CN109522701B - Counterfeit optical module detection method and device, electronic equipment and computer readable medium - Google Patents

Counterfeit optical module detection method and device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN109522701B
CN109522701B CN201811247097.0A CN201811247097A CN109522701B CN 109522701 B CN109522701 B CN 109522701B CN 201811247097 A CN201811247097 A CN 201811247097A CN 109522701 B CN109522701 B CN 109522701B
Authority
CN
China
Prior art keywords
optical module
encryption information
information
module
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811247097.0A
Other languages
Chinese (zh)
Other versions
CN109522701A (en
Inventor
秦娟
王雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201811247097.0A priority Critical patent/CN109522701B/en
Publication of CN109522701A publication Critical patent/CN109522701A/en
Application granted granted Critical
Publication of CN109522701B publication Critical patent/CN109522701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The embodiment of the invention provides a counterfeit optical module detection method and device, electronic equipment and a computer readable medium, and relates to the technical field of electronics. The counterfeit optical module detection method is applied to electronic equipment, and a first optical module and a second optical module are inserted into the electronic equipment. The counterfeit optical module detection method includes reading first encryption information of a first optical module and second encryption information of a second optical module. Comparing whether the first encryption information and the second encryption information are the same. And when the first encryption information and the second encryption information are the same, performing exception handling on the first optical module and the second optical module. The counterfeit optical module detection method and device, the electronic device and the computer readable medium provided by the embodiment of the invention can identify counterfeit optical modules copied in batch by copying the content of the register, and can effectively protect the benefits of manufacturers of the electronic device.

Description

Counterfeit optical module detection method and device, electronic equipment and computer readable medium
Technical Field
The invention relates to the technical field of electronics, in particular to a counterfeit optical module detection method and device, electronic equipment and a computer readable medium.
Background
An optical module plugged in an electronic device has a Central Processing Unit (CPU) therein, is used for Processing functions such as transceiving control and parameter diagnosis, and has a storage medium, typically an electrically Erasable Read-Only Memory (EEPROM) or a flash device, on which an optical module register is arranged, and records information such as a module type, a wavelength, a transmission distance, and a serial number. However, the optical modules may be maliciously and massively imitated by malicious users, and the counterfeit optical modules are difficult to be identified when being inserted into the electronic device in batches, so that the counterfeit optical modules can be normally used on the electronic device, and huge loss is brought to manufacturers of the electronic device.
Disclosure of Invention
The invention aims to provide a counterfeit optical module detection method which can identify counterfeit optical modules copied in batch by copying the content of a register and effectively protect the benefit of an electronic equipment manufacturer.
The invention aims to provide a fake optical module detection device which can identify fake optical modules copied in batch by copying the content of a register and can effectively protect the interests of manufacturers of electronic equipment.
An object of the present invention includes providing an electronic device capable of recognizing counterfeit optical modules that are mass-counterfeited by copying register contents, which can effectively protect the interests of electronic device manufacturers.
The object of the present invention includes providing a computer readable medium capable of effectively protecting the interests of electronic device manufacturers against counterfeit optical modules that are mass-counterfeited by copying the contents of registers.
The embodiment of the invention is realized by the following steps:
a counterfeit optical module detection method is applied to an electronic device, wherein a first optical module and a second optical module are connected to the electronic device in an inserted mode, and the counterfeit optical module detection method comprises the following steps: reading first encryption information of the first optical module and second encryption information of the second optical module; comparing whether the first encryption information and the second encryption information are the same; and when the first encryption information and the second encryption information are the same, performing exception handling on the first optical module and the second optical module.
An embodiment of the present invention further provides a counterfeit optical module detection apparatus, including: the device comprises a reading module, a first comparison module and an exception handling module; the reading module is used for reading first encryption information of the first optical module and second encryption information of the second optical module; the first comparison module is used for comparing whether the first encryption information and the second encryption information are the same or not; the exception handling module is configured to perform exception handling on the first optical module and the second optical module when the first encryption information and the second encryption information are the same.
An embodiment of the present invention further provides an electronic device, including: the device comprises a memory, a processor and a fake light module detection device, wherein the fake light module detection device is installed in the memory and comprises one or more software function modules executed by the processor. The counterfeit optical module detection device comprises: the device comprises a reading module, a first comparison module and an exception handling module; the reading module is used for reading first encryption information of the first optical module and second encryption information of the second optical module; the first comparison module is used for comparing whether the first encryption information and the second encryption information are the same or not; the exception handling module is configured to perform exception handling on the first optical module and the second optical module when the first encryption information and the second encryption information are the same.
Embodiments of the present invention also provide a computer-readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the counterfeit light module detection method described above.
The counterfeit optical module detection method and device, the electronic equipment and the computer readable medium provided by the embodiment of the invention have the beneficial effects that: the counterfeit optical module detection method and device, the electronic device and the computer readable medium provided by the embodiment of the invention further avoid the use of counterfeit optical modules through the comparison of encrypted information among a plurality of optical modules, can identify counterfeit optical modules which are copied in batch through copying the content of the register, and can effectively protect the benefits of manufacturers of the electronic device.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic block diagram of a structure of an electronic device to which a counterfeit optical module detection method according to an embodiment of the present invention is applied;
fig. 2 is a schematic block diagram of a flow of a counterfeit optical module detection method according to an embodiment of the present invention;
FIG. 3 is a schematic block diagram of a flow chart of a counterfeit light module detection method according to another embodiment of the present invention;
fig. 4 is a block diagram illustrating a structure of a counterfeit optical module detection apparatus according to still another embodiment of the present invention.
Icon: 10-an electronic device; 11-a memory; 12-a processor; 100-counterfeit optical module detection device; 110-a reading module; 120-a first comparison module; 130-exception handling module; 140-a calculation module; 150-second comparison module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "inside", "outside", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, or the orientations or positional relationships that the products of the present invention are conventionally placed in use, or the orientations or positional relationships that are conventionally understood by those skilled in the art, and are used for the purpose of facilitating the description and simplifying the description, but do not indicate or imply that the equipment or the elements referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," and "connected" are to be construed broadly, e.g., as meaning fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Fig. 1 is a schematic block diagram of a structure of an electronic device 10 to which a counterfeit optical module detection method and a counterfeit optical module detection apparatus 100 according to an embodiment of the present invention are applied, and referring to fig. 1, the counterfeit optical module detection method and the counterfeit optical module detection apparatus 100 according to the embodiment are applied to the electronic device 10. The electronic device 10 may be a communication device, a server or a storage device, etc. The electronic device 10 is used for plugging the first optical module and the second optical module. The electronic device 10 includes a body (not shown), a memory 11, a processor 12, and a counterfeit light module detecting apparatus 100. A first port and a second port are arranged on the machine body, the first optical module is connected to the first port in an inserting mode, and the second optical module is connected to the second port in an inserting mode.
The memory 11 and the processor 12 are electrically connected to each other directly or indirectly to enable data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The counterfeit light module detection apparatus 100 includes at least one software function module which may be stored in the memory 11 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of a server. The processor 12 is configured to execute executable modules stored in the memory 11, such as software functional modules and computer programs included in the counterfeit light module detecting device 100.
The Memory 11 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (eeprom), and the like. The memory 11 is used for storing a program, and the processor 12 executes the program after receiving an execution instruction.
Referring to fig. 2, the method for detecting a counterfeit optical module according to the present embodiment includes the following steps:
step S100 reads first encryption information of the first optical module and second encryption information of the second optical module.
In this embodiment, the first optical module and the second optical module are respectively inserted into the recording device, and the encryption software written in the pluggable optical module is run. The encryption software respectively reads the identity information of the first optical module and the identity information of the second optical module as encryption input, wherein the identity information is information for uniquely identifying the optical module, such as a serial number and the like. The encryption software carries out encryption calculation on the identity of the first optical module through an encryption algorithm to obtain first encryption information, and the encryption software carries out encryption calculation on the identity of the second optical module through the encryption algorithm to obtain second encryption information. It is to be understood that the first cryptographic information is unique for the first optical module and the second cryptographic information is unique for the second optical module. The Encryption algorithm may be Advanced Encryption Standard (AES) algorithm, or the like. And writing the first encryption information into an internal user-writable register of the first optical module, and writing the second encryption information into an internal user-writable register of the second optical module. Thus, when the first optical module is inserted into the first port of the machine body, the first encrypted information can be read, and when the second optical module is inserted into the second port of the machine body, the second encrypted information can be read.
It should be noted that, the existing optical module encryption scheme is easily imitated by a malicious user. The entire contents of registers in the optical modules, including the encryption information, can be easily copied for mass production of counterfeit optical modules. The counterfeit optical modules are inserted into different ports of the electronic equipment in batches, and because the identity verification of the single optical module is realized only through the identity identification of the single optical module, the counterfeit optical modules cannot be identified in batches, so that the counterfeit optical modules can be normally used on the electronic equipment. Once a problem occurs, the optical module is considered by the user as an optical module of the electronic device manufacturer, thereby causing a huge loss to the electronic device manufacturer. The counterfeit optical module detection method, the counterfeit optical module detection device and the electronic device provided by the embodiment further avoid the use of counterfeit optical modules through comparison of encrypted information among a plurality of optical modules, can identify counterfeit optical modules which are copied in batches through copying register contents, and can effectively protect the benefits of manufacturers of electronic devices.
Step S200, comparing whether the first encryption information and the second encryption information are the same.
In this embodiment, the first encryption information and the second encryption information are compared to determine whether they are the same. Since the first cryptographic information is unique to the first optical module and the second cryptographic information is unique to the second optical module, if the first cryptographic information and the second cryptographic information are the same, the first optical module and the second optical module can be considered as counterfeit optical modules that are mass-counterfeited by copying contents of registers in the optical modules. If the first encryption information and the second encryption information are not the same, the first optical module and the second optical module can be considered not to be fake optical modules which are copied in batch by copying the register content in the optical modules, and the first optical module and the second optical module can work normally.
When the first encryption information and the second encryption information are the same, step S300 is performed. Step S300 includes performing exception handling on the optical module.
In this embodiment, when the first encryption information and the second encryption information are the same, exception handling is performed on the first optical module and the second optical module. And when the first encryption information and the second encryption information are the same, judging that the first optical module and the second optical module are fake optical modules which are copied in batches by copying the content of a register in the optical modules, and performing exception handling on the first optical module and the second optical module. The exception handling may be to cause the first optical module and the second optical module to fail to operate normally, and to send out an alarm signal.
In this way, it is possible to identify counterfeit optical modules that are copied in bulk by copying the register contents, and the benefits of the manufacturer of the electronic device 10 can be effectively protected.
It should be noted that, when the first encryption information and the second encryption information are not the same, step S500 is executed. Step S500 includes operating the optical module normally.
Further, in this embodiment, before step S200, the first optical module and the second optical module may also be respectively authenticated. In this embodiment, the purpose of performing identity authentication on the first optical module and the second optical module respectively is to determine whether the first optical module and the second optical module are optical modules sold by preset manufacturers. When the first optical module and the second optical module pass the authentication, step S200 is executed.
In this embodiment, when the first optical module and the second optical module fail to pass the authentication, step S300 is executed.
Referring to fig. 3, in this embodiment, the respectively performing identity verification on the first optical module and the second optical module may include:
step S411, reading the identity information of the first optical module and the second optical module.
In this embodiment, the identity information of the first optical module is information that can uniquely identify the first optical module, such as a serial number. It should be noted that step S411 may be performed simultaneously with step S100, that is, when the first encryption information of the first optical module is read, the identity information of the first optical module may be read simultaneously. In this embodiment, the identity information of the second optical module is information that can uniquely identify the second optical module, such as a serial number. It should be noted that step S411 may be performed simultaneously with step S100, that is, when reading the second encryption information of the second optical module, the identity information of the second optical module may be read simultaneously.
Step S412, obtaining third encryption information according to the identity information of the first optical module.
In this embodiment, in step S412, the identity information of the first optical module is encrypted to obtain third encrypted information. The encryption algorithm used for the encryption calculation may be an AES algorithm or the like.
In step S413, it is compared whether the first encryption information and the third encryption information are the same.
In this embodiment, the first encryption information is compared with the third encryption information, and if the first encryption information is the same as the third encryption information, the first optical module is considered to be an optical module sold by a preset manufacturer.
And if the first encryption information is not the same as the third encryption information, the first optical module is not a preset optical module sold by a manufacturer. In this embodiment, when the first encryption information is different from the third encryption information, step S300 is executed to perform exception handling on the first optical module.
Step S421, obtain fourth encryption information according to the identity information of the second optical module.
In this embodiment, in step S421, the identity information of the second optical module is encrypted to obtain fourth encrypted information. The encryption algorithm used for the encryption calculation may be an AES algorithm or the like.
Step S422, it is compared whether the second encryption information is the same as the fourth encryption information.
In this embodiment, the second encryption information is compared with the fourth encryption information, and if the second encryption information is the same as the fourth encryption information, the second optical module is considered to be an optical module sold by a preset manufacturer.
And if the second encryption information is not the same as the fourth encryption information, the second optical module is not a preset optical module sold by a manufacturer. In this embodiment, when the second encryption information is different from the fourth encryption information, step S300 is executed to perform exception handling on the second optical module.
In addition, it should be noted that, when the first encryption information is the same as the third encryption information and the second encryption information is the same as the fourth encryption information, step S200 is executed.
It should be noted that, when detecting optical modules in batch, only the steps of the above method need to be repeatedly executed.
In summary, the counterfeit optical module detection method according to this embodiment compares whether first encryption information of the first optical module and second encryption information of the second optical module are the same, and when the first encryption information is the same as the second encryption information, the first optical module and the second optical module are counterfeit modules that are mass-copied by copying contents of registers on the optical modules, and the first optical module and the second optical module are exception-processed because the first encryption information is unique information for the first optical module and the second encryption information is unique information for the second optical module. Therefore, by comparing the encrypted information among the plurality of optical modules, the use of counterfeit optical modules is further avoided, counterfeit optical modules which are copied in batches by copying the content of the register can be identified, and the benefits of electronic equipment manufacturers can be effectively protected.
In addition, referring to fig. 4, an embodiment of the invention further provides a counterfeit optical module detection apparatus 100, where the counterfeit optical module detection apparatus 100 includes a reading module 110, a first comparing module 120, an exception handling module 130, a calculating module 140, and a second comparing module 150.
The reading module 110 is configured to read first encryption information of the first optical module and second encryption information of the second optical module, and is further configured to read identity information of the first optical module and the second optical module.
In this embodiment of the present invention, step S100 and step S411 may be executed by the reading module 110.
And a first comparing module 120 for comparing whether the first encryption information and the second encryption information are the same.
In this embodiment of the present invention, step S200 may be executed by the first comparing module 120.
And an exception handling module 130, configured to perform exception handling on the optical module. In the embodiment of the invention, the method and the device are used for performing exception handling on the first optical module and the second optical module when the first encryption information and the second encryption information are the same.
In this embodiment of the present invention, step S300 may be executed by the exception handling module 130.
The calculating module 140 is configured to obtain third encryption information according to the identity information of the first optical module and obtain fourth encryption information according to the identity information of the second optical module.
In an embodiment of the present invention, the substep S412 and the substep S421 may be executed by the calculation module 140.
A second comparing module 150 for comparing whether the first encryption information is the same as the third encryption information and for comparing whether the second encryption information is the same as the fourth encryption information.
In an embodiment of the present invention, substep S413 and substep S422 may be performed by the second comparing module 150.
In addition, the exception handling module 130 is further configured to perform exception handling on the optical module. The exception handling module 130 is configured to, when the first encryption information is different from the third encryption information, perform exception handling on the first optical module; and when the second encryption information is different from the fourth encryption information, performing exception handling on the first optical module.
The counterfeit optical module detection apparatus 100 provided by the embodiment of the present invention can identify counterfeit optical modules that are copied in batch by copying the register content, and can effectively protect the benefits of manufacturers of electronic devices.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A counterfeit optical module detection method is applied to an electronic device, wherein a first optical module and a second optical module are inserted into the electronic device, and the counterfeit optical module detection method comprises the following steps:
reading first encryption information of the first optical module and second encryption information of the second optical module;
comparing whether the first encryption information and the second encryption information are the same;
when the first encryption information and the second encryption information are the same, performing exception handling on the first optical module and the second optical module;
the step of comparing whether the first encryption information and the second encryption information are the same further comprises:
reading identity information of the first optical module and the second optical module;
obtaining third encryption information according to the identity information of the first optical module;
comparing whether the first encryption information and the third encryption information are the same;
obtaining fourth encryption information according to the identity information of the second optical module;
comparing whether the second encryption information is the same as the fourth encryption information;
when the first encryption information is the same as the third encryption information and the second encryption information is the same as the fourth encryption information, performing the step of comparing whether the first encryption information and the second encryption information are the same.
2. A counterfeit light module detection method as claimed in claim 1, wherein the step of obtaining third encryption information according to the identity information of the first light module comprises:
carrying out encryption calculation on the identity information of the first optical module to obtain third encryption information;
the step of obtaining fourth encryption information according to the identity information of the second optical module includes:
and carrying out encryption calculation on the identity information of the second optical module to obtain fourth encryption information.
3. The method of claim 1, further comprising:
when the first encryption information is different from the third encryption information, performing exception handling on the first optical module;
and when the second encryption information is different from the fourth encryption information, performing exception handling on the second optical module.
4. A counterfeit light module detection apparatus, comprising:
the reading module is used for reading first encryption information of the first optical module and second encryption information of the second optical module;
the first comparison module is used for comparing whether the first encryption information and the second encryption information are the same or not;
the exception handling module is used for carrying out exception handling on the first optical module and the second optical module when the first encryption information and the second encryption information are the same;
the reading module is further configured to read identity information of the first optical module and the second optical module;
the counterfeit optical module detection device further comprises:
the computing module is used for obtaining third encryption information according to the identity information of the first optical module and obtaining fourth encryption information according to the identity information of the second optical module;
a second comparing module, configured to compare whether the first encrypted information is the same as the third encrypted information and whether the second encrypted information is the same as the fourth encrypted information;
the first comparing module is further configured to compare whether the first encryption information is the same as the third encryption information and the second encryption information is the same as the fourth encryption information.
5. The counterfeit optical module detection apparatus as claimed in claim 4, wherein the calculation module is further configured to perform encryption calculation on the identity information of the first optical module to obtain third encryption information, and perform encryption calculation on the identity information of the second optical module to obtain fourth encryption information.
6. The counterfeit optical module detection apparatus according to claim 4, wherein the exception handling module is further configured to perform exception handling on the first optical module when the first encryption information is different from the third encryption information, and perform exception handling on the second optical module when the second encryption information is different from the fourth encryption information.
7. An electronic device, comprising:
a memory;
a processor; and the counterfeit light module detection apparatus as defined in any one of claims 4 to 6, wherein the counterfeit light module detection apparatus is installed in the memory and comprises one or more software function modules executed by the processor.
8. A computer-readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the counterfeit light module detection method of any of claims 1-3.
CN201811247097.0A 2018-10-24 2018-10-24 Counterfeit optical module detection method and device, electronic equipment and computer readable medium Active CN109522701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811247097.0A CN109522701B (en) 2018-10-24 2018-10-24 Counterfeit optical module detection method and device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811247097.0A CN109522701B (en) 2018-10-24 2018-10-24 Counterfeit optical module detection method and device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN109522701A CN109522701A (en) 2019-03-26
CN109522701B true CN109522701B (en) 2021-05-07

Family

ID=65773742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811247097.0A Active CN109522701B (en) 2018-10-24 2018-10-24 Counterfeit optical module detection method and device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN109522701B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9330485B2 (en) * 2013-02-20 2016-05-03 Kabushiki Kaisha Toshiba Volume rendering of medical images
CN105577380A (en) * 2014-10-17 2016-05-11 中兴通讯股份有限公司 Optical module authentication method and device
CN105491409B (en) * 2015-12-24 2019-01-08 北京腾锐视讯科技有限公司 Enhance CA system in a kind of digital television system
CN108447501B (en) * 2018-03-27 2020-08-18 中南大学 Pirated video detection method and system based on audio words in cloud storage environment

Also Published As

Publication number Publication date
CN109522701A (en) 2019-03-26

Similar Documents

Publication Publication Date Title
US9596250B2 (en) System and method for protecting against point of sale malware using memory scraping
EP1518158B1 (en) Trusted computer platform
CN113312676B (en) Data access method and device, computer equipment and readable storage medium
US20170289193A1 (en) Secure smart terminal and an information processing method
CN102077204B (en) Secure memory management system and method
EP1594036B1 (en) Method for Confirmation of Software and Apparatus for Executing Software
US20080052526A1 (en) System and Method for Enrolling Users in a Pre-Boot Authentication Feature
CN109344611B (en) Application access control method, terminal equipment and medium
WO2019209630A1 (en) File processing method and system, and data processing method
CN108009435B (en) Data desensitization method, device and storage medium
US20130219522A1 (en) Data processing method and device
CN102289612A (en) System and method for n-ary locality in a security co-processor
CN109117643B (en) System processing method and related equipment
CN107209840B (en) Secure transactions with connected peripherals
CN101853345B (en) Method and apparatus for processing data stored in external storage device
CN109933986B (en) Malicious code detection method and device
CN108229210A (en) A kind of method, terminal and computer readable storage medium for protecting data
CN106980800A (en) A kind of measure and system for encrypting solid state hard disc certification subregion
CN109522701B (en) Counterfeit optical module detection method and device, electronic equipment and computer readable medium
CN109446011A (en) A kind of firmware safety detecting method, device and the storage medium of hard disk
JP4978180B2 (en) Wireless tag, tag system, wireless tag control method, and management method
CN112182555A (en) Weak password detection method, device, electronic apparatus, storage medium, and program
CN108647516B (en) Method and device for defending against illegal privilege escalation
CN111400708B (en) Method and device for malicious code detection
JPWO2018163274A1 (en) Risk analysis device, risk analysis method and risk analysis program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant