Invention content
The present invention provides a kind of SCM program encrypted digital signal processing method safely, the above problem of solution.
To solve the above problems, technical solution provided by the invention is as follows:A kind of SCM program encrypted number safely
Signal processing method, is equipped with mainboard and editing machine and the two is electrically connected, which is characterized in that including:
S1, mainboard information sealed up for safekeeping on mainboard in advance;
S2, when mainboard and editing machine are powered and connect, the RAM memory in editing machine is read out mainboard information,
Match;
S3, according to corresponding rule match, if information matches success, RAM memory finds match information in editing machine
The operation coding being associated;By running coding procedure match corresponding with ROM memory in editing machine accordingly, to
Execute the matched corresponding program;
If S4, RAM memory and mainboard information matches fail, RAM memory S3 steps out of service, and record information
Matching request number executes S2;When matching request number is more than preset value, stop executing S2;
S5, when the mainboard and editing machine power off, the storage loss of data of RAM memory in editing machine cannot be to mainboard
Relevant information is read out, matches.
Preferably, the mainboard information in S1 is consistent with the bar code information on the mainboard.
Preferably, RAM memory reads mainboard information in S2, matching includes:
S21, RAM memory screen corresponding type information in mainboard information, if finding the type letter being consistent
Breath, then extract the type information;
Compiling is encrypted in the compiling module that S22, extraction the type information enter in RAM memory;
Encryption information after encryption compiling is transferred in comparison module, makes encryption information and the matching in RAM memory
Database is matched;
If S23, successful match, in matching database the match information be sent in RAM memory decompiling module into
Row compiling, the operation coding after the compiling of decompiling module are sent in ROM memory in addressing register;
If S24, RAM memory screen corresponding type information in mainboard information, the type being consistent is not found
The time of screening step, number, position are sent to the Cloud Server in enterprise by information, the feedback module in RAM memory;
If S25, encryption information are matched with the matching database in RAM memory, it fails to match, returns to S21
In step.
Preferably, by running coding procedure match corresponding with ROM memory in editing machine, the step accordingly in S3
Suddenly include:
S31, operation coding is sent in ROM memory in addressing register;
S32, addressing register execute program accordingly according to operation coding in ROM memory in finder;
S33, when addressing register according to operation coding find in ROM memory it is corresponding execute program when, if ROM
Operation detection module in memory, which detects, executes program when not working, cloud service detection information being sent in enterprise
Device continues to execute S31.
Advantageous effect compared with the existing technology is that using the above scheme, the present invention is by three safeguard procedures to product
It is protected, first, ROM's and RAM is interrelated in editing machine, has to cracking programs, can not also run;Second, editor
In device ROM by read information compiling and decompiling is encrypted, make reading information have no to be associated with output information, third,
Loss of data characteristic is powered off by RAM, RAM power-off is caused to make stealer that can not read information when editing machine is detached with mainboard,
In summary technology makes the stealing property probability of product further be reduced.
Specific implementation mode
To facilitate the understanding of the present invention, in the following with reference to the drawings and specific embodiments, the present invention will be described in more detail.
The preferred embodiment of the present invention is given in attached drawing.But the present invention can realize in many different forms, and it is unlimited
In this specification described embodiment.Make to the disclosure on the contrary, purpose of providing these embodiments is
Understand more thorough and comprehensive.
It should be noted that when element is referred to as " being fixed on " another element, it can be directly on another element
Or there may also be elements placed in the middle.When an element is considered as " connection " another element, it can be directly connected to
To another element or it may be simultaneously present centering elements.Term used in this specification " fixation ", " integrated molding ",
For illustrative purposes only, the similar unit of structure is to identical label in the figure for "left", "right" and similar statement
Mark.
Unless otherwise defined, technical and scientific term all used in this specification is led with the technology for belonging to the present invention
The normally understood meaning of technical staff in domain is identical.Used term is only in the description of the invention in this specification
The purpose of description specific embodiment is not intended to the limitation present invention.
As shown in Figs. 1-2, one embodiment of the present of invention is:A kind of SCM program encrypted Digital Signal Processing safely
Method, is equipped with mainboard and editing machine and the two is electrically connected, which is characterized in that including:
S1, mainboard information sealed up for safekeeping on mainboard in advance;
S2, when mainboard and editing machine are powered and connect, the RAM memory in editing machine is read out mainboard information,
Match;
S3, according to corresponding rule match, if information matches success, RAM memory finds match information in editing machine
The operation coding being associated;By running coding procedure match corresponding with ROM memory in editing machine accordingly, to
Execute the matched corresponding program;
If S4, RAM memory and mainboard information matches fail, RAM memory S3 steps out of service, and record information
Matching request number executes S2;When matching request number is more than preset value, stop executing S2;
S5, when the mainboard and editing machine power off, the storage loss of data of RAM memory in editing machine cannot be to mainboard
Relevant information is read out, matches.
Preferably, the mainboard information in S1 is consistent with the bar code information on the mainboard.
Such as;Information from production to finished product that bar code information describes the mainboard summarizes code, this summarizes code
It is unique, and stores the memory of mainboard information and the installation position communication linkage of editing machine, for example summarizing code can be according to enterprise
Industry compiling rule is compiled, for example the password encryption principle of enterprises is compiled.
Preferably, RAM memory reads mainboard information in S2, matching includes:
S21, RAM memory screen corresponding type information in mainboard information, if finding the type letter being consistent
Breath, then extract the type information;
Such as:When the type of the type mismatch conjunction encryption principle of mainboard information, will not read;Such as;Encrypt principle it
Type afterwards is the combination of number and letter, and when second capitalizes A, the means such as relevant encryption principle such as letter 0 at the 7th
It can be with.When the I/O control circuits in RAM memory read mainboard information, in RAM memory screening module to mainboard information into
Row is screened according to the rule of encryption principle, if can not find corresponding information in corresponding position, then it represents that screening failure,
Mainboard information will not be read again and carry out next step.
Compiling is encrypted in the compiling module that S22, extraction the type information enter in RAM memory;
Encryption information after encryption compiling is transferred in comparison module, makes encryption information and the matching in RAM memory
Database is matched;
Such as:When encryption information is one 10 address code A4A3A2A1A0=00101,
When B4B3B2B1B0=00011, then the 3rd row of the 5th row are deposited by column address decoder and row address decoder
Storage unit extracts, and is compared by comparison module.
If S23, successful match, in matching database the match information be sent in RAM memory decompiling module into
Row compiling, the operation coding after the compiling of decompiling module are sent in ROM memory in addressing register;
Such as:Compiling module and decompiling module can be mutually matched or both be independent from each other compiling rule
Then;In order to enhance safety, the two is that mutually independent compiling rule is optimal.
If S24, RAM memory screen corresponding type information in mainboard information, the type being consistent is not found
The time of screening step, number, position are sent to the Cloud Server in enterprise by information, the feedback module in RAM memory;
Such as;When enterprise receives feedback information, user behavior rule can be determined according to the information content of user, favorably
The information of product is grasped in enterprise;Such as;The number of feedback information is defaulted as simply installing between being more than 1 to 10 and tear open
Unload, the number of feedback information when be more than 10 or more be defaulted as malice carry out the information such as crack.
Such as:When feedback information reaches maximum preset value, I/O control circuits are stopped.
If S25, encryption information are matched with the matching database in RAM memory, it fails to match, returns to S21
In step.
Preferably, by running coding procedure match corresponding with ROM memory in editing machine, the step accordingly in S3
Suddenly include:
S31, operation coding is sent in ROM memory in addressing register;
S32, addressing register execute program accordingly according to operation coding in ROM memory in finder;
S33, when addressing register according to operation coding find in ROM memory it is corresponding execute program when, if ROM
Operation detection module in memory, which detects, executes program when not working, cloud service detection information being sent in enterprise
Device continues to execute S31.
Advantageous effect compared with the existing technology is that using the above scheme, the present invention is by three safeguard procedures to product
It is protected, first, ROM's and RAM is interrelated in editing machine, has to cracking programs, can not also run;Second, editor
In device ROM by read information compiling and decompiling is encrypted, make reading information have no to be associated with output information, third,
Loss of data characteristic is powered off by RAM, RAM power-off is caused to make stealer that can not read information when editing machine is detached with mainboard,
In summary technology makes the stealing property probability of product further be reduced.
It should be noted that above-mentioned each technical characteristic continues to be combined with each other, the various embodiments not being enumerated above are formed,
It is accordingly to be regarded as the range of description of the invention record;Also, for those of ordinary skills, it can add according to the above description
To improve or convert, and all these modifications and variations should all belong to the protection domain of appended claims of the present invention.