CN105989289A - Electronic component conveyer device and electronic component inspection device - Google Patents
Electronic component conveyer device and electronic component inspection device Download PDFInfo
- Publication number
- CN105989289A CN105989289A CN201610156265.XA CN201610156265A CN105989289A CN 105989289 A CN105989289 A CN 105989289A CN 201610156265 A CN201610156265 A CN 201610156265A CN 105989289 A CN105989289 A CN 105989289A
- Authority
- CN
- China
- Prior art keywords
- electronic component
- program
- software
- handling apparatus
- component handling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/26—Testing of individual semiconductor devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Testing Of Individual Semiconductor Devices (AREA)
Abstract
The present invention provides an electronic component conveyer device and an electronic component inspection device which are capable of preventing unexpected changes of software caused by malware from the outside and preventing reduction of control speed. The electronic component conveyer device includes a storage portion (83) in which information of executable software is prestored, and a determination portion (84) comparing the information of the software stored in the storage portion (83) with information of software having an activation request. In addition, the determination portion (84) is configured not to perform execution of the software having the activation request when the information of the software stored in the storage portion (83) is different from the information of the software having the activation request.
Description
Technical field
The present invention relates to electronic component handling apparatus and electronic component inspection device.
Background technology
In the past, for example known electronic unit inspection having the electrical characteristics checking the electronic units such as IC device
Look into device, be provided with for IC device is delivered to inspection portion in this electronic component inspection device
The electronic component handling apparatus of maintaining part.When checking IC device, IC device is configured at holding
Portion, and make each termination contact of multiple probe and the IC device being arranged at maintaining part.
Such electronic component inspection device is operationally connected to the network.Accordingly, because from outward
The rogue programs such as the virus in portion (Malware), exist and increase unexpected change to software configuration
Risk.
In the electronic component inspection device described in patent document 1, in order to avoid above-mentioned risk,
Antivirus software is installed.This antivirus software is to including malware definition file (blacklist) institute
The known character string describing or the despiteful code of tool or the data of suspicious character string are entered
Row intercepts (expeling), and which is referred to as so-called " blacklist mode ".
Patent document 1: Japanese Unexamined Patent Publication 2010-140070 publication
But, in the case of using " blacklist mode " as patent document 1, at electronics
During component conveying apparatus work, for example, due to patch, (part for more new procedures is carried out
Correction, the data of function change) increase etc., there is control speed and reduce such problem.
Content of the invention
It is an object of the invention to provide a kind of be prevented from soft because of cause from outside rogue program
The unexpected change of part, and be prevented from control speed reduction electronic component handling apparatus and
Electronic component inspection device.
Such purpose is achieved by the following present invention.
[application examples 1]
The electronic component handling apparatus of the present invention is characterised by differentiating the program being able to carry out.
Thereby, it is possible to prevent because of the unexpected change of the software causing from outside rogue program.
In addition, compared with patent document 1 such " blacklist mode ", work as electronic component handling apparatus
During work, be prevented from such as patch (for the part of more new procedures be modified, function
The data of change) increase.Thereby, it is possible to prevent control speed from reducing.
[application examples 2]
The electronic component handling apparatus of the present invention, it is characterised in that have:
The storage part of the first prespecified program that is stored with, and
Carry out the comparing section of described first program and the comparison of the second program,
In described comparison, in the case that described second program is different from described first program, make
Described second program does not performs.
Thereby, it is possible to prevent because of the unexpected change of the software causing from outside rogue program.
In addition, compared with patent document 1 such " blacklist mode ", work as electronic component handling apparatus
During work, for instance, it is possible to prevent patch (for the part of more new procedures be modified, work(
The data that can change) increase.Therefore, it is possible to prevent control speed from reducing.
[application examples 3]
In the electronic component handling apparatus of the present invention, preferably in described comparison, described second
In the case that program is identical with described first program, perform described second program.
Thereby, it is possible to avoid because the unexpected of software causing from outside rogue program changes this
The risk of sample.
[application examples 4]
In the electronic component handling apparatus of the present invention, preferably described first program is to make this ministry of electronics industry
The software of part conveying device work.
Thus, the software enabling electronic component handling apparatus work is avoided because of from outside malice
The such risk of unexpected change of the software that program causes.
[application examples 5]
It in the electronic component handling apparatus of the present invention, is preferably stored with multiple institute at described storage part
State the first program.
Thereby, it is possible to avoid above-mentioned risk in multiple programs.
[application examples 6]
In the electronic component handling apparatus of the present invention, preferably the plurality of first program is contained in
White list.
Use " white list mode " by such such that it is able to avoid above-mentioned risk.
[application examples 7]
In the electronic component handling apparatus of the present invention, preferably want to start going through of described second program
History is stored in described storage part.
Thereby, it is possible to know the history wanting to start the second program.
[application examples 8]
In the electronic component handling apparatus of the present invention, preferably notice is wanted to start described second program
Situation.
Thereby, it is possible at once know the situation wanting to start the second program.
[application examples 9]
In the electronic component handling apparatus of the present invention, preferably have and start described second journey by wanting
The communication unit that the situation of sequence sends to outside.
Thus, for example, at main frame etc., can send out wanting the situation starting the second program to outside
Send.It is therefoie, for example, Host Administration electronic component handling apparatus can be used.
[application examples 10]
The electronic component inspection device of the present invention is characterised by having and check electronic unit
Inspection portion, described electronic component inspection device differentiates the program that is able to carry out.
Thereby, it is possible to prevent because of the unexpected change of the software causing from outside rogue program.
In addition, compared with patent document 1 such " blacklist mode ", work as electronic component inspection device
During work, be prevented from such as patch (for the part of more new procedures be modified, function
The data of change) increase.Therefore, it is possible to prevent control speed from reducing.
Brief description
Fig. 1 is the diagrammatic top of the first embodiment of the electronic component inspection device representing the present invention
Figure.
Fig. 2 is the block diagram of the electronic component inspection device shown in Fig. 1.
Fig. 3 is the comparing section institute of the control unit representing that the electronic component inspection device shown in Fig. 1 possesses
The figure of the control action carrying out.
Fig. 4 is the control of the control unit possessing for the electronic component inspection device shown in explanatory diagram 1
The flow chart of program.
Detailed description of the invention
Hereinafter, based on the preferred embodiment electronic unit conveying dress to the present invention shown in the drawings
Put and electronic component inspection device is described in detail.
< the first embodiment >
Fig. 1 is the diagrammatic top of the first embodiment of the electronic component inspection device representing the present invention
Figure.Fig. 2 is the block diagram of the electronic component inspection device shown in Fig. 1.Fig. 3 is to represent shown in Fig. 1
The figure of control action that carried out of the comparing section of control unit that possesses of electronic component inspection device.Figure
4 is the control program of the control unit possessing for the electronic component inspection device shown in explanatory diagram 1
Flow chart.
Below additionally, for convenience of description, as it is shown in figure 1,3 mutually orthogonal axles are set to X
Axle, Y-axis and Z axis.In addition, include that the X/Y plane of X-axis and Y-axis is level, Z axis
For vertical.In addition, the direction parallel with X-axis is also referred to as " X-direction ", will be parallel with Y-axis
Direction be also referred to as " Y-direction ", by the direction parallel with Z axis be also referred to as " Z-direction ".In addition,
The upstream side of the conveying direction of electronic unit is also only called " upstream side ", defeated by electronic unit
The downstream sending direction is also only called " downstream ".In addition, it is described in present specification
" level " is not limited to level completely, as long as not hindering the conveying of electronic unit, also includes
Relative to the level state that somewhat (e.g., less than about 5 °) tilt.
Inspection device (electronic component inspection device) 1 shown in Fig. 1 is e.g. used for checking, surveys
Examination (only claiming " inspection " below) BGA (Ball grid array: BGA) encapsulation, LGA
IC device, LCD (the Liquid Crystal such as (Land grid array: contact array) encapsulation
Display: liquid crystal display), CIS (CMOS Image Sensor:CMOS image sensing
Device) etc. the device of electrical characteristics of electronic unit.Additionally, it is following for purposes of illustration only, say typically
Bright use IC device is as the situation of the described electronic unit checking, and it is set to " IC
Device 90 ".
As it is shown in figure 1, check device 1 be divided into pallet supply area A1, device supply area (with
Under be only called " supply area ") A2, inspection area A3, device recovery zone (hereinafter referred merely to as
" recovery zone ") A4, pallet removing region A5.And, IC device 90 is from pallet drainage area
Territory A1 removes region A5 successively via described each region to pallet, and in the inspection area of midway
A3 checks.So, check that device 1 becomes to possess and carry IC device 90 in each region
Electronic component handling apparatus, the inspection portion 16 checking in the A3 of inspection area and control
The device in portion 80.In checking device 1, can will remove from pallet supply area A1 to pallet
Among the A5 of region, the supply area A2 from conveying IC device 90 is also referred to as to recovery zone A4
For " conveyor zones (delivery area) ".
Additionally, for checking device 1, be configured with pallet supply area A1, pallet removing district
One side (downside in Fig. 1) of territory A5, as face side, its opposition side, is i.e. configured with inspection
One side (upside in Fig. 1) of region A3 uses as rear side.
Pallet supply area A1 is supplied with being arranged with the torr of multiple IC devices 90 of the state of inspection
The confession material portion of dish (arrangement components) 200.In the A1 of pallet supply area, can stack multiple
Pallet 200.
Supply area A2 is multiple for configured on the pallet 200 of pallet supply area A1
IC device 90 is fed separately to the region of inspection area A3.Additionally, to stride across pallet drainage area
Territory A1 and the mode of supply area A2, be provided with the pallet carrying pallet 200 one by one
Conveying mechanism 11A, 11B.
It is provided with temperature adjustment portion (immersion plate) the 12nd, device delivery head at supply area A2 the 13rd,
Conveyor pallet structure (the first conveying device) 15.
Temperature adjustment portion 12 is the mounting portion being placed with multiple IC device 90, and can heat or
Person cools down the plurality of IC device 90.Thereby, it is possible to IC device 90 is adjusted to be suitable to inspection
Temperature.In the composition shown in Fig. 1, configure in the Y direction, be fixed with 2 temperature adjustment portions
12.And, by conveyor pallet structure 11A sent into from pallet supply area A1 (defeated
Send here) IC device 90 on pallet 200 is transported to the temperature adjustment portion 12 of any one
And loaded.
Device delivery head 13 can be supported by the A2 of supply area movably.Thus, device is defeated
Send 13 can undertake the pallet 200 sent into from pallet supply area A1 and temperature adjustment portion
The conveying of the IC device 90 between 12, temperature adjustment portion 12 and device supply unit 14 described later
Between the conveying of IC device 90.
Conveyor pallet structure 15 is the empty pallet of the state making to eliminate all of IC device 90
200 mechanisms carrying in X direction in the A2 of supply area.And, after this conveying, empty torr
Dish 200 is back to pallet supply area A1 by conveyor pallet structure 11B from supply area A2.
Inspection area A3 is the region checking IC device 90.In this inspection area, A3 is provided with
Device supply unit (supply reciprocating apparatus) the 14th, inspection portion the 16th, device delivery head the 17th, Yi Jiqi
Part recoverer (recovery reciprocating apparatus) 18.
Device supply unit 14 is the mounting portion of mounting temperature adjusted IC device 90, and can
It is transported to this IC device 90 near inspection portion 16.This device supply unit 14 is in supply area
Can be supported by movably along the X direction between A2 and inspection area A3.In addition, at Fig. 1
In shown composition, device supply unit 14 is configured with 2 in the Y direction, temperature adjustment portion 12
On IC device 90 be transported to the device supply unit 14 of any one and loaded.
Inspection portion 16 is the unit checking, testing the electrical characteristics of IC device 90.In inspection portion 16
Be provided with multiple probe, the plurality of probe keep IC device 90 in the state of with this IC device
The terminal electrical connection of 90.And, the terminal of IC device 90 electrically connects (contact) with probe, and
Carry out the inspection of IC device 90 via probe.Additionally, in inspection portion 16, adjust with temperature
Whole 12 similarly, can heat or cool down IC device 90 and adjust this IC device 90
Become the temperature being suitable to check.
Device delivery head 17 can be supported by the A3 of inspection area movably.Thus, device is defeated
Sending 17 can be by by the IC device 90 on the device supply unit 14 that supply area A2 sends into
It is delivered to inspection portion 16 and load.
Device recoverer 18 is the load of the IC device 90 of the inspection that mounting finishes in inspection portion 16
Put portion, and this IC device 90 can be transported to recovery zone A4.This device recoverer 18 exists
Can be supported by movably along the X direction between inspection area A3 and recovery zone A4.In addition,
In the composition shown in Fig. 1, device recoverer 18 in the same manner as device supply unit 14 in the Y direction
Being configured with 2, the IC device 90 in inspection portion 16 is transported to the device of any one and reclaims
Portion 18 is simultaneously loaded.This conveying is carried out by device delivery head 17.
Recovery zone A4 is the region reclaimed and check the multiple IC devices 90 finishing.In this time
Receive region A4 and be provided with recovery pallet the 19th, device delivery head 20 and conveyor pallet structure (the
Two conveying devices) 21.In addition, be ready for the pallet 200 having time at recovery zone A4.
Recovery pallet 19 is the mounting portion of mounting IC device 90, is fixed on recovery zone A4
In, it in the composition shown in Fig. 1, is configured with 3 along the X direction.In addition, the pallet of sky
200 is also the mounting portion of mounting IC device 90, is configured with 3 along the X direction.And, move
The IC device 90 having moved on the device recoverer 18 of recovery zone A4 is transported to these times
In the pallet 200 of receipts pallet 19 and sky any one and loaded.Thus, IC device
By each, 90 check that result is recovered, thus be classified.
Device delivery head 20 can be supported by the A4 of recovery zone movably.Thus, device is defeated
Sending 20, from device recoverer 18, IC device 90 can be delivered to recovery pallet the 19th, empty
Pallet 200.
Conveyor pallet structure 21 is to make to be existed by the pallet 200 removing the sky that region A5 sends into from pallet
The mechanism carrying in X direction in the A4 of recovery zone.And, after this conveying, empty pallet 200
The position of IC device 90 is being reclaimed in configuration, i.e. can be in described 3 empty pallets 200
Any one.So, in checking device 1, in recovery zone, A4 is provided with conveyor pallet
Structure 21, in addition, is provided with conveyor pallet structure 15 at supply area A2.Thus, for example
It with the pallet 200 being entered line space by 1 conveying mechanism towards compared with the conveying of X-direction, is capable of gulping down
The raising of the amount of telling (the conveying number of the IC device 90 of time per unit).
Additionally, as conveyor pallet structure the 15th, 21 composition, be not particularly limited, for example
Enumerate and there is the adsorption element of adsorbing tray 200 and by this adsorption element can move in X-direction
The composition of the supporting devices such as the ball screw supporting dynamicly.
It is to reclaim and remove the multiple IC devices being arranged with the state of having checked that pallet removes region A5
The pallet 200 of 90 remove material portion.Remove in the A5 of region at pallet and can stack multiple pallet 200.
In addition, in the way of striding across recovery zone A4 and pallet removing region A5, be provided with and will hold in the palm
Conveyor pallet structure 22A, 22B that dish 200 carries one by one.Conveyor pallet structure 22A is
The pallet 200 being placed with the IC device 90 having checked is delivered to pallet from recovery zone A4
Remove the mechanism of region A5.Conveyor pallet structure 22B is will to be used for reclaiming the sky of IC device 90
Pallet 200 remove region A5 from pallet and be delivered to the mechanism of recovery zone A4.
In above such inspection device 1, in addition to the 12nd, inspection portion 16 of temperature adjustment portion,
Device delivery head the 13rd, device supply unit the 14th, device delivery head 17 also be configured to heating or
Person cools down IC device 90.Thus, IC device 90 is during being carried, and temperature is maintained constant.
And, below, cool down for IC device 90, such as at the model of-60 DEG C~-40 DEG C
Situation about checking under the low temperature environment in enclosing illustrates.
As it is shown in figure 1, for checking device 1, pallet supply area A1 and supply area
Separated (by separating) by the first dividing plate 61 between A2, supply area A2 and inspection area A3 it
Between separated by second partition 62, by the 3rd dividing plate 63 between inspection area A3 and recovery zone A4
Separating, recovery zone A4 and pallet remove and are separated by the 4th dividing plate 64 between the A5 of region.In addition,
Also separated by the 5th dividing plate 65 between supply area A2 and recovery zone A4.These dividing plates have
Keep the bubble-tight function in each region.Further, for checking device 1, outermost layer is by cover
Cover, at this cover, for example there is front shroud the 70th, side cover 71 and the 72nd, back cover 73.
And, by the first dividing plate the 61st, second partition the 62nd, the 5th dividing plate the 65th, supply area A2 becomes
The first Room R1 that side cover 71 and back cover 73 define.Do not check multiple IC devices 90 of state
It is fed to the first Room R1 together with pallet 200.
Inspection area A3 becomes and is defined by second partition the 62nd, the 3rd dividing plate the 63rd, back cover 73
Second Room R2.In addition, be configured with inboard partition in the inner part than back cover 73 in the second Room R2
66。
Recovery zone A4 becomes by the 3rd dividing plate the 63rd, the 4th dividing plate the 64th, the 5th dividing plate the 65th, side cover
72 and the 3rd Room R3 that defines of back cover 73.Check the multiple IC devices 90 terminating from second
Room R2 is fed through the 3rd Room R3.
As it is shown in figure 1, be provided with first (first, left side) 711 and second at side cover 71
(second, left side) 712.By opening first the 711st, second 712, it is possible to carry out
The such as releasing of the such as obstruction of maintenance, IC device 90 in the first Room R1 etc. (it is following,
These are referred to as " operation " as general designation).Additionally, first 711 and second 712 towards phase
Mutual rightabout opening and closing, becomes so-called " double door splitting around ".In addition, when first
In the R1 of room during operation, the device delivery head 13 grade movable part in the R1 of this first Room stops.
Similarly, side cover 72 is provided with first (first, right side) 721 and second (right side
Side second) 722.By opening first the 721st, second 722, it is possible to carry out for example
Operation in the 3rd Room R3.Additionally, first 721 and second 722 for towards mutually on the contrary
So-called " clamshell doors " of direction opening and closing.In addition, when operation in the 3rd Room R3, the 3rd
Device delivery head 20 grade movable part in the R3 of room stops.
In addition, be also equipped with first (rear side first) the 731st, second (back of the body at back cover 73
Face side second) 732 and the 3rd (rear side the 3rd) 733.By opening first 731,
It is possible to carry out the operation for example in the first Room R1.By opening the 3rd 733, thus
The operation that can carry out for example in the 3rd Room R3.Further, inboard partition 66 is provided with the 4th
Door 75.And, by opening second 732 and the 4th 75, it is possible to carry out for example existing
Operation in second Room R2.Additionally, first the 731st, second 732 and the 4th 75 towards phase
Equidirectional opening and closing, and the 3rd 733 court and these rightabout opening and closings.In addition, when second
In the R2 of room during operation, the device delivery head 17 grade movable part in the R2 of this second Room stops.
And, by closing each door, it is possible to guarantee the air-tightness in corresponding each room, thermal insulation
Property.
As in figure 2 it is shown, control unit 80 has drive control part the 81st, checks that the 82nd, control unit stores
Portion 83 and judegment part (comparing section) 84.
Drive control part 81 controls conveyor pallet structure 11A, 11B, temperature adjustment portion the 12nd, device
Delivery head the 13rd, device supply unit the 14th, conveyor pallet structure the 15th, inspection portion the 16th, device delivery head
17th, device recoverer the 18th, device delivery head the 20th, conveyor pallet structure the 21st, conveyor pallet structure
The driving in each portion of 22A, 22B.
Check that control unit 82, based on the program being stored in storage part 83, carries out being configured at inspection portion 16
The inspection etc. of electrical characteristics of IC device 90.
Storage part 83 for example, by non-volatile memories such as volatile memory, ROM such as RAM
Device, EPROM, EEPROM, flash memory etc. rewritable (can eliminate, rewritable) non-volatile
Property memory etc., various semiconductor memory (IC memory) etc. constitute.
Here, as in figure 2 it is shown, control unit 80 can be via the LAN (Local as communication unit
Area Network: LAN) it 86 is in communication with each other with main frame the 85th, other inspection device etc..
But, owing to checking that device 1 is connected with LAN86, therefore there is the despiteful evils of tool such as virus
Meaning program (Malware) enters the Gu of control unit 80 from main frame the 85th, other inspection device etc.
Consider.In the case of Gai, use when each portion that control unit 80 makes inspection device 1 drives be multiple soft
The construction of part (following, referred to as " software A " " software B " " software C ") is increased unexpected
Change.
Additionally, in this manual, " program " refers to for example for making each portion of inspection device 1
The order of startup, order etc..In addition, in this manual, it by " program ", is used for processing " journey
The data of sequence " etc. are referred to as " software " as general name.
In order to avoid above-mentioned risk, in the past, take the virus of so-called " blacklist mode "
Check that software is arranged on the method for control unit 80.It is somebody's turn to do the virus checking software of " blacklist mode "
The code of the software A~software C of use when scanning makes each portion of inspection device 1 drive, to description
Carry out in known character string or the suspicious character string of malware definition file (blacklist)
Intercept (expeling).
But, in this " blacklist mode ", there is following such problem.
[1] due to patch (for the part of more new procedures be modified, function change
Data) increase, so control speed (cpu performance) reduces.
[2] because updating frequently of malware definition file makes the consumption of the network bandwidth increase.
[3] there is infection malice in the period before malware definition file is produced, issues
The misgivings of program.
[4] if terminating during the support of OS, then malware definition file becomes invalid.
In view of such problem, in checking device 1, have employed " white list mode ".Hereinafter,
Which is illustrated.
It as in figure 2 it is shown, checking in device 1, is stored with white list 100 at storage part 83.Should
White list 100 is the list of the information comprising software as described above A~software C.At these letters
Breath for example includes title, the version information of the code of each software A~software C and updates day
The information such as time phase.
In addition, in checking device 1, the information of software A~software C is stored in white list 100
When, the code of the state that rogue program is introduced into software A~software C is recorded.
Fig. 3 is to there is software A, software B, software during the power supply for example connected and checked device 1
The figure of the situation starting request of C and software D.The software to white list 100 for the judegment part 84
The information of A~software C compares with the information that there is the software A~software D starting request.
Additionally, in the present embodiment, it determines when the title of the relatively more each software in portion 84 and update date
Between.
As it is shown on figure 3, as result of the comparison, it is judged that for there is the software A that starts request~soft
The title of the software A~software C of the title of part C and time update date and white list 100
And if time update date is identical, then the execution of judegment part 84 approval software A~software C.
On the other hand, as it is shown on figure 3, information and white name owing to there is the software D starting request
The information of the software A~software C included in single 100 is inconsistent, so judegment part 84 is forbidden
Perform software D.
According to such " white list mode ", make white list 100, and in this white list 100
The information of the software being comprised compares with the information that there is the software starting request, based on its ratio
Even if relatively result performs software and is also capable of deciding whether safety.Therefore, it is possible to prevent due to virus etc.
Have despiteful rogue program to make to increase unexpected change to software A~software C.
In addition, according to " white list mode ", owing to not needing to make patch, therefore prevent " black
The increase of patch as list mode ".And, it is not necessary to sweep as " blacklist mode "
Retouch the code of software, by the such as title, version information and time update date of query software
Deng, even if thus perform software be also capable of deciding whether safety.Due to these, according to " white list
Mode ", the cpu performance being prevented from control unit 80 reduces.Therefore, it is possible to solve above-mentioned asking
Topic [1].
In addition, according to " white list mode ", can avoid and carrying out as " blacklist mode "
The frequent updating of malware definition file, and it is prevented from the consumption increase of the network bandwidth.Therefore,
Can solve the problem that the problems referred to above [2].
In addition, according to " white list mode ", can avoid as " blacklist mode ",
Malware definition file is made into, issue before time infect the risk of rogue program.Therefore,
Can solve the problem that the problems referred to above [3].
Further, according to " white list mode ", initially, owing to not needing the support of OS, so energy
Enough prevent as " blacklist mode ", because of the support of OS during terminate and cause Malware
Definition file becomes invalid.Therefore, it is possible to solve the problems referred to above [4].
So, it according to the present invention, by using " white list mode ", is prevented from by from outward
The unexpected change of the software that the rogue program in portion causes, and it is prevented from controlling the reduction of speed.
In addition, in checking device 1, there is the startup of the software D being not included in white list 100
Such history is asked to be stored in storage part 83.Thus, even if also can know when to deposit later
Crossing the startup request of software D.After it is therefoie, for example, whether can interpolate that safety officer
Software D is appended to white list 100.
In addition, in checking device 1, existence can be not included in the software D of white list 100
The startup such information of request be shown in display part (monitor) 87.Thereby, it is possible to inspection
There is the startup request of the software D being not included in white list 100 in the operator notification of device 1.Cause
This, for instance, it is possible to judge whether safety officer is appended to white list 100 by software D.
Further, as in figure 2 it is shown, in checking device 1, existence can be not included in white list
The history starting request of the software D of 100 sends to such as main frame 85 via LAN86.Thus,
Even if being arranged distant from checking the place in the place of device 1, it is also possible to know have software D's
Start request.It is therefoie, for example, can be with statistical based on the information from multiple stage inspection device
Judge whether safety officer is appended to white list 100 by software D.
Such white list mode, for example can be by by McAfee (McAfee) company system
" Application Control: application controls ", McAfee company system " Embedded Control:
Embedded Control ", Trend Micro (Trend Micro) company's system " Trend Micro Safe Lock:
Trend Micro's safety lock ", (share) rock international corporation (Rock International
Corporation) " Lumension application program controlling ", Humming Heads share are made
The softwares such as company's system " defence platform (DeP) " are arranged on inspection device 1 and realize.
Then, illustrate based on control program to control unit 80 of the flow chart of Fig. 4.
When making inspection device 1 start, there is startup request (step S101) of multiple software.
Then, judge whether the software that there is startup request is comprised in white list in step S101
100 (steps S102).
In step s 102, it is judged as that the software that there is startup request is comprised in step S101
In the case of white list 100, perform there is the software (step S103) starting request, and start
Check.
Additionally, in step s 102, it is judged as having in the software starting request in step S101
In the case that existence is not included in the software of white list 100, forbid being not included in white list 100
The execution of software.And, notice there are the startup request of the software being not included in white list 100
(step S104).In this step S104, send this information to main frame 85, and by this letter
Breath is shown in display part 87.
So, it in checking device 1, is configured to discriminate whether it is to be able to carry out when the program of execution
Program.Thereby, it is possible to prevent the unexpected change of the software causing from outside rogue program.
In addition, compared with " blacklist mode " as patent document 1, when electronic unit inspection dress
When putting work, be for example prevented from patch (for the part of more new procedures be modified, work(
The data that can change) increase.Therefore, it is possible to prevent control speed from reducing.
Above, although illustrate the electronic component handling apparatus of the present invention for embodiment illustrated
And electronic component inspection device, but the present invention is not limited to this, constitutes electronic unit conveying
The each several part of device and electronic component inspection device can be replaced into and can play same function
The parts of arbitrary composition.Alternatively, it is also possible to add arbitrary construct.
In addition, in said embodiment, although communication unit illustrates as LAN, but
The present invention is not limited to this, for example, it is also possible to be WAN (Wide Area Network:
Wide area network), MAN (Metropolitan Area Network: Metropolitan Area Network (MAN)), internet etc..
In addition, in said embodiment, although in white list, include multiple software, but
It is not limited to this in the present invention, it is also possible to be 1 software.
Description of reference numerals
1-checks device;11A-conveyor pallet structure;11B-conveyor pallet structure;12-temperature adjusts
Portion;13-device delivery head;14-device supply unit;15-conveyor pallet structure;16-inspection portion;
17-device delivery head;18-device recoverer;19-recovery pallet;20-device delivery head;21-
Conveyor pallet structure;22A-conveyor pallet structure;22B-conveyor pallet structure;61-the first dividing plate;
62-second partition;63-the 3rd dividing plate;64-the 4th dividing plate;65-the 5th dividing plate;66-inboard partition;
70-front shroud;71-side is covered;711-first;712-second;72-side is covered;721-first;
722-second;73-back cover;731-first;732-second;733-the 3rd;75-the 4th
Door;80-control unit;81-drive control part;82-checks control unit;83-storage part;84-differentiates
Portion;85-main frame;86-LAN;87-display part;90-IC device;100-white list;200-holds in the palm
Dish;A1-pallet supply area;A2-supply area;A3-inspection area;A4-recovery zone;
A5-pallet removes region;R1-the first Room;R2-the second Room;R3-the 3rd Room.
Claims (10)
1. an electronic component handling apparatus, it is characterised in that this electronic component handling apparatus is sentenced
The program not being able to carry out.
2. an electronic component handling apparatus, it is characterised in that have:
Storage part, be stored with the first prespecified program;With
Comparing section, carries out the comparison of described first program and the second program,
In described comparison, in the case that described second program is different from described first program, make
Described second program does not performs.
3. electronic component handling apparatus according to claim 2, it is characterised in that
In described comparison, in the case that described second program is identical with described first program, hold
Described second program of row.
4. the electronic component handling apparatus according to Claims 2 or 3, it is characterised in that
Described first program is the software making this electronic component handling apparatus work.
5. electronic component handling apparatus as claimed in any of claims 2 to 4, its
It is characterised by,
It is stored with multiple described first program at described storage part.
6. electronic component handling apparatus according to claim 5, it is characterised in that
Multiple described first programs are contained in white list.
7. electronic component handling apparatus as claimed in any of claims 2 to 6, its
It is characterised by,
The history starting described second program is wanted to be stored in described storage part.
8. electronic component handling apparatus as claimed in any of claims 2 to 7, its
It is characterised by,
This electronic component handling apparatus notice wants to start the situation of described second program.
9. electronic component handling apparatus as claimed in any of claims 2 to 8, its
It is characterised by,
Having communication unit, this communication unit will want the situation starting described second program to outside
Send.
10. an electronic component inspection device, it is characterised in that
There is the inspection portion checking electronic unit,
Described electronic component inspection device differentiates the program being able to carry out.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015-057422 | 2015-03-20 | ||
JP2015057422A JP2016177554A (en) | 2015-03-20 | 2015-03-20 | Electronic component conveying apparatus and electronic component inspection apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105989289A true CN105989289A (en) | 2016-10-05 |
Family
ID=57044555
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610156265.XA Pending CN105989289A (en) | 2015-03-20 | 2016-03-17 | Electronic component conveyer device and electronic component inspection device |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2016177554A (en) |
CN (1) | CN105989289A (en) |
TW (1) | TWI601027B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6829168B2 (en) * | 2017-09-04 | 2021-02-10 | 株式会社東芝 | Information processing equipment, information processing methods and programs |
TWI802040B (en) * | 2021-10-08 | 2023-05-11 | 精品科技股份有限公司 | Method of application control based on file attributes |
TWI789944B (en) * | 2021-10-08 | 2023-01-11 | 精品科技股份有限公司 | Method of application control based on different scanning schemes |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010140070A (en) * | 2008-12-09 | 2010-06-24 | Hitachi High-Technologies Corp | Substrate manufacturing/inspection device, and virus check method thereof |
CN102332070A (en) * | 2011-09-30 | 2012-01-25 | 中国人民解放军海军计算技术研究所 | Trust chain transfer method for trusted computing platform |
TW201421363A (en) * | 2012-11-08 | 2014-06-01 | Nvidia Corp | A method of disseminating updated drivers to mobile computing devices and a dissemination system therefor |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6165469B2 (en) * | 2013-03-01 | 2017-07-19 | キヤノン電子株式会社 | Information processing apparatus, control method therefor, and information processing system |
-
2015
- 2015-03-20 JP JP2015057422A patent/JP2016177554A/en not_active Withdrawn
-
2016
- 2016-03-17 TW TW105108326A patent/TWI601027B/en not_active IP Right Cessation
- 2016-03-17 CN CN201610156265.XA patent/CN105989289A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010140070A (en) * | 2008-12-09 | 2010-06-24 | Hitachi High-Technologies Corp | Substrate manufacturing/inspection device, and virus check method thereof |
CN102332070A (en) * | 2011-09-30 | 2012-01-25 | 中国人民解放军海军计算技术研究所 | Trust chain transfer method for trusted computing platform |
TW201421363A (en) * | 2012-11-08 | 2014-06-01 | Nvidia Corp | A method of disseminating updated drivers to mobile computing devices and a dissemination system therefor |
Also Published As
Publication number | Publication date |
---|---|
JP2016177554A (en) | 2016-10-06 |
TW201635183A (en) | 2016-10-01 |
TWI601027B (en) | 2017-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105989289A (en) | Electronic component conveyer device and electronic component inspection device | |
US9251349B2 (en) | Virtual machine migration | |
US8307443B2 (en) | Securing anti-virus software with virtualization | |
WO2016154937A1 (en) | Systems and methods for monitoring flight | |
US6507770B2 (en) | Substrate processing system and substrate processing method | |
US10181034B2 (en) | Virtual machine security | |
US20200408358A1 (en) | Method and system for controlling a gimbal | |
JP4555881B2 (en) | Substrate processing apparatus and display method | |
CN105765596A (en) | Techniques for integrated endpoint and network detection and eradication of attacks | |
US11205001B2 (en) | Virus program cleanup method, storage medium and electronic terminal | |
US20190044958A1 (en) | System, Method, and Apparatus for Computer Security | |
CN102841830A (en) | Gravity inductor test system and method for electronic device | |
JPWO2020136742A1 (en) | Consignment storage device and consignment storage method | |
CN106203073A (en) | A kind of Windows white list control method based on file system filter driver | |
DE112015007220T5 (en) | Techniques for coordinating device startup safety | |
JP5097134B2 (en) | Server apparatus, information processing method, and program | |
KR20190142371A (en) | Wafer inspection equipment | |
CN104360856A (en) | Cloud application delivery device | |
CN1409227A (en) | Method for fully controlling files in computer system | |
CN108139440B (en) | Electronic component conveying device and electronic component inspection device | |
JPH10198585A (en) | Controller | |
CN110316522A (en) | Rotate the device of simultaneously delivery panel | |
US11972245B2 (en) | Proactive prevention of data unavailability and data loss | |
CN106022131A (en) | Instruction processing method and device | |
JP5622334B2 (en) | Substrate processing apparatus, control method therefor, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161005 |
|
WD01 | Invention patent application deemed withdrawn after publication |