CN106817222A - Ali's Si tower authentication method, authentication device and optical module for optical module - Google Patents

Ali's Si tower authentication method, authentication device and optical module for optical module Download PDF

Info

Publication number
CN106817222A
CN106817222A CN201611155122.3A CN201611155122A CN106817222A CN 106817222 A CN106817222 A CN 106817222A CN 201611155122 A CN201611155122 A CN 201611155122A CN 106817222 A CN106817222 A CN 106817222A
Authority
CN
China
Prior art keywords
optical module
ali
tower
processor
key data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611155122.3A
Other languages
Chinese (zh)
Other versions
CN106817222B (en
Inventor
王麟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Broadband Multimedia Technology Co Ltd
Original Assignee
Hisense Broadband Multimedia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Broadband Multimedia Technology Co Ltd filed Critical Hisense Broadband Multimedia Technology Co Ltd
Priority to CN201611155122.3A priority Critical patent/CN106817222B/en
Publication of CN106817222A publication Critical patent/CN106817222A/en
Application granted granted Critical
Publication of CN106817222B publication Critical patent/CN106817222B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Abstract

The invention discloses a kind of Ali's Si tower authentication method for optical module, authentication device and optical module, Ali's Si tower authentication method includes:Optical module is attached in target device by its golden finger, after upper electricity, optical module Ali's Si tower certification software that the processor of optical module will be stored in FLASH memory is loaded onto in RAM memory and runs, and the processor of optical module, FLASH memory and RAM memory are arranged in the embedded chip of the optical module;The processor of optical module by golden finger receive target device send key data after, by key data storage to FLASH memory;The processor of optical module calculates decrypted result according to key data;Decrypted result is sent the processor of optical module Ali's Si tower certification for receiving the target device to target device by golden finger.Using the method, optical module can be authenticated successfully without external memory, and applicability is more preferable.

Description

Ali's Si tower authentication method, authentication device and optical module for optical module
Technical field
The present invention relates to optical module technical field, more particularly to a kind of Ali's Si tower authentication method for optical module, recognize Card device and optical module.
Background technology
Ali's Si tower (Arista) algorithm is a kind of identifying algorithm, is generally applied in the encryption certification of optical-fiber network.It is real In the application of border, in order to set up the optical-fiber network of encipherment protection, can be set in the computer and optical module for participating in building optical-fiber network Ah Ali's Si tower algorithm software (herein, is defined as Ali's Si tower certification software) by Li Sita algorithm softwares, so as to computer Ali's Si tower mandate is carried out with optical module, afterwards, realizes protecting the encryption of optical-fiber network by Ali's Si tower certification between the two Shield.
In Ali's Si tower verification process, computer and optical module are separately operable and are stored in Ali's Si tower certification of its own Software, computer can be sent for Ali's Si tower during Ali's Si tower certification software of its own is run to optical module The key of certification;Optical module can receive target device transmission during Ali's Si tower certification software of its own is run The key, after receiving the key, the key is stored into its external memory.Ali Si of its own is run in optical module During tower certification software, computer continues to read the target response code that key storage is completed from optical module, reads into Ali's Si tower certification is carried out after work(to optical module.
From the foregoing, it will be observed that in the prior art, in Ali's Si tower authentication method of optical module, optical module to need to set one External memory, for storing key, so, on the one hand needs external hardware device, and on the other hand, external memory is easy Interior data is read by other reading instruments, confidentiality is poor.
So, existing Ali's Si tower authentication method for optical module is, it is necessary to external hardware device, and confidentiality is poor.
The content of the invention
The purpose of the embodiment of the present invention be provide a kind of Ali's Si tower authentication method for optical module, authentication device and Optical module, to solve existing Ali's Si tower authentication method for optical module, it is necessary to external hardware device, confidentiality is poor Problem.
In order to solve the above-mentioned technical problem, the embodiment of the invention discloses following technical scheme:
In a first aspect, the embodiment of the invention provides a kind of Ali's Si tower authentication method for optical module, Ali Si Tower authentication method includes:Optical module is attached in target device by its golden finger, and after upper electricity, the processor of the optical module will The optical module Ali's Si tower certification software being stored in FLASH (Flash Memory, flash memory) memory is loaded onto RAM Run in (Random Access Memory, random access memory) memory, the processor of the optical module, FLASH are deposited Reservoir and RAM memory are arranged in the embedded chip of the optical module;The processor of the optical module passes through the golden hand After finger receives the key data that the target device sends, by the key data storage to the FLASH memory;It is described The processor of optical module calculates decrypted result according to the key data;The processor of the optical module leads to the decrypted result Cross the golden finger and send Ali's Si tower certification for receiving the target device to the target device.
Second aspect, the embodiment of the invention provides a kind of Ali's Si tower authentication device for optical module, Ali Si Tower authentication device includes:Golden finger and by I2C (Inter-Integrated Circuit, twin wire universal serial bus) bus The embedded chip being connected with the golden finger, be provided with the embedded chip processor that bus is connected, RAM memory and FLASH memory;The processor is used to perform operations described below:Installed by the golden finger in optical module Into target device and after upper electricity, the optical module Ali's Si tower certification software that will be stored in the FLASH memory is loaded onto Run in the RAM memory;After the golden finger receives the key data that the target device sends, will be described secret Key data storage is to the FLASH memory;Decrypted result is calculated according to the key data;The decrypted result is passed through into institute State golden finger and send Ali's Si tower certification for receiving the target device to the target device.
The third aspect, the embodiment of the invention provides a kind of optical module, and the optical module includes the Ali described in second aspect This tower authentication device.
The technical scheme that embodiments of the invention are provided can include the following benefits:It is used for the invention provides one kind Ali's Si tower authentication method of optical module, authentication device and optical module, in Ali's Si tower authentication method, optical module is by its gold In finger mounted to target device, after upper electricity, by its internal optical module Ali Si tower certification software from its embedded chip Be loaded onto in FLASH memory in the RAM memory of the embedded chip and run, so, optical module run its optical module Ah During Li Sita certification softwares, the key data storage that the target device that will can be received sends to embedded chip In FLASH memory, without external memory again, accordingly without the safety issue for considering external memory, applicability is more It is good.
The embodiment of the present invention is it should be appreciated that the general description of the above and detailed description hereinafter are only exemplary reconciliation The property released, the disclosure can not be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows and meets implementation of the invention Example, and be used to explain principle of the invention together with specification.
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without having to pay creative labor, can also obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of Ali's Si tower authentication method for optical module provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of Ali's Si tower authentication device for optical module provided in an embodiment of the present invention.
Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the present invention, below in conjunction with of the invention real The accompanying drawing in example is applied, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described implementation Example is only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to protection of the present invention Scope.
The invention provides a kind of Ali's Si tower authentication method for optical module, authentication device and optical module, the Ali In this tower authentication method, optical module when Ali's Si tower certification of target device is received, without external memory, only with setting In embedded chip therein, you can smoothly realize carrying out it by target device the effect of Ali's Si tower certification.
Below in conjunction with the accompanying drawings, specific embodiment of the invention is discussed in detail.
With reference to Fig. 1, Fig. 1 is illustrated that a kind of Ali's Si tower authentication method for optical module provided in an embodiment of the present invention Schematic flow sheet, Ali's Si tower authentication method includes:
Step 101, optical module are attached in target device by its golden finger, after upper electricity, the processor of the optical module Will be stored in being run during the optical module Ali's Si tower certification software in FLASH memory is loaded onto RAM memory.
In practical application, be stored with Ali Si in the equipment (such as computer) and optical module that obtain Ali's Si tower mandate Ali's Si tower certification software stored in tower certification software, and each equipment and each optical module is typically different.User wants Certain obtain Ali's Si tower mandate equipment and certain obtain between the optical module of Ali's Si tower mandate when setting up optical-fiber network, can be with Safety certification is carried out to the optical module using Ali's Si tower authentication method for optical module provided in an embodiment of the present invention, so that Safe optical-fiber network is set up between the equipment and the optical module.
Herein, the device definition of Ali's Si tower certification will be currently carried out to any one optical module for target device, is appointed The equipment that meaning one wants to carry out any optical module Ali's Si tower certification can be as target device.Target is will be stored in set Ali's Si tower certification software definition in standby is equipment Ali's Si tower certification software, and Ali's Si tower that will be stored in optical module is recognized Card software definition is optical module Ali's Si tower certification software.
Generally, it is provided with embedded chip in optical module, the processor of optical module, FLASH memory and RAM memory are equal It is arranged in the embedded chip, wherein, optical module Ali's Si tower certification software is pre-stored within FLASH memory.
Step 102, the processor of the optical module receive the key that the target device sends by the golden finger After data, by the key data storage to the FLASH memory.
During specific implementation, when target device carries out Ali's Si tower certification to certain optical module, target device can also run it Internal equipment Ali's Si tower software, during being somebody's turn to do, target device can first send to optical module and start recognizing for Ali's Si tower certification Card instruction, afterwards can be by the key data is activation of its storage inside to optical module.Generally, key data can include one group, Can include it is multigroup, key data include it is multigroup when, target device can be sent to optical module multigroup key data successively, and And, it is successfully transmitted to optical module in previous group key data, next group of key data can be just sent, until multigroup key number It is successfully transmitted to optical module according to whole.
Corresponding with the target device multigroup key data of transmission, the processor of corresponding optical module is somebody's turn to do by golden finger reception It is also to be received successively during multigroup key data, and each group of key that target device sends is being received by golden finger After data, can be by key data storage to the FLASH memory.
The processor of optical module receives each group of key data that target device sends by golden finger, and the group is secret After in key data storage to FLASH memory, the target response code that storage is completed can be generated.And target device is will be each After group key data is activation to optical module, can continue to read the target response code from optical module, successfully read the target After response code, target device thinks that this group of key data have been successfully transmitted to optical module, and target device can be to optical mode afterwards Block sends next group of key data.Target device by last group of key data is activation to optical module, and from optical module read To after target response code, it is believed that multigroup key data are all successfully transmitted to optical module, afterwards, target device can be to Optical module sends the instruction for stopping storage key data.The processor of optical module receives what target device sent by golden finger After stopping the instruction of storage key data, terminate the process of storage key data.
Step 103, the processor of the optical module calculate decrypted result according to the key data.
After target device sends the instruction for stopping storage key data to optical module, one can be sent to optical module and start solution Close instruction, can send one group of random data to optical module afterwards, that is, the processor of optical module is calculated according to key data and solved Before close result, Ali's Si tower authentication method also includes:The processor of optical module receives target device and sends by golden finger Random data.The processor of optical module by golden finger receive target device send random data after, if key number According to including multigroup, every group of key data and the random data can be together updated to successively and be pre-stored in its internal default optical module (herein, the Hash operation formula that will be pre-stored in optical module is defined as default optical module Hash operation public affairs to Hash operation formula Formula) middle calculating decrypted result.After calculating decrypted result using this kind of calculation, multiple decrypted results are obtained in that.
Further, if key data include it is multigroup, target device to optical module send start decryption instruction after, Also the instruction that a strip adoption target key data are decrypted can be sent to optical module, target key data are multigroup key One group in data.That is, the processor of optical module before decrypted result is calculated according to the key data, Ali's Si tower Authentication method also includes:The processor of optical module is carried out by the use target key data that golden finger receives target device transmission The instruction of decryption.The processor of optical module is solved by the use target key data that golden finger receives target device transmission After close instruction and random data, target key data can be extracted from FLASH memory, afterwards by target key data and Random data calculates decrypted result in being updated to the default optical module Hash operation formula being pre-stored in inside it.Using this kind of calculating After mode calculates decrypted result, it is only capable of obtaining a decrypted result.
Step 104, the processor of the optical module send to the target decrypted result by the golden finger Equipment, receives Ali's Si tower certification of the target device.
If after the processor of optical module is by calculating, obtaining multiple decrypted results, the processor of optical module need by The plurality of decrypted result is sent to target device by golden finger.Accordingly, target device can successively by each group of key number It is pre-stored in its internal default equipment Hash operation formula and (herein, target will be pre-stored according to is substituting to together with random data Hash operation formula in equipment is defined as default equipment Hash operation formula) middle calculating objective result, the target knot for calculating Fruit also includes multiple.Target device receive optical module transmission multiple decrypted results after, can by the plurality of decrypted result and its The multiple objective results for itself calculating are matched, if in multiple decrypted result, exist with objective result or Multiple objective result identical decrypted results, then target device think optical module for safe optical module, can to optical module send Ah Li Sita certifications are successfully instructed;If or, in multiple decrypted result, not with objective result identical decrypted result, then mesh Marking device thinks that optical module has security risk, and the instruction of Ali's Si tower authentification failure can be sent to optical module.
If target device sends a strip adoption target after the instruction for starting decryption is sent to optical module to optical module The instruction that key data are decrypted, then target device is in the instruction being decrypted by random data and using target key data Send to optical module, target key data can be substituting to together with random data and be pre-stored in its internal default equipment Kazakhstan Objective result is calculated in uncommon operational formula, the objective result for calculating also only one of which, accordingly, the processor of optical module only can A decrypted result is calculated, also this decrypted result can be only sent to target device, target device is receiving this After individual decrypted result, the decrypted result can be matched with the objective result that it is calculated, if the decrypted result and its The objective result for calculating is identical, then target device thinks that optical module, for safe optical module, can send Ali's Si tower to optical module Certification is successfully instructed;If or, the decrypted result is different from objective result, target device thinks that optical module has safety wind Danger, can send the instruction of Ali's Si tower authentification failure to optical module.
Further, target device runs the process of its internal equipment Ali's Si tower software and also includes:By random data Send to optical module, the instruction for being sent to decrypted result is sent to optical module.The processor of optical module is connect by golden finger After receiving being sent to the instruction of decrypted result and calculate all decrypted results of target device transmission, just can decryption knot Fruit sends Ali's Si tower certification for receiving target device to target device by golden finger, and verification process refers to foregoing description, This is repeated no more.
Further, before optical module is attached in target device by its golden finger, Ali's Si tower authentication method is also wrapped Include:One target area is set in the RAM memory.Generally, an area can be set in the embedded chip of optical module The region that address digit in embedded chip is 65536~73727 is for example set to RAM storages by domain as RAM memory Device, be embodied embodiments of the invention when, can be by address digit 65536~73727 region in subregion Target area is set to, for example, the region that address digit is 65536~66536 is set into target area, is deposited in the RAM After the target area is set in reservoir, optical module Ali's Si tower that the processor of optical module will be stored in FLASH memory is recognized Card software is loaded onto the process run in RAM memory, specifically includes:The processor of optical module will be stored in FLASH memory In optical module Ali's Si tower certification software be loaded onto in the target area in RAM memory run, that is, deposited in RAM One target area is set in reservoir, and the target area only adds optical module Ali's Si tower certification software for the processor of optical module It is loaded onto and wherein runs.
In Ali's Si tower authentication method for optical module provided in an embodiment of the present invention, optical module is pacified by its golden finger It is filled in target device, after upper electricity, its processor will be stored in the optical module Ali in the FLASH memory of its embedded chip This tower software runs in being loaded onto the RAM memory of the embedded chip, and by operation optical module Ali's Si tower software process In the key data storage for receiving to the FLASH memory, so, the processor of optical module is in operation its optical module Ali Si During tower software, without by key data storage to external memory, that is, optical module is receiving Ali's Si tower certification When, without external hardware device again, and then do not exist the problem that external device is read interior data by other instruments, only yet The secrecy of itself need to be carried out to set, you can ensure the security of internal data, confidentiality is more preferable.
Corresponding with above-mentioned Ali's Si tower authentication method for optical module, the embodiment of the present invention additionally provides one kind to be used for Ali's Si tower authentication device of optical module.
With reference to Fig. 2, Fig. 2 is illustrated that a kind of Ali's Si tower authentication device for optical module provided in an embodiment of the present invention Structural representation, Ali's Si tower authentication device includes:
Golden finger 300 and by I2The embedded chip 200 that C buses 400 are connected with the golden finger 300, the insertion Processor 201, RAM memory 202 and FLASH memory 203 that bus 205 is connected are provided with formula chip 200;
The processor 201 is used to perform operations described below:
During optical module is attached to target device by the golden finger 300 and after upper electricity, will be stored in the FLASH and deposit Optical module Ali's Si tower certification software in reservoir 203 runs in being loaded onto the RAM memory 202;
After the golden finger 300 receives the key data that the target device sends, the key data are deposited Store up to the FLASH memory 203;
Decrypted result is calculated according to the key data;
The decrypted result is sent to the target device by the golden finger 300, receives the target device Ali's Si tower certification.
Further, a target area is provided with RAM memory 202;The processor 201 will be stored in for execution Optical module Ali's Si tower certification software in the FLASH memory 203 is loaded onto the behaviour run in the RAM memory 202 Make, specifically include:The processor 201 is used to will be stored in the optical module Ali's Si tower certification in the FLASH memory 203 Software is loaded onto in the target area in the RAM memory 202 and runs.
Further, before processor 201 is used to calculate decrypted result according to the key data, it is additionally operable to perform following behaviour Make:The random data that the target device sends is received by the golden finger 300;The processor 201 is used to perform basis The key data calculate the operation of decrypted result, specifically include:The processor 201 is used for key data and described Random data calculates decrypted result in substituting into default optical module Hash operation formula.
Further, key data include multigroup;Processor 201 be used for according to the key data calculate decrypted result it Before, it is additionally operable to perform operations described below:The use target key data that the target device sends are received by the golden finger 300 The instruction being decrypted, the target key data are a group in multigroup key data;The processor 201 is used to hold It is about to the key data and the random data substitutes into the operation of calculating decrypted result in default optical module Hash operation formula, Specifically include:The processor 201 is used to for the target key data and the random data to substitute into default optical module Hash Decrypted result is calculated in operational formula.
Further, Ali's Si tower authentication device also includes:It is arranged at the communication interface in the embedded chip 200 204, for carrying out communication linkage with external equipment.During specific implementation, the communication interface 204 can be set to I2C (Inter-Integrated Circuit, twin wire universal serial bus) interface, for passing through I with external equipment2C buses are carried out Communication linkage, it is also possible to the communication interface 204 is set to other communication interfaces, for example:USB(Universal Serial Bus, USB) interface, UART (Universal Asynchronous Receiver/Transmitter, it is general different Step receiving-transmitting transmitter) interface or GPIO (General Purpose Input Output, universal input/output) interface etc..
Ali's Si tower authentication device for optical module provided in an embodiment of the present invention, can be embedded by being arranged at its The associative operation in the above-mentioned Ali's Si tower authentication method for optical module of computing device in chip, reaching connects optical module The effect of Ali's Si tower certification is carried out to it by target device.And optical module receives target device it is entered using the device During row Ali's Si tower certification, without external storage again, confidentiality is more preferable.
The embodiment of the present invention additionally provides a kind of optical module, and the optical module includes above-mentioned Ali's Si tower authentication device.Specifically During setting, the embedded chip in Ali's Si tower authentication device can be set to the embedded chip of optical module, by the Ah Golden finger in Li Sita authentication devices is set to the golden finger of optical module, and the specific setting of embedded chip and golden finger can be joined It is admitted to and states Ali's Si tower authentication device and Ali's Si tower authentication method, will not be described in detail herein.
Optical module provided in an embodiment of the present invention, due to being provided with above-mentioned Ali's Si tower authentication device inside it, without External memory again, you can smoothly receive Ali's Si tower certification of target device, applicability is more preferable.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for device or For system embodiment, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to method The part explanation of embodiment.Apparatus and system embodiment described above is only schematical, wherein as separation The unit of part description can be or may not be it is physically separate, the part shown as unit can be or Can not be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Some or all of module therein is selected the need for border to realize the purpose of this embodiment scheme.Those of ordinary skill in the art Without creative efforts, you can to understand and implement.
It should be noted that herein, such as term " including ", "comprising" or its any other variant be intended to Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Also there is other identical element in process, method, article or equipment including key element.
The above is only specific embodiment of the invention, it is noted that come for those skilled in the art Say, under the premise without departing from the principles of the invention, can also make some improvements and modifications, these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (10)

1. a kind of Ali's Si tower authentication method for optical module, it is characterised in that including:
Optical module is attached in target device by its golden finger, and after upper electricity, the processor of the optical module will be stored in flash memory Optical module Ali's Si tower certification software in FLASH memory runs in being loaded onto random access memory ram memory, described The processor of optical module, FLASH memory and RAM memory are arranged in the embedded chip of the optical module;
The processor of the optical module, will be described after the golden finger receives the key data that the target device sends Key data storage is to the FLASH memory;
The processor of the optical module calculates decrypted result according to the key data;
The processor of the optical module sends to the target device decrypted result by the golden finger, receives described Ali's Si tower certification of target device.
2. Ali's Si tower authentication method according to claim 1, it is characterised in that optical module is attached to by its golden finger Before in target device, Ali's Si tower authentication method also includes:One target area is set in the RAM memory;
Optical module Ali's Si tower certification software that the processor of the optical module will be stored in flash memory FLASH memory is loaded onto The process run in random access memory ram memory, specifically includes:
Optical module Ali's Si tower certification software that the processor of the optical module will be stored in flash memory FLASH memory is loaded onto Run in the target area in random access memory ram memory.
3. Ali's Si tower authentication method according to claim 1 and 2, it is characterised in that the processor root of the optical module Before calculating decrypted result according to the key data, Ali's Si tower authentication method also includes:The processor of the optical module leads to Cross the golden finger and receive the random data that the target device sends;
The processor of the optical module calculates the process of decrypted result according to the key data, specifically includes:
The key data and the random data are substituted into default optical module Hash operation formula by the processor of the optical module Middle calculating decrypted result.
4. Ali's Si tower authentication method according to claim 3, it is characterised in that the key data include multigroup.
5. Ali's Si tower authentication method according to claim 4, it is characterised in that the processor of the optical module is according to institute Before stating key data calculating decrypted result, Ali's Si tower authentication method also includes:The processor of the optical module passes through institute State golden finger and receive the instruction that the use target key data of the target device transmission are decrypted, the target key data It is one group in multigroup key data;
The key data and the random data are substituted into the mistake of calculating decrypted result in default optical module Hash operation formula Journey, specifically includes:Calculated during the target key data and the random data are substituted into default optical module Hash operation formula Decrypted result.
6. a kind of Ali's Si tower authentication device for optical module, it is characterised in that including:
Golden finger and by twin wire universal serial bus I2The embedded chip that C buses are connected with the golden finger, it is described embedded Processor, RAM memory and FLASH memory that bus is connected are provided with chip;
The processor is used to perform operations described below:
In it during optical module is attached to target device by the golden finger and after upper electricity, will be stored in the FLASH memory Optical module Ali's Si tower certification software be loaded onto in the RAM memory and run;
After the golden finger receives the key data that the target device sends, by the key data storage to described FLASH memory;
Decrypted result is calculated according to the key data;
The decrypted result is sent Ali's Si tower for receiving the target device to the target device by the golden finger Certification.
7. Ali's Si tower authentication device according to claim 6, it is characterised in that be provided with the RAM memory Individual target area;
The processor is loaded onto for performing the optical module Ali's Si tower certification software that will be stored in the FLASH memory The operation run in the RAM memory, specifically includes:
Optical module Ali's Si tower certification software that the processor is used to will be stored in the FLASH memory is loaded onto described Run in the target area in RAM memory.
8. Ali's Si tower authentication device according to claim 6 or 7, it is characterised in that the processor is used for according to institute Before stating key data calculating decrypted result, it is additionally operable to perform operations described below:The target device is received by the golden finger The random data of transmission;
The processor is used to perform the operation for calculating decrypted result according to the key data, specifically includes:
The processor is used to fall into a trap the key data and the default optical module Hash operation formula of random data substitution Calculate decrypted result.
9. Ali's Si tower authentication device according to claim 8, it is characterised in that the key data include multigroup;
Before the processor is used to calculate decrypted result according to the key data, it is additionally operable to perform operations described below:By institute State golden finger and receive the instruction that the use target key data of the target device transmission are decrypted, the target key data It is one group in multigroup key data;
The processor is used to perform to substitute into the key data and the random data presets optical module Hash operation formula The middle operation for calculating decrypted result, specifically includes:The processor is used for the target key data and the random data Decrypted result is calculated in the default optical module Hash operation formula of substitution.
10. a kind of optical module, it is characterised in that the optical module includes Ali's Si tower described in claim 6 to 9 any one Authentication device.
CN201611155122.3A 2016-12-14 2016-12-14 Aliskita authentication method and authentication device for optical module and optical module Active CN106817222B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611155122.3A CN106817222B (en) 2016-12-14 2016-12-14 Aliskita authentication method and authentication device for optical module and optical module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611155122.3A CN106817222B (en) 2016-12-14 2016-12-14 Aliskita authentication method and authentication device for optical module and optical module

Publications (2)

Publication Number Publication Date
CN106817222A true CN106817222A (en) 2017-06-09
CN106817222B CN106817222B (en) 2020-10-02

Family

ID=59109657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611155122.3A Active CN106817222B (en) 2016-12-14 2016-12-14 Aliskita authentication method and authentication device for optical module and optical module

Country Status (1)

Country Link
CN (1) CN106817222B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566048A (en) * 2017-09-21 2018-01-09 武汉恒泰通技术有限公司 A kind of method that the step of optical module two card is carried out using data-interface

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103150524A (en) * 2013-01-30 2013-06-12 华中科技大学 Safe memory chip, system and authentication method of safe memory chip
CN103679037A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Asymmetric encryption authentication method and embedded device based on asymmetric encryption authentication
CN105577380A (en) * 2014-10-17 2016-05-11 中兴通讯股份有限公司 Optical module authentication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103150524A (en) * 2013-01-30 2013-06-12 华中科技大学 Safe memory chip, system and authentication method of safe memory chip
CN103679037A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Asymmetric encryption authentication method and embedded device based on asymmetric encryption authentication
CN105577380A (en) * 2014-10-17 2016-05-11 中兴通讯股份有限公司 Optical module authentication method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566048A (en) * 2017-09-21 2018-01-09 武汉恒泰通技术有限公司 A kind of method that the step of optical module two card is carried out using data-interface
CN107566048B (en) * 2017-09-21 2019-09-17 武汉恒泰通技术有限公司 A method of two step of optical module, which is carried out, using data-interface demonstrate,proves

Also Published As

Publication number Publication date
CN106817222B (en) 2020-10-02

Similar Documents

Publication Publication Date Title
US10148429B2 (en) System and method for recovery key management
CN104462965B (en) Application integrity verification method and the network equipment
CN104584025B (en) For controlling equipment, the method and system of the access to webpage or the web object of web browser applications
CN108875388A (en) Real-time risk control method, device and computer readable storage medium
CN106656502A (en) Computer systems and safe execution method
CN106407717A (en) System and method of verifying electronic signature of electronic medical record in medical information system
CN108776648A (en) Data transmission method, system and FPGA isomeries accelerator card and storage medium
CN103763101B (en) A kind of method of user login validation, apparatus and system
CN107360276A (en) A kind of verification method based on double fingerprint recognitions, mobile terminal and storage device
CN101542497A (en) Extensible bios interface to a preboot authentication module
CN107408172A (en) Computer is guided from the equipment safety of users to trust
CN108073351A (en) The date storage method and credible chip of nonvolatile storage space in chip
CN103106736A (en) Identity authentication method, terminal and server
CN107194237B (en) Method and device for application program security authentication, computer equipment and storage medium
CN101739622A (en) Trusted payment computer system
CN107368744A (en) For updating the method and the equipment of measurement and control technology of fastener components
CN101673330A (en) BIOS-based computer security protection method and system
CN103761806B (en) Financial security system used for mobile terminal
CN107133512A (en) POS terminal control method and device
CN107908940A (en) The method and terminal device of a kind of fingerprint recognition
CN107171808B (en) A kind of verification method and device of electronic record authenticity
CN106682522A (en) Fingerprint encryption device and implementation method thereof
CN104778424B (en) The method that ROM brush machines are prevented based on intelligent television
CN106817222A (en) Ali's Si tower authentication method, authentication device and optical module for optical module
CN102333091A (en) Data security authentication method based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant