CN109150813A - A kind of verification method and device of equipment - Google Patents
A kind of verification method and device of equipment Download PDFInfo
- Publication number
- CN109150813A CN109150813A CN201710503208.9A CN201710503208A CN109150813A CN 109150813 A CN109150813 A CN 109150813A CN 201710503208 A CN201710503208 A CN 201710503208A CN 109150813 A CN109150813 A CN 109150813A
- Authority
- CN
- China
- Prior art keywords
- information
- target device
- verification information
- verification
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Abstract
The embodiment of the invention provides a kind of verification method of equipment and device, method includes: to verify equipment after determining target device access to be verified, and the first verification information is obtained from target device;It obtains for verifying whether target device is the second legal verification information;First verification information is matched with the second verification information;When successful match, determine target device for legal copy.In the embodiment of the present invention, equipment is verified according to the first verification information stored in the second verification information obtained and target device, whether automatic verifying target device is legal, verification process is participated in without artificial, and the first verification information is not necessarily to external disclosure, first verification information is not easy to be forged, so that verifying definitive result is more accurate, realizes to whether target device is that legal effective identification is verified.
Description
Technical field
The present invention relates to equipment safety technical fields, more particularly to the verification method and device of a kind of equipment.
Background technique
On Vehicles Collected from Market, often exist target device (such as: SSD (Solid State Drive, solid state hard disk) etc. tool
Have the hardware device of store function) the case where being imitated.In the prior art, the manufacturer of productive target equipment in order to prevent oneself give birth to
The target device of production is imitated, and generally all can be sticked unique label for target device produced, is to identify target device
The target device that oneself produces, wherein above-mentioned label may include SN (Serial Number, product ID, also known as machine
Code, authentication code, application for registration code etc.), WWN (World Wide Name, the whole world unique name), MODLE No (Model
Number, product type) and the labels such as two dimensional code.
However, above-mentioned label is easy to be imitated.Consumer and manufacturer still can not be by above-mentioned tag recognition markets
Target device whether be it is legal, i.e. consumer and manufacturer can not recognize whether the target device in market is as corresponding to label
Manufacturer's target device produced.
Summary of the invention
The verification method and device for being designed to provide a kind of equipment of the embodiment of the present invention, with realize be to hardware device
It is no to be verified for legal effective identification.Specific technical solution is as follows:
On the one hand, the embodiment of the invention provides a kind of verification methods of equipment, which comprises
Verifying equipment obtains the first verifying letter after determining target device access to be verified from the target device
Breath;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is positive
The information of version;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described
Two verification informations include the second manufacturer's information;
Described the step of being matched first verification information with second verification information, comprising:
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
Described the step of obtaining the first verification information from the target device, comprising:
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described
Two verification informations include the second firmware information;
Described the step of being matched first verification information with second verification information, comprising:
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
Described the step of obtaining the first verification information from the target device, comprising:
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm
Breath;
Before described the step of being matched first verification information with second verification information, the method
Further include:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted,
The first verification information after being decrypted;
Described the step of being matched first verification information with second verification information, comprising:
The first verification information after decryption is matched with second verification information.
Optionally, described before the step of obtaining the first verification information in the target device, the method is also wrapped
It includes:
Verifying equipment obtains the device identification and the target in the target device after determining target device access
The random number that equipment generates;
According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, first is generated and adds
Ciphertext data;
First encryption data is sent to the target device so that the target device using the random number with
And first encryption data is decrypted in second Encryption Algorithm, obtains first tentation data;It is pre- to obtain second
Fixed number evidence judges whether first tentation data and the second tentation data obtained are identical, when judging identical, to described
It verifies equipment and sends the first information, wherein the first information are as follows: allow the verifying equipment to obtain described first for describing
The information of verification information;
The first information is received and responded, the step for obtaining the first verification information from the target device is executed
Suddenly.
On the other hand, the embodiment of the invention provides a kind of verifying device of equipment, described device includes:
First obtains module, for after determining target device access to be verified, obtaining the from the target device
One verification information;
Second obtains module, for obtaining the second verification information, wherein second verification information are as follows: for verifying
State whether target device is legal information;
Matching module, for matching first verification information with second verification information;
First determining module, for when successful match, determining the target device for legal copy.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described
Two verification informations include the second manufacturer's information;
The matching module, is specifically used for
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
Described first obtains module, is specifically used for
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described
Two verification informations include the second firmware information;
The matching module, is specifically used for
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
Described first obtains module, is specifically used for
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm
Breath;
Described device further includes that third obtains module and deciphering module;
The third obtains module, for described that first verification information and verification information progress is matched
Before step, the target cipher key and first Encryption Algorithm are obtained;
The deciphering module, for utilizing the target cipher key and first Encryption Algorithm, to obtained first
Verification information is decrypted, the first verification information after being decrypted;
The matching module, is specifically used for
The first verification information after decryption is matched with second verification information.
Optionally, described device further includes the 4th acquisition module, the 5th acquisition module, encrypting module, sending module and connects
Receive respond module;
It is described 4th obtain module, for described the step of obtaining the first verification information from the target device it
Before, verifying equipment obtains the device identification in the target device and the target device after determining target device access
The random number of generation;
Described 5th obtains module, for obtaining the first tentation data according to the device identification;
The encrypting module, for utilize the random number and the second Encryption Algorithm, to first tentation data into
Row encryption, generates the first encryption data;
The sending module, for first encryption data to be sent to the target device, so that the target is set
It is standby that first encryption data is decrypted using the random number and second Encryption Algorithm, it is pre- to obtain described first
Fixed number evidence;The second tentation data is obtained, judges whether first tentation data and the second tentation data obtained are identical, when
When judging identical, the first information is sent to the verifying equipment, wherein the first information are as follows: test described in permission for describing
Card equipment obtains the information of first verification information;
The reception respond module triggers described first and obtains module for receiving and responding the first information.
On the other hand, the embodiment of the invention provides a kind of verifying equipment, including processor, communication interface, memory and
Communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, being realized that the embodiment of the present invention is above-mentioned and being set
Standby verification method.
In the embodiment of the present invention, verifying equipment is obtained from target device after determining target device access to be verified
First verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information and the
Two verification informations are matched;When successful match, determine target device for legal copy.Verifying equipment is tested according to obtained second
The first verification information stored in card information and target device, it is automatic to verify whether target device is legal, verification process
Without manually participating in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying determines
As a result more accurate, it realizes to whether target device is that legal effective identification is verified.Certainly, it implements any of the products of the present invention
Or method must be not necessarily required to reach all the above advantage simultaneously.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the verification method of equipment provided by the embodiment of the present invention;
Fig. 2A is a kind of schematic diagram of method of salary distribution of the block0 of SSD;
Fig. 2 B is the schematic diagram of another method of salary distribution of the block0 of SSD;
Fig. 3 is a kind of another flow diagram of the verification method of equipment provided by the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of SSD controller;
Fig. 5 is a kind of structural schematic diagram of the verifying device of equipment provided by the embodiment of the present invention;
Fig. 6 is a kind of another structural schematic diagram of the verifying device of equipment provided by the embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram for verifying equipment provided by the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention provides a kind of verification method of equipment and devices, to realize to whether hardware device is legal
Effective identification verifying.
As shown in Figure 1, may include steps of the embodiment of the invention provides a kind of verification method of equipment:
S101: verifying equipment obtains the first verifying letter after determining target device access to be verified from target device
Breath;
S102: the second verification information is obtained, wherein the second verification information are as follows: for verifying whether target device is legal
Information;
Wherein, realize that the functional software of the verification method of equipment provided by the embodiment of the present invention can be special client
Software is held, is also possible to the plug-in unit of other softwares with authentication function, this is all possible.Above-mentioned functional software can be installed
In any electronic equipment (such as: desktop computer, tablet computer etc.).
In one implementation, above-mentioned functional software can be identified with " windows tool ", it is to be understood that this
When, above-mentioned functional software may be only capable of being installed in the electronic equipment that operating system is windows operating system.
It is understood that above-mentioned second verification information can store in above-mentioned verifying equipment, it is stored in
It states in any equipment or cloud with store function that verifying equipment is connected.In one implementation, above-mentioned function is soft
Part is installed in electronic equipment, and equipment is verified provided by the embodiment of the present invention to be formed, while can be by above-mentioned functional software
It is associated for verifying whether target device is that the second legal verification information is pre-stored in verifying equipment, at this point, above-mentioned the
Two verification informations are stored in verifying equipment.In another implementation, above-mentioned functional software is installed in electronic equipment, with shape
At verifying equipment provided by the embodiment of the present invention, while by above-mentioned verifying equipment and above-mentioned second verification information can be stored with
Equipment or cloud be attached so that above-mentioned verifying equipment can be from the equipment or cloud for being stored with above-mentioned second verification information
In, obtain above-mentioned second verification information.Etc., this is all possible.
Above-mentioned target device to be verified can be any hardware device with store function, for example: it is above-mentioned to
The target device of verifying can be SSD (Solid State Drive, solid state hard disk) etc..
It is understood that equipment is verified after determining target device access to be verified, it can be first to target device
It sends the first information to be instructed, further, target device is instructed according to the above-mentioned first information, and determination allows to verify
After equipment obtains the first verification information, verifying equipment can directly obtain the first verification information from target device.Wherein, above-mentioned
First verification information can be in the factory of above-mentioned target device, is pre-stored within by R&D and production person predetermined in target device
Information.Further, above-mentioned predetermined information is associated with above-mentioned functional software, is installed in electronic equipment when by above-mentioned functional software
When, above-mentioned predetermined information can be pre-stored in above-mentioned electronic equipment (verifying equipment) simultaneously, alternatively, can also be by above-mentioned electronics
Equipment (verifying equipment) is attached with the equipment or cloud for being stored with above-mentioned second verification information, of the invention real can be realized
Apply the verification method of equipment provided by example.I.e. above-mentioned verifying equipment can be by from verifying equipment is local or verifying company of equipment institute
The equipment connect or the predetermined information obtained in cloud (the second verification information), and the predetermined information stored from target device
(the first verification information) realizes the verifying to target device.
It is understood that the first verification information in target device be externally (such as: the user of target device, verifying
The user etc. of equipment) it is sightless;Also, it when the second verification information is stored in verifying equipment, or is stored in and verifies
It is also externally sightless when in the equipment of equipment connection or cloud.Thus, it is possible to preferably improve above-mentioned second verifying
The confidentiality of information and the first verification information further can be improved to whether target device is testing for legal verifying
Demonstrate,prove the accuracy of result.
It is emphasized that the guarantee to the equity of the user of target device in order to better improve, it can be by above-mentioned function
Energy software is published in network, so that any pair of target device has the user of verifying demand, can download above-mentioned function at any time
For verifying whether target device is the second legal verification information associated by software and the above-mentioned functional software of acquisition, with energy
It is enough to realize to whether target device is legal verifying.
S103: the first verification information is matched with the second verification information;
S104: when successful match, determine target device for legal copy.
Wherein, multiple second verifyings may be stored with by verifying in equipment or with verifying in the equipment or cloud that equipment is connect
Information, every one second verification information are equal are as follows: for verifying whether equipment to be verified is legal information.By the first verification information
Matched one by one with every one second verification information, when the first verification information and when the second verification information successful match, show on
It states in verifying equipment the second verification information obtained comprising the first verification information, at this point, can then determine above-mentioned target device
For legal copy;Conversely, when it fails to match for the first verification information and the second verification information, show above-mentioned verifying equipment obtained the
The first verification information is not included in two verification informations, at this point, can then determine above-mentioned target device for pirate (i.e. mountain vallage product).
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device
Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with
Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second
The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated
Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true
Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
Also, the embodiment of the present invention has preferably ensured the equity of the user of target device, and prevents to a certain extent
The case where target device is forged (by mountain vallage).
It in one implementation, may include the corresponding first manufacturer letter of target device in above-mentioned first verification information
Breath, alternatively, include corresponding first firmware information of target device, alternatively, include corresponding first manufacturer's information of target device with
And corresponding first firmware information of target device, etc., this is all possible.Above-mentioned first manufacturer's information can be with are as follows: about life
The relevant information of the manufacturer of above-mentioned target device is produced, such as: the identification information of manufacturer, the pre-set mark information of manufacturer are (pre-
If character string) etc..Above-mentioned first firmware information can be with are as follows: about the relevant information of above-mentioned target device itself, such as: it is above-mentioned
SN (Serial Number, product ID, also known as machine code, authentication code, application for registration code etc.), the WWN of target device
The labels such as (World Wide Name, the unique name in the whole world), MODLENo (Model Number, product type) and two dimensional code,
Etc..
In a kind of situation, when above-mentioned first verification information includes corresponding first manufacturer's information of target device, above-mentioned
Two verification informations include the second manufacturer's information;
Described the step of first verification information is matched to (S103) with the second verification information, may include:
First manufacturer's information is matched with the second manufacturer's information.
In one implementation, above-mentioned first manufacturer's information can be with are as follows: passes through USB key (Universal Serial
Bus Key) a string of character strings generating at random, wherein above-mentioned character string Existence and uniquenss.It, can be with before target device factory
Above-mentioned character string is stored in above-mentioned target device in advance, and above-mentioned character string and above-mentioned functional software are associated.
For example, above-mentioned target device can be SSD, and above-mentioned first manufacturer's information can be with are as follows: passes through USB key
A string of character strings that (Universal Serial Bus Key) is generated at random.It should be understood that SSD factory when, need into
Row burning firmware information, during above-mentioned burning firmware information, a string of words will being generated at random above by USB key
Symbol string is burned onto SSD.
In order to guarantee the safety and non-volatibility of the first stored manufacturer's information, above-mentioned first manufacturer can be believed
Breath is stored in the high storage location of stability in target device, specifically, first manufacturer's information can store in target
First predetermined storage location of equipment;
Described the step of the first verification information (S101) is obtained from target device, may include:
The first manufacturer's information is obtained from the first predetermined storage location in target device.
For example, above-mentioned target device is SSD, it is to be understood that the storage particle in SSD is by Nand Flash structure
Be made of at, every piece of Nand Flash predetermined quantity block (such as: 1024 pieces or 2048 pieces etc.).Wherein, in Nand Flash
1 block be made of 1024 pages (Page), the size of 1 page is 16Kbyte.Due to the block block0 of Nand Flash
It is highest piece of stability, in general, as the region of storage code (correlative code of SSD) and can deposit the block0 of SSD
Store up the region of the pre-set information of SSD.In the embodiment of the present invention, above-mentioned first manufacturer's information can be stored in block0
In, i.e. block0 can be the first predetermined storage location in the embodiment of the present invention.
It in one implementation, as shown in Figure 2 A, is a kind of schematic diagram of method of salary distribution of the block0 of SSD.Wherein,
Page0~Page10 is for storing " code (correlative code of SSD) ", and Page11 is used as " original bad block message area ", for depositing
Store up the original bad block message (such as: original bad block identification and/or original bad number of blocks etc.) of SSD, Page12 is as " increasing bad block newly
The information area " increases bad block message (such as: increasing bad block identification newly and/or increase bad number of blocks newly etc.) newly for store SSD,
Page13 is used as " Huai Kuai distributed intelligence area ", the distributed intelligence (such as: bad block position) of the bad block for storing SSD,
Page14~Page20 is used as " other information area ", for storing the other information (such as: the mark of SSD) about SSD,
Page21~Page1023 is used as " reserved area ", for storing some subsequent newly-added informations about SSD.
It in the embodiment of the present invention, needs for above-mentioned first manufacturer's information to be stored in block0, is SSD as shown in Figure 2 B
Block0 another method of salary distribution schematic diagram.Wherein, point of Page0~Page10, Page11, Page12, Page13
Identical as Fig. 2A with situation, Page21 is used as " manufacturer's information area " (i.e. the first predetermined storage location), for storing the first of SSD
Manufacturer's information, Page22~Page1023 are still used as " reserved area ".
In a kind of situation, when above-mentioned first verification information includes corresponding first firmware information of above-mentioned target device, on
Stating the second verification information includes the second firmware information;
Described the step of first verification information is matched to (S103) with the second verification information, may include:
First firmware information is matched with the second firmware information.
In one implementation, above-mentioned first firmware information is stored in the second predetermined storage location of target device;
Described the step of the first verification information (S101) is obtained from target device, may include:
The first firmware information is obtained from the second predetermined storage location in target device.
In one implementation, above-mentioned target device can be SSD, at this point it is possible to which above-mentioned first firmware information is deposited
It is stored in the SSD controller of SSD, for example, being stored in the SRAM (Static RAM, Static RAM) of SSD controller.
The accuracy of verification result in order to better improve can set the memory module of the first firmware information in target device to
After target device power down, the first firmware information is lost automatically, automatically generates the first firmware information after target device energization.And
And by presetting create-rule, the first firmware information generated is controlled.In one implementation, above-mentioned default generation rule
It then can be with are as follows: the SN+MODLENo+WWN of target device.It is to be understood that with the process of target device power down, energization, circulation
" SN " or " MODLE No " or " WWN " is used as the first firmware information.At this point, the second firmware included by the second verification information is believed
It is needed in breath comprising above-mentioned " SN ", " MODLENo " and " WWN ".
Furthermore it is also possible to understand are as follows: by pre-defined algorithm (such as: simple logical operation or MD5 value operation etc.) to upper
After stating " SN " and/or " MODLENo " and/or " WWN " progress operation, using gained operation result as the first firmware information, at this point,
It is needed in second firmware information included by second verification information comprising above-mentioned " SN " and/or " MODLENo " and/or " WWN " point
Not according to above-mentioned pre-defined algorithm operation after, resulting operation result, etc..The embodiment of the present invention does not advise above-mentioned default generation
Concrete form then is defined.
It is above-mentioned when above-mentioned first verification information includes corresponding first manufacturer's information of target device in another situation
First verification information can also be comprising above-mentioned corresponding first firmware information of target device (alternatively, when above-mentioned first verifying letter
When ceasing the first firmware information corresponding including above-mentioned target device, above-mentioned first verification information can also be set comprising above-mentioned target
Standby corresponding first manufacturer's information).At this point it is possible to be performed simultaneously or sequentially execute above-mentioned by the first manufacturer's information and the second manufacturer
The step of information is matched and above-mentioned the step of being matched the first firmware information with the second firmware information, when above-mentioned
When being successful match with result, above-mentioned target device is determined for legal copy, conversely, when there are at least one in above-mentioned matching result
For when it fails to match, it is determined that above-mentioned target device is piracy.Utilize above-mentioned first manufacturer's information, the first firmware information and
Two manufacturer's information, the second firmware information carry out double verification to target device, more improve the accuracy of verification result, mention
Guarantee of the height to the equity of target device user reduces the risk that target device is forged.
In order to preferably guarantee the accuracy of verification result, above-mentioned first verification information can be encrypted, transmitted
During, transmit encrypted first verification information so that even if encrypted first verification information in transmission process, quilt
Forgery personnel illegally intercept, and forgery personnel can not also know the key for decrypting above-mentioned encrypted first verification information, to obtain
The first verification information after decryption, avoids the transmission process in the first verification information and is forged personnel and illegally intercept and know,
Further, the case where personnel forge above-mentioned target device is forged.In one implementation, above-mentioned first verification information can be with
To carry out encrypted information using target cipher key and the first Encryption Algorithm;
Before described the step of first verification information is matched (S103) with the second verification information, the method is also
May include:
Obtain target cipher key and the first Encryption Algorithm;
Using target cipher key and the first Encryption Algorithm, the first verification information obtained is decrypted, is decrypted
The first verification information afterwards;
Described the step of first verification information is matched to (S103) with the second verification information, may include:
The first verification information after decryption is matched with the second verification information.
It should be noted that above-mentioned first Encryption Algorithm can for AES (Advanced Encryption Standard,
Advanced Encryption Standard) etc., the embodiment of the present invention is not defined the specific algorithm of the first Encryption Algorithm.
It is understood that verifying equipment or the equipment being connect with verifying equipment or may be stored in cloud multiple close
Key and Encryption Algorithm, at this point, it is corresponding according to the corresponding each equipment of storage of mark of each equipment to verify meeting in equipment for the ease of management
Key and Encryption Algorithm.In turn, in order to preferably determine target cipher key and the first Encryption Algorithm, verifying equipment can be first
The device identification for first obtaining target device is obtained according to the device identification of target device from multiple keys and Encryption Algorithm
State target cipher key and the first Encryption Algorithm.
In order to preferably guarantee the accuracy of verification result, also, guarantee the safety of target device, verifies equipment from mesh
Before obtaining the first verification information in marking device, target device can also verify whether that allowing to verify equipment obtains the first verifying letter
Breath.In one implementation, as shown in figure 3, the embodiment of the present invention may include steps of:
S301: after determining target device access, the device identification and target obtained in target device is set verifying equipment
The standby random number generated;
S302: according to device identification, the first tentation data is obtained;
S303: utilizing random number and the second Encryption Algorithm, encrypt to the first tentation data, generates the first encryption number
According to;
S304: being sent to target device for the first encryption data, so that target device utilizes random number and the second encryption
The first encryption data is decrypted in algorithm, obtains the first tentation data;The second tentation data is obtained, judges the first tentation data
It is whether identical as the second tentation data, when judging identical, the first information is sent to verifying equipment, wherein the first information are as follows: use
Allow to verify the information that equipment obtains the first verification information in description;Above-mentioned second tentation data can store in target device
In local;
S305: receiving and responds the first information;
S306: the first verification information is obtained from target device;
S307: the second verification information is obtained, wherein the second verification information are as follows: for verifying whether target device is legal
Information;
S308: the first verification information is matched with the second verification information;
S309: when successful match, determine target device for legal copy.
Wherein, above-mentioned S306 is identical as S101 shown in Fig. 1, and above-mentioned S307 is identical as S102 shown in Fig. 1, above-mentioned
S308 is identical as S103 shown in Fig. 1, and above-mentioned S309 is identical as S104 shown in Fig. 1.
It is understood that above-mentioned first Encryption Algorithm and above-mentioned second Encryption Algorithm may be the same or different, this
All it is possible.
Wherein, verifying equipment can send the second information acquisition to target device first after determining target device access
Instruction, further, target device is instructed according to above-mentioned second information acquisition, and determining, which allows to verify equipment, obtains device identification
Afterwards, verifying equipment the device identification of target device can be directly obtained from target device, and obtain target device generation with
Machine number then carries out the verifying process of follow-up equipment.
In one implementation, above-mentioned target device is SSD, and SSD can generally be based on its SSD controller, set with verifying
It is standby carry out information exchange (such as: SSD controller can receive above-mentioned second information acquisition instruction, and according to above-mentioned second information
It obtains to instruct and determines whether that verifying equipment obtains device identification, after determining allows to verify equipment acquisition device identification, lead to
Know that verifying equipment obtains device identification, or device identification be sent to verifying equipment, etc.), in order to realize above-described embodiment,
SSD controller is needed with the function of being carried out encryption and decryption using the second Encryption Algorithm and has the function of generating random number.
In one implementation.As shown in figure 4, the embodiment of the present invention can add encryption and decryption mould in SSD controller
Block (for utilizing the second Encryption Algorithm to carry out encryption and decryption) and random-number-generating module (for generating random number).In addition, above-mentioned
It can also be by software realization, at this point it is possible to will using the function that the second Encryption Algorithm carries out encryption and decryption and generation random number
Above-mentioned software is burned onto SSD controller, this is all possible.Wherein, can also include in the SSD controller in Fig. 4
" Sata/Pice interface " (i.e. the Pice interface of Sata agreement), " GPI0 " (i.e. General Programmable Input/
Output, general programmable I/O port), " (Error Checking and Correcting and entangles at error checking ECC
It is wrong)/LDPC (Low Density Parity Check Code, low density parity check code) ", " (Double Data Rate synchronizes dynamic DDR
State random access memory, Double Data Rate) interface ", " SRAM " and " FLASH interface ".
Below with a specific embodiment, the verification method for being provided for the embodiments of the invention a kind of equipment is illustrated:
Verifying equipment A sends the instruction of the second information acquisition after determining target device B access, to target device B;
Target device B receives and responds the instruction of above-mentioned second information acquisition, to verifying equipment A sending device mark a and
Generated random number b;
It verifies equipment A and obtains above equipment mark a and random number b;A is identified according to above equipment, it is predetermined to obtain first
Data C;Using random number b and the second Encryption Algorithm D, the first tentation data C is encrypted, generates the first encryption data c;
First encryption data c is sent to target device B;
Target device B obtains the first encryption data c, and target device B is using random number b and the second Encryption Algorithm D to first
Encryption data c is decrypted, and obtains the first tentation data C;The second tentation data E is obtained, judges the first tentation data C and second
Whether tentation data E is identical, and when judging identical, send to verifying equipment A allows verifying equipment A to obtain first for description is tested
Demonstrate,prove the first information M of information N;Wherein, above-mentioned second tentation data E can store in the local of target device B;
Verifying equipment A receives and responds first information M, the first verification information N is obtained from target device B, wherein first
Verification information N is to carry out encrypted information using target cipher key P and the first Encryption Algorithm Q;
It verifies equipment A and obtains target cipher key P and the first Encryption Algorithm Q, and calculated using the encryption of target cipher key P and first
The first verification information N is decrypted in method Q, the first verification information N after being decrypted;And the second verification information is obtained, it will solve
The first verification information N after close is matched with the second verification information obtained, when successful match, determines target device B
For legal copy.Wherein, above-mentioned target cipher key P, the first Encryption Algorithm Q and the second verification information can store in verifying equipment A,
It is stored in the equipment being connect with verifying equipment A with store function or cloud.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of verifying devices of equipment, as shown in figure 5,
The apparatus may include:
First obtains module 510, for being obtained after determining target device access to be verified from the target device
First verification information;
Second obtains module 520, for obtaining the second verification information, wherein second verification information are as follows: for verifying
Whether the target device is legal information;
Matching module 530, for matching first verification information with second verification information;
First determining module 540, for when successful match, determining the target device for legal copy.
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device
Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with
Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second
The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated
Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true
Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
In one implementation, when first verification information includes corresponding first manufacturer's information of the target device
When, second verification information includes the second manufacturer's information;
The matching module 530, is specifically used for
First manufacturer's information is matched with second manufacturer's information.
In one implementation, first manufacturer's information is stored in the first predetermined storage position of the target device
It sets;
Described first obtains module 510, is specifically used for
First manufacturer's information is obtained from first predetermined storage location in the target device.
In one implementation, when first verification information includes corresponding first firmware information of the target device
When, second verification information includes the second firmware information;
The matching module 530, is specifically used for
First firmware information is matched with second firmware information.
In one implementation, first firmware information is stored in the second predetermined storage position of the target device
It sets;
Described first obtains module 510, is specifically used for
First firmware information is obtained from second predetermined storage location in the target device.
In one implementation, first verification information is to be added using target cipher key and the first Encryption Algorithm
Information after close;
Described device further includes that third obtains module and deciphering module;
The third obtains module, for described that first verification information and verification information progress is matched
Before step, the target cipher key and first Encryption Algorithm are obtained;
The deciphering module, for utilizing the target cipher key and first Encryption Algorithm, to obtained first
Verification information is decrypted, the first verification information after being decrypted;
The matching module 530, is specifically used for
The first verification information after decryption is matched with second verification information.
In one implementation, based on structure shown in Fig. 5, as shown in fig. 6, described device can also include described device
It further include that the 4th acquisition module the 610, the 5th obtains module 620, encrypting module 630, sending module 640 and receives respond module
650;
Described 4th obtains module 610, in described the step of obtaining the first verification information from the target device
Before, verifying equipment obtains the device identification in the target device and the target is set after determining target device access
The standby random number generated;
Described 5th obtains module 620, for obtaining the first tentation data according to the device identification;
The encrypting module 630, for utilizing the random number and the second Encryption Algorithm, to first tentation data
It is encrypted, generates the first encryption data;
The sending module 640, for first encryption data to be sent to the target device, so that the target
First encryption data is decrypted in random number described in equipment utilization and second Encryption Algorithm, obtains described first
Tentation data;The second tentation data is obtained, judges whether first tentation data and the second tentation data obtained are identical,
When judging identical, the first information is sent to the verifying equipment, wherein the first information are as follows: for describing described in permission
Verifying equipment obtains the information of first verification information;
The reception respond module 650 triggers described first and obtains module for receiving and responding the first information
510。
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of verifying equipment, as shown in fig. 7, comprises
Processor 710, communication interface 720, memory 730 and communication bus 740, wherein processor 710, communication interface 720, storage
Device 730 completes mutual communication by communication bus 740,
Memory 730, for storing computer program;
Processor 710 when for executing the computer program stored on memory 730, realizes following steps:
After determining target device access to be verified, the first verification information is obtained from the target device;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is positive
The information of version;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device
Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with
Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second
The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated
Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true
Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described
Two verification informations include the second manufacturer's information;
The verifying equipment is realized described by first verification information and second verification information progress in execution
During matching, it is specifically used for:
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
The verifying equipment execute realize it is described obtain the first verification information from the target device during, tool
Body is used for:
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described
Two verification informations include the second firmware information;
The verifying equipment is realized described by first verification information and second verification information progress in execution
During matching, it is specifically used for:
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
The verifying equipment execute realize it is described obtain the first verification information from the target device during, tool
Body is used for:
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm
Breath;
The verifying equipment is realized described by first verification information and second verification information progress in execution
With before, it is also used to:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted,
The first verification information after being decrypted;
The verifying equipment is realized described by first verification information and second verification information progress in execution
During matching, it is specifically used for:
The first verification information after decryption is matched with second verification information.
Optionally, the verifying equipment execute realize it is described obtained from the target device the first verification information it
Before, it is also used to:
After determining target device access, the device identification and the target device obtained in the target device is generated
Random number;
According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, first is generated and adds
Ciphertext data;
First encryption data is sent to the target device so that the target device using the random number with
And first encryption data is decrypted in second Encryption Algorithm, obtains first tentation data;It is pre- to obtain second
Fixed number evidence judges whether first tentation data and the second tentation data obtained are identical, when judging identical, to described
It verifies equipment and sends the first information, wherein the first information are as follows: allow the verifying equipment to obtain described first for describing
The information of verification information;
The first information is received and responded, the mistake for obtaining the first verification information from the target device is executed
Journey.
The communication bus that above-mentioned verifying equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component
Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control bus etc..For just
It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned verifying equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), also may include non-easy
The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also
To be storage device that at least one is located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
It is described the embodiment of the invention also provides a kind of computer readable storage medium corresponding to above method embodiment
It is stored with computer program in computer readable storage medium, following step is realized when the computer program is executed by processor
It is rapid:
After determining target device access to be verified, the first verification information is obtained from the target device;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is positive
The information of version;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
Using the embodiment of the present invention, equipment is verified after determining target device access to be verified, is obtained from target device
Obtain the first verification information;It obtains for verifying whether target device is the second legal verification information;By the first verification information with
Second verification information is matched;When successful match, determine target device for legal copy.Equipment is verified according to obtained second
The first verification information stored in verification information and target device, it is automatic to verify whether target device is legal copy, it is authenticated
Cheng Wuxu is manually participated in, and the first verification information is not necessarily to external disclosure, and the first verification information is not easy to be forged, so that verifying is true
Determine that result is more accurate, realizes to whether target device is legal effective identification verifying.
Optionally, when first verification information includes corresponding first manufacturer's information of the target device, described
Two verification informations include the second manufacturer's information;
The computer program is realized described by first verification information and second verifying when being executed by processor
During information progress is matched, it is specifically used for:
First manufacturer's information is matched with second manufacturer's information.
Optionally, first manufacturer's information is stored in the first predetermined storage location of the target device;
The first verification information is obtained from the target device described in realizing when the computer program is executed by processor
During, it is specifically used for:
First manufacturer's information is obtained from first predetermined storage location in the target device.
Optionally, when first verification information includes corresponding first firmware information of the target device, described
Two verification informations include the second firmware information;
The computer program is realized described by first verification information and second verifying when being executed by processor
During information progress is matched, it is specifically used for:
First firmware information is matched with second firmware information.
Optionally, first firmware information is stored in the second predetermined storage location of the target device;
The first verification information is obtained from the target device described in realizing when the computer program is executed by processor
During, it is specifically used for:
First firmware information is obtained from second predetermined storage location in the target device.
Optionally, first verification information is to carry out encrypted letter using target cipher key and the first Encryption Algorithm
Breath;
The computer program is realized described by first verification information and second verifying when being executed by processor
Before information is matched, it is also used to:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted,
The first verification information after being decrypted;
The computer program is realized described by first verification information and second verifying when being executed by processor
During information progress is matched, it is specifically used for:
The first verification information after decryption is matched with second verification information.
Optionally, first is obtained from the target device described in realizing when the computer program is executed by processor to test
Before demonstrate,proving information, it is also used to:
After determining target device access, the device identification and the target device obtained in the target device is generated
Random number;According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, first is generated and adds
Ciphertext data;
First encryption data is sent to the target device so that the target device using the random number with
And first encryption data is decrypted in second Encryption Algorithm, obtains first tentation data;It is pre- to obtain second
Fixed number evidence judges whether first tentation data and the second tentation data obtained are identical, when judging identical, to described
It verifies equipment and sends the first information, wherein the first information are as follows: allow the verifying equipment to obtain described first for describing
The information of verification information;
The first information is received and responded, the mistake for obtaining the first verification information from the target device is executed
Journey.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (15)
1. a kind of verification method of equipment, which is characterized in that the described method includes:
Verifying equipment obtains the first verification information after determining target device access to be verified from the target device;
Obtain the second verification information, wherein second verification information are as follows: for verifying whether the target device is legal
Information;
First verification information is matched with second verification information;
When successful match, determine the target device for legal copy.
2. the method according to claim 1, wherein when first verification information includes the target device pair
When the first manufacturer's information answered, second verification information includes the second manufacturer's information;
Described the step of being matched first verification information with second verification information, comprising:
First manufacturer's information is matched with second manufacturer's information.
3. according to the method described in claim 2, it is characterized in that, first manufacturer's information is stored in the target device
First predetermined storage location;
Described the step of obtaining the first verification information from the target device, comprising:
First manufacturer's information is obtained from first predetermined storage location in the target device.
4. the method according to claim 1, wherein when first verification information includes the target device pair
When the first firmware information answered, second verification information includes the second firmware information;
Described the step of being matched first verification information with second verification information, comprising:
First firmware information is matched with second firmware information.
5. according to the method described in claim 4, it is characterized in that, first firmware information is stored in the target device
Second predetermined storage location;
Described the step of obtaining the first verification information from the target device, comprising:
First firmware information is obtained from second predetermined storage location in the target device.
6. the method according to claim 1, wherein first verification information is to utilize target cipher key and the
One Encryption Algorithm carries out encrypted information;
Before described the step of being matched first verification information with second verification information, the method is also wrapped
It includes:
Obtain the target cipher key and first Encryption Algorithm;
Using the target cipher key and first Encryption Algorithm, the first verification information obtained is decrypted, is obtained
The first verification information after decryption;
Described the step of being matched first verification information with second verification information, comprising:
The first verification information after decryption is matched with second verification information.
7. the method according to claim 1, wherein obtaining the first verifying letter from the target device described
Before the step of breath, the method also includes:
Verifying equipment obtains the device identification in the target device and the target device after determining target device access
The random number of generation;
According to the device identification, the first tentation data is obtained;
Using the random number and the second Encryption Algorithm, first tentation data is encrypted, generates the first encryption number
According to;
First encryption data is sent to the target device, so that the target device utilizes the random number and institute
It states the second Encryption Algorithm first encryption data is decrypted, obtains first tentation data;Obtain the second predetermined number
According to judging whether first tentation data and the second tentation data obtained are identical, when judging identical, to the verifying
Equipment sends the first information, wherein the first information are as follows: allows the verifying equipment to obtain first verifying for describing
The information of information;
The first information is received and responded, described the step of obtaining the first verification information from the target device is executed.
8. a kind of verifying device of equipment, which is characterized in that described device includes:
First obtains module, for obtaining first from the target device and testing after determining target device access to be verified
Demonstrate,prove information;
Second obtains module, for obtaining the second verification information, wherein second verification information are as follows: for verifying the mesh
Whether marking device is legal information;
Matching module, for matching first verification information with second verification information;
First determining module, for when successful match, determining the target device for legal copy.
9. device according to claim 8, which is characterized in that when first verification information includes the target device pair
When the first manufacturer's information answered, second verification information includes the second manufacturer's information;
The matching module, is specifically used for
First manufacturer's information is matched with second manufacturer's information.
10. device according to claim 9, which is characterized in that first manufacturer's information is stored in the target device
The first predetermined storage location;
Described first obtains module, is specifically used for
First manufacturer's information is obtained from first predetermined storage location in the target device.
11. device according to claim 8, which is characterized in that when first verification information includes the target device
When corresponding first firmware information, second verification information includes the second firmware information;
The matching module, is specifically used for
First firmware information is matched with second firmware information.
12. device according to claim 11, which is characterized in that first firmware information is stored in the target device
The second predetermined storage location;
Described first obtains module, is specifically used for
First firmware information is obtained from second predetermined storage location in the target device.
13. device according to claim 8, which is characterized in that first verification information be using target cipher key and
First Encryption Algorithm carries out encrypted information;
Described device further includes that third obtains module and deciphering module;
The third obtains module, in described the step of being matched first verification information with the verification information
Before, the target cipher key and first Encryption Algorithm are obtained;
The deciphering module, for utilizing the target cipher key and first Encryption Algorithm, to the first verifying obtained
Information is decrypted, the first verification information after being decrypted;
The matching module, is specifically used for
The first verification information after decryption is matched with second verification information.
14. device according to claim 8, which is characterized in that described device further includes the 4th acquisition module, the 5th acquisition
Module, encrypting module, sending module and reception respond module;
Described 4th obtains module, for before the step of obtaining the first verification information in the target device, testing described
Card equipment obtains what device identification and the target device in the target device generated after determining target device access
Random number;
Described 5th obtains module, for obtaining the first tentation data according to the device identification;
The encrypting module adds first tentation data for utilizing the random number and the second Encryption Algorithm
It is close, generate the first encryption data;
The sending module, for first encryption data to be sent to the target device, so that the target device is sharp
First encryption data is decrypted with the random number and second Encryption Algorithm, obtains first predetermined number
According to;The second tentation data is obtained, judges whether first tentation data and the second tentation data obtained are identical, work as judgement
When identical, the first information is sent to the verifying equipment, wherein the first information are as follows: allow the verifying to set for describing
The standby information for obtaining first verification information;
The reception respond module triggers described first and obtains module for receiving and responding the first information.
15. a kind of verifying equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing
Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, realizes equipment as claimed in claim 1 to 7
Verification method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710503208.9A CN109150813B (en) | 2017-06-27 | 2017-06-27 | Equipment verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710503208.9A CN109150813B (en) | 2017-06-27 | 2017-06-27 | Equipment verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109150813A true CN109150813A (en) | 2019-01-04 |
CN109150813B CN109150813B (en) | 2021-11-05 |
Family
ID=64805321
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710503208.9A Active CN109150813B (en) | 2017-06-27 | 2017-06-27 | Equipment verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150813B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111552486A (en) * | 2020-04-27 | 2020-08-18 | 苏州浪潮智能科技有限公司 | SSD firmware burning method and related components |
CN112231780A (en) * | 2020-09-25 | 2021-01-15 | 西安科芮智盈信息技术有限公司 | Method and device for detecting video image line connection state |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004965A (en) * | 2010-12-08 | 2011-04-06 | 吉林大学 | Double ant-counterfeiting method and system of product |
CN102129637A (en) * | 2011-01-18 | 2011-07-20 | 南京信息工程大学 | Commodity anti-counterfeiting method based on security mechanism |
CN102880838A (en) * | 2012-09-04 | 2013-01-16 | 深圳市芯海科技有限公司 | Method and device for detecting electronic equipment |
CN103607645A (en) * | 2013-11-22 | 2014-02-26 | 深圳市九洲电器有限公司 | Set top box pirate preventing method and set top box |
CN104200153A (en) * | 2014-09-12 | 2014-12-10 | 北京赛科世纪数码科技有限公司 | Start verification method and system |
CN104537299A (en) * | 2014-12-10 | 2015-04-22 | 深圳先进技术研究院 | Method and system for detecting electronic device, and related apparatuses |
CN104794626A (en) * | 2015-04-28 | 2015-07-22 | 广东欧珀移动通信有限公司 | Anti-counterfeiting method and anti-counterfeiting device based on hardware information |
CN105634746A (en) * | 2016-03-23 | 2016-06-01 | 四川华拓光通信股份有限公司 | Anti-counterfeiting method of SFP (Small Form-factor Pluggable) optical module |
CN105631687A (en) * | 2015-12-24 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Product verification method and device |
US20160307246A1 (en) * | 2015-04-15 | 2016-10-20 | Master Supplements, Inc. | On-Line Authentication of Natural Dietary Supplements to Ensure Source and Quality |
CN106657033A (en) * | 2016-12-02 | 2017-05-10 | 美的智慧家居科技有限公司 | Method for verifying validity of device and generating authorization information, and communication device |
-
2017
- 2017-06-27 CN CN201710503208.9A patent/CN109150813B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004965A (en) * | 2010-12-08 | 2011-04-06 | 吉林大学 | Double ant-counterfeiting method and system of product |
CN102129637A (en) * | 2011-01-18 | 2011-07-20 | 南京信息工程大学 | Commodity anti-counterfeiting method based on security mechanism |
CN102880838A (en) * | 2012-09-04 | 2013-01-16 | 深圳市芯海科技有限公司 | Method and device for detecting electronic equipment |
CN103607645A (en) * | 2013-11-22 | 2014-02-26 | 深圳市九洲电器有限公司 | Set top box pirate preventing method and set top box |
CN104200153A (en) * | 2014-09-12 | 2014-12-10 | 北京赛科世纪数码科技有限公司 | Start verification method and system |
CN104537299A (en) * | 2014-12-10 | 2015-04-22 | 深圳先进技术研究院 | Method and system for detecting electronic device, and related apparatuses |
US20160307246A1 (en) * | 2015-04-15 | 2016-10-20 | Master Supplements, Inc. | On-Line Authentication of Natural Dietary Supplements to Ensure Source and Quality |
CN104794626A (en) * | 2015-04-28 | 2015-07-22 | 广东欧珀移动通信有限公司 | Anti-counterfeiting method and anti-counterfeiting device based on hardware information |
CN105631687A (en) * | 2015-12-24 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Product verification method and device |
CN105634746A (en) * | 2016-03-23 | 2016-06-01 | 四川华拓光通信股份有限公司 | Anti-counterfeiting method of SFP (Small Form-factor Pluggable) optical module |
CN106657033A (en) * | 2016-12-02 | 2017-05-10 | 美的智慧家居科技有限公司 | Method for verifying validity of device and generating authorization information, and communication device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111552486A (en) * | 2020-04-27 | 2020-08-18 | 苏州浪潮智能科技有限公司 | SSD firmware burning method and related components |
CN111552486B (en) * | 2020-04-27 | 2024-02-09 | 苏州浪潮智能科技有限公司 | SSD firmware burning method and related components |
CN112231780A (en) * | 2020-09-25 | 2021-01-15 | 西安科芮智盈信息技术有限公司 | Method and device for detecting video image line connection state |
Also Published As
Publication number | Publication date |
---|---|
CN109150813B (en) | 2021-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10496811B2 (en) | Counterfeit prevention | |
CN109429222B (en) | Method for encrypting wireless network equipment upgrading program and communication data | |
TWI747836B (en) | Device birth certificate | |
TWI817930B (en) | Device programming system with device authentication | |
US11258792B2 (en) | Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium | |
EP2905925B1 (en) | System and method for remote access, Remote digital signature | |
CN111988147B (en) | Combined signature and signature verification method, system and storage medium | |
CN108229220B (en) | System and method for trusted presentation of information on untrusted user devices | |
CN106416124A (en) | Semi-deterministic digital signature generation | |
EP3552131B1 (en) | Password security | |
CN111292041A (en) | Electronic contract generating method, device, equipment and storage medium | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN102843232A (en) | Generating secure device secret key | |
CN109040134A (en) | A kind of design method and relevant apparatus of information encryption | |
CN111695097A (en) | Login checking method and device and computer readable storage medium | |
US10382417B2 (en) | Secure protocol for chip authentication | |
CN116232593A (en) | Multi-password module sensitive data classification and protection method, equipment and system | |
CN103592927A (en) | Method for binding product server and service function through license | |
CN109150813A (en) | A kind of verification method and device of equipment | |
US20160277182A1 (en) | Communication system and master apparatus | |
CN116506134B (en) | Digital certificate management method, device, equipment, system and readable storage medium | |
CN111628863A (en) | Data signature method and device, electronic equipment and storage medium | |
CN104580181A (en) | Device and method for data encryption and encryption accelerator engine | |
CN100546242C (en) | A kind of generation of super code and authentication method | |
CN103955652A (en) | File encryption method and device based on Andriod equipment authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200325 Address after: 310051 room 307, floor B, building 2, No. 399, Danfeng Road, Binjiang District, Hangzhou City, Zhejiang Province Applicant after: Hangzhou Haikang Storage Technology Co., Ltd Address before: 430074 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park, Guanshan Road, Phase 5, Building F4, Room 21, Room 01 Applicant before: WUHAN HIKVISION STORAGE TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |