CN111538371A - Real-time clock device, working method thereof and USB (universal serial bus) equipment - Google Patents

Real-time clock device, working method thereof and USB (universal serial bus) equipment Download PDF

Info

Publication number
CN111538371A
CN111538371A CN202010643463.5A CN202010643463A CN111538371A CN 111538371 A CN111538371 A CN 111538371A CN 202010643463 A CN202010643463 A CN 202010643463A CN 111538371 A CN111538371 A CN 111538371A
Authority
CN
China
Prior art keywords
authentication code
authentication
key data
module
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010643463.5A
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN202010643463.5A priority Critical patent/CN111538371A/en
Publication of CN111538371A publication Critical patent/CN111538371A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/04Generating or distributing clock signals or signals derived directly therefrom
    • G06F1/14Time supervision arrangements, e.g. real time clock
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
    • G06F13/4291Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus using a clocked protocol
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2213/00Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F2213/0042Universal serial bus [USB]

Abstract

The invention discloses a real-time clock device, a working method thereof and USB equipment, and belongs to the technical field of computers. The real-time clock device detects and receives the operation instruction sent by the upper device, determines the operation type according to the operation instruction, and authenticates the authentication data in the operation instruction according to the authentication mode if the operation type is write-in time so as to ensure that the time in the real-time clock device is not maliciously tampered, thereby ensuring that the provided clock is safe and credible.

Description

Real-time clock device, working method thereof and USB (universal serial bus) equipment
Technical Field
The invention relates to the technical field of computers, in particular to a real-time clock device, a working method thereof and USB equipment.
Background
A Real Time Clock (RTC) is a standard configuration of electronic devices that is used to provide a Time reference for the electronic devices. In the prior art, a communication mode for interaction between a real-time clock and a master control in an electronic device includes: however, in some real-time clock application fields, for example, in order to reduce loss, a person maliciously modifies the current time of a real-time clock to achieve a malicious behavior of evading tax in order to reduce loss in tax invoicing work, so how to safely provide the running time of the real-time clock is an urgent problem to be solved.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a real-time clock apparatus, a working method thereof, and a USB device, which can prevent tampering with real-time clock time.
The working method of the real-time clock device provided by the embodiment of the invention comprises the following steps:
step S1, the real-time clock device is electrified and initialized;
step S2, the real-time clock device detects whether an operation instruction sent by an upper device is received, if so, the step S3 is executed, otherwise, the operation is ended;
step S3, the real-time clock device judges the operation type according to the operation instruction, if the operation type is the write-in time, the step S4 is executed; if the operation type is the read time, go to step S6;
step S4, the real-time clock device obtains the first authentication code and time data in the operation instruction, obtains key data stored by the real-time clock device, verifies the first authentication code according to the key data, if the verification is successful, the step S5 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step S2 is returned;
step S5, the real-time clock device sets the acquired time data as the starting time, starts timing according to the starting time, and returns to step S2;
and S6, the real-time clock device acquires the current timing time, organizes and obtains a read time response according to the current timing time, sends the read time response to the upper device, and returns to the step S2.
The embodiment of the invention provides a real-time clock device, which comprises:
the initialization module is used for power-on initialization;
the detection module is used for detecting whether an operation instruction sent by the upper device is received or not;
the judging module is used for judging the operation type according to the operation instruction;
the first verification module is used for acquiring a first authentication code and time data in the operation instruction when the judgment module judges that the operation type is the writing time, acquiring key data stored by the first verification module, and verifying the first authentication code according to the key data;
the first verification module is further used for setting the acquired time data as an initial time when the first authentication code is verified successfully, and starting timing according to the initial time;
the acquisition module is used for acquiring the current timing time when the judgment module judges that the operation type is the reading time, and organizing the reading time according to the current timing time to obtain the reading time response;
the sending module is used for sending the reading time response organized by the obtaining module to the upper device;
the sending module is further configured to send authentication failure information to the upper device when the first authentication code fails to be verified. .
The USB equipment provided by the embodiment of the invention comprises the device provided by the invention.
The technical scheme provided by the embodiment of the invention has the beneficial effects that: the invention authenticates the write time operation request sent by the upper device through the real-time clock device according to the authentication mode to ensure that the time in the real-time clock device is not maliciously tampered, thereby ensuring that the provided clock is safe and credible.
Drawings
Fig. 1 is a flowchart of a method for operating a real-time clock device according to an embodiment of the present invention;
2-1, 2-2, and 2-3 are flowcharts of a method for operating a real-time clock apparatus according to a second embodiment of the present invention;
fig. 3 is a block diagram of a real-time clock apparatus according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
The embodiment of the invention provides a working method of a real-time clock device, which is suitable for a system comprising an upper device and the real-time clock device, wherein the upper device can be an upper computer or a main control module independent of the real-time clock device;
as shown in fig. 1, the method includes:
101, electrifying and initializing a real-time clock device;
step 102, the real-time clock device detects whether an operation instruction sent by the upper device is received, if so, step 103 is executed, otherwise, the operation is finished;
step 103, the real-time clock device judges the operation type according to the operation instruction, and if the operation type is the writing time, step 104 is executed; if the operation type is read time, go to step 106;
step 104, the real-time clock device obtains a first authentication code and time data in the operation instruction, obtains key data stored by the real-time clock device, verifies the first authentication code according to the key data, if the verification is successful, step 105 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step 102 is returned;
step 105, the real-time clock device sets the acquired time data as the starting time, starts timing according to the starting time, and returns to step 102;
and 106, acquiring the current timing time by the real-time clock device, organizing according to the current timing time to obtain a read time response, sending the read time response to the upper device, and returning to the step 102.
Optionally, in this embodiment, in step 104, verifying the first authentication code according to the key data specifically includes: the real-time clock device obtains the authentication factor, obtains a second authentication code according to the key data and the authentication factor, judges whether the second authentication code is consistent with the first authentication code, if so, executes the step 105, otherwise, sends authentication failure information to the upper device, and returns to the step 102.
Optionally, in this embodiment, step 103 further includes: if the operation type is a write time authentication request, the method further comprises: the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires a third authentication code according to the key data and the authentication factor, sends an authentication instruction including the third authentication code to the upper device, and returns to the step 102;
specifically, verifying the first authentication code according to the key data specifically includes: and the real-time clock device obtains a fourth authentication code according to the key data and the third authentication code, judges whether the fourth authentication code is consistent with the first authentication code, if so, executes the step 105, otherwise, sends authentication failure information to the upper device, and returns to the step 102.
Optionally, in this embodiment, before executing step 104, the method further includes: the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to the step 102, otherwise, executes the step 104.
Optionally, in this embodiment, before returning to step 102 in step 105, the method further includes: and the real-time clock device sets a value corresponding to the corresponding operation state byte according to the writing time result, and generates writing time response data according to the operation state byte and returns the writing time response data to the upper device.
Optionally, in this embodiment, step 103 further includes: if the operation type is updating the key, the method comprises the following steps:
step 107, the real-time clock device acquires a fifth authentication code in the operation instruction, acquires key data stored by the real-time clock device, verifies the fifth authentication code according to the key data stored by the real-time clock device, if the verification is successful, the step 108 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step 102 is returned;
and step 108, the real-time clock device acquires the updated key data in the operation instruction, updates the key data stored in the real-time clock device into the acquired updated key data, and returns to the step 102.
Preferably, in this embodiment, in step 107, verifying the fifth authentication code according to the key data stored in itself specifically includes: the real-time clock device obtains the authentication factor, obtains a sixth authentication code according to the key data and the authentication factor, judges whether the sixth authentication code is consistent with the fifth authentication code, if so, executes step 108, otherwise, sends authentication failure information to the upper device, and returns to step 102.
Preferably, in this embodiment, step 103 further includes: if the operation type is an update key authentication request, the method further comprises the following steps: the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires a seventh authentication code according to the key data and the authentication factor, sends an authentication instruction including the seventh authentication code to the upper device, and returns to the step 102;
specifically, verifying the fifth authentication code according to the key data stored in the fifth authentication code is specifically: and the real-time clock device obtains an eighth authentication code according to the key data and the seventh authentication code, judges whether the eighth authentication code is consistent with the fifth authentication code, if so, executes the step 108, otherwise, sends authentication failure information to the upper device, and returns to the step 102.
Preferably, in this embodiment, before executing step 107, the method further includes: and the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to the step 102, and otherwise executes the step 107.
Further preferably, in this embodiment, after determining that the key data corresponding to the key category is empty, the method includes: the real-time clock device obtains the updated key data in the operation instruction, stores the updated key data corresponding to the key type, returns an updated key response to the upper device, and returns to step 102.
Preferably, in this embodiment, before returning to step 102, in step 108, further including: and the real-time clock device sets a value corresponding to the corresponding operation state byte according to the key updating result, generates key updating response data according to the operation state byte, and returns the key updating response data to the upper device.
Optionally, in this embodiment, before executing step 106, the method further includes:
step a1, the real-time clock device obtains the ninth authentication code in the operation instruction, obtains the key data stored by itself, verifies the ninth authentication code according to the key data, if the verification is successful, step 106 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step 102 is returned.
Preferably, in this embodiment, verifying the ninth authentication code according to the key data specifically includes: and the real-time clock device acquires the authentication factor, acquires a tenth authentication code according to the key data and the authentication factor, judges whether the tenth authentication code is consistent with the ninth authentication code, if so, executes the step 106, otherwise, sends authentication failure information to the upper device, and returns to the step 102.
Preferably, in this embodiment, step 103 further includes: if the operation type is a read time authentication request, the method further comprises the following steps: the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires an eleventh authentication code according to the key data and the authentication factor, sends an authentication instruction including the eleventh authentication code to the upper device, and returns to the step 102;
specifically, verifying the ninth authentication code according to the key data specifically includes: and the real-time clock device obtains a twelfth authentication code according to the key data and the eleventh authentication code, judges whether the twelfth authentication code is consistent with the ninth authentication code, if so, executes the step 106, otherwise, sends authentication failure information to the upper device, and returns to the step 102.
Preferably, in this embodiment, before performing step a1, the method further includes: the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to the step 102, otherwise, executes the step a 1.
Preferably, in this embodiment, the acquiring, by the real-time clock device, the authentication factor specifically includes: the real-time clock device acquires an authentication factor in an operation instruction;
further preferably, in this embodiment, the acquiring, by the real-time clock device, the authentication factor specifically includes: the real-time clock device generates an authentication factor according to a preset algorithm;
optionally, in this embodiment, the key is initialized before the device leaves the factory;
preferably, in the present embodiment, the initialization key category may be one or more.
Example two
The second embodiment of the invention provides a working method of a real-time clock device, which is suitable for a system comprising an upper device and the real-time clock device, wherein the upper device can be an upper computer or a main control module independent of the real-time clock device;
as shown in fig. 2-1, 2-2, 2-3, the method includes:
step 201, electrifying and initializing a real-time clock device;
specifically, the real-time clock device initialization includes: initializing a first register by a real-time clock device, and presetting a first register interrupt period; initializing a second register, and setting a preset value for the second register to receive communication interruption;
step 202, the real-time clock device detects whether an operation instruction sent by the upper device is received, if so, step 203 is executed, otherwise, the operation is finished;
step 203, the real-time clock device judges the operation type according to the operation instruction, and if the operation type is the writing time, step 204 is executed; if the operation type is to update the key, go to step 207; if the operation type is read time, go to step 210;
optionally, in this embodiment, the determining, by the real-time clock device according to the operation instruction, the operation type specifically includes: the real-time clock device acquires a preset byte in an operation instruction and judges an operation type according to a value corresponding to the preset byte;
for example, if the value of the preset byte is 11, it indicates that the operation type is the update key; if the value of the preset byte is 22, the operation type is the writing time; if the value of the preset byte is 20, the operation type is the reading time;
step 204, the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to step 202, otherwise, executes step 205;
step 205, the real-time clock device obtains the first authentication code and the time data in the operation instruction, obtains the key data stored by itself, verifies the first authentication code according to the key data, if the verification is successful, step 206 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step 202 is returned;
specifically, in this embodiment, verifying the first authentication code according to the key data specifically includes: the real-time clock device generates an authentication factor according to a preset algorithm, acquires key data stored by the real-time clock device, obtains a second authentication code according to the key data and the authentication factor, judges whether the second authentication code is consistent with the first authentication code, if so, executes step 206, otherwise, sends authentication failure information to the upper device, and returns to step 202.
Optionally, step 205 further includes: the real-time clock device acquires an authentication factor in an operation instruction;
specifically, verifying the first authentication code according to the key data specifically includes: and obtaining a second authentication code according to the key data and the obtained authentication factor, judging whether the second authentication code is consistent with the first authentication code, if so, executing the step 206, otherwise, sending authentication failure information to the upper device, and returning to the step 202.
In this embodiment, step 203 further includes: if the operation type is a write time authentication request, the method further comprises:
the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires a third authentication code according to the key data and the authentication factor, sends an authentication instruction including the third authentication code to the upper device, and returns to the step 202;
specifically, verifying the first authentication code according to the key data specifically includes: the real-time clock device obtains a fourth authentication code according to the key data and the third authentication code, and determines whether the fourth authentication code is consistent with the first authentication code, if so, step 206 is executed, otherwise, authentication failure information is sent to the upper device, and the step 202 is returned.
Step 206, the real-time clock device sets the acquired time data as the starting time, starts timing according to the starting time, and returns to step 202;
optionally, in this embodiment, in step 205, the step of acquiring the write time data packet by the real-time clock device specifically includes: acquiring time data according to a mode corresponding to a time format;
the setting of the acquired time data as the start time by the real-time clock device specifically includes: writing the acquired time data in a mode corresponding to the time format;
specifically, the write-in time format includes a first format and a second format, the way of acquiring time data corresponding to the write-in time first format is a first way, and the way of acquiring time data corresponding to the write-in time second format is a second way;
preferably, when the first format of the write time is year, month, day, hour, minute and second, the first mode of the real-time clock device for reading the time data is as follows: splitting according to bytes;
for example, the time data is: 20,19,08,09,12,34, 56; the real-time clock device writing time is as follows: 8/month 9/12: 34:56 in 2019;
preferably, when the second format of the write time is a numerical format, the second way for the real-time clock device to read the time data is: reading bytes, converting the bytes, taking the converted numerical value of the first 4 bytes as year, month, day, hour and minute, and taking the converted numerical value of the 5 th byte as second;
for example, the time data is: 01,8E,17,12,56,00, 00; the real-time clock device writing time is as follows: 8/month 9/12: 34:56 in 2019;
optionally, in this embodiment, in step 206, before returning to step 202, the method further includes: the real-time clock device sets a value corresponding to the corresponding operation state byte according to the write-in time result, and generates write-in time response data according to the operation state byte and returns the write-in time response data to the upper device;
specifically, the real-time clock device write time results include: write success, write failure; the write failure includes: parameter errors, authentication failures, mismatching of operations before and after, other error conditions;
for example, the byte value of the write-successful operation status is 00, the byte value of the parameter-erroneous operation status is 01, the byte value of the authentication-failed operation status is 05, the byte value of the operation status of the previous and subsequent operations mismatch is 08, and the byte value of the operation status of other error conditions is FF;
step 207, the real-time clock device determines the key type to be updated according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to step 202, otherwise, executes step 208;
step 208, the real-time clock device acquires a fifth authentication code in the operation instruction, acquires key data stored by the real-time clock device, verifies the fifth authentication code according to the key data, if the verification is successful, step 209 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step 202 is returned;
in this embodiment, verifying the fifth authentication code according to the key data specifically includes: the real-time clock device generates an authentication factor according to a preset algorithm, obtains a sixth authentication code according to the key data and the authentication factor, judges whether the sixth authentication code is consistent with the fifth authentication code, if so, executes step 209, otherwise, sends authentication failure information to the upper device, and returns to step 202.
Optionally, in this embodiment, step 208 further includes: the real-time clock device acquires an authentication factor in an operation instruction;
verifying the fifth authentication code according to the key data specifically comprises: the real-time clock device obtains a sixth authentication code according to the key data and the obtained authentication factor, and determines whether the sixth authentication code is consistent with the fifth authentication code, if so, step 209 is executed, otherwise, authentication failure information is sent to the upper device, and the step 202 is returned.
Optionally, in this embodiment, step 203 further includes: if the operation type is an update key authentication request, the method further comprises the following steps:
the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires a seventh authentication code according to the key data and the authentication factor, sends an authentication instruction including the seventh authentication code to the upper device, and returns to the step 202;
specifically, verifying the fifth authentication code according to the key data specifically includes: and the real-time clock device obtains an eighth authentication code according to the key data and the seventh authentication code, judges whether the eighth authentication code is consistent with the fifth authentication code, if so, executes the step 209, otherwise, sends authentication failure information to the upper device, and returns to the step 202.
Step 209, the real-time clock device obtains the updated key data in the operation instruction, replaces the key data stored by the real-time clock device with the updated key data obtained from the operation instruction, and returns to step 202;
in this embodiment, before returning to step 202, step 209 further includes: the real-time clock device sets a value corresponding to the corresponding operation state byte according to the key updating result, and generates key updating response data according to the operation state byte and returns the key updating response data to the upper device;
in this embodiment, the updating the key status by the real-time clock device includes: updating is successful and updating is failed; the update failure includes: parameter errors, authentication failures, and mismatching of former and later operations;
for example, the byte value of the operation status of successful update is 00, the byte value of the operation status of parameter error is 01, the byte value of the operation status of authentication failure is 05, and the byte value of the operation status of mismatch between the previous operation and the next operation is 08;
further preferably, in this embodiment, after determining that the key data corresponding to the key category is empty, the method includes: the real-time clock device obtains the updated key data in the operation instruction, stores the updated key data corresponding to the key type, returns an updated key response to the upper device, and returns to step 202.
Step 210, the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to step 202, otherwise, executes step 211;
step 211, the real-time clock device obtains the ninth authentication code in the operation instruction, obtains the key data stored by itself, verifies the ninth authentication code according to the key data, if the verification is successful, step 212 is executed, if the verification is failed, the authentication failure information is sent to the upper device, and the step 202 is returned.
Specifically, in this embodiment, verifying the ninth authentication code according to the key data specifically includes: the real-time clock device generates an authentication factor according to a preset algorithm, obtains a tenth authentication code according to the key data and the authentication factor, judges whether the tenth authentication code is consistent with the ninth authentication code, if so, executes step 212, otherwise, sends authentication failure information to the upper device, and returns to step 202.
Optionally, step 211 further includes: the real-time clock device acquires an authentication factor in an operation instruction;
verifying the ninth authentication code according to the key data specifically comprises: the real-time clock device obtains a tenth authentication code according to the key data and the obtained authentication factor, judges whether the tenth authentication code is consistent with the ninth authentication code, if so, executes step 212, otherwise, sends authentication failure information to the upper device, and returns to step 202.
In this embodiment, step 203 further includes: if the operation type is a read time authentication request, the method further comprises the following steps:
the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires an eleventh authentication code according to the key data and the authentication factor, sends an authentication instruction including the eleventh authentication code to the upper device, and returns to the step 202;
specifically, verifying the ninth authentication code according to the key data specifically includes: the real-time clock device obtains a twelfth authentication code according to the key data and the eleventh authentication code, judges whether the twelfth authentication code is consistent with the ninth authentication code, if so, executes step 212, otherwise, sends authentication failure information to the upper device, and returns to step 202.
Step 212, the real-time clock device obtains the current timing time, organizes the read time response according to the current timing time, sends the read time response to the upper device, and returns to step 202.
Optionally, in this embodiment, in step 214, the obtaining, by the real-time clock device, the current time specifically includes: acquiring time data according to a mode corresponding to a time format;
specifically, organizing and obtaining the read time response according to the current time is as follows: organizing the acquired current time according to a mode corresponding to the time format to obtain a reading time response;
specifically, the read time format includes a first format and a second format, the read time first format corresponds to the first mode of organizing time data, and the read time second format corresponds to the second mode of organizing time data;
preferably, when the first format of the read time is year, month, day, hour, minute and second, the first mode of organizing the time data by the real-time clock device is as follows: splitting according to bytes;
for example, the real-time clock device reads the time as: 8/month 9/12: 34:56 in 2019; the time data are: 20,19,08,09,12,34, 56;
preferably, when the second format of the read time is a numerical format, the second way of organizing the time data by the real-time clock device is as follows: reading the current time, and converting the current time into bytes to obtain time data;
for example, the real-time clock device reads the time as: 8/month 9/12: 34:56 in 2019; the time data are: 01,8E,17,12,56,00, 00;
optionally, in this embodiment, the read time response further includes an operation status byte;
specifically, organizing the read time response according to the current time includes: the real-time clock device sets a corresponding value of the operation state byte according to the reading time result, and generates reading time response data according to the operation state byte and the read time data and returns the reading time response data to the upper device;
specifically, the real-time clock device reading time results include: a write failure comprising: parameter errors, time non-initialization, authentication failure, mismatch between previous and subsequent operations, and other error conditions;
for example, the parameter error operation status byte value is 01, the time non-initialization operation status byte value is 03, the authentication failure operation status byte value is 05, the operation status byte value for the previous and subsequent operation mismatch is 08, and the operation status byte value for the other error case is FF.
In this embodiment, in step 214, organizing and obtaining the read time response according to the current time specifically further includes: the real-time clock device acquires the current timing time, and encrypts the acquired current timing time through a preset algorithm according to a preset encryption key to obtain a read time response.
Specifically, in this embodiment, the device is before factory shipment or receives a key initialization process, where the initialized key category may be one or two, and is not limited herein; if the two types of codes are included, one type of code is used for participating in calculating the authentication code in the processes of writing time and modification time; the other method is used for participating in calculating the authentication code in the process of acquiring time;
for example, key categories include: k1, k2 and k1 are specifically used for participating in authentication during writing time and modification time, and k2 is specifically used for participating in authentication during acquiring time.
Specifically, in this embodiment, when the device receives the initialization time operation instruction, the specific schemes of the specific operation and the write time may be the same;
on the other hand, the device may also initialize the time before shipping, and may not perform the authentication process;
in this embodiment, the key data is cleared if the rtc device detects a power failure.
In this embodiment, the real-time clock apparatus has a specific calibration function; the method specifically comprises the following steps: the real-time clock device receives a calibration request sent by the upper device, stores the calibration value in the request, and can calibrate the clock according to the calibration value if the calibration count value of the real-time clock device is equal to the preset calibration threshold value.
EXAMPLE III
In a third embodiment of the present invention, as shown in fig. 3, a real-time clock apparatus includes,
an initialization module 10, configured to power on initialization;
the detection module 11 is configured to detect whether an operation instruction sent by an upper device is received;
the judging module 12 is used for judging the operation type according to the operation instruction;
the first verification module 13 is configured to, when the determination module 12 determines that the operation type is the write-in time, obtain a first authentication code and time data in the operation instruction, obtain key data stored in the first verification module, and verify the first authentication code according to the key data;
the first verification module 13 is further configured to set the acquired time data as an initial time when the first authentication code is successfully verified, and start timing according to the initial time;
an obtaining module 14, configured to obtain current timing time when the determining module 12 determines that the operation type is the reading time, and organize to obtain a reading time response according to the current timing time;
a sending module 15, configured to send the read time response organized by the obtaining module 14 to an upper apparatus;
the sending module 15 is further configured to send authentication failure information to the upper device when the first authentication code fails to be verified.
Optionally, in this embodiment, the first verification module 13 includes: the device comprises a first acquisition unit, a first judgment unit and a first sending unit;
the first acquisition unit is used for acquiring the authentication factor and acquiring a second authentication code according to the key data and the authentication factor;
the first judging unit is used for judging whether the second authentication code is consistent with the first authentication code or not;
and the first sending unit is used for sending authentication failure information to the upper device when the first judging unit judges that the second authentication code is inconsistent with the first authentication code.
Optionally, in this embodiment, the obtaining module 14 is further configured to, when the determining module 12 determines that the operation type is the write time authentication request, obtain key data stored in the obtaining module, obtain an authentication factor, and obtain a third authentication code according to the key data and the authentication factor;
the sending module 15 is further configured to send an authentication instruction including a third authentication code to the upper apparatus;
the first verification module 13 is specifically configured to obtain a fourth authentication code according to the key data and the third authentication code, and determine whether the fourth authentication code is consistent with the first authentication code;
the sending module 15 is further configured to send authentication failure information to the upper device when the first verification module 13 determines that the fourth authentication code is inconsistent with the first authentication code.
Optionally, in this embodiment, the apparatus further includes a first determining module;
the first determining module is used for determining the key type according to the operation instruction and judging whether the key data corresponding to the key type is empty or not;
the sending module 15 is further configured to, when the first determining module determines that the key data corresponding to the key category is empty, return error information to the upper apparatus.
Optionally, in this embodiment, the apparatus further includes a first writing module;
the first writing module is used for setting a value corresponding to the corresponding operation state byte according to the writing time result and generating writing time response data according to the operation state byte;
the sending module 15 is further configured to send the write time response data generated by the first writing module to the upper apparatus.
Optionally, in this embodiment, the apparatus further includes a second verification module;
the second verification module is configured to, when the judgment module 12 judges that the operation type is the update key, obtain a fifth authentication code in the operation instruction, obtain key data stored in the second verification module, and verify the fifth authentication code according to the key data;
the second verification module is further used for obtaining the updated key data in the operation instruction when the verification of the fifth authentication code is successful, and replacing the key data stored by the second verification module with the obtained updated key data;
the sending module 15 is further configured to send authentication failure information to the upper apparatus when the second verification module fails to verify the fifth authentication code.
Preferably, in this embodiment, the second verification module includes: the first obtaining unit, the first judging unit and the first sending unit are connected;
the second acquisition unit is used for acquiring the authentication factor and acquiring a sixth authentication code according to the key data and the authentication factor;
the second judging unit judges whether the sixth authentication code is consistent with the fifth authentication code;
and a second sending unit, configured to send authentication failure information to the upper apparatus when the second determining unit determines that the sixth authentication code is inconsistent with the fifth authentication code.
Preferably, in this embodiment, the obtaining module 14 is further configured to, when the determining module 12 determines that the operation type is the key updating authentication request, obtain key data stored by itself, obtain an authentication factor, and obtain a seventh authentication code according to the key data and the authentication factor;
the sending module 15 is further configured to send an authentication instruction including a seventh authentication code to the upper apparatus;
the second verification module is specifically used for obtaining an eighth authentication code according to the key data and the seventh authentication code and judging whether the eighth authentication code is consistent with the fifth authentication code;
the sending module 15 is further configured to send authentication failure information to the upper apparatus when the second verification module determines that the eighth authentication code is inconsistent with the fifth authentication code.
Preferably, in this embodiment, the apparatus further includes a second determining module;
the second determining module is used for determining the key type according to the operation instruction and judging whether the key data corresponding to the key type is empty or not;
the sending module 15 is further configured to, when the second determining module determines that the key data corresponding to the key category is empty, return an error message to the upper apparatus.
Further preferably, in this embodiment, the apparatus further includes an update module;
the updating module is used for acquiring the updated key data in the operation instruction when the judging module 12 judges that the key data corresponding to the key category is empty, and correspondingly storing the updated key data and the key category;
the sending module 15 is further configured to return an update key response to the upper apparatus.
Preferably, in this embodiment, the apparatus further includes a second writing module;
the second writing module is used for setting a value corresponding to the corresponding operation state byte according to the key updating result and generating key updating response data according to the operation state byte;
the sending module 15 is further configured to send the updated key response data generated by the second writing module to the upper apparatus.
Optionally, in this embodiment, the apparatus further includes a third verification module;
a third verification module, configured to, when the determination module 12 determines that the operation type is the read time, obtain a ninth authentication code in the operation instruction, obtain key data stored in the third verification module, and verify the ninth authentication code according to the key data;
the sending module 15 is further configured to send authentication failure information to the upper apparatus when the third verification module fails to verify the ninth authentication code.
Preferably, in this embodiment, the third verification module includes: a third acquiring unit, a third judging unit and a third sending unit;
the third acquisition unit is used for acquiring the authentication factor and acquiring a tenth authentication code according to the key data and the authentication factor;
a third judging unit that judges whether the tenth authentication code is identical to the ninth authentication code;
and a third sending unit, configured to send authentication failure information to the upper apparatus when the third determining unit determines that the tenth authentication code is inconsistent with the ninth authentication code.
Further preferably, in this embodiment, the obtaining module 14 is further configured to, when the determining module 12 determines that the operation type is the read time authentication request, obtain key data stored in the obtaining module, obtain an authentication factor, and obtain an eleventh authentication code according to the key data and the authentication factor;
the sending module 15 is further configured to send an authentication instruction including an eleventh authentication code to the upper apparatus;
the third verification module is specifically used for obtaining a twelfth authentication code according to the key data and the eleventh authentication code and judging whether the twelfth authentication code is consistent with the ninth authentication code;
the sending module 15 is further configured to send authentication failure information to the upper apparatus when the third verification module determines that the twelfth authentication code is inconsistent with the ninth authentication code.
Further preferably, in this embodiment, the apparatus further includes a third determining module;
the third determining module is used for determining the key type according to the operation instruction and judging whether the key data corresponding to the key type is empty or not;
the sending module 15 is further configured to, when the third determining module determines that the key data corresponding to the key category is empty, return an error message to the upper apparatus.
The invention also provides a USB device which comprises the device provided by the invention.
The real-time clock device, the working method thereof and the USB device provided by the present invention are described in detail above, and a specific example is applied in the present document to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (31)

1. A method of operating a real time clock apparatus, the method comprising:
step S1, the real-time clock device is electrified and initialized;
step S2, the real-time clock device detects whether an operation instruction sent by an upper device is received, if so, the step S3 is executed, otherwise, the operation is ended;
step S3, the real-time clock device judges the operation type according to the operation instruction, if the operation type is the write-in time, the step S4 is executed; if the operation type is the read time, go to step S6;
step S4, the real-time clock device obtains the first authentication code and time data in the operation instruction, obtains key data stored by the real-time clock device, verifies the first authentication code according to the key data, if the verification is successful, the step S5 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step S2 is returned;
step S5, the real-time clock device sets the acquired time data as the starting time, starts timing according to the starting time, and returns to step S2;
and S6, the real-time clock device acquires the current timing time, organizes and obtains a read time response according to the current timing time, sends the read time response to the upper device, and returns to the step S2.
2. The method according to claim 1, wherein in step S4, the verifying the first authentication code according to the key data specifically includes: and the real-time clock device acquires an authentication factor, acquires a second authentication code according to the key data and the authentication factor, judges whether the second authentication code is consistent with the first authentication code, if so, executes the step S5, otherwise, sends authentication failure information to the upper device, and returns to the step S2.
3. The method according to claim 1, wherein in step S3, the method further comprises: if the operation type is a write time authentication request, the method further comprises:
the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires a third authentication code according to the key data and the authentication factor, sends an authentication instruction including the third authentication code to the upper device, and returns to the step S2;
the verifying the first authentication code according to the key data specifically includes: and the real-time clock device obtains a fourth authentication code according to the key data and the third authentication code, judges whether the fourth authentication code is consistent with the first authentication code, if so, executes the step S5, otherwise, sends authentication failure information to the upper device, and returns to the step S2.
4. The method according to claim 1, wherein before executing the step S4, further comprising: and the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to the step S2, and otherwise executes the step S4.
5. The method according to claim 1, wherein in step S5, before returning to step S2, the method further comprises: and the real-time clock device sets a corresponding value corresponding to the operation status byte according to the writing time result, and generates writing time response data according to the operation status byte and returns the writing time response data to the upper device.
6. The method according to claim 1, wherein the step S3 further comprises: if the operation type is updating the key, the method comprises the following steps:
step S7, the real-time clock device acquires a fifth authentication code in the operation instruction, acquires key data stored by the real-time clock device, verifies the fifth authentication code according to the key data stored by the real-time clock device, if the verification is successful, the step S8 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step S2 is returned;
step S8, the real-time clock device obtains the updated key data in the operation instruction, updates the key data stored therein to the updated key data, and returns to step S2.
7. The method according to claim 6, wherein in step S7, the verifying the fifth authentication code according to the key data stored in the step S7 specifically includes: and the real-time clock device acquires an authentication factor, acquires a sixth authentication code according to the key data stored in the real-time clock device and the authentication factor, judges whether the sixth authentication code is consistent with the fifth authentication code, if so, executes the step S8, otherwise, sends authentication failure information to the upper device, and returns to the step S2.
8. The method according to claim 6, wherein the step S3 further comprises: if the operation type is an update key authentication request, the method further comprises the following steps:
the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires a seventh authentication code according to the key data and the authentication factor, sends an authentication instruction including the seventh authentication code to the upper device, and returns to the step S2;
the verifying the fifth authentication code according to the key data stored by the fifth authentication code specifically comprises: and the real-time clock device obtains an eighth authentication code according to the key data stored in the real-time clock device and the seventh authentication code, judges whether the eighth authentication code is consistent with the fifth authentication code, if so, executes the step S8, otherwise, sends authentication failure information to the upper device, and returns to the step S2.
9. The method according to claim 6, wherein before executing the step S7, further comprising: and the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to the step S2, and otherwise executes the step S7.
10. The method according to claim 9, wherein the determining that the key data corresponding to the key category is empty comprises: and the real-time clock device acquires the updated key data in the operation instruction, stores the updated key data corresponding to the key type, returns an updated key response to the upper device, and returns to the step S2.
11. The method according to claim 6, wherein in step S8, before returning to step S2, the method further comprises: and the real-time clock device sets a value corresponding to the corresponding operation state byte according to the key updating result, generates key updating response data according to the operation state byte, and returns the key updating response data to the upper device.
12. The method according to claim 1, wherein before executing the step S6, further comprising:
step A1, the real-time clock device obtains the ninth authentication code in the operation instruction, obtains key data stored by the real-time clock device, verifies the ninth authentication code according to the key data, if the verification is successful, step S6 is executed, if the verification is failed, authentication failure information is sent to the upper device, and the step S2 is returned.
13. The method according to claim 12, wherein the verifying the ninth authentication code according to the key data specifically comprises: and the real-time clock device acquires an authentication factor, obtains a tenth authentication code according to the key data and the authentication factor, judges whether the tenth authentication code is consistent with the ninth authentication code, if so, executes the step S6, otherwise, sends authentication failure information to the upper device, and returns to the step S2.
14. The method according to claim 12, wherein the step S3 further comprises: if the operation type is a read time authentication request, the method further comprises the following steps:
the real-time clock device acquires key data stored by the real-time clock device, acquires an authentication factor, acquires an eleventh authentication code according to the key data and the authentication factor, sends an authentication instruction including the eleventh authentication code to the upper device, and returns to the step S2;
the verifying the ninth authentication code according to the key data specifically includes: and the real-time clock device obtains a twelfth authentication code according to the key data and the eleventh authentication code, judges whether the twelfth authentication code is consistent with the ninth authentication code, if so, executes the step S6, otherwise, sends authentication failure information to the upper device, and returns to the step S2.
15. The method of claim 12, wherein the step a1 is further performed before: and the real-time clock device determines the key type according to the operation instruction, judges whether the key data corresponding to the key type is empty, returns error information to the upper device if the key data corresponding to the key type is empty, returns to the step S2, and otherwise executes the step A1.
16. A real time clock apparatus, the apparatus comprising:
the initialization module is used for power-on initialization;
the detection module is used for detecting whether an operation instruction sent by the upper device is received or not;
the judging module is used for judging the operation type according to the operation instruction;
the first verification module is used for acquiring a first authentication code and time data in the operation instruction when the judgment module judges that the operation type is the writing time, acquiring key data stored by the first verification module, and verifying the first authentication code according to the key data;
the first verification module is further used for setting the acquired time data as an initial time when the first authentication code is verified successfully, and starting timing according to the initial time;
the acquisition module is used for acquiring the current timing time when the judgment module judges that the operation type is the reading time, and organizing the reading time according to the current timing time to obtain the reading time response;
the sending module is used for sending the reading time response organized by the obtaining module to the upper device;
the sending module is further configured to send authentication failure information to the upper device when the first authentication code fails to be verified.
17. The apparatus of claim 16, wherein the first authentication module comprises: the device comprises a first acquisition unit, a first judgment unit and a first sending unit;
the first obtaining unit is used for obtaining an authentication factor and obtaining a second authentication code according to the key data and the authentication factor;
the first judging unit is used for judging whether the second authentication code is consistent with the first authentication code;
the first sending unit is configured to send authentication failure information to the upper apparatus when the first determining unit determines that the second authentication code is inconsistent with the first authentication code.
18. The apparatus according to claim 16, wherein the obtaining module is further configured to, when the determining module determines that the operation type is a write time authentication request, obtain key data stored in the determining module, obtain an authentication factor, and obtain a third authentication code according to the key data and the authentication factor;
the sending module is further configured to send an authentication instruction including the third authentication code to the upper apparatus;
the first verification module is specifically configured to obtain a fourth authentication code according to the key data and the third authentication code, and determine whether the fourth authentication code is consistent with the first authentication code;
the sending module is further configured to send authentication failure information to the upper device when the first verification module determines that the fourth authentication code is inconsistent with the first authentication code.
19. The apparatus of claim 16, further comprising a first determining module;
the first determining module is configured to determine a key category according to the operation instruction, and determine whether key data corresponding to the key category is empty;
the sending module is further configured to return error information to the upper apparatus when the first determining module determines that the key data corresponding to the key category is empty.
20. The apparatus of claim 16, further comprising a first write module;
the first write-in module is used for setting a corresponding value of the corresponding operation state byte according to the write-in time result and generating write-in time response data according to the operation state byte;
the sending module is further configured to send the write-in time response data generated by the first writing module to the upper apparatus.
21. The apparatus of claim 16, further comprising a second authentication module;
the second verification module is used for acquiring a fifth authentication code in the operation instruction when the judgment module judges that the operation type is the updated key, acquiring key data stored in the second verification module, and verifying the fifth authentication code according to the key data;
the second verification module is further configured to obtain updated key data in the operation instruction when the verification of the fifth authentication code is successful, and replace the key data stored in the second verification module with the obtained updated key data;
the sending module is further configured to send authentication failure information to the upper device when the second verification module fails to verify the fifth authentication code.
22. The apparatus of claim 21, wherein the second authentication module comprises: the first obtaining unit, the first judging unit and the first sending unit are connected;
the second obtaining unit is used for obtaining an authentication factor and obtaining a sixth authentication code according to the key data and the authentication factor;
the second judging unit judges whether the sixth authentication code is consistent with the fifth authentication code;
the second sending unit is configured to send authentication failure information to the upper apparatus when the second determining unit determines that the sixth authentication code is not consistent with the fifth authentication code.
23. The apparatus according to claim 21, wherein the obtaining module is further configured to, when the determining module determines that the operation type is an update key authentication request, obtain key data stored in the determining module, obtain an authentication factor, and obtain a seventh authentication code according to the key data and the authentication factor;
the sending module is further configured to send an authentication instruction including the seventh authentication code to the upper apparatus;
the second verification module is specifically configured to obtain an eighth authentication code according to the key data and the seventh authentication code, and determine whether the eighth authentication code is consistent with the fifth authentication code;
the sending module is further configured to send authentication failure information to the upper device when the second verification module determines that the eighth authentication code is inconsistent with the fifth authentication code.
24. The apparatus of claim 21, further comprising a second determining module;
the second determining module is configured to determine a key type according to the operation instruction, and determine whether key data corresponding to the key type is empty;
the sending module is further configured to return error information to the upper apparatus when the second determining module determines that the key data corresponding to the key category is empty.
25. The apparatus of claim 24, further comprising an update module;
the updating module is configured to, when the judging module judges that the key data corresponding to the key category is empty, obtain updated key data in the operation instruction, and store the updated key data corresponding to the key category;
the sending module is further configured to return a key update response to the upper device.
26. The apparatus of claim 21, further comprising a second write module;
the second write-in module is used for setting a corresponding value of the corresponding operation state byte according to the key updating result and generating key updating response data according to the operation state byte;
the sending module is further configured to send the updated key response data generated by the second writing module to the upper device.
27. The apparatus of claim 16, further comprising a third authentication module;
the third verification module is used for acquiring a ninth authentication code in the operation instruction, acquiring key data stored in the third verification module and verifying the ninth authentication code according to the key data when the judgment module judges that the operation type is the reading time;
the sending module is further configured to send authentication failure information to the upper device when the third verification module fails to verify the ninth authentication code.
28. The apparatus of claim 27, wherein the third authentication module comprises: a third acquiring unit, a third judging unit and a third sending unit;
the third obtaining unit is configured to obtain an authentication factor, and obtain a tenth authentication code according to the key data and the authentication factor;
the third judging unit judges whether the tenth authentication code is consistent with the ninth authentication code;
the third sending unit is configured to send authentication failure information to the upper apparatus when the third determining unit determines that the tenth authentication code is not consistent with the ninth authentication code.
29. The apparatus according to claim 27, wherein the obtaining module is further configured to, when the determining module determines that the operation type is a read time authentication request, obtain key data stored in the determining module, obtain an authentication factor, and obtain an eleventh authentication code according to the key data and the authentication factor;
the sending module is further configured to send an authentication instruction including the eleventh authentication code to the upper apparatus;
the third verification module is specifically configured to obtain a twelfth authentication code according to the key data and the eleventh authentication code, and determine whether the twelfth authentication code is consistent with the ninth authentication code;
the sending module is further configured to send authentication failure information to the upper apparatus when the third verification module determines that the twelfth authentication code is inconsistent with the ninth authentication code.
30. The apparatus of claim 27, further comprising a third determining module;
the third determining module is configured to determine a key category according to the operation instruction, and determine whether key data corresponding to the key category is empty;
the sending module is further configured to return error information to the upper apparatus when the third determining module determines that the key data corresponding to the key category is empty.
31. A USB device, characterized in that it comprises an apparatus according to any one of claims 16 to 30.
CN202010643463.5A 2020-07-07 2020-07-07 Real-time clock device, working method thereof and USB (universal serial bus) equipment Pending CN111538371A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010643463.5A CN111538371A (en) 2020-07-07 2020-07-07 Real-time clock device, working method thereof and USB (universal serial bus) equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010643463.5A CN111538371A (en) 2020-07-07 2020-07-07 Real-time clock device, working method thereof and USB (universal serial bus) equipment

Publications (1)

Publication Number Publication Date
CN111538371A true CN111538371A (en) 2020-08-14

Family

ID=71968577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010643463.5A Pending CN111538371A (en) 2020-07-07 2020-07-07 Real-time clock device, working method thereof and USB (universal serial bus) equipment

Country Status (1)

Country Link
CN (1) CN111538371A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112632642A (en) * 2020-12-28 2021-04-09 北京深思数盾科技股份有限公司 Clock checking method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101324799A (en) * 2007-06-11 2008-12-17 群联电子股份有限公司 Portable memory device and synchronization method thereof
CN101968774A (en) * 2010-10-21 2011-02-09 中国人民解放军61938部队 Device and method for storing mobile data safely
CN101995841A (en) * 2009-08-04 2011-03-30 西门子公司 Device for insertion in calculating system and calculating system
CN102194656A (en) * 2010-03-16 2011-09-21 扬智科技股份有限公司 Method for generating chip authentication code, and chip authentication method and system
CN108734015A (en) * 2017-04-20 2018-11-02 周宏建 Storage device and access authority control method thereof
CN111260908A (en) * 2020-01-20 2020-06-09 青岛九维华盾科技研究院有限公司 Infrared characteristic simulation system and method applicable to simulation model

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101324799A (en) * 2007-06-11 2008-12-17 群联电子股份有限公司 Portable memory device and synchronization method thereof
CN101995841A (en) * 2009-08-04 2011-03-30 西门子公司 Device for insertion in calculating system and calculating system
CN102194656A (en) * 2010-03-16 2011-09-21 扬智科技股份有限公司 Method for generating chip authentication code, and chip authentication method and system
CN101968774A (en) * 2010-10-21 2011-02-09 中国人民解放军61938部队 Device and method for storing mobile data safely
CN108734015A (en) * 2017-04-20 2018-11-02 周宏建 Storage device and access authority control method thereof
CN111260908A (en) * 2020-01-20 2020-06-09 青岛九维华盾科技研究院有限公司 Infrared characteristic simulation system and method applicable to simulation model

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112632642A (en) * 2020-12-28 2021-04-09 北京深思数盾科技股份有限公司 Clock checking method and device and electronic equipment
CN112632642B (en) * 2020-12-28 2022-05-20 北京深思数盾科技股份有限公司 Clock checking method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN106569847B (en) Method for vehicle-mounted system to realize IAP remote upgrade based on mobile network
CN105302708A (en) Mobile terminal and detection method thereof
CN104090790A (en) Two-chip scheme firmware updating method for safety terminal
CN107861832B (en) Data verification method and device and readable storage medium
CN113220229B (en) Online I/O undisturbed configuration method for distributed control system
CN111538517A (en) Server firmware upgrading method and system, electronic equipment and storage medium
WO2022142153A1 (en) Electricity meter upgrading method and system, smart meter, and storage medium
CN112379901A (en) Singlechip firmware upgrading method and device, computer equipment and storage medium
CN107844305A (en) The method for upgrading software and embedded device of embedded device
CN108491466B (en) Electronic device, access instruction information acquisition method, and storage medium
CN109462661B (en) Data synchronization method and device, computer equipment and storage medium
CN111538371A (en) Real-time clock device, working method thereof and USB (universal serial bus) equipment
CN112148314A (en) Mirror image verification method, device, equipment and storage medium of embedded system
CN114861158A (en) Security authentication method, device, system, electronic equipment and storage medium
CN102982265B (en) Authentication method for storing basic input and output system (BIOS) setting
CN112286565B (en) Embedded system differential upgrading method based on storage container
CN112667272A (en) Ammeter upgrading method and system, intelligent ammeter and storage medium
CN112817935A (en) Data processing method, device and equipment based on field type and storage medium
CN107678917B (en) Test machine automation management method, device, equipment and storage medium
CN115982735A (en) Method, device and storage medium for automatically processing production data
CN115495129A (en) Firmware upgrading method, device, equipment, medium and product
CN112925546B (en) Multistage verification method and system for preventing vehicle-mounted ECU from refreshing errors
CN114237991A (en) Main/standby service switching method, device, equipment and medium based on cold standby mode
CN111726247A (en) Electronic lock firmware updating method and device, electronic lock and storage medium
CN109558413B (en) Cloud storage-based automatic recovery method for equipment serial number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200814

RJ01 Rejection of invention patent application after publication