises embedded type CPU, and described CPU comprises the machine application apparatus and parameter limit treating apparatus, it is characterized in that described parameter limit treating apparatus also comprises again the functional module being connected in order:
For upgrading the functional module 1 of operation parameter condition thresholding;
For receiving the functional module 2 of application data;
For analyzing the particular data that receives described application data, when the operation parameter of described particular data meets
During condition thresholding, just carry out the device 3 of normal work.
3. according to 1 or 2 described a kind of parameter limit terminals of claim, it is characterized in that described limiting parameter is the time restriction parameter of encrypting, and relevant with the ID of CPU.
4. according to a kind of parameter limit terminal described in claim 1 or 2, it is characterized in that described limiting parameter keyboard modifies or add.
5. according to a kind of parameter limit terminal described in claim 1 or 2, it is characterized in that described limiting parameter is upgraded by the communication interface data command receiving.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310728620.2A CN103761490A (en) | 2013-12-26 | 2013-12-26 | Parameter limiting terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310728620.2A CN103761490A (en) | 2013-12-26 | 2013-12-26 | Parameter limiting terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103761490A true CN103761490A (en) | 2014-04-30 |
Family
ID=50528726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310728620.2A Pending CN103761490A (en) | 2013-12-26 | 2013-12-26 | Parameter limiting terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103761490A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2211285A1 (en) * | 2009-01-20 | 2010-07-28 | Nagravision SA | Secured data processing device |
CN102651688A (en) * | 2011-02-28 | 2012-08-29 | 韩燕� | Telephone authentication terminal equipment |
CN103093159A (en) * | 2011-09-23 | 2013-05-08 | 杨建纲 | Safety verification method of mobile device |
-
2013
- 2013-12-26 CN CN201310728620.2A patent/CN103761490A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2211285A1 (en) * | 2009-01-20 | 2010-07-28 | Nagravision SA | Secured data processing device |
CN102651688A (en) * | 2011-02-28 | 2012-08-29 | 韩燕� | Telephone authentication terminal equipment |
CN103093159A (en) * | 2011-09-23 | 2013-05-08 | 杨建纲 | Safety verification method of mobile device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102009013384B4 (en) | System and method for providing a secure application fragmentation environment | |
CN102063591B (en) | Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform | |
CN100437618C (en) | Portable information safety device | |
CN101266638B (en) | Software protection method and system | |
US7840795B2 (en) | Method and apparatus for limiting access to sensitive data | |
DE112014006112T5 (en) | Applet migration in a secure element | |
CN101419557A (en) | Program downloading control method | |
CN101794362A (en) | Trusted computation trust root device for computer and computer | |
CN104951701B (en) | A kind of method of the terminal device booting operating system based on USB controller | |
DE102011056191A1 (en) | Device for protecting security tokens against malware | |
CN201820230U (en) | Computer and trusted-computing trusted root equipment for same | |
CN104486355A (en) | Method and device for preventing malicious manipulation of codes | |
DE102012101876A1 (en) | PC hedge by BIOS / (U) EFI extensions | |
CN104537282B (en) | It is a kind of that method is licensed based on encryption flash memory disk and big data computing | |
CN104135531B (en) | A kind of upgrade method and device of Web softwares | |
CN104239099A (en) | Mobile phone flushing control method | |
CN106790243A (en) | A kind of password remapping method of safe U disc | |
CN101447013A (en) | Method, device and system for running software | |
CN101594354A (en) | Improve the method and system of account transfer safety | |
CN104361280B (en) | A kind of method realizing carrying out authentic authentication to USB storage device by SMI interrupt | |
CN103745169A (en) | Parameter limited terminal method | |
CN105337731A (en) | Improvement of code equipment and data synchronizing method and system after improvement | |
CN102594815B (en) | Before register system, user right is set and performs method, the device of corresponding operating | |
CN103761490A (en) | Parameter limiting terminal | |
CN102855419A (en) | Copyright protection method for data files of intelligent terminals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140430 |