CN105989289A - Electronic component conveyer device and electronic component inspection device - Google Patents

Electronic component conveyer device and electronic component inspection device Download PDF

Info

Publication number
CN105989289A
CN105989289A CN201610156265.XA CN201610156265A CN105989289A CN 105989289 A CN105989289 A CN 105989289A CN 201610156265 A CN201610156265 A CN 201610156265A CN 105989289 A CN105989289 A CN 105989289A
Authority
CN
China
Prior art keywords
electronic component
program
software
handling apparatus
component handling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610156265.XA
Other languages
Chinese (zh)
Inventor
宫本治彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Seiko Epson Corp
Original Assignee
Seiko Epson Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seiko Epson Corp filed Critical Seiko Epson Corp
Publication of CN105989289A publication Critical patent/CN105989289A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/26Testing of individual semiconductor devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Testing Of Individual Semiconductor Devices (AREA)

Abstract

The present invention provides an electronic component conveyer device and an electronic component inspection device which are capable of preventing unexpected changes of software caused by malware from the outside and preventing reduction of control speed. The electronic component conveyer device includes a storage portion (83) in which information of executable software is prestored, and a determination portion (84) comparing the information of the software stored in the storage portion (83) with information of software having an activation request. In addition, the determination portion (84) is configured not to perform execution of the software having the activation request when the information of the software stored in the storage portion (83) is different from the information of the software having the activation request.

Description

Electronic component handling apparatus and electronic component inspection device
Technical field
The present invention relates to electronic component handling apparatus and electronic component inspection device.
Background technology
In the past, for example known electronic unit inspection having the electrical characteristics checking the electronic units such as IC device Look into device, be provided with for IC device is delivered to inspection portion in this electronic component inspection device The electronic component handling apparatus of maintaining part.When checking IC device, IC device is configured at holding Portion, and make each termination contact of multiple probe and the IC device being arranged at maintaining part.
Such electronic component inspection device is operationally connected to the network.Accordingly, because from outward The rogue programs such as the virus in portion (Malware), exist and increase unexpected change to software configuration Risk.
In the electronic component inspection device described in patent document 1, in order to avoid above-mentioned risk, Antivirus software is installed.This antivirus software is to including malware definition file (blacklist) institute The known character string describing or the despiteful code of tool or the data of suspicious character string are entered Row intercepts (expeling), and which is referred to as so-called " blacklist mode ".
Patent document 1: Japanese Unexamined Patent Publication 2010-140070 publication
But, in the case of using " blacklist mode " as patent document 1, at electronics During component conveying apparatus work, for example, due to patch, (part for more new procedures is carried out Correction, the data of function change) increase etc., there is control speed and reduce such problem.
Content of the invention
It is an object of the invention to provide a kind of be prevented from soft because of cause from outside rogue program The unexpected change of part, and be prevented from control speed reduction electronic component handling apparatus and Electronic component inspection device.
Such purpose is achieved by the following present invention.
[application examples 1]
The electronic component handling apparatus of the present invention is characterised by differentiating the program being able to carry out.
Thereby, it is possible to prevent because of the unexpected change of the software causing from outside rogue program. In addition, compared with patent document 1 such " blacklist mode ", work as electronic component handling apparatus During work, be prevented from such as patch (for the part of more new procedures be modified, function The data of change) increase.Thereby, it is possible to prevent control speed from reducing.
[application examples 2]
The electronic component handling apparatus of the present invention, it is characterised in that have:
The storage part of the first prespecified program that is stored with, and
Carry out the comparing section of described first program and the comparison of the second program,
In described comparison, in the case that described second program is different from described first program, make Described second program does not performs.
Thereby, it is possible to prevent because of the unexpected change of the software causing from outside rogue program. In addition, compared with patent document 1 such " blacklist mode ", work as electronic component handling apparatus During work, for instance, it is possible to prevent patch (for the part of more new procedures be modified, work( The data that can change) increase.Therefore, it is possible to prevent control speed from reducing.
[application examples 3]
In the electronic component handling apparatus of the present invention, preferably in described comparison, described second In the case that program is identical with described first program, perform described second program.
Thereby, it is possible to avoid because the unexpected of software causing from outside rogue program changes this The risk of sample.
[application examples 4]
In the electronic component handling apparatus of the present invention, preferably described first program is to make this ministry of electronics industry The software of part conveying device work.
Thus, the software enabling electronic component handling apparatus work is avoided because of from outside malice The such risk of unexpected change of the software that program causes.
[application examples 5]
It in the electronic component handling apparatus of the present invention, is preferably stored with multiple institute at described storage part State the first program.
Thereby, it is possible to avoid above-mentioned risk in multiple programs.
[application examples 6]
In the electronic component handling apparatus of the present invention, preferably the plurality of first program is contained in White list.
Use " white list mode " by such such that it is able to avoid above-mentioned risk.
[application examples 7]
In the electronic component handling apparatus of the present invention, preferably want to start going through of described second program History is stored in described storage part.
Thereby, it is possible to know the history wanting to start the second program.
[application examples 8]
In the electronic component handling apparatus of the present invention, preferably notice is wanted to start described second program Situation.
Thereby, it is possible at once know the situation wanting to start the second program.
[application examples 9]
In the electronic component handling apparatus of the present invention, preferably have and start described second journey by wanting The communication unit that the situation of sequence sends to outside.
Thus, for example, at main frame etc., can send out wanting the situation starting the second program to outside Send.It is therefoie, for example, Host Administration electronic component handling apparatus can be used.
[application examples 10]
The electronic component inspection device of the present invention is characterised by having and check electronic unit Inspection portion, described electronic component inspection device differentiates the program that is able to carry out.
Thereby, it is possible to prevent because of the unexpected change of the software causing from outside rogue program. In addition, compared with patent document 1 such " blacklist mode ", work as electronic component inspection device During work, be prevented from such as patch (for the part of more new procedures be modified, function The data of change) increase.Therefore, it is possible to prevent control speed from reducing.
Brief description
Fig. 1 is the diagrammatic top of the first embodiment of the electronic component inspection device representing the present invention Figure.
Fig. 2 is the block diagram of the electronic component inspection device shown in Fig. 1.
Fig. 3 is the comparing section institute of the control unit representing that the electronic component inspection device shown in Fig. 1 possesses The figure of the control action carrying out.
Fig. 4 is the control of the control unit possessing for the electronic component inspection device shown in explanatory diagram 1 The flow chart of program.
Detailed description of the invention
Hereinafter, based on the preferred embodiment electronic unit conveying dress to the present invention shown in the drawings Put and electronic component inspection device is described in detail.
< the first embodiment >
Fig. 1 is the diagrammatic top of the first embodiment of the electronic component inspection device representing the present invention Figure.Fig. 2 is the block diagram of the electronic component inspection device shown in Fig. 1.Fig. 3 is to represent shown in Fig. 1 The figure of control action that carried out of the comparing section of control unit that possesses of electronic component inspection device.Figure 4 is the control program of the control unit possessing for the electronic component inspection device shown in explanatory diagram 1 Flow chart.
Below additionally, for convenience of description, as it is shown in figure 1,3 mutually orthogonal axles are set to X Axle, Y-axis and Z axis.In addition, include that the X/Y plane of X-axis and Y-axis is level, Z axis For vertical.In addition, the direction parallel with X-axis is also referred to as " X-direction ", will be parallel with Y-axis Direction be also referred to as " Y-direction ", by the direction parallel with Z axis be also referred to as " Z-direction ".In addition, The upstream side of the conveying direction of electronic unit is also only called " upstream side ", defeated by electronic unit The downstream sending direction is also only called " downstream ".In addition, it is described in present specification " level " is not limited to level completely, as long as not hindering the conveying of electronic unit, also includes Relative to the level state that somewhat (e.g., less than about 5 °) tilt.
Inspection device (electronic component inspection device) 1 shown in Fig. 1 is e.g. used for checking, surveys Examination (only claiming " inspection " below) BGA (Ball grid array: BGA) encapsulation, LGA IC device, LCD (the Liquid Crystal such as (Land grid array: contact array) encapsulation Display: liquid crystal display), CIS (CMOS Image Sensor:CMOS image sensing Device) etc. the device of electrical characteristics of electronic unit.Additionally, it is following for purposes of illustration only, say typically Bright use IC device is as the situation of the described electronic unit checking, and it is set to " IC Device 90 ".
As it is shown in figure 1, check device 1 be divided into pallet supply area A1, device supply area (with Under be only called " supply area ") A2, inspection area A3, device recovery zone (hereinafter referred merely to as " recovery zone ") A4, pallet removing region A5.And, IC device 90 is from pallet drainage area Territory A1 removes region A5 successively via described each region to pallet, and in the inspection area of midway A3 checks.So, check that device 1 becomes to possess and carry IC device 90 in each region Electronic component handling apparatus, the inspection portion 16 checking in the A3 of inspection area and control The device in portion 80.In checking device 1, can will remove from pallet supply area A1 to pallet Among the A5 of region, the supply area A2 from conveying IC device 90 is also referred to as to recovery zone A4 For " conveyor zones (delivery area) ".
Additionally, for checking device 1, be configured with pallet supply area A1, pallet removing district One side (downside in Fig. 1) of territory A5, as face side, its opposition side, is i.e. configured with inspection One side (upside in Fig. 1) of region A3 uses as rear side.
Pallet supply area A1 is supplied with being arranged with the torr of multiple IC devices 90 of the state of inspection The confession material portion of dish (arrangement components) 200.In the A1 of pallet supply area, can stack multiple Pallet 200.
Supply area A2 is multiple for configured on the pallet 200 of pallet supply area A1 IC device 90 is fed separately to the region of inspection area A3.Additionally, to stride across pallet drainage area Territory A1 and the mode of supply area A2, be provided with the pallet carrying pallet 200 one by one Conveying mechanism 11A, 11B.
It is provided with temperature adjustment portion (immersion plate) the 12nd, device delivery head at supply area A2 the 13rd, Conveyor pallet structure (the first conveying device) 15.
Temperature adjustment portion 12 is the mounting portion being placed with multiple IC device 90, and can heat or Person cools down the plurality of IC device 90.Thereby, it is possible to IC device 90 is adjusted to be suitable to inspection Temperature.In the composition shown in Fig. 1, configure in the Y direction, be fixed with 2 temperature adjustment portions 12.And, by conveyor pallet structure 11A sent into from pallet supply area A1 (defeated Send here) IC device 90 on pallet 200 is transported to the temperature adjustment portion 12 of any one And loaded.
Device delivery head 13 can be supported by the A2 of supply area movably.Thus, device is defeated Send 13 can undertake the pallet 200 sent into from pallet supply area A1 and temperature adjustment portion The conveying of the IC device 90 between 12, temperature adjustment portion 12 and device supply unit 14 described later Between the conveying of IC device 90.
Conveyor pallet structure 15 is the empty pallet of the state making to eliminate all of IC device 90 200 mechanisms carrying in X direction in the A2 of supply area.And, after this conveying, empty torr Dish 200 is back to pallet supply area A1 by conveyor pallet structure 11B from supply area A2.
Inspection area A3 is the region checking IC device 90.In this inspection area, A3 is provided with Device supply unit (supply reciprocating apparatus) the 14th, inspection portion the 16th, device delivery head the 17th, Yi Jiqi Part recoverer (recovery reciprocating apparatus) 18.
Device supply unit 14 is the mounting portion of mounting temperature adjusted IC device 90, and can It is transported to this IC device 90 near inspection portion 16.This device supply unit 14 is in supply area Can be supported by movably along the X direction between A2 and inspection area A3.In addition, at Fig. 1 In shown composition, device supply unit 14 is configured with 2 in the Y direction, temperature adjustment portion 12 On IC device 90 be transported to the device supply unit 14 of any one and loaded.
Inspection portion 16 is the unit checking, testing the electrical characteristics of IC device 90.In inspection portion 16 Be provided with multiple probe, the plurality of probe keep IC device 90 in the state of with this IC device The terminal electrical connection of 90.And, the terminal of IC device 90 electrically connects (contact) with probe, and Carry out the inspection of IC device 90 via probe.Additionally, in inspection portion 16, adjust with temperature Whole 12 similarly, can heat or cool down IC device 90 and adjust this IC device 90 Become the temperature being suitable to check.
Device delivery head 17 can be supported by the A3 of inspection area movably.Thus, device is defeated Sending 17 can be by by the IC device 90 on the device supply unit 14 that supply area A2 sends into It is delivered to inspection portion 16 and load.
Device recoverer 18 is the load of the IC device 90 of the inspection that mounting finishes in inspection portion 16 Put portion, and this IC device 90 can be transported to recovery zone A4.This device recoverer 18 exists Can be supported by movably along the X direction between inspection area A3 and recovery zone A4.In addition, In the composition shown in Fig. 1, device recoverer 18 in the same manner as device supply unit 14 in the Y direction Being configured with 2, the IC device 90 in inspection portion 16 is transported to the device of any one and reclaims Portion 18 is simultaneously loaded.This conveying is carried out by device delivery head 17.
Recovery zone A4 is the region reclaimed and check the multiple IC devices 90 finishing.In this time Receive region A4 and be provided with recovery pallet the 19th, device delivery head 20 and conveyor pallet structure (the Two conveying devices) 21.In addition, be ready for the pallet 200 having time at recovery zone A4.
Recovery pallet 19 is the mounting portion of mounting IC device 90, is fixed on recovery zone A4 In, it in the composition shown in Fig. 1, is configured with 3 along the X direction.In addition, the pallet of sky 200 is also the mounting portion of mounting IC device 90, is configured with 3 along the X direction.And, move The IC device 90 having moved on the device recoverer 18 of recovery zone A4 is transported to these times In the pallet 200 of receipts pallet 19 and sky any one and loaded.Thus, IC device By each, 90 check that result is recovered, thus be classified.
Device delivery head 20 can be supported by the A4 of recovery zone movably.Thus, device is defeated Sending 20, from device recoverer 18, IC device 90 can be delivered to recovery pallet the 19th, empty Pallet 200.
Conveyor pallet structure 21 is to make to be existed by the pallet 200 removing the sky that region A5 sends into from pallet The mechanism carrying in X direction in the A4 of recovery zone.And, after this conveying, empty pallet 200 The position of IC device 90 is being reclaimed in configuration, i.e. can be in described 3 empty pallets 200 Any one.So, in checking device 1, in recovery zone, A4 is provided with conveyor pallet Structure 21, in addition, is provided with conveyor pallet structure 15 at supply area A2.Thus, for example It with the pallet 200 being entered line space by 1 conveying mechanism towards compared with the conveying of X-direction, is capable of gulping down The raising of the amount of telling (the conveying number of the IC device 90 of time per unit).
Additionally, as conveyor pallet structure the 15th, 21 composition, be not particularly limited, for example Enumerate and there is the adsorption element of adsorbing tray 200 and by this adsorption element can move in X-direction The composition of the supporting devices such as the ball screw supporting dynamicly.
It is to reclaim and remove the multiple IC devices being arranged with the state of having checked that pallet removes region A5 The pallet 200 of 90 remove material portion.Remove in the A5 of region at pallet and can stack multiple pallet 200.
In addition, in the way of striding across recovery zone A4 and pallet removing region A5, be provided with and will hold in the palm Conveyor pallet structure 22A, 22B that dish 200 carries one by one.Conveyor pallet structure 22A is The pallet 200 being placed with the IC device 90 having checked is delivered to pallet from recovery zone A4 Remove the mechanism of region A5.Conveyor pallet structure 22B is will to be used for reclaiming the sky of IC device 90 Pallet 200 remove region A5 from pallet and be delivered to the mechanism of recovery zone A4.
In above such inspection device 1, in addition to the 12nd, inspection portion 16 of temperature adjustment portion, Device delivery head the 13rd, device supply unit the 14th, device delivery head 17 also be configured to heating or Person cools down IC device 90.Thus, IC device 90 is during being carried, and temperature is maintained constant. And, below, cool down for IC device 90, such as at the model of-60 DEG C~-40 DEG C Situation about checking under the low temperature environment in enclosing illustrates.
As it is shown in figure 1, for checking device 1, pallet supply area A1 and supply area Separated (by separating) by the first dividing plate 61 between A2, supply area A2 and inspection area A3 it Between separated by second partition 62, by the 3rd dividing plate 63 between inspection area A3 and recovery zone A4 Separating, recovery zone A4 and pallet remove and are separated by the 4th dividing plate 64 between the A5 of region.In addition, Also separated by the 5th dividing plate 65 between supply area A2 and recovery zone A4.These dividing plates have Keep the bubble-tight function in each region.Further, for checking device 1, outermost layer is by cover Cover, at this cover, for example there is front shroud the 70th, side cover 71 and the 72nd, back cover 73.
And, by the first dividing plate the 61st, second partition the 62nd, the 5th dividing plate the 65th, supply area A2 becomes The first Room R1 that side cover 71 and back cover 73 define.Do not check multiple IC devices 90 of state It is fed to the first Room R1 together with pallet 200.
Inspection area A3 becomes and is defined by second partition the 62nd, the 3rd dividing plate the 63rd, back cover 73 Second Room R2.In addition, be configured with inboard partition in the inner part than back cover 73 in the second Room R2 66。
Recovery zone A4 becomes by the 3rd dividing plate the 63rd, the 4th dividing plate the 64th, the 5th dividing plate the 65th, side cover 72 and the 3rd Room R3 that defines of back cover 73.Check the multiple IC devices 90 terminating from second Room R2 is fed through the 3rd Room R3.
As it is shown in figure 1, be provided with first (first, left side) 711 and second at side cover 71 (second, left side) 712.By opening first the 711st, second 712, it is possible to carry out The such as releasing of the such as obstruction of maintenance, IC device 90 in the first Room R1 etc. (it is following, These are referred to as " operation " as general designation).Additionally, first 711 and second 712 towards phase Mutual rightabout opening and closing, becomes so-called " double door splitting around ".In addition, when first In the R1 of room during operation, the device delivery head 13 grade movable part in the R1 of this first Room stops.
Similarly, side cover 72 is provided with first (first, right side) 721 and second (right side Side second) 722.By opening first the 721st, second 722, it is possible to carry out for example Operation in the 3rd Room R3.Additionally, first 721 and second 722 for towards mutually on the contrary So-called " clamshell doors " of direction opening and closing.In addition, when operation in the 3rd Room R3, the 3rd Device delivery head 20 grade movable part in the R3 of room stops.
In addition, be also equipped with first (rear side first) the 731st, second (back of the body at back cover 73 Face side second) 732 and the 3rd (rear side the 3rd) 733.By opening first 731, It is possible to carry out the operation for example in the first Room R1.By opening the 3rd 733, thus The operation that can carry out for example in the 3rd Room R3.Further, inboard partition 66 is provided with the 4th Door 75.And, by opening second 732 and the 4th 75, it is possible to carry out for example existing Operation in second Room R2.Additionally, first the 731st, second 732 and the 4th 75 towards phase Equidirectional opening and closing, and the 3rd 733 court and these rightabout opening and closings.In addition, when second In the R2 of room during operation, the device delivery head 17 grade movable part in the R2 of this second Room stops.
And, by closing each door, it is possible to guarantee the air-tightness in corresponding each room, thermal insulation Property.
As in figure 2 it is shown, control unit 80 has drive control part the 81st, checks that the 82nd, control unit stores Portion 83 and judegment part (comparing section) 84.
Drive control part 81 controls conveyor pallet structure 11A, 11B, temperature adjustment portion the 12nd, device Delivery head the 13rd, device supply unit the 14th, conveyor pallet structure the 15th, inspection portion the 16th, device delivery head 17th, device recoverer the 18th, device delivery head the 20th, conveyor pallet structure the 21st, conveyor pallet structure The driving in each portion of 22A, 22B.
Check that control unit 82, based on the program being stored in storage part 83, carries out being configured at inspection portion 16 The inspection etc. of electrical characteristics of IC device 90.
Storage part 83 for example, by non-volatile memories such as volatile memory, ROM such as RAM Device, EPROM, EEPROM, flash memory etc. rewritable (can eliminate, rewritable) non-volatile Property memory etc., various semiconductor memory (IC memory) etc. constitute.
Here, as in figure 2 it is shown, control unit 80 can be via the LAN (Local as communication unit Area Network: LAN) it 86 is in communication with each other with main frame the 85th, other inspection device etc.. But, owing to checking that device 1 is connected with LAN86, therefore there is the despiteful evils of tool such as virus Meaning program (Malware) enters the Gu of control unit 80 from main frame the 85th, other inspection device etc. Consider.In the case of Gai, use when each portion that control unit 80 makes inspection device 1 drives be multiple soft The construction of part (following, referred to as " software A " " software B " " software C ") is increased unexpected Change.
Additionally, in this manual, " program " refers to for example for making each portion of inspection device 1 The order of startup, order etc..In addition, in this manual, it by " program ", is used for processing " journey The data of sequence " etc. are referred to as " software " as general name.
In order to avoid above-mentioned risk, in the past, take the virus of so-called " blacklist mode " Check that software is arranged on the method for control unit 80.It is somebody's turn to do the virus checking software of " blacklist mode " The code of the software A~software C of use when scanning makes each portion of inspection device 1 drive, to description Carry out in known character string or the suspicious character string of malware definition file (blacklist) Intercept (expeling).
But, in this " blacklist mode ", there is following such problem.
[1] due to patch (for the part of more new procedures be modified, function change Data) increase, so control speed (cpu performance) reduces.
[2] because updating frequently of malware definition file makes the consumption of the network bandwidth increase.
[3] there is infection malice in the period before malware definition file is produced, issues The misgivings of program.
[4] if terminating during the support of OS, then malware definition file becomes invalid.
In view of such problem, in checking device 1, have employed " white list mode ".Hereinafter, Which is illustrated.
It as in figure 2 it is shown, checking in device 1, is stored with white list 100 at storage part 83.Should White list 100 is the list of the information comprising software as described above A~software C.At these letters Breath for example includes title, the version information of the code of each software A~software C and updates day The information such as time phase.
In addition, in checking device 1, the information of software A~software C is stored in white list 100 When, the code of the state that rogue program is introduced into software A~software C is recorded.
Fig. 3 is to there is software A, software B, software during the power supply for example connected and checked device 1 The figure of the situation starting request of C and software D.The software to white list 100 for the judegment part 84 The information of A~software C compares with the information that there is the software A~software D starting request. Additionally, in the present embodiment, it determines when the title of the relatively more each software in portion 84 and update date Between.
As it is shown on figure 3, as result of the comparison, it is judged that for there is the software A that starts request~soft The title of the software A~software C of the title of part C and time update date and white list 100 And if time update date is identical, then the execution of judegment part 84 approval software A~software C.
On the other hand, as it is shown on figure 3, information and white name owing to there is the software D starting request The information of the software A~software C included in single 100 is inconsistent, so judegment part 84 is forbidden Perform software D.
According to such " white list mode ", make white list 100, and in this white list 100 The information of the software being comprised compares with the information that there is the software starting request, based on its ratio Even if relatively result performs software and is also capable of deciding whether safety.Therefore, it is possible to prevent due to virus etc. Have despiteful rogue program to make to increase unexpected change to software A~software C.
In addition, according to " white list mode ", owing to not needing to make patch, therefore prevent " black The increase of patch as list mode ".And, it is not necessary to sweep as " blacklist mode " Retouch the code of software, by the such as title, version information and time update date of query software Deng, even if thus perform software be also capable of deciding whether safety.Due to these, according to " white list Mode ", the cpu performance being prevented from control unit 80 reduces.Therefore, it is possible to solve above-mentioned asking Topic [1].
In addition, according to " white list mode ", can avoid and carrying out as " blacklist mode " The frequent updating of malware definition file, and it is prevented from the consumption increase of the network bandwidth.Therefore, Can solve the problem that the problems referred to above [2].
In addition, according to " white list mode ", can avoid as " blacklist mode ", Malware definition file is made into, issue before time infect the risk of rogue program.Therefore, Can solve the problem that the problems referred to above [3].
Further, according to " white list mode ", initially, owing to not needing the support of OS, so energy Enough prevent as " blacklist mode ", because of the support of OS during terminate and cause Malware Definition file becomes invalid.Therefore, it is possible to solve the problems referred to above [4].
So, it according to the present invention, by using " white list mode ", is prevented from by from outward The unexpected change of the software that the rogue program in portion causes, and it is prevented from controlling the reduction of speed.
In addition, in checking device 1, there is the startup of the software D being not included in white list 100 Such history is asked to be stored in storage part 83.Thus, even if also can know when to deposit later Crossing the startup request of software D.After it is therefoie, for example, whether can interpolate that safety officer Software D is appended to white list 100.
In addition, in checking device 1, existence can be not included in the software D of white list 100 The startup such information of request be shown in display part (monitor) 87.Thereby, it is possible to inspection There is the startup request of the software D being not included in white list 100 in the operator notification of device 1.Cause This, for instance, it is possible to judge whether safety officer is appended to white list 100 by software D.
Further, as in figure 2 it is shown, in checking device 1, existence can be not included in white list The history starting request of the software D of 100 sends to such as main frame 85 via LAN86.Thus, Even if being arranged distant from checking the place in the place of device 1, it is also possible to know have software D's Start request.It is therefoie, for example, can be with statistical based on the information from multiple stage inspection device Judge whether safety officer is appended to white list 100 by software D.
Such white list mode, for example can be by by McAfee (McAfee) company system " Application Control: application controls ", McAfee company system " Embedded Control: Embedded Control ", Trend Micro (Trend Micro) company's system " Trend Micro Safe Lock: Trend Micro's safety lock ", (share) rock international corporation (Rock International Corporation) " Lumension application program controlling ", Humming Heads share are made The softwares such as company's system " defence platform (DeP) " are arranged on inspection device 1 and realize.
Then, illustrate based on control program to control unit 80 of the flow chart of Fig. 4.
When making inspection device 1 start, there is startup request (step S101) of multiple software.
Then, judge whether the software that there is startup request is comprised in white list in step S101 100 (steps S102).
In step s 102, it is judged as that the software that there is startup request is comprised in step S101 In the case of white list 100, perform there is the software (step S103) starting request, and start Check.
Additionally, in step s 102, it is judged as having in the software starting request in step S101 In the case that existence is not included in the software of white list 100, forbid being not included in white list 100 The execution of software.And, notice there are the startup request of the software being not included in white list 100 (step S104).In this step S104, send this information to main frame 85, and by this letter Breath is shown in display part 87.
So, it in checking device 1, is configured to discriminate whether it is to be able to carry out when the program of execution Program.Thereby, it is possible to prevent the unexpected change of the software causing from outside rogue program. In addition, compared with " blacklist mode " as patent document 1, when electronic unit inspection dress When putting work, be for example prevented from patch (for the part of more new procedures be modified, work( The data that can change) increase.Therefore, it is possible to prevent control speed from reducing.
Above, although illustrate the electronic component handling apparatus of the present invention for embodiment illustrated And electronic component inspection device, but the present invention is not limited to this, constitutes electronic unit conveying The each several part of device and electronic component inspection device can be replaced into and can play same function The parts of arbitrary composition.Alternatively, it is also possible to add arbitrary construct.
In addition, in said embodiment, although communication unit illustrates as LAN, but The present invention is not limited to this, for example, it is also possible to be WAN (Wide Area Network: Wide area network), MAN (Metropolitan Area Network: Metropolitan Area Network (MAN)), internet etc..
In addition, in said embodiment, although in white list, include multiple software, but It is not limited to this in the present invention, it is also possible to be 1 software.
Description of reference numerals
1-checks device;11A-conveyor pallet structure;11B-conveyor pallet structure;12-temperature adjusts Portion;13-device delivery head;14-device supply unit;15-conveyor pallet structure;16-inspection portion; 17-device delivery head;18-device recoverer;19-recovery pallet;20-device delivery head;21- Conveyor pallet structure;22A-conveyor pallet structure;22B-conveyor pallet structure;61-the first dividing plate; 62-second partition;63-the 3rd dividing plate;64-the 4th dividing plate;65-the 5th dividing plate;66-inboard partition; 70-front shroud;71-side is covered;711-first;712-second;72-side is covered;721-first; 722-second;73-back cover;731-first;732-second;733-the 3rd;75-the 4th Door;80-control unit;81-drive control part;82-checks control unit;83-storage part;84-differentiates Portion;85-main frame;86-LAN;87-display part;90-IC device;100-white list;200-holds in the palm Dish;A1-pallet supply area;A2-supply area;A3-inspection area;A4-recovery zone; A5-pallet removes region;R1-the first Room;R2-the second Room;R3-the 3rd Room.

Claims (10)

1. an electronic component handling apparatus, it is characterised in that this electronic component handling apparatus is sentenced The program not being able to carry out.
2. an electronic component handling apparatus, it is characterised in that have:
Storage part, be stored with the first prespecified program;With
Comparing section, carries out the comparison of described first program and the second program,
In described comparison, in the case that described second program is different from described first program, make Described second program does not performs.
3. electronic component handling apparatus according to claim 2, it is characterised in that
In described comparison, in the case that described second program is identical with described first program, hold Described second program of row.
4. the electronic component handling apparatus according to Claims 2 or 3, it is characterised in that Described first program is the software making this electronic component handling apparatus work.
5. electronic component handling apparatus as claimed in any of claims 2 to 4, its It is characterised by,
It is stored with multiple described first program at described storage part.
6. electronic component handling apparatus according to claim 5, it is characterised in that
Multiple described first programs are contained in white list.
7. electronic component handling apparatus as claimed in any of claims 2 to 6, its It is characterised by,
The history starting described second program is wanted to be stored in described storage part.
8. electronic component handling apparatus as claimed in any of claims 2 to 7, its It is characterised by,
This electronic component handling apparatus notice wants to start the situation of described second program.
9. electronic component handling apparatus as claimed in any of claims 2 to 8, its It is characterised by,
Having communication unit, this communication unit will want the situation starting described second program to outside Send.
10. an electronic component inspection device, it is characterised in that
There is the inspection portion checking electronic unit,
Described electronic component inspection device differentiates the program being able to carry out.
CN201610156265.XA 2015-03-20 2016-03-17 Electronic component conveyer device and electronic component inspection device Pending CN105989289A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015-057422 2015-03-20
JP2015057422A JP2016177554A (en) 2015-03-20 2015-03-20 Electronic component conveying apparatus and electronic component inspection apparatus

Publications (1)

Publication Number Publication Date
CN105989289A true CN105989289A (en) 2016-10-05

Family

ID=57044555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610156265.XA Pending CN105989289A (en) 2015-03-20 2016-03-17 Electronic component conveyer device and electronic component inspection device

Country Status (3)

Country Link
JP (1) JP2016177554A (en)
CN (1) CN105989289A (en)
TW (1) TWI601027B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6829168B2 (en) * 2017-09-04 2021-02-10 株式会社東芝 Information processing equipment, information processing methods and programs
TWI802040B (en) * 2021-10-08 2023-05-11 精品科技股份有限公司 Method of application control based on file attributes
TWI789944B (en) * 2021-10-08 2023-01-11 精品科技股份有限公司 Method of application control based on different scanning schemes

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010140070A (en) * 2008-12-09 2010-06-24 Hitachi High-Technologies Corp Substrate manufacturing/inspection device, and virus check method thereof
CN102332070A (en) * 2011-09-30 2012-01-25 中国人民解放军海军计算技术研究所 Trust chain transfer method for trusted computing platform
TW201421363A (en) * 2012-11-08 2014-06-01 Nvidia Corp A method of disseminating updated drivers to mobile computing devices and a dissemination system therefor

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6165469B2 (en) * 2013-03-01 2017-07-19 キヤノン電子株式会社 Information processing apparatus, control method therefor, and information processing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010140070A (en) * 2008-12-09 2010-06-24 Hitachi High-Technologies Corp Substrate manufacturing/inspection device, and virus check method thereof
CN102332070A (en) * 2011-09-30 2012-01-25 中国人民解放军海军计算技术研究所 Trust chain transfer method for trusted computing platform
TW201421363A (en) * 2012-11-08 2014-06-01 Nvidia Corp A method of disseminating updated drivers to mobile computing devices and a dissemination system therefor

Also Published As

Publication number Publication date
JP2016177554A (en) 2016-10-06
TW201635183A (en) 2016-10-01
TWI601027B (en) 2017-10-01

Similar Documents

Publication Publication Date Title
CN105989289A (en) Electronic component conveyer device and electronic component inspection device
US9251349B2 (en) Virtual machine migration
US8307443B2 (en) Securing anti-virus software with virtualization
WO2016154937A1 (en) Systems and methods for monitoring flight
US6507770B2 (en) Substrate processing system and substrate processing method
US10181034B2 (en) Virtual machine security
US20200408358A1 (en) Method and system for controlling a gimbal
JP4555881B2 (en) Substrate processing apparatus and display method
CN105765596A (en) Techniques for integrated endpoint and network detection and eradication of attacks
US11205001B2 (en) Virus program cleanup method, storage medium and electronic terminal
US20190044958A1 (en) System, Method, and Apparatus for Computer Security
CN102841830A (en) Gravity inductor test system and method for electronic device
JPWO2020136742A1 (en) Consignment storage device and consignment storage method
CN106203073A (en) A kind of Windows white list control method based on file system filter driver
DE112015007220T5 (en) Techniques for coordinating device startup safety
JP5097134B2 (en) Server apparatus, information processing method, and program
KR20190142371A (en) Wafer inspection equipment
CN104360856A (en) Cloud application delivery device
CN1409227A (en) Method for fully controlling files in computer system
CN108139440B (en) Electronic component conveying device and electronic component inspection device
JPH10198585A (en) Controller
CN110316522A (en) Rotate the device of simultaneously delivery panel
US11972245B2 (en) Proactive prevention of data unavailability and data loss
CN106022131A (en) Instruction processing method and device
JP5622334B2 (en) Substrate processing apparatus, control method therefor, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161005

WD01 Invention patent application deemed withdrawn after publication