CN109150813A - A kind of verification method and device of equipment - Google Patents

A kind of verification method and device of equipment Download PDF

Info

Publication number
CN109150813A
CN109150813A CN201710503208.9A CN201710503208A CN109150813A CN 109150813 A CN109150813 A CN 109150813A CN 201710503208 A CN201710503208 A CN 201710503208A CN 109150813 A CN109150813 A CN 109150813A
Authority
CN
China
Prior art keywords
information
target device
verification information
verification
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710503208.9A
Other languages
Chinese (zh)
Other versions
CN109150813B (en
Inventor
周双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Haikang Storage Technology Co., Ltd
Original Assignee
Wuhan Haikang Storage Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Haikang Storage Technology Co Ltd filed Critical Wuhan Haikang Storage Technology Co Ltd
Priority to CN201710503208.9A priority Critical patent/CN109150813B/en
Publication of CN109150813A publication Critical patent/CN109150813A/en
Application granted granted Critical
Publication of CN109150813B publication Critical patent/CN109150813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The embodiment of the invention provides a kind of verification method of equipment and device, method includes: to verify equipment after determining target device access to be verified, and the first verification information is obtained from target device;It obtains for verifying whether target device is the second legal verification information;First verification information is matched with the second verification information;When successful match, determine target device for legal copy.In the embodiment of the present invention, equipment is verified according to the first verification information stored in the second verification information obtained and target device, whether automatic verifying target device is legal, verification process is participated in without artificial, and the first verification information is not necessarily to external disclosure, first verification information is not easy to be forged, so that verifying definitive result is more accurate, realizes to whether target device is that legal effective identification is verified.

Description

A kind of verification method and device of equipment
Technical field
The present invention relates to equipment safety technical fields, more particularly to the verification method and device of a kind of equipment.
Background technique
On Vehicles Collected from Market, often exist target device (such as: SSD (Solid State Drive, solid state hard disk) etc. tool Have the hardware device of store function) the case where being imitated.In the prior art, the manufacturer of productive target equipment in order to prevent oneself give birth to The target device of production is imitated, and generally all can be sticked unique label for target device produced, is to identify target device The target device that oneself produces, wherein above-mentioned label may include SN (Serial Number, product ID, also known as machine Code, authentication code, application for registration code etc.), WWN (World Wide Name, the whole world unique name), MODLE No (Model Number, product type) and the labels such as two dimensional code.
However, above-mentioned label is easy to be imitated.Consumer and manufacturer still can not be by above-mentioned tag recognition markets Target device whether be it is legal, i.e. consumer and manufacturer can not recognize whether the target device in market is as corresponding to label Manufacturer's target device produced.
Summary of the invention
The verification method and device for being designed to provide a kind of equipment of the embodiment of the present invention, with realize be to hardware device It is no to be verified for legal effective identification.Specific technical solution is as follows:
On the one hand, the embodiment of the invention provides a kind of verification methods of equipment, which comprises
Verifying equipment obtains the first verifying letter after determining target device access to be verified from the target device Breath;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is positive The information of version;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described Two verification informations include the second manufacturer's information;
Described the step of being matched first verification information with second verification information, comprising:
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
Described the step of obtaining the first verification information from the target device, comprising:
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described Two verification informations include the second firmware information;
Described the step of being matched first verification information with second verification information, comprising:
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
Described the step of obtaining the first verification information from the target device, comprising:
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm Breath;
Before described the step of being matched first verification information with second verification information, the method Further include:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted, The first verification information after being decrypted;
Described the step of being matched first verification information with second verification information, comprising:
The first verification information after decryption is matched with second verification information.
Optionally, described before the step of obtaining the first verification information in the target device, the method is also wrapped It includes:
Verifying equipment obtains the device identification and the target in the target device after determining target device access The random number that equipment generates;
According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, first is generated and adds Ciphertext data;
First encryption data is sent to the target device so that the target device using the random number with And first encryption data is decrypted in second Encryption Algorithm, obtains first tentation data;It is pre- to obtain second Fixed number evidence judges whether first tentation data and the second tentation data obtained are identical, when judging identical, to described It verifies equipment and sends the first information, wherein the first information are as follows: allow the verifying equipment to obtain described first for describing The information of verification information;
The first information is received and responded, the step for obtaining the first verification information from the target device is executed Suddenly.
On the other hand, the embodiment of the invention provides a kind of verifying device of equipment, described device includes:
First obtains module, for after determining target device access to be verified, obtaining the from the target device One verification information;
Second obtains module, for obtaining the second verification information, wherein second verification information are as follows: for verifying State whether target device is legal information;
Matching module, for matching first verification information with second verification information;
First determining module, for when successful match, determining the target device for legal copy.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described Two verification informations include the second manufacturer's information;
The matching module, is specifically used for
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
Described first obtains module, is specifically used for
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described Two verification informations include the second firmware information;
The matching module, is specifically used for
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
Described first obtains module, is specifically used for
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm Breath;
Described device further includes that third obtains module and deciphering module;
The third obtains module, for described that first verification information and verification information progress is matched Before step, the target cipher key and first Encryption Algorithm are obtained;
The deciphering module, for utilizing the target cipher key and first Encryption Algorithm, to obtained first Verification information is decrypted, the first verification information after being decrypted;
The matching module, is specifically used for
The first verification information after decryption is matched with second verification information.
Optionally, described device further includes the 4th acquisition module, the 5th acquisition module, encrypting module, sending module and connects Receive respond module;
It is described 4th obtain module, for described the step of obtaining the first verification information from the target device it Before, verifying equipment obtains the device identification in the target device and the target device after determining target device access The random number of generation;
Described 5th obtains module, for obtaining the first tentation data according to the device identification;
The encrypting module, for utilize the random number and the second Encryption Algorithm, to first tentation data into Row encryption, generates the first encryption data;
The sending module, for first encryption data to be sent to the target device, so that the target is set It is standby that first encryption data is decrypted using the random number and second Encryption Algorithm, it is pre- to obtain described first Fixed number evidence;The second tentation data is obtained, judges whether first tentation data and the second tentation data obtained are identical, when When judging identical, the first information is sent to the verifying equipment, wherein the first information are as follows: test described in permission for describing Card equipment obtains the information of first verification information;
The reception respond module triggers described first and obtains module for receiving and responding the first information.
On the other hand, the embodiment of the invention provides a kind of verifying equipment, including processor, communication interface, memory and Communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, being realized that the embodiment of the present invention is above-mentioned and being set Standby verification method.
In the embodiment of the present invention, verifying equipment is obtained from target device after determining target device access to be verified First verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information and the Two verification informations are matched;When successful match, determine target device for legal copy.Verifying equipment is tested according to obtained second The first verification information stored in card information and target device, it is automatic to verify whether target device is legal, verification process Without manually participating in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying determines As a result more accurate, it realizes to whether target device is that legal effective identification is verified.Certainly, it implements any of the products of the present invention Or method must be not necessarily required to reach all the above advantage simultaneously.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the verification method of equipment provided by the embodiment of the present invention;
Fig. 2A is a kind of schematic diagram of method of salary distribution of the block0 of SSD;
Fig. 2 B is the schematic diagram of another method of salary distribution of the block0 of SSD;
Fig. 3 is a kind of another flow diagram of the verification method of equipment provided by the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of SSD controller;
Fig. 5 is a kind of structural schematic diagram of the verifying device of equipment provided by the embodiment of the present invention;
Fig. 6 is a kind of another structural schematic diagram of the verifying device of equipment provided by the embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram for verifying equipment provided by the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention provides a kind of verification method of equipment and devices, to realize to whether hardware device is legal Effective identification verifying.
As shown in Figure 1, may include steps of the embodiment of the invention provides a kind of verification method of equipment:
S101: verifying equipment obtains the first verifying letter after determining target device access to be verified from target device Breath;
S102: the second verification information is obtained, wherein the second verification information are as follows: for verifying whether target device is legal Information;
Wherein, realize that the functional software of the verification method of equipment provided by the embodiment of the present invention can be special client Software is held, is also possible to the plug-in unit of other softwares with authentication function, this is all possible.Above-mentioned functional software can be installed In any electronic equipment (such as: desktop computer, tablet computer etc.).
In one implementation, above-mentioned functional software can be identified with " windows tool ", it is to be understood that this When, above-mentioned functional software may be only capable of being installed in the electronic equipment that operating system is windows operating system.
It is understood that above-mentioned second verification information can store in above-mentioned verifying equipment, it is stored in It states in any equipment or cloud with store function that verifying equipment is connected.In one implementation, above-mentioned function is soft Part is installed in electronic equipment, and equipment is verified provided by the embodiment of the present invention to be formed, while can be by above-mentioned functional software It is associated for verifying whether target device is that the second legal verification information is pre-stored in verifying equipment, at this point, above-mentioned the Two verification informations are stored in verifying equipment.In another implementation, above-mentioned functional software is installed in electronic equipment, with shape At verifying equipment provided by the embodiment of the present invention, while by above-mentioned verifying equipment and above-mentioned second verification information can be stored with Equipment or cloud be attached so that above-mentioned verifying equipment can be from the equipment or cloud for being stored with above-mentioned second verification information In, obtain above-mentioned second verification information.Etc., this is all possible.
Above-mentioned target device to be verified can be any hardware device with store function, for example: it is above-mentioned to The target device of verifying can be SSD (Solid State Drive, solid state hard disk) etc..
It is understood that equipment is verified after determining target device access to be verified, it can be first to target device It sends the first information to be instructed, further, target device is instructed according to the above-mentioned first information, and determination allows to verify After equipment obtains the first verification information, verifying equipment can directly obtain the first verification information from target device.Wherein, above-mentioned First verification information can be in the factory of above-mentioned target device, is pre-stored within by R&D and production person predetermined in target device Information.Further, above-mentioned predetermined information is associated with above-mentioned functional software, is installed in electronic equipment when by above-mentioned functional software When, above-mentioned predetermined information can be pre-stored in above-mentioned electronic equipment (verifying equipment) simultaneously, alternatively, can also be by above-mentioned electronics Equipment (verifying equipment) is attached with the equipment or cloud for being stored with above-mentioned second verification information, of the invention real can be realized Apply the verification method of equipment provided by example.I.e. above-mentioned verifying equipment can be by from verifying equipment is local or verifying company of equipment institute The equipment connect or the predetermined information obtained in cloud (the second verification information), and the predetermined information stored from target device (the first verification information) realizes the verifying to target device.
It is understood that the first verification information in target device be externally (such as: the user of target device, verifying The user etc. of equipment) it is sightless;Also, it when the second verification information is stored in verifying equipment, or is stored in and verifies It is also externally sightless when in the equipment of equipment connection or cloud.Thus, it is possible to preferably improve above-mentioned second verifying The confidentiality of information and the first verification information further can be improved to whether target device is testing for legal verifying Demonstrate,prove the accuracy of result.
It is emphasized that the guarantee to the equity of the user of target device in order to better improve, it can be by above-mentioned function Energy software is published in network, so that any pair of target device has the user of verifying demand, can download above-mentioned function at any time For verifying whether target device is the second legal verification information associated by software and the above-mentioned functional software of acquisition, with energy It is enough to realize to whether target device is legal verifying.
S103: the first verification information is matched with the second verification information;
S104: when successful match, determine target device for legal copy.
Wherein, multiple second verifyings may be stored with by verifying in equipment or with verifying in the equipment or cloud that equipment is connect Information, every one second verification information are equal are as follows: for verifying whether equipment to be verified is legal information.By the first verification information Matched one by one with every one second verification information, when the first verification information and when the second verification information successful match, show on It states in verifying equipment the second verification information obtained comprising the first verification information, at this point, can then determine above-mentioned target device For legal copy;Conversely, when it fails to match for the first verification information and the second verification information, show above-mentioned verifying equipment obtained the The first verification information is not included in two verification informations, at this point, can then determine above-mentioned target device for pirate (i.e. mountain vallage product).
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
Also, the embodiment of the present invention has preferably ensured the equity of the user of target device, and prevents to a certain extent The case where target device is forged (by mountain vallage).
It in one implementation, may include the corresponding first manufacturer letter of target device in above-mentioned first verification information Breath, alternatively, include corresponding first firmware information of target device, alternatively, include corresponding first manufacturer's information of target device with And corresponding first firmware information of target device, etc., this is all possible.Above-mentioned first manufacturer's information can be with are as follows: about life The relevant information of the manufacturer of above-mentioned target device is produced, such as: the identification information of manufacturer, the pre-set mark information of manufacturer are (pre- If character string) etc..Above-mentioned first firmware information can be with are as follows: about the relevant information of above-mentioned target device itself, such as: it is above-mentioned SN (Serial Number, product ID, also known as machine code, authentication code, application for registration code etc.), the WWN of target device The labels such as (World Wide Name, the unique name in the whole world), MODLENo (Model Number, product type) and two dimensional code, Etc..
In a kind of situation, when above-mentioned first verification information includes corresponding first manufacturer's information of target device, above-mentioned Two verification informations include the second manufacturer's information;
Described the step of first verification information is matched to (S103) with the second verification information, may include:
First manufacturer's information is matched with the second manufacturer's information.
In one implementation, above-mentioned first manufacturer's information can be with are as follows: passes through USB key (Universal Serial Bus Key) a string of character strings generating at random, wherein above-mentioned character string Existence and uniquenss.It, can be with before target device factory Above-mentioned character string is stored in above-mentioned target device in advance, and above-mentioned character string and above-mentioned functional software are associated.
For example, above-mentioned target device can be SSD, and above-mentioned first manufacturer's information can be with are as follows: passes through USB key A string of character strings that (Universal Serial Bus Key) is generated at random.It should be understood that SSD factory when, need into Row burning firmware information, during above-mentioned burning firmware information, a string of words will being generated at random above by USB key Symbol string is burned onto SSD.
In order to guarantee the safety and non-volatibility of the first stored manufacturer's information, above-mentioned first manufacturer can be believed Breath is stored in the high storage location of stability in target device, specifically, first manufacturer's information can store in target First predetermined storage location of equipment;
Described the step of the first verification information (S101) is obtained from target device, may include:
The first manufacturer's information is obtained from the first predetermined storage location in target device.
For example, above-mentioned target device is SSD, it is to be understood that the storage particle in SSD is by Nand Flash structure Be made of at, every piece of Nand Flash predetermined quantity block (such as: 1024 pieces or 2048 pieces etc.).Wherein, in Nand Flash 1 block be made of 1024 pages (Page), the size of 1 page is 16Kbyte.Due to the block block0 of Nand Flash It is highest piece of stability, in general, as the region of storage code (correlative code of SSD) and can deposit the block0 of SSD Store up the region of the pre-set information of SSD.In the embodiment of the present invention, above-mentioned first manufacturer's information can be stored in block0 In, i.e. block0 can be the first predetermined storage location in the embodiment of the present invention.
It in one implementation, as shown in Figure 2 A, is a kind of schematic diagram of method of salary distribution of the block0 of SSD.Wherein, Page0~Page10 is for storing " code (correlative code of SSD) ", and Page11 is used as " original bad block message area ", for depositing Store up the original bad block message (such as: original bad block identification and/or original bad number of blocks etc.) of SSD, Page12 is as " increasing bad block newly The information area " increases bad block message (such as: increasing bad block identification newly and/or increase bad number of blocks newly etc.) newly for store SSD, Page13 is used as " Huai Kuai distributed intelligence area ", the distributed intelligence (such as: bad block position) of the bad block for storing SSD, Page14~Page20 is used as " other information area ", for storing the other information (such as: the mark of SSD) about SSD, Page21~Page1023 is used as " reserved area ", for storing some subsequent newly-added informations about SSD.
It in the embodiment of the present invention, needs for above-mentioned first manufacturer's information to be stored in block0, is SSD as shown in Figure 2 B Block0 another method of salary distribution schematic diagram.Wherein, point of Page0~Page10, Page11, Page12, Page13 Identical as Fig. 2A with situation, Page21 is used as " manufacturer's information area " (i.e. the first predetermined storage location), for storing the first of SSD Manufacturer's information, Page22~Page1023 are still used as " reserved area ".
In a kind of situation, when above-mentioned first verification information includes corresponding first firmware information of above-mentioned target device, on Stating the second verification information includes the second firmware information;
Described the step of first verification information is matched to (S103) with the second verification information, may include:
First firmware information is matched with the second firmware information.
In one implementation, above-mentioned first firmware information is stored in the second predetermined storage location of target device;
Described the step of the first verification information (S101) is obtained from target device, may include:
The first firmware information is obtained from the second predetermined storage location in target device.
In one implementation, above-mentioned target device can be SSD, at this point it is possible to which above-mentioned first firmware information is deposited It is stored in the SSD controller of SSD, for example, being stored in the SRAM (Static RAM, Static RAM) of SSD controller. The accuracy of verification result in order to better improve can set the memory module of the first firmware information in target device to After target device power down, the first firmware information is lost automatically, automatically generates the first firmware information after target device energization.And And by presetting create-rule, the first firmware information generated is controlled.In one implementation, above-mentioned default generation rule It then can be with are as follows: the SN+MODLENo+WWN of target device.It is to be understood that with the process of target device power down, energization, circulation " SN " or " MODLE No " or " WWN " is used as the first firmware information.At this point, the second firmware included by the second verification information is believed It is needed in breath comprising above-mentioned " SN ", " MODLENo " and " WWN ".
Furthermore it is also possible to understand are as follows: by pre-defined algorithm (such as: simple logical operation or MD5 value operation etc.) to upper After stating " SN " and/or " MODLENo " and/or " WWN " progress operation, using gained operation result as the first firmware information, at this point, It is needed in second firmware information included by second verification information comprising above-mentioned " SN " and/or " MODLENo " and/or " WWN " point Not according to above-mentioned pre-defined algorithm operation after, resulting operation result, etc..The embodiment of the present invention does not advise above-mentioned default generation Concrete form then is defined.
It is above-mentioned when above-mentioned first verification information includes corresponding first manufacturer's information of target device in another situation First verification information can also be comprising above-mentioned corresponding first firmware information of target device (alternatively, when above-mentioned first verifying letter When ceasing the first firmware information corresponding including above-mentioned target device, above-mentioned first verification information can also be set comprising above-mentioned target Standby corresponding first manufacturer's information).At this point it is possible to be performed simultaneously or sequentially execute above-mentioned by the first manufacturer's information and the second manufacturer The step of information is matched and above-mentioned the step of being matched the first firmware information with the second firmware information, when above-mentioned When being successful match with result, above-mentioned target device is determined for legal copy, conversely, when there are at least one in above-mentioned matching result For when it fails to match, it is determined that above-mentioned target device is piracy.Utilize above-mentioned first manufacturer's information, the first firmware information and Two manufacturer's information, the second firmware information carry out double verification to target device, more improve the accuracy of verification result, mention Guarantee of the height to the equity of target device user reduces the risk that target device is forged.
In order to preferably guarantee the accuracy of verification result, above-mentioned first verification information can be encrypted, transmitted During, transmit encrypted first verification information so that even if encrypted first verification information in transmission process, quilt Forgery personnel illegally intercept, and forgery personnel can not also know the key for decrypting above-mentioned encrypted first verification information, to obtain The first verification information after decryption, avoids the transmission process in the first verification information and is forged personnel and illegally intercept and know, Further, the case where personnel forge above-mentioned target device is forged.In one implementation, above-mentioned first verification information can be with To carry out encrypted information using target cipher key and the first Encryption Algorithm;
Before described the step of first verification information is matched (S103) with the second verification information, the method is also May include:
Obtain target cipher key and the first Encryption Algorithm;
Using target cipher key and the first Encryption Algorithm, the first verification information obtained is decrypted, is decrypted The first verification information afterwards;
Described the step of first verification information is matched to (S103) with the second verification information, may include:
The first verification information after decryption is matched with the second verification information.
It should be noted that above-mentioned first Encryption Algorithm can for AES (Advanced Encryption Standard, Advanced Encryption Standard) etc., the embodiment of the present invention is not defined the specific algorithm of the first Encryption Algorithm.
It is understood that verifying equipment or the equipment being connect with verifying equipment or may be stored in cloud multiple close Key and Encryption Algorithm, at this point, it is corresponding according to the corresponding each equipment of storage of mark of each equipment to verify meeting in equipment for the ease of management Key and Encryption Algorithm.In turn, in order to preferably determine target cipher key and the first Encryption Algorithm, verifying equipment can be first The device identification for first obtaining target device is obtained according to the device identification of target device from multiple keys and Encryption Algorithm State target cipher key and the first Encryption Algorithm.
In order to preferably guarantee the accuracy of verification result, also, guarantee the safety of target device, verifies equipment from mesh Before obtaining the first verification information in marking device, target device can also verify whether that allowing to verify equipment obtains the first verifying letter Breath.In one implementation, as shown in figure 3, the embodiment of the present invention may include steps of:
S301: after determining target device access, the device identification and target obtained in target device is set verifying equipment The standby random number generated;
S302: according to device identification, the first tentation data is obtained;
S303: utilizing random number and the second Encryption Algorithm, encrypt to the first tentation data, generates the first encryption number According to;
S304: being sent to target device for the first encryption data, so that target device utilizes random number and the second encryption The first encryption data is decrypted in algorithm, obtains the first tentation data;The second tentation data is obtained, judges the first tentation data It is whether identical as the second tentation data, when judging identical, the first information is sent to verifying equipment, wherein the first information are as follows: use Allow to verify the information that equipment obtains the first verification information in description;Above-mentioned second tentation data can store in target device In local;
S305: receiving and responds the first information;
S306: the first verification information is obtained from target device;
S307: the second verification information is obtained, wherein the second verification information are as follows: for verifying whether target device is legal Information;
S308: the first verification information is matched with the second verification information;
S309: when successful match, determine target device for legal copy.
Wherein, above-mentioned S306 is identical as S101 shown in Fig. 1, and above-mentioned S307 is identical as S102 shown in Fig. 1, above-mentioned S308 is identical as S103 shown in Fig. 1, and above-mentioned S309 is identical as S104 shown in Fig. 1.
It is understood that above-mentioned first Encryption Algorithm and above-mentioned second Encryption Algorithm may be the same or different, this All it is possible.
Wherein, verifying equipment can send the second information acquisition to target device first after determining target device access Instruction, further, target device is instructed according to above-mentioned second information acquisition, and determining, which allows to verify equipment, obtains device identification Afterwards, verifying equipment the device identification of target device can be directly obtained from target device, and obtain target device generation with Machine number then carries out the verifying process of follow-up equipment.
In one implementation, above-mentioned target device is SSD, and SSD can generally be based on its SSD controller, set with verifying It is standby carry out information exchange (such as: SSD controller can receive above-mentioned second information acquisition instruction, and according to above-mentioned second information It obtains to instruct and determines whether that verifying equipment obtains device identification, after determining allows to verify equipment acquisition device identification, lead to Know that verifying equipment obtains device identification, or device identification be sent to verifying equipment, etc.), in order to realize above-described embodiment, SSD controller is needed with the function of being carried out encryption and decryption using the second Encryption Algorithm and has the function of generating random number.
In one implementation.As shown in figure 4, the embodiment of the present invention can add encryption and decryption mould in SSD controller Block (for utilizing the second Encryption Algorithm to carry out encryption and decryption) and random-number-generating module (for generating random number).In addition, above-mentioned It can also be by software realization, at this point it is possible to will using the function that the second Encryption Algorithm carries out encryption and decryption and generation random number Above-mentioned software is burned onto SSD controller, this is all possible.Wherein, can also include in the SSD controller in Fig. 4 " Sata/Pice interface " (i.e. the Pice interface of Sata agreement), " GPI0 " (i.e. General Programmable Input/ Output, general programmable I/O port), " (Error Checking and Correcting and entangles at error checking ECC It is wrong)/LDPC (Low Density Parity Check Code, low density parity check code) ", " (Double Data Rate synchronizes dynamic DDR State random access memory, Double Data Rate) interface ", " SRAM " and " FLASH interface ".
Below with a specific embodiment, the verification method for being provided for the embodiments of the invention a kind of equipment is illustrated:
Verifying equipment A sends the instruction of the second information acquisition after determining target device B access, to target device B;
Target device B receives and responds the instruction of above-mentioned second information acquisition, to verifying equipment A sending device mark a and Generated random number b;
It verifies equipment A and obtains above equipment mark a and random number b;A is identified according to above equipment, it is predetermined to obtain first Data C;Using random number b and the second Encryption Algorithm D, the first tentation data C is encrypted, generates the first encryption data c; First encryption data c is sent to target device B;
Target device B obtains the first encryption data c, and target device B is using random number b and the second Encryption Algorithm D to first Encryption data c is decrypted, and obtains the first tentation data C;The second tentation data E is obtained, judges the first tentation data C and second Whether tentation data E is identical, and when judging identical, send to verifying equipment A allows verifying equipment A to obtain first for description is tested Demonstrate,prove the first information M of information N;Wherein, above-mentioned second tentation data E can store in the local of target device B;
Verifying equipment A receives and responds first information M, the first verification information N is obtained from target device B, wherein first Verification information N is to carry out encrypted information using target cipher key P and the first Encryption Algorithm Q;
It verifies equipment A and obtains target cipher key P and the first Encryption Algorithm Q, and calculated using the encryption of target cipher key P and first The first verification information N is decrypted in method Q, the first verification information N after being decrypted;And the second verification information is obtained, it will solve The first verification information N after close is matched with the second verification information obtained, when successful match, determines target device B For legal copy.Wherein, above-mentioned target cipher key P, the first Encryption Algorithm Q and the second verification information can store in verifying equipment A, It is stored in the equipment being connect with verifying equipment A with store function or cloud.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of verifying devices of equipment, as shown in figure 5, The apparatus may include:
First obtains module 510, for being obtained after determining target device access to be verified from the target device First verification information;
Second obtains module 520, for obtaining the second verification information, wherein second verification information are as follows: for verifying Whether the target device is legal information;
Matching module 530, for matching first verification information with second verification information;
First determining module 540, for when successful match, determining the target device for legal copy.
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
In one implementation, when first verification information includes corresponding first manufacturer's information of the target device When, second verification information includes the second manufacturer's information;
The matching module 530, is specifically used for
First manufacturer's information is matched with second manufacturer's information.
In one implementation, first manufacturer's information is stored in the first predetermined storage position of the target device It sets;
Described first obtains module 510, is specifically used for
First manufacturer's information is obtained from first predetermined storage location in the target device.
In one implementation, when first verification information includes corresponding first firmware information of the target device When, second verification information includes the second firmware information;
The matching module 530, is specifically used for
First firmware information is matched with second firmware information.
In one implementation, first firmware information is stored in the second predetermined storage position of the target device It sets;
Described first obtains module 510, is specifically used for
First firmware information is obtained from second predetermined storage location in the target device.
In one implementation, first verification information is to be added using target cipher key and the first Encryption Algorithm Information after close;
Described device further includes that third obtains module and deciphering module;
The third obtains module, for described that first verification information and verification information progress is matched Before step, the target cipher key and first Encryption Algorithm are obtained;
The deciphering module, for utilizing the target cipher key and first Encryption Algorithm, to obtained first Verification information is decrypted, the first verification information after being decrypted;
The matching module 530, is specifically used for
The first verification information after decryption is matched with second verification information.
In one implementation, based on structure shown in Fig. 5, as shown in fig. 6, described device can also include described device It further include that the 4th acquisition module the 610, the 5th obtains module 620, encrypting module 630, sending module 640 and receives respond module 650;
Described 4th obtains module 610, in described the step of obtaining the first verification information from the target device Before, verifying equipment obtains the device identification in the target device and the target is set after determining target device access The standby random number generated;
Described 5th obtains module 620, for obtaining the first tentation data according to the device identification;
The encrypting module 630, for utilizing the random number and the second Encryption Algorithm, to first tentation data It is encrypted, generates the first encryption data;
The sending module 640, for first encryption data to be sent to the target device, so that the target First encryption data is decrypted in random number described in equipment utilization and second Encryption Algorithm, obtains described first Tentation data;The second tentation data is obtained, judges whether first tentation data and the second tentation data obtained are identical, When judging identical, the first information is sent to the verifying equipment, wherein the first information are as follows: for describing described in permission Verifying equipment obtains the information of first verification information;
The reception respond module 650 triggers described first and obtains module for receiving and responding the first information 510。
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of verifying equipment, as shown in fig. 7, comprises Processor 710, communication interface 720, memory 730 and communication bus 740, wherein processor 710, communication interface 720, storage Device 730 completes mutual communication by communication bus 740,
Memory 730, for storing computer program;
Processor 710 when for executing the computer program stored on memory 730, realizes following steps:
After determining target device access to be verified, the first verification information is obtained from the target device;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is positive The information of version;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described Two verification informations include the second manufacturer's information;
The verifying equipment is realized described by first verification information and second verification information progress in execution During matching, it is specifically used for:
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
The verifying equipment execute realize it is described obtain the first verification information from the target device during, tool Body is used for:
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described Two verification informations include the second firmware information;
The verifying equipment is realized described by first verification information and second verification information progress in execution During matching, it is specifically used for:
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
The verifying equipment execute realize it is described obtain the first verification information from the target device during, tool Body is used for:
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm Breath;
The verifying equipment is realized described by first verification information and second verification information progress in execution With before, it is also used to:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted, The first verification information after being decrypted;
The verifying equipment is realized described by first verification information and second verification information progress in execution During matching, it is specifically used for:
The first verification information after decryption is matched with second verification information.
Optionally, the verifying equipment execute realize it is described obtained from the target device the first verification information it Before, it is also used to:
After determining target device access, the device identification and the target device obtained in the target device is generated Random number;
According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, first is generated and adds Ciphertext data;
First encryption data is sent to the target device so that the target device using the random number with And first encryption data is decrypted in second Encryption Algorithm, obtains first tentation data;It is pre- to obtain second Fixed number evidence judges whether first tentation data and the second tentation data obtained are identical, when judging identical, to described It verifies equipment and sends the first information, wherein the first information are as follows: allow the verifying equipment to obtain described first for describing The information of verification information;
The first information is received and responded, the mistake for obtaining the first verification information from the target device is executed Journey.
The communication bus that above-mentioned verifying equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control bus etc..For just It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned verifying equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), also may include non-easy The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also To be storage device that at least one is located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete Door or transistor logic, discrete hardware components.
It is described the embodiment of the invention also provides a kind of computer readable storage medium corresponding to above method embodiment It is stored with computer program in computer readable storage medium, following step is realized when the computer program is executed by processor It is rapid:
After determining target device access to be verified, the first verification information is obtained from the target device;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is positive The information of version;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described Two verification informations include the second manufacturer's information;
The computer program is realized described by first verification information and second verifying when being executed by processor During information progress is matched, it is specifically used for:
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
The first verification information is obtained from the target device described in realizing when the computer program is executed by processor During, it is specifically used for:
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described Two verification informations include the second firmware information;
The computer program is realized described by first verification information and second verifying when being executed by processor During information progress is matched, it is specifically used for:
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
The first verification information is obtained from the target device described in realizing when the computer program is executed by processor During, it is specifically used for:
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm Breath;
The computer program is realized described by first verification information and second verifying when being executed by processor Before information is matched, it is also used to:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted, The first verification information after being decrypted;
The computer program is realized described by first verification information and second verifying when being executed by processor During information progress is matched, it is specifically used for:
The first verification information after decryption is matched with second verification information.
Optionally, first is obtained from the target device described in realizing when the computer program is executed by processor to test Before demonstrate,proving information, it is also used to:
After determining target device access, the device identification and the target device obtained in the target device is generated Random number;According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, first is generated and adds Ciphertext data;
First encryption data is sent to the target device so that the target device using the random number with And first encryption data is decrypted in second Encryption Algorithm, obtains first tentation data;It is pre- to obtain second Fixed number evidence judges whether first tentation data and the second tentation data obtained are identical, when judging identical, to described It verifies equipment and sends the first information, wherein the first information are as follows: allow the verifying equipment to obtain described first for describing The information of verification information;
The first information is received and responded, the mistake for obtaining the first verification information from the target device is executed Journey.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (15)

1. a kind of verification method of equipment, which is characterized in that the described method includes:
Verifying equipment obtains the first verification information after determining target device access to be verified from the target device;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is legal Information;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
2. the method according to claim 1, wherein when first verification information includes the target device pair When the first manufacturer's information answered, second verification information includes the second manufacturer's information;
Described the step of being matched first verification information with second verification information, comprising:
First manufacturer's information is matched with second manufacturer's information.
3. according to the method described in claim 2, it is characterized in that, first manufacturer's information is stored in the target device First predetermined storage location;
Described the step of obtaining the first verification information from the target device, comprising:
First manufacturer's information is obtained from first predetermined storage location in the target device.
4. the method according to claim 1, wherein when first verification information includes the target device pair When the first firmware information answered, second verification information includes the second firmware information;
Described the step of being matched first verification information with second verification information, comprising:
First firmware information is matched with second firmware information.
5. according to the method described in claim 4, it is characterized in that, first firmware information is stored in the target device Second predetermined storage location;
Described the step of obtaining the first verification information from the target device, comprising:
First firmware information is obtained from second predetermined storage location in the target device.
6. the method according to claim 1, wherein first verification information is to utilize target cipher key and the One Encryption Algorithm carries out encrypted information;
Before described the step of being matched first verification information with second verification information, the method is also wrapped It includes:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted, is obtained The first verification information after decryption;
Described the step of being matched first verification information with second verification information, comprising:
The first verification information after decryption is matched with second verification information.
7. the method according to claim 1, wherein obtaining the first verifying letter from the target device described Before the step of breath, the method also includes:
Verifying equipment obtains the device identification in the target device and the target device after determining target device access The random number of generation;
According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, generates the first encryption number According to;
First encryption data is sent to the target device, so that the target device utilizes the random number and institute It states the second Encryption Algorithm first encryption data is decrypted, obtains first tentation data;Obtain the second predetermined number According to judging whether first tentation data and the second tentation data obtained are identical, when judging identical, to the verifying Equipment sends the first information, wherein the first information are as follows: allows the verifying equipment to obtain first verifying for describing The information of information;
The first information is received and responded, described the step of obtaining the first verification information from the target device is executed.
8. a kind of verifying device of equipment, which is characterized in that described device includes:
First obtains module, for obtaining first from the target device and testing after determining target device access to be verified Demonstrate,prove information;
Second obtains module, for obtaining the second verification information, wherein second verification information are as follows: for verifying the mesh Whether marking device is legal information;
Matching module, for matching first verification information with second verification information;
First determining module, for when successful match, determining the target device for legal copy.
9. device according to claim 8, which is characterized in that when first verification information includes the target device pair When the first manufacturer's information answered, second verification information includes the second manufacturer's information;
The matching module, is specifically used for
First manufacturer's information is matched with second manufacturer's information.
10. device according to claim 9, which is characterized in that first manufacturer's information is stored in the target device The first predetermined storage location;
Described first obtains module, is specifically used for
First manufacturer's information is obtained from first predetermined storage location in the target device.
11. device according to claim 8, which is characterized in that when first verification information includes the target device When corresponding first firmware information, second verification information includes the second firmware information;
The matching module, is specifically used for
First firmware information is matched with second firmware information.
12. device according to claim 11, which is characterized in that first firmware information is stored in the target device The second predetermined storage location;
Described first obtains module, is specifically used for
First firmware information is obtained from second predetermined storage location in the target device.
13. device according to claim 8, which is characterized in that first verification information be using target cipher key and First Encryption Algorithm carries out encrypted information;
Described device further includes that third obtains module and deciphering module;
The third obtains module, in described the step of being matched first verification information with the verification information Before, the target cipher key and first Encryption Algorithm are obtained;
The deciphering module, for utilizing the target cipher key and first Encryption Algorithm, to the first verifying obtained Information is decrypted, the first verification information after being decrypted;
The matching module, is specifically used for
The first verification information after decryption is matched with second verification information.
14. device according to claim 8, which is characterized in that described device further includes the 4th acquisition module, the 5th acquisition Module, encrypting module, sending module and reception respond module;
Described 4th obtains module, for before the step of obtaining the first verification information in the target device, testing described Card equipment obtains what device identification and the target device in the target device generated after determining target device access Random number;
Described 5th obtains module, for obtaining the first tentation data according to the device identification;
The encrypting module adds first tentation data for utilizing the random number and the second Encryption Algorithm It is close, generate the first encryption data;
The sending module, for first encryption data to be sent to the target device, so that the target device is sharp First encryption data is decrypted with the random number and second Encryption Algorithm, obtains first predetermined number According to;The second tentation data is obtained, judges whether first tentation data and the second tentation data obtained are identical, work as judgement When identical, the first information is sent to the verifying equipment, wherein the first information are as follows: allow the verifying to set for describing The standby information for obtaining first verification information;
The reception respond module triggers described first and obtains module for receiving and responding the first information.
15. a kind of verifying equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, realizes equipment as claimed in claim 1 to 7 Verification method.
CN201710503208.9A 2017-06-27 2017-06-27 Equipment verification method and device Active CN109150813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710503208.9A CN109150813B (en) 2017-06-27 2017-06-27 Equipment verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710503208.9A CN109150813B (en) 2017-06-27 2017-06-27 Equipment verification method and device

Publications (2)

Publication Number Publication Date
CN109150813A true CN109150813A (en) 2019-01-04
CN109150813B CN109150813B (en) 2021-11-05

Family

ID=64805321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710503208.9A Active CN109150813B (en) 2017-06-27 2017-06-27 Equipment verification method and device

Country Status (1)

Country Link
CN (1) CN109150813B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552486A (en) * 2020-04-27 2020-08-18 苏州浪潮智能科技有限公司 SSD firmware burning method and related components
CN112231780A (en) * 2020-09-25 2021-01-15 西安科芮智盈信息技术有限公司 Method and device for detecting video image line connection state

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004965A (en) * 2010-12-08 2011-04-06 吉林大学 Double ant-counterfeiting method and system of product
CN102129637A (en) * 2011-01-18 2011-07-20 南京信息工程大学 Commodity anti-counterfeiting method based on security mechanism
CN102880838A (en) * 2012-09-04 2013-01-16 深圳市芯海科技有限公司 Method and device for detecting electronic equipment
CN103607645A (en) * 2013-11-22 2014-02-26 深圳市九洲电器有限公司 Set top box pirate preventing method and set top box
CN104200153A (en) * 2014-09-12 2014-12-10 北京赛科世纪数码科技有限公司 Start verification method and system
CN104537299A (en) * 2014-12-10 2015-04-22 深圳先进技术研究院 Method and system for detecting electronic device, and related apparatuses
CN104794626A (en) * 2015-04-28 2015-07-22 广东欧珀移动通信有限公司 Anti-counterfeiting method and anti-counterfeiting device based on hardware information
CN105634746A (en) * 2016-03-23 2016-06-01 四川华拓光通信股份有限公司 Anti-counterfeiting method of SFP (Small Form-factor Pluggable) optical module
CN105631687A (en) * 2015-12-24 2016-06-01 腾讯科技(深圳)有限公司 Product verification method and device
US20160307246A1 (en) * 2015-04-15 2016-10-20 Master Supplements, Inc. On-Line Authentication of Natural Dietary Supplements to Ensure Source and Quality
CN106657033A (en) * 2016-12-02 2017-05-10 美的智慧家居科技有限公司 Method for verifying validity of device and generating authorization information, and communication device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004965A (en) * 2010-12-08 2011-04-06 吉林大学 Double ant-counterfeiting method and system of product
CN102129637A (en) * 2011-01-18 2011-07-20 南京信息工程大学 Commodity anti-counterfeiting method based on security mechanism
CN102880838A (en) * 2012-09-04 2013-01-16 深圳市芯海科技有限公司 Method and device for detecting electronic equipment
CN103607645A (en) * 2013-11-22 2014-02-26 深圳市九洲电器有限公司 Set top box pirate preventing method and set top box
CN104200153A (en) * 2014-09-12 2014-12-10 北京赛科世纪数码科技有限公司 Start verification method and system
CN104537299A (en) * 2014-12-10 2015-04-22 深圳先进技术研究院 Method and system for detecting electronic device, and related apparatuses
US20160307246A1 (en) * 2015-04-15 2016-10-20 Master Supplements, Inc. On-Line Authentication of Natural Dietary Supplements to Ensure Source and Quality
CN104794626A (en) * 2015-04-28 2015-07-22 广东欧珀移动通信有限公司 Anti-counterfeiting method and anti-counterfeiting device based on hardware information
CN105631687A (en) * 2015-12-24 2016-06-01 腾讯科技(深圳)有限公司 Product verification method and device
CN105634746A (en) * 2016-03-23 2016-06-01 四川华拓光通信股份有限公司 Anti-counterfeiting method of SFP (Small Form-factor Pluggable) optical module
CN106657033A (en) * 2016-12-02 2017-05-10 美的智慧家居科技有限公司 Method for verifying validity of device and generating authorization information, and communication device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552486A (en) * 2020-04-27 2020-08-18 苏州浪潮智能科技有限公司 SSD firmware burning method and related components
CN111552486B (en) * 2020-04-27 2024-02-09 苏州浪潮智能科技有限公司 SSD firmware burning method and related components
CN112231780A (en) * 2020-09-25 2021-01-15 西安科芮智盈信息技术有限公司 Method and device for detecting video image line connection state

Also Published As

Publication number Publication date
CN109150813B (en) 2021-11-05

Similar Documents

Publication Publication Date Title
US10496811B2 (en) Counterfeit prevention
CN109429222B (en) Method for encrypting wireless network equipment upgrading program and communication data
TWI747836B (en) Device birth certificate
TWI817930B (en) Device programming system with device authentication
US11258792B2 (en) Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium
EP2905925B1 (en) System and method for remote access, Remote digital signature
CN111988147B (en) Combined signature and signature verification method, system and storage medium
CN108229220B (en) System and method for trusted presentation of information on untrusted user devices
CN106416124A (en) Semi-deterministic digital signature generation
EP3552131B1 (en) Password security
CN111292041A (en) Electronic contract generating method, device, equipment and storage medium
EP3206329B1 (en) Security check method, device, terminal and server
CN102843232A (en) Generating secure device secret key
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
CN111695097A (en) Login checking method and device and computer readable storage medium
US10382417B2 (en) Secure protocol for chip authentication
CN116232593A (en) Multi-password module sensitive data classification and protection method, equipment and system
CN103592927A (en) Method for binding product server and service function through license
CN109150813A (en) A kind of verification method and device of equipment
US20160277182A1 (en) Communication system and master apparatus
CN116506134B (en) Digital certificate management method, device, equipment, system and readable storage medium
CN111628863A (en) Data signature method and device, electronic equipment and storage medium
CN104580181A (en) Device and method for data encryption and encryption accelerator engine
CN100546242C (en) A kind of generation of super code and authentication method
CN103955652A (en) File encryption method and device based on Andriod equipment authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200325

Address after: 310051 room 307, floor B, building 2, No. 399, Danfeng Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Haikang Storage Technology Co., Ltd

Address before: 430074 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park, Guanshan Road, Phase 5, Building F4, Room 21, Room 01

Applicant before: WUHAN HIKVISION STORAGE TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant